EP1756722A4 - A retail method over a wide area network - Google Patents

A retail method over a wide area network

Info

Publication number
EP1756722A4
EP1756722A4 EP00953416A EP00953416A EP1756722A4 EP 1756722 A4 EP1756722 A4 EP 1756722A4 EP 00953416 A EP00953416 A EP 00953416A EP 00953416 A EP00953416 A EP 00953416A EP 1756722 A4 EP1756722 A4 EP 1756722A4
Authority
EP
European Patent Office
Prior art keywords
customer
transaction
computer station
service provider
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00953416A
Other languages
German (de)
French (fr)
Other versions
EP1756722A2 (en
Inventor
Saar Wilf
Guy Ruvio
Or Tal
Shvat Shaked
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trivnet Ltd
Original Assignee
Trivnet Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trivnet Ltd filed Critical Trivnet Ltd
Publication of EP1756722A4 publication Critical patent/EP1756722A4/en
Publication of EP1756722A2 publication Critical patent/EP1756722A2/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Definitions

  • the present invention relates generally to a retail method for performing commercial transactions over a wide area network and more particularly to a retail method for performing commercial transactions over the Internet.
  • the Internet is a worldwide network of interconnected computers and computer networks.
  • the Internet includes Internet service providers (ISPs) who provide Internet access to a large number of subscribers or users who may pay the ISP a fee for the access.
  • the subscribers can be individuals or organizations and can access the Internet by connecting to the ISP using modems over the general switched telephony system (GSTN), or cable television networks, or other types of communication line infrastructure.
  • GSTN general switched telephony system
  • the Internet also includes vendors who advertise products and services over the Internet and solicit orders from users.
  • PCT international publication No. WO 97/03410 to Egendorf discloses a method for Internet billing.
  • an ISP can bill a billing account of a customer for products or services purchased from a vendor over the Internet, thereby avoiding the need to communicate the customer's credit card or account number over the Internet.
  • the method is limited in that each ISP has to establish agreements with a multiplicity of vendors some of which may not be subscribers of the ISP.
  • each vendor has to establish separate agreements with a multiplicity of ISPs to be able to use the method of WO 97/03410 for performing transactions with customers of different ISPs.
  • the present invention relates to a system and method which provides vendors and customers a secure and economical way of selling and purchasing goods over a wide area network.
  • a commercial account is established for customers at their network service provider.
  • payment for the product is debited from the customer's network service provider account.
  • a secure transaction service cooperates with the customer, the vendor and the network service provider to authorize the transaction.
  • the invention enables a customer to purchase a product via the network without transmitting sensitive information such as a credit card number over the network. Moreover, the user does not need to install additional software on his computer for using the billing method of the present invention.
  • One embodiment of the present invention provides a retail method that is adapted for use over the Internet.
  • the retail method is adapted for use over any wide area network using any suitable communication protocol which is within the scope and spirit of the present invention.
  • a retail method over a wide area network includes a point of sale computer station (e.g., a vendor's network server), a network service provider server operated by a network service provider, a customer computer station used by a customer and connected to the wide area network through the network service provider, and a transaction server having access to identification information of the network service provider and the point of sale computer station.
  • the basic process flow of the retail method includes: Connecting the customer computer station to the point of sale computer station. Purchasing goods from the point of sale computer station by the customer. Validating the purchasing by the transaction server and the network service provider server.
  • the validating process includes: Automatically receiving by the transaction server from the customer computer station of the transaction details and identification information for identifying the point of sale computer station and the network address of the customer computer station.
  • Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
  • the network service provider provides the transaction verification form to the customer.
  • the secure transaction server instead of the secure transaction server providing the form to the customer, the secure transaction server sends the necessary information to the network service provider to enable the network service provider to send the form.
  • the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending the transaction details and the network address of the customer computer station from the transaction server to the network service provider server. The transaction server causing the customer computer station to contact the network service provider. Sending a transaction verification form from the network service provider server to the customer computer station, the transaction verification form including at least the transaction details.
  • a confirmation or a denial of the transaction details Sending by the customer computer station of the confirmation or the denial of the transaction details from the customer computer station to the network service provider server. Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
  • the system includes at least one network service provider server operated by a network service provider and connected to the wide area network.
  • the system also includes at least one customer computer station used by a customer and connected to the wide area network through one of the network service provider servers.
  • the system also includes at least one point of sale computer station connected to the wide area network and at least one transaction server having access to identification information of the at least one network service provider and the at least one point of sale computer station and connected to the wide area network.
  • the retail method steps performed by the system are similar to those of the methods discussed above. Namely, connecting one of the customer computer stations to one of the points of sale computer station. Purchasing goods from the point of sale computer station by the customer operating the customer computer station. Validating the purchasing by one of the transaction servers and one of the network service provider servers. Charging the customer for the purchasing, the charging including a transaction including the steps of billing an account of the customer by the network service provider server a transaction sum and billing by the transaction server an account of the network service provider server the transaction sum. Supplying the goods to the customer. Remitting a portion of the transaction sum to a vendor operating the point of sale computer station.
  • the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending a transaction verification form from the transaction server to the customer computer station, the transaction verification form including at least the transaction details and information for contacting the network service provider server. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by the customer computer station of the transaction details and the confirmation or the denial of the transaction details from the customer computer station to the network service provider server using the information for contacting the network service provider server included in the transaction verification form.
  • Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
  • the system may also provide a retail method whereby the network service provider supplies the transaction verification form to the customer in a similar manner as performed by the method discussed above.
  • the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending the transaction details and the network address of the customer computer station from the transaction server to the network service provider server. The transaction server causing the customer computer station to contact the network service provider. Sending a transaction verification form from the network service provider server to the customer computer station, the transaction verification form including at least the transaction details. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details.
  • the customer responds to the secure transaction server instead of the network service " provider during the verification operation. For example, the customer does not contact the network service provider to send a transaction confirmation/denial. Instead, the customer sends the confirmation/denial to the secure transaction server. To ensure that the customer is authorized to make the transaction, the secure transaction server contacts the network service provider server to obtain the customer identity.
  • the network service provider identifies the customer using the telephone number of the customer.
  • the customer's telephone number is supplied to the network service provider, for example, over the telephony infrastructure when the customer calls the network service provider.
  • the customer's telephone number is used to bill the customer's telephone account for the product the customer purchased from the vendor.
  • the step of identifying the customer is done by the STS rather than the NSP.
  • the STS remotely accesses the NSP's servers to match the network address with a user account.
  • the STS may also carry out the step of determining whether the customer is authorized to make a purchase.
  • the method of the invention may be practiced without installing the ISP-related software applications treated herein on the network service provider server.
  • the address may be obtained from the HTTP "Forwarded For" header.
  • the address may be obtained by having the customer's browser connect in the background to an unproxied service.
  • the address may be obtained by having the customer's browser connect in the background to an unproxied host.
  • an application that will attempt to contact the secure transaction service or the network service provider may be downloaded to the customer's computer station.
  • the retail method may include the step of remitting a portion of the transaction sum to a network service provider operating the network service provider server.
  • the retail method also may include the step of remitting a portion of the transaction sum to the transaction service provider operating the transaction server.
  • the identification information of the network service provider and the point of sale computer station includes information for associating a customer network address with a network service provider and technical information needed to contact the network service provider server, and information for associating a vendor identifier with the technical information needed to contact the point of sale computer station over the wide area network.
  • the information for associating a customer and the information for associating the vendor are stored on the transaction server or accessible to the transaction server.
  • the wide area network is the Internet
  • the network service provider is an Internet service provider
  • the information for associating a customer includes at least the Internet protocol (IP) address space of the Internet service provider server and the technical information needed to contact the Internet service provider
  • the information for associating the vendor is technical information needed to contact the point of sale computer station over the Internet.
  • IP Internet protocol
  • the step of charging further includes the step of recording by the network service provider server of the transaction details for billing the customer by the network service provider.
  • the step of remitting includes the step of crediting an account of the vendor by the portion of the transaction sum.
  • the step of crediting is performed by a financial service provider.
  • the financial service provider is selected from the group consisting of a bank and a credit card company.
  • the account of the vendor is a bank account or a credit card account.
  • the communication between the point of sale computer station and the transaction server and between the transaction server and the network service provider server is encrypted.
  • the transaction service provider operating the transaction server establishes a remitting agreement with the vendor for remitting a portion of the transaction sum to the vendor after the step of charging.
  • the remitting agreement is established prior to using the retail method and the transaction service provider establishes a billing agreement with the network service provider for billing an account of network service provider the transaction sum for goods purchased by the customer from the point of sale computer station.
  • the billing agreement is established prior to using the retail method.
  • the network service provider establishes a billing agreement with the customer for billing an account of the customer the transaction sum for goods purchased by the customer from one or more point of sale computer stations.
  • the billing agreement may be established prior to using the retail method.
  • a customer may be presented the terms of the agreement the first time he uses the retail method. This may be accomplished, for example, by displaying a corresponding window or web page to the customer. In this case, the customer could accept the terms of the agreement by, for example, clicking a button on the window or web page.
  • a per transaction billing agreement is established between the customer and the network service provider for billing an account of the customer the transaction sum for goods purchased by the customer from the point of sale computer station.
  • a method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected services and configured not to use a proxy server for other services includes the steps of instructing the browser to open a connection to one of the other services, and obtaining the IP address from the connection.
  • a method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected hosts and configured not to use a proxy server for other hosts.
  • the method includes the steps of instructing the browser to open a connection to one of the other hosts, and obtaining the IP address from the connection.
  • a method for obtaining an IP address of a computer including the step of activating an application on the computer. The application opens a connection to a server and the connection contains the IP address.
  • the method further includes the step of downloading the application from the server.
  • a method for filtering access to a service provided by a service provider to subscribers of at least one ISP includes the steps of the service provider maintaining a list of IP addresses assigned to the at least one ISP, and when a user attempts to access the service through a computer having an IP address, the service provider enabling access to the service if the IP address appears in the list.
  • the method of performing a commercial transaction described above further includes the step of associating the customer identity information with a first plurality of identifiers contained in the transaction with the vendor application, and with privileges related to the transaction authorization and to the product.
  • the method also includes the step of finding the best match of a second plurality of identifiers contained in the second transaction with a previously associated plurality of identifiers, when a second transaction is initiated with the vendor application. If the statistical significance of the best match is better than a predetermined significance, the customer identification information associated with the previously associated plurality of identifiers is retrieved. If the privileges associated with the customer identification information allow access to the goods requested in the second step of purchasing, the goods requested in the second step of purchasing are provided.
  • the retail method over a wide area network described above further includes the step of associating the identity information with a first plurality of identifiers sent to the point of sale computer station during the step of purchasing, and with privileges related to the step of validating and to the goods.
  • the method also includes the step of finding the best match of a second plurality of identifiers sent to the point of sale computer station during the second step of purchasing with a previously associated plurality of identifiers when a second step of purchasing goods from the point of sale computer station is initiated by the customer. If the statistical significance of the best match is better than a predetermined significance, the customer identification information associated with the previously associated plurality of identifiers is retrieved. If the privileges associated with the customer identification information allow access to the goods requested in the second step of purchasing, the goods requested in the second step of purchasing are provided.
  • a method of payment for a software product including the steps of invoking a payment process during installation of the software product on a customer computer station that is connectable to a network, and completing the installation only if the user has successfully completed the payment process.
  • the payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
  • a method of payment for a software product installed on a customer computer station that is connectable to a network.
  • the method includes the steps of invoking a payment process at least a predetermined period of time after installation by a user of the software product on the customer computer station, and enabling subsequent use of the software product only if the user has successfully completed the payment process.
  • the payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
  • a method of payment for a software product installed on a customer computer station that is connectable to a network.
  • the method includes the steps of invoking a payment process when at least one condition is satisfied, and enabling subsequent use of the software product only if the user has successfully completed the payment process.
  • the payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
  • the condition is satisfied when a preset usage time of the software product has passed, or when the software product has been used a preset number of times.
  • the method of performing a commercial transaction described above is for a product which is a tangible good delivered to an address of said customer.
  • the method further includes the step of obtaining the address from a database associating a known customer identifier with the address.
  • the method of performing a commercial transaction described above further includes the step of receiving, by the transaction service, a password from the customer.
  • Fig. 1 is a schematic block diagram of a system for carrying out the retail method over the Internet, in accordance with a preferred embodiment of the present invention
  • Fig. 2 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a customer using the customer computer station of the system of Fig. 1;
  • FIG. 3 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a point of sale computer station of the system of Fig. 1 ;
  • Fig. 4 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
  • STS secure transaction server
  • Fig. 5 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ;
  • ISP Internet service provider
  • Fig. 6 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ;
  • Fig. 7 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
  • ISP Internet service provider
  • STS secure transaction server
  • Fig. 8 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ;
  • ISP Internet service provider
  • Fig. 9 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
  • Fig. 10 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
  • Fig. 11 is a block diagram illustrating several data memory components in accordance with one embodiment of the invention.
  • Fig. 12 is a schematic illustration of a collection of identifiers, according to a preferred embodiment of the present invention.
  • Fig. 13 is a block diagram illustration of HTTP session management using multiple identifiers and statistical significance, in accordance with a preferred embodiment of the present invention.
  • Fig. 1 is a schematic block diagram of a system for carrying out the retail method, in accordance with a preferred embodiment of the present invention.
  • the system includes a secure transaction service provider 20 (STSP) which includes a plurality of M secure transaction servers (STS) labeled 21-23 connected to the Internet 10.
  • STSP secure transaction service provider
  • the system also includes a plurality of N Internet service provider (ISP) servers labeled 31 - 33 connected to the Internet 10, and a plurality of K point of sale computer stations labeled 41 - 43, connected to the Internet 10.
  • ISP Internet service provider
  • Each of the plurality of N ISP servers provides Internet access to a plurality of customer computer stations.
  • ISP server 31 provides Internet access to a plurality of R customer computer stations labeled 51 - 52
  • ISP server 32 provides Internet access to a plurality of S customer computer stations labeled 61 - 62
  • ISP server 33 provides Internet access to a plurality of Q customer computer stations labeled 71 - 72.
  • each of the numbers K, M, N, Q, R and S may be any non-zero positive integer.
  • a customer connects to the Internet via an ISP.
  • the customer is identified using some standard method such as a username and password, and is assigned an IP address.
  • the ISP server of the present invention then associates the assigned IP address with the customer identity, or with any other data suitable for identifying and/or billing the customer.
  • the telephone number of the customer can be associated with the customer's IP address, as described hereinabove.
  • other suitable identifying and/or billing data types may be used.
  • the customer then initiates a transaction by accessing a point of sale computer station using one of the customer computer station, and interacts with the application running on the point of sale station to select a product to be purchased.
  • the customer is billed for the transaction by debiting an account that has been established between the customer and the customer's ISP.
  • the STS coordinates the transaction authorization procedure that determines whether the customer has an account that can be debited. For example, the point of sale station asks the STS whether the customer is authorized to make a purchase using the system.
  • the STS determines (in cooperation with the ISP) whether the customer is authorized and sends the appropriate response back to the point of sale station.
  • the secure transaction service provider 20 is a service provider operating one or more STSs connected to the Internet.
  • the STSP 20 provides software modules which are installed on point of sale computer stations, on the ISP servers and on each of the STSs. It is noted that, if the ISP has more than one server, the software modules may be installed on each of the ISP servers or only on part of them.
  • Each of the ISPs notifies the STSP 20 of the IP address space which the ISP allocates to its customers for connecting to the Internet, as allocated to the ISP by the proper authorities such as the American Registry for Internet Numbers ("ARIN").
  • Each of the ISPs may also provide the STSP with other technical information which may be needed such as the IP addresses of the ISP's proxy servers and the bandwidth of the ISP's connection to the Internet.
  • the software module installed on the ISP servers can identify a customer (236, FIGURE 11) currently using a given IP address (238, FIGURE 11). This software module also manages the billing of the customers in accordance with the purchase of goods from various vendors, manages the communication with the STS and the customer computer stations and checks whether the customer is certified to pay through the STSP as disclosed in detail hereinafter. It is noted that some of the functionality of the ISP software module might already exist on the ISP servers, and can be used instead.
  • the software module installed on the point of sale computer stations manages the registration of the sales and transactions done through the STSP involving the vendor. This software module also manages the pricing of goods offered by the vendor through the STSP. It is noted that some of the functionality of the point of sale software module might already exist on the point of sale servers, and can be used instead.
  • the software module on the point of sale computer stations also manages the communication with the STS, as disclosed in detail hereinafter.
  • the software module installed on the STS uses a database or a table
  • the software module installed on the STS can thus identify the ISP of a customer having an IP address by accessing the database or table disclosed hereinabove.
  • the software module installed on the STSs also manages the financial information (226) needed for implementing the billing such as the bank account numbers of the ISPs and vendors, and the details of purchases (228).
  • the software module installed on the STS also manages all the communication with the point of sale computer stations, customer computer stations and ISP servers, as disclosed in detail hereinafter.
  • Each of the point of sale computer stations 41 - 43 is assigned an ID number and the STSs have access to a look up table (LUT) 230 which associates each point of sale computer station's ID number with the technical information needed to contact the point of sale computer station.
  • the STSP, the customers, the vendors and the ISPs receive financial services from one or more financial service providers 240 (FIGURE 11) such as a credit card company or a bank or any other suitable financial service company.
  • the STSP, the customers, the vendors and the ISPs have bank accounts or credit card accounts with the financial service providers and can provide a bank account number or a credit card number for performing financial transactions. In one embodiment, transactions between the financial service company are accomplished using the Automatic Clearing House Format.
  • each of the M STSs 21 - 23 is directly connected to the Internet backbone (not shown) for fast access.
  • the STSs can be connected to the Internet 10 by any other suitable connection method.
  • Each of the K point of sale computer stations labeled 41 - 43 can be a server operated by a vendor and connected to the Internet directly, a point of sale application (e.g., a vendor application) residing on a server and operated for a vendor by an Internet presence provider (IPP) or any point of sale computer station connected to the Internet by any other suitable connection method.
  • a point of sale application e.g., a vendor application
  • IPP Internet presence provider
  • the STSP 20 may also operate as " an IPP.
  • any one of the K points of sale may not be independent computer stations but may physically reside on one of the STSs 21 - 23.
  • the software for the vendor's site will be installed on one or more of the STSs 21 - 23.
  • the ISP 20 may also operate as an IPP.
  • any one of the K points of sale may not be independent computer stations but may physically reside on one of the ISP servers 31 - 33.
  • the software for the vendor's site will be installed on one or more of the ISP servers 31 - 33.
  • each ISP may operate more than one server (not shown).
  • Each of the customer computer stations 51 - 52, 61 - 62 and 71 - 72 can be connected to the ISP servers 31 , 32 and 33, respectively, through a modem and the GSTN or a cable modem and a cable television network, or by any other suitable communication method.
  • Fig. 1 is shown as including a plurality of STSs 21 -23, the system can also operate with a single STS.
  • the STSs 21- 23 of the STSP 20 can be located in the same geographical location but can also be located singly or in groups at separate geographical locations.
  • the customer computer station can connect with any one of the point of sale computer stations labeled 41 - 43.
  • the customer can request goods as a service or a product which are offered for sale by the vendor. For example, after entering the vendor's site, the customer may request goods by choosing a specific option on a web page.
  • the point of sale computer station causes the customer computer station to connect to one of the available STSs 21 - 23 and to transfer the ID of the point of sale computer station and the transaction details to the available STS.
  • HTTP hypertext markup language
  • This may also be done using an HTTP 302 Status Response accompanied by a "Location:" header, followed by the ID of the point of sale computer station and the transaction details.
  • the address of the STS servers (232, FIGURE 11) associated with the point of sale computer may be stored in a data memory 234 (FIGURE 11).
  • the transaction details include the price and serial number of the requested product or service and additional details such as the payment date or other payment terms.
  • the transaction verification form is generated by HTML or Java or by any other suitable method.
  • the transaction verification form informs the customer about the requested product or service, the price and the payment terms for the transaction.
  • the transaction verification form also includes information (224, FIGURE 11) which is not shown to the customer. This information includes the address of the ISP server, the STS and/or the point of sale computer station which provides service to the customer.
  • This information is obtained from the database or the table accessible to the STSs as disclosed hereinabove, by using the automatically revealed IP address (222, FIGURE 11) of the customer computer station, in the case where the ISP server address is included, or by using the vendor ID, in the case where the point of sale computer station address is included, and may be formatted in the transaction verification form as a uniform resource locator (URL) in an HTML link.
  • IP address 222, FIGURE 11
  • vendor ID in the case where the point of sale computer station address is included
  • URL uniform resource locator
  • the customer can either confirm or deny the transaction after inspecting the transaction details on the transaction verification form. If the customer confirms the transaction, the customer thus connects to the ISP server using the data sent from the STSs in the transaction verification form, and the relevant data in the transaction verification form is then sent to the ISP server.
  • the software module of the ISP server identifies the customer (236, FIGURE 11) according to the IP address (238, FIGURE 11) or other information such as a physical communication port ID and checks whether the customer is certified to pay through the STSP (e.g., whether the customer has a debit account, e.g., 248, FIGURE 11 , established with the ISP).
  • the verification of the customer computer station's identity by the ISP has the advantage of being less susceptible to fraudulent interference, since the ISP server is not connected to the customer computer station over the Internet, in contrast to the STS or the point of sale computer station which are connected to the customer computer station over the Internet and are thus more susceptible to fraudulent interference.
  • the software module of the ISP server records the transaction details (242, FIGURE 11) into a data memory 244 including the customer's user name, the current date and time, the price of the service or product and the terms of payment.
  • the ISP server then connects to the STS and informs the STS whether the customer confirmed or denied the transaction and whether the customer is certified to pay through the STSP, and may also transfer the transaction details back to the STS for validation.
  • the STS then connects to the point of sale computer station using the information obtained from the STS's LUT as disclosed hereinabove, and informs the point of sale computer station whether or not to supply the customer with the requested service or product.
  • the STS may also provide the point of sale computer station with the reason for denial of the service or product.
  • the point of sale computer station supplies the product or service to the customer. For example, if the ordered goods are a tangible product, the point of sale computer station processes the order and issues instructions for mailing the product to the customer. Alternatively, if the customer purchased non-tangible goods such as access to a database, the point of sale computer station enables the customer's computer station to access the database.
  • the point of sale computer station will download the software product over the Internet to the customer's computer station.
  • the point of sale computer station informs the customer computer station of the reason for which it can not fulfill the request.
  • the STSP provides the financial service such as the bank or the credit card company with periodic reports including the details of all the transactions performed over a period of time.
  • the details include the credit card number or bank account number of the ISP from which the transaction was initiated, the credit card number or bank account number of the vendor involved in the transaction and the amount and date of payment or payments.
  • the financial service provider transfers the proper amounts from the ISPs to the relevant vendors.
  • the financial service provider may also deduct a commission for itself and/or for the STSP and/or for the ISP.
  • the ISP bills the customer for the transactions performed by the customer according to the billing agreement already existing between the customer and the ISP.
  • the billing of the customer could alternatively be done by another party, such as a telephone company, in which case all the relevant billing details are transferred from the STSP to this party.
  • ISP is used throughout the present application to represent any organization providing Internet access to one or more computer station. The organization may or may not charge a fee for supplying Internet access.
  • ISP may represent a company owning equipment through which the employees of the company access the Internet.
  • the customer computer stations can be the computer stations used by the employees of the company.
  • the billing of the customers which are company employees for the goods purchased from the vendor may be done by deducting the proper amounts from the salary of the employees.
  • the STS if the STS detects a problem during the steps of the method disclosed hereinabove, the STS will send a message to the relevant server or computer station causing it to cancel the transaction. For example, if the point of sale computer station did not inform the STS that the goods were supplied, the STS instructs the ISP to delete the relevant billing record. In another example, if the STS detects communication failures such as erroneous data or an inability to contact the point of sale computer station, the STS instructs the ISP to delete the relevant billing record.
  • FIG. 2 is a schematic flow chart illustrating the steps of a method for Internet billing performed by a customer of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention.
  • the customer connects to the Internet using the customer computer station (step 80).
  • the customer enters a vendor's site on a point of sale computer station (step 82) and selects goods such as a service or a product which is offered for sale by the vendor (step 84). If the point of sale computer station allows payment for the selected goods through the STSP, the customer selects this payment method (step 86).
  • the customer computer station then receives a transaction verification form from one of the STSs of the STSP 20 (step 88) as disclosed in detail hereinabove.
  • the customer checks the transaction details displayed on the transaction verification form and can confirm or deny his willingness to accept the transaction conditions (step 90). For example, the customer can click on an "accept” or a "reject” button provided on the transaction verification form for confirming or denying the transaction, respectively.
  • the customer's computer station connects to the ISP server of the ISP which provides Internet access to the customer, denies the transaction and transfers control to step 80. If the customer confirmed the transaction, the customer computer station connects to the ISP server of the ISP which provides Internet access to the customer and transfers the transaction details and the transaction confirmation to the ISP server (step 94). The customer can then receive the goods from the vendor or can alternatively receive a denial message from the vendor and the reason for the denial (step 96). For example, the customer can be given access to a database or download a software product from the vendor's server.
  • Fig. 3 is a schematic flow chart illustrating the steps of a method for
  • the point of sale computer station waits until a customer requests goods which are payable through the STSP method (step 102).
  • the point of sale computer station checks if the customer selected payment through the STSP (step 104). If the customer did not select the STSP payment method, the customer can still activate other payment methods in the vendor's site according to the customer choice (step 105) and control is transferred to step 102. If the customer selected the STSP payment method, the point of sale computer station checks if the STS confirmed the transaction (step 106).
  • the point of sale computer station informs the customer through the customer computer station of the reasons for denying the goods (step 107) and transfers control to step 102. If the STS confirmed the transaction, the point of sale computer station checks whether the transaction details sent by the STS are correct (step 108). If the transaction details as sent by the STS are not correct, the point of sale computer station informs the STS that the goods were not supplied (step 109), informs the customer of the reason of denial of goods (step 107) and transfers control to step 102. If the transaction details sent by the STS are correct, the point of sale computer station checks whether the customer computer station is still on-line (step 113).
  • the point of sale computer station informs the STS that the goods were not supplied (step 115) and transfers control to step 102. If the customer computer station is still on-line, the point of sale computer station supplies the goods to the customer as disclosed hereinabove (step 117), informs the STS that the goods were supplied (step 119) and transfers control to step 102. It is noted that if the transaction involved the sale of a tangible product, the product will be sent by the vendor to the customer by mail or by any other suitable delivery method.
  • Fig. 4 is a schematic flow chart illustrating the steps of a method for Internet billing performed by a secure transaction server (STS) of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention.
  • the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 110), extracts the ISP server details from the database or table as disclosed in detail hereinabove, using the IP address of the customer computer station which is received as part of the communication session details (step 111).
  • the STS sends a transaction verification form to the customer computer station (step 112).
  • the STS waits for a reply from the ISP server of the ISP which provides service to the customer and then checks whether the ISP server confirmed the payment (step 116). If the ISP server has not confirmed the payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 118). The STS then transfers control to step 110. If the ISP server confirms payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station (step 120). The STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 121). It is noted that, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
  • step 110 If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control to step 110. If the point of sale computer station confirmed that the goods were supplied, the STS records the transaction details for transfer to the financial service provider (step 122) and transfers control to step 110.
  • Fig. 5 is a schematic flow chart illustrating the steps of a method for Internet billing performed by an ISP server of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention.
  • the ISP server receives the transaction details from the transaction verification form as filled by the customer (step 124) and connects to an available STS (step 126).
  • the ISP server extracts the customer identity according to the communication session details (step 127).
  • the customer identity may be an ID number or a user name which is used by the ISP for identifying the customer.
  • the ISP server checks whether the customer confirmed the payment on the customer's transaction verification form (step 128). If the customer did not confirm payment on the transaction verification form, the ISP server informs the STS that the customer refused payment (step 130) and transfers control to step 124. If the customer confirmed the payment on the transaction verification form, the ISP server checks whether the customer is certified to pay through the STSP (step 132). If the customer is not certified to pay through the STSP, the ISP server informs the STS that the customer is not certified (step 133) and transfers control to step 124. If the customer is certified, the ISP server informs the STS that the payment is authorized and transfers the transaction details to the STS for verification (step 134). The ISP server then records the transaction details for billing the customer (step 136) and transfers control to step 124.
  • the network service provider provides the transaction verification form to the customer.
  • the embodiment instead of using the secure transaction server to provide the form to the customer, the embodiment used the secure transaction server to send the necessary information to the network service provider to enable the network service provider to send the form.
  • the STS After the initial communication between the customer computer station and the available STS is established as described hereinabove, the STS obtains the address of the ISP server from the database or table as disclosed hereinabove, using the automatically revealed IP address of the customer computer station. The STS then sends to the ISP server, the IP address of the customer computer station and the transaction details. The STS also causes the customer computer station to connect to the ISP server using the address of the ISP obtained by the STS from the database or table disclosed hereinabove and sent to the customer computer station. For example, this can be done by using the HTTP 302 Status Response accompanied by a "Location:" header. The ISP server first checks whether the customer is certified to pay through the STSP.
  • the ISP informs the STS that the customer is not certified. If the customer is certified to pay through the STSP, the ISP sends a transaction verification form to the customer computer station. It is noted that the information included in the transaction verification form is as disclosed hereinabove for the first preferred embodiment of the present invention. The customer then confirms or denies the transaction details and the other steps are, in general, performed as disclosed in detail hereinabove.
  • This embodiment performs similar operations as described in Figs. 2-5, with a few modifications.
  • the customer receives the transaction from the ISP server, not the STS.
  • the STS sends the customer information to the ISP server instead of sending the transaction form to the customer.
  • the ISP server would receive the customer information from the STS.
  • the ISP server would send the transaction form to the customer.
  • the customer interacts only with the STS during the verification form procedure.
  • the customer does not send a transaction confirmation/denial to the ISP server. Instead, the customer sends the confirmation/denial to the STS.
  • the STS obtains the identity of the customer from ISP server.
  • the step of validating includes: Automatically receiving by the transaction server from the customer computer station of the transaction details and identification information for identifying the point of sale computer station and the network address of the customer computer station. Identifying the customer. Sending a transaction verification form from the transaction server to the customer computer station, the transaction verification form includes at least the transaction details.
  • the steps of identifying the customer may include: Sending the customer computer station network address from the transaction server to the network service provider server. Finding the customer identity by the network service provider server. Using the customer computer station network address. Sending the customer identity from the network service provider server to the transaction server.
  • the customer computer and the point of sale station perform similar operations as set forth in Figs. 2 and 3.
  • the operation of the ISP server and the STS are set forth in Figs. 6 and 7, respectively.
  • the ISP server receives the transaction details and customer's IP address from the STS (step 140).
  • the ISP server identifies the customer according to the IP address (step 142).
  • the customer identity may be, for example, an ID number or a user name which is used by the ISP for identifying the customer.
  • the ISP server informs the STS that the customer is not authorized (step 146) and transfers control to step 140. If no restrictions arise, the ISP server informs the STS that the payment is authorized, a customer identity (customer ID) is sent to the STS (step 148) and control is transferred back to step 140.
  • the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 150). The STS then extracts the ISP server details from the database or table (as disclosed in detail hereinabove) using the IP address of the customer computer station which is received as part of the communication session details (step 152).
  • the STS sends the customer computer station IP address to the ISP server (step 154).
  • the STS determines whether the ISP server of the ISP which provides service to the customer identified the customer and confirmed the payment. If the ISP server has not confirmed the payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 158). The STS then transfers control to step 150. If the ISP server confirms payment and sends the customer identification, the STS sends the transaction form to the customer (step 160). In addition, assuming the customer accepts the transaction, the STS connects to the point of sale computer station. Here, the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
  • the STS may then determine whether the point of sale computer station confirmed that the goods were supplied (step 162). If the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed. If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control back to step 150. If the point of sale computer station confirmed that the goods were supplied, the STS records the customer's identity information and transaction details for transfer to the financial service provider and ISP for later billing (step 164) and transfers control to step 150.
  • the network service provider identifies the customer using the telephone number of the customer. The telephony infrastructure of most modern countries now supports the option to identify the initiating side of a telephone call (by transferring his phone number to the called party).
  • the customer's telephone number may be supplied to an ISP, for example, over the telephone infrastructure when the customer calls the ISP.
  • the phone number from which an ISP's client has connected together with the client's name and IP address may be registered and saved on the ISP's servers.
  • the customer's telephone number may be used to identify the customer and/or to bill the customer's telephone account for the product the customer purchased from the vendor.
  • the ISP supplies the customer's phone number, according to his network address.
  • the customer's telephone number may be used to verify the identity of the caller.
  • the ISP or STS
  • the system may deny access to the retail method when the customer identity information of the incoming call does not match the corresponding authorized telephone number.
  • this technique may prevent fraudulent use of a customer's identity information from non-authorized telephones.
  • the customer's telephone number may be used to bill the customer.
  • the STS in cooperation with a telephone company, uses the phone number to bill the customer via his phone bill.
  • the STS uses the phone number and/or other client information to bill an account of the client (for example, as previously discussed).
  • the process of identifying the customer includes the steps of sending the customer computer station network address from the transaction server to the network service provider server, finding the customer phone number by the network service provider server, using the customer computer station network address, and sending the customer phone number from the network service provider server to the transaction server.
  • many of the transaction operations performed according to this embodiment are similar to the operations discussed above.
  • the customer computer and the point of sale station perform similar operations as set forth in Figs. 2 and 3.
  • the operation of the ISP server and the STS are set forth in Figs. 8 and 9, respectively.
  • the ISP server receives the transaction details and customer's
  • the ISP server identifies the customer and extracts the customer phone number according to the IP address (step 172).
  • the customer phone number is the phone number from which the customer initiated the call to the ISP, as recorded by the ISP servers.
  • step 174 the customer can not carry out the transaction (for example, for reasons of an exhausted credit line)
  • the ISP server informs the STS that the customer is not authorized (step 176) and transfers control back to step 174
  • the ISP server sends the customer's phone number to the STS, thus indicating authorization of the payment (step 178) and transfers contral to step 170.
  • the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 180), extracts the
  • ISP server details from the database or table as disclosed in detail hereinabove using the IP address of the customer computer station which is received as part of the communication session details (step 182).
  • the STS sends the customer computer station IP address to the ISP server (step 184) and then checks whether the ISP server of the ISP which provides service to the customer successfully extracted the customer phone number and confirmed the payment
  • the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 188). The STS then transfers control back to step 180.
  • the STS sends the transaction form to the customer (step 190).
  • the STS connects to the point of sale computer station.
  • the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
  • the STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 192). Again, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
  • step 194 the STS records the customer's phone number and transaction details for transfer to the financial service provider and telephone company for later billing (step 194) and transfers control to step 180.
  • the STS rather than the ISP server, determines the identity of the customer.
  • Much of the ISP equipment relevant to the embodiments described herein consists of access servers and authentication servers.
  • the access servers are responsible for answering incoming calls from users' computers, receiving a username and password and supplying network services.
  • the authentication servers are responsible for verifying the username and password (as given by the access server) and instructing the access server whether to supply the required network service to the user. Both servers usually register all accesses and operations.
  • the secure transaction service connects directly to the network service provider access server or authentication server or any other relevant server capable of associating the customer computer station network address with the customer identity or phone number or any other information relevant for billing the customer.
  • the STS may then retrieve some or all of the stored information that identifies the customer. For example, the STS may extract the customer's username, phone number, IP address or any other relevant data from the ISP's servers. This may be accomplished, for example, using an SNMP command.
  • a significant advantage of this embodiment is that it may be implemented without installing the software module at the ISP.
  • the customer computer and the point of sale server perform similar operations as set forth in Figs. 2 and 3. No special operations are required of the ISP.
  • the operation of the STS is set forth in Fig. 10.
  • the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 200), extracts the ISP server details from the database or table as disclosed in detail hereinabove, using the IP address of the customer computer station which is received as part of the communication session details (step 202). Then, at step 204, the STS connects directly to the ISP server (such as an access server or an authentication server) containing information associating IP addresses with identification information (such as usemames or telephone numbers).
  • the ISP server such as an access server or an authentication server
  • the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 208). The STS then transfers control back to step 200.
  • the STS sends the transaction form to the customer (step 210).
  • the STS connects to the point of sale computer station.
  • the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
  • the STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 212). Again, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
  • the STS transfers control to step 200. If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control to step 200. If the point of sale computer station confirmed that the goods were supplied, the STS records the customer's identification information and transaction details for transfer to the financial service provider and/or telephone company and/or ISP for later billing (step 214) and transfers control to step 200.
  • the system or method of the invention may be practiced in conjunction with customer's who use proxy servers.
  • the proxy server's Internet address rather than the customer's Internet address, may be provided to the STS or the ISP server. Several methods may be used to obtain a customer's actual network address in the event the customer is using a proxy server.
  • the address may be obtained from an HTTP "Forwarded-For" header that may be sent.
  • the header will reveal the customer's address.
  • this method may be easily comprised (i.e., false addresses inserted into the header). As a result, the use of this method may be restricted to verification operations in some applications.
  • the address may also be obtained by integrating directly with the HTTP proxy. If a special module is installed at the HTTP proxy by the STSP, this module can report the true IP of a customer generating a specific request.
  • the address may also be obtained by placing a module on the ISP's network, which is able to monitor all communications between customers and the proxy (hereinafter 'monitor').
  • the STS will then invoke an event with the customer that can be detected by the monitor.
  • An example of such an event is sending a special string of characters to the customer (via the proxy).
  • the monitor will detect this string, and inform the STS to which IP this string was sent.
  • an application that will attempt to contact the secure transaction service or the network service provider may be downloaded to the customer's computer station. This would cause the customer's true Internet address to be disclosed. This could be done, for example, by instructing the browser to download a Java applet that instructs the customer's computer to connect directly to the STS thereby revealing the computer's true address.
  • a large random number is sent from the STS to the customer computer station, and is then sent back from the customer computer station to the STS over the newly established connection. This can be done for example, by inserting the said number in the URL of the said HTML tag, or by instructing the said application to echo the said large number when received. This procedure verifies that the reported IP is known by the Internet infrastructure and further reduces the possibility of fraud.
  • communication between the point of sale computer station and the STS and between the ISP server and the STS can be secured communication.
  • the communication can be secured using a method of encryption such as the data encryption standard (DES) or any other suitable encryption method.
  • a method of authentication can also be used for increased security such as a public key or shared key digital signature method or any other suitable authentication method. This ensures that the transaction verification procedures serve as an encrypted secured verification step and reduces the possibility of fraud.
  • any communication between two parties could in fact be done through a third party. For example, the final confirmation sent from the STS to the vendor could be transferred through the customer. In this case, some method of digital signature could be added to the message in order to protect it from accidental or malicious modification.
  • the retail method of the present invention has the advantage that a vendor needs only establish one agreement with an STSP in order to be able to provide a secure payment method to all the customers of all the ISPs which are connected with the STSP.
  • Another advantage of the STSP method is that an ISP needs to establish only one agreement with the STSP in order to provide a secure payment method between any one of its customers and any of the vendors that have agreements with the STSP, thus, the ISP does not need to establish separate agreements with many vendors.
  • Another advantage of the retail method of the present invention is that the customer can perform secured transactions with all the vendors which have agreements with the STSP, without having to install any software on his computer station. Moreover, using the retail method of the present invention, the customer can perform transactions without having to transmit any sensitive information such as a credit card or account number or other personal details over the Internet.
  • no billing is performed by the STS, the ISP or the financial service provider.
  • the ISP sends to the STS the e-mail address of the customer and the STS periodically sends e-mail messages to the customer reminding the customer of his debt to the vendor from which the goods were received until the vendor informs the STS that the debt has been paid.
  • the STS instructs the ISP to periodically send e-mail messages to the customer reminding the customer of his debt to the vendor from which the goods were received.
  • the vendor informs the STS that the debt has been paid, the STS instructs the ISP to stop sending the e-mail messages to the customer.
  • the vendor may decide to supply the goods to the customer prior to validating the purchasing as disclosed hereinabove.
  • the vendor may provide the customer with access to a database and if the customer finds the information useful, the customer agrees to pay for the information, for example by activating a designated HTML link.
  • the link connects the customer computer station to the STS, transfers the ID of the point of sale computer station and the transaction details to the STS as disclosed in step 1 10 of Fig. 4 and continues with the other steps of Fig. 4 as disclosed hereinabove.
  • the customer downloads software from the point of sale computer station for checking the software prior to performing step 80 of Fig. 2. If the customer decides to pay for the software, the customer connects to the point of sale computer station and performs steps 80 to 94 (Fig. 2) as disclosed hereinabove. It is noted that, in the last example, step 96 is not performed since the software was already downloaded to the customer computer station.
  • the point of sale computer station displays the option of payment through an STSP only to those customer computer stations whose ISPs are capable of participating in the STSP payment system.
  • the point of sale computer station holds a list describing the IP ranges of participating ISPs, as assigned to them by ARIN or any other proper authority. This list is updated from time to time when new IP ranges are assigned, or new ISPs are capable of participating in the STSP payment system.
  • the point of sale computer station determines whether the customer's ISP is capable of participating in the STSP payment system, and invokes the STSP payment option only when it is possible.
  • the proxy address may be used, as most customers use the proxy servers of their ISPs, which of course have an IP in the ISP's range.
  • the customer's true IP address can be obtained using any of the methods described herein.
  • the vendor pays the customer for various actions performed at the point of sale computer station, such as viewing advertisements or providing a service.
  • the vendor's account is billed and the customer's account at the ISP is credited.
  • the method of operation is similar to the standard method, with the difference that negative amounts of money are charged to the customer.
  • the IP extraction is performed in the following manner when complementary software ("plug-in") which uses network connections for its operation is installed in the customer's browser.
  • An example of such a plug-in is RealPlayer from RealNetworks of Seattle, Washington, USA, which is used to play sound and video from a remote server.
  • the IP extraction invokes the plug-in to connect in the background to the server, and since some of these plug-ins connect to servers directly, the true IP address of the customer computer station is revealed.
  • an alternative method of identification is used.
  • the STS queries the service's database for the identity associated with the extracted IP address, rather than querying the ISP's database.
  • the service can be used as a billing proxy, in the same way as the ISP or telephone company were used in previous examples.
  • the step 117 of the retail method shown in Fig. 3, in which the point of sale computer station supplies goods to the customer computer station may involve several customer requests one after another with session management.
  • session management is performed between the HTTP server at the point of sale computer station and the customer.
  • the " server maintains a database whose records crosslink a customer ID received from the secure transaction server with a list of allowed goods and a set of identifiers sent from the customer computer station.
  • the point of sale computer station supplies goods appearing in the list of allowed goods to the customer without the necessity of the point of sale computer station communicating with the STS to re-identify the customer.
  • the collection of identifiers is available to the HTTP server from the browser running on the customer computer station.
  • Fig. 12 is a schematic illustration of a collection of identifiers, according to a preferred embodiment of the present invention.
  • the collection of identifiers are sent by the browser on the customer computer station to the HTTP server on the point of sale computer station with each HTTP request.
  • the collection of identifiers includes communication identifiers 300 and machine identifiers 302.
  • the communication identifiers 300 include the proxy IP address 304 and the customer computer station's IP address 306, and the TCP connection information.
  • the machine identifiers 302 include the cookie 308, a session identifier 310 encoded in an URL, the browser type 312, MIME types as reported by the browser 314, the operating system 316, and the language 318 of the operating system, as reported in the User-Agent and other HTTP headers.
  • identifiers constitute together a 'customer fingerprint' 320 which can be used by the HTTP server to identify the session.
  • An HTTP server receives an HTTP request (step 400), collects the identifiers from the HTTP session, and seeks the best match from the existing database (step 402).
  • the server calculates the statistical significance of the match between the new session and each of known sessions, according to the following formula
  • p(session l ) is the probability that given the collection T of identifiers of the new session, the new session belongs to a known session i .
  • p(session l ) is the a priori probability that the new session belongs to a known session / . For example, if 30% of the sessions are new sessions, and known sessions are equally likely, then p(sess ⁇ on t ) is 0.7/ n , where n is the total number of sessions, and p(session 0 ) is 0.3.
  • p(T ⁇ session : ) is the probability of receiving the collection T of identifiers for the known session ⁇ , and is calculated from the statistical significance of the identifiers, with correlations taken into account.
  • the probability of error can be calculated. For example, if the server decides that the new session belongs to known session / , the probability that this is the correct decision is p(session t ⁇ T) , the probability that the session is in fact a different known session is p(session t ⁇ T) , and the
  • the server makes a decision based on a predetermined scheme (step 404). For example, the scheme may decide that a new session is known if the probability that this is the correct decision is greater than 99%. This is a very important feature of the present invention, as it allows the application designer to limit its error rate in a quantifiable way.
  • T) is calculated by combining the likelihood of each of the identifiers in the collection T
  • Preliminary research can be done to estimate the likelihood of each value (for example, a distribution table of each browser type and version in the population), or the server can calculate this over time by recording each HTTP request into an historical statistical database, or both.
  • These values are expressed as numbers describing the probability that a certain customer will have a certain value for a certain identifier, or the probability that an unknown customer will have this value. For example, the probability that a different customer will have the same IP address previously used by another customer could be estimated as 0.000001 (for example, if this IP address is dynamically assigned by an ISP).
  • the identifiers are correlated. For example, since Internet Explorer does not run on Unix, the probability that a customer uses a Netscape browser is higher if the customer is using the Unix operating system than if the customer is using a Wndows-based operating system.
  • the customer computer station's IP address and the proxy IP address are correlated, since proxy servers usually serve a specific sub-network. Since sub-networks are characterized by a range of IP addresses, these IP addresses are very likely to be associated with the sub-network's proxy. Thus, the proxy IP address loses all significance once the customer computer station's IP address is obtained.
  • the expression p(session 1 ⁇ T) is therefore calculated as the product of multiplying the probability of each identifier. If two or more identifiers have been found, by prior research, to be somewhat correlated, meaning they tend to appear together, their combined probability is reduced in order to compensate for the correlation. For example, if two unrelated identifiers each have each a probability of 0.5 to appear, the combined probability is 0.25. If the two identifiers are correlated, the combined probability can be anywhere between 0.25 and 0.5, depending upon the strength of the correlation.
  • step 406 If the server decides that the new session is a known session / , then user i 's information is retrieved from the database (step 406). If the server decides that the new session is unknown, then the new user's information is obtained (step 408). In step 410, a new entry is created in the database associating the session identifiers with the customer information obtained in step 408.
  • the user information is used as needed (step 412) and the HTTP response is sent (step 414).
  • An example of the user information is that the customer has already paid for a particular product, or the privileges.
  • two cases should be considered: that of normal users, and that of malevolent users (hackers).
  • a certain IP address is assigned to one host on the Internet at a certain time, making it a very significant identifier.
  • a hacker might knowingly spoof this IP address, thus deceiving the system.
  • the likelihood of receiving the same IP address from 2 different customers is higher when one of them is a hacker.
  • p(session ⁇ ⁇ T) has two different values - one for normal users and one for hackers.
  • a vendor whose server which is more likely to be attacked by hackers might choose to give higher priority to the hacker p(session i ⁇ T) than to the normal p(session t ⁇ T) . This will cause the server to require other user identification methods more often.
  • the payment process is not invoked before receiving the product, but is rather integrated into the process of installing or using the software module.
  • a customer installs new software on his computer station, and before completing the installation, the payment process as described above is invoked and the customer is required to pay for the software in order for the installation to be complete.
  • the payment process described above is invoked after a trial period. For example, after 30 days of use, the customer is required to pay before continuing to use the software.
  • the software charges the customer in a pay-per-use model, where the payment process described above is invoked when any number of conditions apply.
  • Such conditions may include, but are not limited to, invoking the payment process when a preset usage time has passed, or when the customer has used the software a preset number of times.
  • the customer buys a tangible product which has to be physically delivered to the customer's address.
  • the system can automatically obtain the customer's home address from a database associating a known customer identifier with an address.
  • a database associating a known customer identifier with an address.
  • white pages directories where the customer phone number (obtained from the customer's caller id, as mentioned hereinabove) is queried to find the customer's full name and address.
  • Another example is an existing billing database at the ISP associating the customer login or username with the customer's full name and address (normally maintained for sending invoices etc.).
  • Another example is an existing billing database at the telephone company, associating the telephone number with the required information.
  • a special non-revealing id can be issued to the transaction, which the merchant can send to, using a courier service (such as United Parcel Service (UPS), Federal Express (FedEx) or DHL).
  • the STSP will provide the association between the transaction ID and the customer's address to the courier service. For example, if the company name of the STSP is "Secure Transactions Ltd.”, the merchant will send a package via UPS bearing the address "Secure Transactions Ltd. 1952382". After identifying the address as a "Secure Transactions Ltd. anonymous address", UPS will ask the STSP for the customer's address matching the transaction ID "1952382", and will replace the address.
  • UPS United Parcel Service
  • FedEx Federal Express
  • the package bearing the transaction ID will be sent to the STSP, the STSP will find the customer's address and send the package to the customer's address.
  • the courier's cooperation is not required.
  • the merchant will send a package via UPS bearing the address "Secure Transactions Ltd. 1952382, Secure Transactions Ltd., 1 Main Street, AnyCity, AnyState".
  • the STSP will receive the package, find the customer's address, and re-send it to the customer (by any method).
  • the customer may be requested to enter a password at the stage of authorizing the transaction, as another measure of security.
  • This password could be defined by the customer once, or could be a piece of information already known to the ISP or STSP (e.g. all or part of the credit card number).
  • connection between the customer computer station and the ISP is not necessarily over telephone lines, but could be over cable TV lines or cellular telephones or any other suitable communication infrastructure.

Abstract

The retail method over a wide area network includes a point of sale computer station (41, 42, ... 43), a server operated by a network service provider (312, 32, ... 33), a customer computer station (51, 52, ... 72) used by a customer and connected to the wide area network through the network service provider server (31, 32, ... 33), and a transaction server (20) having access to identification information of the network service provider (31, 32, ... 33) and the point of sale computer station (41, 42, ... 43). The method includes the steps of connecting the customer computer station (51, 52, ... 72) to the point of sale computer station (41, 42, ... 43), purchasing goods from the point of sale computer station by the customer, validation of the purchasing by the transaction server (20) and the network service provider server (31, 32, ... 33), and charging the customer for the purchase. The step of charging includes a transaction including the steps of billing an account of the customer by the network service provider server (31, 32, ... 33) a transaction sum and billing by the transaction server (20) an account of the network service provider (31, 32, ... 33) server the transaction sum. The retail method also includes supplying the goods to the customer and remitting a portion of the transaction sum to a vendor operating the point of sale computer station (41, 42, ... 43).

Description

A RETAIL METHOD OVER A WIDE AREA NETWORK
FIELD OF THE INVENTION
The present invention relates generally to a retail method for performing commercial transactions over a wide area network and more particularly to a retail method for performing commercial transactions over the Internet.
BACKGROUND OF THE INVENTION
The Internet is a worldwide network of interconnected computers and computer networks. The Internet includes Internet service providers (ISPs) who provide Internet access to a large number of subscribers or users who may pay the ISP a fee for the access. The subscribers can be individuals or organizations and can access the Internet by connecting to the ISP using modems over the general switched telephony system (GSTN), or cable television networks, or other types of communication line infrastructure. The Internet also includes vendors who advertise products and services over the Internet and solicit orders from users.
Commercial transactions over the Internet can be performed in a variety of ways. A preferred way of payment is by credit card. However, because of security reasons there is great reluctance of the users to transmit credit card account information over the Internet. Additionally, in situations where the transaction amount is small, for example, a few dollars or less, it may not be practical for a vendor to use a credit card transaction.
PCT international publication No. WO 97/03410 to Egendorf discloses a method for Internet billing. According to Egendorf, an ISP can bill a billing account of a customer for products or services purchased from a vendor over the Internet, thereby avoiding the need to communicate the customer's credit card or account number over the Internet. However, the method is limited in that each ISP has to establish agreements with a multiplicity of vendors some of which may not be subscribers of the ISP. Furthermore, each vendor has to establish separate agreements with a multiplicity of ISPs to be able to use the method of WO 97/03410 for performing transactions with customers of different ISPs.
SUMMARY OF THE INVENTION The present invention relates to a system and method which provides vendors and customers a secure and economical way of selling and purchasing goods over a wide area network. A commercial account is established for customers at their network service provider. When a customer orders a product from a vendor via the wide area network, payment for the product is debited from the customer's network service provider account. A secure transaction service cooperates with the customer, the vendor and the network service provider to authorize the transaction.
Significantly, the invention enables a customer to purchase a product via the network without transmitting sensitive information such as a credit card number over the network. Moreover, the user does not need to install additional software on his computer for using the billing method of the present invention.
One embodiment of the present invention provides a retail method that is adapted for use over the Internet. However, other preferred embodiments can be implemented in which the retail method is adapted for use over any wide area network using any suitable communication protocol which is within the scope and spirit of the present invention.
There is therefore provided, in accordance with a preferred embodiment of the present invention, a retail method over a wide area network. The network includes a point of sale computer station (e.g., a vendor's network server), a network service provider server operated by a network service provider, a customer computer station used by a customer and connected to the wide area network through the network service provider, and a transaction server having access to identification information of the network service provider and the point of sale computer station. The basic process flow of the retail method includes: Connecting the customer computer station to the point of sale computer station. Purchasing goods from the point of sale computer station by the customer. Validating the purchasing by the transaction server and the network service provider server. Charging the customer for the purchasing, the charging including a transaction including the steps of billing an account of the customer by the network service provider server a transaction sum and billing by the transaction server an account of the network service provider server the transaction sum. Supplying the goods to the customer. Remitting a portion of the transaction sum to a vendor operating the point of sale computer station.
In one preferred embodiment of the invention, the validating process includes: Automatically receiving by the transaction server from the customer computer station of the transaction details and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending a transaction verification form from the transaction server to the customer computer station, the transaction verification form includes at least the transaction details and information for contacting the network service provider server. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by the customer computer station of the transaction details and the confirmation or the denial of the transaction details from the customer computer station to the network service provider server using the information for contacting the network service provider server included in the transaction verification form. Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
In another preferred embodiment of the present invention, the network service provider provides the transaction verification form to the customer. Here, instead of the secure transaction server providing the form to the customer, the secure transaction server sends the necessary information to the network service provider to enable the network service provider to send the form. In this embodiment, the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending the transaction details and the network address of the customer computer station from the transaction server to the network service provider server. The transaction server causing the customer computer station to contact the network service provider. Sending a transaction verification form from the network service provider server to the customer computer station, the transaction verification form including at least the transaction details. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by the customer computer station of the confirmation or the denial of the transaction details from the customer computer station to the network service provider server. Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer. There is also provided in accordance with a preferred embodiment of the present invention a system for using a retail method over a wide network. The system includes at least one network service provider server operated by a network service provider and connected to the wide area network. The system also includes at least one customer computer station used by a customer and connected to the wide area network through one of the network service provider servers. The system also includes at least one point of sale computer station connected to the wide area network and at least one transaction server having access to identification information of the at least one network service provider and the at least one point of sale computer station and connected to the wide area network.
The retail method steps performed by the system are similar to those of the methods discussed above. Namely, connecting one of the customer computer stations to one of the points of sale computer station. Purchasing goods from the point of sale computer station by the customer operating the customer computer station. Validating the purchasing by one of the transaction servers and one of the network service provider servers. Charging the customer for the purchasing, the charging including a transaction including the steps of billing an account of the customer by the network service provider server a transaction sum and billing by the transaction server an account of the network service provider server the transaction sum. Supplying the goods to the customer. Remitting a portion of the transaction sum to a vendor operating the point of sale computer station.
The validating steps performed by the system are similar to the method steps described above as well. In one embodiment, the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending a transaction verification form from the transaction server to the customer computer station, the transaction verification form including at least the transaction details and information for contacting the network service provider server. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by the customer computer station of the transaction details and the confirmation or the denial of the transaction details from the customer computer station to the network service provider server using the information for contacting the network service provider server included in the transaction verification form. Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
The system may also provide a retail method whereby the network service provider supplies the transaction verification form to the customer in a similar manner as performed by the method discussed above. In accordance with this embodiment of the system of the invention, the step of validating includes: Automatically receiving by the transaction server from the customer computer station of transaction details of the transaction and identification information for identifying the point of sale computer station and the network address of the customer computer station. Sending the transaction details and the network address of the customer computer station from the transaction server to the network service provider server. The transaction server causing the customer computer station to contact the network service provider. Sending a transaction verification form from the network service provider server to the customer computer station, the transaction verification form including at least the transaction details. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by customer computer station of the transaction details and the confirmation or the denial of the transaction details from the customer computer station to the network service provider server. Informing the transaction server by the network service provider server of the confirmation or the denial of the transaction details by the customer in the transaction verification form. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
In another embodiment of the invention, the customer responds to the secure transaction server instead of the network service" provider during the verification operation. For example, the customer does not contact the network service provider to send a transaction confirmation/denial. Instead, the customer sends the confirmation/denial to the secure transaction server. To ensure that the customer is authorized to make the transaction, the secure transaction server contacts the network service provider server to obtain the customer identity.
In another embodiment of the invention, the network service provider identifies the customer using the telephone number of the customer. The customer's telephone number is supplied to the network service provider, for example, over the telephony infrastructure when the customer calls the network service provider. In one embodiment, the customer's telephone number is used to bill the customer's telephone account for the product the customer purchased from the vendor.
In another embodiment of the invention, the step of identifying the customer is done by the STS rather than the NSP. In this case, the STS remotely accesses the NSP's servers to match the network address with a user account. The STS may also carry out the step of determining whether the customer is authorized to make a purchase. As a result, the method of the invention may be practiced without installing the ISP-related software applications treated herein on the network service provider server.
In accordance with other embodiments of the invention, several methods may be used to obtain a customer's network address in the event the customer is using a proxy server. For example, the address may be obtained from the HTTP "Forwarded For" header. The address may be obtained by having the customer's browser connect in the background to an unproxied service. The address may be obtained by having the customer's browser connect in the background to an unproxied host. Alternatively, an application that will attempt to contact the secure transaction service or the network service provider may be downloaded to the customer's computer station. Several other process steps may be performed in accordance with one or more embodiments of the invention. For example, the retail method may include the step of remitting a portion of the transaction sum to a network service provider operating the network service provider server. The retail method also may include the step of remitting a portion of the transaction sum to the transaction service provider operating the transaction server.
Further, in accordance with another preferred embodiment of the present invention, the identification information of the network service provider and the point of sale computer station includes information for associating a customer network address with a network service provider and technical information needed to contact the network service provider server, and information for associating a vendor identifier with the technical information needed to contact the point of sale computer station over the wide area network. Furthermore, in accordance with another preferred embodiment of the present invention, the information for associating a customer and the information for associating the vendor are stored on the transaction server or accessible to the transaction server. Furthermore, in accordance with another preferred embodiment of the present invention, the wide area network is the Internet, the network service provider is an Internet service provider, the information for associating a customer includes at least the Internet protocol (IP) address space of the Internet service provider server and the technical information needed to contact the Internet service provider, and the information for associating the vendor is technical information needed to contact the point of sale computer station over the Internet.
Furthermore, in accordance with another preferred embodiment of the present invention, the step of charging further includes the step of recording by the network service provider server of the transaction details for billing the customer by the network service provider.
Furthermore, in accordance with another preferred embodiment of the present invention, the step of remitting includes the step of crediting an account of the vendor by the portion of the transaction sum.
Furthermore, in accordance with another preferred embodiment of the present invention, the step of crediting is performed by a financial service provider.
Furthermore, in accordance with another preferred embodiment of the present invention, the financial service provider is selected from the group consisting of a bank and a credit card company. Further yet, in accordance with another preferred embodiment of the present invention, the account of the vendor is a bank account or a credit card account.
Further still, in accordance with yet another preferred embodiment of the present invention, the communication between the point of sale computer station and the transaction server and between the transaction server and the network service provider server is encrypted. Furthermore, in accordance with another preferred embodiment of the present invention, the transaction service provider operating the transaction server establishes a remitting agreement with the vendor for remitting a portion of the transaction sum to the vendor after the step of charging. The remitting agreement is established prior to using the retail method and the transaction service provider establishes a billing agreement with the network service provider for billing an account of network service provider the transaction sum for goods purchased by the customer from the point of sale computer station. The billing agreement is established prior to using the retail method. Furthermore, in accordance with another preferred embodiment of the present invention, the network service provider establishes a billing agreement with the customer for billing an account of the customer the transaction sum for goods purchased by the customer from one or more point of sale computer stations. In one embodiment, the billing agreement may be established prior to using the retail method. In another embodiment, a customer may be presented the terms of the agreement the first time he uses the retail method. This may be accomplished, for example, by displaying a corresponding window or web page to the customer. In this case, the customer could accept the terms of the agreement by, for example, clicking a button on the window or web page. Furthermore, in accordance with another preferred embodiment of the present invention, a per transaction billing agreement is established between the customer and the network service provider for billing an account of the customer the transaction sum for goods purchased by the customer from the point of sale computer station. There is also provided in accordance with a preferred embodiment of the present invention a method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected services and configured not to use a proxy server for other services. The method includes the steps of instructing the browser to open a connection to one of the other services, and obtaining the IP address from the connection.
There is also provided in accordance with a preferred embodiment of the present invention a method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected hosts and configured not to use a proxy server for other hosts. The method includes the steps of instructing the browser to open a connection to one of the other hosts, and obtaining the IP address from the connection. There is also provided in accordance with a preferred embodiment of the present invention a method for obtaining an IP address of a computer including the step of activating an application on the computer. The application opens a connection to a server and the connection contains the IP address.
Moreover, in accordance with a preferred embodiment of the present invention, the method further includes the step of downloading the application from the server.
There is also provided in accordance with a preferred embodiment of the present invention a method for filtering access to a service provided by a service provider to subscribers of at least one ISP. The method includes the steps of the service provider maintaining a list of IP addresses assigned to the at least one ISP, and when a user attempts to access the service through a computer having an IP address, the service provider enabling access to the service if the IP address appears in the list.
According to a preferred embodiment of the present invention, the method of performing a commercial transaction described above further includes the step of associating the customer identity information with a first plurality of identifiers contained in the transaction with the vendor application, and with privileges related to the transaction authorization and to the product. The method also includes the step of finding the best match of a second plurality of identifiers contained in the second transaction with a previously associated plurality of identifiers, when a second transaction is initiated with the vendor application. If the statistical significance of the best match is better than a predetermined significance, the customer identification information associated with the previously associated plurality of identifiers is retrieved. If the privileges associated with the customer identification information allow access to the goods requested in the second step of purchasing, the goods requested in the second step of purchasing are provided. According to a preferred embodiment of the present invention, the retail method over a wide area network described above further includes the step of associating the identity information with a first plurality of identifiers sent to the point of sale computer station during the step of purchasing, and with privileges related to the step of validating and to the goods. The method also includes the step of finding the best match of a second plurality of identifiers sent to the point of sale computer station during the second step of purchasing with a previously associated plurality of identifiers when a second step of purchasing goods from the point of sale computer station is initiated by the customer. If the statistical significance of the best match is better than a predetermined significance, the customer identification information associated with the previously associated plurality of identifiers is retrieved. If the privileges associated with the customer identification information allow access to the goods requested in the second step of purchasing, the goods requested in the second step of purchasing are provided.
There is also provided in accordance with a preferred embodiment of the present invention a method of payment for a software product including the steps of invoking a payment process during installation of the software product on a customer computer station that is connectable to a network, and completing the installation only if the user has successfully completed the payment process. The payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
There is also provided in accordance with a preferred embodiment of the present invention a method of payment for a software product installed on a customer computer station that is connectable to a network. The method includes the steps of invoking a payment process at least a predetermined period of time after installation by a user of the software product on the customer computer station, and enabling subsequent use of the software product only if the user has successfully completed the payment process. The payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
There is also provided in accordance with a preferred embodiment of the present invention a method of payment for a software product installed on a customer computer station that is connectable to a network. The method includes the steps of invoking a payment process when at least one condition is satisfied, and enabling subsequent use of the software product only if the user has successfully completed the payment process. The payment process includes the steps of establishing a connection from the customer computer station to a transaction service via a network service provider, receiving, by the network service provider, customer identity information from the customer computer station, and sending, by the transaction service, authorization to the customer computer station.
Moreover, in accordance with a preferred embodiment of the present invention, the condition is satisfied when a preset usage time of the software product has passed, or when the software product has been used a preset number of times.
Furthermore, in accordance with a preferred embodiment of the present invention, the method of performing a commercial transaction described above is for a product which is a tangible good delivered to an address of said customer.
Additionally, in accordance with a preferred embodiment of the present invention, the method further includes the step of obtaining the address from a database associating a known customer identifier with the address. Moreover, in accordance with a preferred embodiment of the present invention, the method of performing a commercial transaction described above further includes the step of receiving, by the transaction service, a password from the customer.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features of the invention will become apparent from the following description and claims, when taken with the accompanying drawings, wherein similar reference characters refer to similar elements throughout and in which:
Fig. 1 is a schematic block diagram of a system for carrying out the retail method over the Internet, in accordance with a preferred embodiment of the present invention;
Fig. 2 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a customer using the customer computer station of the system of Fig. 1;
Fig. 3 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a point of sale computer station of the system of Fig. 1 ; Fig. 4 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
Fig. 5 is a schematic flow chart illustrating one embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ;
Fig. 6 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ; Fig. 7 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
Fig. 8 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by an Internet service provider (ISP) server of the system of Fig. 1 ;
Fig. 9 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ; Fig. 10 is a schematic flow chart illustrating another embodiment of the steps of the retail method performed by a secure transaction server (STS) of the system of Fig. 1 ;
Fig. 11 is a block diagram illustrating several data memory components in accordance with one embodiment of the invention; Fig. 12 is a schematic illustration of a collection of identifiers, according to a preferred embodiment of the present invention; and
Fig. 13 is a block diagram illustration of HTTP session management using multiple identifiers and statistical significance, in accordance with a preferred embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
Reference is now made to Fig. 1 which is a schematic block diagram of a system for carrying out the retail method, in accordance with a preferred embodiment of the present invention. The system includes a secure transaction service provider 20 (STSP) which includes a plurality of M secure transaction servers (STS) labeled 21-23 connected to the Internet 10. The system also includes a plurality of N Internet service provider (ISP) servers labeled 31 - 33 connected to the Internet 10, and a plurality of K point of sale computer stations labeled 41 - 43, connected to the Internet 10. Each of the plurality of N ISP servers provides Internet access to a plurality of customer computer stations. For example, ISP server 31 provides Internet access to a plurality of R customer computer stations labeled 51 - 52, ISP server 32 provides Internet access to a plurality of S customer computer stations labeled 61 - 62 and ISP server 33 provides Internet access to a plurality of Q customer computer stations labeled 71 - 72. Wherein each of the numbers K, M, N, Q, R and S may be any non-zero positive integer.
Typically, a customer connects to the Internet via an ISP. When connecting, the customer is identified using some standard method such as a username and password, and is assigned an IP address. The ISP server of the present invention then associates the assigned IP address with the customer identity, or with any other data suitable for identifying and/or billing the customer. In a non-limiting example, the telephone number of the customer can be associated with the customer's IP address, as described hereinabove. However, other suitable identifying and/or billing data types may be used.
The customer then initiates a transaction by accessing a point of sale computer station using one of the customer computer station, and interacts with the application running on the point of sale station to select a product to be purchased. In accordance with one embodiment of the invention, the customer is billed for the transaction by debiting an account that has been established between the customer and the customer's ISP. The STS coordinates the transaction authorization procedure that determines whether the customer has an account that can be debited. For example, the point of sale station asks the STS whether the customer is authorized to make a purchase using the system. The STS determines (in cooperation with the ISP) whether the customer is authorized and sends the appropriate response back to the point of sale station. The secure transaction service provider 20 is a service provider operating one or more STSs connected to the Internet. The STSP 20 provides software modules which are installed on point of sale computer stations, on the ISP servers and on each of the STSs. It is noted that, if the ISP has more than one server, the software modules may be installed on each of the ISP servers or only on part of them. Each of the ISPs notifies the STSP 20 of the IP address space which the ISP allocates to its customers for connecting to the Internet, as allocated to the ISP by the proper authorities such as the American Registry for Internet Numbers ("ARIN"). Each of the ISPs may also provide the STSP with other technical information which may be needed such as the IP addresses of the ISP's proxy servers and the bandwidth of the ISP's connection to the Internet.
The software module installed on the ISP servers can identify a customer (236, FIGURE 11) currently using a given IP address (238, FIGURE 11). This software module also manages the billing of the customers in accordance with the purchase of goods from various vendors, manages the communication with the STS and the customer computer stations and checks whether the customer is certified to pay through the STSP as disclosed in detail hereinafter. It is noted that some of the functionality of the ISP software module might already exist on the ISP servers, and can be used instead.
The software module installed on the point of sale computer stations manages the registration of the sales and transactions done through the STSP involving the vendor. This software module also manages the pricing of goods offered by the vendor through the STSP. It is noted that some of the functionality of the point of sale software module might already exist on the point of sale servers, and can be used instead.
The software module on the point of sale computer stations also manages the communication with the STS, as disclosed in detail hereinafter. The software module installed on the STS uses a database or a table
(stored in a data memory 220, FIGURE 11) including identification information associating the IP address spaces (222, FIGURE 11) obtained from the ISPs as disclosed hereinabove with the information (224) needed to communicate with the ISPs owning these address spaces. The software module installed on the STS can thus identify the ISP of a customer having an IP address by accessing the database or table disclosed hereinabove. The software module installed on the STSs also manages the financial information (226) needed for implementing the billing such as the bank account numbers of the ISPs and vendors, and the details of purchases (228). The software module installed on the STS also manages all the communication with the point of sale computer stations, customer computer stations and ISP servers, as disclosed in detail hereinafter. Each of the point of sale computer stations 41 - 43 is assigned an ID number and the STSs have access to a look up table (LUT) 230 which associates each point of sale computer station's ID number with the technical information needed to contact the point of sale computer station. The STSP, the customers, the vendors and the ISPs receive financial services from one or more financial service providers 240 (FIGURE 11) such as a credit card company or a bank or any other suitable financial service company. The STSP, the customers, the vendors and the ISPs have bank accounts or credit card accounts with the financial service providers and can provide a bank account number or a credit card number for performing financial transactions. In one embodiment, transactions between the financial service company are accomplished using the Automatic Clearing House Format.
It should be understood that many variations of the embodiment of FIGURE 1 are possible in accordance with the teachings of the invention. For example, preferably each of the M STSs 21 - 23 is directly connected to the Internet backbone (not shown) for fast access. However, some or all of the STSs can be connected to the Internet 10 by any other suitable connection method.
Each of the K point of sale computer stations labeled 41 - 43 can be a server operated by a vendor and connected to the Internet directly, a point of sale application (e.g., a vendor application) residing on a server and operated for a vendor by an Internet presence provider (IPP) or any point of sale computer station connected to the Internet by any other suitable connection method.
It is noted that, the STSP 20 may also operate as" an IPP. Thus, any one of the K points of sale may not be independent computer stations but may physically reside on one of the STSs 21 - 23. In such a case, the software for the vendor's site will be installed on one or more of the STSs 21 - 23.
It is further noted that, the ISP 20 may also operate as an IPP. Thus, any one of the K points of sale may not be independent computer stations but may physically reside on one of the ISP servers 31 - 33. In such a case, the software for the vendor's site will be installed on one or more of the ISP servers 31 - 33. It is further noted that, each ISP may operate more than one server (not shown).
Each of the customer computer stations 51 - 52, 61 - 62 and 71 - 72 can be connected to the ISP servers 31 , 32 and 33, respectively, through a modem and the GSTN or a cable modem and a cable television network, or by any other suitable communication method.
It is noted that, although the system of Fig. 1 is shown as including a plurality of STSs 21 -23, the system can also operate with a single STS.
It is noted that the STSs 21- 23 of the STSP 20 can be located in the same geographical location but can also be located singly or in groups at separate geographical locations.
With the above description in mind, procedures that may be performed by the embodiment of FIGURE 1 (or other embodiments of the invention) will now be treated in more detail. In accordance with a preferred embodiment of the present invention, when any one of the customer computer stations 51 - 52, 61 - 62 or 71 - 72 connects to the wide area network 10 through the ISP servers 31, 32 or 33, respectively, the customer computer station can connect with any one of the point of sale computer stations labeled 41 - 43. The customer can request goods as a service or a product which are offered for sale by the vendor. For example, after entering the vendor's site, the customer may request goods by choosing a specific option on a web page.
If the vendor allows payment for the requested service or product through the STSP method, and the customer elects to use the STSP payment method option on the web page, the point of sale computer station causes the customer computer station to connect to one of the available STSs 21 - 23 and to transfer the ID of the point of sale computer station and the transaction details to the available STS. This can be done, for example, by using an hypertext markup language (HTML) tag such as an "href tag referring to the STS server, followed by the ID of the point of sale computer station and the transaction details. This may also be done using an HTTP 302 Status Response accompanied by a "Location:" header, followed by the ID of the point of sale computer station and the transaction details. The address of the STS servers (232, FIGURE 11) associated with the point of sale computer may be stored in a data memory 234 (FIGURE 11). The transaction details include the price and serial number of the requested product or service and additional details such as the payment date or other payment terms.
After the customer computer station contacts the available STS, the STS sends the customer computer station a transaction verification form. The transaction verification form is generated by HTML or Java or by any other suitable method. The transaction verification form informs the customer about the requested product or service, the price and the payment terms for the transaction. The transaction verification form also includes information (224, FIGURE 11) which is not shown to the customer. This information includes the address of the ISP server, the STS and/or the point of sale computer station which provides service to the customer. This information is obtained from the database or the table accessible to the STSs as disclosed hereinabove, by using the automatically revealed IP address (222, FIGURE 11) of the customer computer station, in the case where the ISP server address is included, or by using the vendor ID, in the case where the point of sale computer station address is included, and may be formatted in the transaction verification form as a uniform resource locator (URL) in an HTML link.
It is noted that, if the communication is performed over a wide area network having a communication protocol other than the exemplary IP protocol of the Internet, other data, appropriate for the communication protocol which is used over the wide area network, will be used to identify the customer's ISP.
The customer can either confirm or deny the transaction after inspecting the transaction details on the transaction verification form. If the customer confirms the transaction, the customer thus connects to the ISP server using the data sent from the STSs in the transaction verification form, and the relevant data in the transaction verification form is then sent to the ISP server. The software module of the ISP server identifies the customer (236, FIGURE 11) according to the IP address (238, FIGURE 11) or other information such as a physical communication port ID and checks whether the customer is certified to pay through the STSP (e.g., whether the customer has a debit account, e.g., 248, FIGURE 11 , established with the ISP).
It is noted that the verification of the customer computer station's identity by the ISP has the advantage of being less susceptible to fraudulent interference, since the ISP server is not connected to the customer computer station over the Internet, in contrast to the STS or the point of sale computer station which are connected to the customer computer station over the Internet and are thus more susceptible to fraudulent interference. If the customer is certified and the customer agreed to pay for the goods as disclosed hereinbelow, the software module of the ISP server records the transaction details (242, FIGURE 11) into a data memory 244 including the customer's user name, the current date and time, the price of the service or product and the terms of payment. The ISP server then connects to the STS and informs the STS whether the customer confirmed or denied the transaction and whether the customer is certified to pay through the STSP, and may also transfer the transaction details back to the STS for validation.
The STS then connects to the point of sale computer station using the information obtained from the STS's LUT as disclosed hereinabove, and informs the point of sale computer station whether or not to supply the customer with the requested service or product. The STS may also provide the point of sale computer station with the reason for denial of the service or product. On receipt of confirmation of the transaction from the STS, the point of sale computer station supplies the product or service to the customer. For example, if the ordered goods are a tangible product, the point of sale computer station processes the order and issues instructions for mailing the product to the customer. Alternatively, if the customer purchased non-tangible goods such as access to a database, the point of sale computer station enables the customer's computer station to access the database. In another example, if the customer purchased a software product, the point of sale computer station will download the software product over the Internet to the customer's computer station. On receipt of a denial of the transaction, the point of sale computer station informs the customer computer station of the reason for which it can not fulfill the request.
From time to time, the STSP provides the financial service such as the bank or the credit card company with periodic reports including the details of all the transactions performed over a period of time. For each transaction, the details include the credit card number or bank account number of the ISP from which the transaction was initiated, the credit card number or bank account number of the vendor involved in the transaction and the amount and date of payment or payments.
The financial service provider transfers the proper amounts from the ISPs to the relevant vendors. The financial service provider may also deduct a commission for itself and/or for the STSP and/or for the ISP.
The ISP bills the customer for the transactions performed by the customer according to the billing agreement already existing between the customer and the ISP.
It is noted that, the billing of the customer could alternatively be done by another party, such as a telephone company, in which case all the relevant billing details are transferred from the STSP to this party. It is further noted that the term ISP is used throughout the present application to represent any organization providing Internet access to one or more computer station. The organization may or may not charge a fee for supplying Internet access. For example the term ISP may represent a company owning equipment through which the employees of the company access the Internet. Thus, the customer computer stations can be the computer stations used by the employees of the company. In such a case, the billing of the customers which are company employees for the goods purchased from the vendor may be done by deducting the proper amounts from the salary of the employees.
It is still further noted that, in accordance with another preferred embodiment of the present invention, if the STS detects a problem during the steps of the method disclosed hereinabove, the STS will send a message to the relevant server or computer station causing it to cancel the transaction. For example, if the point of sale computer station did not inform the STS that the goods were supplied, the STS instructs the ISP to delete the relevant billing record. In another example, if the STS detects communication failures such as erroneous data or an inability to contact the point of sale computer station, the STS instructs the ISP to delete the relevant billing record.
Reference is now made to Figs. 2 - 5. Fig. 2 is a schematic flow chart illustrating the steps of a method for Internet billing performed by a customer of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention. The customer connects to the Internet using the customer computer station (step 80). The customer enters a vendor's site on a point of sale computer station (step 82) and selects goods such as a service or a product which is offered for sale by the vendor (step 84). If the point of sale computer station allows payment for the selected goods through the STSP, the customer selects this payment method (step 86). The customer computer station then receives a transaction verification form from one of the STSs of the STSP 20 (step 88) as disclosed in detail hereinabove. The customer checks the transaction details displayed on the transaction verification form and can confirm or deny his willingness to accept the transaction conditions (step 90). For example, the customer can click on an "accept" or a "reject" button provided on the transaction verification form for confirming or denying the transaction, respectively.
If the customer did not confirm the transaction on the transaction verification form (step 92), the customer's computer station connects to the ISP server of the ISP which provides Internet access to the customer, denies the transaction and transfers control to step 80. If the customer confirmed the transaction, the customer computer station connects to the ISP server of the ISP which provides Internet access to the customer and transfers the transaction details and the transaction confirmation to the ISP server (step 94). The customer can then receive the goods from the vendor or can alternatively receive a denial message from the vendor and the reason for the denial (step 96). For example, the customer can be given access to a database or download a software product from the vendor's server. It is noted that if the transaction involved the sale of a tangible product, the product is sent by the vendor to the customer by mail or by any other suitable delivery method. Thus, in the case that the goods are a tangible product, the customer will receive only a transaction confirmation at step 96 and the actual acceptance of goods will occur some time in the future. Fig. 3 is a schematic flow chart illustrating the steps of a method for
Internet billing performed by a point of sale computer station of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention. The point of sale computer station waits until a customer requests goods which are payable through the STSP method (step 102). The point of sale computer station checks if the customer selected payment through the STSP (step 104). If the customer did not select the STSP payment method, the customer can still activate other payment methods in the vendor's site according to the customer choice (step 105) and control is transferred to step 102. If the customer selected the STSP payment method, the point of sale computer station checks if the STS confirmed the transaction (step 106). If the STS did not confirm the transaction, the point of sale computer station informs the customer through the customer computer station of the reasons for denying the goods (step 107) and transfers control to step 102. If the STS confirmed the transaction, the point of sale computer station checks whether the transaction details sent by the STS are correct (step 108). If the transaction details as sent by the STS are not correct, the point of sale computer station informs the STS that the goods were not supplied (step 109), informs the customer of the reason of denial of goods (step 107) and transfers control to step 102. If the transaction details sent by the STS are correct, the point of sale computer station checks whether the customer computer station is still on-line (step 113). If the customer computer station is not on-line, the point of sale computer station informs the STS that the goods were not supplied (step 115) and transfers control to step 102. If the customer computer station is still on-line, the point of sale computer station supplies the goods to the customer as disclosed hereinabove (step 117), informs the STS that the goods were supplied (step 119) and transfers control to step 102. It is noted that if the transaction involved the sale of a tangible product, the product will be sent by the vendor to the customer by mail or by any other suitable delivery method.
Fig. 4 is a schematic flow chart illustrating the steps of a method for Internet billing performed by a secure transaction server (STS) of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention. The STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 110), extracts the ISP server details from the database or table as disclosed in detail hereinabove, using the IP address of the customer computer station which is received as part of the communication session details (step 111). The STS sends a transaction verification form to the customer computer station (step 112).
The STS waits for a reply from the ISP server of the ISP which provides service to the customer and then checks whether the ISP server confirmed the payment (step 116). If the ISP server has not confirmed the payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 118). The STS then transfers control to step 110. If the ISP server confirms payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station (step 120). The STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 121). It is noted that, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control to step 110. If the point of sale computer station confirmed that the goods were supplied, the STS records the transaction details for transfer to the financial service provider (step 122) and transfers control to step 110.
Fig. 5 is a schematic flow chart illustrating the steps of a method for Internet billing performed by an ISP server of the system of Fig. 1 , in accordance with a preferred embodiment of the present invention. The ISP server receives the transaction details from the transaction verification form as filled by the customer (step 124) and connects to an available STS (step 126). The ISP server extracts the customer identity according to the communication session details (step 127). The customer identity may be an ID number or a user name which is used by the ISP for identifying the customer.
The ISP server checks whether the customer confirmed the payment on the customer's transaction verification form (step 128). If the customer did not confirm payment on the transaction verification form, the ISP server informs the STS that the customer refused payment (step 130) and transfers control to step 124. If the customer confirmed the payment on the transaction verification form, the ISP server checks whether the customer is certified to pay through the STSP (step 132). If the customer is not certified to pay through the STSP, the ISP server informs the STS that the customer is not certified (step 133) and transfers control to step 124. If the customer is certified, the ISP server informs the STS that the payment is authorized and transfers the transaction details to the STS for verification (step 134). The ISP server then records the transaction details for billing the customer (step 136) and transfers control to step 124.
Many variations may be made to the structure and operations of the embodiment described above. Several of these other embodiments are described below. In general, much of the structure and many of the operations of the embodiments that follow are similar to corresponding structure and operations discussed above. Accordingly, the discussion below will generally focus on the distinctions between the embodiments and the embodiment described above. In another preferred embodiment of the present invention, the network service provider provides the transaction verification form to the customer. Here, instead of using the secure transaction server to provide the form to the customer, the embodiment used the secure transaction server to send the necessary information to the network service provider to enable the network service provider to send the form.
After the initial communication between the customer computer station and the available STS is established as described hereinabove, the STS obtains the address of the ISP server from the database or table as disclosed hereinabove, using the automatically revealed IP address of the customer computer station. The STS then sends to the ISP server, the IP address of the customer computer station and the transaction details. The STS also causes the customer computer station to connect to the ISP server using the address of the ISP obtained by the STS from the database or table disclosed hereinabove and sent to the customer computer station. For example, this can be done by using the HTTP 302 Status Response accompanied by a "Location:" header. The ISP server first checks whether the customer is certified to pay through the STSP. If the customer is not certified to pay through the STSP, the ISP informs the STS that the customer is not certified. If the customer is certified to pay through the STSP, the ISP sends a transaction verification form to the customer computer station. It is noted that the information included in the transaction verification form is as disclosed hereinabove for the first preferred embodiment of the present invention. The customer then confirms or denies the transaction details and the other steps are, in general, performed as disclosed in detail hereinabove.
This embodiment performs similar operations as described in Figs. 2-5, with a few modifications. For example, at block 88 in Fig. 2, the customer receives the transaction from the ISP server, not the STS. At block 112 in Fig. 4, the STS sends the customer information to the ISP server instead of sending the transaction form to the customer. Before block 124 in Fig. 5, the ISP server would receive the customer information from the STS. In addition, the ISP server would send the transaction form to the customer.
In one embodiment of the invention, the customer interacts only with the STS during the verification form procedure. Here, the customer does not send a transaction confirmation/denial to the ISP server. Instead, the customer sends the confirmation/denial to the STS. To ensure that the customer is authorized to make the transaction, the STS obtains the identity of the customer from ISP server. In general, many of the transaction operations performed according to this embodiment are similar to the operations discussed above. For example, the step of validating includes: Automatically receiving by the transaction server from the customer computer station of the transaction details and identification information for identifying the point of sale computer station and the network address of the customer computer station. Identifying the customer. Sending a transaction verification form from the transaction server to the customer computer station, the transaction verification form includes at least the transaction details. Entering by the customer in the transaction verification form a confirmation or a denial of the transaction details. Sending by the customer computer station the confirmation or the denial of the transaction details from the customer computer station to the transaction server. Instructing the point of sale computer station by the transaction server to supply or deny the goods to the customer in accordance with the confirmation or the denial, respectively, of the transaction details by the customer.
The steps of identifying the customer may include: Sending the customer computer station network address from the transaction server to the network service provider server. Finding the customer identity by the network service provider server. Using the customer computer station network address. Sending the customer identity from the network service provider server to the transaction server.
In this embodiment, the customer computer and the point of sale station perform similar operations as set forth in Figs. 2 and 3. The operation of the ISP server and the STS are set forth in Figs. 6 and 7, respectively.
In Fig. 6, the ISP server receives the transaction details and customer's IP address from the STS (step 140). Next, the ISP server identifies the customer according to the IP address (step 142). The customer identity may be, for example, an ID number or a user name which is used by the ISP for identifying the customer.
At step 144, if the customer can not carry out the transaction (for example, for reasons of an exhausted credit line), the ISP server informs the STS that the customer is not authorized (step 146) and transfers control to step 140. If no restrictions arise, the ISP server informs the STS that the payment is authorized, a customer identity (customer ID) is sent to the STS (step 148) and control is transferred back to step 140. In Fig. 7, initially, the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 150). The STS then extracts the ISP server details from the database or table (as disclosed in detail hereinabove) using the IP address of the customer computer station which is received as part of the communication session details (step 152). Next, the STS sends the customer computer station IP address to the ISP server (step 154). At step 156, the STS determines whether the ISP server of the ISP which provides service to the customer identified the customer and confirmed the payment. If the ISP server has not confirmed the payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 158). The STS then transfers control to step 150. If the ISP server confirms payment and sends the customer identification, the STS sends the transaction form to the customer (step 160). In addition, assuming the customer accepts the transaction, the STS connects to the point of sale computer station. Here, the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
The STS may then determine whether the point of sale computer station confirmed that the goods were supplied (step 162). If the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed. If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control back to step 150. If the point of sale computer station confirmed that the goods were supplied, the STS records the customer's identity information and transaction details for transfer to the financial service provider and ISP for later billing (step 164) and transfers control to step 150. In another embodiment of the invention, the network service provider identifies the customer using the telephone number of the customer. The telephony infrastructure of most modern countries now supports the option to identify the initiating side of a telephone call (by transferring his phone number to the called party). The customer's telephone number may be supplied to an ISP, for example, over the telephone infrastructure when the customer calls the ISP. In those ISPs that support this caller identification feature, the phone number from which an ISP's client has connected together with the client's name and IP address may be registered and saved on the ISP's servers.
In accordance with this embodiment of the invention, the customer's telephone number may be used to identify the customer and/or to bill the customer's telephone account for the product the customer purchased from the vendor. Here, the ISP supplies the customer's phone number, according to his network address.
The customer's telephone number may be used to verify the identity of the caller. For example, in one embodiment the ISP (or STS) maintains a listing of authorized source telephone numbers for one or more of the customers. In this case, the system may deny access to the retail method when the customer identity information of the incoming call does not match the corresponding authorized telephone number. Thus, this technique may prevent fraudulent use of a customer's identity information from non-authorized telephones.
The customer's telephone number may be used to bill the customer. For example, in one embodiment, the STS, in cooperation with a telephone company, uses the phone number to bill the customer via his phone bill. In another embodiment, the STS uses the phone number and/or other client information to bill an account of the client (for example, as previously discussed).
The process of identifying the customer includes the steps of sending the customer computer station network address from the transaction server to the network service provider server, finding the customer phone number by the network service provider server, using the customer computer station network address, and sending the customer phone number from the network service provider server to the transaction server. In general, many of the transaction operations performed according to this embodiment are similar to the operations discussed above. For example, the customer computer and the point of sale station perform similar operations as set forth in Figs. 2 and 3. The operation of the ISP server and the STS are set forth in Figs. 8 and 9, respectively.
In Fig. 8, the ISP server receives the transaction details and customer's
IP address from the STS (step 170). The ISP server identifies the customer and extracts the customer phone number according to the IP address (step 172). The customer phone number is the phone number from which the customer initiated the call to the ISP, as recorded by the ISP servers.
If, at step 174, the customer can not carry out the transaction (for example, for reasons of an exhausted credit line), the ISP server informs the STS that the customer is not authorized (step 176) and transfers control back to step
170. If no restrictions arise, the ISP server sends the customer's phone number to the STS, thus indicating authorization of the payment (step 178) and transfers contral to step 170.
In Fig. 9, the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 180), extracts the
ISP server details from the database or table as disclosed in detail hereinabove using the IP address of the customer computer station which is received as part of the communication session details (step 182). The STS sends the customer computer station IP address to the ISP server (step 184) and then checks whether the ISP server of the ISP which provides service to the customer successfully extracted the customer phone number and confirmed the payment
(step 186).
If the ISP server has not confirmed the payment, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 188). The STS then transfers control back to step 180.
If the ISP server confirms payment and sends the customer phone number, the STS sends the transaction form to the customer (step 190). In addition, assuming the customer accepts the transaction, the STS connects to the point of sale computer station. Here, the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
The STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 192). Again, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control back to step 180. If the point of sale computer station confirmed that the goods were supplied, the STS records the customer's phone number and transaction details for transfer to the financial service provider and telephone company for later billing (step 194) and transfers control to step 180.
In another embodiment of the invention, the STS, rather than the ISP server, determines the identity of the customer.. Much of the ISP equipment relevant to the embodiments described herein consists of access servers and authentication servers. The access servers are responsible for answering incoming calls from users' computers, receiving a username and password and supplying network services. The authentication servers are responsible for verifying the username and password (as given by the access server) and instructing the access server whether to supply the required network service to the user. Both servers usually register all accesses and operations.
In accordance with this embodiment of the invention, the secure transaction service connects directly to the network service provider access server or authentication server or any other relevant server capable of associating the customer computer station network address with the customer identity or phone number or any other information relevant for billing the customer. The STS may then retrieve some or all of the stored information that identifies the customer. For example, the STS may extract the customer's username, phone number, IP address or any other relevant data from the ISP's servers. This may be accomplished, for example, using an SNMP command. A significant advantage of this embodiment is that it may be implemented without installing the software module at the ISP. The customer computer and the point of sale server perform similar operations as set forth in Figs. 2 and 3. No special operations are required of the ISP. The operation of the STS is set forth in Fig. 10.
In Fig. 10, the STS receives the transaction details and the point of sale computer station ID from the customer computer station (step 200), extracts the ISP server details from the database or table as disclosed in detail hereinabove, using the IP address of the customer computer station which is received as part of the communication session details (step 202). Then, at step 204, the STS connects directly to the ISP server (such as an access server or an authentication server) containing information associating IP addresses with identification information (such as usemames or telephone numbers).
If, at step 206, the identification information is not found on the ISP server, the STS connects to the point of sale computer station, instructs the point of sale computer station to deny goods from the customer and provides the point of sale computer station with the reason for the denial (step 208). The STS then transfers control back to step 200.
If the identification information is found on the ISP server, the STS sends the transaction form to the customer (step 210). In addition, assuming the customer accepts the transaction, the STS connects to the point of sale computer station. Here, the STS instructs the point of sale computer station to supply the service or product to the customer and sends the transaction details to the point of sale computer station.
The STS then checks whether the point of sale computer station confirmed that the goods were supplied (step 212). Again, if the goods are tangible, the vendor's confirmation may include a confirmation that a mailing order for the purchased goods was processed.
If the point of sale computer station did not confirm that the goods were supplied, the STS transfers control to step 200. If the point of sale computer station confirmed that the goods were supplied, the STS records the customer's identification information and transaction details for transfer to the financial service provider and/or telephone company and/or ISP for later billing (step 214) and transfers control to step 200. In practice, the system or method of the invention may be practiced in conjunction with customer's who use proxy servers. In this case, the proxy server's Internet address, rather than the customer's Internet address, may be provided to the STS or the ISP server. Several methods may be used to obtain a customer's actual network address in the event the customer is using a proxy server. For example, the address may be obtained from an HTTP "Forwarded-For" header that may be sent. Here, the header will reveal the customer's address. It should be noted, however, that this method may be easily comprised (i.e., false addresses inserted into the header). As a result, the use of this method may be restricted to verification operations in some applications.
The customer's address may be obtained by instructing the customer's browser to connect in the background to another service, which the customer might have requested to be unproxied, such as HTTPS. This can be done, for example, by using an HTML tag such as <img src=https://host:port/url>. The address may be obtained by instructing the customer's browser to connect in the background to another host, which the customer might have requested to be unproxied, such as hosts from the domain of his ISP. This can be done, for example, by using an HTML tag such as <img src=https://host.isp.net:port/url> (assuming the domain isp.net was configured as unproxied on the customer's computer).
The address may also be obtained by integrating directly with the HTTP proxy. If a special module is installed at the HTTP proxy by the STSP, this module can report the true IP of a customer generating a specific request.
The address may also be obtained by placing a module on the ISP's network, which is able to monitor all communications between customers and the proxy (hereinafter 'monitor'). The STS will then invoke an event with the customer that can be detected by the monitor. An example of such an event is sending a special string of characters to the customer (via the proxy). The monitor will detect this string, and inform the STS to which IP this string was sent. Finally, an application that will attempt to contact the secure transaction service or the network service provider may be downloaded to the customer's computer station. This would cause the customer's true Internet address to be disclosed. This could be done, for example, by instructing the browser to download a Java applet that instructs the customer's computer to connect directly to the STS thereby revealing the computer's true address.
In each case, a large random number is sent from the STS to the customer computer station, and is then sent back from the customer computer station to the STS over the newly established connection. This can be done for example, by inserting the said number in the URL of the said HTML tag, or by instructing the said application to echo the said large number when received. This procedure verifies that the reported IP is known by the Internet infrastructure and further reduces the possibility of fraud.
Further to the above, it is noted that communication between the point of sale computer station and the STS and between the ISP server and the STS can be secured communication. The communication can be secured using a method of encryption such as the data encryption standard (DES) or any other suitable encryption method. A method of authentication can also be used for increased security such as a public key or shared key digital signature method or any other suitable authentication method. This ensures that the transaction verification procedures serve as an encrypted secured verification step and reduces the possibility of fraud. It should be noted that any communication between two parties could in fact be done through a third party. For example, the final confirmation sent from the STS to the vendor could be transferred through the customer. In this case, some method of digital signature could be added to the message in order to protect it from accidental or malicious modification. It is further noted that the retail method of the present invention has the advantage that a vendor needs only establish one agreement with an STSP in order to be able to provide a secure payment method to all the customers of all the ISPs which are connected with the STSP. Another advantage of the STSP method is that an ISP needs to establish only one agreement with the STSP in order to provide a secure payment method between any one of its customers and any of the vendors that have agreements with the STSP, thus, the ISP does not need to establish separate agreements with many vendors. Another advantage of the retail method of the present invention is that the customer can perform secured transactions with all the vendors which have agreements with the STSP, without having to install any software on his computer station. Moreover, using the retail method of the present invention, the customer can perform transactions without having to transmit any sensitive information such as a credit card or account number or other personal details over the Internet.
It is noted that, in accordance with another preferred embodiment of the present invention, no billing is performed by the STS, the ISP or the financial service provider. Instead, the ISP sends to the STS the e-mail address of the customer and the STS periodically sends e-mail messages to the customer reminding the customer of his debt to the vendor from which the goods were received until the vendor informs the STS that the debt has been paid.
Alternatively, in accordance with another preferred embodiment of the present invention, the STS instructs the ISP to periodically send e-mail messages to the customer reminding the customer of his debt to the vendor from which the goods were received. When the vendor informs the STS that the debt has been paid, the STS instructs the ISP to stop sending the e-mail messages to the customer. It is still further noted that, in accordance with another preferred embodiment of the present invention, the vendor may decide to supply the goods to the customer prior to validating the purchasing as disclosed hereinabove. In a non-limiting example, the vendor may provide the customer with access to a database and if the customer finds the information useful, the customer agrees to pay for the information, for example by activating a designated HTML link. The link connects the customer computer station to the STS, transfers the ID of the point of sale computer station and the transaction details to the STS as disclosed in step 1 10 of Fig. 4 and continues with the other steps of Fig. 4 as disclosed hereinabove. In another non-limiting example, the customer downloads software from the point of sale computer station for checking the software prior to performing step 80 of Fig. 2. If the customer decides to pay for the software, the customer connects to the point of sale computer station and performs steps 80 to 94 (Fig. 2) as disclosed hereinabove. It is noted that, in the last example, step 96 is not performed since the software was already downloaded to the customer computer station. According to another aspect of the present invention, the point of sale computer station displays the option of payment through an STSP only to those customer computer stations whose ISPs are capable of participating in the STSP payment system. The point of sale computer station holds a list describing the IP ranges of participating ISPs, as assigned to them by ARIN or any other proper authority. This list is updated from time to time when new IP ranges are assigned, or new ISPs are capable of participating in the STSP payment system. By comparing the customer's IP address with the list described above, the point of sale computer station determines whether the customer's ISP is capable of participating in the STSP payment system, and invokes the STSP payment option only when it is possible.
In the event that the customer computer station is connected via a proxy server to the point of sale computer station, the proxy address may be used, as most customers use the proxy servers of their ISPs, which of course have an IP in the ISP's range. Alternatively, the customer's true IP address can be obtained using any of the methods described herein.
While the method described herein is for use with the STSP payment service, it is equally appropriate for pre-filtering of any ISP-based service.
According to another aspect of the present invention, the vendor pays the customer for various actions performed at the point of sale computer station, such as viewing advertisements or providing a service. The vendor's account is billed and the customer's account at the ISP is credited. The method of operation is similar to the standard method, with the difference that negative amounts of money are charged to the customer. According to another aspect of the present invention, the IP extraction is performed in the following manner when complementary software ("plug-in") which uses network connections for its operation is installed in the customer's browser. An example of such a plug-in is RealPlayer from RealNetworks of Seattle, Washington, USA, which is used to play sound and video from a remote server. The IP extraction invokes the plug-in to connect in the background to the server, and since some of these plug-ins connect to servers directly, the true IP address of the customer computer station is revealed.
According to another aspect of the present invention, an alternative method of identification is used. Several services exist which already associate a customer computer station's network address with the customer identity. One example, is ICQ from ICQ Inc. of Virginia, USA, which connects the customer computer station to a central ICQ server upon startup. According to this alternative method, when the customer computer station connects to the STS, the STS queries the service's database for the identity associated with the extracted IP address, rather than querying the ISP's database. Furthermore, if the service has the ability to charge its customers, the service can be used as a billing proxy, in the same way as the ISP or telephone company were used in previous examples.
According to another aspect of the present invention, the step 117 of the retail method shown in Fig. 3, in which the point of sale computer station supplies goods to the customer computer station, may involve several customer requests one after another with session management. In order not to charge the customer several times for the same product, or in order to enable saving information about the customer, session management is performed between the HTTP server at the point of sale computer station and the customer. The " server maintains a database whose records crosslink a customer ID received from the secure transaction server with a list of allowed goods and a set of identifiers sent from the customer computer station. As long as the customer computer station sends all or part of these identifiers, and the match between the newly received identifiers and the previously sent identifiers is statistically significant, the point of sale computer station supplies goods appearing in the list of allowed goods to the customer without the necessity of the point of sale computer station communicating with the STS to re-identify the customer. The collection of identifiers is available to the HTTP server from the browser running on the customer computer station. Reference is now made to Fig. 12, which is a schematic illustration of a collection of identifiers, according to a preferred embodiment of the present invention. The collection of identifiers are sent by the browser on the customer computer station to the HTTP server on the point of sale computer station with each HTTP request. The collection of identifiers includes communication identifiers 300 and machine identifiers 302. The communication identifiers 300 include the proxy IP address 304 and the customer computer station's IP address 306, and the TCP connection information. The machine identifiers 302 include the cookie 308, a session identifier 310 encoded in an URL, the browser type 312, MIME types as reported by the browser 314, the operating system 316, and the language 318 of the operating system, as reported in the User-Agent and other HTTP headers.
These identifiers constitute together a 'customer fingerprint' 320 which can be used by the HTTP server to identify the session.
A method for HTTP session management using multiple identifiers and statistical significance, in accordance with a further preferred embodiment of the present invention, is shown in Fig. 13, to which reference is now made. An HTTP server receives an HTTP request (step 400), collects the identifiers from the HTTP session, and seeks the best match from the existing database (step 402).
The server then calculates the statistical significance of the match between the new session and each of known sessions, according to the following formula
(based on the Bayes Theorem for dependent probabilities):
, p(T I session, ) p(session, ) p(sessιonl \ T) = — ! — - — — y, p(T | session j ) ■ p(sessionj )
7=0 where for l ≤ i ≤ n , session, denotes the hypothesis that the new session belongs to known session / , session0 denotes the hypothesis that the new session belongs to an unknown session, and p(sessionl | T) is the probability that given the collection T of identifiers of the new session, the new session belongs to a known session i . p(sessionl ) is the a priori probability that the new session belongs to a known session / . For example, if 30% of the sessions are new sessions, and known sessions are equally likely, then p(sessιont) is 0.7/ n , where n is the total number of sessions, and p(session0) is 0.3. p(T \ session:) is the probability of receiving the collection T of identifiers for the known session ι , and is calculated from the statistical significance of the identifiers, with correlations taken into account.
For any decision, the probability of error can be calculated. For example, if the server decides that the new session belongs to known session / , the probability that this is the correct decision is p(sessiont \ T) , the probability that the session is in fact a different known session is p(sessiont \ T) , and the
probability that the new session is in fact unknown is p(sessionQ \ T) . If the server decides that the new session is unknown, then the probability that this is the correct decision is p(session0 \ T) , and the probability that the new session is in n fact a known session is Υjp(sessionj \ T) . j=i
The server makes a decision based on a predetermined scheme (step 404). For example, the scheme may decide that a new session is known if the probability that this is the correct decision is greater than 99%. This is a very important feature of the present invention, as it allows the application designer to limit its error rate in a quantifiable way.
The expression p(session, | T) is calculated by combining the likelihood of each of the identifiers in the collection T Preliminary research can be done to estimate the likelihood of each value (for example, a distribution table of each browser type and version in the population), or the server can calculate this over time by recording each HTTP request into an historical statistical database, or both. These values are expressed as numbers describing the probability that a certain customer will have a certain value for a certain identifier, or the probability that an unknown customer will have this value. For example, the probability that a different customer will have the same IP address previously used by another customer could be estimated as 0.000001 (for example, if this IP address is dynamically assigned by an ISP).
Some of the identifiers are correlated. For example, since Internet Explorer does not run on Unix, the probability that a customer uses a Netscape browser is higher if the customer is using the Unix operating system than if the customer is using a Wndows-based operating system. As another example, the customer computer station's IP address and the proxy IP address are correlated, since proxy servers usually serve a specific sub-network. Since sub-networks are characterized by a range of IP addresses, these IP addresses are very likely to be associated with the sub-network's proxy. Thus, the proxy IP address loses all significance once the customer computer station's IP address is obtained.
According to a preferred embodiment of the present invention, The expression p(session1 \ T) is therefore calculated as the product of multiplying the probability of each identifier. If two or more identifiers have been found, by prior research, to be somewhat correlated, meaning they tend to appear together, their combined probability is reduced in order to compensate for the correlation. For example, if two unrelated identifiers each have each a probability of 0.5 to appear, the combined probability is 0.25. If the two identifiers are correlated, the combined probability can be anywhere between 0.25 and 0.5, depending upon the strength of the correlation.
It will be appreciated that the larger the collection of identifiers, the stronger the identification provided by using a multiple number of identifiers.
If the server decides that the new session is a known session / , then user i 's information is retrieved from the database (step 406). If the server decides that the new session is unknown, then the new user's information is obtained (step 408). In step 410, a new entry is created in the database associating the session identifiers with the customer information obtained in step 408.
The user information is used as needed (step 412) and the HTTP response is sent (step 414). An example of the user information is that the customer has already paid for a particular product, or the privileges. When estimating the likelihood of each identifier, two cases should be considered: that of normal users, and that of malevolent users (hackers). For example, a certain IP address is assigned to one host on the Internet at a certain time, making it a very significant identifier. However, a hacker might knowingly spoof this IP address, thus deceiving the system. Thus the likelihood of receiving the same IP address from 2 different customers is higher when one of them is a hacker. As a result, p(sessionι \ T) has two different values - one for normal users and one for hackers. A vendor whose server which is more likely to be attacked by hackers might choose to give higher priority to the hacker p(sessioni \ T) than to the normal p(sessiont \ T) . This will cause the server to require other user identification methods more often.
In another embodiment of the present invention, which may be applicable, for example, when the product is a software module, the payment process is not invoked before receiving the product, but is rather integrated into the process of installing or using the software module. A customer installs new software on his computer station, and before completing the installation, the payment process as described above is invoked and the customer is required to pay for the software in order for the installation to be complete.
In another embodiment of the present invention, the payment process described above is invoked after a trial period. For example, after 30 days of use, the customer is required to pay before continuing to use the software.
In another embodiment of the present invention, the software charges the customer in a pay-per-use model, where the payment process described above is invoked when any number of conditions apply. Such conditions may include, but are not limited to, invoking the payment process when a preset usage time has passed, or when the customer has used the software a preset number of times.
In another embodiment of the present invention, the customer buys a tangible product which has to be physically delivered to the customer's address. In order to maintain the option of automatic purchasing without requiring the customer to fill forms or to submit personal information, the system can automatically obtain the customer's home address from a database associating a known customer identifier with an address. One example of such databases is white pages directories, where the customer phone number (obtained from the customer's caller id, as mentioned hereinabove) is queried to find the customer's full name and address. Another example is an existing billing database at the ISP associating the customer login or username with the customer's full name and address (normally maintained for sending invoices etc.). Another example is an existing billing database at the telephone company, associating the telephone number with the required information.
If it is necessary to protect the customer's identity from the merchant while allowing the item to be shipped, a special non-revealing id can be issued to the transaction, which the merchant can send to, using a courier service (such as United Parcel Service (UPS), Federal Express (FedEx) or DHL). The STSP will provide the association between the transaction ID and the customer's address to the courier service. For example, if the company name of the STSP is "Secure Transactions Ltd.", the merchant will send a package via UPS bearing the address "Secure Transactions Ltd. 1952382". After identifying the address as a "Secure Transactions Ltd. anonymous address", UPS will ask the STSP for the customer's address matching the transaction ID "1952382", and will replace the address. Alternatively, the package bearing the transaction ID will be sent to the STSP, the STSP will find the customer's address and send the package to the customer's address. In this latter case, the courier's cooperation is not required. For example, the merchant will send a package via UPS bearing the address "Secure Transactions Ltd. 1952382, Secure Transactions Ltd., 1 Main Street, AnyCity, AnyState". The STSP will receive the package, find the customer's address, and re-send it to the customer (by any method).
In another preferred embodiment of the present invention, the customer may be requested to enter a password at the stage of authorizing the transaction, as another measure of security. This password could be defined by the customer once, or could be a piece of information already known to the ISP or STSP (e.g. all or part of the credit card number).
It will be appreciated by those skilled in the art that the connection between the customer computer station and the ISP is not necessarily over telephone lines, but could be over cable TV lines or cellular telephones or any other suitable communication infrastructure.
While certain specific embodiments of the invention are disclosed as typical, the invention is not limited to these particular forms, but rather is applicable broadly to all such variations as fall within the scope of the appended claims. To those skilled in the art to which the invention pertains many modifications and adaptations will occur. Thus, the specific structures discussed in detail above are merely illustrative of a few specific embodiments of the invention.

Claims

What is claimed is:
1. A method of performing a commercial transaction, wherein a customer uses a customer computer station that is connected to a network to establish a connection with a vendor application that runs on a server that is connected to the network, the method comprising the steps of: establishing a connection from the customer computer station to the vendor application via a network service provider; initiating a transaction with the vendor application; receiving, by the network service provider, customer identity information from the customer computer station; transferring customer transaction information to a transaction service; providing transaction authorization to the vendor application; and providing a product associated with the transaction.
2. The method of claim 1 , wherein the transferring step includes the step of extracting, by the transaction service, the customer identity information from the network service provider and wherein the method further includes the step of associating, by the transaction service, the customer identity information with a financial account.
3. The method of claim 1 , wherein the customer identity information comprises caller identification information.
4. The method of claim 3, the method further including the step of billing an account of the customer that is associated with the caller identification information.
5. The method of claim 1 , wherein the receiving step comprises the steps of extracting, by the transaction service, customer identity information associated with an IP address from the network service provider; and associating, by the transaction service, the customer identity information with a financial account.
6. The method of claim 1 , the method further comprising the step of obtaining a customer's IP address from an HTTP "Forwarded-For" header.
7. The method of claim 1 , the method further comprising the step of obtaining a customer's IP address by instructing a customer's browser to connect in the background to an unproxied service.
8. The method of claim 1 , the method further comprising the step of obtaining a customer's IP address by instructing a customer's browser to connect in the background to an unproxied host.
9. The method of claim 1 , the method further comprising the step of obtaining a customer's IP address by downloading an application on the customer's computer station whereby the application contacts the transaction service or the network service provider.
10. A method of performing a commercial transaction, wherein a customer uses a customer computer station that is connected to a network to establish a connection with a vendor application that runs on a server that is connected to the network, the method comprising the steps of: establishing a connection from the customer computer station to the vendor application via a network service providerr initiating a transaction with the vendor application; establishing a connection from the customer computer station to a transaction server; obtaining identity information for the customer; determining whether the customer is authorized to conduct the transaction; providing transaction authorization to the vendor application; providing a product associated with the transaction; and recording details related the transaction.
11. The method of claim 10, wherein the obtaining step includes the step of extracting, by the transaction server, the identity information from the network service provider and wherein the determining step includes the step of associating, by the transaction server, the identity information with a financial account.
12. The method of claim 10, wherein the identity information comprises caller identification information.
13. The method of claim 10, wherein the obtaining step comprises the steps of extracting, by the transaction server, identity information associated with an IP address from the network service provider; and associating, by the transaction server, the identity information with a financial account.
14. The method of claim 10, the method further comprising the step of obtaining a customer's true IP address in the event the customer uses a proxy.
15. An accounting method for commercial transactions, wherein customers order products from vendors via a network, the method comprising the steps of: establishing a plurality of customer accounts with a network service provider; establishing a plurality of vendor accounts with the network service provider; commencing a transaction between one of the customers and one of the vendors via the network service provider; obtaining identity information for the one customer; determining whether one of the customer accounts is associated with the one customer; providing transaction authorization to the one vendor; debiting a customer account that is associated with the one customer; and crediting a vendor account that is associated with the one vendor.
16. The method of claim 15, wherein the obtaining step includes the step of extracting, by the transaction server, the identity information from the network service provider and wherein the determining step includes the step of associating, by the transaction server, the identity information with one of the customer accounts.
17. The method of claim 15, wherein the identity information comprises caller identification information.
18. The method of claim 15, wherein the obtaining step further comprises the step of extracting, by a transaction server, identity information associated with an IP address from the network service provider; and wherein the determining step further comprises the step of associating, by the transaction server, the identity information with a financial account.
19. The method of claim 15, the method further comprising the step of obtaining a customer's true IP address in the event the customer uses a proxy.
20. An accounting method for commercial transactions, wherein customers order products from vendors via a network, the method comprising the steps of: establishing at least one financial agreement between a transaction service and at least one vendor; establishing at least one financial agreement between the transaction service and at least one network service provider; initiating a transaction between one of the customers and one of the vendors; obtaining identity information for the one customer; remitting payment to the one vendor according to the at least one financial agreement between the transaction service and at least one network service provider; and obtaining payment from the one customer according to the at least one financial agreement between the transaction service and at least one network service provider.
21. The method of claim 20, wherein the obtaining identity information step includes the step of extracting, by the transaction service, the identity information from the network service provider and wherein the method further includes the step of associating, by the transaction service, the identity information with a financial account.
22. The method of claim 20, wherein the identity information comprises caller identification information.
23. The method of claim 20, wherein the obtaining step further comprises the step of extracting, by the transaction service, identity information associated with an IP address from the network service provider; and wherein the remitting step further comprises the step of associating, by the transaction service, the identity information with a financial account.
24. The method of claim 20, the method further comprising the step of obtaining a customer's true IP address in the event the customer uses a proxy.
25. A retail method over a wide area network including a point of sale computer station, a network service provider server operated by a network service provider, a customer computer station used by a customer and connected to said wide area network through the network service provider server, and a transaction server having access to identification information of said network service provider and said point of sale computer station, the method comprising the steps of: connecting said customer computer station to said point of sale computer station; purchasing goods from said point of sale computer station by said customer; obtaining identity information from the customer computer station; validating said purchasing by said transaction server and said network service provider server; charging said customer for said purchasing, said charging comprising a transaction including the steps of billing an account of said customer by said network service provider server a transaction sum and billing by said transaction server an account of said network service provider server said transaction sum; supplying said goods to said customer; and remitting a portion of said transaction sum to a vendor operating said point of sale computer station.
26. The method of claim 25, wherein the obtaining step includes the step of extracting, by the transaction server, the identity information from the network service provider and wherein the validating step includes the step of associating, by the transaction server, the identity information with at least one account.
27. The method of claim 25, wherein the identity information comprises caller identification information.
28. The method of claim 25, wherein the obtaining step further comprises the step of extracting, by the transaction server, identity information associated with an IP address from the network service provider server; and wherein the validating step further comprises the step of associating, by the transaction server, the identity information with the account.
29. The method of claim 25 further comprising the step of obtaining a customer's true IP address in the event the customer uses a proxy.
30. A system for using a retail method over a wide area network, the system comprising: at least one network service provider server operated by a network service provider and connected to said wide area network; at least one customer computer station used by a customer and connected to said wide area network through one of said at least one network service provider server; at least one point of sale computer station connected to said wide area network; and at least one transaction server having access to identification information of said at least one network service provider and said at least one point of sale computer station and connected to said wide area network, wherein said retail method comprises the steps of: connecting one of said at least one customer computer station to one of said at least one point of sale computer station; purchasing goods from said one point of sale computer station by said customer operating said one customer computer station; obtaining identity information from the one customer computer station; validating said purchasing by one of said at least one transaction server and one of said at least one network service provider server; charging said customer for said purchasing, said charging comprising a transaction including the steps of billing an account of said customer by said one network service provider server a transaction sum and billing by said one transaction server an account of said network service provider server said transaction sum; supplying said goods to said customer; and remitting a portion of said transaction sum to a vendor operating said one point of sale computer station.
31. The system of claim 30, wherein the obtaining step includes the step of extracting, by the transaction server, the identity information from the network service provider and wherein the validating step includes the step of associating, by the transaction server, the identity information with the account.
32. The system of claim 30, wherein the identity information comprises caller identification information.
33. The system of claim 30, wherein the obtaining step further comprises the step of extracting, by the transaction server, identity information associated with an IP address from the network service provider server; and wherein the validating step further comprises the step of associating, by the transaction server, the identity information with the account.
34. The system of claim 30, wherein the retail method further comprises the step of obtaining a customer's true IP address in the event the customer uses a proxy.
35. A method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected services and configured not to use a proxy server for other services, the method comprising the steps of: instructing said browser to open a connection to one of said other services; and obtaining said IP address from said connection.
36. A method for obtaining an IP address of a computer having a browser configured to use a proxy server for selected hosts and configured not to use a proxy server for other hosts, the method comprising the steps of: instructing said browser to open a connection to one of said other hosts; and obtaining said IP address from said connection.
37. A method for obtaining an IP address of a computer, the method comprising the step of: activating an application on said computer, wherein said application opens a connection to a server and said connection contains said IP address.
38. A method according to claim 37, the method further comprising the step of downloading said application from said server.
39. A method for filtering access to a service provided by a service provider to subscribers of at least one ISP, the method comprising the steps of: said service provider maintaining a list of IP addresses assigned to said at least one ISP; and when a user attempts to access said service through a computer having an IP address, said service provider enabling access to said service if said IP address appears in said list. 40. A method according to claim 1 , the method further comprising the steps of: associating said customer identity information with a first plurality of identifiers contained in said transaction with the vendor application, and with privileges related to said transaction authorization and to said product; and when a second transaction is initiated with the vendor application: finding the best match of a second plurality of identifiers contained in said second transaction with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the product associated with said second transaction, providing said product associated with said second transaction.
41. A method according to claim 10, the method further comprising the steps of: associating said identity information with a first plurality of identifiers contained in said transaction with the vendor application, and with privileges related to said transaction authorization and to said product; and when a second transaction is initiated with the vendor application: finding the best match of a second plurality of identifiers contained in said second transaction with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the product associated with said second transaction, providing said product associated with said second transaction.
42. A method according to claim 25, the method further comprising the steps of: associating said identity information with a first plurality of identifiers sent to said point of sale computer station during said step of purchasing, and with privileges related to said step of validating and to said goods; and when a second step of purchasing goods from said point of sale computer station is initiated by said customer: finding the best match of a second plurality of identifiers sent to said point of sale computer station during said second step of purchasing with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the goods requested in said second step of purchasing, providing said goods requested in said second step of purchasing.
43. A system according to claim 30, wherein said retail method further comprises the steps of: associating said identity information with a first plurality of identifiers sent to said point of sale computer station during said step of purchasing, and with privileges related to said step of validating and to said goods; and when a second step of purchasing goods from said point of sale computer station is initiated by said customer: finding the best match of a second plurality of identifiers sent to said point of sale computer station during said second step of purchasing with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the goods requested in said second step of purchasing, providing said goods requested in said second step of purchasing.
44. A retail method over a wide area network including a point of sale computer station, a network service provider server operated by a network service provider, a customer computer station used by a customer and connected to said wide area network through the network service provider server, and a transaction server having access to identification information of said network service provider and said point of sale computer station, the method comprising the steps of: connecting said customer computer station to said point of sale computer station; purchasing goods from said point of sale computer station by said customer; validating said purchasing by said transaction server and said network service provider server; charging said customer for said purchasing, said- charging comprising a transaction including the steps of billing an account of said customer by said network service provider server a transaction sum and billing by said transaction server an account of said network service provider server said transaction sum; supplying said goods to said customer; remitting a portion of said transaction sum to a vendor operating said point of sale computer station; associating said identity information with a first plurality of identifiers sent to said point of sale computer station during said step of purchasing, and with privileges related to said step of validating and to said goods; and when a second step of purchasing goods from said point of sale computer station is initiated by said customer: finding the best match of a second plurality of identifiers sent to said point of sale computer station during said second step of purchasing with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the goods requested in said second step of purchasing, providing said goods requested in said second step of purchasing.
45. A system for using a retail method over a wide area network, the system comprising: at least one network service provider server operated by a network service provider and connected to said wide area network; at least one customer computer station used by a customer and connected to said wide area network through one of said at least one network service provider server; at least one point of sale computer station connected to said wide area network; and at least one transaction server having access to identification information of said at least one network service provider and said at least one point of sale computer station and connected to said wide area network, wherein said retail method comprises the steps of: connecting one of said at least one customer computer station to one of said at least one point of sale computer station; purchasing goods from said one point of sale computer station by said customer operating said one customer computer station; validating said purchasing by one of said at least one transaction server and one of said at least one network service provider server; charging said customer for said purchasing, said charging comprising a transaction including the steps of billing an account of said customer by said one network service provider server a transaction sum and billing by said one transaction server an account of said network service provider server said transaction sum; supplying said goods to said customer; remitting a portion of said transaction sum to a vendor operating said one point of sale computer station; associating said identity information with a first plurality of identifiers sent to said point of sale computer station during said step of purchasing, and with privileges related to said step of validating and to said goods; and when a second step of purchasing goods from said point of sale computer station is initiated by said customer: finding the best match of a second plurality of identifiers sent to said point of sale computer station during said second step of purchasing with a previously associated plurality of identifiers; and if the statistical significance of said best match is better than a predetermined significance, retrieving the customer identification information associated with said previously associated plurality of identifiers; and if the privileges associated with said customer identification information allow access to the goods requested in said second step of purchasing, providing said goods requested in said second step of purchasing.
46. The method of claim 3, the method further including the step of crediting an account of the customer that is associated with the caller identification information. 47. A method of payment for a software product, the method comprising the following steps: invoking a payment process during installation by a user of said software product on a customer computer station that is connectable to a network; and completing said installation only if said user has successfully completed said payment process, wherein said payment process comprises the following steps: establishing a connection from said customer computer station to a transaction service via a network service provider; receiving, by said network service provider, customer identity information from said customer computer station; and sending, by said transaction service, authorization to said customer computer station. 48. A method of payment for a software product installed on a customer computer station that is connectable to a network, the method comprising the following steps: invoking a payment process at least a predetermined period of time after installation by a user of said software product on said customer computer station; and enabling subsequent use of said software product only if said user has successfully completed said payment process, wherein said payment process comprises the following steps: establishing a connection from said customer computer station to a transaction service via a network service provider; receiving, by said network service provider, customer identity information from said customer computer station; and sending, by said transaction service, authorization to said customer computer station. 49. A method of payment for a software product installed on a customer computer station that is connectable to a network, the method comprising the following steps: invoking a payment process when at least one condition is satisfied; and enabling subsequent use of said software product only if said user has successfully completed said payment process, wherein said payment process comprises the following steps: establishing a connection from said customer computer station to a transaction service via a network service provider; receiving, by said network service provider, customer identity information from said customer computer station; and sending, by said transaction service, authorization to said customer computer station.
50. The method of claim 49, wherein said condition is satisfied when a preset usage time of said software product has passed.
51. The method of claim 49, wherein said condition is satisfied when said software product has been used a preset number of times.
52. The method of claim 1 , wherein said product is a tangible good delivered to an address of said customer.
53. The method of claim 52, wherein said method further comprises the step of: obtaining said address from a database associating a known customer identifier with said address.
54. The method of claim 1 , wherein said method further comprises the step of: receiving, by said transaction service, a password from said customer.
EP00953416A 1999-08-16 2000-08-16 A retail method over a wide area network Withdrawn EP1756722A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US37397399A 1999-08-16 1999-08-16
PCT/IL2000/000496 WO2001013289A2 (en) 1999-08-16 2000-08-16 A retail method over a wide area network

Publications (2)

Publication Number Publication Date
EP1756722A4 true EP1756722A4 (en) 2007-02-28
EP1756722A2 EP1756722A2 (en) 2007-02-28

Family

ID=23474704

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00953416A Withdrawn EP1756722A2 (en) 1999-08-16 2000-08-16 A retail method over a wide area network

Country Status (3)

Country Link
EP (1) EP1756722A2 (en)
AU (1) AU6591500A (en)
WO (1) WO2001013289A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001280058A1 (en) * 2000-08-11 2002-02-25 Cardis International Intertrust N.V System and method for micropayment in electronic commerce
CN100344094C (en) * 2004-09-01 2007-10-17 华为技术有限公司 Method for realizing authority charging to multi address user in IPv6 network

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0601500A1 (en) * 1992-12-04 1994-06-15 Testdrive Corporation Transformation of distributed data
WO1997003410A1 (en) * 1995-07-07 1997-01-30 Andrew Egendorf Internet billing method
EP0765068A2 (en) * 1995-09-22 1997-03-26 AT&T Corp. Interactive and information data services telephone billing system
WO1997029584A1 (en) * 1996-02-09 1997-08-14 Telefonaktiebolaget Lm Ericsson (Publ) Billing in the internet
WO1997040615A2 (en) * 1996-04-22 1997-10-30 At & T Corp. Method for billing for transactions over the internet
EP0811942A2 (en) * 1996-06-07 1997-12-10 Cyber Media, Incorporated Automatic updating of diverse software products on multiple client computer system
WO1998026555A1 (en) * 1996-12-09 1998-06-18 Sun Microsystems, Inc. Method and apparatus for dynamic packet filter assignment
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
WO1998040992A2 (en) * 1997-03-10 1998-09-17 Internet Dynamics, Inc. Methods and apparatus for controlling access to information
WO1999008218A1 (en) * 1997-08-11 1999-02-18 Trivnet Ltd. A retail method over a wide area network
WO1999016201A2 (en) * 1997-09-22 1999-04-01 Zak Sat General Trading Co. Wll Asymmetric satellite-based internet service

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5754655A (en) * 1992-05-26 1998-05-19 Hughes; Thomas S. System for remote purchase payment and remote bill payment transactions
US5553143A (en) * 1994-02-04 1996-09-03 Novell, Inc. Method and apparatus for electronic licensing
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
TW345642B (en) * 1995-11-21 1998-11-21 Oxford Media Pty Ltd Computer network value payment system
FI972718A0 (en) * 1996-07-02 1997-06-24 More Magic Software Mms Oy Foerfaranden och arrangemang Foer distribution av ett anvaendargraenssnitt
FI105249B (en) * 1997-12-18 2000-06-30 More Magic Software Mms Oy Procedure and arrangements for connecting information to network resources
US6009401A (en) * 1998-04-06 1999-12-28 Preview Systems, Inc. Relicensing of electronically purchased software

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0601500A1 (en) * 1992-12-04 1994-06-15 Testdrive Corporation Transformation of distributed data
WO1997003410A1 (en) * 1995-07-07 1997-01-30 Andrew Egendorf Internet billing method
EP0765068A2 (en) * 1995-09-22 1997-03-26 AT&T Corp. Interactive and information data services telephone billing system
WO1997029584A1 (en) * 1996-02-09 1997-08-14 Telefonaktiebolaget Lm Ericsson (Publ) Billing in the internet
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
WO1997040615A2 (en) * 1996-04-22 1997-10-30 At & T Corp. Method for billing for transactions over the internet
EP0811942A2 (en) * 1996-06-07 1997-12-10 Cyber Media, Incorporated Automatic updating of diverse software products on multiple client computer system
WO1998026555A1 (en) * 1996-12-09 1998-06-18 Sun Microsystems, Inc. Method and apparatus for dynamic packet filter assignment
WO1998040992A2 (en) * 1997-03-10 1998-09-17 Internet Dynamics, Inc. Methods and apparatus for controlling access to information
WO1999008218A1 (en) * 1997-08-11 1999-02-18 Trivnet Ltd. A retail method over a wide area network
WO1999016201A2 (en) * 1997-09-22 1999-04-01 Zak Sat General Trading Co. Wll Asymmetric satellite-based internet service

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROZENBLIT M ED - INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS: "SECURE SOFTWARE DISTRIBUTION", PROCEEDINGS OF THE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS). KISSIMMEE, FEB. 14 - 17, 1994, NEW YORK, IEEE, US, vol. VOL. 2 SYMP. 4, 14 February 1994 (1994-02-14), pages 486 - 496, XP000452345, ISBN: 0-7803-1812-9 *
See also references of WO0113289A3 *

Also Published As

Publication number Publication date
WO2001013289A2 (en) 2001-02-22
AU6591500A (en) 2001-03-13
WO2001013289A3 (en) 2001-06-07
EP1756722A2 (en) 2007-02-28

Similar Documents

Publication Publication Date Title
EP1031106B1 (en) A retail method over a wide area network
US11947607B2 (en) Methods and computer-readable media for enabling secure online transactions with simplified user experience
US9037514B2 (en) Authentication for service server in wireless internet and settlement using the same
US20040078325A1 (en) Managing activation/deactivation of transaction accounts enabling temporary use of those accounts
US20050080634A1 (en) Method and network element for paying by a mobile terminal through a communication network
US8595815B2 (en) System and method for selectively granting access to digital content
AU7402500A (en) Short message service (sms) e-commerce
WO2001082183A2 (en) Masking private billing data by assigning other billing data to use in commerce with businesses
KR20060022304A (en) Interactive financial settlement service method using mobile phone number or virtual number
EP1416456B1 (en) Methods for maintaining prepaid account information and for supporting transactions in an e-Commerce system
KR101122032B1 (en) Method for carrying out an electronic transaction
EP1014672A2 (en) Arrangement for billing or billing authorization using a calling card
WO2002071177A2 (en) Method and system for substantially secure electronic transactions
JP2002230458A (en) Method of on-line shopping settlement and its system, and on-line shopping settlement program
US20080028207A1 (en) Method &amp; system for selectively granting access to digital content
WO2001013289A2 (en) A retail method over a wide area network
US20060031168A1 (en) Method for access to multimedia content and a platform for implementation of the method
CA2349306C (en) Method of and apparatus for executing automated transactions
KR100377182B1 (en) Telephone Payment Gateway for Electronic Commerce Service and Method for Telephone Payment using it
KR20010092887A (en) Method and system for payment by proxy according to account transfers on the internet
CA2293832A1 (en) Method and system for secure e-commerce transactions
CA2551179A1 (en) Method of and apparatus for executing automated transactions
AU6545499A (en) Arrangement for billing or billing authorization using a calling card

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020318

A4 Supplementary search report drawn up and despatched

Effective date: 20050729

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SHAKED, SHVAT

Inventor name: TAL, OR

Inventor name: WILF, SAAR

Inventor name: RUVIO, GUY

17Q First examination report despatched

Effective date: 20070814

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SHAKED, SHVAT

Inventor name: TAL, OR

Inventor name: RUVIO, GUY

Inventor name: WILF, SAAR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20110415