patents.google.com

US20110060904A9 - Secure system for the issuance, acquisition, and redemption of certificates in a transaction network - Google Patents

  • ️Thu Mar 10 2011
Secure system for the issuance, acquisition, and redemption of certificates in a transaction network Download PDF

Info

Publication number
US20110060904A9
US20110060904A9 US11/686,239 US68623907A US2011060904A9 US 20110060904 A9 US20110060904 A9 US 20110060904A9 US 68623907 A US68623907 A US 68623907A US 2011060904 A9 US2011060904 A9 US 2011060904A9 Authority
US
United States
Prior art keywords
certificate
issuer
redemption
acquirer
user
Prior art date
1998-12-24
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/686,239
Other versions
US20070157021A1 (en
US7899755B2 (en
Inventor
Henry Whitfield
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Buffalo Patents LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
1998-12-24
Filing date
2007-03-14
Publication date
2011-03-10
2007-03-14 Application filed by Individual filed Critical Individual
2007-03-14 Priority to US11/686,239 priority Critical patent/US7899755B2/en
2007-07-05 Publication of US20070157021A1 publication Critical patent/US20070157021A1/en
2008-06-16 Assigned to S.F. IP PROPERTIES 59 LLC reassignment S.F. IP PROPERTIES 59 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WHITFIELD, HENRY
2011-03-01 Application granted granted Critical
2011-03-01 Publication of US7899755B2 publication Critical patent/US7899755B2/en
2011-03-10 Publication of US20110060904A9 publication Critical patent/US20110060904A9/en
2015-12-07 Assigned to RATEZE REMOTE MGMT. L.L.C. reassignment RATEZE REMOTE MGMT. L.L.C. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: S.F. IP PROPERTIES 59 LLC
2021-06-14 Assigned to INTELLECTUAL VENTURES ASSETS 167 LLC reassignment INTELLECTUAL VENTURES ASSETS 167 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RATEZE REMOTE MGMT. L.L.C.
2021-06-26 Adjusted expiration legal-status Critical
2021-07-26 Assigned to BUFFALO PATENTS, LLC reassignment BUFFALO PATENTS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASSETS 167 LLC
2022-07-14 Assigned to INTELLECTUAL VENTURES ASSETS 167 LLC, INTELLETUAL VENTURES ASSETS 90 LLC reassignment INTELLECTUAL VENTURES ASSETS 167 LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BUFFALO PATENTS, LLC
Status Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4015Transaction verification using location information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0239Online discounts or incentives

Definitions

  • the invention relates to the field of certificate systems. More particularly, the invention relates to a certificate system for the controlled and secure issuance, acquisition and redemption of single-use certificates in a transaction network.
  • the quickly expanding internet provides a variety of on-line commerce structures and processes, allowing online browsing and sales through a variety of dedicated retail web-sites, which typically offer one or more products.
  • An inventory of products which are typically stocked at one or more remote warehouse or related retail locations, are offered for sale through a web site.
  • a purchaser upon selecting a desired product, typically enters purchase information, such as credit card information and shipping information.
  • purchase information such as credit card information and shipping information.
  • credit card authorization typically when the items are shipped to the designated shipping address, the authorized card information is used to transfer monetary funds from the purchaser's credit account to the seller's bank account.
  • While such on-line commerce systems provide adequate purchasing opportunities for buyers who have access to the Internet, typically for the purchase of smaller items which are readily sent (e.g. such as through postal services), such online commerce does not typically allow a buyer to conveniently pick up merchandise locally.
  • Distributed and other operating systems, environments and architectures may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway”.”
  • Another web-based company which sells certificates is located at “www.webcertificates.com”, which enables recipients of a certificate to redeem the certificate from a wide variety of on-line merchants.
  • the site creates a certificate which is similar to a virtual credit card, which is then readily accepted by a wide variety of on-line merchants who accept credit cards as payment for their products and services.
  • recipients are required to access the Internet, follow detailed instruction to retrieve their online certificate, and then are required to redeem the certificate at an online location, wherein a product is then shipped.
  • FIG. 1 is a system block diagram of a transaction network for the issuance, acquisition and redemption of single-use certificates
  • FIG. 2 shows a single-use gift certificate
  • FIG. 3 is a schematic view of a single-use gift certificate identification packet
  • FIG. 7 is a schematic block diagram of transaction information data entry
  • FIG. 8 is a schematic block diagram of redeemer facility options
  • FIG. 16 shows an embodiment of a partial certificate transaction network having a plurality of acquirer terminals, and an issuer terminal having a dedicated certificate authority.
  • FIG. 1 is a system block diagram of a transaction network 10 for the issuance, acquisition and redemption of single-use certificates 60 ( FIG. 2 ).
  • the transaction network 10 contains a networked certificate authority 12 , through which one or more virtual certificates 60 are remotely created, such as by an issuer user ISR ( FIG. 9 ) through issuer facilities 24 (e.g. such as through a web portal interface).
  • the virtual certificates 60 typically correspond to sellable commodity, such as a product or service denomination, which is selectable by the issuer user ISR.
  • the virtual certificates 60 may correspond to a distributable commodity, such as a discount coupon for a product or service, or a reservation (e.g. such as for travel or dining), which is selectable by the issuer user ISR.
  • Created virtual certificates 60 are stored on a database 18 which is associated with the networked certificate authority 12 .
  • the issuer user ISR defines detailed specifications for virtual single-use certificates 60 through a certificate specification interface 194 ( FIG. 10 ), such as design specifications 62 and redemption rules 66 , whereby the certificates 60 typically reflect sellable or distributable commodities, such as products and/or services which are available for pick up by a customer, typically at a redemption location RL (e.g. such as at a retail store, a distribution center, a box office, a ticket counter, or at a service provider).
  • a redemption location RL e.g. such as at a retail store, a distribution center, a box office, a ticket counter, or at a service provider.
  • Each virtual certificate 60 exists, until issued, as a virtual certificate 60 comprised of multiple independent textual elements 64 , 66 and/or graphical elements 62 a - 62 n , which are stored by the certificate authority 12 , in the secure database 18 .
  • the registration process 112 also typically includes a registration validation step, by which the certificate authority 12 or other independent entity checks pertinent registration information, such as bank account information, credit references, or merchant identification number. Based upon a successful registration step 112 and validation step, the certificate authority 12 preferably assigns an access number 113 to the new issuer, and sends the a registration notification and access number to the new issuer (e.g. such as by an e-mail notification). In an alternate embodiment, a new issuer ISR, having submitted a valid merchant number at registration step 112 , may automatically gain an access number and subsequent access to the certificate authority.
  • a registration validation step by which the certificate authority 12 or other independent entity checks pertinent registration information, such as bank account information, credit references, or merchant identification number. Based upon a successful registration step 112 and validation step, the certificate authority 12 preferably assigns an access number 113 to the new issuer, and sends the a registration notification and access number to the new issuer (e.g. such as by an e-mail notification).
  • the issuer preferably selects or uploads denomination parameters for a virtual certificate 60 .
  • the denomination 78 may be in the form of a currency denomination, or in the form of a code associated with a product, a service, a coupon, a voucher, or other instrument for which the an acquired certificate 60 may be redeemed.
  • the issuer may preferably authorize 120 the certificate authority 12 to issue certificates 60 within a set range of selectable denomination, or authorize the creation of virtual certificates 60 with a value determined by an acquirer user ACQ.
  • Acquirer entered transaction information 162 typically includes name and address information 164 , credit card or other information 166 associated with the acquirer's payment agent 52 , assignment 170 by the acquirer of the secret private key 76 ( FIG. 3 ) to be associated with the selected certificate 60 , and a selected delivery method 172 for the certificate 60 .
  • Examples of alternate delivery methods for an acquired certificate 60 which may be specified by an acquirer ACQ include downloading of the certificate 60 as an electronic file (e.g. such as within a portable document format (PDF) file (by ACROBATTM, of Adobe Systems, Inc., of San Jose Calif.), or as an electronic description transferred via the acquirer's computer 26 to a transaction card encoder 34 , or for printing on a printer 30 connected to the acquirer's computer 26 , or for subsequent printing later by the acquirer user.
  • PDF portable document format
  • an acquired certificate 60 may only be used for redemption once (at which time further use is revoked), there is no financial risk to the issuer ISR in the use of replacement certificates. As well, even if a certificate is lost and retrieved by a second party, or is stolen, the lost acquired certificate is unredeemable, without submittal of the private key 76 , which is not included as printed information on a certificate 60 .
  • a redemption system 174 which comprises a telephone terminal 44
  • the communication of the redemption information 98 of the certificate 60 to the certificate authority 12 may be made using a touch-tone telephone keypad on the telephone 44 , or by live-phone contact to an operator intermediary 45 in communication with the certificate authority 12 .
  • the certificate authority 12 Upon authentication of the certificate by the certificate authority 12 , on the basis of a correlation of the unique certificate identification 74 in combination with the acquirer's private key PIN 76 with the transaction records associated with the certificate 60 stored in the secure database 18 , the certificate authority 12 authorizes the redemption, and revokes the certificate 60 .
  • a design element 62 is preferably activated by control 210 .
  • a design element 62 which is not needed may be deleted by deletion control 212 .
  • the redemption rule module 202 typically includes user selectable expiration limitations 124 a , location selection 124 b , or other redemption rules 124 c .
  • other issuer entered restrictions may be entered, such as availability 126 a , or other restrictions 126 n.
  • an acquirer user ACQ is able to control (e.g. such as by search command 238 ) which of the available virtual certificates 60 are to be displayed, on the basis of a particular store or brand of product, or on the basis of certificate types and/or issuer types categorized by one or more descriptive criteria available in the discrete information associated with each unissued virtual certificate.
  • an acquirer user ACQ may specify a geographic location for a desired redemption location RL (e.g. such as a redemption within a postal code area or telephone area code region).
  • the certificate authority 12 uses the selected geographic descriptor to create a subset 240 of available virtual certificates 60 , such that only redeemable certificates associated with the specified geographic location are presented to the acquirer user ACQ.
  • an issuer ISR may have specified geographic exclusions for a certificate which correlate to the acquirer's geographic identification information, precluding redemption within the acquirer's geographic area.
  • the same certificate 60 may be accessed from the issuer/merchant's own network site 242 , which has a site virtual inventory 236 limited to virtual certificates 60 that are created by the issuer ISR.
  • a merchant site 242 i.e. such as an issuer/redeemer site
  • the issuer ISR may preferably provide direct access to virtual certificates, such as through selectable certificate icons 246 ( FIG. 14 ).
  • the certificate authority 12 receives an initial authorization to transfer funds from an acquirer payment agent 52 , whereby the certificate authority establishes a “lock” on funds as a part of the certificate acquisition transaction 72 .
  • the funds are then transferred, from the acquirer payment agent 52 to the redeemer payment agent 56 , when a certificate is redeemed 90 , 104 for actual goods or services, when the redemption transaction is authorized by the certificate authority 12 (e.g. such as by an authentication module 16 ).
  • the acquirer may simply let the acquired certificate 60 “expire”, or may actively return to the purchasing site, such as through the acquirer facilities, and actively cancel the certificate 60 , while suspending the authorized lock on the acquirer's funds.
  • the certificate system 10 can be used for a large variety of commerce applications, wherein products and services are located on-line, but are picked up at a store.
  • an acquirer user ACQ may locate a large gift item on-line (e.g. such as a television set), which can be picked up at a location RL near a recipient RCP.
  • the acquirer user ACQ may simply search for and locate the desired gift item at a location RL near the recipient RCP, proceed with an acquisition transaction 72 , transfer the acquired certificate 60 (or just the certificate information 74 ) to the recipient RCP (or directly to the redemption location RL), and communicate the private key to the recipient RCP.
  • the recipient RCP may then perform the redemption transaction 90 , and receive the gift item.
  • an issuer/merchant can input other store information 252 a , 252 b (such as business location information, logos, product descriptions) to appear on a web page 248 , 252 appropriate to a virtual certificate 60 , as well as acceptable credit cards 52 for the issuer/merchant.
  • store information 252 a , 252 b such as business location information, logos, product descriptions
  • the issuer/merchant information 252 is preferably displayed, in conjunction with the virtual certificate 60 , thereby creating a network presence for the issuer/merchant.
  • an acquirer ACQ selects the certificate 60 (i.e.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Game Theory and Decision Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A transaction network contains a networked certificate authority, by which one or more virtual certificates may be remotely defined and stored, such as by an issuer user through a issuer web portal interface. An acquirer user, through an acquirer web portal interface, may acquire one or more virtual certificates, which contain a secret public key portion, as well as a corresponding private key, which is established by the acquirer at the time of acquisition, and is stored at the certificate authority. At a redemption location associated with an acquired certificate, the acquirer (or an alternate recipient of an acquired certificate to whom the acquirer has communicated the established private key), submits the certificate information, along with the established private key, to redeem the certificate.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a Continuation of co-pending U.S. patent application Ser. No. 09/472,100, filed Dec. 20, 1999, which application is incorporated herein in its entirety by this reference thereto.

  • FIELD OF THE INVENTION
  • The invention relates to the field of certificate systems. More particularly, the invention relates to a certificate system for the controlled and secure issuance, acquisition and redemption of single-use certificates in a transaction network.

  • BACKGROUND OF THE INVENTION
  • The quickly expanding internet provides a variety of on-line commerce structures and processes, allowing online browsing and sales through a variety of dedicated retail web-sites, which typically offer one or more products. An inventory of products, which are typically stocked at one or more remote warehouse or related retail locations, are offered for sale through a web site. A purchaser, upon selecting a desired product, typically enters purchase information, such as credit card information and shipping information. Upon credit card authorization, typically when the items are shipped to the designated shipping address, the authorized card information is used to transfer monetary funds from the purchaser's credit account to the seller's bank account. While such on-line commerce systems provide adequate purchasing opportunities for buyers who have access to the Internet, typically for the purchase of smaller items which are readily sent (e.g. such as through postal services), such online commerce does not typically allow a buyer to conveniently pick up merchandise locally.

  • As well, there is an increasing development for systems which enhance the automation of on-line and off-line commerce, as evidenced by on-line payment systems, point of sale terminals, and debit cards. Related documents include Making the World Go Round (Online Payments), Internet Business, no. 24, p. 2830 (January 1999); Wireless Point of Sale Terminal for Credit and Debit Payment Systems, Conference Proceedings, IEEE Canadian Conference on Electrical and Computer Engineering, (1998); Is Off-line Debit about to Derail?, ABA Banking Journal, vol. 89, no. 9, p. 66,68,70 (September 1997); 1998: Year of the Debit Card, Bank Systems & Equipment, vol. 24, no. 11, p. 16-18 (November 1987).

  • I. Krsul, J. Mudge, and A. Demers, Method Electronic Payments that Prevents Double-Spending, U.S. Pat. No. 5,839,119 (17 Nov. 1998) and corresponding European Patent Application No. 0833285, Method and Product for Generating Electronic Tokens, (filed 25 Sep. 1997) disclose a “method of generating electronic monetary tokens that supports off-line transactions while preventing double-spending. Generation of electronic token halves by a financial services provider begins in response to a request from a buyer to generate monetary tokens to be used with an identified seller. First, the financial services provider generates a plurality of electronic monetary tokens. Second, the provider splits each monetary token into two electronic token halves and associates with each the same serial number. These electronic token halves when combined recreate the electronic money token from which they were generated, but buy themselves neither electronic token half has any value. Nor can either electronic token half by itself be used to create the electronic monetary token without the token half's mate. After splitting all the monetary tokens, the services provider assigns a half of each electronic token to the seller and the other half of each electronic token to the buyer. The buyer and seller can now engage in multiple transactions off-line of the financial services provider”. While Krsul et al disclose a method of generating electronic monetary tokens, they fail to disclose a system for issuer-defined virtual certificates which are acquired on-line during a first transaction in which an acquirer establishes a secure private key that is associated with the acquired certificate, and are then selectively redeemed off-line, using the re-submitted private key to authorize the redemption transaction with the on-line system, and to revoke further use of the acquired certificate.

  • K. Ginter, V. Shear, F. Spahn and D. Van Wie, Systems and Methods for Secure Transaction Management and Electronic Rights Protection, U.S. Pat. No. 5,915,019 (22 Jun. 1999) disclose systems and methods “for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway”.”

  • Gift Certificate Systems. Traditional gift certificates are typically offered by a small percentage of retail stores. There are often major costs associated in the creation and distribution of paper-based certificates, as well as in the management of in-store redemption. Consumers are thus presented with a narrow range of merchant outlets where certificates can be redeemed. The buyer often has to travel to the store to buy the certificate, and then the recipient has to wait until the buyer sends the paper-based certificate to the recipient. As well, there is often no authorization control on the redemption of the paper-based certificate. Paper-based certificates are often treated as cash, and a lost or stolen certificate usually will not be refunded to the buyer or recipient.

  • Some dedicated network locations, such as web sites which offer goods and services for a single entity, typically offer the purchase of pre-printed and inventoried paper-based gift certificates, which are typically purchased on-line by a buyer, and then are typically sent to a desired recipient.

  • As well, aggregated web sites which offer multiple goods and services from multiple sources often offer the similar online purchase of generic certificates, which may then be redeemed on-line by a recipient, such as towards the purchase of inventoried goods, which are subsequently sent to the recipient redeemer.

  • As well, some web-based companies, such as “www.giftpoint.com” and “www.giftcertificates.com”, have recently been established to sell a variety of gift certificates, which inventory and offer for sale a large number of pre-printed gift certificates, typically related to nationally traded products and services (e.g. such as redeemable certificates from Gap Stores, Inc. or Wal Mart, Inc.). While such sites allow a buyer to purchase a certificate online, the range of merchants they support is only a small subset of the already small number of merchants who offer traditional paper-based certificates. Such sites inventory the paper-based gift certificates, and offer the certificates to buyers through the web site. When a paper-based certificate is purchased through the site, funds are typically transferred from the buyer at the time of the transaction, and the stocked paper-based certificate is then sent to the designated recipient. While such sites offer a variety of gift certificates for purchase, the certificates are required to initially be established (i.e. printed and recorded) by each of the businesses, and are then transferred to the site (such as by a purchase transaction), where they are inventoried. While large business entities may have already established paper-based certificates, small issuers (e.g. such as small or localized businesses) often do not have certificate systems of their own.

  • A similar on-line business, located at “www.gifttracker.com”, provides gift certificates which may be purchased online and redeemed locally. The site provides a redemption and retail location search engine, by which an online shopper may search for certificates, based upon redemption type (e.g. such as by toys, books, sports equipment, or women's apparel), as well as by location (e.g. such as by entering by zip code). For a given product type, an online shopper typically enters a zip code (such as the zip code of the shopper, or the postal zip code of a potential recipient of a gift certificate). Based upon the entered postal code, the search engine determines gift certificates which may be redeemed locally within the submitted postal area. While the certificate system implemented by gifttracker.com provides the online purchase of certificates which may be redeemed locally, the system requires an inventory of printed certificates which are supplied by the issuers (e.g. such as conventional printed certificates available from large chain stores). After an on-line purchase transaction, the pre-printed certificates are then packaged and sent to a designated address (e.g. such as the acquirer's address, or an alternate recipient address). Once a pre-printed certificate arrives, such as by a conventional mail service, the pre-printed certificate is then taken by the recipient to a corresponding store. The site does not allow the on-line creation of a remote, electronic gift certificates, such as for issuers that do not have pre-printed certificates. As well, the system inherently requires an associated inventory and distribution system for the pre-printed gift certificates.

  • Another web-based company which sells certificates is located at “www.webcertificates.com”, which enables recipients of a certificate to redeem the certificate from a wide variety of on-line merchants. The site creates a certificate which is similar to a virtual credit card, which is then readily accepted by a wide variety of on-line merchants who accept credit cards as payment for their products and services. However, recipients are required to access the Internet, follow detailed instruction to retrieve their online certificate, and then are required to redeem the certificate at an online location, wherein a product is then shipped.

  • In an alternate embodiment of a conventional online gift certificate site, a buyer may purchase a “generic” gift certificate, which is then typically given as a gift to a recipient, whereby the generic gift certificate is supplied with a tracking number (which may be sent to a recipient, or may be e-mailed to the recipient?). The recipient may then log on to the gift certificate site, and “redeem” the generic gift certificate by selecting one or more specific gift certificates, which in sum are equal to the designated value of the original generic certificate. However, as with other online business which offer paper-based certificates for sale, the specific certificates are limited to an actual inventory of paper-based gift certificates which are available at that site. Upon redemption of the generic certificate, the specific certificate or certificates are then physically sent to the redeemer.

  • Another web-based company which sells gift certificates is located at “www.flooz.com”, which enables an on-line buyer to purchase and send “on-line” currency, which is only available and usable on the Internet. When a buyer sends a recipient the “on-line” currency, such as by electronic mail, the recipient can then spend the “on-line” currency at one or more online sites which are registered to accept the “on-line” currency for online commerce.

  • In present embodiments of online commerce, buyers and sellers are linked electronically, at some point in the process, and merchandise (or redeemable paper-based certificates) are shipped to the buyer or alternate recipient, such as from a central warehouse linked to the seller. In such embodiments, there are inherent shipment costs, and there is often shipment delays.

  • On-line Ticketing Systems. In conventional networked commerce sites which offer tickets (e.g. such as for travel, sports, or entertainment), when a computer user purchases tickets online, a selling sites typically provides the buyer with a serial number (i.e. such as a confirmation or tracking number, or even a general ticket number), such as through an e-mail notification. To receive the tickets, the buyer is then typically required to submit the confirmation or number at a will-call booth, whereby the submitted confirmation number is matched to the tickets (which may be previously printed, or may be printed upon redemption). If the submitted number is correctly matched to the tickets, the tickets are then given to the redeeming person. While such conventional online systems allow the online purchase of tickets, as well as the local pick-up of the purchased tickets, money is typically transferred upon the initial on-line acquisition of the tickets, and whereby anyone submitting the correct tracking number may be given the tickets. The single tracking number is confirmed off-line at the will-call booth and, is not authenticated with the on-line site.

  • The disclosed prior art systems and methodologies thus provide basic certificate systems, but fail to provide a secure certificate system in which allows issuers to create an virtual inventory of certificates, which may then be acquired online, and then redeemed locally. It would also be advantageous to provide a certificate system which allows customers to establish a private key that is unique to the transaction, which is subsequently used in a redemption transaction to authorize the local redemption with the online system. The development of such a certificate system would constitute a major technological advance.

  • SUMMARY OF THE INVENTION
  • A transaction network contains a networked certificate authority, by which one or more virtual certificates may be remotely defined and stored, such as by an issuer user through a issuer web portal interface. The virtual certificates correspond to a product or service denomination which is selected by the issuer, include a public key identifier. An acquirer user may locate and acquire one or more virtual certificates, through an acquirer web portal interface. When a virtual certificate is acquired by an acquirer, a corresponding private key is established by the acquirer, and is stored at the certificate authority in association with a record of the acquired certificate. As well, when the certificate is acquired, the acquirer typically submits payment agent information (e.g. such as credit card information). In one embodiment, funds are transferred during acquisition of the certificate. In a preferred embodiment, authorization for the transfer of funds occurs during the acquisition transaction. Certificate information is typically transferred to the acquirer, or to an alternate recipient, by which the holder of the certificate can redeem the certificate at a redemption location associated with an acquired certificate. The acquirer (or an alternate recipient of an acquired certificate to whom the acquirer has communicated the established private key), submits the certificate information at the redemption location, along with the established private key, to redeem the certificate. Include redemption authorization here and revoke of certificate.

  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1

    is a system block diagram of a transaction network for the issuance, acquisition and redemption of single-use certificates;

  • FIG. 2

    shows a single-use gift certificate;

  • FIG. 3

    is a schematic view of a single-use gift certificate identification packet;

  • FIG. 4

    shows a redemption process for a single-use gift certificate having an identification packet and an associated private key;

  • FIG. 5

    is a schematic block diagram of issuer facility options;

  • FIG. 6

    is a schematic block diagram of acquirer facility options;

  • FIG. 7

    is a schematic block diagram of transaction information data entry;

  • FIG. 8

    is a schematic block diagram of redeemer facility options;

  • FIG. 9

    shows the creation of virtual certificates by an issuer on at a certificate authority server;

  • FIG. 10

    shows an issuer virtual certificate creation module interface;

  • FIG. 11

    shows a graphic user interface for an issuer virtual certificate creation module;

  • FIG. 12

    is a block diagram of a virtual inventory stored within a database;

  • FIG. 13

    is a block diagram showing a site virtual inventory at an aggregate network site, and a search subset of the site virtual inventory directed by a search command at an acquirer terminal;

  • FIG. 14

    is a block diagram of an acquisition transaction module at an acquirer terminal, which is accessible from a selection of a virtual certificate from one or more alternate sites;

  • FIG. 15

    shows an embodiment of a partial certificate transaction network having a plurality of issuers, a plurality of acquirers, and a remote certificate authority; and

  • FIG. 16

    shows an embodiment of a partial certificate transaction network having a plurality of acquirer terminals, and an issuer terminal having a dedicated certificate authority.

  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • FIG. 1

    is a system block diagram of a

    transaction network

    10 for the issuance, acquisition and redemption of single-use certificates 60 (

    FIG. 2

    ). The

    transaction network

    10 contains a

    networked certificate authority

    12, through which one or more

    virtual certificates

    60 are remotely created, such as by an issuer user ISR (

    FIG. 9

    ) through issuer facilities 24 (e.g. such as through a web portal interface). The

    virtual certificates

    60 typically correspond to sellable commodity, such as a product or service denomination, which is selectable by the issuer user ISR. In an alternate embodiment, the

    virtual certificates

    60 may correspond to a distributable commodity, such as a discount coupon for a product or service, or a reservation (e.g. such as for travel or dining), which is selectable by the issuer user ISR. Created

    virtual certificates

    60 are stored on a

    database

    18 which is associated with the

    networked certificate authority

    12.

  • An acquirer user ACQ (

    FIG. 6

    ), accessing the

    transaction network

    10 through an

    acquirer terminal

    26, may locate and acquire one or more

    virtual certificates

    60, through an acquirer facilities 28 (e.g. such as a acquirer web portal interface). When a

    virtual certificate

    60 is acquired by an acquirer user ACQ, a corresponding

    private key

    76 is established by the acquirer user ACQ, and is stored at the certificate authority 12 (e.g. such as within the database 18), in association with a record of the acquired

    certificate

    60, along with other identifying

    information

    98 for the acquired

    certificate

    60.

  • As well, when a

    virtual certificate

    60 is acquired, the acquirer user ACQ typically submits payment agent information 52 (e.g. such as credit card information). In one embodiment, funds are transferred during acquisition of the

    certificate

    60. In a preferred embodiment, authorization for the transfer of funds occurs during the

    acquisition transaction

    72. Certificate information 98 (

    FIG. 3

    ) is typically transferred to the acquirer user ACQ, or to an alternate recipient RCP, by which the holder of the acquired

    certificate

    60 can redeem the

    certificate

    60 at a redemption location RL (

    FIG. 4,8

    ) associated with an acquired

    certificate

    60. The acquirer ACQ (or an alternate recipient RCP of an acquired

    certificate

    60 to whom the acquirer user ACQ has communicated the established private key 76), submits the certificate information at the redemption location, along with the established private key, to redeem the certificate. Include redemption authorization here and revoke of certificate.

  • Creation of Virtual Certificates.

    FIG. 2

    shows a single-

    use certificate

    60, which may preferably be delivered in a printable form, either to an acquirer user ACQ, or to an alternate recipient RCP. A single-

    use certificate

    60 typically includes one or

    more design elements

    62, a

    denomination

    64, one or

    more redemption rules

    66, and identification information 74 (

    FIG. 3

    ), which may include human

    readable information

    68, and/or machine readable information 70 (e.g. such as a bar code symbol 70). An

    issuer user ISR

    22 at an

    issuer terminal

    22, in selective electronic communication with a

    certificate authority

    12, has the means (i.e. issuer facilities) 24 to direct the

    certificate authority

    12 to create one or more customized

    virtual certificates

    60, for subsequent issuance to acquirer users ACQ at one or

    more acquirer terminals

    26.

  • Establishment of Defined Virtual Certificates. Authorization for the construction of certificates typically occurs through an

    issuer facility

    24, such as through a

    web portal

    24 for a

    transaction network

    10 operating across an

    internet

    192, whereby an issuer user ISR (e.g. such as a merchant, or a product manager for a plurality of stores RL) connects to the certificate authority 12 (i.e. such as through a

    certificate server portion

    14 of a certificate authority 12).

  • The issuer user ISR defines detailed specifications for virtual single-

    use certificates

    60 through a certificate specification interface 194 (

    FIG. 10

    ), such as

    design specifications

    62 and

    redemption rules

    66, whereby the

    certificates

    60 typically reflect sellable or distributable commodities, such as products and/or services which are available for pick up by a customer, typically at a redemption location RL (e.g. such as at a retail store, a distribution center, a box office, a ticket counter, or at a service provider).

  • An

    issuer user ISR

    22 has the means 122 (

    FIG. 5

    ) to control the modular design of one or more

    virtual certificates

    60 a-60 n independently, either by selecting standard designs offered by the

    certificate authority

    12, by uploading 122 one or

    more custom designs

    62 a-62 n to the

    certificate authority

    12, in the form of a computer file, or by specifying that a

    certificate

    60 be issued using a combination of

    stock elements

    162 uploaded through the

    issuer terminal

    22. An issuer user may preferably incorporate the

    denomination

    64 of the

    certificate

    60 as an additional element in the

    certificate identification packet

    74. Additionally, an issuer user ISR may preferably incorporate an additional public

    key segment

    82, as a part of the

    certificate identification packet

    74, which may be used, for example, in mapping a

    certificate

    60 to an issuer's coding scheme (e.g. such as to correspond to product serial numbers, part numbers, product color codes, product size, or service codes).

  • Storage of Virtual Certificates. Each

    virtual certificate

    60 exists, until issued, as a

    virtual certificate

    60 comprised of multiple independent

    textual elements

    64,66 and/or

    graphical elements

    62 a-62 n, which are stored by the

    certificate authority

    12, in the

    secure database

    18.

  • In one embodiment of the

    certificate system

    10, the

    certificate authority

    12 comprises two functional servers, a

    certificate server

    14, as well as an

    authentication server

    16. In alternate embodiments, a single

    certificate authority server

    12 may perform both certificate establishment functions, as well as certificate redemption functions. In another alternate embodiment, the

    certificate authority

    12, the

    certificate module

    14, the

    authentication module

    16, and the

    certificate database

    18 are integral modules within a certificate authority terminal 58 (

    FIG. 12

    ).

  • Acquisition of Certificates and Establishment of Keys.

    FIG. 3

    is a schematic view of an

    acquisition transaction

    72 for a single-

    use certificate

    60.

    identification packet

    74. During an

    acquisition transaction

    72, an acquirer user ACQ typically provides a means to purchase the certificate, an authorization to purchase during subsequent redemption transaction 104 (

    FIG. 4

    ), or otherwise qualifies for issuance of the acquired

    certificate

    60.

  • Certificate acquisition instructions are initially defined by an issuer user ISR at an

    issuer terminal

    22, and are stored at the

    certificate authority

    12, in association with each virtual certificate. Preceding an

    acquisition transaction

    72, an acquirer user ACQ at an

    acquirer terminal

    26, by means of the

    acquirer facilities

    28, typically searches for or browses through a plurality of

    virtual certificates

    60, (i.e. a virtual inventory). An acquirer user ACQ, upon selecting an acceptable

    virtual certificate

    60, may selectably begin an

    acquisition transaction

    72 to acquire the

    virtual certificate

    60.

  • Before an

    acquisition transaction

    72, a

    virtual certificate

    60 to be acquired is constituted from the

    independent data elements

    62,64,66, 68,70 for the

    virtual certificate

    60, which are stored in the

    secure database

    18, for presentation to the acquirer user ACQ at an acquirer computer terminal 26 (e.g. such as in the form of an HTML document readable through

    acquirer facilities

    28 by an internet browser application). However, after a

    certificate

    60 is acquired during an

    acquisition transaction

    72, the

    independent data elements

    62,64,66,68,70 are bound together within the

    database

    18.

  • During an

    acquisition transaction

    72, in which the

    certificate authority

    12 issues a

    certificate

    60 to the acquirer user ACQ, a

    unique identifier

    98 is bound to the issued

    certificate

    60, typically comprising

    certificate information

    74, which appears on the acquired

    certificate

    60, which typically includes a

    denomination

    64, and a secret

    public key

    80 assigned by the certificate authority. In a preferred embodiment, the

    certificate information

    74 includes a supplementary public

    key segment

    82, which is assigned by an issuer user ISR. The

    certificate information

    74 typically appears on the acquired

    certificate

    60 through a printed

    number

    68, or through an encoded symbol, such as a bar code 70 (

    FIG. 2

    ). The

    unique certificate identifier

    98 includes the elements associated with the

    certificate information

    74, in combination with a

    private key

    76, which is assigned to the

    certificate

    60 by an acquirer user 92, as a part of the

    acquisition transaction

    72.

  • The

    private key

    76, which is assigned to the

    certificate

    60 by an acquirer user 92, does not appear on the

    certificate

    60, and is known only to the acquirer user ACQ, but is stored by the

    certificate authority

    12, in association with the other data elements relating to the

    certificate

    60, on the

    secure database

    18.

  • Redemption of Certificates.

    FIG. 4

    shows a redemption process 90 for a single-

    use gift certificate

    60 having a submitted

    identification packet

    98, which includes and an associated

    private key

    76. The

    private key

    76 must be provided to the

    redeemer

    36 as part of the redemption process 90 by the acquirer user ACQ (

    FIG. 4

    ), or by a third party and/or agent to whom the acquirer ACQ has communicated the

    private key

    76. A redemption clerk RC, such as a sales clerk, through a

    redeemer terminal

    36, in communication with the

    certificate authority

    12, by means of the

    redeemer facilities

    38, or optionally, by means of a live operator intermediary 42, may authenticate a

    certificate

    60, by providing the

    certificate authority

    12 with the

    unique identification information

    98 associated with the acquired certificate 60 (i.e. both the

    public keys

    80,82 assigned to the certificate upon issuance, a

    denomination

    64, as well as the unique

    private identification information

    76 which is assigned to the

    certificate

    60 by the acquirer user. ACQ (i.e. the private key 76).

  • In alternate embodiments of the

    certificate system

    10, either the redemption clerk RC or the holder of the acquired

    certificate

    60 can manually or automatically upload the

    certificate information

    76 during a redemption process 90, such as through a point of

    sale terminal

    40. As well, either the redemption clerk RC or the holder of the acquired

    certificate

    60 can enter the private

    key PIN

    76 into a point of

    sale terminal

    40.

  • Authorization of Certificate During Redemption. The

    certificate authority

    12 authenticates a

    certificate

    60, on the basis of the certificate identification packet 74 (which includes the

    public key

    80 and supplementary public key 82), and the

    private key

    76 submitted by a redemption clerk RC, such as through

    redemption terminal

    36. As seen in

    comparison step

    100 in

    FIG. 4

    , the

    certificate authority

    12 queries the

    secure database

    18, which stores the independent elements associated with the acquired

    certificate

    60, to determine whether the

    certificate identification packet

    74 and the

    private key

    76 originally associated with the

    certificate

    60 on issuance matches the

    certificate identification packet

    74 and

    private key

    76 identification information provided to the

    certificate authority

    12 by the redeemer, as shown in matching

    step

    102. If the unique identification sets correlate 103, the

    certificate authority

    12 validates the

    certificate

    60, and upon instructions by the redemption clerk RC, authorizes the

    redemption transaction

    104. If the unique identification sets do not correlate 105, the

    certificate authority

    12 typically cancels 106 the

    redemption transaction

    104, either by requesting that the acquirer ACQ resubmit the

    certificate information

    74 and the

    private key

    76, or by revoking the certificate 60 (e.g. such as if the

    certificate

    60 has previously been marked as used).

  • Authorized Redemption Transaction and Cancellation of Single-Use Certificate. Upon a

    successful authorization transaction

    104 of an acquired

    certificate

    60, the

    certificate authority

    12 allows the redemption clerk RC to proceed with redemption of the

    certificate

    60, and revokes the single-use certificate 60 (i.e. thus preventing further use of the

    certificate information

    74,76). The certificate authority revokes the

    certificate

    60 by updating the certificate information stored on the secure database 18 (e.g. by marking the certificate as “used”). In one embodiment of the

    certificate system

    10, the

    certificate authority

    12, by means of

    certificate payment facilities

    48, initiates the transfer of payments between the parties of the

    acquisition transaction

    76 and the

    redemption transaction

    104, by issuing transfer instructions to the

    certificate payment agent

    58, the

    acquirer payment agent

    52, the issuer payment agent 54, and the

    redeemer payment agent

    56.

  • When a

    redemption transaction

    104 is successfully authorized by the

    certificate authority

    12, the

    certificate authority

    12 preferably downloads a transaction code 181 (

    FIG. 8

    ) to the

    redemption terminal

    36, which preferably becomes part of a redemption record 41 (

    FIG. 1

    ) by the redemption location RL, and is also preferably transferred to the acquirer user ACQ or alternate recipient RCP (e.g. such as within a redemption receipt 41).

  • Virtual Certificate Creation Options.

    FIG. 5

    is a schematic block diagram 100 of issuer facility options, which includes initial registration of

    new issuers

    112,

    secure entry

    114 into the

    transaction network

    10, an issuer certificate parameter module, and an

    issuer report module

    116.

  • Registration of Issuers. An issuer ISR who is not previously registered as a client with the

    certificate authority

    12 is preferably guided through a

    registration process

    112, during which the issuer user is required to input relevant information (e.g. such as the name of the issuer user, the business name, one or more redemption locations RL, as well as relevant banking information). The preferred registration of issuers allows the

    certificate authority

    12 to confirm that the issuer is a legitimate entity (i.e. such as an existing, valid business), and that the issuer is offering real goods and services. As well, the

    preferred registration process

    112 includes the input of banking information related to issuers, such that funds may be properly transferred to issuers, from acquirers, such as when an acquired

    certificate

    60 is redeemed at a redemption location RL.

  • The

    registration process

    112 also typically includes a registration validation step, by which the

    certificate authority

    12 or other independent entity checks pertinent registration information, such as bank account information, credit references, or merchant identification number. Based upon a

    successful registration step

    112 and validation step, the

    certificate authority

    12 preferably assigns an

    access number

    113 to the new issuer, and sends the a registration notification and access number to the new issuer (e.g. such as by an e-mail notification). In an alternate embodiment, a new issuer ISR, having submitted a valid merchant number at

    registration step

    112, may automatically gain an access number and subsequent access to the certificate authority.

  • Issuer Access. When an issuer is properly registered with the

    certificate authority

    12, the issuer user ISR may gain ongoing access to the

    certificate authority

    12. A registered issuer user ISR typically inputs the previously established unique

    issuer access code

    113, to log 114 onto the

    certificate authority

    12.

  • Creation of Certificate Parameters. An issuer user ISR at an

    issuer terminal

    22, in secure communication with the certificate authority 12 (e.g. such as through

    initial registration

    112 or a subsequent log on process 114), by means of issuer facilities 24 (e.g. such as through a web portal), can direct a large variety of

    certificate parameters

    115. While an issuer user ISR may direct the creation of

    virtual certificates

    60 through the selection of standard certificate elements 62-70, the issuer user ISR may optionally upload discrete data elements 62-70 to the

    certificate authority

    12, which are unique to the issuer ISR, for storage as stored elements associated with one or more

    virtual certificates

    60, or may otherwise direct certificate parameters, at

    step

    115, by selection of options offered by the

    certificate authority

    12.

  • At issuer

    information selection step

    118, the issuer preferably selects or

    uploads issuer information

    118, such as company information, or promotional information.

    Issuer information

    118 may be preferably included within a

    virtual certificate

    60, or may be included as information at a network site offering selection of the

    appropriate certificate

    60. For example, a web page which includes a selectable certificate for a business typically includes

    other issuer information

    118 to describe the business, or to describe the selectable commodity, such as a product or service description.

  • At

    denomination selection step

    120, the issuer preferably selects or uploads denomination parameters for a

    virtual certificate

    60. The denomination 78 may be in the form of a currency denomination, or in the form of a code associated with a product, a service, a coupon, a voucher, or other instrument for which the an acquired

    certificate

    60 may be redeemed. The issuer may preferably authorize 120 the

    certificate authority

    12 to issue

    certificates

    60 within a set range of selectable denomination, or authorize the creation of

    virtual certificates

    60 with a value determined by an acquirer user ACQ.

  • Examples of

    virtual certificates

    60 that can be offered to acquirers by the

    certificate authority

    12 on behalf of issuers include certificates denominated as full payment in exchange for an item and/or service (e.g. such as a gift certificate which is redeemable for an item and/or service, or a ticket or coupon voucher redeemable for an actual ticket),

    certificates

    60 which may be redeemed as partial payment for a particular item or service, denominated as a currency amount (e.g. such as a gift certificate denominated in a currency amount); or a

    certificate

    60 redeemable for currency, denominated in a currency amount (e.g. such as a “traveler's check”).

  • At issuer

    artwork selection step

    122, the issuer preferably selects or uploads

    artwork graphics

    62 a-62 n which may be unique to the issuer (e.g. such as logos, trademarks, or other artwork, such as borders, illustrations, or photographs). The

    artwork graphics

    62 a-62 n to be uploaded are typically uploaded in the form of graphics files 62 a-62 n (

    FIG. 2

    )(e.g. such as in TIFF, PICT or EPSF file formats), which are associated with an issuer ISR, a redemption location RL, a product or service, or

    basic certificate artwork

    62.

  • At redemption rule

    information selection step

    124, the issuer preferably selects or uploads

    redemption rules

    66, such as an expiration date, any exclusion of redemption on the basis of geographic location, or

    other redemption rules

    66 unique to the issuer. As seen in

    FIG. 2

    ,

    redemption rule information

    66 may be included as printed information on an acquired

    certificate

    60.

  • At issuance restriction

    information selection step

    126, the issuer preferably selects or uploads issuance restrictions to the

    certificate authority

    12, such as to limit the number of acquired

    certificates

    60 a-60 n to be issued by the

    certificate authority

    12 on behalf of the

    issuer

    22, such as within a specified time frame, within a geographic region, or on the basis if other criteria unique to the issuer.

  • At issuance certificate identification

    parameter selection step

    128, the issuer preferably selects or specifies the format of unique certificate public key identification 82 (

    FIGS. 3,4

    ). For example, the issuer may require unique certificate public

    key identification

    82 which corresponds to existing product codes, inventory, or existing issuer certificate systems. Therefore, the issuer may optionally select, enter or upload certificate identification public

    key parameters

    82, to be combined with certificate identification public key information 82 (

    FIG. 3

    ) assigned by the

    certificate authority

    12.

  • Issuer Reports. If an issuer user ISR has already created

    certificates

    60, the issuer user ISR, through the

    report interface

    116, can view, print, or download reports based upon previously created

    virtual certificates

    60, acquired certificates, or for redeemed

    certificates

    60. An issuer user ISR, at an

    issuer computer

    22, is preferably provided with

    report options

    116 to request, view, print, or download, in near real time, various reports relating to certificate parameters, issuance, redemption, and other information.

  • For example, at

    certificate review step

    130, an issuer may preferably review existing parameters and data elements associated with a

    virtual certificate

    60 or a series of

    virtual certificates

    60 a-60 n. At issued certificate review step 132, an issuer may preferably review, print, or download information regarding issued certificates. At redeemed certificate review step 134, an issuer may preferably review

    information regarding certificates

    60 which have been redeemed and/or revoked (***Steps 134,136, corresponding to steps 5-13,5-14 in original drawings, appear to be the same. Is there a correction that should be made here?***).

  • Acquirer Options.

    FIG. 6

    is a schematic block diagram 140 of acquirer facility options. An acquirer user ACQ at an

    acquirer terminal

    26, through acquirer,

    facilities

    28, in a secure communication with the

    certificate authority

    12, such as through a registration or

    logon step

    142, is preferably provided with

    certificate acquisition options

    144, such as the means to browse through or search 148 for virtual certificates 60 (to be assembled from the discrete elements) stored on the

    database

    18 by a

    certificate authority

    12, and to direct

    various parameters

    144 regarding issuance of one or

    more certificates

    60. For a virtual certificate which an acquirer user ACQ proceeds to acquire, the acquirer user ACQ enters transaction information at

    transaction step

    150.

  • For previously acquired

    certificates

    60 which have not been redeemed, the acquirer may preferably be able to cancel the

    certificate

    60, at

    cancellation step

    151. As well, for previously acquired

    certificates

    60 which have not been redeemed, the acquirer user may preferably request a replacement for a certificate (e.g. such as for a lost or destroyed certificate). At

    customization step

    153, the acquirer user ACQ may preferably be given customization choices, such as integrating an acquired

    certificate

    60 within a printed card, or modifying the artwork to display other information (e.g. such as the name of an alternate recipient RCP). In addition, for previously acquired

    certificates

    60 which have not been redeemed, an acquirer user ACQ may access reports, at

    step

    146, regarding acquired certificates. For example, at redemption

    location report step

    154, an acquirer user may view, print, or download a list of alternate redemption locations RL, or supplementary information regarding the redemption locations RL (e.g. such as a map), for an acquired

    certificate

    60.

  • Certificate Acquisition and Input of Acquirer Information.

    FIG. 7

    shows a detailed

    acquisition transaction process

    150, by which an acquirer user may direct a

    certificate authority

    12 to issue one or more selected

    certificates

    60 a-60 n from an inventory of available

    virtual certificates

    60. An acquirer typically receives an issued

    certificate

    60, in exchange for an authorization to charge the acquirer upon certificate redemption, for payment at the time of acquisition, or on the basis of other acquirer qualifications. An acquirer may upload other necessary instructions and

    transaction information

    162 to the

    certificate authority

    12, which are then stored (e.g. such as in database 18) as additional independent elements associated with the issued

    certificate

    60. Acquirer entered

    transaction information

    162 typically includes name and address

    information

    164, credit card or

    other information

    166 associated with the acquirer's

    payment agent

    52,

    assignment

    170 by the acquirer of the secret private key 76 (

    FIG. 3

    ) to be associated with the selected

    certificate

    60, and a selected

    delivery method

    172 for the

    certificate

    60.

  • The acquirer is typically prompted (e.g. such as by a required data entry field or a dialog box) to input the private key 76 (e.g. such as a personal identification number (PIN) into the system. The acquirer is preferably prompted to enter the

    private key

    76 twice, to verify that the acquirer user has correctly entered a known private key), to be stored in association with the

    certificate

    60. In a preferred embodiment of the

    certificate system

    10, an acquirer may specify that the

    private key

    76 to be associated with an issued

    certificate

    60 be comprised of other identification information associated with the transaction, such as an account number which associates the acquirer with the acquirer's payment agent 52 (e.g. a credit card number), or a debit card number. As well, an acquirer user ACQ may preferably select and/or specify a

    denomination

    168 for an acquired certificate 60 (e.g. such as a currency amount), typically by selecting from among denominations presented by an issuer. In a preferred embodiment of the

    certificate system

    10, the

    certificate authority

    12 sends a confirming e-mail to the acquirer.

  • When the acquisition of a

    certificate

    60 is complete, the

    certificate authority

    12 preferably allows the acquirer to preview of a printed version of the

    certificate

    60, and typically presents

    certificate delivery options

    172 to the acquirer, such as the transfer of a downloadable PDF file to the

    acquirer terminal

    26, the e-mail of

    certificate information

    98 to the acquirer terminal 26 (or to an alternate recipient RCP), the

    facsimile transmission

    32 of a certificate, an

    electronic encoding

    34 of a smart-card based certificate, or the electronic transfer of the certificate to a

    redeemer computer

    36 at a desired redemption location RL.

  • The acquirer can send an e-mail or other message to a recipient (e.g. such as for a gift certificate), directing the recipient to log on and pick up the certificate, either for printing, such as at the recipient's computer, at the redemption location RL, or at a third party (e.g. such as at a third party mail service provider). If no hard-copy of the acquired

    certificate

    60 is desired, or if printing is not feasible, the certificate information can be transferred directly to the issuer merchant's computer (e.g. a paperless electronic certificate), by which the acquirer ACQ or alternate recipient RCP need only to visit a redemption location RL, and supply the private key PIN number to the redemption clerk RC.

  • Examples of alternate delivery methods for an acquired

    certificate

    60 which may be specified by an acquirer ACQ include downloading of the

    certificate

    60 as an electronic file (e.g. such as within a portable document format (PDF) file (by ACROBAT™, of Adobe Systems, Inc., of San Jose Calif.), or as an electronic description transferred via the acquirer's

    computer

    26 to a

    transaction card encoder

    34, or for printing on a

    printer

    30 connected to the acquirer's

    computer

    26, or for subsequent printing later by the acquirer user.

  • A redeemer (i.e. a store clerk) typically needs only the certificate information 74 (which includes the denomination 78 of the

    certificate

    60 and

    public keys

    80,82), in combination with the acquirer's

    private key

    76, to validate an acquired

    certificate

    60. Hence, an issuer may request that a

    certificate

    60 be delivered in the form of an e-mail, containing only these items, or as encodeable “smart card” data that can be magnetically stored by the acquirer using a “smart card” encoder-34 attached to the

    acquirer computer

    26 or other communication device.

  • An alternate

    preferred delivery option

    172 which an acquirer may specify is that an acquired certificate be printed by the

    certificate authority

    12, and delivered by a postal service or other delivery service, to an address specified by the acquirer user ACQ (the typically the address of the acquirer ACQ, or the address of an alternate recipient RCP, such as if the acquired

    certificate

    60 is intended as a gift certificate).

  • An alternate

    preferred delivery option

    172 which an acquirer may specify is that an image (e.g. such as a TIFF file) of an acquired

    certificate

    60 be faxed by the

    certificate authority

    12, to a facsimile (fax) machine designated by the acquirer user ACQ (typically a

    facsimile machine

    32 associated with the acquirer ACQ, or a

    fax machine

    32 associated with an alternate recipient RCP).

  • As seen in

    FIG. 6

    , until an acquired certificate is redeemed, an acquirer preferably has the ability to cancel 152 a previously acquired

    certificate

    60, or to request that an acquired certificate be revoked and replaced 153 by a

    new certificate

    60. For example, if an acquirer user accidentally damages, destroys, or loses a previously printed acquired

    certificate

    60, the acquirer may simply print out a

    new certificate

    60, or have a new certificate delivered or faxed, and may either retain the previously stored

    private key

    76, or may specify a new

    private key

    76.

  • Since an acquired

    certificate

    60 may only be used for redemption once (at which time further use is revoked), there is no financial risk to the issuer ISR in the use of replacement certificates. As well, even if a certificate is lost and retrieved by a second party, or is stolen, the lost acquired certificate is unredeemable, without submittal of the

    private key

    76, which is not included as printed information on a

    certificate

    60.

  • As shown in

    FIG. 6

    , an acquirer is preferably allowed to query the

    secure database

    18 for

    available redemption locations

    154 for an acquired

    certificate

    60, typically on the basis of a geographic screening. The acquirer may request

    redemption locations

    154 when the certificate is acquired, and is preferably provided with ongoing access to redemption locations 154 (such as if an alternate redemption location is desired, and is allowed by the redemption rules 66 for an acquired

    certificate

    60.

  • Prior to acquisition, the virtual certificate is 60 merely a defined product or service, associated with an authorization to produce a certificate, as defined by an issuer, for the defined product or service. However, after the acquisition transaction is completed, the

    certificate

    60 then exists as an established entity within the

    database

    18, thereby becoming a token which directly corresponds to the corresponding defined product or service, which is to be surrendered by the seller to the holder of the

    certificate

    60 at the time of a completed

    redemption transaction

    104.

  • In addition to the previously defined

    public keys

    80,82 and private key identifiers, upon issuance of an acquired certificate, the

    certificate authority

    12 preferably creates or assigns a unique issued certificate number (e.g. such as certificate “XYZ-203-4067”) which corresponds to the acquired

    certificate

    60, as well as to the collection of the defined elements of the certificate 60 (e.g. such as the associated

    graphics

    62, redemption rules 66, and denomination 78), which are bound within the

    database

    18 after the acquisition transaction.

  • In a preferred embodiment, the

    certificate authority

    12 communicates the

    acquisition transaction

    72 to the issuer (e.g. such as through issued certificate reports 132), such that the product or service which is to be received upon redemption may be held (i.e. reserved). For a product within an inventory at a redemption location, the product may preferably be placed on hold. For a designated service, the issuer may preferably use the acquisition information to schedule personnel or equipment, or to limit the further sale of goods or services (e.g. such as for an airline flight, which has a limited number of seats available for a scheduled flight and time).

  • Before the

    acquisition transaction

    72, the

    virtual certificate

    60 is merely an authorization to construct a

    certificate

    60, wherein the

    virtual certificate

    60 is typically stored as a product or service category within a virtual inventory of other virtual certificates. If a certificate is never acquired, there is no effect upon a real inventory. If an inventory of real goods an services (or associated cost structures) change for an issuer, they may simply reaccess the

    certificate system

    10, and remove or edit previously defined

    virtual certificates

    60, or create

    other certificates

    60 which reflect their current goods, services, or cost structures.

  • For example, for an issuer/merchant who has a limited number of products available (e.g. such as three mission-style coffee tables), the issuer ISR would preferably limit the availability of

    virtual certificates

    60, as a

    redemption rule

    66 at issuer facility step 124 (

    FIG. 5

    ). If an acquirer user ACQ acquires a certificate for such a commodity having a limited availability, the

    certificate authority

    12 preferably limits the acquisition to the defined virtual inventory. As well, for an issuer ISR which creates

    virtual certificates

    60 for a plurality of redemption locations RL, the issuer may preferably create

    virtual certificates

    60 which are unique to one or more of the redemption locations. For example, a first redemption location RL may sell products which are not available at a second similar redemption location RL, or the selling price for a product may be different at different redemption locations. For

    virtual certificates

    60 which are defined as virtual coupons (e.g. such as for a discount at a redemption location RL), an issuer can preferably define different discount rates for different redemption locations RL.

  • Certificate Redemption.

    FIG. 8

    is a detailed schematic block diagram 174 of redeemer facility options. A redemption clerk RC (e.g. such as a sales clerk at a redemption location), establishes electronic communication with a

    certificate authority

    12 through

    redeemer facilities

    38. As seen in

    FIG. 1

    , the

    redeemer facilities

    38 are typically accessed through a

    redeemer computer terminal

    36, a

    redeemer POS terminal

    40, or by a telephone 44 (either by using a keypad driven menu, or through a live operator intermediary 14).

  • When an acquirer user ACQ (or alternate recipient RCP) desires to proceed with a redemption transaction 90 at a redemption location, the acquirer user ACQ typically hands the printed

    certificate

    60 to a redemption clerk RC, and communicates the

    private key

    76. The redemption clerk RC then validates the issued

    certificate

    60, to obtain a

    redemption authorization code

    181 from a

    certificate authority

    12 to redeem the

    certificate

    60, thereby performing a

    certificate authentication

    178. In a preferred embodiment of the certificate system, the acquired certificate includes redemption instructions 66 (i.e. terms of service instructions), which a redemption clerk RC preferably follows to redeem the acquired

    certificate

    60. The redemption clerk RC uploads 180

    certificate information

    98 to the

    certificate authority

    12, which typically includes the certificate denomination 78, the

    public keys

    80,82, as well as the private key 76 (which is submitted separately by the acquirer user ACQ).

  • In a preferred embodiment of the

    certificate system

    10, communication of redemption information 98 (e.g. such as communication of the required

    public keys

    80,82,

    private key

    76 and denomination 78) of the

    certificate

    60 to the

    certificate authority

    12 is made by an

    electronic link

    39 with a point-of-sale (POS)

    terminal

    40 and/or a

    card code scanner

    40, a

    redeemer computer

    36, or by other means having the ability to establish an

    electronic link

    39 with the

    certificate authority

    12. For example, a redemption clerk RC preferably uses a bar code image scanner or

    other POS terminal

    40 to determine the

    redemption information

    98, while the acquirer ACQ typically enters the private key 76 (e.g. such as a PIN number) into a keypad of a

    POS terminal

    40.

  • In a

    redemption system

    174 which comprises a

    telephone terminal

    44, the communication of the

    redemption information

    98 of the

    certificate

    60 to the

    certificate authority

    12 may be made using a touch-tone telephone keypad on the

    telephone

    44, or by live-phone contact to an

    operator intermediary

    45 in communication with the

    certificate authority

    12.

  • Authorization of Certificate Redemption. Upon authentication of the certificate by the

    certificate authority

    12, on the basis of a correlation of the

    unique certificate identification

    74 in combination with the acquirer's private

    key PIN

    76 with the transaction records associated with the

    certificate

    60 stored in the

    secure database

    18, the

    certificate authority

    12 authorizes the redemption, and revokes the

    certificate

    60.

  • In a preferred embodiment of the

    certificate system

    10, upon authentication of a

    certificate

    60, the

    certificate authority

    12, creates a unique

    redemption transaction code

    181, which through

    redeemer facilities

    38 may be downloaded 182 or otherwise communicated to a

    redemption terminal

    36,40,44. The

    certificate authority

    12 preferably stores the

    redemption transaction code

    181 in association with the data elements relating to the

    certificate

    60. The

    redemption transaction code

    181 may subsequently be used by redeemer personnel RC, such as through a

    redemption terminal

    36, to authenticate to the

    certificate authority

    12 that the redemption of the

    certificate

    60 occurred, in the event there are subsequent discrepancies in the final financial reconciliation of payment transfers associated with the

    redemption transaction

    104.

  • The

    certificate authority

    12 has the

    means

    46 to selectively establish an

    electronic communication link

    57 with an

    acquirer payment agent

    52, to request payment, and transmits to the

    acquirer payment agent

    52 the identification needed by the

    acquirer payment agent

    52 to authenticate the acquirer user ACQ, and obtain approval for the

    redemption transaction

    104.

  • Therefore, upon a

    successful redemption transaction

    104, the

    certificate authority

    12 typically manages the transfer of funds between appropriate payment agents. In one embodiment the

    certificate authority

    12 sends instructions to the

    authority payment agent

    58, to transfer funds to the

    redeemer payment agent

    56 of a redeemer.

  • Issuer Creation Module.

    FIG. 9

    shows the creation of a

    virtual certificate

    60 by an issuer user ISR at an issuer terminal, through

    issuer facilities

    24. As described above, an issuer user ISR, in communication with the

    certificate authority

    12 across a network 192 (e.g. such as the internet), typically through a

    certificate server

    14, can direct the creation of one or more

    virtual certificates

    60. The issuer facilities preferably include a issuer

    certificate creation module

    194, in which the issuer may define attributes for a

    virtual certificate

    60, such as

    denomination information

    64 a,64 b,

    certificate design information

    62 a-62 n,

    redemption rules

    66 a-66 n, and issuer defined public

    key information

    82.

  • FIG. 10

    shows an issuer virtual certificate

    creation module interface

    194 a, which preferably includes an

    issuer information module

    196, an issuer

    commodity denomination module

    198, an

    issuer design module

    200, and a

    redemption rule module

    202.

  • The

    information module

    196 typically includes issuer business name 204 a,

    issuer address

    204 b,

    registration information

    204 c,

    issuer description copy

    204 d, and a

    comprehensive list

    204 n of all associated redemption locations RL. The

    commodity denomination module

    198 typically includes commodity type 206 a,

    commodity category

    206 b, and a

    denomination descriptor

    206 c. Other denomination attributes may be set with

    denomination attribute control

    206 d. The

    issuer design module

    200 typically includes selection of

    various design element

    62, such as through add

    design element control

    122 a,

    design library control

    122 b, and upload

    design control

    122 c. Attributes for a design are preferably set by

    attribute control

    208. A

    design element

    62 is preferably activated by

    control

    210. A

    design element

    62 which is not needed may be deleted by

    deletion control

    212. The

    redemption rule module

    202 typically includes user

    selectable expiration limitations

    124 a,

    location selection

    124 b, or

    other redemption rules

    124 c. As well, other issuer entered restrictions may be entered, such as

    availability

    126 a, or

    other restrictions

    126 n.

  • FIG. 11

    shows a preferred graphic user

    certificate layout interface

    194 b for an issuer virtual

    certificate creation module

    194. The

    certificate layout interface

    194 b preferably includes a

    work area

    214, in which an issuer user ISR can establish a defined layout for

    virtual certificates

    60, as they may appear on a network site, or as an acquired

    certificate

    60 may look if a printable form is used. User selectable elements, such as

    denomination

    64,

    design elements

    62 a-62 n, redemption rules 66, or issuer defined

    certificate identification elements

    82, preferably appear as selectable icons. The selectable elements are preferably established in the issuer virtual certificate

    creation module interface

    194 a, such that selectable elements are preferably limited to the defined attributes. The

    work area

    214 preferably allows the issuer user ISR to create a certificate layout in a WYSIWYG work environment, wherein elements may be “dragged into position in the area, and wherein a certificate preview (e.g. such as a thumbnail or full size image) is created within the

    work area

    214. An issuer user may save 218 a virtual certificate, rename 220 a certificate as a new certificate, print 222 a proof copy, or be guided 224 to context-sensitive help screens.

  • Creation of Inventory.

    FIG. 12

    is a block diagram of a virtual inventory stored within a

    database

    18. Each created

    virtual certificate

    60 is a defined collection of elements, such as

    denomination elements

    64 a,64 b, redemption rules 66, such as applicable redemption locations RL, and a public

    key identification packet

    80,82. One or more

    virtual certificates

    60, which are stored within the

    database

    18, become a

    virtual inventory

    228 of goods and services, which can then be accessed through one or more network locations (e.g. such as through web sites).

  • The

    virtual inventory

    228 typically comprises a wide variety of goods and services. As well, the

    virtual inventory

    228 typically comprises virtual certificates which may be redeemed within different geographic regions. For example, a

    first inventory subset

    230 a within the

    virtual inventory

    228 may be a subset of similar products or services, but with no limitation of a redemption location RL. By contrast, a

    second inventory subset

    230 b within the

    virtual inventory

    228 may be a subset of all products or services which may be acquired, but within a small geographic region.

  • Certificate elements, such as commodity type, denomination, product descriptors, and redemption locations RL are preferably searchable data elements, by which

    virtual certificates

    60 for products or services may be quickly located.

  • One or more network sites, such as aggregate sites 234 (

    FIG. 13

    ), may preferably be established, to allow an acquirer shopper ACQ to locate an appropriate subset 230 of

    virtual inventory

    228, to allow for the sale of similar goods and services from a plurality of issuers ISR, and to allow the sale of goods and services to be redeemed within a given region. As well, from a

    site

    234 having a subset 230 of any portion of the virtual inventory, the acquirer is preferably provided with

    search tools

    238 by which appropriate

    virtual certificates

    60 are located.

  • FIG. 13

    is a block diagram showing a site virtual inventory 236 at an

    aggregate network site

    234, and a search subset 240 of the site virtual inventory 236 directed by a

    search command

    238 within a browsing (i.e. shopping)

    module

    148 at an

    acquirer terminal

    26 n.

  • In a preferred embodiment of the certificate system, an acquirer user ACQ is able to control (e.g. such as by search command 238) which of the available

    virtual certificates

    60 are to be displayed, on the basis of a particular store or brand of product, or on the basis of certificate types and/or issuer types categorized by one or more descriptive criteria available in the discrete information associated with each unissued virtual certificate.

  • In a preferred embodiment of the

    certificate system

    10, an acquirer user ACQ may specify a geographic location for a desired redemption location RL (e.g. such as a redemption within a postal code area or telephone area code region). The

    certificate authority

    12 uses the selected geographic descriptor to create a subset 240 of available

    virtual certificates

    60, such that only redeemable certificates associated with the specified geographic location are presented to the acquirer user ACQ. For example, an issuer ISR may have specified geographic exclusions for a certificate which correlate to the acquirer's geographic identification information, precluding redemption within the acquirer's geographic area.

  • Therefore, an acquirer user ACQ can locate redemption locations RL for one or more products or services which are available as selectable

    virtual certificates

    60. Upon initiating a search, such as by product type, service type, zip code, town, or state, the

    certificate authority

    12 preferably presents a browseable subset 240 of the entire virtual inventory 228 (or of an aggregate inventory 236), which matches search limiters entered by the acquirer user ACQ.

  • For example, an acquirer user in

    FIG. 13

    may have entered “coffee” as a search descriptor at an

    aggregate site

    234, within a zip code of “97213”, with a selected local radius of 25 miles. The

    certificate authority

    12 would then perform a search for product types or description text that includes the word “coffee”, for

    virtual certificates

    60 which include a one or more redemption locations within the “97213” zip code (as well, in this preferred embodiment, within a region roughly defined by a 25 mile radius from the center of the “97213” area code). In this manner, the acquirer user may be presented with a selection of

    virtual certificates

    60 which match the search criteria.

  • Since the

    inventory

    228 of virtual products and services is a

    virtual product inventory

    228, one or more of the virtual products or services may be accessed by a plurality of

    network locations

    234. For example, a

    virtual certificate

    60 created by an issuer ISR who sells computers may correspond to the acquisition of a small, hand-held tape recorder. The corresponding

    virtual certificate

    60 may advantageously listed within a plurality of

    aggregate sites

    234 such as an aggregated site 234 a for electronics, an aggregated site for business supplies 234 b, an aggregated site for school supplies 234 c, or even a site for gadgets or gifts 234 d.

  • From an aggregated

    web site

    234, which offers

    virtual certificates

    60 for goods or services from a plurality of businesses ISR, RL, an acquirer user ACQ, searching or browsing through an aggregate inventory 236 of

    virtual certificates

    60, is preferably guided to web pages or sections of web pages 248 (

    FIG. 14

    ), which describe one or

    more certificates

    60, along with a presentation of other information 252 a,252 b which was input by the user to be displayed with the virtual certificate 60 (e.g. such as a store or product logo, a description of the store, business address, phone number, or map, or a description of the product or service represented by the virtual coupon 60). As well, links to related virtual coupons for other products and services from the same issuer are preferably included.

  • As well, the

    same certificate

    60 may be accessed from the issuer/merchant's

    own network site

    242, which has a site virtual inventory 236 limited to

    virtual certificates

    60 that are created by the issuer ISR. For example, a merchant site 242 (i.e. such as an issuer/redeemer site) that is established by a merchant may include a wide variety of

    information

    244, typically related to the issuer ISR or associated redemption locations RL. Within the

    merchant site

    242, the issuer ISR may preferably provide direct access to virtual certificates, such as through selectable certificate icons 246 (

    FIG. 14

    ).

  • Upon selection of a selectable

    certificate locator icon

    246, an abbreviated

    certificate description page

    248 is typically presented to the acquirer user ACQ at the

    acquirer terminal

    26, which describes the goods and services for the selected virtual certificate. The

    certificate description page

    248 provides a virtual “shelf space”, which may be accessed from one or more

    aggregate sites

    234, or from a

    merchant web site

    242. The

    certificate description page

    248 typically provide issuer defined options, such as headers, product or service description, including selectable options to view and acquire 250 coupons or certificates.

  • An acquirer user ACQ therefore may preferably access the

    inventory

    228,236 of

    virtual certificates

    60 through both one or more larger aggregated

    sites

    234, as well as through existing

    merchant sites

    242. An acquirer customer ACQ typically finds a

    virtual certificate

    60, or does a search to find various network sites offering

    virtual certificates

    60 for desired goods or services.

  • Acquisition Transaction Module.

    FIG. 14

    is a block diagram 240 of acquirer access to an

    acquisition transaction module

    252, wherein the

    acquisition transaction module

    252 is accessible through one or more

    aggregated sites

    234, as well as through an existing

    merchant site

    242.

  • Selection of a

    selectable acquisition icon

    250 by an acquirer user ACQ typically transfers the acquirer user ACQ to a

    acquisition transaction module

    252 within the

    acquirer facilities

    28 for the

    certificate system

    10. While the

    acquisition transaction module

    252 is operated within the

    certificate system

    10, the description of the selected available product or service, the

    denomination

    64 for the selected available product or service, as well as

    other redemption rules

    66, are determined by the issuer options 114 (

    FIG. 5

    ). As well, limitations on appropriate

    acquirer payment agents

    52 are initially selectable 252 by the issuer, and limit the payment agent choices within the

    shopping transaction module

    252.

  • For example, if a redemption location RL for an issuer ISR accepts VISA™ or AMERICAN EXPRESS™ credit

    card payment agents

    52, but does not accept MASTERCARD™ credit

    card payment agents

    52, the issuer ISR preferably limits the selectable 256

    payment agents

    52, to be displayed and selectable within the

    shopping transaction module

    252, to VISA™ or AMERICAN EXPRESS

    ™ payment agents

    52.

  • While the

    shopping transaction module

    252 is typically used for a single acquisition transaction 90, related to a single issuer ISR, the

    shopping transaction module

    252 can alternately be used to acquire one or more certificates related to the same issuer ISR, for a single redemption location RL. Details of the acquisition transaction are displayed within the

    transaction invoice

    254.

  • As described above, during an

    acquisition transaction

    72, the

    acquirer facilities

    28 typically prompt the acquirer user to enter required transaction information 150 (

    FIG. 5

    ), which include the submittal of a

    private key

    76, which is thereafter associated with the acquired

    certificate

    60.

  • Alternate Embodiments for Payment Transfer. The

    certificate system

    60 is easily adapted to provide alternate systems for payment transfer. For example, as described below, funds may be transferred directly from an

    acquirer payment agent

    52 and a

    redeemer payment agent

    56 upon the acquisition of a

    certificate

    60, which is redeemed at a later time at a redemption location RL.

  • As well, funds may first be transferred directly from an

    acquirer payment agent

    52 to a third party (e.g. such as the certificate payment agent 58) upon the acquisition of a

    certificate

    60, and from the

    certificate payment agent

    58 to the

    redeemer payment agent

    56 upon redemption.

  • In an alternate embodiment, an independent entity operates the

    certificate system

    10, purchases

    virtual certificates

    60 from one or

    more issuers

    22, and then sells the purchased virtual certificates to acquirers, with funds transferring between the

    acquirer payment agents

    52 to the

    certificate payment agent

    58, either during the acquisition transaction, or during the

    redemption transaction

    104.

  • Certificate Systems Having Payment Upon Acquisition. In one embodiment of the

    certificate system

    10, payment funds are transferred from the

    acquirer payment agent

    52 when a

    certificate

    60 is acquired. While this payment system may not be applicable for all embodiments of the

    certificate system

    10, payment of funds at the point of

    certificate acquisition

    72 is often beneficial for issuers and redeemers, wherein inventory of goods, or reservations of services, are preferably held or reserved upon payment.

  • As well, for issuers, such as larger corporate clients, which are linked to a plurality of redemption locations RL (e.g. such as a chain of retail stores), inventory related to acquired certificates may be routed to a particular redemption location RL.

  • A

    certificate system

    10 which offers payment upon certificate acquisition may be beneficial for “in-house”

    certificate systems

    10, wherein the

    certificate authority

    12 is a dedicated system for an issuer ISR, as seen the

    certificate network

    260 b of

    FIG. 16

    . However, for issuers and redeemers which are may be small or unknown businesses, acquirer users ACQ may be hesitant to transfer funds from their respective

    acquirer payment agent

    52 until the goods or services are deemed to be acceptable (i.e. at the point of redemption). For large or known issuers ISR, redemption locations RL, and for brand name products, payment upon acquisition may be satisfactory for acquirer users ACQ.

  • Certificate Systems Having Payment Upon Redemption Transaction. In a preferred embodiment of the

    certificate system

    10, the

    certificate authority

    12 receives an initial authorization to transfer funds from an

    acquirer payment agent

    52, whereby the certificate authority establishes a “lock” on funds as a part of the

    certificate acquisition transaction

    72. The funds are then transferred, from the

    acquirer payment agent

    52 to the

    redeemer payment agent

    56, when a certificate is redeemed 90,104 for actual goods or services, when the redemption transaction is authorized by the certificate authority 12 (e.g. such as by an authentication module 16).

  • For a

    certificate system

    10 which serves a plurality of issuers ISR, payment upon redemption is often advantageous to acquirer users ACQ. For example, in a large

    independent certificate system

    10, which accepts a plurality of issuers ISR, and allows acquirers ACQ to acquire

    certificates

    60 for a selection of goods and services from the plurality of issuers ISR, it is important that only qualified and legitimate issuers be allowed to

    market certificates

    60. As well, it is important that the issuers ISR clearly describe the products and services which are to be acquired through a redemption of an acquired

    certificate

    60.

  • For a system in which payment of funds from an acquirer user ACQ is made upon the actual receipt of acceptable products or services, the acquirer ACQ (or alternate recipient RCP) is assured that redemption location RL, as well as the products or services to be received, are legitimate. It is therefore advantageous that issuers and redeemers clearly describe the goods or services which are represented by an acquired

    certificate

    60.

  • As well, for a

    certificate system

    10 in which payment of funds from an acquirer is made upon the actual receipt of acceptable products or services, the

    redemption transaction

    104 is a true sales transaction, wherein the sale is independent of the certificate entity (except for the authorization to transfer funds). For example, funds are not transferred into or out of a

    certificate authority account

    58, and an acquirer is able to accept or decline the transfer of funds at the time of the redemption transaction 104 (either by redeeming the

    certificate

    60, or by declining a redemption). In such a certificate system, the

    certificate authority

    12 need not accept responsibility for the quality of goods or services, since the redeemer receives funds from the

    acquirer payment agent

    52 during the

    redemption transaction

    104, and the acquirer receives the related goods or services from the redemption location RL during the

    redemption transaction

    104.

  • Therefore, while an issuer ISR creates a

    virtual certificate

    60 which is acquired through the

    certificate transaction network

    10, the purchase transaction for the goods or services represented by the certificate occurs at the redemption location RL, through the merchant's point of

    sale terminal

    40, with final redemption authorization of acquirer funds handled by the

    certificate authority

    12.

  • In the

    preferred certificate system

    10 wherein payment is not transferred until actual redemption of the

    certificate

    60, buyers are inherently protected from mis-represented goods or services, or from illegitimate certificate issuers ISR. If a customer, such as an acquirer user, or a recipient of a certificate 60 (and accompanying private key 76), decides not to redeem the certificate, or upon visiting a redemption location RL, decides against the transaction for any reason, the customer may, at their discretion, decide against proceeding with the

    redemption transaction

    104. Since the customer is not charged for the sale unless a

    redemption transaction

    104 is actually made, the customer is inherently protected, since the

    certificate system

    10 minimizes misrepresentation of goods and services by issuers ISR.

  • For an acquirer who decides not to proceed with a

    redemption transaction

    104, the acquirer may simply let the acquired

    certificate

    60 “expire”, or may actively return to the purchasing site, such as through the acquirer facilities, and actively cancel the

    certificate

    60, while suspending the authorized lock on the acquirer's funds.

  • The enhanced level of protection for the buyer provided by the

    certificate system

    10 is advantageous for many redemption circumstances. While business and personal travelers commonly purchase travel tickets (e.g. such as airline tickets, train tickets, accommodations, and car rentals) at the present time, funds are still transferred when the tickets are sent to or reserved for the acquirer. If travel plans are changed, or if flights are changed, buyers have little or no financial leverage. In contrast to conventional ticketing and reservations, if travel plans are changed, or if a flight is canceled, a customer in possession of an

    applicable certificate

    60 can easily modify their travel plans, without being charged.

  • While authorization to charge against an acquirer's payment agent 52 (e.g. such as a credit card) is first established at the time the acquirer first acquires a

    certificate

    60, funds are not typically transferred during the initial authorization. Instead, the initial authorization acts to validate an acquirer's

    payment agent

    52, while performing a preliminary test for funds, which are to be typically charged later, during a

    second redemption transaction

    104.

  • The second authorization against the acquirer's funds takes place when the certificate is redeemed. While the initial authorization typically confirms available credit for an acquirer, and typically establishes a hold on appropriate funds for the

    certificate

    60, the fund hold may either be held in place indefinitely until redemption, or may expire before the redemption of the certificate. For a fund hold which expires before a certificate is redeemed, a redeemer may still gain authorization to charge the acquirer's

    payment agent

    52, during the redemption transaction 90 (such as be re-entering the credit information).

  • The

    certificate system

    10 therefore provides a mutually safe and fair means for commerce between an acquirer and an issuer, since, the acquirers ACQ are properly authorized (both during the initial acquisition of the certificate and during the redemption transaction 104), while the holder of the certificate 60 (i.e. the acquirer or an authorized recipient of an acquired certificate) is also able to accept or decline the redemption transaction 90 (e.g. such as upon visiting the redemption location, if the goods or services are not satisfactory).

  • In this preferred embodiment of the certificate system, funds are never transferred to the hosting

    certificate system

    10, but are only transferred, upon a

    redemption transaction

    104, from the

    acquirer payment agent

    52, either to the issuer payment agent 54, or to the

    redeemer payment agent

    56. In this mode of operation, a second authorization is required at the time the certificate is redeemed, to authorize transfer of funds, and to initiate the actual transfer of funds.

  • Financial institutions which offer credit card systems typically charge merchant businesses different discount rates (e.g. typically a percentage of each sale), based upon the type of sales transactions. Many financial institutions charge different rates for credit card present transactions, credit card not present transactions, and internet transactions, with the greatest rates typically charged to internet transactions (typically since fraudulent use of credit cards is currently more prevalent on the internet).

  • However, within the

    certificate system

    10, for embodiments where funds are initially locked during the acquisition, and where a second authorization takes place upon redemption of an acquired certificate, funds are transferred at the redemption level. For an acquirer user who has a card present for redemption authorization, there is a reasonable level of security for the merchant that the card is valid. Even for a an acquirer or recipient who is in possession of the

    certificate

    60 and the

    private key

    76, the redemption transaction is significantly more secure than a remote internet transaction. Therefore, a merchant is more likely to pay less to the credit card issuing agency.

  • System Structures. The

    certificate system

    10 may operate across a wide variety of

    networks

    192, and may be easily adapted to promote various commerce models.

    FIG. 15

    shows one

    network embodiment

    260 a of a

    certificate system

    10 implemented across a

    network

    192, having a plurality of

    issuer terminals

    22 a-22 p, each having

    issuer facilities

    24 a-24 p, and

    network connection

    23 a-23 p; a

    remote certificate authority

    12, including a

    certificate module

    14, an

    authentication module

    16, a

    database

    18, and an

    authority terminal

    58. A plurality of

    acquirer terminals

    26 a-26 n, each having

    acquirer facilities

    28 a-28 n, and

    network connections

    27 a-27 n, are connected to network 192, such that a plurality of acquirer users may browse and acquire

    certificates

    60 which are created by a plurality of issuer users at

    issuer terminals

    22 a-22 p.

  • FIG. 16

    shows an embodiment of an

    alternate network embodiment

    260 b of a

    certificate system

    10 implemented across a

    network

    192 having a

    single issuer terminal

    22, with

    issuer facility

    24, and a

    network connection

    23 a-23 p and a related

    dedicated certificate authority

    12, including a

    certificate module

    14, an

    authentication module

    16, a

    database

    18, and an

    authority terminal

    58. For a large issuer ISR, such as a conglomerate which provides a large selection of products or services at a plurality of locations RL, a dedicated

    certificate authority system

    12,14,16,18,58 may preferably be used to manage a large virtual inventory of 228

    certificates

    60 on an

    issuer network site

    242. A plurality of

    acquirer terminals

    26 a-26 n, each having

    acquirer facilities

    28 a-28 n and

    network connections

    27 a-27 n, are connected to network 192, such that a plurality of acquirer users ACQ may browse and acquire

    certificates

    60 within the

    virtual inventory

    228 of the

    merchant site

    242.

  • System Applications and Alternative Embodiments. The

    certificate system

    10 can be used for a large variety of commerce applications, wherein products and services are located on-line, but are picked up at a store. For example, an acquirer user ACQ may locate a large gift item on-line (e.g. such as a television set), which can be picked up at a location RL near a recipient RCP. The acquirer user ACQ may simply search for and locate the desired gift item at a location RL near the recipient RCP, proceed with an

    acquisition transaction

    72, transfer the acquired certificate 60 (or just the certificate information 74) to the recipient RCP (or directly to the redemption location RL), and communicate the private key to the recipient RCP. The recipient RCP may then perform the redemption transaction 90, and receive the gift item.

  • In a similar embodiment, an acquirer user ACQ may desire to send a gift certificate with a selected

    money denomination

    64 to a recipient RCP. With the

    certificate information

    74 and the

    private key

    76, the recipient RCP can either visit the redemption location RL directly, or may alternately browse on-line through an aggregate site or a merchant site, to locate desired goods or services, before picking the desired goods up at the redemption location RL.

  • The

    certificate system

    10 can also be used for travel and accommodations, and for various ticketing applications, As well, the

    certificate system

    10 may be used as a secure currency, in the form of “traveler's” certificates, which are acquired online, but are spent or cashed at one or more locations RL. As well, the certificate system may be used to prepay for services, such as for medical or dental services, or even home repair.

  • The

    certificate system

    10 may be alternately used for business vouchers systems, in which personnel, such as employees, are sent to pick up and deliver goods and services, using single-

    use certificates

    60 to provide for the secure transfer of various forms of inventory.

  • As described above, the

    certificate system

    10 does not require that monetary funds are transferred, or that the system be used exclusively for purchasing products or services. For example, the

    certificate system

    10 may be used to distribute discount coupons for one or more issuers ISR, which are typically redeemable as a discount for an acquired product or service. While virtual coupons are similar to

    virtual certificates

    60 there is typically no monetary value associated with a virtual coupon, such that there may be no private key verification required during a redemption transaction 90. An acquirer user ACQ simply accesses a desired virtual coupon (e.g. such as for a related search for products or businesses within their regional area), and prints a desired coupon on an

    acquirer printer

    30. The acquirer user ACQ may then visit a related redemption location RL (i.e. the selected store), which honors and redeems the coupon (typically as a discount for a product or service specified on the virtual coupon).

  • A merchant issuer may preferably combine the use of

    virtual certificates

    60 with that of virtual coupons, such as through virtual site, wherein an acquirer user may receive a discount that is related to the acquisition of one or

    more certificates

    60. For example, to promote the redemption location RL, an issuer user may provide an acquirer user with a virtual discount coupon, as a bonus for prior certificate purchases.

  • System Advantages. Retailers, such as small merchants, may easily establish means for selling their goods and services online, without the requirement of establishing an extensive online presence. Issuers may simply register their business with the

    certificate authority

    12, and then may create

    virtual certificates

    60 for one or more of their products and services.

    Virtual certificates

    60 can be offered for acquisition at one or more sites, such as an aggregated

    site

    234 for a large variety of products and services within a selected region, or a more

    specialized site

    234 that is related to specific types of products or services within their area.

  • As well, even without a web site, an issuer/merchant can input other store information 252 a,252 b (such as business location information, logos, product descriptions) to appear on a

    web page

    248,252 appropriate to a

    virtual certificate

    60, as well as

    acceptable credit cards

    52 for the issuer/merchant. When an acquirer ACQ navigates to a description of a virtual certificate within a

    site

    248, such as by limiting a search to a specific product category within a specified zip code region, the issuer/

    merchant information

    252 is preferably displayed, in conjunction with the

    virtual certificate

    60, thereby creating a network presence for the issuer/merchant. As well, if an acquirer ACQ selects the certificate 60 (i.e. decides to acquire the certificate), the

    acquirer facility

    28 typically displays an

    acquisition invoice module

    252 that is specific to an issuer/merchant for the selected

    certificate

    60, wherein selectable payment agent information (i.e. accepted credit cards) are limited to cards which the issuer accepts at the redemption location RL.

  • Through the

    certificate system

    10, acquirers are able to find goods and services that they might not have been able to find otherwise. As well, acquirers are able to secure a price for a transaction at the time they acquire a

    certificate

    60. The certificate authority creates a

    virtual inventory

    228 of

    virtual certificates

    60, there is no inventory of paper-based certificates or coupons.

  • Although the

    certificate system

    10 and its methods of use are described herein in connection with retail certificates offered through web sites, the apparatus and techniques can be implemented for other certificate, coupon, voucher, or token system, and over different types of networks, or any combination thereof, as desired.

  • Accordingly, although the invention has been described in detail with reference to a particular preferred embodiment, persons possessing ordinary skill in the art to which this invention pertains will appreciate that various modifications and enhancements may be made without departing from the spirit and scope of the claims that follow.

Claims (23)

1. A certificate system on a network, comprising:

a certificate authority connected to said network, said certificate authority adapted to allow the definition of a virtual certificate comprising a redemption denomination defined by an issuer user, and a first public key identifier defined by said certificate authority;

a certificate issuance module for creation of an issued certificate upon selectable acquisition of said virtual certificate by an acquirer user across said network, said issued certificate including said redemption denomination and said first public key identifier, wherein said redemption denomination and said first public key identifier are stored at said certificate authority in association with said issued certificate;

a certificate authentication module for authorization of a redemption of said issued certificate at a redemption location to a holder of said issued certificate, based upon redemption submittal of said redemption denomination and said first public key identifier, and a matching comparison of said redemption denomination and said first public key identifier stored at said certificate authority; and

means to cancel further redemption of said issued certificate at said certificate authority.

2. The certificate system of

claim 1

, said issued certificate further comprising:

a single-use certificate comprising at least one design element, a denomination, at least one redemption rule, and identification information, which may include human readable information, and/or machine readable information.

3. The certificate system of

claim 1

, said certificate issuance module further comprising:

an issuer terminal in selective electronic communication with said certificate authority, said issuer terminal comprising user operated means for directing said certificate authority to create at least one customized virtual certificates for subsequent issuance to acquirer users at one or more acquirer terminals.

4. The certificate system of

claim 1

, further comprising:

an issuer facility for authorization of construction of certificates through a web portal via a network, with which an issuer user connects to said certificate authority; and

said issuer facility further comprising a certificate specification interface through which said issuer user defines detailed specifications for virtual single-use certificates.

5. The certificate system of

claim 1

, wherein said certificates reflect sellable or distributable commodities comprising products and/or services which are available for pick up by a customer at a redemption location.

6. The certificate system of

claim 3

, further comprising:

means for controlling modular design of one or more virtual certificates independently, either by selecting standard designs offered by said certificate authority, by uploading one or more custom designs to said certificate authority in the form of a computer file, or by specifying that a certificate be issued using a combination of stock elements uploaded through said issuer terminal.

7. The certificate system of

claim 1

, further comprising:

means for an acquirer user identifying redemption locations for one or more products or services which are available as selectable virtual certificates;

wherein, upon said acquirer user initiating a search, said certificate authority presents a browseable subset of an entire virtual inventory, or of an aggregate inventory, which matches search limiters entered by said acquirer user.

8. The certificate system of

claim 1

, further comprising:

means for said certificate authority communicating acquisition transaction to an issuer;

wherein a product or service which is to be received upon redemption is reserved;

wherein, for a product within an inventory at a redemption location, said product is placed on hold;

wherein, for a designated service, said issuer uses acquisition information to schedule personnel or equipment, or to limit the further sale of goods or services.

9. The certificate system of

claim 1

, further comprising:

means for said issuer user selecting or uploading issuer information, selecting or uploading denomination parameters for a virtual certificate in the form of any of a currency denomination or a code associated with a product, a service, a coupon, a voucher, or other instrument for which an acquired certificate may be redeemed, said issuer authorizing said certificate authority to issue certificates within a set range of selectable denominations, or authorizing creation of virtual certificates with a value determined by an acquirer user.

10. The certificate system of

claim 1

, further comprising:

means for said issuer user selecting or uploading redemption rules comprising any of an expiration date, any exclusion of redemption on a basis of geographic location, or other redemption rules unique to said issuer user;

wherein redemption rule information may be included as printed information on an acquired certificate.

11. The certificate system of

claim 1

, further comprising:

means for said issuer user selecting or uploading issuance restrictions to said certificate authority for any of limiting a number of acquired certificates to be issued by said certificate authority on behalf of aid issuer user, for any of a specified time frame, within a geographic region, or on a basis of other criteria unique to said issuer user.

12. The certificate system of

claim 1

, further comprising:

means for said issuer user selecting or specifying a format for a unique certificate supplementary public key identification;

wherein said issuer user may require a unique certificate public key identification which corresponds to existing product codes, inventory, or existing issuer certificate systems.

13. A process within a transaction network, comprising the steps of:

defining a virtual certificate on a certificate authority, said defined virtual certificate comprised of a redemption denomination defined by an issuer user, and a first public key identifier defined by said certificate authority;

creating an issued certificate upon acquisition of said virtual certificate by an acquirer user on said transaction network, said issued certificate including said redemption denomination and said first public key identifier, said redemption denomination and said first public key identifier stored at said certificate authority in association with said issued certificate;

authorizing a redemption of said issued certificate at a redemption location to a holder of said issued certificate, based upon redemption submittal of said redemption denomination and said first public key identifier, and a matching comparison of said redemption denomination and said first public key identifier stored at said certificate authority; and

canceling further redemption of said issued certificate at said certificate authority.

14. The process of

claim 13

, said issued certificate further comprising:

a single-use certificate comprising at least one design element, a denomination, at least one redemption rule, and identification information, which may include human readable information, and/or machine readable information.

15. The process of

claim 13

, further comprising the step of:

providing an issuer terminal in selective electronic communication with said certificate authority, said issuer terminal comprising user operated means for directing said certificate authority to create at least one customized virtual certificates for subsequent issuance to acquirer users at one or more acquirer terminals.

16. The process of

claim 13

, further comprising the step of:

providing an issuer facility for authorization of construction of certificates through a web portal via a network, with which an issuer user connects to said certificate authority; and

said issuer facility further comprising a certificate specification interface through which said issuer user defines detailed specifications for virtual single-use certificates.

17. The method of

claim 13

, further comprising the step of:

controlling modular design of one or more virtual certificates independently, either by selecting standard designs offered by said certificate authority, by uploading one or more custom designs to said certificate authority in the form of a computer file, or by specifying that a certificate be issued using a combination of stock elements uploaded through said issuer terminal.

18. The process of

claim 13

, further comprising the step of:

an acquirer user identifying redemption locations for one or more products or services which are available as selectable virtual certificates;

wherein, upon said acquirer user initiating a search, said certificate authority presents a browseable subset of an entire virtual inventory, or of an aggregate inventory, which matches search limiters entered by said acquirer user.

19. The process of

claim 13

, further comprising the step of:

said certificate authority communicating acquisition transaction to an issuer;

wherein a product or service which is to be received upon redemption is reserved;

wherein, for a product within an inventory at a redemption location, said product is placed on hold;

wherein, for a designated service, said issuer uses acquisition information to schedule personnel or equipment, or to limit the further sale of goods or services.

20. The process of

claim 13

, further comprising the step of:

said issuer user selecting or uploading issuer information, selecting or uploading denomination parameters for a virtual certificate in the form of any of a currency denomination or a code associated with a product, a service, a coupon, a voucher, or other instrument for which an acquired certificate may be redeemed, said issuer authorizing said certificate authority to issue certificates within a set range of selectable denominations, or authorizing creation of virtual certificates with a value determined by an acquirer user.

21. The process of

claim 13

, further comprising the step of:

said issuer user selecting or uploading redemption rules comprising any of an expiration date, any exclusion of redemption on a basis of geographic location, or other redemption rules unique to said issuer user;

wherein redemption rule information may be included as printed information on an acquired certificate.

22. The process of

claim 13

, further comprising the step of:

said issuer user selecting or uploading issuance restrictions to said certificate authority for any of limiting a number of acquired certificates to be issued by said certificate authority on behalf of aid issuer user, for any of a specified time frame, within a geographic region, or on a basis of other criteria unique to said issuer user.

23. The process of

claim 13

, further comprising the step of:

said issuer user selecting or specifying a format for a unique certificate supplementary public key identification;

wherein said issuer user may require a unique certificate public key identification which corresponds to existing product codes, inventory, or existing issuer certificate systems.

US11/686,239 1998-12-24 2007-03-14 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network Expired - Fee Related US7899755B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/686,239 US7899755B2 (en) 1998-12-24 2007-03-14 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11370698P 1998-12-24 1998-12-24
US09/472,100 US7209889B1 (en) 1998-12-24 1999-12-20 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US11/686,239 US7899755B2 (en) 1998-12-24 2007-03-14 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/472,100 Continuation US7209889B1 (en) 1998-12-24 1999-12-20 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network

Publications (3)

Publication Number Publication Date
US20070157021A1 US20070157021A1 (en) 2007-07-05
US7899755B2 US7899755B2 (en) 2011-03-01
US20110060904A9 true US20110060904A9 (en) 2011-03-10

Family

ID=26811374

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/472,100 Expired - Lifetime US7209889B1 (en) 1998-12-24 1999-12-20 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US11/686,239 Expired - Fee Related US7899755B2 (en) 1998-12-24 2007-03-14 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/472,100 Expired - Lifetime US7209889B1 (en) 1998-12-24 1999-12-20 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network

Country Status (3)

Country Link
US (2) US7209889B1 (en)
AU (1) AU2210000A (en)
WO (1) WO2000039731A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090055296A1 (en) * 2007-08-23 2009-02-26 Giftango Corporation Systems and methods for electronic delivery of stored value
US20100241852A1 (en) * 2009-03-20 2010-09-23 Rotem Sela Methods for Producing Products with Certificates and Keys
US20110283343A1 (en) * 2009-01-22 2011-11-17 Uniscon Universal Identity Control Gmbh Device for generating a virtual network user
US20120036555A1 (en) * 2009-03-24 2012-02-09 Nec Corporation Information sharing device, information sharing method and information sharing system
EP3041188A4 (en) * 2013-08-28 2016-07-27 Zte Corp METHOD, DEVICE AND SYSTEM FOR CONTROLLING THE PRESENTATION OF AN APPLICATION
US9978078B2 (en) 2013-09-25 2018-05-22 Retailmenot, Inc. Tracking offers across multiple channels
US10062075B2 (en) 2013-11-04 2018-08-28 E2Interactive, Inc. Systems and methods for using a dual function medical benefits card
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US11055686B2 (en) 2012-08-08 2021-07-06 E2Interactive, Inc. S/M for providing, reloading, and redeeming stored value cards used in transit applications
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign
US11978031B2 (en) 2010-12-14 2024-05-07 E2Interactive, Inc. Systems and methods that create a pseudo prescription from transaction data generated during a point of sale purchase at a front of a store

Families Citing this family (107)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
US7310629B1 (en) * 1999-12-15 2007-12-18 Napster, Inc. Method and apparatus for controlling file sharing of multimedia files over a fluid, de-centralized network
KR20000049367A (en) * 2000-01-19 2000-08-05 황영헌 Broadcasting channel link server and broadcasting channel link method using the same
US20040181452A1 (en) * 2000-03-04 2004-09-16 Delacruz Cedric G. System, method and apparatus for selling gift certificates and store credits
WO2001071463A2 (en) * 2000-03-17 2001-09-27 United States Postal Service Methods and systems for providing a secure electronic mailbox
US10304052B2 (en) * 2000-06-30 2019-05-28 James Leonard Driessen Retail point of sale (RPOS) apparatus for internet merchandising
US7742993B2 (en) * 2005-10-31 2010-06-22 James Leonard Driessen SCART-card (secure consumer advantaged retail trading)
US7003500B1 (en) * 2000-08-01 2006-02-21 James Leonard Driessen Retail point of sale (RPOS) apparatus for internet merchandising
US8438111B2 (en) * 2000-06-30 2013-05-07 James Leonard Driessen Retail point of sale (RPOS) digital rights convergence
US7418429B1 (en) * 2000-10-20 2008-08-26 Accenture Pte. Ltd. Method and system for facilitating a trusted on-line transaction between insurance businesses and networked consumers
US20040006532A1 (en) * 2001-03-20 2004-01-08 David Lawrence Network access risk management
US7899722B1 (en) * 2001-03-20 2011-03-01 Goldman Sachs & Co. Correspondent bank registry
US8140415B2 (en) * 2001-03-20 2012-03-20 Goldman Sachs & Co. Automated global risk management
US7958027B2 (en) * 2001-03-20 2011-06-07 Goldman, Sachs & Co. Systems and methods for managing risk associated with a geo-political area
US8121937B2 (en) * 2001-03-20 2012-02-21 Goldman Sachs & Co. Gaming industry risk management clearinghouse
US8209246B2 (en) 2001-03-20 2012-06-26 Goldman, Sachs & Co. Proprietary risk management clearinghouse
US7904361B2 (en) * 2001-03-20 2011-03-08 Goldman Sachs & Co. Risk management customer registry
US20110131136A1 (en) * 2001-03-20 2011-06-02 David Lawrence Risk Management Customer Registry
US20020143624A1 (en) * 2001-03-31 2002-10-03 Koninklijke Philips Electronics N.V. Machine readable label for tokens and method of use
EP1265200A1 (en) * 2001-06-04 2002-12-11 Orbis Patents Limited Credit card system and method
US7152048B1 (en) * 2002-02-07 2006-12-19 Oracle International Corporation Memphis: multiple electronic money payment highlevel integrated security
US20060207856A1 (en) * 2002-02-15 2006-09-21 Dean Scott A Methods and systems for exchanging and/or transferring various forms of value
US7444507B2 (en) * 2002-06-30 2008-10-28 Intel Corporation Method and apparatus for distribution of digital certificates
US20050076218A1 (en) * 2002-07-17 2005-04-07 Collie Brown Cryptographic electronic gift certificate cross-reference to related applications
US20040213289A1 (en) * 2002-09-04 2004-10-28 Chun-I Liu Method and system for wakeup packet detection at Gigabit speeds
KR20030038350A (en) * 2002-09-18 2003-05-16 주식회사 케이티프리텔 Method for circulating an electronic gift certificate in online and offline system
EP1579298A4 (en) * 2002-11-05 2006-08-09 Aaron Whiteman Remote purchasing system and method
US20040117728A1 (en) * 2002-11-22 2004-06-17 Gromer Paul W. Systems and methods for customizing books
US20070061236A1 (en) * 2003-01-23 2007-03-15 Lehman Brothers Inc. Combination of financial instruments and method for implementing investment strategy
US20050289082A1 (en) * 2003-10-29 2005-12-29 Microsoft Corporation Secure electronic transfer without requiring knowledge of secret data
US7657745B2 (en) * 2003-10-29 2010-02-02 Microsoft Corporation Secure electronic transfer without requiring knowledge of secret data
US7519815B2 (en) 2003-10-29 2009-04-14 Microsoft Corporation Challenge-based authentication without requiring knowledge of secret authentication data
US20050108106A1 (en) * 2003-11-14 2005-05-19 Tomlin Warren L. System and method for coordination of delivery of marketing material
US8655309B2 (en) 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20050254100A1 (en) * 2004-05-17 2005-11-17 Venali, Inc. Ticket exchange for combating fax spam
US7958546B2 (en) * 2004-06-29 2011-06-07 International Business Machines Corporation Identity access management system
US8510300B2 (en) 2004-07-02 2013-08-13 Goldman, Sachs & Co. Systems and methods for managing information associated with legal, compliance and regulatory risk
US8996481B2 (en) 2004-07-02 2015-03-31 Goldman, Sach & Co. Method, system, apparatus, program code and means for identifying and extracting information
US8762191B2 (en) 2004-07-02 2014-06-24 Goldman, Sachs & Co. Systems, methods, apparatus, and schema for storing, managing and retrieving information
US8442953B2 (en) 2004-07-02 2013-05-14 Goldman, Sachs & Co. Method, system, apparatus, program code and means for determining a redundancy of information
US7661110B2 (en) * 2004-10-29 2010-02-09 At&T Intellectual Property I, L.P. Transaction tool management integration with change management
US7757166B2 (en) * 2004-12-10 2010-07-13 Jostens, Inc. System and method for yearbook creation
JP4139382B2 (en) * 2004-12-28 2008-08-27 インターナショナル・ビジネス・マシーンズ・コーポレーション Device for authenticating ownership of product / service, method for authenticating ownership of product / service, and program for authenticating ownership of product / service
US7765398B2 (en) * 2005-07-07 2010-07-27 At&T Intellectual Property I, L.P. Method of promulgating a transaction tool to a recipient
US8577735B2 (en) * 2008-05-12 2013-11-05 Wilopen Products, Lc Interactive gifting system and method with physical and electronic delivery
US8616434B2 (en) * 2006-02-28 2013-12-31 Wilopen Products, Lc Multi-component forms
US8602297B2 (en) * 2006-02-10 2013-12-10 Wilopen Products, Lc Method of distributing and activating gift cards
US8104795B2 (en) * 2006-02-28 2012-01-31 Wilopen Products, Lc Expandable card form
JP5137972B2 (en) * 2007-01-23 2013-02-06 ジョステンス, インコーポレイテッド Method and system for creating customized output
CN101236629A (en) * 2007-02-01 2008-08-06 阿里巴巴公司 On-line payment system and payment procedure
US20080228565A1 (en) * 2007-03-13 2008-09-18 First Data Corporation Centralized Discount Searching
US20080307226A1 (en) * 2007-06-07 2008-12-11 Alcatel Lucent Verifying authenticity of e-mail messages
US20090055722A1 (en) * 2007-08-22 2009-02-26 Monica Eorgoff Customizable certificate design and method of use
US10657503B1 (en) * 2007-09-19 2020-05-19 Capital One Services, Llc System and method of providing a customer with method of making a payment to a third party using a remote dispensing machine
US9141954B2 (en) * 2008-06-13 2015-09-22 American International Group, Inc. Method and apparatus for performing a transaction
AU2009260026A1 (en) * 2008-06-17 2009-12-23 Jostens, Inc. System and method for yearbook creation
US8214609B2 (en) * 2008-07-16 2012-07-03 International Business Machines Corporation Data transference to virtual memory
US20100017413A1 (en) * 2008-07-17 2010-01-21 Ian Edward James Systems and methods for transferring value
US8965811B2 (en) * 2008-10-04 2015-02-24 Mastercard International Incorporated Methods and systems for using physical payment cards in secure E-commerce transactions
US20110137740A1 (en) 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
US20110231269A1 (en) * 2010-03-18 2011-09-22 Michael Joseph Mulhall Method for Recipient Orientated Financial Services
US9483786B2 (en) 2011-10-13 2016-11-01 Gift Card Impressions, LLC Gift card ordering system and method
US9031869B2 (en) 2010-10-13 2015-05-12 Gift Card Impressions, LLC Method and system for generating a teaser video associated with a personalized gift
US9064268B2 (en) 2010-11-01 2015-06-23 Outerwall Inc. Gift card exchange kiosks and associated methods of use
WO2012116221A1 (en) 2011-02-23 2012-08-30 Mastercard International, Inc. Demand deposit account payment system
US9367833B2 (en) * 2011-07-14 2016-06-14 Invention Science Fund I, Llc Data services outsourcing verification
US8874467B2 (en) 2011-11-23 2014-10-28 Outerwall Inc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US20130144732A1 (en) * 2011-12-06 2013-06-06 Ariel Inventions, Llc. Method and system for electronic merchant gift card creation and redemption
US10417677B2 (en) 2012-01-30 2019-09-17 Gift Card Impressions, LLC Group video generating system
US10943432B2 (en) 2012-09-04 2021-03-09 E2Interactive, Inc. Processing of a game-playing transaction based on location
SG11201501586VA (en) 2012-09-04 2015-04-29 Linq3 Technologies Llc Systems and methods for integrated game play through the use of barcodes on smart phones and hand held devices
US10229561B2 (en) 2012-09-04 2019-03-12 Linq3 Technologies Llc Processing of a user device game-playing transaction based on location
US9380048B2 (en) * 2012-10-15 2016-06-28 Saife, Inc. Certificate authority server protection
US20140165209A1 (en) * 2012-12-11 2014-06-12 Verizon Patent And Licensing Inc. Digital content delivery platform for multiple retailers
US9603192B2 (en) 2013-01-16 2017-03-21 Ncore Communications, Inc. Methods and apparatus for hybrid access to a core network
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US9565911B2 (en) 2013-02-15 2017-02-14 Gift Card Impressions, LLC Gift card presentation devices
US10115268B2 (en) 2013-03-15 2018-10-30 Linq3 Technologies Llc Systems and methods for integrated game play at payment-enabled terminals
US10217107B2 (en) 2013-05-02 2019-02-26 Gift Card Impressions, LLC Stored value card kiosk system and method
US11386465B1 (en) * 2013-12-02 2022-07-12 Groupon, Inc. Method and apparatus for providing promotion vouchers
US20220398634A1 (en) * 2013-12-02 2022-12-15 Groupon, Inc. Method and apparatus for providing promotion vouchers
US10262346B2 (en) 2014-04-30 2019-04-16 Gift Card Impressions, Inc. System and method for a merchant onsite personalization gifting platform
JP2017532889A (en) * 2014-09-25 2017-11-02 モヘビー、ベザード Method and apparatus for hybrid access to core network based on proxied authentication
US10445391B2 (en) 2015-03-27 2019-10-15 Jostens, Inc. Yearbook publishing system
US11587096B2 (en) * 2015-10-14 2023-02-21 Accreditrust Technologies, LLC Systems and methods for interdependent identity based credential collection validation
US10346819B2 (en) 2015-11-19 2019-07-09 Coinstar Asset Holdings, Llc Mobile device applications, other applications and associated kiosk-based systems and methods for facilitating coin saving
US9906531B2 (en) * 2015-11-23 2018-02-27 International Business Machines Corporation Cross-site request forgery (CSRF) prevention
CN108074186B (en) * 2016-11-15 2021-05-11 平安科技(深圳)有限公司 Health card account opening processing method and device
US10951421B2 (en) 2016-11-28 2021-03-16 Ssh Communications Security Oyj Accessing hosts in a computer network
US11095638B2 (en) * 2017-12-11 2021-08-17 Ssh Communications Security Oyj Access security in computer networks
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US12020309B2 (en) 2018-05-18 2024-06-25 E2Interactive, Inc. Augmented reality gifting on a mobile device
US10869190B2 (en) * 2018-07-13 2020-12-15 Micron Technology, Inc. Secure vehicular services communication
US20210004820A1 (en) 2019-07-05 2021-01-07 Talkdesk, Inc. System and method for automated agent assistance next actions within a cloud-based contact center
CN110445771B (en) * 2019-07-19 2022-07-08 平安科技(深圳)有限公司 Block chain-based interactive record evidence obtaining method, device, medium and server
US11328205B2 (en) 2019-08-23 2022-05-10 Talkdesk, Inc. Generating featureless service provider matches
US20210117882A1 (en) 2019-10-16 2021-04-22 Talkdesk, Inc Systems and methods for workforce management system deployment
US20210136220A1 (en) 2019-10-31 2021-05-06 Talkdesk, Inc. Monitoring and listening tools across omni-channel inputs in a graphically interactive voice response system
US11736615B2 (en) 2020-01-16 2023-08-22 Talkdesk, Inc. Method, apparatus, and computer-readable medium for managing concurrent communications in a networked call center
JP7392545B2 (en) * 2020-03-26 2023-12-06 トヨタ自動車株式会社 Servers, programs and systems
US20220385481A1 (en) * 2021-06-01 2022-12-01 International Business Machines Corporation Certificate-based multi-factor authentication
US11677875B2 (en) 2021-07-02 2023-06-13 Talkdesk Inc. Method and apparatus for automated quality management of communication records
CN114205078B (en) * 2021-11-22 2024-08-09 航天信息股份有限公司 Virtual tax UKey remote issuing method
US11856140B2 (en) 2022-03-07 2023-12-26 Talkdesk, Inc. Predictive communications system
US11736616B1 (en) 2022-05-27 2023-08-22 Talkdesk, Inc. Method and apparatus for automatically taking action based on the content of call center communications
US11971908B2 (en) 2022-06-17 2024-04-30 Talkdesk, Inc. Method and apparatus for detecting anomalies in communication data
US11943391B1 (en) 2022-12-13 2024-03-26 Talkdesk, Inc. Method and apparatus for routing communications within a contact center

Citations (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4303852A (en) * 1970-09-21 1981-12-01 Daniel Silverman Access security control
US4341100A (en) * 1978-07-05 1982-07-27 Nixdorf Computer Ag Portable certificate magazine
US4464566A (en) * 1970-09-21 1984-08-07 Daniel Silverman Access security control
US4599509A (en) * 1970-09-21 1986-07-08 Daniel Silverman Access security control
US4669730A (en) * 1984-11-05 1987-06-02 Small Maynard E Automated sweepstakes-type game
US5001752A (en) * 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility
US5019694A (en) * 1989-09-29 1991-05-28 Ncr Corporation Overhead scanning terminal
US5136643A (en) * 1989-10-13 1992-08-04 Fischer Addison M Public/key date-time notary facility
US5157726A (en) * 1991-12-19 1992-10-20 Xerox Corporation Document copy authentication
US5379344A (en) * 1990-04-27 1995-01-03 Scandic International Pty. Ltd. Smart card validation device and method
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5500514A (en) * 1991-03-05 1996-03-19 The Gift Certificate Center Method and apparatus for generating gift certificates
US5513117A (en) * 1993-04-30 1996-04-30 Small; Maynard E. Apparatus and method for electronically dispensing personalized greeting cards and gifts
US5533123A (en) * 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
US5557518A (en) * 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5659616A (en) * 1994-07-19 1997-08-19 Certco, Llc Method for securely using digital signatures in a commercial cryptographic system
US5661517A (en) * 1994-05-02 1997-08-26 Messagephone, Inc. Interactive intelligent video information system
US5666416A (en) * 1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system
US5671279A (en) * 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5706442A (en) * 1995-12-20 1998-01-06 Block Financial Corporation System for on-line financial services using distributed objects
US5710886A (en) * 1995-06-16 1998-01-20 Sellectsoft, L.C. Electric couponing method and apparatus
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
US5761648A (en) * 1995-07-25 1998-06-02 Interactive Coupon Network Interactive marketing network and process using electronic certificates
US5764789A (en) * 1994-11-28 1998-06-09 Smarttouch, Llc Tokenless biometric ATM access system
US5799086A (en) * 1994-01-13 1998-08-25 Certco Llc Enhanced cryptographic system and method with key escrow feature
US5802199A (en) * 1994-11-28 1998-09-01 Smarttouch, Llc Use sensitive identification system
US5805719A (en) * 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5816918A (en) * 1996-04-05 1998-10-06 Rlt Acquistion, Inc. Prize redemption system for games
US5822737A (en) * 1996-02-05 1998-10-13 Ogram; Mark E. Financial transaction system
US5839119A (en) * 1996-09-27 1998-11-17 Xerox Corporation Method of electronic payments that prevents double-spending
US5850446A (en) * 1996-06-17 1998-12-15 Verifone, Inc. System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
US5850442A (en) * 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
US5870718A (en) * 1996-02-26 1999-02-09 Spector; Donald Computer-printer terminal for producing composite greeting and gift certificate card
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5878337A (en) * 1996-08-08 1999-03-02 Joao; Raymond Anthony Transaction security apparatus and method
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5907801A (en) * 1995-09-22 1999-05-25 At&T Wireless Services, Inc. Apparatus and method for optimizing wireless financial transactions
US5915019A (en) * 1995-02-13 1999-06-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5915093A (en) * 1997-04-24 1999-06-22 Howard Berlin Computer network debit disk used for prepayment to transfer information from a central computer
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field
US6134591A (en) * 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
US6170744B1 (en) * 1998-09-24 2001-01-09 Payformance Corporation Self-authenticating negotiable documents
US6193155B1 (en) * 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US6240397B1 (en) * 1999-02-17 2001-05-29 Arye Sachs Method for transferring, receiving and utilizing electronic gift certificates
US6330544B1 (en) * 1997-05-19 2001-12-11 Walker Digital, Llc System and process for issuing and managing forced redemption vouchers having alias account numbers
US20020062286A1 (en) * 1998-06-29 2002-05-23 Tedesco Daniel E. Method and apparatus for processing checks to reserve funds
US6490367B1 (en) * 1994-02-17 2002-12-03 Telia Ab Arrangement and method for a system for administering certificates

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE51092T1 (en) * 1983-12-21 1990-03-15 Ibm SECURITY IN DATA TRANSMISSION SYSTEMS.
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
GB9503662D0 (en) 1995-02-23 1995-04-12 Coveley Michael Free-roaming remote hand-held point-of-sale terminal
DE19542732B4 (en) * 1995-11-16 2007-06-14 Littlefeet, Inc., Fremont Procedure for detecting the misuse of an access authorization
US5970469A (en) 1995-12-26 1999-10-19 Supermarkets Online, Inc. System and method for providing shopping aids and incentives to customers through a computer network

Patent Citations (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4464566A (en) * 1970-09-21 1984-08-07 Daniel Silverman Access security control
US4599509A (en) * 1970-09-21 1986-07-08 Daniel Silverman Access security control
US4303852A (en) * 1970-09-21 1981-12-01 Daniel Silverman Access security control
US4341100A (en) * 1978-07-05 1982-07-27 Nixdorf Computer Ag Portable certificate magazine
US4669730A (en) * 1984-11-05 1987-06-02 Small Maynard E Automated sweepstakes-type game
US5019694A (en) * 1989-09-29 1991-05-28 Ncr Corporation Overhead scanning terminal
US5001752A (en) * 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility
US5136643A (en) * 1989-10-13 1992-08-04 Fischer Addison M Public/key date-time notary facility
US5379344A (en) * 1990-04-27 1995-01-03 Scandic International Pty. Ltd. Smart card validation device and method
US5500514A (en) * 1991-03-05 1996-03-19 The Gift Certificate Center Method and apparatus for generating gift certificates
US5652421A (en) * 1991-03-05 1997-07-29 The Gift Certificate Center, Inc. Method and apparatus for generating gift certificates
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5455407A (en) * 1991-11-15 1995-10-03 Citibank, N.A. Electronic-monetary system
US5157726A (en) * 1991-12-19 1992-10-20 Xerox Corporation Document copy authentication
US5513117A (en) * 1993-04-30 1996-04-30 Small; Maynard E. Apparatus and method for electronically dispensing personalized greeting cards and gifts
US5799086A (en) * 1994-01-13 1998-08-25 Certco Llc Enhanced cryptographic system and method with key escrow feature
US6490367B1 (en) * 1994-02-17 2002-12-03 Telia Ab Arrangement and method for a system for administering certificates
US5621797A (en) * 1994-04-28 1997-04-15 Citibank, N.A. Electronic ticket presentation and transfer method
US5557518A (en) * 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5642419A (en) * 1994-04-28 1997-06-24 Citibank N.A. Method for acquiring and revalidating an electronic credential
US5661517A (en) * 1994-05-02 1997-08-26 Messagephone, Inc. Interactive intelligent video information system
US5533123A (en) * 1994-06-28 1996-07-02 National Semiconductor Corporation Programmable distributed personal security
US5659616A (en) * 1994-07-19 1997-08-19 Certco, Llc Method for securely using digital signatures in a commercial cryptographic system
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) * 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5838812A (en) * 1994-11-28 1998-11-17 Smarttouch, Llc Tokenless biometric transaction authorization system
US5870723A (en) * 1994-11-28 1999-02-09 Pare, Jr.; David Ferrin Tokenless biometric transaction authorization method and system
US5805719A (en) * 1994-11-28 1998-09-08 Smarttouch Tokenless identification of individuals
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5764789A (en) * 1994-11-28 1998-06-09 Smarttouch, Llc Tokenless biometric ATM access system
US5802199A (en) * 1994-11-28 1998-09-01 Smarttouch, Llc Use sensitive identification system
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5915019A (en) * 1995-02-13 1999-06-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5710886A (en) * 1995-06-16 1998-01-20 Sellectsoft, L.C. Electric couponing method and apparatus
US5761648A (en) * 1995-07-25 1998-06-02 Interactive Coupon Network Interactive marketing network and process using electronic certificates
US5907801A (en) * 1995-09-22 1999-05-25 At&T Wireless Services, Inc. Apparatus and method for optimizing wireless financial transactions
US5666416A (en) * 1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system
US5671279A (en) * 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5706442A (en) * 1995-12-20 1998-01-06 Block Financial Corporation System for on-line financial services using distributed objects
US5822737A (en) * 1996-02-05 1998-10-13 Ogram; Mark E. Financial transaction system
US5870718A (en) * 1996-02-26 1999-02-09 Spector; Donald Computer-printer terminal for producing composite greeting and gift certificate card
US5850442A (en) * 1996-03-26 1998-12-15 Entegrity Solutions Corporation Secure world wide electronic commerce over an open network
US5816918A (en) * 1996-04-05 1998-10-06 Rlt Acquistion, Inc. Prize redemption system for games
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5850446A (en) * 1996-06-17 1998-12-15 Verifone, Inc. System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5878337A (en) * 1996-08-08 1999-03-02 Joao; Raymond Anthony Transaction security apparatus and method
US5839119A (en) * 1996-09-27 1998-11-17 Xerox Corporation Method of electronic payments that prevents double-spending
US6193155B1 (en) * 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US5915093A (en) * 1997-04-24 1999-06-22 Howard Berlin Computer network debit disk used for prepayment to transfer information from a central computer
US6330544B1 (en) * 1997-05-19 2001-12-11 Walker Digital, Llc System and process for issuing and managing forced redemption vouchers having alias account numbers
US6134591A (en) * 1997-06-18 2000-10-17 Client/Server Technologies, Inc. Network security and integration method and system
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field
US20020062286A1 (en) * 1998-06-29 2002-05-23 Tedesco Daniel E. Method and apparatus for processing checks to reserve funds
US6170744B1 (en) * 1998-09-24 2001-01-09 Payformance Corporation Self-authenticating negotiable documents
US6240397B1 (en) * 1999-02-17 2001-05-29 Arye Sachs Method for transferring, receiving and utilizing electronic gift certificates

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090055296A1 (en) * 2007-08-23 2009-02-26 Giftango Corporation Systems and methods for electronic delivery of stored value
US8676672B2 (en) * 2007-08-23 2014-03-18 E2Interactive, Inc. Systems and methods for electronic delivery of stored value
US8812669B2 (en) * 2009-01-22 2014-08-19 Uniscon Universal Identity Control Gmbh Device for generating a virtual network user
US20110283343A1 (en) * 2009-01-22 2011-11-17 Uniscon Universal Identity Control Gmbh Device for generating a virtual network user
US20100241852A1 (en) * 2009-03-20 2010-09-23 Rotem Sela Methods for Producing Products with Certificates and Keys
US20120036555A1 (en) * 2009-03-24 2012-02-09 Nec Corporation Information sharing device, information sharing method and information sharing system
US8776172B2 (en) * 2009-03-24 2014-07-08 Nec Corporation Information sharing device, information sharing method and information sharing system
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US11978031B2 (en) 2010-12-14 2024-05-07 E2Interactive, Inc. Systems and methods that create a pseudo prescription from transaction data generated during a point of sale purchase at a front of a store
US11055686B2 (en) 2012-08-08 2021-07-06 E2Interactive, Inc. S/M for providing, reloading, and redeeming stored value cards used in transit applications
EP3041188A4 (en) * 2013-08-28 2016-07-27 Zte Corp METHOD, DEVICE AND SYSTEM FOR CONTROLLING THE PRESENTATION OF AN APPLICATION
US9978078B2 (en) 2013-09-25 2018-05-22 Retailmenot, Inc. Tracking offers across multiple channels
US10062075B2 (en) 2013-11-04 2018-08-28 E2Interactive, Inc. Systems and methods for using a dual function medical benefits card

Also Published As

Publication number Publication date
US7209889B1 (en) 2007-04-24
US20070157021A1 (en) 2007-07-05
WO2000039731A8 (en) 2001-02-15
US7899755B2 (en) 2011-03-01
AU2210000A (en) 2000-07-31
WO2000039731A1 (en) 2000-07-06

Similar Documents

Publication Publication Date Title
US7899755B2 (en) 2011-03-01 Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US8630896B2 (en) 2014-01-14 Systems and methods wherein a security deposit facilitates a transaction in which a benefit is applied in exchange for performance of a task
US6766301B1 (en) 2004-07-20 Fraud deterred product and service coupons
AU2001251286B2 (en) 2006-10-05 System, method and apparatus for international financial transactions
CA2429627C (en) 2014-05-13 A system and method for verifying, settling, printing and guaranteeing checks at a remote location
US20030105672A1 (en) 2003-06-05 Method and apparatus to facilitate payment over a computer network
US20030004828A1 (en) 2003-01-02 Prepaid card authorization and security system
US20090184162A1 (en) 2009-07-23 Handheld device for selling transaction instruments via web-based tools
US20070179865A1 (en) 2007-08-02 Method for anonymous purchase of goods by providing a pluarlity of non-activated account numbers
US20040049423A1 (en) 2004-03-11 Point return method and apparatus
US20050197919A1 (en) 2005-09-08 System and method for providing electronic multi-merchant gift certificate & contribution brokering services over a distributed network
US20020138348A1 (en) 2002-09-26 Electronic coupon system
AU2001251286A1 (en) 2002-01-10 System, method and apparatus for international financial transactions
WO2018047982A1 (en) 2018-03-15 Payment method and payment system utilizing code information
US7647244B2 (en) 2010-01-12 Method for providing a certificate for an online product
JP4861604B2 (en) 2012-01-25 System and method for processing financial transactions
US20040078331A1 (en) 2004-04-22 Payment system using electronic stamps
MXPA01004206A (en) 2002-06-04 An online purchase system and method.
US20030033208A1 (en) 2003-02-13 Method and system for communicating using a user defined alias representing confidential data
JP2002024747A (en) 2002-01-25 Electronic receipt issueing system
JP2002140733A (en) 2002-05-17 Ticket selling system using internet
AU774122B2 (en) 2004-06-17 E commerce system
JP2001175737A (en) 2001-06-29 System and method for processing credit information and recording medium stored with software for credit information processing
JP2003132255A (en) 2003-05-09 Stamp service point management device and stamp service point management method
KR20030048996A (en) 2003-06-25 Apparatus for buying goods in on-off line after buying merchandise in coupon through internet and method for using the same

Legal Events

Date Code Title Description
2008-06-16 AS Assignment

Owner name: S.F. IP PROPERTIES 59 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WHITFIELD, HENRY;REEL/FRAME:021096/0442

Effective date: 20080402

2011-02-09 STCF Information on status: patent grant

Free format text: PATENTED CASE

2011-07-05 CC Certificate of correction
2011-12-01 FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

2014-08-25 FPAY Fee payment

Year of fee payment: 4

2015-12-07 AS Assignment

Owner name: RATEZE REMOTE MGMT. L.L.C., DELAWARE

Free format text: MERGER;ASSIGNOR:S.F. IP PROPERTIES 59 LLC;REEL/FRAME:037223/0785

Effective date: 20150826

2018-08-21 MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

2021-06-14 AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 167 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RATEZE REMOTE MGMT. L.L.C.;REEL/FRAME:056536/0854

Effective date: 20210607

2021-07-26 AS Assignment

Owner name: BUFFALO PATENTS, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 167 LLC;REEL/FRAME:056978/0949

Effective date: 20210617

2022-07-14 AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 167 LLC, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:BUFFALO PATENTS, LLC;REEL/FRAME:060654/0338

Effective date: 20210726

Owner name: INTELLETUAL VENTURES ASSETS 90 LLC, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:BUFFALO PATENTS, LLC;REEL/FRAME:060654/0338

Effective date: 20210726

2022-10-17 FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

2023-04-03 LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

2023-04-03 STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

2023-04-25 FP Lapsed due to failure to pay maintenance fee

Effective date: 20230301