METHOD FOR AUTOMATICALLY VALIDATING A TRANSACTION, ELECTRONIC PAYMENT SYSTEM AND COMPUTER PROGRAM
First Claim
Patent Images
1. A method for automatically validating a transaction between an issuer having a signing key, an emitter having an emitter key, an acceptor having an unique identity and a limit on transactions and a validator, comprising:
- withdrawing a voucher from the issuer by the emitter, the voucher being computed using a first two-party protocol between the issuer and the emitter based on the signing key of the issuer and the emitter key of the emitter;
spending the voucher with the acceptor by the emitter, wherein a money laundering check value is computed using a second two-party protocol between the emitter and the acceptor based on the voucher, a transaction number between the emitter and the acceptor, a transaction challenge value generated by the acceptor and the unique identity of the acceptor;
depositing the voucher, the transaction challenge value and the money laundering check value with the validator by the acceptor; and
validating the transaction by the validator by verifying that the number of transactions between the emitter and the acceptor is below the limit on transactions of the acceptor by comparing the money laundering check value with money laundering check values already deposited with the validator in earlier transactions.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer program product relating to automatically validating a transaction between an issuer having a signing key, an emitter having an emitter key, an acceptor having a unique identity and a limit on transactions and a validator.
38 Citations
19 Claims
-
1. A method for automatically validating a transaction between an issuer having a signing key, an emitter having an emitter key, an acceptor having an unique identity and a limit on transactions and a validator, comprising:
-
withdrawing a voucher from the issuer by the emitter, the voucher being computed using a first two-party protocol between the issuer and the emitter based on the signing key of the issuer and the emitter key of the emitter;
spending the voucher with the acceptor by the emitter, wherein a money laundering check value is computed using a second two-party protocol between the emitter and the acceptor based on the voucher, a transaction number between the emitter and the acceptor, a transaction challenge value generated by the acceptor and the unique identity of the acceptor;
depositing the voucher, the transaction challenge value and the money laundering check value with the validator by the acceptor; and
validating the transaction by the validator by verifying that the number of transactions between the emitter and the acceptor is below the limit on transactions of the acceptor by comparing the money laundering check value with money laundering check values already deposited with the validator in earlier transactions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11)
-
-
8. An electronic payment system comprising:
-
a bank computer system for issuing coins of a predetermined denomination, the bank computer system including a signing key;
a user computer system for emitting the coins, a merchant computer system for accepting the coins, the user computer system including an emitter key;
an acceptor computer system including a unique identity and a limit on transactions; and
a validator computer system for validating the coins, a data network connecting the bank computer system, the user computer system, the merchant computer system and the validator computer system; and
wherein the electronic payment system configured to;
withdraw a voucher from the bank computer system by the user computer system, the voucher being computed using a first two-party protocol between the bank computer system and the user computer system based on the signing key of the bank computer system and the emitter key of the user computer system;
spend the voucher with the acceptor by the user computer system, wherein a money laundering check value is computed using a second two-party protocol between the user computer system and the acceptor computer system based on the voucher, a transaction number between the user computer system and the acceptor computer system, a transaction challenge value generated by the acceptor computer system and the unique identity of the acceptor computer system;
deposit the voucher, the transaction challenge value and the money laundering check value with the validator computer system by the acceptor computer system; and
validate the transaction by the validator computer system by verifying that the number of transactions between the user computer system and the acceptor computer system is below the limit on transactions of the acceptor computer system by comparing the money laundering check value with money laundering check values already deposited with the validator computer system in earlier transactions.
-
-
9. A computer program product embodied in computer readable medium for automatically validating a transaction between an issuer having a signing key, an emitter having an emitter key, an acceptor having an unique identity and a limit on transactions, and a validator, the computer program product comprising program instructions executable by at least one processor of a computer system, the program instructions including instructions for:
-
withdrawing a voucher from the issuer by the emitter, the voucher being computed using a first two-party protocol between the issuer and the emitter based on the signing key of the issuer and the emitter key of the emitter;
spending the voucher with the acceptor by the emitter, wherein a money laundering check value is computed using a second two-party protocol between the emitter and the acceptor based on the voucher, a transaction number between the emitter and the acceptor, a transaction challenge value generated by the acceptor and the unique identity of the acceptor;
depositing the voucher, the transaction challenge value and the money laundering check value with the validator by the acceptor; and
validating the transaction by the validator by verifying that the number of transactions between the emitter and the acceptor is below the limit on transactions of the acceptor by comparing the money laundering check value with money laundering check values already deposited with the validator in earlier transactions. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An issuer for issuing a voucher, in particular a coin, to an emitter, the issuer computing the voucher using a first two-party protocol between the issuer and the emitter based on a signing key of the issuer and an emitter key of the emitter.
-
17. An acceptor for accepting vouchers, in particular coins, from an emitter, the vouchers being computed using a first two-party protocol between an issuer and the emitter based on a signing key of the issuer and an emitter key of the emitter, the acceptor being provided for computing a money laundering check value by using a second two-party protocol between the emitter and the acceptor based on the voucher, a transaction number between the emitter and the acceptor, a transaction challenge value generated by the acceptor and the unique identity of the acceptor;
- and
depositing the voucher, the transaction challenge value and the money laundering check value with a validator.
- and
-
18. A validator for validating transactions between an issuer having a signing key, an emitter having an emitter key, an acceptor having an unique identity and a limit on transactions, the validator being provided for:
verifying that the number of transactions between the emitter and the acceptor is below the limit on transactions of the acceptor by comparing a money laundering check value with money laundering check values already deposited with the validator in earlier transactions.
-
19. An emitter provided for:
-
withdrawing a voucher from an issuer, the voucher being computed using a first two-party protocol between the issuer and the emitter based on a signing key of the issuer and an emitter key of the emitter;
spending the voucher with an acceptor, wherein a money laundering check value is computed using a second two-party protocol between the emitter and the acceptor based on the voucher, a transaction number between the emitter and the acceptor, a transaction challenge value generated by the acceptor and a unique identity of the acceptor.
-
Specification