Fair Payment Protocol with Semi-Trusted Third Party
First Claim
1. In a computing environment, a method comprising:
- receiving encrypted e-goods from a merchant as part of a transaction;
sending payment to the merchant;
determining whether decryption information was received from the merchant in exchange for the payment, and if not received, launching a dispute with a third party dispute resolution service, or if received, using the decryption information to determine whether the encrypted e-goods received from the merchant are useable with the decryption information, and;
a) if not useable, launching a dispute with a third party dispute resolution service, orb) if useable, determining whether the e-goods received from the merchant are valid, and;
i) if not valid, launching a dispute with a third party dispute resolution service, orii) if valid, terminating the transaction without launching a dispute.
2 Assignments
0 Petitions
Accused Products
Abstract
Described is an optimistic fair payment protocol in electronic commerce that provides fair payment while resisting an unconscious double spending attack and other attacks. A buyer receives encrypted e-goods from a merchant, and sends payment to the merchant. If decryption information is not received in exchange for the payment, or the decryption information does not render the e-goods useable, the buyer launches a dispute with a third party dispute resolution service. If the decryption information is received and renders the e-goods useable, the buyer determines whether the e-goods are valid, according to a corresponding description. If not valid, the buyer launches a dispute and provides the e-goods and the description. The third party uses the description to evaluate the validity of the goods to determine whether to refund the payment to the buyer or release it to the merchant.
14 Citations
20 Claims
-
1. In a computing environment, a method comprising:
-
receiving encrypted e-goods from a merchant as part of a transaction; sending payment to the merchant; determining whether decryption information was received from the merchant in exchange for the payment, and if not received, launching a dispute with a third party dispute resolution service, or if received, using the decryption information to determine whether the encrypted e-goods received from the merchant are useable with the decryption information, and; a) if not useable, launching a dispute with a third party dispute resolution service, or b) if useable, determining whether the e-goods received from the merchant are valid, and; i) if not valid, launching a dispute with a third party dispute resolution service, or ii) if valid, terminating the transaction without launching a dispute. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
- 11. In a computing environment, a method comprising, receiving data corresponding to a dispute between a merchant and a buyer involving an e-goods transaction, verifying from the data that the buyer has paid for the e-goods, and if the buyer has paid and a decryption key extracted from the data is valid, sending the key to the buyer for use in decrypting the encrypted e-goods.
-
14. In a commercial environment having a buyer, a merchant and a third party dispute resolution service, a method comprising:
-
receiving encrypted e-goods and decryption information from a merchant; sending payment to the merchant; and a) launching a first type of dispute if the decryption information does not render the encrypted e-goods useful, or b) launching a second type of dispute if the e-goods are useful and are deemed invalid according to a description;
orc) not launching a dispute when the decryption information renders the encrypted e-goods useful and are the e-goods are deemed valid according to a description. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification