ORDERING SCHEME
First Claim
1. A method comprising the steps of:
- a service provider issuing an offer to a user device, wherein the offer comprises a first message including information relating to an item being offered; and
the user device sending an acceptance of the offer to the service provider, wherein the acceptance comprises a second message and wherein the acceptance is encrypted using a private key of the user device.
2 Assignments
0 Petitions
Accused Products
Abstract
An ordering scheme is described, for example an ordering and payment scheme for mobile communication devices. The ordering scheme enables an Internet shop or another service provider to issue binding offers to a mobile communication device or the like and to receive an acceptance of the offer from the mobile device. The acceptance is encrypted using a private key of mobile device and the offer may be encrypted using a private key of the service provider. The service provider liaises with a payment broker and a charging system for controlling the transfer of funds from the user to the service provider. An identity management system may be provided to control access to the modules of the ordering scheme.
26 Citations
21 Claims
-
1. A method comprising the steps of:
-
a service provider issuing an offer to a user device, wherein the offer comprises a first message including information relating to an item being offered; and the user device sending an acceptance of the offer to the service provider, wherein the acceptance comprises a second message and wherein the acceptance is encrypted using a private key of the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising a service provider and a user device, wherein:
-
the service provider is configured to issue an offer to the user device, wherein the offer comprises a first message including information relating to an item being offered; and the user device is configured to send an acceptance of the offer to the service provider, wherein the acceptance comprises a second message and wherein the second message is encrypted using a private key of the user device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
Specification