EP1602021A1 - Method and system for carrying out electronic transactions - Google Patents
Method and system for carrying out electronic transactionsInfo
- Publication number
- EP1602021A1 EP1602021A1 EP04717120A EP04717120A EP1602021A1 EP 1602021 A1 EP1602021 A1 EP 1602021A1 EP 04717120 A EP04717120 A EP 04717120A EP 04717120 A EP04717120 A EP 04717120A EP 1602021 A1 EP1602021 A1 EP 1602021A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data processing
- information
- processing system
- environment
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/206—Software aspects at ATMs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Definitions
- This invention relates to an electronic transactions method on a network and a data processing system for implementing said method.
- the invention therefore relates to information technology and in particular to electronic transactions on an information network.
- a citizen can connect to some individual information networks. For example when the tax office offers their clients the opportunity to make tax- related statements electronically, the client can be connected to the information network of the tax office. Information is safeguarded with the aid of electronic identification of the individual, certification and electronic signing of documents. As another example a client can log-in to the information network of an insurance corporation on the basis of electronic identification and file a damage claim. As a third example the client is offered a sen/ice where many electronic transactions forms have been brought together and which a legal person may then use to perform electronic transactions. An example of a service such as that mentioned in the last example is the service offered by www.lomake.fi (visited 4.4.2003).
- the object of the invention is to develop a method and a data processing system and hardware implementing said method with which an electronic transactions service for legal persons can be implemented and in which the above-mentioned problems can be solved.
- the object of the invention is achieved with a method and a system characterized in that which is listed in the independent claims.
- the preferred embodiments of the invention are the object of the dependent claims.
- a citizen or other legal person is recognized and certified into the data processing system using electronic (other legal person) and/or biometrical (citizens only) recognition and certification.
- Recognition and certification can also be performed when logging-in as the device user or when logging-in to the operating system, or further when logging-in as a user of the information network, as long as the data processing system is constructed such that for its part identification and certification are imple- mented;
- a person logging-in to the data processing system is recognized by at least one of the following methods: electronic personal identification card, personal identification number, password, identification service provided by a bank, telephone service or business, encryption key, an encryption signature key or biometrics or a SIM (Subscriber Identity Module) used for logging-in to a GSM (Global System for Mobile communications) information network or a USIM card (Universal Subscriber Identity Module) used for logging-in to a UMTS (Universal Mobile Telecommunications System) information network, or a parallel card of a SIM and USIM card;
- the data processing system may be located in a wireless or wired information network for example in a GSM or UTMS network, the Internet, a local network's server or data terminal or in a digital television operator's server or data terminal or generally in any type of network's server, data terminal or proxy server;
- a user interface is created for a legal person in the said data processing system
- an interface can also be created from the said data processing system to the data processing system of another wired or wireless information network, one which implements the same sort of electronic transactions environment and to which the other legal person is (i) recognized and certified according to the object.
- This interface can, if needed, be used for conducting elec- tronic transactions between two or more legal persons;
- an interface can also be built from the said device to the server handling electronic transactions billing services or to the billing service platform's server or with the aid of electronic transactions to the server or service platform's server providing information network services; (xiv) if needed, during the said electronic transactions event a legal person has possibility of gathering registered information regarding himself and obtained from an infor- mation network as well as participating in the moving and distribution within information networks of registered information regarding himself; (xv) if needed, using the said interfaces a legal person has the possibility during an electronic transactions event of executing electronic transactions requiring payment; and
- the said services requiring payment may also include data stream services such as for example Internet phone or message services such as electronic mail and
- One embodiment of the method and system of the invention is based on that, on the basis of electronic identification of an individual, personal electronic transactions and user interface software is constructed that is not dependent upon the electronic transactions service provider's client relation- ship or processes, and it contains interfaces for different instances (e-desktop environment), services to read, receive, give, edit or complete information regarding the individual using a terminal device, which is functionally linked through the interface to another individual and server and/or at least two other servers, where information regarding the individual is stored and from which at least one server offers electronic transactions sen/ices.
- One embodiment of the method and system of the invention is based on that the individual can, using the reciprocal electronic transactions interface of the e-desktop environment, form with the aid of the reciprocal transactions data stream services such as for example videoconferences or Internet phone services with another legal person. If needed, the call can be performed as a service requiring payment through the interface of a billing server or billing service platform.
- Another embodiment of the method and system of the invention is based on that an individual can, with the aid of the services of the e-desktop environment, read, receive, give, edit or complete information regarding himself from at least two separate sources using the first server, which is functionally linked through the interface to the other server where information regarding this individual is stored permanently or with partial permanence.
- One third embodiment of the method and system of the invention makes it possible for a member of society, using the services provided by the e-desktop environment, to participate in the moving and distribution within information networks of certified information regarding himself such that privacy protection and information security requirements are fulfilled.
- One fourth embodiment of the method and system of the invention offers a service that is located between the one who is the partner saving the registered information to his data processing system through his actions, such as the tax office, and the client (e-desktop environment) thus offering the client an interface with the registered information and for example the possibility of collecting information from different information registries. Additionally it makes possible for the client for example the combining of information from different registries or information analysis, saving or even access to registered information gathered from several sources.
- access to information is through a personalized user interface.
- One optional embodiment of the method and system of the invention involves the management of certifications, which are a prerequisite for electronic transactions when gathering certified information from different authorities for example for a tax statement or support applications.
- One advantage of a method and system according to the invention is that it (e-desktop environment) assures the privacy and information security of the client.
- FIG. 1 is an overview that shows and describes the invention and the central elements of its exemplary embodiments
- Fig. 2 is a flow chart of a single exemplary electronic transactions event
- Fig. 3 shows as an example the data terminal configuration needed in a particular electronic transaction
- Fig. 4 shows as an example one possible e-desktop system software solution.
- an information network service which offers the client, based on recognition of the client, electronic transactions and user interface software that is independent of the electronic transactions service provider's client relationship and processes as well as interfaces to different instances (e- desktop environment) and access through an interface into an information network to registered information regarding that client.
- e-desktop environment services e-desktop environment services
- a client can obtain information from information regarding himself that is registered in the network and may utilize this information for example in electronic transactions.
- the services in question are called e- desktop environment services in this document (e-desktop, an electronic iden- tification of an individual worldwide web).
- the term information network means for example a combination of the services offered between computers and the services offered by the data transfer connections between computers.
- An information network can be for example an Internet, Intranet or Extranet information network.
- Fig. 1 shows as examples the elements of a system according to the invention and some of its embodiments.
- the e-desktop server illustrates the server 1-2. It can be a device or software handling a certain task or storing certain information.
- the server can be a physical network server or its virtual counterpart based for example on Java component technology.
- the server 1-2 is implemented for example as a WWW-server, in which case the user interface is offered to the user as a web page with which the user can operate the browser program to be controlled in the data terminal, such as with Microsoft Internet Explorer or Netscape Navigator.
- the citizen can read 1-50, 1-52 from the server or use certified information 1-6, document copies or references to documents received 1-40, 1-42 from authorities 1-20, 1-22, and on the server he can transact, read, complete, correct, edit and send 1-44 transaction forms 1-4 or transaction applications.
- Information may for example be in the form of text and/or sound and/or graphics.
- the e-desktop API 1-10, 1-12 describes an interface that offers a connection between the data processing system of an authority 1-20, 1-22 or other actor and the e-desktop server 1-2.
- the interface can offer transaction forms and applications based on for example XML technology (XML, Extensible Markup Language) and Java components.
- Communications between the e- desktop API and the e-desktop service may be handled for example by SOAP messages (SOAP, Simple Object Access Protocol) using SSL encryption (SSL, Secure Sockets Layer).
- Fig. 1 electronic ID illustrates the electronic identification of an individual, which can be executed in many ways, for example using an electronic personal identity card and/or biometrics.
- logging-in can be implemented using the SIM (Subscriber Identity Module) cards used in logging-in by GSM (Global System for Mobile communications) networks, or SIM cards used in logging-in by UTMS (Universal Mobile Telecommunications System) or parallel cards of SIM and USIM cards.
- SIM and USIM smart cards may be used only for example in the case that they are personal cards of a legal person and therefore identify exactly this person as the user of the information network.
- SIM and USIM cards can be moved from one device to an- other or from them can be made parallel cards and their use implemented in the data processing system of the e-desktop service using many log-in forms of the invention with the aid of a new device.
- biometrics On the part of a more detailed description of biometrics, reference is directed to for example the Internet address www.biometricsinstitute.org (vis- ited 4.4.2003).
- the service provider such as from the server of an authority can be the information network connections to a data storage of a certifier, and the client, the citizen, using the user interface implemented by the sen ice logic of the e-desktop environment, can make statements or requests in electronic form utilizing the registered information in question.
- the client can just store, analyse or comment this information.
- the e-desktop environment and its services may alternatively be composed of program modules that the client may use in the information network.
- Program modules could be offered for example by the parties engaged in implementing the sen/ice. In this case there is no actual e-desktop server, but the service is constructed upon the connection of the client network to the client terminal and by loading these modules into the client terminal. Alternatively the program modules can additionally be loaded into use by some other server to which the client is connected.
- a transaction application process can be formed for use by the client that executes the services of an independent e-desktop server.
- Fig. 2 shows a signal diagram of a single exemplary electronic transactions event where the client fills in a housing support application at the social welfare office and needs a tax statement for this application.
- the client for example a citizen makes a connection from the terminal to an e-desktop sen ice (an instance).
- a suitable recognition method is used, for example a personal electronic identity card or a combination of several recognition methods.
- the e-desktop service constructs, independent of the electronic transactions service provider's client relationship and processes and based on identification, a personal electronic transactions and user interface software and an interface for network search- ing and for different instances.
- the client may use the service menu or a search function of the e-desktop.
- stage 2-4 the e- desktop searches the network for a desired address or service object and sends to it a service request message. To protect the privacy of the client the message can be transmitted for example using a secure connection.
- stage 2-6 the API of social welfare office object communicates with the data processing system of the social welfare office, and in stage 2-8 the data processing system of the social welfare office produces the base information regarding the interface. Base information means here for example earlier certified, prior known information such as a history of decisions.
- the API of social welfare office can transmit in stage 2-10 a form or form application as well as precompleted information to the e-desktop, which offers the client a user interface for filling in the form. Because the client needs the tax statement of the previous year as an attachment to the housing support application, in stage 2-12 he connects to the information service of the tax office. Alternatively the client could have already obtained a copy of the tax statement in question from the tax authority. At the same time the e-desktop searches the network for the correct service object.
- the service object offered by the API of tax office is capable of ei- ther directly retrieving the information requested as shown in the figure, or it can use the e-desktop environment to offer a user interface to locate the information.
- the data processing system of the tax authority returns the tax statement to the interface, and in stage 2-18 the interface transmits the document in certified form or a reference to the document to the e-desktop element, where the client can check it.
- stage 2-20 the client, using the e-desktop, sends the filled-out form, which can have as an attachment the certified tax statement or a reference to it.
- the form can be certified by the electronic signature of the client.
- the interface in stage 2-22, sends the application to data processing system of the social welfare office.
- the client can at stage 2-24, if he desires, give a copy of the application to the e-desktop, from which he can retrieve it when he desires. If necessary the data processing systems of the social welfare and the tax office authorities can communicate directly with one another in stage 2-26, if information is exchanged as mere references. Communication can also occur through the e-desktop APIs.
- the interface service of the client can be created and managed over the encrypted network connection from an information network server to a data terminal.
- the service logic can be based on the representation, storage or utilization of the information registered in the network in electronic transactions, as well as upon the combination of registered information as a collective document.
- Information registered in the network is retrieved and if necessary stored on the server of the service provider or in the data terminal of the client. According to service logic the information can be presented, analysed and combined forming different aggregate compositions.
- Envi-ronment server For transmitting registered information into the data processing system to the service recipient encrypted information network connections can be constructed to the data storages that maintain the registers. Storage of information to one's own data storage of the client's personal transactions envi- ronment server, independent of the electronic transactions service provider's client relationship or processes and constructed by the e-desktop sen ice, can likewise be done in encrypted form.
- the user interface of the service offered by the environment constructed by the e-desktop service can be client-specific, for example the per- sonal WWW page (WWW World Wide Web) of each client from which access can be offered by hyperlinks either by encrypted connection to information in the information networks of the collectors of the registries or from the registries to information stored in encrypted form in the data structure of the service provider.
- the personal WWW page of the client is just one example instead of which the user interface can be formed for example using a separate application.
- an information network information can be moved by secure connection between the service provider's server and the data storage that has collected registered information.
- the personal transactions environment independent of the electronic transactions service provider's client relationship or processes and constructed by the e-desktop service has the functionalities of a firewall. If electronic transacting requires the use of certificates to prove the source of documents, an electronic certificate can be attached to the documents.
- the tax authority can for example certify its documents regarding a client using an electronic signature, and a provider of electronic transactions ser- vices can, from the signature of the tax authority, certify that a document is an authentic and non-forgeable document from the tax authority.
- the appear- ance and data structure (such as data fields) of the user interface can be formed using an XML document sent by the data processing system providing the transactions service. Further it is possible to construct software implementing the application logic used in transactions of the client using program modules that are loaded into use according to the transaction application - for in- stance from the data processing system of an insurance company and/or from the data processing system of a health centre for example to make an accident claim.
- the e-desktop environment of the client constructed by the e-desktop service executes, among other things, the management of elec- tronic transactions certificates, providing an environment implementing application logic, management of client events as well as management of client and data processing system interfaces.
- application logic is implemented, but the server can also function as a proxy server managing certifications of registered information and their trans- mission to application which is loaded onto the client machine. Under certain circumstances electronic transactions can be transferred to occur on the server of the party providing the transaction.
- the personal electronic transactions environment of the data processing system to be built for a legal person meeting personal privacy and information security requirements and independent of the electronic transactions service provider's client relationship or processes, can be created entirely or partially for the server of the communications network, the proxy server of the communications network, the data terminal of a wired or wireless network or a combi- nation of these, and that the environment can be entirely or partially constantly loaded in the data terminal such that in connection with logging-in to the said data terminal the said electronic transactions environment is immediately available for use.
- the environment can be divided for example between a mobile data terminal and a network server such that at least a portion of the database belonging to the data processing system is located on the network server to speed up service and create an adequate storage capacity.
- Fig. 3 shows an electronic ID card 3-2, card reader 3-4 and the data terminal configuration required for electronic transactions 3-6 ... 3-12.
- the data terminal in question or other data terminal providing corresponding functionality and protection as well as the WWW user interface provided by the e-desktop server form user interface of the client in the e-desktop environment.
- the architecture of the data terminal or work station, through which the client can connect to the sen/ice, can comprise for example the driver for card reader 3- 6, the PKI-client element 3-8, the API element 3-10 and the web browser 3-12.
- An electronic identity card of an individual is an officially approved electronic identification and certificate when transacting with authorities.
- An electronic identity card, recognition, encryption and signatures are based on the electronic transactions standards verified by the Ministry of Communications.
- the e-desktop enables the sending of encrypted and signed documents using one's own key.
- an electronic ID card is well suited for this purpose.
- a suitable solution used for example in the smart phones of a wireless network or in some other wireless client terminal can also function as the identifier, wherein the SIM card and the electronic ID card used in the telecommunications operator's data terminal and of the client recognition are combined in the same smart card.
- the invention is not however limited to the said smart card technologies for client recognition, but in each service entirety the most suitable and adequate recognition method may be used for recognition and certification.
- Fig. 4 is shown one possible e-desktop server software solution.
- the server can contain the necessary basic transactions services software for implementing the personal transactions service independent of the electronic transactions service provider's client relationship or processes and based on recognition, an user inter- face and interfaces for various instances, as well as for management of the personal information management of the client.
- the server can additionally retrieve from the network services available at a given time, such as forms and applications such as for example using web sen/ice or CORBA technologies (CORBA, Common Object Request Broker Architecture).
- CORBA Common Object Request Broker Architecture
- the service provider can add to his own data processing system an adapter software implementing the require- ments of the e-desktop API and through it inform the e-desktop system of the services offered, for example forms and/or applications.
- an adapter software implementing the require- ments of the e-desktop API and through it inform the e-desktop system of the services offered, for example forms and/or applications.
- small service providers whose volume is not too great, can use light web-service technology and SOAP messages (reference a) (SOAP, Simple Object Access Protocol), whereas large service providers can communicate using more scaleable ORB technology (reference b). Connections in relation to the e-desktop data storage can be handled in the same way.
- Apache SSL Apache WWW server with SSL protocol support (SSL, Secure Socket Layer); Apache Jakarta: WWW server extension for Java programming environments, such as sen let, JSP (JSP, Java Server Pages);
- JCA API Java Cryptographic Architecture API (API, Application Interface) for handling encryptions
- Java XML API/DOM Parsing of an XML documents and organization of DOM (Document Object Model) elements
- Java SOAP API SOAP protocol support of Java
- JAVA ORB RMI Support for a service implementing CORBA methods using ORB messages and (RMI, Remote Method Invocation) MOP protocol (HOP, Internet Inter-ORB Protocol).
- RMI Remote Method Invocation
- MOP Internet Inter-ORB Protocol
- the e-desktop environment can be implemented in a WWW server using Java components and XML technology.
- the e-desktop service can be physically composed of a group of servers between which data processing is distributed using component technology.
- Broker processes work as the distributors of service information, search the system for free resources and connect the client to the service objects.
- An e-desktop instance or its parts can also function directly in the client data terminal.
- the e-desktop environment can communicate with services of the authorities or other actors with SSL-protected HOP requests through ORB or alternatively with SOAP messages.
- Documents and forms are loaded as XML documents which can have in them functional applet-type portions depending on the structure and contents of the document.
- the service application can also be an entirely independent program.
- the client can store all the applications he has made as well as copies he has taken of authorities' information in the e-desktop environment. For the latter part the storing can be virtual, i.e. the e-desktop can store mere references. Because each document can be certified using certificate of the party, which is responsible for the authenticity of the information, the following parts are added to the document or its copy: 1) As a Data XML document certified by the certification key of its source and encrypted; 2) XSUXSLT-definition (XLS XSLT, a language describing the appearance of an XML document) for representing a document; and 3) The comments of the client in suitable XML format and certified by the certification key of the client.
- XLS XSLT a language describing the appearance of an XML document
- e-desktop API Each party who offers sen/ices through the e-desktop requires an e-desktop API or connection.
- the e-desktop API can be described with the aid of the definition of claims, which are among others
- the interface must provide to the network service objects (ORB) according to the description of the e-desktop as well as web services;
- the documents offered must comply with the DTD or XML scheme definitions according to the e-desktop descriptions and to whose definitions there may come profession- specific characteristics determined by a working group; ORB-mediated sen/ice requests follow agreed-upon IDL descriptions (IDL, Interface Definition Language); - SOAP messages according to the e-desktop descriptions are used for sending messages; Communications are encrypted according to the requirements given (for example SSL); XML documents are encrypted and certified;
- the interface must be able to communicate with the inter- faces of other sen/ice provider, for example when retrieving a document on the basis of a reference. This communication can be implemented as encrypted SOAP messages (for the legal protection of the client there are also grounds for the e-desktop to have knowledge of all these events). How the interface communicates with the inner data processing system of the service provider must be solved on a case-by-case basis.
- the service object of the e-desktop environment or transactions service with which access to a service can be constructed and which can itself implement service functions. This is implemented by creating for the client a user interface with which he attains the use of the sen ices and objects offered by the e-desktop environment.
- the service object dependent on the technology used to implement the data processing system and on what functions the service object is expected to execute.
- the service offered by the e- desktop environment and through it the service objects of the transactions services are a part of a system used to build for a client access outside his own machine to remotely located resources.
- One way of implementing the service object is using Java technology.
- "signed applets"-type applets i.e. small applications that are written in the Java language and execute in the browser window of the data terminal can be distributed to the client.
- "Signed applets” have an electronic signature that is created using a private key.
- J2EE supports a multi-step application model containing Enter- prise Java Beans EJB, servlets and Java Server Pages and middleware elements in which the levels of the service logic separate client requests from traditional server functions.
- EJB Ex- prise Java Beans
- servlets servlets
- Java Server Pages middleware elements
- middleware elements in which the levels of the service logic separate client requests from traditional server functions.
- the interaction of the client interface is transferred to the server's side.
- the server updates the client user interface with HTML or XML documents and the client interface therefore remains thin.
- Enterprise Java Beans are server-side Java-based components that implement server logic and proxy server software.
- EJB ele- ments can be used to implement for example authentication, CORBA interactivity and supervision of object-based transactions.
- Java Beans Java classes can be combined in a user interface applications.
- Servlets are software components that implement on the server, i.e. between client requests and the system, functionality corresponding to CGI programming (CGI, Common Gateway Interface).
- CGI Common Gateway Interface
- EESSI European Electronic Signature Standardization Initiative
- DSA Digital Secure Algorithm
- PKI Public Key Infrastructure
- CA Certificate Authority
- the binding of a digital document can be important. Because of this can be demanded that the document have a time stamp of a time stamping agency, to whom a contract is sent and from whom a time stamp is received. The office sees only an encrypted document with a digital signature and adds to it a time stamp regarding when it received the document and signs the entirety using its own private key. Methods regarding the time stamp will not be further described in this document, and for further information reference is made to the Internet address www.authentidate.com (visited 4.4.2003).
- Java Cryptography Extension Java Secure Socket Extension
- Java Authentication and Authorization Service Java Authentication and Authorization Service
- JCE supports public key algorithms, such as Diffie-Hellman and RSA. Further information regarding the JCE API method is available at the address httpJ/java.sun.com/products/jce/doc/guide/API_users_guide.html (visited
- Java IDL IDL, Interface Definition Language
- HOP Internet Inter-ORB Protocol
- applets to which it is desired to give the right to e.g. read or write to files, certifying must be done using a digital certificate.
- This protection model suits the service model of the e-desktop environment well, making it possible for the client to add to a transactions form attachment files from his own machine and to store files from the e-desktop environment on his own machine. Applets of the type mentioned can also be given the right to use a specific port on the server machine. Because e- desktop servers are usually protected with firewalls this is one of the important characteristics from the viewpoint of an application programmer.
- the actual application server which for example the e-desktop server could implement using Java technology, has within it web server software and supports application programming interfaces such as the above- mentioned EJB, JSP, servlets and JMS.
- the Java server platform is also well suited as the technology of the e-desktop because in e-desktop service in different application forms service agents can be used who and whose state is transferred across the network as objects and collected in the client terminal or server as a software agent.
- Java component or object technology enables the implementation of an e-desktop service as a distributed system.
- Service agent registration into a network to locaters of services for example in the registration application of the services of JINI or Parlay.org enables the locating of services and their loading from the network into use using a service agent.
- Methods for registering into the network of different services also suit the e-desktop service platform quite nicely.
- the invention and its preferred embodiments solve several problems in known art.
- One problem type can be examined from the viewpoint of information management. In current development it is characteristic that the cooperation and direct exchange of information of the authoritative quarters and business's data storages and data processing systems is being greatly developed. It can be thought that development is based on a view according to which all information regarding societal actions is one large data storage to whose planning general data storage technology principles are applied, such as the avoidance of multiple storing.
- the basic idea of the invention and its preferred embodiments is that when moving even more to the electronic transfer, handling and exchange of information, the citizen has at his disposal an electronic "window" through which he can follow, see and supervise what happens to information regarding himself, take part in the progress of events and transact effectively.
- One advantage of a method and system according to the invention is that it makes it possible for a member of society to take part in the transfer and distribution in an information network of information regarding himself such that privacy protection and information security requirements are met.
- Another advantage of a method and system according to the invention is that it provides a service that is located between the party saving registered information to his data processing system through his actions, for example the tax office, and the client, making possible for the client an interface to registered information, for example the possibility of combining informa- tion to gather together registered information required in electronic transactions from different data storages. Additionally it makes possible for the client for example the combining of information in different registers and or analysis, storage of the information or even access to registered information collected from several sources. In some embodiments of the method and system according to the invention access to information is through a personalized user interface.
- management of certificates is implemented, which is a prerequisite in electronic transactions when gathering for example certified information from various authorities for a tax statement or support applications.
- One advantage of the method and system according to the invention is that it protects the privacy and information security of the client and improves legal protection.
- the invention and its different embodiments improve coordination and cooperation between different actors, for example between banking sector.
- the service also enables so-called one-window electronic transactions by providing a client interface and client recognition and certification as well as management of the certificates of electronic documents through one "window", i.e. through the service. This can be implemented for example through the personalized WWW service page of each client.
- the invention and its various embodiments can be adapted to implement responsibilities of the society, or among other things in the areas of economic, health, safety and legal protection according to the needs of the client as well to further and simplify electronic transactions.
- the invention and its various embodiments can be adapted in electronic transactions utilizing the registered information regarding the client of authorities, institutions, general government or companies.
- This type of information could be for example the information registered by authoritative quarters such as the social welfare office, tax authority, police, population register centre or health centre.
- they can also be the information associable to the client of and registered by bank, municipality, housing association, insurance corporations or store.
- the e-desktop environment also enables electronic transactions between clients, for example the making of a bill of purchase between two individuals.
- the e-desktop environment can offer its clients prepared transaction forms for the general contract events such as barter trade, car trade etc. and on the other hand form bases, which by editing can be made to bring forward the purpose of the agreement from the client's side.
- the clients can each log-in to the system from their own data terminal or from the same machine. Reciprocal transactions can also occur between more than two clients.
- the e-desktop environment can have a server (implements the service logic) and a software process that implement reciprocal services.
- the transaction forms of the service offered on this server can be seen and if needed edited by both (all) participants in reciprocal transactions, who certify the transaction forms with their electronic signatures.
- the service can offer a view of the transaction form, and clients log-in to a joint transactions event and the e-desktop server recognizes and certifies just as in other transactions events.
- An official quarter such as a sale notary or the like can also take part in the transactions event and confirm the document with his own signature. Further it is possible to add an official time stamp to the document.
- a bill for electronic service can be directed to the legal person logged-in to a system that implements the method according to the invention and its preferred embodiments, used he any sort of service whatsoever that is built into the e-desktop API
- electronic transactions can also be used to provide information network services.
- Such services can be a service for access to an information network, which can be based on a connection contract and visiting in the networks of other telecommunications operators based on a network-visiting contract between telecommunications operators.
- the personal electronic transactions environment of a legal person can form a transactions connection to a communications network access sen/ice as well as to data processing systems offering other communications services.
- a telecommunica- tions operator offering information network services using electronic transactions can construct in his data processing system an e-desktop API supporting electronic transactions.
- a legal person can be offered for example access code required for access to DVB, DVB-H, GSM/GPRS, UMTS and WLAN networks or other code prerequisite for access to the technical network of the said networks and/or parameter values, configuration information and/or files prerequisite for use or supporting technical use of the offered communications services.
- One possible sen/ice form for reciprocal transactions could be an Internet phone service or other data stream service.
- the widespread expansion of Internet phone service has been forced to wait because there has not been a business model based on it and supporting Internet phone services, with which cash flow financing could be solved.
- This invention presents a method, data processing system model and data terminal and server device software with which this problem is solved by a service utilizing the method and system of the invention.
- the basic model for Internet phone sen/ices is a call between two PCs, both of which are connected to the Internet, where in the model the PC's software compresses and decompresses the sound.
- the Internet phone service provider is a port server in between an IP network and a mobile phone network or phone network.
- the IP network functions between the phone networks of the caller and call recipient. In this model the costs of the IP network from the long-distance call are cov- ered by using the IP network to connect the local phone networks.
- the ITSP can gather billing data on a session basis e.g. based on recognition of its client.
- the port server can also be implemented as an integrated solution, where different types of interfaces and/or routing features and/or landline or mobile network connection technologies are integrated into the service platform of the IP- calls.
- VoIP standards H.323 and all of H.323 related standards such as H.245, H.225, H.450, G.723, G.729 etc.
- Audio coding in a data terminal regards standards G.711 (64 kbits/s), other supported codecs are G.722 (on a 7 kHz band 64, 56 and 48 kbit/s), G.723 (5.3 and 6.4 kbit/s), G.728 (16 kbit/s), G.729 ( 8 kbit/sd) and GSM codec (5.6 - 13 kbit/s).
- H.245 are standards relating to the management of the system.
- Standard H.225.0 relates to management of the call, i.e. it implements call signalling.
- H.225.0 and H.245 use trustworthy TCP protocols in connection with Internet calls.
- a part of the H.323 standard, RTP (Real Time Protocol), is de- veloped by IETF.
- RTCP or Real Time Transport Control Protocol is a protocol for management of the RTP connection.
- speech can be transferred over a UDP connection.
- speech is synchronized using sequences and time stamps added to header information. Because in the transfer of speech QoS, i.e.
- connection quality parameters are important, for reservation of resources in the network either DiffServ and MPLS protocols can be used to guarantee adequate connection quality.
- DiffServ and MPLS protocols can be used to guarantee adequate connection quality.
- an Internet phone application can also use a Session Initiation Protocol.
- SIP protocol In the data load of a SIP protocol a standard-form description of the codec and connection addresses used in a phone connection is transmitted from application to application.
- SIP protocol includes SIP registration servers, and utilizing SIP registration procedures, a mobile IP characteristic is implemented, i.e. it supports client movement in an IP subnetwork.
- a SIP protocol INVITE mes- sage is for example a SDP data load that contains information about the program tools of the data terminal, such as codecs.
- a SIP user agent As an application support in the Internet call is a SIP user agent (UA) which has an interface for example just for the protocols transmitting speech.
- OPTIONS SIP message can be used to request UA characteristics. All in all the basic characteristics of the SIP pro- tocol are to transmit information regarding the characteristics of the software interface of the data terminal as well as those of the connection to be formed.
- a bill can be formed for the use of the electronic transactions sen/ice, and the bill is sent to the service handling billing.
- Such service can be for example a billing service of a bank that performs the paying of the bill from the account of the legal person recognized.
- Other bill handling services are also possible; one environment for handing billing is described in more detail later.
- Internet phone services can be offered according to the invention and its preferred embodiments for example using the electronic application of the e-desktop environment between a legal person and an instance providing electronic transactions sen/ice.
- To the e-desktop phone service can then be joined basic characteristics offered by the e-desktop environment such as recognition of a legal person and billing operations regarding a call.
- a liable-to- charge Internet phone service offered by a PC - e-desktop transactions service is preferably for example an information service, "help desk" service or some other information service, the cost of whose services it is desired to cover by a billing for calls.
- the server offering the e-desktop Internet phone service as transactions service must be equipped with the interface software that is prerequisite for Internet phone services (e.g. the said SIP UA and required streaming data transfer and management protocols).
- a basic characteristic of the e-desktop environment services is also the reciprocal transactions of e- desktop clients, and Internet phone sen/ice characteristic between clients can be one e-desktop environment service.
- one e-desktop Internet phone service billing form For support of the billing operation a billing environment according to the definition of the Open Mobile Alliance (OMA) can also be used, in which the Internet call session can be one form of billable services of the e-desktop.
- OMA Open Mobile Alliance
- An Internet call can be considered as one billable event that can be billed according to the length of the session or as an individual event.
- the e-desktop environment can also be in the direction of the billing-transactions service provider.
- billing can be based on billing information gathered by the proxy server. Further it can be based on "push or pull"-type contents and distribution. Billing can also occur from the server of the content producer.
- An OMA billing environment is formed of logical units, "entities".
- the billing data of the billing operations is formed (either by the proxy server or by the content server) as an XML message (Charging Detail Record, CDR) using Usage Recording of the logical en- tity and sent into the billing environment for continued handling.
- billing is mainly externalised from the content and event server to an external billing server.
- the server of the service provider must form an interface for an e)rternal billing environment. At the minimum this interface is formed of Usage Recording Entity.
- the logical entity Charging Control receives the message. Charging Control contains functions for the processing of billing data such as pricing, collecting of billing events, data filtering or other application-specific pre-handling of billing information.
- Charging Control can also collect billing information from many devices attached to the different network.
- the service provider's server interface to the billing environment can comprise in addition to Usage Recording entity, Charging Control entity as well.
- the logical entity Business Support receives the billing data processed by the Charging Control entity and transforms this information into a bill.
- the Business Support entity can have an interface to the billing systems that execute the final billing.
- the server of the service provider may also contain also this entity, in which case it can handle the entire billing operation with the billing system of the interface (e.g. the system of a bank or credit card company).
- the OMA system has a standardized way of constructing a billing proxy server between the service provider's and the actual systems handling the billing (bill payment).
- the interface to the billing environments can also be constructed according to the OMA billing environment in some manner of forming as described above either from the e-desktop server or from the servers providing Internet phone service as a transactions service.
- the e-desktop server can function as the billing proxy server in an OMA billing environment.
- an e-desktop electronic transactions environment independent of the electronic transactions service provider's client relationship or processes can also be implemented in the client terminal.
- the electronic transactions user interface and transactions software as well as the interfaces to different instances and other e-desktop client terminals (to e- desktop electronic transactions environments) can be implemented in the client data terminal.
- the client terminal can be preferably a WLAN terminal, but also a UMTS or GPRS terminal, in which the said interfaces are constructed on top of IP communications protocol using connection and application protocols and software components technology. Because in the said radio interfaces it is possible to implement several simultaneous IP connections, it is possible to form and maintain several sessions requiring mobile transactions from the electronic transactions environment of the client data terminal.
- the client terminal described in the previous paragraph can be a personal mobile data terminal of a citizen, e.g. a PDA or mobile phone.
- UA support can be implemented, with which interfaces to new electronic transactions instances can be found and added to the transactions environment.
- each client terminal e-desktop electronic transactions environment
- the communications network can also offer WLAN roaming services through the e- desktop API.
- the electronic transactions environment of the client terminal can support MMS message service. Reciprocal communications using the said services can be implemented between two client terminals directly, without a communications coupling centre, through the IP routing network.
- the e-desktop electronic transactions data processing system of the client terminal can also have an address book, in which frequently-used connection addresses for example for Internet phone service of electronic transactions ser- vice, can be stored.
- the address book can be completed using UA and a locator of registered services.
- some sort of directory service could also offer this connection information.
- electronic transactions services and services supporting electronic transactions can be located in the menus of the data terminal.
- the client user interface is reminiscent of a familiar mobile phone user interface.
- the data terminal can be equipped with software implementing an e-desktop electronic transactions environment according to the invention and its preferred embodiments and a legal person can log-in to this electronic transactions service independent of the electronic transactions service provider's client relationship or processes as he logs-in to the data terminal.
- the encryption keys of a legal person can in this case be taken into use for example by reading a smart card such as a electronic ID card with the data terminal.
- the keys can be stored on the smart card of the data terminal and they can be taken into use through a definite identification.
- Yet another possible e-desktop environment sen/ice form is the encryption and storing in the system of pictures sent by the client on the service.
- the e-desktop environment can offer client recognition and certification as well as services of the interface described above.
- the purpose of a message storage service is that a client or authority can store a picture or sound file as support to a contract or to document a picture or sound file as an officially approved recording. Adding a time stamp is in this case frequently an essential part of the service.
- the client may for example wish to store in the e- desktop environment pictures of his own apartment that he is offering for rent.
- this picture material may be used as evidence in a damage claim against the tenant.
- the stored material can relate to security if the client feels himself to be threatened or is a witness in a situation where he may possibly later need evidential strength.
- An authority can also use a similar system. For example at a police work site a camera could be attached to clothing and hidden, a camera whose picture is, using a wireless short-distance network, stored to a "black" box located in a car or through an authorities' network or a public network to a server of an information network in encrypted form. Because of privacy protection the encryption can be a part of the requirement specification of the service and the encryption can be allowed decryption only for example by a legal decision.
- the invention and its different embodiments man involve information security politics, which can be described among others as the following: 1. Recognition of a citizen is based on generally used, adequate dependable methods.
- All information relating to a citizen, that is sent and/or stored in the e- desktop system contains a certificate of its source and can be protected such that only the citizen can gain access to the information.
- All information relating to a citizen that is sent from the e-desktop system to a service provider or authority contains a certificate of its source and is protected such that only the aforementioned service provider or the authority can gain access to the information.
- An authority managing the e-desktop system enjoys the trust of all parties and assures that if a citizen is prevented from using e-desktop services for example due to sickness, death, being taken into custody or some similar valid reason, access to information regarding this citi- zen will be arranged for he to whom this right legally belongs.
- applet software (Java) provided by the operating system, generally loads along with a www-page CORBA, Common Object Request Broker Architecture, a method by which softwares (objects) in the network can find one another and request services from one another
- DTD Document Type Definition
- XML originally SGML
- EJB Enterprise Java Beans
- HOP Internet Inter-ORB Protocol
- J2EE Java 2 Enterprise Edition
- Java programming environment that offers a complete solution for object-oriented distributed systems.
- JGA API Java Cryptographic Architecture API for handling encryption
- Java a programming language and common program execution environment
- Java component Java program part that can be taken into use through the network and during program execution
- Java XML API/DOM Java XML API/DOM, XML document parser and DOM (Document Object Model) element organization
- MS Crypto API Microsoft's software interface for encryption/decryption ORB, a service implementing the CORBA-method service object, software (one or several components) that can be loaded upon request through a network during program execution to implement a particular ser- vice
- PKCS#11 an open-source software interface for encryption/decryption PKI, Public Key Infrastructure, a general name for asymmetrical encryption and for management of its keys interface (here) a connection that enables the cooperation of two different types of software RMI, Remote Method Invocation, a call to a remote sub-program (in an ORB connection) servlet, a program (Java) located on a www server and related to a www- application
- SOAP Simple Object Access Protocol
- XML-based message format for sending reciprocal service requests between applications in web service technology application logic, the part of a computer application responsible for the actual processing of information
- SSL Secure Socket Layer
- SSL Secure Socket Layer
- SOAP Simple Object Access Protocol
- XML Extended Markup Language
- meta-language that enables a common storage form for all text information
- XSL/XSLT a language for describing the appearance of an XML document
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FI20030334 | 2003-03-04 | ||
| FI20030334A FI20030334A0 (en) | 2003-03-04 | 2003-03-04 | HSTwww-transaction service |
| FI20030518 | 2003-04-04 | ||
| FI20030518A FI20030518A7 (en) | 2003-03-04 | 2003-04-04 | Electronic transaction method |
| PCT/FI2004/000119 WO2004090696A1 (en) | 2003-03-04 | 2004-03-04 | Method and system for carrying out electronic transactions |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1602021A1 true EP1602021A1 (en) | 2005-12-07 |
Family
ID=26161350
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP04717120A Withdrawn EP1602021A1 (en) | 2003-03-04 | 2004-03-04 | Method and system for carrying out electronic transactions |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP1602021A1 (en) |
| FI (1) | FI20030518A7 (en) |
| WO (1) | WO2004090696A1 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NL2014742B1 (en) * | 2015-04-30 | 2017-01-18 | Ubiqu B V | A method, a computer program product and a qKey server. |
| CN108632299A (en) * | 2017-03-15 | 2018-10-09 | 北京京东尚科信息技术有限公司 | Enhance method, apparatus, electronic equipment and the storage medium of registration center's availability |
| CN114048445B (en) * | 2021-11-16 | 2025-09-02 | 方正株式(武汉)科技开发有限公司 | A user authentication method and system based on Excel application |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0917120A2 (en) * | 1997-11-12 | 1999-05-19 | Citicorp Development Center, Inc. | Virtual wallet system |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030028782A1 (en) * | 2000-11-22 | 2003-02-06 | Grundfest Joseph A. | System and method for facilitating initiation and disposition of proceedings online within an access controlled environment |
| US7676439B2 (en) * | 2001-06-18 | 2010-03-09 | Daon Holdings Limited | Electronic data vault providing biometrically protected electronic signatures |
-
2003
- 2003-04-04 FI FI20030518A patent/FI20030518A7/en not_active Application Discontinuation
-
2004
- 2004-03-04 WO PCT/FI2004/000119 patent/WO2004090696A1/en not_active Ceased
- 2004-03-04 EP EP04717120A patent/EP1602021A1/en not_active Withdrawn
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0917120A2 (en) * | 1997-11-12 | 1999-05-19 | Citicorp Development Center, Inc. | Virtual wallet system |
Also Published As
| Publication number | Publication date |
|---|---|
| FI20030518A0 (en) | 2003-04-04 |
| FI20030518L (en) | 2004-09-05 |
| WO2004090696A1 (en) | 2004-10-21 |
| FI20030518A7 (en) | 2004-09-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7949871B2 (en) | Method for creating virtual service connections to provide a secure network | |
| AU2006206255B2 (en) | Data exchanges related to financial transactions over a public network | |
| US8020196B2 (en) | Secure transmission and exchange of standardized data | |
| US8327436B2 (en) | Infrastructure architecture for secure network management with peer to peer functionality | |
| US7788485B2 (en) | Method and system for secure transfer of electronic information | |
| JP3932685B2 (en) | Method for executing remote procedure call on network and network system capable of executing remote procedure call | |
| EP1559240A1 (en) | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |
| US7424616B1 (en) | System and method for facilitating access by sellers to certificate-related and other services | |
| WO2004090696A1 (en) | Method and system for carrying out electronic transactions | |
| Laat et al. | RFC2903: Generic AAA architecture | |
| Johnston et al. | A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments | |
| Luís Osório et al. | Reliable and secure communications infrastructure for virtual enterprises | |
| Jøsang et al. | Authentication for humans | |
| JP2000235528A (en) | Method for executing remote procedure call on network | |
| EP1301886B1 (en) | Procedure and system for transmission of data | |
| Tauber et al. | An interoperability standard for certified mail systems | |
| Caelli | Information security in electronic commerce | |
| Staamann et al. | CORBA as the Core of the TINA-DPE: A View from the Security Perspective | |
| Opincaru | Service oriented security architecture applied to spatial data infrastructures | |
| Roos | RPC sliding on SOAP | |
| Aiken et al. | Public key infrastructure for DOE security research | |
| Aiken | Public-Key Infrastructure Related DOE Security Research: Findings from US Department of Energy, Joint Energy Research/Defense Programs Computing-related Security Research Requirements | |
| Metso | Service Management in IP Networks | |
| Ferrer-Roca | Internet in Telemedicine | |
| Metso et al. | IP network management |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20051004 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
| DAX | Request for extension of the european patent (deleted) | ||
| RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: MAEKIPAEAE, RISTO Inventor name: VALJAKKA, MIKKO |
|
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: MAEKIPAEAE INNOVATION OY |
|
| 17Q | First examination report despatched |
Effective date: 20090107 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20180719 |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 1/00 20060101AFI20041025BHEP |