WO2003044711A1 - Method for distributing and redeeming electronic coupons using an electronic messaging service - Google Patents

Method for distributing and redeeming electronic coupons using an electronic messaging service Download PDF

Info

Publication number
WO2003044711A1
WO2003044711A1 PCT/SG2001/000237 SG0100237W WO03044711A1 WO 2003044711 A1 WO2003044711 A1 WO 2003044711A1 SG 0100237 W SG0100237 W SG 0100237W WO 03044711 A1 WO03044711 A1 WO 03044711A1
Authority
WO
WIPO (PCT)
Prior art keywords
coupon
electronic
data item
signature data
electronic coupon
Prior art date
Application number
PCT/SG2001/000237
Other languages
French (fr)
Inventor
Sriram Ramachandran
Ramanath Padmanabhan
Original Assignee
Kent Ridge Digital Labs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kent Ridge Digital Labs filed Critical Kent Ridge Digital Labs
Priority to PCT/SG2001/000237 priority Critical patent/WO2003044711A1/en
Priority to AU2002217743A priority patent/AU2002217743A1/en
Publication of WO2003044711A1 publication Critical patent/WO2003044711A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/387Payment using discounts or coupons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Definitions

  • the present invention relates to a system and method for distributing and redeeming mobile electronic coupons using an electronic messaging service.
  • the invention finds particular use in mobile commerce.
  • Printed coupons may be issued using a distribution means such as widely available print media (for example, magazines and newspapers).
  • some organizations such as credit card companies, offer printed coupons to specific market segments (for example, credit card holders having a particular type of credit card) by distributing coupons using targeted mail.
  • coupons may also provide a valuable tool for obtaining marketing data. For example, by monitoring the proportion of coupons issued to those that are redeemed, an organization may obtain a measure for the success of a coupon issuance.
  • redeemed coupons may be used to collect demographic information. Such demographic information may include consumer details (for example, by the provision of an name and address fields which must be completed by a consumer to enable the coupon to be redeemed) or the source from which the coupon was retrieved (for example, magazine X, where the coupon was published in both magazines X and Y).
  • Marketing data such as the types described above may be beneficially used to assist an organization with decision making processes in relation to, for example, adjusting an existing, or formulating a new, marketing strategy.
  • US patent 5,907,830 proposes an Internet based coupon distribution system whereby a consumer is able to use a computer connected to the Internet to download a coupon and prepare a paper copy of the coupon using a printer.
  • a consumer can take the printed coupon to a retailer to redeem it, or return it to the source (for example, a manufacturer) along with a proof of purchase in order to receive a refund by mail.
  • the consumer cannot redeem the coupon without having first printed it, thus requiring additional hardware in the form of a printer.
  • the process of redeeming the coupon and gathering marketing data from the coupon still requires processes which are manually intensive.
  • paperless equivalents of coupons are finding increasing popularity.
  • existing paperless coupon systems either require the consumer to purchase customised software, hardware or smart cards, or are Internet based.
  • An Internet based system for generating and redeeming electronic coupons may be of the type described in US patent 5,855,007 (the '007 patent).
  • the '007 patent describes an electronic coupon communication system for generating and redeeming unique product discount coupons over a public computer network such as the Internet.
  • the system described in the '007 patent comprises a first Internet node, an Internet coupon server and an Internet coupon notification centre.
  • the Internet coupon server accepts an on-line selection of one of the available unique Internet coupons from a user of the Internet node and transmits the coupon back to the user's printing device or email storage.
  • a computer or other web enabled device which is able to communicate with the coupon server over a public computer network such as the Internet.
  • a computer will be equipped with specialised software (for example, a web browser) to enable it to interface to the public computer network.
  • electronic coupons used in these systems may be subject to abuse in the form of tampering.
  • tampering may performed by a hacker, and be directed towards manipulating the contents of the coupon to the benefit of the hacker.
  • a hacker may modify the contents of an electronic coupon so as to improve the value of the incentive.
  • a method for distributing and redeeming electronic coupons using an electronic messaging service including the steps of: generating an electronic coupon using a coupon server, the electronic coupon containing coupon data items; establishing a communications link between the coupon server and a mobile messaging device, the mobile messaging device being capable of sending and receiving electronic coupons using the electronic messaging service; transmitting the electronic coupon to the mobile messaging device using the electronic messaging service; the mobile messaging device receiving and storing the electronic coupon; establishing a communications link between the mobile messaging device and a transaction server; the mobile messaging device transmitting the electronic coupon to the transaction server using the electronic messaging service; the transaction server receiving the electronic coupon; and the transaction server redeeming the electronic coupon.
  • the electronic messaging service is a GSM (Global System for Mobile Communications) Short Message Service (SMS).
  • SMS Global System for Mobile Communications
  • the mobile messaging device may be a GSM SMS enabled mobile phone or a GSM SMS enabled Personal Digital Assistant (PDA).
  • PDA Personal Digital Assistant
  • the electronic messaging service is a Code Division Multiple Access (CDMA) messaging service.
  • CDMA Code Division Multiple Access
  • the mobile messaging device may be a CDMA messaging service enabled mobile phone or a CDMA messaging service enabled PDA.
  • the electronic messaging service is a Wireless Multimedia and Messaging Service (WIMS).
  • WIMS Wireless Multimedia and Messaging Service
  • the mobile messaging device is a WIMS enabled device.
  • the coupon data items include: identification data, which is representative of a unique identifier for identifying the coupon; expiry date data, which is representative of a date up until which the coupon is able to be redeemed; value data, which is representative of the value of the coupon; and currency data, which is representative of a unit of measure associated with the value data.
  • the electronic coupon also contains a signature data item.
  • the coupon data items are derived from a subset of data items contained in a pre-existing computer readable file such that each coupon data item is related to a data item in the pre-existing file, each coupon data item being substantially identical to the related file data item.
  • the electronic coupon may, or may not, contain a signature data item.
  • the signature data item may be generated in any suitable process.
  • the following steps are performed: encrypting the coupon data items using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
  • the signature data item may be created using a signature data creation process which includes the steps of: encrypting the data items contained in the pre-existing file using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
  • the first signature data item is able to be stored in the pre-existing file.
  • the establishing of the communications link between the coupon server and the mobile messaging device is initiated by a user utilising the mobile messaging device to request the electronic coupon from the coupon server.
  • the establishing of the communications link between the mobile messaging device and the transaction server is performed by a user utilising the same mobile messaging device.
  • the step of redeeming the electronic coupon includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid.
  • the coupon data includes identification data, expiry date data, value data and currency data, authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid.
  • the authentication of the electronic coupon includes the steps of: obtaining the expiry date data from the electronic coupon; comparing the expiry date data obtained from the electronic coupon with a transaction date; in response to determining that the coupon has not expired, obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; and comparing each of the coupon value data item and coupon currency data item with the retrieved file data items related to the coupon value data item and coupon currency data item, wherein the electronic coupon is valid if the data items being compared are the same.
  • the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid
  • the authentication of the electronic coupon includes the steps of: obtaining the first signature data item from the electronic coupon; encrypting the coupon data items using the symmetric encryption algorithm to provide a second ciphertext, wherein the symmetric encryption algorithm uses the symmetric key; hashing the second ciphertext using the one way hashing function, the hashing providing a second unformatted signature data item; formatting the second unformatted signature data item to provide a second signature data item; and comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
  • the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid
  • the authentication of the electronic coupon includes the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; encrypting the retrieved file using the symmetric encryption algorithm, the symmetric encryption algorithm using the symmetric key, the encryption of the retrieved file providing a second ciphertext ; hashing the second ciphertext using the one way hashing function, the hashing providing a second unformatted signature data item; formatting the unformatted second unformatted signature data item to provide a second signature data item; and comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
  • the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid, wherein the authentication includes the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; obtaining the first signature data item from the retrieved file; and comparing the first signature data item obtained from the electronic coupon with the first signature data item obtained from the retrieved file, wherein the electronic coupon signature data items are the same.
  • the step of authenticating the electronic coupon further includes communicating the results of the authentication to a display terminal.
  • the step of authenticating the electronic coupon further includes communicating the results of the authentication to the mobile messaging device, wherein the communication of the results is performed using the electronic messaging service.
  • the transaction server receives demographic information with an electronic coupon.
  • a system for distributing and redeeming electronic coupons using an electronic messaging service including: a plurality of mobile messaging devices which transmit and receive electronic coupons using an electronic messaging service; a coupon server including a computer processor and associated memory, the coupon server being connected to a communications network, which network supports an electronic messaging service, the coupon server generating electronic coupons and transmitting electronic coupons to the mobile messaging devices using the electronic messaging service; and a transaction server including a computer processor and associated memory, the transaction server being connected to the communications network, and redeeming electronic coupons received from mobile messaging devices.
  • the present invention includes a number of advantages in that the method is able to deployed using existing electronic messaging infrastructures, thus enabling the distribution and redemption of electronic messages using existing mobile phones and other similar messaging enabled devices.
  • the invention provides an electronic coupon format having features which enable authentication and which use cryptographic signature verification to improve resistance to tampering. Furthermore, the invention enables each transaction to be acknowledged by means of a return receipt or confirmation message. It will also be recognised that the invention enables automated collection of marketing data, including demographic information.
  • Figure 1 is a block diagram illustrating a system in accordance with a preferred embodiment of the invention.
  • Figure 2 is a flow diagram illustrating the process of generating an electronic coupon in accordance with a first preferred embodiment of the present invention
  • Figure 3 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a second preferred embodiment of the present invention
  • Figure 4 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a third preferred embodiment of the present invention
  • Figure 5 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a fourth preferred embodiment of the present invention
  • Figure 6 is a block diagram illustrating the operational sequence for requesting a mobile coupon in accordance with the preferred embodiments of the invention.
  • Figure 7 is a flow diagram illustrating the process of non cryptographic verification of an electronic coupon
  • Figure 8 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with the first preferred embodiment of the present invention
  • Figure 9 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with the second preferred embodiment of the present invention.
  • FIG. 10 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with a third preferred embodiment of the present invention.
  • mobile coupons and its derivatives “mCoupons” and “mobile electronic coupons”.
  • mobile electronic coupons By the use of these terms, reference is made to a particular form of an electronic coupon which is able to be communicated to and from a mobile messaging device, such as a mobile phone, using an electronic messaging service.
  • FIG. 1 A system for distributing and redeeming an mCoupon according to an embodiment of the present invention is shown in Figure 1.
  • the system includes a mobile messaging device 10 which is operable to communicate with a coupon server 12 and a transaction server 16 over an communications network 14.
  • the communications network 14 is a GSM SMS capable network, and accordingly, the mobile messaging device 10, is also able to communicate with the coupon server 12 and the transaction server 16 using the GSM SMS capable network. It is to be appreciated, however, that although reference will be made to the communications network 14 as being GSM SMS capable, the communications network 14 is to be understood not to be so limited. Indeed, the invention may be deployed using a communications network 14 which is capable of supporting an alternative electronic messaging scheme (such as, CDMA messaging or Wireless Multimedia Messaging) in which case the mobile messaging device 10 will also be so capable.
  • GSM SMS Global System for Mobile Communications
  • the communications network 14 is to be understood not to be so limited. Indeed, the invention may be deployed using a communications network 14 which is capable of supporting an alternative electronic messaging scheme (such as, CDMA messaging or Wireless Multimedia Messaging) in which case the mobile messaging device 10 will also be so capable.
  • an intervening communications network 18 may be the Internet, a public switched telephone network (PSTN) an integrated services digital network (ISDN), a network capable of supporting an electronic messaging service different to that provided by the communications network 14, or a combination thereof. It is to be understood, however, that the provision of the intervening communications network 18 is optional. Indeed, the invention may be deployed without having the intervening communications network 18. ln a system of the present invention which includes an intervening network 18, the intervening network 18 is able to facilitate protocol conversion (for example TCP/IP to SMS). It is envisaged that the intervening network 18 will enable devices coupled to the intervening network 18 to interoperate where those devices would otherwise not have been to communicate (for example, where the coupon server uses TCP/IP and the mobile messaging device 10 uses a CDMA messaging protocol)
  • the coupon server 12 may be a programmed computer which is capable of generating mCoupons by translating pre-existing data files containing coupon data.
  • the pre-existing files are preferably stored on a database 13 (herein referred to as the 'Woucher database") which preferably resides on the coupon server 12.
  • the coupon server 12 is also capable of sending and receiving mobile coupons using a protocol which is compatible with the communications network 14 or the intervening communications network 18 if provided.
  • Figure 1 also includes a transaction server 16 which is preferably a programmed computer, which computer includes sufficient hardware and software to enable the transaction server 16 to redeem mCoupons received from a mobile messaging device 10 and, if required, access pre-existing files from the coupon server 12.
  • a transaction server 16 which is preferably a programmed computer, which computer includes sufficient hardware and software to enable the transaction server 16 to redeem mCoupons received from a mobile messaging device 10 and, if required, access pre-existing files from the coupon server 12.
  • coupon server 12 and the transaction server 16 are separate entities. However, it is to be understood that the coupon server 12 and the transaction server 16 need not be separate. Indeed, in a preferred form of the invention, the coupon server 12 and the transaction server 16 will be a single entity, capable of providing the required dual functionality.
  • the coupon server 12 (refer to Fig 1 ) is able to generate a particular type of mCoupon 19 using data derived from data stored in a pre-existing data file, which data file, for the purposes of this description, will herein be referred to as a 'Woucher".
  • a vVoucher 20 may include a plurality of data fields 22, each field having a respective data item 24.
  • the coupon server 12 extracts particular data items 26, 28, 30 and 32 from the vVoucher 20 and arranges the particular data items in the form of an mCoupon 19.
  • the particular data items will herein be referred to as "coupon data items”.
  • the coupon data items include a coupon identifier (the "COUPONID") 26, an expiry date (the "EXPIRYDATE") 28, a coupon value (the 'VALUE”) 30 and a currency (the "CURRENCY”) 32.
  • the coupon data items include a coupon identifier (the "COUPONID") 26, an expiry date (the "EXPIRYDATE") 28, a coupon value (the 'VALUE”) 30 and a currency (the "CURRENCY”) 32.
  • this exemplary form of the mCoupon 19 will herein be referred to as an "unsigned mCoupon" 19.
  • a cryptographic signature 34 may be appended to the unsigned mCoupon 19.
  • Such cryptographic signature 34 (the
  • MCSIGNATURE is preferably generated by the coupon server 12 (refer to Fig 1 ).
  • an mCoupon 19 having a respective MCSIGNATURE 34 will be refered to as a "signed mCoupon" 36.
  • FIG. 3 there is illustrated a first preferred method for generating a signed mCoupon 36.
  • an MCSIGNATURE 34 is able to be generated using the coupon data items 26, 28, 30 and 32.
  • the coupon data items 26, 28, 30 and 32 are encrypted 37 using a symmetric encryption key algorithm (such as DES, IDEA or Blowfish) and a symmetric encryption key ('the symmetric key'), the symmetric key being known only to the issuer of the mCoupon 19 and the transaction server 16 where the coupon is able to be redeemed.
  • a symmetric encryption key algorithm such as DES, IDEA or Blowfish
  • a symmetric encryption key 'the symmetric key'
  • the symmetric key may be changed on a daily basis, or on a per-coupon basis, or based on some other policy in accordance with the requirements of the coupon issuer.
  • issuer throughout this specification is to be understood to be reference to the organization (for example, a retailer or manufacturer) on whose behalf the mCoupon 19 or 36 has been issued.
  • the encryption of the coupon data items may be represented as:
  • C p is the coupon data items before encryption
  • E k is the process of encrypting C p with a symmetric key k
  • C e is ciphertext which results from the encryption process (herein refered to as the encrypted mCoupon 38).
  • the encrypted mCoupon 38 in the form of ciphertext, is then hashed using a one way hash function 39 (such as MD5, SHA-1 , RIPEMD-160).
  • a one way hash function 39 such as MD5, SHA-1 , RIPEMD-160.
  • hashing function throughout this specification is to be understood to be reference to a function which performs hashing (for example, MD5, SHA-1 , RIPEMD-160).
  • This process may be represented as:
  • H is the one way hash function
  • S is the result of the one way hashing
  • the result of the hashing S is then converted 41 into its hexadecimal ASCII text representation, which representation is able to be used as the MCSIGNATURE 34 for use with the signed mCoupon 36.
  • the signed mCoupon 36 is provided with improved protection against deliberate or accidental tampering.
  • Example 1 The following example (Example 1 ) is provided to assist the reader with the understanding of first preferred method of generating a signed mCoupon 36.
  • the issuer O generates a symmetric key k which he uses to sign the mCoupon C.
  • the issuer O also agrees to use Triple-DES (DES3) as the symmetric encryption algorithm, and MD5 as the hash algorithm.
  • DES3 Triple-DES
  • MD5 the hash algorithm.
  • the issuer O generates the MCSIGNATURE 34 for mCoupon C as follows:
  • C e DES3 ( C, K ) where K is the symmetric key chosen by issuer O, and C e is the ciphertext;
  • MCSIGNATURE BinToHex (H) where BinToHex represents the conversion of the hash value H from binary to hexadecimal form.
  • a customer desires a coupon, he is able to send a request message to a pre-arranged phone number, which in turn responds by sending C s as a message back to the user.
  • FIG. 4 there is illustrated a second preferred method for generating a signed mCoupon 36.
  • MCSIGNATURE 34 is generated using a vVoucher 20.
  • vVoucher 20 is encrypted 37 using a symmetric encryption key algorithm (such as DES, IDEA or Blowfish) to provide an encrypted vVoucher 40.
  • a symmetric encryption key algorithm such as DES, IDEA or Blowfish
  • the symmetric key is known only to the issuer of the mCoupon 19 and the transaction server 16 where the coupon is able to be redeemed.
  • the symmetric key may be changed on a daily basis, or on a per-coupon basis, or based on some other policy in accordance with the requirements of the issuer.
  • the encryption of the coupon data may be represented as:
  • ⁇ C p is the vVoucher data items before encryption
  • E k is the process of encrypting C p with a symmetric key k
  • C e is ciphertext which results from the encryption process (herein refered to as the encrypted vVoucher 40).
  • the encrypted vVoucher 40 is then able to be hashed using a one way hash function such as MD5.
  • the hashing process may be represented as:
  • H is the one way hash function
  • S is the result of the one way hashing.
  • FIG. 5 there is illustrated a third preferred method for generating a signed mCoupon 36 which is substantially similar to the second preferred method as described above, with the exception that the MCSIGNATURE 34 is preferably stored in the vVoucher database 13 residing on the coupon server 12.
  • a user having a mobile messaging device 10 will be able to request an mCoupon 19, 36 from a coupon server 12 (refer to Fig 1 ), by sending a request, in the form of an GSM SMS message, to a pre-arranged phone number.
  • the pre-arranged number will be associated with a service 42 (such as a billboard service) which is preferably able to be accessed via the communications network 14 (refer to Fig 1 ) or intervening communications network 18 and able to communicate the request to the coupon server 12.
  • the coupon server 12 transmits a GSM SMS message containing the mCoupon 19 or 36 back to the user's mobile messaging device 10.
  • the mCoupon 19 or 36 may be stored on the mobile messaging device 10 until such time as a user wishes to redeem it, or transfer it to another mobile messaging device.
  • the mobile messaging device 10 may be able to store more than one. In such a case, a user may be able to select a particular mCoupon 19 or 36 for redemption from a plurality of mCoupons 19 or 36 stored on the mobile messaging device 10.
  • a user utilises the mobile messaging device 10 to forward a selected mCoupon 19 or 36 to a pre-arranged phone using the GSM SMS.
  • the pre-arranged number is associated with a communications service which is able to communicate the selected mCoupon 19 or 36 to a transaction server 16.
  • the transaction server 16 may or may not verify the authenticity of the mCoupon 19 or 36.
  • the transaction server 16 may extract information, such as demographic information, from the message containing the mCoupon 19 or 36.
  • Such demographic information may include, the source from where the mCoupon 19 or 36 was received, an identification tag for the user's mobile messaging device (for example, a user's mobile phone number) and the time at which the mCoupon 19 or 36 was received.
  • an identification tag for the user's mobile messaging device for example, a user's mobile phone number
  • the demographic information extracted from the message containing the mCoupon 19 or 36 is able to be used for marketing purposes.
  • the user may also utilise the mobile messaging device 10 to transfer the mCoupon to another mobile messaging device by forwarding the message containing the mCoupon to another mobile messaging device.
  • a first preferred method for verifying the authenticity of an mCoupon 19 or 36 is illustrated in Figure 7. It is envisaged that in the first preferred method for verifying the authenticity of an mCoupon 19 or 36, particular data items from the mCoupon 19 or 36 will be tested to enable an assessment of the validity of the mCoupon 19 or 36.
  • the EXPIRYDATE 28 will initially be compared with the current date and time (that is, the date and time at which the mCoupon 19 or 36 was received by the transaction server 16) to determine whether the mCoupon 19 or 36 has expired. If the mCoupon has not expired then the COUPONID 24 is extracted from the mCoupon 19 or 36. The transaction server 16 then retrieves the vVoucher 20 having the same COUPONID 24. Once the vVoucher 20 has been retrieved, the transaction server 16 is able to extract the VALUE 30 and CURRENCY 32 from the mCoupon 19 or 36 and compare these data items with the respective data items in the vVoucher 20.
  • the mCoupon 19 or 36 is invalid, and thus unable to be redeemed.
  • the mCoupon 19 or 36 is considered to be valid and thus redeemable.
  • Figure 8 illustrates a preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the first preferred method of generating an MCSIGNATURE 34 as described earlier.
  • the MCSIGNATURE 34 is extracted from the signed mCoupon 36.
  • the signed mCoupon 36 is then stripped of the MCSIGNATURE 34 to provide an unsigned mCoupon 19.
  • the unsigned mCoupon 19 is encrypted with the issuer's symmetric key using the symmetric encryption algorithm specified by the issuer.
  • the hash value for this encrypted coupon is then able to be calculated using the hashing function specified by the issuer.
  • the hash value may then be converted into an equivalent hexadecimal representation for comparison with the MCSIGNATURE 34 extracted from the mCoupon 19. If, on the basis of the comparison, the extracted MCSIGNATURE 34 is the same as the hexadecimal representation then the mCoupon is valid and thus may be able to be redeemed.
  • Example 2 is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of an mCoupon having an MCSIGNATURE 34 which has been generated in accordance with the first preferred method of generating an MCSIGNATURE 34.
  • Example 2 is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of an mCoupon having an MCSIGNATURE 34 which has been generated in accordance with the first preferred method of generating an MCSIGNATURE 34.
  • the user U forwards his mCoupon C s to the server at shop S1 through his messaging network;
  • the shop S1 extracts MCSIGNATURE 34 from mCoupon C s ;
  • Coupon C is encrypted with K using Triple-DES to give C e '. This operation is indicated as follows:
  • H' is converted to its hexadecimal representation, that is:
  • SIG is compared with MCSIGNATURE 34. In this case, they are identical, and the user's coupon is valid. Assuming now that the user tampers with the coupon. Instead of a currency value of 5 USD, the user changes his coupon to 20 USD. In this case, step (7) of the above procedure will fail and the coupon will be rejected. The same is true if the user tampers with any field in the mCoupon.
  • Figure 9 illustrates a preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the second preferred method of generating an MCSIGNATURE 34 as described earlier.
  • the COUPONID 24 is extracted from the signed mCoupon 36.
  • the vVoucher 20 corresponding to the COUPONID 24 is then able to be retrieved from the vVoucher database 13.
  • the vVoucher 20 is encrypted with the issuer's symmetric key using the symmetric encryption algorithm specified by the issuer.
  • the hash value for the encrypted vVoucher 20 is then calculated using the hashing function specified by the issuer. If, on the basis of the comparison, the extracted MCSIGNATURE 34 is the same as the hexadecimal representation then the signed mCoupon 36 is valid and thus may be able to be redeemed.
  • Example 3 is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of an signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the second preferred method of generating an MCSIGNATURE 34.
  • the issuer agrees to use Blowfish as his symmetric encryption algorithm with symmetric key K, and RIPEMD160 as his hash function.
  • the issuer proceeds as follows
  • vC e Blowfish ( vC, K )
  • H - ripemd160 ( v C e ) 3. H is converted to hexadecimal. This becomes the MCSIGNATURE 34 which will later be appended to the mCoupon
  • MCSIGNATURE 34 and Vc are entered into the vVoucher database 13 maintained by the issuer, along with a USED field indicating whether the vVoucher has been used. Initially, the USED field is set to FALSE;
  • vVoucher vC is converted the usual way into mCoupon C, which will appear as follows after MCSIGNATURE 34 is appended:
  • Figure 10 illustrates a preferred method for verifying the authenticity of an signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the third preferred method of generating an MCSIGNATURE
  • the COUPONID 24 is extracted from the signed mCoupon 36.
  • the vVoucher 20 corresponding to the
  • COUPONID 24 is then able to be retrieved from the vVoucher database 13.
  • the MCSIGNATURE 34 of the vVoucher 20 is obtained from the vVoucher 20.
  • the MCSIGNATURE 34 obtained from the vVoucher 20 is then compared to the MCSIGNATURE 34 obtained from the signed mCoupon 36. If, on the basis of the comparison, the
  • MCSIGNATURE 34 obtained from the vVoucher is the same as the MCSIGNATURE 34 obtained from the signed mCoupon 36 then the coupon is valid and thus may be able to be redeemed.
  • Example 4 is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the third preferred method of generating an MCSIGNATURE 34.
  • the store validates the coupon as follows:
  • the COUPONID filed is extracted from the mCoupon Cb and is used to identify the original vVoucher vC from which the C was supposed to have been generated;
  • the store fetches the signature MCSIGNATURE 34 corresponding to vC from the issuer's vVoucher database 13;
  • the signature retrieved from the issuer is compared with the signature presented by the user. Since the user has forged the coupon, the signatures will not match and the coupon is rejected.
  • a second user who gets a legitimate coupon (C, derived from vC) who does not have enough resources to crack the issuer's symmetric key may try the following with a single use coupon: 1. Redeems the valid mCoupon C at store S1 ; and
  • the COUPONID field is used to identify the corresponding vVoucher vC;
  • the present invention provides a system and method for distributing and redeeming electronic coupons which is able to utilise existing electronic messaging frameworks, thus rendering the present invention usable on most existing mobile and other similar messaging enabled devices and therefore requiring no additional hardware or software investment by the user. Furthermore the present invention also beneficially provides an automated method for collecting demographic information.

Abstract

The invention provides a system and method for distributing and redeeming electronic coupons using an electronic messaging service (14, 18). Electronic coupons are distributed using an electronic messaging service to a user's mobile messaging device (10) and are then stored on the device. The user is able to redeem the coupon at a transaction server (16) by forwarding the same coupon as a message to a pre-announced number or address. The transaction server is able to check the authenticity of the coupon by verifying the integrity of data contained in the electronic coupon which data may include a cryptographic signature. The invention may be used to obtain information about the user for marketing purposes.

Description

METHOD FOR DISTRIBUTING AND REDEEMING ELECTRONIC COUPONS USING AN ELECTRONIC MESSAGING SERVICE
Field of the Invention
The present invention relates to a system and method for distributing and redeeming mobile electronic coupons using an electronic messaging service. The invention finds particular use in mobile commerce.
Background of the Invention .
Manufacturers, retailers and other organizations involved in sales or promotion of products or services often offer incentives in the form of discounts, special offers and promotional offers. One way in which an organization may offer a consumer such incentives is by issuing coupons in the form of vouchers, newspaper cuttings and the like. Such coupons may provide the consumer with an opportunity to purchase a product from organization (such as a retailer or a manufacturer) at a fixed discount (for example, "fifty cents off when you buy product X"), a percentage discount (for example, "25 percent off when you buy product Y") or a "buy one get one free" offer, inter alia.
Today, a large number of organizations issue printed coupons (that is, "paper coupons"). Printed coupons may be issued using a distribution means such as widely available print media (for example, magazines and newspapers). Alternatively, some organizations, such as credit card companies, offer printed coupons to specific market segments (for example, credit card holders having a particular type of credit card) by distributing coupons using targeted mail.
In addition to providing an incentive mechanism, coupons may also provide a valuable tool for obtaining marketing data. For example, by monitoring the proportion of coupons issued to those that are redeemed, an organization may obtain a measure for the success of a coupon issuance. In another example, redeemed coupons may be used to collect demographic information. Such demographic information may include consumer details (for example, by the provision of an name and address fields which must be completed by a consumer to enable the coupon to be redeemed) or the source from which the coupon was retrieved (for example, magazine X, where the coupon was published in both magazines X and Y).
Marketing data such as the types described above may be beneficially used to assist an organization with decision making processes in relation to, for example, adjusting an existing, or formulating a new, marketing strategy.
Although offering some advantages, the costs associated with printing and distribution of printed coupons may be quite expensive. Furthermore, the gathering of marketing data in accordance with the methods described above is somewhat manually intensive and thus inefficient.
With the advent of computer networks, such as the Internet, methods have been realised for distributing of coupons electronically, thus providing a mechanism which overcomes some of the disadvantages associated with distributing printed coupons.
The use of the Internet to distribute electronic coupons is well established. For example, US patent 5,907,830 (the '830 patent) proposes an Internet based coupon distribution system whereby a consumer is able to use a computer connected to the Internet to download a coupon and prepare a paper copy of the coupon using a printer. A consumer can take the printed coupon to a retailer to redeem it, or return it to the source (for example, a manufacturer) along with a proof of purchase in order to receive a refund by mail. Accordingly, the consumer cannot redeem the coupon without having first printed it, thus requiring additional hardware in the form of a printer. Moreover, the process of redeeming the coupon and gathering marketing data from the coupon still requires processes which are manually intensive. With the proliferation of an increasingly paperless lifestyle, paperless equivalents of coupons are finding increasing popularity. However, it appears that to date, existing paperless coupon systems either require the consumer to purchase customised software, hardware or smart cards, or are Internet based.
An Internet based system for generating and redeeming electronic coupons may be of the type described in US patent 5,855,007 (the '007 patent). The '007 patent describes an electronic coupon communication system for generating and redeeming unique product discount coupons over a public computer network such as the Internet.
The system described in the '007 patent comprises a first Internet node, an Internet coupon server and an Internet coupon notification centre. The Internet coupon server accepts an on-line selection of one of the available unique Internet coupons from a user of the Internet node and transmits the coupon back to the user's printing device or email storage. Thus, according to the '007 patent, to obtain an electronic coupon the user must use a computer (or other web enabled device) which is able to communicate with the coupon server over a public computer network such as the Internet. Ordinarily, such a computer will be equipped with specialised software (for example, a web browser) to enable it to interface to the public computer network.
In addition to the limitations described above, electronic coupons used in these systems may be subject to abuse in the form of tampering. Such tampering may performed by a hacker, and be directed towards manipulating the contents of the coupon to the benefit of the hacker. For example, a hacker may modify the contents of an electronic coupon so as to improve the value of the incentive.
In light of the preceding discussion it can therefore be appreciated that there appear to be numerous problems associated with existing coupon distribution and redemption schemes. It is thus an aim of the present invention to ameliorate these deficiencies and provide a method for distributing and redeeming electronic coupons which exhibits improved security features.
Summary of the Invention
According to a first aspect of the present invention there is provided a method for distributing and redeeming electronic coupons using an electronic messaging service, the method including the steps of: generating an electronic coupon using a coupon server, the electronic coupon containing coupon data items; establishing a communications link between the coupon server and a mobile messaging device, the mobile messaging device being capable of sending and receiving electronic coupons using the electronic messaging service; transmitting the electronic coupon to the mobile messaging device using the electronic messaging service; the mobile messaging device receiving and storing the electronic coupon; establishing a communications link between the mobile messaging device and a transaction server; the mobile messaging device transmitting the electronic coupon to the transaction server using the electronic messaging service; the transaction server receiving the electronic coupon; and the transaction server redeeming the electronic coupon.
In one form of the invention, the electronic messaging service is a GSM (Global System for Mobile Communications) Short Message Service (SMS). In this form of the invention the mobile messaging device may be a GSM SMS enabled mobile phone or a GSM SMS enabled Personal Digital Assistant (PDA). In another form of the invention, the electronic messaging service is a Code Division Multiple Access (CDMA) messaging service. In this form of the invention, the mobile messaging device may be a CDMA messaging service enabled mobile phone or a CDMA messaging service enabled PDA.
In yet another form of the invention, the electronic messaging service is a Wireless Multimedia and Messaging Service (WIMS). In this form of the invention the mobile messaging device is a WIMS enabled device.
In a particular form of the invention the coupon data items include: identification data, which is representative of a unique identifier for identifying the coupon; expiry date data, which is representative of a date up until which the coupon is able to be redeemed; value data, which is representative of the value of the coupon; and currency data, which is representative of a unit of measure associated with the value data.
Preferably, the electronic coupon also contains a signature data item.
In one form of the invention, the coupon data items are derived from a subset of data items contained in a pre-existing computer readable file such that each coupon data item is related to a data item in the pre-existing file, each coupon data item being substantially identical to the related file data item. In this form of the invention, the electronic coupon may, or may not, contain a signature data item.
The signature data item may be generated in any suitable process. In one suitable process, the following steps are performed: encrypting the coupon data items using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
In an alternative form of the invention, where the coupon data items have been derived from a pre-existing file, the signature data item may be created using a signature data creation process which includes the steps of: encrypting the data items contained in the pre-existing file using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
In this form of the invention, the first signature data item is able to be stored in the pre-existing file.
Preferably, the establishing of the communications link between the coupon server and the mobile messaging device is initiated by a user utilising the mobile messaging device to request the electronic coupon from the coupon server. Similarly, the establishing of the communications link between the mobile messaging device and the transaction server is performed by a user utilising the same mobile messaging device.
In a preferred form of the invention, the step of redeeming the electronic coupon includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid. In one form of the invention, where the coupon data includes identification data, expiry date data, value data and currency data, authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid. In this form of the invention the authentication of the electronic coupon includes the steps of: obtaining the expiry date data from the electronic coupon; comparing the expiry date data obtained from the electronic coupon with a transaction date; in response to determining that the coupon has not expired, obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; and comparing each of the coupon value data item and coupon currency data item with the retrieved file data items related to the coupon value data item and coupon currency data item, wherein the electronic coupon is valid if the data items being compared are the same.
In another form of the invention where the electronic coupon contains a signature data item which has been derived from the coupon data items as described previously, the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid, wherein the authentication of the electronic coupon includes the steps of: obtaining the first signature data item from the electronic coupon; encrypting the coupon data items using the symmetric encryption algorithm to provide a second ciphertext, wherein the symmetric encryption algorithm uses the symmetric key; hashing the second ciphertext using the one way hashing function, the hashing providing a second unformatted signature data item; formatting the second unformatted signature data item to provide a second signature data item; and comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
In yet another form of the invention, where the signature data item has been derived from data items contained in the pre-existing file, the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid, wherein the authentication of the electronic coupon includes the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; encrypting the retrieved file using the symmetric encryption algorithm, the symmetric encryption algorithm using the symmetric key, the encryption of the retrieved file providing a second ciphertext ; hashing the second ciphertext using the one way hashing function, the hashing providing a second unformatted signature data item; formatting the unformatted second unformatted signature data item to provide a second signature data item; and comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
In yet another form of the invention, where the signature data item has been derived from data items contained in the pre-existing file and is stored in the pre-existing file, the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as being valid, wherein the authentication includes the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; obtaining the first signature data item from the retrieved file; and comparing the first signature data item obtained from the electronic coupon with the first signature data item obtained from the retrieved file, wherein the electronic coupon signature data items are the same.
Preferably, the step of authenticating the electronic coupon further includes communicating the results of the authentication to a display terminal.
It is also preferable that the step of authenticating the electronic coupon further includes communicating the results of the authentication to the mobile messaging device, wherein the communication of the results is performed using the electronic messaging service.
Ideally, the transaction server receives demographic information with an electronic coupon.
According to a second aspect of the present invention there is provided a system for distributing and redeeming electronic coupons using an electronic messaging service, the system including: a plurality of mobile messaging devices which transmit and receive electronic coupons using an electronic messaging service; a coupon server including a computer processor and associated memory, the coupon server being connected to a communications network, which network supports an electronic messaging service, the coupon server generating electronic coupons and transmitting electronic coupons to the mobile messaging devices using the electronic messaging service; and a transaction server including a computer processor and associated memory, the transaction server being connected to the communications network, and redeeming electronic coupons received from mobile messaging devices. It will be recognised that the present invention includes a number of advantages in that the method is able to deployed using existing electronic messaging infrastructures, thus enabling the distribution and redemption of electronic messages using existing mobile phones and other similar messaging enabled devices.
In addition, the invention provides an electronic coupon format having features which enable authentication and which use cryptographic signature verification to improve resistance to tampering. Furthermore, the invention enables each transaction to be acknowledged by means of a return receipt or confirmation message. It will also be recognised that the invention enables automated collection of marketing data, including demographic information.
Brief Description of the Drawings
The present invention will now be described in relation to various embodiments illustrated in the accompanying drawings. However, it must be appreciated that the following description is not to limit the generality of the above description.
In the drawings:
Figure 1 is a block diagram illustrating a system in accordance with a preferred embodiment of the invention.
Figure 2 is a flow diagram illustrating the process of generating an electronic coupon in accordance with a first preferred embodiment of the present invention;
Figure 3 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a second preferred embodiment of the present invention; Figure 4 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a third preferred embodiment of the present invention;
Figure 5 is a flow diagram illustrating the process of generating an electronic coupon having a cryptographic signature in accordance with a fourth preferred embodiment of the present invention;
Figure 6 is a block diagram illustrating the operational sequence for requesting a mobile coupon in accordance with the preferred embodiments of the invention;
Figure 7 is a flow diagram illustrating the process of non cryptographic verification of an electronic coupon;
Figure 8 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with the first preferred embodiment of the present invention;
Figure 9 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with the second preferred embodiment of the present invention; and
Figure 10 is a flow diagram illustrating the process of verifying an electronic coupon having a cryptographic signature, wherein the cryptographic signature was generated in accordance with a third preferred embodiment of the present invention. Detailed Description of the Invention
Throughout this description, reference will be made to "mobile coupons" and its derivatives "mCoupons" and "mobile electronic coupons". By the use of these terms, reference is made to a particular form of an electronic coupon which is able to be communicated to and from a mobile messaging device, such as a mobile phone, using an electronic messaging service.
A system for distributing and redeeming an mCoupon according to an embodiment of the present invention is shown in Figure 1. The system includes a mobile messaging device 10 which is operable to communicate with a coupon server 12 and a transaction server 16 over an communications network 14.
Specifically, the communications network 14 is a GSM SMS capable network, and accordingly, the mobile messaging device 10, is also able to communicate with the coupon server 12 and the transaction server 16 using the GSM SMS capable network. It is to be appreciated, however, that although reference will be made to the communications network 14 as being GSM SMS capable, the communications network 14 is to be understood not to be so limited. Indeed, the invention may be deployed using a communications network 14 which is capable of supporting an alternative electronic messaging scheme (such as, CDMA messaging or Wireless Multimedia Messaging) in which case the mobile messaging device 10 will also be so capable.
Also illustrated in Figure 1 is an intervening communications network 18. Such network 18 may be the Internet, a public switched telephone network (PSTN) an integrated services digital network (ISDN), a network capable of supporting an electronic messaging service different to that provided by the communications network 14, or a combination thereof. It is to be understood, however, that the provision of the intervening communications network 18 is optional. Indeed, the invention may be deployed without having the intervening communications network 18. ln a system of the present invention which includes an intervening network 18, the intervening network 18 is able to facilitate protocol conversion (for example TCP/IP to SMS). It is envisaged that the intervening network 18 will enable devices coupled to the intervening network 18 to interoperate where those devices would otherwise not have been to communicate (for example, where the coupon server uses TCP/IP and the mobile messaging device 10 uses a CDMA messaging protocol)
The coupon server 12 may be a programmed computer which is capable of generating mCoupons by translating pre-existing data files containing coupon data. The pre-existing files are preferably stored on a database 13 (herein referred to as the 'Woucher database") which preferably resides on the coupon server 12. The coupon server 12 is also capable of sending and receiving mobile coupons using a protocol which is compatible with the communications network 14 or the intervening communications network 18 if provided.
Figure 1 also includes a transaction server 16 which is preferably a programmed computer, which computer includes sufficient hardware and software to enable the transaction server 16 to redeem mCoupons received from a mobile messaging device 10 and, if required, access pre-existing files from the coupon server 12.
Throughout this specification reference will be made to the coupon server 12 and the transaction server 16 as being separate entities. However, It is to be understood that the coupon server 12 and the transaction server 16 need not be separate. Indeed, in a preferred form of the invention, the coupon server 12 and the transaction server 16 will be a single entity, capable of providing the required dual functionality.
As is illustrated in Figure 2, in one form of the invention, the coupon server 12 (refer to Fig 1 ) is able to generate a particular type of mCoupon 19 using data derived from data stored in a pre-existing data file, which data file, for the purposes of this description, will herein be referred to as a 'Woucher". A vVoucher 20 may include a plurality of data fields 22, each field having a respective data item 24.
In operation, the coupon server 12 extracts particular data items 26, 28, 30 and 32 from the vVoucher 20 and arranges the particular data items in the form of an mCoupon 19. For the purposes of this discussion, the particular data items will herein be referred to as "coupon data items".
In an exemplary form of the mCoupon 19, the coupon data items include a coupon identifier (the "COUPONID") 26, an expiry date (the "EXPIRYDATE") 28, a coupon value (the 'VALUE") 30 and a currency (the "CURRENCY") 32. For the purposes of this description, this exemplary form of the mCoupon 19 will herein be referred to as an "unsigned mCoupon" 19.
Turning now to Figure 3, a cryptographic signature 34 may be appended to the unsigned mCoupon 19. Such cryptographic signature 34 (the
"MCSIGNATURE") is preferably generated by the coupon server 12 (refer to Fig 1 ). For the purposes of this description, an mCoupon 19 having a respective MCSIGNATURE 34 will be refered to as a "signed mCoupon" 36.
In Figure 3 there is illustrated a first preferred method for generating a signed mCoupon 36. In accordance with the first preferred method, an MCSIGNATURE 34 is able to be generated using the coupon data items 26, 28, 30 and 32.
In the first preferred method of generating a signed mCoupon 36 the coupon data items 26, 28, 30 and 32 are encrypted 37 using a symmetric encryption key algorithm (such as DES, IDEA or Blowfish) and a symmetric encryption key ('the symmetric key'), the symmetric key being known only to the issuer of the mCoupon 19 and the transaction server 16 where the coupon is able to be redeemed. Advantageously, the symmetric key may be changed on a daily basis, or on a per-coupon basis, or based on some other policy in accordance with the requirements of the coupon issuer. In this respect, reference to the term "issuer" throughout this specification is to be understood to be reference to the organization (for example, a retailer or manufacturer) on whose behalf the mCoupon 19 or 36 has been issued.
The encryption of the coupon data items may be represented as:
Ce = Ek (Cp)
where
Cp is the coupon data items before encryption; Ek is the process of encrypting Cp with a symmetric key k; and
Ce is ciphertext which results from the encryption process (herein refered to as the encrypted mCoupon 38).
The encrypted mCoupon 38, in the form of ciphertext, is then hashed using a one way hash function 39 (such as MD5, SHA-1 , RIPEMD-160). In this respect, references to the term "hash" and its derivatives "hashing" and "hashed" are to be understood to be references to a process which takes a variable length input message (for example, the coupon data items) and translates it to a fixed length output. Furthermore, reference to the term "hashing function" throughout this specification is to be understood to be reference to a function which performs hashing (for example, MD5, SHA-1 , RIPEMD-160).
This process may be represented as:
S = H (Ce)
where H is the one way hash function; and S is the result of the one way hashing.
The result of the hashing S is then converted 41 into its hexadecimal ASCII text representation, which representation is able to be used as the MCSIGNATURE 34 for use with the signed mCoupon 36. In this form of the invention it will thus be recognised that the signed mCoupon 36 is provided with improved protection against deliberate or accidental tampering.
The following example (Example 1 ) is provided to assist the reader with the understanding of first preferred method of generating a signed mCoupon 36.
Example 1 :
Consider an organization O issuing vVouchers and mCoupons which are able to be redeemed at a shop S1 having a transaction server. Consider the case of one user and one coupon. Organization O generates a vVoucher vC which is as follows:
BEGIN VVOUCHER
COUPONID: 102030405060708090AO
ISSUER: Muncho Noodles Inc
ISSUEDATE: 10102001101010
EXPIRY DATE: 10112001101010 USE: SINGLE
VALUE: 5
CURRENCY: USD
MERCHANTS: XYZ Eating House
BEAMED: 0 SIGNATURE:
END VVOUCHER The vVoucher will be converted to an mCoupon C having the following format:
102030405060708090AO 1011200110101010 5 USD
The issuer O generates a symmetric key k which he uses to sign the mCoupon C. For the purposes of this example, say the issuer O also agrees to use Triple-DES (DES3) as the symmetric encryption algorithm, and MD5 as the hash algorithm. The issuer O generates the MCSIGNATURE 34 for mCoupon C as follows:
Ce = DES3 ( C, K ) where K is the symmetric key chosen by issuer O, and Ce is the ciphertext;
H = MD5 ( Ce );
MCSIGNATURE = BinToHex (H) where BinToHex represents the conversion of the hash value H from binary to hexadecimal form.
Let {MCSIGNATURE} represent the actual hexadecimal signature obtained from the above sequence of operations. Thus, the final signed mCoupon Cs will have the following format:
102030405060708090AO 100112001101010 5 USD {MCSIGNATURE}
When a customer desires a coupon, he is able to send a request message to a pre-arranged phone number, which in turn responds by sending Cs as a message back to the user.
In Figure 4 there is illustrated a second preferred method for generating a signed mCoupon 36. In accordance with the second preferred method, an
MCSIGNATURE 34 is generated using a vVoucher 20. Here, the data items
22, 24 contained in vVoucher 20 are encrypted 37 using a symmetric encryption key algorithm (such as DES, IDEA or Blowfish) to provide an encrypted vVoucher 40. The symmetric key is known only to the issuer of the mCoupon 19 and the transaction server 16 where the coupon is able to be redeemed. Advantageously, the symmetric key may be changed on a daily basis, or on a per-coupon basis, or based on some other policy in accordance with the requirements of the issuer.
The encryption of the coupon data may be represented as:
Ce = Ek (Cp)
where
■ Cp is the vVoucher data items before encryption; Ek is the process of encrypting Cp with a symmetric key k; and
Ce is ciphertext which results from the encryption process (herein refered to as the encrypted vVoucher 40).
The encrypted vVoucher 40 is then able to be hashed using a one way hash function such as MD5.
The hashing process may be represented as:
S = H (Ce)
where
H is the one way hash function; and S is the result of the one way hashing.
The result of the hashing S is then converted 41 into its hexadecimal ASCII text representation, which representation is able to be used as the MCSIGNATURE 34 for use with the signed mCoupon 36. ln Figure 5 there is illustrated a third preferred method for generating a signed mCoupon 36 which is substantially similar to the second preferred method as described above, with the exception that the MCSIGNATURE 34 is preferably stored in the vVoucher database 13 residing on the coupon server 12.
Having described the processes for generating an unsigned mCoupon 19, or a signed mCoupon 36, the following section will now describe the mechanisms for facilitating distribution and redemption of an mCoupon 19, 36. In this respect, turning to Figure 6 there is illustrated a representation of the operational sequence for requesting an mCoupon 19, 36.
It is envisaged that a user having a mobile messaging device 10 will be able to request an mCoupon 19, 36 from a coupon server 12 (refer to Fig 1 ), by sending a request, in the form of an GSM SMS message, to a pre-arranged phone number. Preferably, the pre-arranged number will be associated with a service 42 (such as a billboard service) which is preferably able to be accessed via the communications network 14 (refer to Fig 1 ) or intervening communications network 18 and able to communicate the request to the coupon server 12. In response to receiving the request, the coupon server 12 transmits a GSM SMS message containing the mCoupon 19 or 36 back to the user's mobile messaging device 10.
Following the receipt of the mCoupon by the mobile messaging device 10 the mCoupon 19 or 36 may be stored on the mobile messaging device 10 until such time as a user wishes to redeem it, or transfer it to another mobile messaging device. In this respect, it is to be understood that although reference has been made to storing a single mCoupon 19 or 36, the mobile messaging device 10 may be able to store more than one. In such a case, a user may be able to select a particular mCoupon 19 or 36 for redemption from a plurality of mCoupons 19 or 36 stored on the mobile messaging device 10. ln order to redeem a mCoupon 19 or 36 , a user utilises the mobile messaging device 10 to forward a selected mCoupon 19 or 36 to a pre-arranged phone using the GSM SMS. Preferably, the pre-arranged number is associated with a communications service which is able to communicate the selected mCoupon 19 or 36 to a transaction server 16. According to the present invention, in response to receiving the mCoupon 19 or 36 the transaction server 16 may or may not verify the authenticity of the mCoupon 19 or 36. Furthermore, the transaction server 16 may extract information, such as demographic information, from the message containing the mCoupon 19 or 36. Such demographic information may include, the source from where the mCoupon 19 or 36 was received, an identification tag for the user's mobile messaging device (for example, a user's mobile phone number) and the time at which the mCoupon 19 or 36 was received. Ideally, the demographic information extracted from the message containing the mCoupon 19 or 36 is able to be used for marketing purposes.
The user may also utilise the mobile messaging device 10 to transfer the mCoupon to another mobile messaging device by forwarding the message containing the mCoupon to another mobile messaging device.
A first preferred method for verifying the authenticity of an mCoupon 19 or 36 is illustrated in Figure 7. It is envisaged that in the first preferred method for verifying the authenticity of an mCoupon 19 or 36, particular data items from the mCoupon 19 or 36 will be tested to enable an assessment of the validity of the mCoupon 19 or 36.
Specifically, the EXPIRYDATE 28 will initially be compared with the current date and time (that is, the date and time at which the mCoupon 19 or 36 was received by the transaction server 16) to determine whether the mCoupon 19 or 36 has expired. If the mCoupon has not expired then the COUPONID 24 is extracted from the mCoupon 19 or 36. The transaction server 16 then retrieves the vVoucher 20 having the same COUPONID 24. Once the vVoucher 20 has been retrieved, the transaction server 16 is able to extract the VALUE 30 and CURRENCY 32 from the mCoupon 19 or 36 and compare these data items with the respective data items in the vVoucher 20. In the event that the respective data items have a different value to those obtained from the mCoupon 19 or 36, the mCoupon 19 or 36 is invalid, and thus unable to be redeemed. Alternatively, if the data items have the same value then the mCoupon 19 or 36 is considered to be valid and thus redeemable.
Figure 8 illustrates a preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the first preferred method of generating an MCSIGNATURE 34 as described earlier.
Pursuant to this method the MCSIGNATURE 34 is extracted from the signed mCoupon 36. The signed mCoupon 36 is then stripped of the MCSIGNATURE 34 to provide an unsigned mCoupon 19. The unsigned mCoupon 19 is encrypted with the issuer's symmetric key using the symmetric encryption algorithm specified by the issuer. The hash value for this encrypted coupon is then able to be calculated using the hashing function specified by the issuer. The hash value may then be converted into an equivalent hexadecimal representation for comparison with the MCSIGNATURE 34 extracted from the mCoupon 19. If, on the basis of the comparison, the extracted MCSIGNATURE 34 is the same as the hexadecimal representation then the mCoupon is valid and thus may be able to be redeemed.
The following example (Example 2) is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of an mCoupon having an MCSIGNATURE 34 which has been generated in accordance with the first preferred method of generating an MCSIGNATURE 34. Example 2:
Assume that the user is honest, and doesn't tamper with or replicate Cs as, he goes to shop S1 to redeem his coupon. The redemption process according to the preferred method for verifying the authenticity of an mCoupon having an MCSIGNATURE 34 might be as follows:
1. The user U forwards his mCoupon Cs to the server at shop S1 through his messaging network;
2. The shop S1 extracts MCSIGNATURE 34 from mCoupon Cs;
3. The coupon Cs is stripped of its MCSIGNATURE 34 field, resulting in an unsigned mCoupon C;
4. Coupon C is encrypted with K using Triple-DES to give Ce'. This operation is indicated as follows:
Ce' = DES 3 ( C\ K )
5. Ce" is hashed using MD 5 to generate H', that is:
H' = MD5 ( Ce' )
6. H' is converted to its hexadecimal representation, that is:
SIG = BinToHex (H' )
7. SIG is compared with MCSIGNATURE 34. In this case, they are identical, and the user's coupon is valid. Assuming now that the user tampers with the coupon. Instead of a currency value of 5 USD, the user changes his coupon to 20 USD. In this case, step (7) of the above procedure will fail and the coupon will be rejected. The same is true if the user tampers with any field in the mCoupon.
Figure 9 illustrates a preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the second preferred method of generating an MCSIGNATURE 34 as described earlier. In this preferred method, the COUPONID 24 is extracted from the signed mCoupon 36. The vVoucher 20 corresponding to the COUPONID 24 is then able to be retrieved from the vVoucher database 13. Following the retrieval of the vVoucher 20, the vVoucher 20 is encrypted with the issuer's symmetric key using the symmetric encryption algorithm specified by the issuer. The hash value for the encrypted vVoucher 20 is then calculated using the hashing function specified by the issuer. If, on the basis of the comparison, the extracted MCSIGNATURE 34 is the same as the hexadecimal representation then the signed mCoupon 36 is valid and thus may be able to be redeemed.
The following example (Example 3) is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of an signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the second preferred method of generating an MCSIGNATURE 34.
Example 3:
Assume the user might have cracked the issuer's symmetric key. If this is done, then the user can generate any number of "valid" mCoupons which will appear to be valid if not cross checked against the contents of the original vVoucher obtained from the vVoucher database 13 (which is typically read-only to the world). We also assume that the issuer does not want to distribute his symmetric key to the coupon redemption outlets.
An example scenario is detailed below.
Consider organization O issuing a vVoucher vC which can be redeemed at shops S1 and S2. The vVoucher vC is as follows:-
BEGIN VOUCHER COUPONID: 30405060701020304050
ISSUER: WhizBang Computers Ltd
ISSUEDATE: 10102001101010
EXPIRY DATE: 10112001101010
USE: SINGLE VALUE: 100
CURRENCY: SGD
MERCHANTS: RipMeOff Sales and Marketing outlets
BEAMED: 0
SIGNATURE: END VVOUCHER
The issuer agrees to use Blowfish as his symmetric encryption algorithm with symmetric key K, and RIPEMD160 as his hash function. The issuer proceeds as follows
1. The entire vVoucher vC is encrypted with K using Blowfish;
vCe = Blowfish ( vC, K )
2. vCe is hashed using RIPEMD 160
H =- ripemd160 ( v Ce ) 3. H is converted to hexadecimal. This becomes the MCSIGNATURE 34 which will later be appended to the mCoupon
MSIGNATURE = BinToHex ( H )
MCSIGNATURE 34 and Vc are entered into the vVoucher database 13 maintained by the issuer, along with a USED field indicating whether the vVoucher has been used. Initially, the USED field is set to FALSE;
4. vVoucher vC is converted the usual way into mCoupon C, which will appear as follows after MCSIGNATURE 34 is appended:
30405060701020304050 1011200110101010 100 USD {MCSIGNATURE}
5. C is sent to the user on demand.
Figure 10 illustrates a preferred method for verifying the authenticity of an signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the third preferred method of generating an MCSIGNATURE
34 as described earlier. In this preferred method, the COUPONID 24 is extracted from the signed mCoupon 36. The vVoucher 20 corresponding to the
COUPONID 24 is then able to be retrieved from the vVoucher database 13. Following the retrieval of the vVoucher 20, the MCSIGNATURE 34 of the vVoucher 20 is obtained from the vVoucher 20. The MCSIGNATURE 34 obtained from the vVoucher 20 is then compared to the MCSIGNATURE 34 obtained from the signed mCoupon 36. If, on the basis of the comparison, the
MCSIGNATURE 34 obtained from the vVoucher is the same as the MCSIGNATURE 34 obtained from the signed mCoupon 36 then the coupon is valid and thus may be able to be redeemed. The following example (Example 4) is provided to assist the reader with the understanding of the preferred method for verifying the authenticity of a signed mCoupon 36 having an MCSIGNATURE 34 which has been generated in accordance with the third preferred method of generating an MCSIGNATURE 34.
Example 4:
Assume a user is a determined hacker who has cracked the issuer's symmetric key. As a result of cracking the key, he is able to generate a "bogus" coupon whose value is 500 USD instead of 100 USD. Using his cracked key, he encrypts and signs his coupon Cb, which is presented to the store for redemption. Also assume that the store does not have access to the issuer's symmetric key.
The store validates the coupon as follows:
1. The COUPONID filed is extracted from the mCoupon Cb and is used to identify the original vVoucher vC from which the C was supposed to have been generated;
2. The store fetches the signature MCSIGNATURE 34 corresponding to vC from the issuer's vVoucher database 13; and
3. The signature retrieved from the issuer is compared with the signature presented by the user. Since the user has forged the coupon, the signatures will not match and the coupon is rejected.
A second user who gets a legitimate coupon (C, derived from vC) who does not have enough resources to crack the issuer's symmetric key may try the following with a single use coupon: 1. Redeems the valid mCoupon C at store S1 ; and
2. Try to redeem the same mCoupon C at store S2.
To protect against such attacks, each store needs to perform the following actions:
1. For each mCoupon C received by the store, the COUPONID field is used to identify the corresponding vVoucher vC;
2. The USED field for vC is checked on the issuer's vVoucher database 13 server;
3. If the USED field is FALSE, then the coupon has not yet been redeemed. The store informs the issuer's database 13 system to update the USED field for vC to TRUE and accepts the coupon as valid; and
4. If the USED field is TRUE, then the coupon has already been used, and is rejected as invalid.
It will thus be recognised that the present invention provides a system and method for distributing and redeeming electronic coupons which is able to utilise existing electronic messaging frameworks, thus rendering the present invention usable on most existing mobile and other similar messaging enabled devices and therefore requiring no additional hardware or software investment by the user. Furthermore the present invention also beneficially provides an automated method for collecting demographic information.
Finally, it will be understood that there may be other variations and modifications to the configurations described herein that are also within the scope of the present invention.

Claims

Claims
1. A method for distributing and redeeming electronic coupons using an electronic messaging service, the method including the steps of: generating an electronic coupon using a coupon server, the electronic coupon containing coupon data items; establishing a communications link between the coupon server and a mobile messaging device, the mobile messaging device being capable of sending and receiving electronic coupons using the electronic messaging service; transmitting the electronic coupon to the mobile messaging device using the electronic messaging service; the mobile messaging device receiving and storing the electronic coupon; establishing a communications link between the mobile messaging device and a transaction server; the mobile messaging device transmitting the electronic coupon to the transaction server using the electronic messaging service; the transaction server receiving the electronic coupon; and the transaction server redeeming the electronic coupon.
2. A method according to claim 1 wherein the coupon data items include: identification data, which is representative of a unique identifier for identifying the coupon; expiry date data, which is representative of the date up until which the coupon is able to be redeemed; value data, which is representative of the value of the coupon; and currency data, which is representative of a unit of measure associated with the value data.
3. A method according to claim 1 wherein the electronic coupon contains a signature data item.
4. A method according to claim 2 wherein the coupon data items are derived from a subset of data items contained in a pre-existing computer readable file, each coupon data item having a respective data item in the pre- existing file, each coupon data item being substantially identical to the respective data item.
5. A method according to claim 4 wherein the electronic coupon contains a signature data item.
6. A method according to claim 5 wherein the signature data item is created using a signature data item creation process, the process including the steps of: encrypting the coupon data items using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
7. A method according to claim 5 wherein the signature data item is created using a signature data creation process, the process including the steps of: encrypting the data items contained in the pre-existing file using a symmetric encryption algorithm to provide a first ciphertext, wherein the symmetric encryption algorithm uses a symmetric key; hashing the first ciphertext using a one way hashing function, the hashing providing a first unformatted signature data item; formatting the first unformatted signature data item, to provide a first signature data item; and appending the first signature data item to the electronic coupon.
8. A method according to claim 7 wherein the first signature data item is stored in the pre-existing file.
9. A method according to claim 1 wherein the step of redeeming the electronic coupon further includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid.
10. A method according to claim 4 wherein the step of redeeming the electronic coupon further includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid, the authentication of the electronic coupon including the steps of: obtaining the expiry date data from the electronic coupon; comparing the expiry date data obtained from the electronic coupon with a transaction date, in response to determining that the coupon has not expired, obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; and comparing each of the coupon value data item and coupon currency data item with the retrieved file data items related to the coupon value data item and coupon currency data item, wherein the electronic coupon is valid if the data items being compared are the same.
11. A method according to claim 6 wherein the step of redeeming the electronic coupon further includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid, the authentication of the electronic coupon including the steps of: obtaining the first signature data item from the electronic coupon; encrypting the coupon data items using the symmetric encryption algorithm to provide a second ciphertext, wherein the symmetric encryption algorithm uses the symmetric key; hashing the second ciphertext using the one way hashing function, the hashing providing a second signature data item; formatting the unformatted signature data item; comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
12. A method according to claim 7 wherein the step of redeeming the electronic coupon further includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid, the authentication of the electronic including the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; encrypting the retrieved file using the symmetric encryption algorithm, the symmetric encryption algorithm using the symmetric key, the encryption of the retrieved file providing a second ciphertext ; hashing the second ciphertext using the one way hashing function, the hashing providing a second signature data item; formatting the unformatted second signature data item; and comparing the first signature data item to the second signature data item, wherein the electronic coupon is valid if the first signature data item is the same as the second signature data item.
13. A method according to claim 8 wherein the step of redeeming the electronic coupon further includes authorising a transaction, wherein the authorisation of the transaction occurs subsequent to the electronic coupon being authenticated as valid, the authentication of the electronic including the steps of: obtaining the first signature data item from the electronic coupon; obtaining the identification data from the electronic coupon; retrieving a pre-existing file from the coupon server, the retrieved file having identification data which is the same as the coupon identification data; obtaining the second signature from the retrieved file; and comparing the first signature data item obtained from the electronic coupon with the first signature data item obtained from the retrieved file, wherein the electronic coupon signature data items are the same.
14. A system for distributing and redeeming electronic coupons using an electronic messaging service, the system including: a plurality of mobile messaging devices which transmit and receive electronic coupons using an electronic messaging service; a coupon server including a computer processor and associated memory, the coupon server being connected to a communications network, which network supports an electronic messaging service, the coupon server generating electronic coupons and transmitting electronic coupons to the mobile messaging devices using the electronic messaging service; and a transaction server including a computer processor and associated memory, the transaction server being connected to the communication network, and redeeming electronic coupons received from mobile messaging devices.
15. A system according to claim 14 wherein an electronic coupon includes data items representative of one or more of identification data, which is representative of a unique identifier for identifying the coupon; expiry date data, which is representative of a date up until which the coupon is able to be redeemed; value data, which is representative of the value of the coupon; currency data, which is representative of a unit of measure associated with the value data; and a signature data item.
16. A system according to claim 15 wherein the coupon server and the transaction server are the same server.
PCT/SG2001/000237 2001-11-21 2001-11-21 Method for distributing and redeeming electronic coupons using an electronic messaging service WO2003044711A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/SG2001/000237 WO2003044711A1 (en) 2001-11-21 2001-11-21 Method for distributing and redeeming electronic coupons using an electronic messaging service
AU2002217743A AU2002217743A1 (en) 2001-11-21 2001-11-21 Method for distributing and redeeming electronic coupons using an electronic messaging service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2001/000237 WO2003044711A1 (en) 2001-11-21 2001-11-21 Method for distributing and redeeming electronic coupons using an electronic messaging service

Publications (1)

Publication Number Publication Date
WO2003044711A1 true WO2003044711A1 (en) 2003-05-30

Family

ID=20429005

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2001/000237 WO2003044711A1 (en) 2001-11-21 2001-11-21 Method for distributing and redeeming electronic coupons using an electronic messaging service

Country Status (2)

Country Link
AU (1) AU2002217743A1 (en)
WO (1) WO2003044711A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2396520A (en) * 2002-11-23 2004-06-23 Liquid Drop Ltd System for issuing and authenticating mobile tokens
WO2005103968A1 (en) * 2004-04-27 2005-11-03 Stephen Cooper Macnish Electronic voucher system and associated method
FR2888437A1 (en) * 2005-07-08 2007-01-12 France Telecom Service e.g. marine meteorological consultation service, access controlling method for e.g. mobile telephone, involves downloading marked validation tokens in multimedia terminal before user chooses service to be utilized
EP1903489A1 (en) * 2006-09-25 2008-03-26 MintNet GmbH Payment system und method for electronic payment
WO2008096041A1 (en) * 2007-02-09 2008-08-14 YTV Pääkaupunkiseudun yhteistyövaltuuskunta Method, ticket handling apparatus, computer program product and product platform for a security mechanism of an electronic ticket
EP2092474A2 (en) * 2006-10-17 2009-08-26 Solidus Networks, Inc. A method of distributing information via mobile devices and enabling its use at a point of transaction
US8689247B2 (en) 2008-04-04 2014-04-01 Qualcomm Incorporated Systems and methods for distributing and redeeming credits on a broadcast system
US20140278950A1 (en) * 2013-03-14 2014-09-18 Retailmenot, Inc. Methods and systems for maximizing online coupon and deal commissions
WO2015071939A1 (en) * 2013-11-15 2015-05-21 Tenten Technologies Limited Method, system and mobile device for providing user rewards
WO2018102030A1 (en) * 2016-11-29 2018-06-07 Mastercard International Incorporated Method and system for authentication of coupons via blockchain
US11151595B1 (en) 2019-06-17 2021-10-19 Amdocs Development Limited System, method, and computer program for a smart coupon code

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0809202A2 (en) * 1996-05-22 1997-11-26 Sun Microsystems, Inc. Method and system for regulating discounts on merchandise distributed through networked computer systems
US5855007A (en) * 1995-11-15 1998-12-29 Jovicic; Neboisa Electronic coupon communication system
WO2000003328A1 (en) * 1998-07-10 2000-01-20 Motorola Inc. Method and apparatus in a wireless communication system for using a selective call receiver to provide demographic information, redeem coupons, and emulate affinity cards
EP1077437A2 (en) * 1999-07-07 2001-02-21 Phone.Com Inc. Method and system for distributing electronic coupons using a wireless communications system.
WO2001061559A1 (en) * 2000-02-18 2001-08-23 Summedia.Com, Inc. Cellular coupon system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5855007A (en) * 1995-11-15 1998-12-29 Jovicic; Neboisa Electronic coupon communication system
EP0809202A2 (en) * 1996-05-22 1997-11-26 Sun Microsystems, Inc. Method and system for regulating discounts on merchandise distributed through networked computer systems
WO2000003328A1 (en) * 1998-07-10 2000-01-20 Motorola Inc. Method and apparatus in a wireless communication system for using a selective call receiver to provide demographic information, redeem coupons, and emulate affinity cards
EP1077437A2 (en) * 1999-07-07 2001-02-21 Phone.Com Inc. Method and system for distributing electronic coupons using a wireless communications system.
WO2001061559A1 (en) * 2000-02-18 2001-08-23 Summedia.Com, Inc. Cellular coupon system

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2396520A (en) * 2002-11-23 2004-06-23 Liquid Drop Ltd System for issuing and authenticating mobile tokens
WO2005103968A1 (en) * 2004-04-27 2005-11-03 Stephen Cooper Macnish Electronic voucher system and associated method
FR2888437A1 (en) * 2005-07-08 2007-01-12 France Telecom Service e.g. marine meteorological consultation service, access controlling method for e.g. mobile telephone, involves downloading marked validation tokens in multimedia terminal before user chooses service to be utilized
EP1903489A1 (en) * 2006-09-25 2008-03-26 MintNet GmbH Payment system und method for electronic payment
US10699288B2 (en) 2006-10-17 2020-06-30 Inmar—Youtech, Llc Methods and systems for distributing information via mobile devices and enabling its use at a point of transaction
EP2092474A2 (en) * 2006-10-17 2009-08-26 Solidus Networks, Inc. A method of distributing information via mobile devices and enabling its use at a point of transaction
EP2092474A4 (en) * 2006-10-17 2011-09-28 Yt Acquisition Corp A method of distributing information via mobile devices and enabling its use at a point of transaction
WO2008096041A1 (en) * 2007-02-09 2008-08-14 YTV Pääkaupunkiseudun yhteistyövaltuuskunta Method, ticket handling apparatus, computer program product and product platform for a security mechanism of an electronic ticket
US9100675B2 (en) 2008-04-04 2015-08-04 Qualcomm Incorporated System and method for distributing and redeeming coupons on a broadcast system
US8689247B2 (en) 2008-04-04 2014-04-01 Qualcomm Incorporated Systems and methods for distributing and redeeming credits on a broadcast system
US20140278950A1 (en) * 2013-03-14 2014-09-18 Retailmenot, Inc. Methods and systems for maximizing online coupon and deal commissions
WO2015071939A1 (en) * 2013-11-15 2015-05-21 Tenten Technologies Limited Method, system and mobile device for providing user rewards
US10713678B2 (en) 2013-11-15 2020-07-14 Tenten Kabushiki Kaisha Method, system and mobile device for providing user rewards
US10776807B2 (en) 2013-11-15 2020-09-15 Tenten Kabushiki Kaisha Method, system and mobile device for providing user rewards
WO2018102030A1 (en) * 2016-11-29 2018-06-07 Mastercard International Incorporated Method and system for authentication of coupons via blockchain
US10796329B2 (en) 2016-11-29 2020-10-06 Mastercard International Incorporated Method and system for authentication of coupons via blockchain
US11544731B2 (en) 2016-11-29 2023-01-03 Mastercard International Incorporated Method and system for authentication of coupons via blockchain
US11151595B1 (en) 2019-06-17 2021-10-19 Amdocs Development Limited System, method, and computer program for a smart coupon code

Also Published As

Publication number Publication date
AU2002217743A1 (en) 2003-06-10

Similar Documents

Publication Publication Date Title
US6041309A (en) Method of and system for distributing and redeeming electronic coupons
US11397928B2 (en) Method for issuing, redeeming, refunding, settling and revoking electronic voucher by using utxo-based protocol, and server employing same
US9704327B2 (en) Multi-function transaction device
US20020198777A1 (en) Electronic coupon method and system
US6584448B1 (en) Method of and system for distributing and redeeming electronic coupons
US20090271322A1 (en) Electronic receipt system and method
US20070021969A1 (en) Mobile electronic transaction system, device and method therefor
US20020156676A1 (en) System, method, and apparatus for creating and securely managing accounts holding cash equivalents
WO2009099909A1 (en) Systems and methods for encrypted bar code generation
JP2005004764A (en) Method of payment from account by customer having mobile user terminal, and customer authentication network
JP2003524806A (en) Print coupon with embedded discount for online purchases
US10664815B2 (en) Secure customer relationship marketing system and method
WO2003044711A1 (en) Method for distributing and redeeming electronic coupons using an electronic messaging service
WO2007026212A1 (en) Off-line vending system
KR101023621B1 (en) Trading system of mobile coupon and method of trading the mobile coupon
WO2020076176A1 (en) Method for automatically transmitting and storing financial and commercial receipts in electronic format
KR20090053876A (en) The structures and methods for using all discount coupons avaiable with one unique temporary identification number under the network which uses internet protocols
JP5193935B2 (en) Receipt management system and method
US20110231304A1 (en) Secure method and apparatus for remote funding of current payment accounts
US20120150710A1 (en) method and system for facilitating access to financial information
JP2001188856A (en) Merchandise service information transmission method and system using internet portable telephone set, server and client therefor and electronic commercial transaction method using internet portable telephone set
JP4903346B2 (en) Improved method and system for processing secure payments across computer networks without pseudo or proxy account numbers
WO2020061488A1 (en) Digital ticket system and method
JP2003016371A (en) Authentication support method for card settlement service and system actualizing the same
US20220383327A1 (en) Method and device for transmitting an identifier of a user during an electronic payment made by the user.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP