NetBill security and transaction protocol
1995
Abstract
cyberspace with no easily identifiable place of business for the merchant or physical delivery site for the customer. Transactions are subject to observation by third parties sharing the network. And the use of computers to support transactions makes record keeping easier, exacerbating privacy problems arising from transaction data collection by merchants. Supporting transactions in cyberspace requires electronic analogs for many familiar procedures from face-to-face transactions. Parties need to know with whom they are dealing, or at least verify their creditworthiness. They need to be able to negotiate prices, perhaps providing credentials entitling them to special discounts, such as a student ID. Parents need methods to control where their children shop in cyberspace. In the case of information goods, the value of an item may be as low as a few cents, requiring transaction mechanisms which impose per-transaction overheads much smaller than those for typical check and credit card purchases. Merchants need to restrict the class of customers they support based on their credentials, to restrict distribution of sensitive materials. We are building a system called NetBill which is optimized for the selling and delivery of low-priced network goods. A customer, represented by a client computer, wishes to buy information from a merchant's server. An account server (the NetBill server), maintains accounts for both customers and merchants, linked to conventional financial institutions. A NetBill transaction transfers information goods from merchant to customer, debiting the customer's NetBill account and crediting the merchant's account for the value of the goods. When necessary, funds in a customer's NetBill account can be replenished from a bank or credit card; similarly, funds in a merchant's NetBill account are made available by depositing them in the merchant's bank account. NetBill acts as an aggregator to combine many small transactions into larger conventional transactions, amortizing conventional overhead fees. The transfer of an information good consists of delivering bits to the customer. Users may be charged on a per item basis, by a subscription allowing unlimited
References (13)
- Alireza Bahreman and J.D. Tygar. "Certified Electronic Mail." In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 3-19, San Diego, CA, February 1994.
- M. Bellare, et al. iKP Family of Secure Electronic Payment Protocols. http://www.zurich.ibm.com/ Technology/security/extern/ ecommerce
- Benjamin Cox. Maintaining Privacy in Electronic Transactions. Information Networking Institute Technical Report TR 1994-8, Fall 1994.
- Stephen Kent. RFC 1422: Privacy Enhancement for Electronic Mail: Part II: Certificate-Based Key Management. Internet Activities Board Request For Comments 1422, February 1993.
- National Institute of Standards and Technology. FIPS 180: Federal Information Processing Standard: Secure Hash Standard (SHS). April 1993.
- National Institute of Standards and Technology. FIPS 186: Federal Information Processing Standard: Digital Signature Standard (DSS). May 1994.
- B. Clifford Neuman. "Proxy-Based Authorization and Accounting for Distributed Systems." In Proceedings of the 13th International Conference on Distributed Computing Systems, pages 283-291, May 1993.
- R. Rivest, A. Shamir, L. Adleman. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems." In Communications of the ACM, 21(2), February 1978.
- Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons, 1994.
- Marvin Sirbu and J.D. Tygar. "NetBill: An Internet Commerce System Optimized for Network Delivered Services." In IEEE Personal Communications, pages 6-11, August 1995.
- Alexander Somogyi, Thomas Wagner, et al. NetBill. Information Networking Institute Technical Report TR 1994-11, Fall 1994.
- Jennifer G. Steiner, B. Clifford Neuman and Jeffrey I. Schiller. "Kerberos: An Authentication Service for Open Network Systems." In USENIX Winter Conference, pages 191-202, February 1988.
- J. D. Tygar. "Atomicity in Electronic Commerce" (invited paper), to appear in ACM/IEEE 21st Conference on Principles of Distributed Computation, 1996.