SECURE COMMUNICATION METHOD SUITABLE FOR ORDERING A PRODUCT OR A SERVICE USING A COMMUNICATION TERMINAL

20220180403 · 2022-06-09

    Inventors

    Cpc classification

    International classification

    Abstract

    A secure communication method for ordering a product or a service by way of a communication terminal is described. The method is performed by the terminal and includes sending, to a server, a request containing information relating to a product or to a service, establishing, in the background, a communication to N supplier terminals (N≥1) identified by the server as being able to supply the product or the service, based on all or some of the information in the request, the communication being established while masking the communication identifier of the terminal and of the N terminals, and, in the course of the communication, receiving, from at least one supplier terminal out of at least K supplier terminals, such that 1≤K≤N, an offer for a product or for a service corresponding to the information, the offer having been generated during the communication.

    Claims

    1. A secure communication method for ordering a product or a service by way of a communication terminal associated with a communication identifier (ICu), the method implemented by the terminal and comprising: sending, to a server, via a communication network, a request containing information relating to a product or to a service, establishing, in the background, communication to N terminals associated, respectively, with N communication identifiers, N being greater than or equal to 1, the N terminals being terminals of providers identified by the server as being able to provide the product or the service on the basis of all or some of the information contained in the request, said communication being established while masking the communication identifier of the terminal and the N communication identifiers, during the communication, receiving an offer for a product or a service corresponding to said information from at least one provider terminal from among at least K, such that K is greater than or equal to one, and N is greater than or equal to K, the offer having been generated during the communication.

    2. The method of claim 1, further comprising: commanding the rendering of the offer on an interface of the terminal, the communication identifier of said at least one provider terminal and the identification of the provider of said at least one provider terminal being masked during the rendering.

    3. The method of claim 1, wherein the method further comprises, upon acceptance of the offer: sending identification data of the user of the terminal to said at least one provider terminal, receiving identification data of a provider using said at least one provider terminal.

    4. The method of claim 1, wherein the method further comprises, upon declination of the offer, continuing the communication, during which the actions of receiving an offer and of commanding the rendering of the received offer are iterated for as long as an offer is not accepted.

    5. The method of claim 1, wherein the generated offer is selected so as to optimize a compromise between firstly all or some of the information contained in the request, and secondly an item of location data of the communication terminal and/or an item of time data associated with the request.

    6. The method of claim 1, wherein, during the communication, the terminal receives, from respectively N-K product or service provider terminals identified by the server, N-K declinations to provide the product or the service corresponding to the request.

    7. The method of claim 1, wherein the product or service offer received during the communication is generated taking into account at least one adjustment variable for: all or some of the information contained in the request, and/or an item of location data of the communication terminal, and/or an item of time data associated with the request.

    8. A secure communication terminal suitable for ordering a product or a service, said communication terminal being associated with a communication identifier and comprising a processor that is configured so as to implement the following: sending, to a server, via a communication network, a request containing information relating to a product or to a service, establishing, in the background, communication to N terminals associated, respectively, with N communication identifiers, N being greater than or equal to 1, the N terminals being terminals of providers identified by the server as being able to provide the product or the service on the basis of all or some of the information contained in the request, said communication being established while masking the communication identifier of the terminal and the N communication identifiers, during the communication, receiving an offer for a product or a service corresponding to said information from at least one provider terminal from among at least K, such that K is greater than or equal to one, and N is greater than or equal to K, the offer having been generated during the communication.

    9. A non-transitory computer readable medium having stored thereon instructions which, when executed by a processor, cause the processor to implement the method of claim 1.

    10. A computer comprising a processor and a memory, the memory having stored thereon instructions which, when executed by the processor, cause the processor to implement the method of claim 1.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0045] Other features and advantages will become apparent on reading particular embodiments of the invention, which are given by way of illustrative and non-limiting example, and the appended drawings, in which:

    [0046] FIG. 1 is a schematic and general view of an architecture in which the method for ordering a product or service is implemented, in one particular embodiment of the invention,

    [0047] FIG. 2 shows a communication terminal for ordering a product or a service, in one particular embodiment of the invention,

    [0048] FIG. 3 shows the main actions implemented in the method for ordering a product or service according to one particular embodiment of the invention.

    DETAILED DESCRIPTION OF ONE EMBODIMENT OF THE INVENTION

    Architectural Environment

    [0049] FIG. 1 shows an environment in which the method for ordering a product or service according to the invention is implemented.

    [0050] FIG. 1 shows: [0051] a communication terminal TERu of a user UT wishing to order a product or a service, [0052] N communication terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N belonging, respectively, to N product or service providers f.sub.1, f.sub.2, . . . , f.sub.N, [0053] a server SER for establishing a connection between the terminal TERu and each of the provider communication terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N.

    [0054] The terminal TERu, the terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N and the server SER communicate with one another via a communication network RC. This may for example be an IP (abbreviation for “Internet Protocol”) network, an x-DSL network, fiber network or even 3G, 4G, 5G, etc. network.

    [0055] By way of non-exhaustive example, the terminal TERu and the terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N are: [0056] a cellphone, and/or [0057] a smartphone, and/or [0058] a tablet, and/or [0059] a laptop, and/or [0060] a personal computer of PC type, and/or [0061] etc.

    [0062] The terminal TERu is conventionally associated with a communication identifier ICu, such as for example the mobile telephone number, the landline number, the IP address or else the permanent email address of the user UT, such an identifier having been assigned thereto by one or more telecommunications operators to which the user UT has subscribed or even by one or more telecommunications service providers with which the user UT has created an account.

    [0063] For one provider terminal TERf.sub.i (1≤i≤N) under consideration from among N, the terminal TERf.sub.i is conventionally associated with a communication identifier ICf.sub.i, such as for example the mobile telephone number, the landline number, the IP address or else the permanent email address of the provider f.sub.i, such an identifier having been assigned thereto by one or more telecommunications operators to which the provider f.sub.i has subscribed or even by one or more telecommunications service providers with which the provider f.sub.i has created an account.

    [0064] The terminal TERu comprises a software application (or application program) APu that is dedicated to implementing the method for ordering a product or service in accordance with the present invention. The application APu is downloaded onto the terminal TERu, before the execution of the method for ordering a product or service. The provider terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N also each comprise a corresponding software application (or application program) APf.sub.1, APf.sub.2, . . . , APf.sub.N that is able to dialog with the application AP.sub.u when implementing the method for ordering a product or service in accordance with the present invention. The applications APf.sub.1, APf.sub.2, . . . , APf.sub.N are respectively downloaded onto the provider terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N, before the execution of the method for ordering a product or service.

    [0065] The server SER stores the following in a memory or a database: [0066] a virtual communication identifier IVu assigned to the user UT, such an identifier being associated with the communication identifier ICu of the terminal TERu, [0067] virtual communication identifiers IVf.sub.1, IVf.sub.2, . . . , IVf.sub.N relating, respectively, to the providers f.sub.1, f.sub.2, . . . , f.sub.N, such identifiers being associated, respectively, with the communication identifiers ICf.sub.1, ICf.sub.2, . . . , ICf.sub.N.

    [0068] A virtual communication identifier is for example a sequence of numeric or alphanumeric characters, generated for example randomly. The virtual identifier of the user UT (respectively of one provider f.sub.i under consideration from among N) is intended to be transmitted in the communication network RC instead of the communication identifier ICu (respectively the communication identifier ION in order to preserve the anonymity of the user UT (respectively of the product or service provider f.sub.i).

    Description of One Embodiment of the Communication Terminal TERu

    [0069] FIG. 2 shows the simplified structure of the communication terminal TERu designed to implement the method for ordering a product or service that will be described below.

    [0070] In a manner known per se, the communication terminal TERu comprises: [0071] a connection interface IC that is designed to communicate with the server SER of FIG. 1 via the communication network RC, in accordance for example with the http (abbreviation for “HyperText Transfer Protocol”) protocol, [0072] a display screen EC, [0073] a loudspeaker HP, [0074] a microphone MIC.

    [0075] According to the invention, the terminal TERu stores, in a memory MEM1, the application APu dedicated to executing the method for ordering a product or service according to the invention.

    [0076] According to one particular embodiment of the invention, the actions executed by the method for ordering a product or service are implemented by instructions of a computer program PG. To this end, the terminal TERu has the conventional architecture of a computer and comprises in particular a memory MEM2, a processing unit UTR, equipped for example with a processor PROC, and driven by the computer program PG stored in memory MEM2. The computer program PG comprises instructions for implementing the actions of the method for ordering a product or service that will be described below, when the program is executed by the processor PROC, according to any one of the particular embodiments of the invention.

    [0077] On initialization, the code instructions of the computer program PG are for example loaded into a RAM memory (not shown), before being executed by the processor PROC. The processor PROC of the processing unit UTR implements in particular the actions of the method for ordering a product or service, according to the instructions of the computer program PG.

    Description of One Embodiment of the Method for Ordering a Product or Service

    [0078] With reference to FIG. 3, a description is now given of the sequence of a method for ordering a product or service according to one embodiment of the invention. According to a first exemplary embodiment, the user UT, in the context of an electronic wallet service, wishes to withdraw cash using his terminal TERu in a partner merchant.

    [0079] According to a second exemplary embodiment, the user wishes to purchase an automobile of make X, model Y and color Z.

    [0080] At S1, the user UT opens the application APu and uses a user interface generated by the application APu to enter information relating to the product or to the service that the user wishes to order. Such a user interface may be a voice interface rendered via the loudspeaker HP in FIG. 2, or else be a text interface rendered on the screen EC in FIG. 2.

    [0081] In the case of the first exemplary embodiment, the information relating to the product or to the service comprises the amount that the user UT wishes to withdraw, that is to say t euros.

    [0082] In the case of the second exemplary embodiment, the information relating to the product or to the service comprises the type of product: “automobile”, the price, the make X, the model Y and the color Z of the desired automobile. Of course, such information could be limited to the word “automobile” or to a combination of the word “automobile” with one and/or the other of the categories “price”, make X, model Y, color Z.

    [0083] The information relating to the product or service may also comprise: [0084] an item of location data of the terminal TERu, such as for example the GPS (abbreviation for “Global Positioning System”) coordinates of the terminal TERu; and/or [0085] one or more items of time data associated with the request, such as: [0086] one or more items of time data relating to the entry, for example the date of the entry, the time of the entry in hours, minute(s), second(s), [0087] one or more items of time data relating to the sending of the request, such as for example timestamp data, [0088] one or more items of time data relating to the provision of the desired product or service, such as for example a day of the week or of the current month, a time slot during the day, 9:30 a.m. to 12:30 p.m., for example.

    [0089] Optionally, the information relating to the required product or service furthermore comprises one or more adjustment variables for: [0090] all or some of the information contained in the request, and/or [0091] an item of location data of the communication terminal, and/or [0092] at least one of the abovementioned items of time data associated with the request.

    [0093] If for example an item of information contained in the request is a price of the product or of the service, an adjustment variable consists for example of a tolerance range in regard to this price, for example plus or minus 5%, 10%, etc.

    [0094] If for example an item of information contained in the request is an item of location data, such as a distance of j kilometers around the communication terminal, an adjustment variable consists for example of a tolerance range in regard to this distance, for example j plus or minus 500 m, 1 km, etc.

    [0095] If for example an item of information contained in the request is at least one item of time data, an adjustment variable consists for example of a variation of a time slot initially mentioned in the request or else a period of validity of the order for the desired product or service, for example 1 day, 2 days, 1 week, etc.

    [0096] At S2, a request to order a product or service, containing the entered information, is sent to the server SER by way of the application APu via the network RC of FIG. 1. Such sending may be implemented by way of a button generated by the user interface of the application APu and rendered on the screen EC, or by way of a voice command generated by the user interface of the application APu and rendered by the loudspeaker HP. The request that is sent complies for example with the http or https protocol.

    [0097] At S3, the server SER receives the request. It then identifies the N providers f.sub.1, f.sub.2, . . . , f.sub.N as being able to provide the requested product or service. Such identification is implemented using a data analysis mechanism that uses all or some of the information relating to the product or to the service contained in the request sent at S2 and that calculates a probability of the N providers f.sub.1, f.sub.2, . . . , f.sub.N being able to provide the required product or service. The probability is possibly calculated on the basis of a local history accessible to the server SER.

    [0098] In the case of the first exemplary embodiment, the server SER thus assesses, based on the transactions already carried out by the providers f.sub.1, f.sub.2, . . . , f.sub.N and stored in a local history, that they are capable of providing the amount of t euros requested by the user UT.

    [0099] In the case of the second exemplary embodiment, the server SER is able to evaluate, based on the local history, that a particular automobile required by the user UT is in stock at all of the providers f.sub.1, f.sub.2, . . . , f.sub.N.

    [0100] Such identification makes it possible, in a manner completely transparent to the user UT and in a dynamic and targeted manner, to obtain a list of providers for which there is a high probability that they will be able to respond favorably to the request to order a product or service sent at S2.

    [0101] At S4, the server SER sends a response to the received request to the application APu. Such a response contains the virtual identifiers IVf.sub.1, IVf.sub.2, . . . , IVf.sub.N relating, respectively, to the providers f.sub.1, f.sub.2, . . . , f.sub.N.

    [0102] Optionally, the virtual identifiers IVf.sub.1, IVf.sub.2, . . . , IVf.sub.N sent at S4 are associated, respectively, with the probabilities, calculated by the server SER, of the N providers f.sub.1, f.sub.2, . . . , f.sub.N being able to provide the required product or service.

    [0103] At S5, the application APu receives the response.

    [0104] At S6, a request requesting to communicate with the provider terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N is then sent by the application APu to the server SER in the background, said request containing the virtual identifier IVu of the terminal TERu and the virtual identifiers IVf.sub.1, IVf.sub.2, . . . , IVf.sub.N relating, respectively, to the providers f.sub.1, f.sub.2, . . . , f.sub.N.

    [0105] At S7, the server SER receives the request and then creates an anonymized exchange channel for establishing a connection in peer-to-peer mode between the application APu of the terminal TERu and each of the applications APf.sub.1, APf.sub.2, . . . , APf.sub.N of the provider terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N.

    [0106] At S8, the server SER sends a connection establishment request to each of the applications APu and APf.sub.1, APf.sub.2, . . . , APf.sub.N.

    [0107] At S9, the communication between the application APu and each of the applications APf.sub.1, APf.sub.2, . . . , APf.sub.N is then established, after validation with the server SER, by the applications APu and APf.sub.1, APf.sub.2, . . . , APf.sub.N, of the connection establishment request. The communication is established for example by way of a synchronous or asynchronous bidirectional communication protocol, such as for example WebSocket, http, etc.

    [0108] Particularly advantageously, the communication is implemented in the background, and therefore in a manner transparent to the user UT. Moreover, the abovementioned public communication identifiers ICu and ICf.sub.1, ICf.sub.2, . . . , ICf.sub.N are masked during the communication, since they are replaced, respectively, with the abovementioned virtual identifiers IVu, IVf.sub.1, IVf.sub.2, . . . , IVf.sub.N.

    [0109] At S10, the application APu sends the request previously sent at S2, in the background, to each of the applications APf.sub.1, APf.sub.2, . . . , APf.sub.N. Said request may contain, in addition to the information already mentioned in relation to the above operation S2, one or more adjustment variables for: [0110] all or some of the information contained in the request, and/or [0111] an item of location data of the communication terminal, and/or [0112] an item of time data associated with the request, such as for example the date of the entry, the time of the entry in hours, minute(s), second(s), a day of the week or of the current month, a time slot during the day, 9:30 a.m. to 12:30 p.m., for example.

    [0113] In the case of the abovementioned first exemplary embodiment, the adjustment variable may for example consist of a tolerance of plus or minus 5% of the requested amount of t euros.

    [0114] In the case of the abovementioned second exemplary embodiment, the adjustment variable may for example consist of a tolerance in regard to the color Z initially entered.

    [0115] Each of the provider terminals TERf.sub.1, TERf.sub.2, . . . , TERf.sub.N then assesses, locally if it is able to do so, at the time when it receives the request sent at S10, whether the identified providers f.sub.1, f.sub.2, . . . , f.sub.N are able to respond favorably to the request, on the basis of all or some of the information contained in this request, the adjustment variables contained in this request and/or possibly adjustment variables exchanged during said communication between the application APu and each of the applications APf.sub.1, APf.sub.2, . . . , APf.sub.N and/or any adjustment variables already accepted by the service providers. Such an estimate is established by calculating probabilities considering, at input, the information contained in this request and the abovementioned adjustment variables.

    [0116] According to the abovementioned first exemplary embodiment, the estimate is based for example: [0117] only on the amount of t euros mentioned in the request sent at S10; [0118] on the amount of t euros and on an item of location data of the terminal TERu, such as for example a radius of j kilometers around the terminal TERu; [0119] on the amount of t euros, and/or on an item of location data of the terminal TERu, such as for example a radius of j kilometers around the terminal TERu, and/or an adjustment variable of plus or minus 5% of the amount of t euros.

    [0120] According to the abovementioned second exemplary embodiment, the estimate is based for example: [0121] only on the type of product: “automobile”, the price, the make X, the model Y and the color Z of the desired automobile; [0122] on the type of product: “automobile”, the price, the make X, the model Y and the color Z of the desired automobile and/or on an item of location data of the terminal TERu, such as for example a radius of j kilometers around the terminal TERu, and/or an adjustment variable in regard for example to the color Z. If the color Z is blue, for example, the estimate is calculated taking into account another color, for example the color gray and/or the color black.

    [0123] At the end of this estimate, N-K providers, such that K≤N, may abandon the communication because either they do not have the desired product or they cannot provide the desired service under the conditions accepted by these providers with regard to the conditions desired by the user UT. To this end, the application APu receives (not shown in FIG. 3) N-K messages declining to provide the desired product or service from the N-K corresponding applications of the N-K provider terminals K+1, . . . , N.

    [0124] At S11, K applications APf.sub.1, APf.sub.2, . . . , APf.sub.K each send a response to the application APu, each response containing the conditions of the offer that the corresponding provider f.sub.1, f.sub.2, . . . , f.sub.K is able to make, which are based on the calculation of the above estimate.

    [0125] At S12, the application APu receives each of the K responses containing, respectively, K offers for the required product or service in the background.

    [0126] At S13, a phase of negotiation between the application APu and each of the K applications APf.sub.1, APf.sub.2, . . . , APf.sub.K is then implemented in the background, so as to select at least one optimum product or service offer. This offer is selected so as to optimize a compromise between firstly all or some of the information contained in the request sent at S10, and secondly at least one item of location data of the communication terminal TERu, as described above, and/or at least one item of time data associated with the request sent at S10, some examples of which have already been described above, and/or else at least one adjustment variable as described above. During the negotiation, for each offer sent to the application APu by one application APf.sub.i under consideration from among K, the application APu responds to the offer by returning either a declination message or an acceptance message to the application APf.sub.i under consideration. This exchange is iterated for 1≤i≤K. The optimum offer is for example the one sent by the application APf.sub.i of the provider terminal TERf.sub.i.

    [0127] All of the offers to which the application APu has responded favorably may be ranked in order from the optimum offer to the least optimum offer.

    [0128] At S14, the application APu receives the optimum product or service offer in the background.

    [0129] At S15, the rendering of the optimum offer on for example a rendering interface of the terminal TERu, such as for example the screen EC or the loudspeaker HP of FIG. 2, is commanded. According to one exemplary embodiment, an icon anonymously representing the provider f.sub.i is displayed on a map of the location where the provider f.sub.i is located, thereby allowing the user UT to roughly locate the location of the provider f.sub.i. Particularly advantageously, no personal information about the provider f.sub.i, be this his name, his address, the communication identifier ICf.sub.i of the provider terminal TERf.sub.i, etc., is displayed on the screen EC. According to another example, a statement such as: “the provider f.sub.i is 5 km north-west from your home” is uttered via the loudspeaker HP. Such a statement does not disclose any personal information about the provider f.sub.i, be this his name, his address, the communication identifier ICf.sub.i of the provider terminal TERf.sub.i, etc.

    [0130] At S16, if the user UT confirms the offer (“Y” in FIG. 3), for example by pressing a dedicated button on the screen EC or by saying “OK” via the microphone MIC in FIG. 2, a contract for the offer for the desired product or service is generated by the application APu according to preprogrammed parameters, such a contract being considered to be signed by the user UT, but not at this stage comprising any personal data relating to the user UT.

    [0131] At S17, the contract signed by the user UT is sent by the application APu to the application APf.sub.i in the background.

    [0132] The terminal TERf.sub.i receives the contract and, if it is confirmed by the provider f.sub.i according to the same principles as those implemented for the user UT, the generation of a contract signature by the provider f.sub.i is triggered via the application APf.sub.i. At this stage, the contract does not comprise any personal data relating to the provider f.sub.i either.

    [0133] At S18, the contract signed by the provider f.sub.i is sent by the application APf.sub.i to the application APu in the background.

    [0134] At S19, the terminal TERu receives the contract signed by the provider f.sub.i.

    [0135] At S20, personal data relating to the user UT are sent to the terminal TERf.sub.i in the background according to a predefined configuration. At the end of this sending, and according to this predefined configuration, the personal data of the user UT are rendered on the terminal TERf.sub.i, in text or voice form, at S21. These may be for example the name and the e-mail address of the user UT. At S20, the terminal TERu also receives personal data relating to the provider f.sub.i in the background from the terminal TERf.sub.i and according to a predefined configuration. According to this predefined configuration, these may be for example the name and an e-mail address of the provider f.sub.i, as well as the visiting address of said provider. According to this predefined configuration, the personal data of the provider f.sub.i that have been received are rendered on the terminal TERu, in text form, for example on the screen EC of the terminal TERu, or else in voice form, by way of the loudspeaker HP of the terminal TERu, at S21.

    [0136] If, at S16, the user UT does not confirm the offer (“N” in FIG. 3), for example by pressing a dedicated button on the screen EC or by saying “NOT OK” via the microphone MIC, the ordering method returns to operation S13 with a view to selecting one of the remaining offers from among K−1. The selection is implemented through iteration in the order into which the offers have been sorted, an iteration being performed for as long as a new optimum offer is not selected. If none of the offers is accepted by the user UT, according to one exemplary embodiment, the connection established at S13 ends. The ordering method then returns to the entry operation S1, where the user UT is invited to enter additional information to that initially entered at S1. Operation S2 and the following operations are then reiterated. According to another exemplary embodiment, the connection established at S13 persists, and the ordering method returns to S10, where preconfigured adjustment variables are applied to: [0137] all or some of the information contained in the request, and/or [0138] an item of location data of the communication terminal, and/or [0139] an item of time data associated with the request.

    [0140] It goes without saying that the embodiments described above have been given purely by way of completely non-limiting indication, and that numerous modifications may be easily made by a person skilled in the art without, however, departing from the scope of the invention. Other applications of the invention are also possible, such as for example an electronic auction system or even a payment system via a mobile application downloaded onto a telecommunications terminal.