Method and apparatus for secured electronic commerce

ABSTRACT

A user anonymously acquires a first sequence of encryption key material. An encryption server, having a second sequence complementary to the first sequence, receives and forwards encrypted messages and monitors utilization of encryption key material by the user. As the key material is used, the server adjusts user accounts to exhaust the first sequence. Thus, the first sequence provides for secure, anonymous communication and, correspondingly, can serve as a payment media for conducting electronic transactions.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a Continuation of U.S. application Ser. No. 10/905,694, filedJan. 17, 2005, now U.S. Pat. No. 7,043,025, which is a Continuation ofU.S. application Ser. No. 09/944,761, filed Aug. 31, 2001, nowabandoned.

TECHNICAL FIELD

The present invention relates to data communications and moreparticularly to a method and apparatus for secure communications thatmaintain the privacy of a user.

Electronic communications and commerce, such as messages or monetarytransactions transmitted between computers, on a network, or over the“internet” or world wide web, face challenges tied to the use ofelectronic transmissions. A user or customer can find and communicatewith a business substantially anywhere in the world. Typically,electronic businesses' product may include communications, goods,services, research materials, and amusements. Some of this product maybe provided at no cost, for purposes of publicity and goodwill. Otherproduct is of greater value and is made available at a monetary cost.For many businesses, the ability to conduct monetary electronictransactions will be essential, or the business may find no sufficientreason to continue presenting an electronic presence.

Whether an electronic transaction is carried over copper wires, opticfibers, or broadcast waves, three long standing problems that remaininadequately resolved are establishing a reliable monetary basis fortransactions between businesses and customers who are strangers to eachother, loss of transaction privacy through eavesdropping, and monetarytheft through interception and reuse of transmitted financialinformation. Security and encryption methods are helpful but incompletesolutions.

Both individuals and businesses face threats to their privacy andsecurity through outside monitoring or intrusion into theirtransactions. Numerous aspects of business and personal activity arereflected by electronic transactions, which are easy to monitor. It hasbeen suggested to increase security by dividing portions of atransaction over different types of transmissions, for example byselecting among internet, telephone, facsimile, and electronic messagingor e-mail. Yet, all of these are equally subject to interception andmonitoring. At both the individual and business level there exists thedangerous possibility that a competitor could learn trade secrets,confidential business information, or sensitive financial plans,including competitive plans, inventions, and business strategy.Individuals may suffer exposure of highly personal matters, theirphysical and mental health; salary; employment or loss of employment;political, social and religious beliefs; and sensitive communicationswith doctors, lawyers or clergymen. These examples merely touch uponareas where privacy is reasonably expected and where outside monitoringis an unjustified, highly violative intrusion into this expectation.

Transactions in electronic commerce are conducted by transmission ofinformation. Unauthorized persons learning the information have theability to conduct fraudulent transactions or otherwise may violate theprivacy of those engaged in the transaction. Security systems attempt toprevent unauthorized persons such as eavesdroppers or “hackers,” fromlearning useful information. For example, a security system may encryptthe transaction so that a hacker sees only coded messages that likelyare undecipherable. At still another level, the identity of the partiesto the transaction may be shielded.

One method of achieving private communication is by the senderencrypting his message, which then is decrypted by the recipient. Thereare two basic types of cryptographic systems, symmetric and asymmetric.In a systemic cryptographic system, also known as conventional or secretkey, both the message is encrypted into cryptotext by the sender anddecrypted into plaintext by the recipient with the same key. Thesecurity of a message can be entirely adequate as long as both thesender and the recipient know the key and the key remains exclusive tothe two parties. However, in ordinary commerce a symmetric cryptographicsystem is not feasible, since the parties generally will not have anestablished exclusive key.

A One-Time-Pad cryptographic system is a known symmetric cryptographicsystem where the sender and recipient each have an identical “pad” ofrandom bits. The sender encrypts an n bit message with the next n bitsfrom the sender's pad and the recipient decrypts the message with thesame n bits from the recipient's pad. Each bit is used once and thendestroyed. A true One-Time-Pad cryptographic system is provablyunbreakable since an encrypted n bit message is equally likely todecrypt into any n bit message. One-Time-Pad cryptographic systems havethree limitations. The bits of the pad must be truly random, not pseudorandom bits generated by an algorithm, and therefore may be expensive togenerate. Reuse of a pad seriously compromises the security of thesystem. One-Time-Pad cryptographic systems require generation anddistribution of one bit of key for each bit of electronic transmission.

Another known symmetric cryptographic system starts with the broadcast,such as from a satellite, of a high speed, continuously generated streamof random numbers. The sender and recipient agree on a point or time tostart pulling numbers from the stream, and encrypt and decrypt messageswith the sequence of numbers starting at the agreed start time. The keyin this system vanishes as soon as the key is used. The system relies onthe high speed, continuously generated stream exceeding data storagecapacity. A third party seeking to intercept and decrypt a message musthappen to be storing numbers at the agreed start time. The third partycannot decrypt the message if the third party learns of the agreed starttime afterwards and then starts storing numbers from the stream.

In asymmetrical cryptographic systems, also known as public key systems,commercial privacy is conveniently established by use of a two keysystem, commonly referred to as public and private keys. A private keyis secret to the user, while a public key is open for anyone to know.Thus, the public key can be openly sent to initiate a transaction, or itcan be listed in a public directory. The two keys are complimentary toeach other in that either one can decode a message encoded by the other.Neither key can decode a message that was encoded using that same key,and knowledge of the public key does not enable the private key to bedetermined. Anyone wishing to send a secure message can use therecipient's public key to encrypt the message prior to sending. Therecipient will be the only party having the private key needed todecrypt the message. Asymmetric cryptographic systems requiresignificantly larger keys, and therefore significantly more processingtime to encrypt and decrypt, than symmetric cryptographic systems toprovide the same level of security.

In a variation that utilizes the respective strengths of symmetric keyand asymmetric key systems, a sender encrypts a message with a symmetrickey. The sender encrypts the symmetric key, often called a session key,with the recipient's public key. Both the coded message and theencrypted session key are sent to the recipient, who decrypts thesession key by using the recipient's private key. The recipient thendecrypts the message with the session key.

Messages encrypted with a symmetric key system are automaticallyauthenticated since the sender is the only one other than the recipientthat knows the key. Messages encrypted with an asymmetrical key systemcan be authenticated with a “digital signature”. The sender generates adigest or hash of the message, and encrypts the digest with the sender'sprivate key to create the digital signature. The sender sends themessage, encrypted with the recipient's public key, and the digitalsignature to the recipient. The recipient decrypts the message with therecipient's private key, generates a digest of the message, decrypts thedigital signature with the sender's public key, and verifies that therecipient generated digest and the decrypted digital signature match. Ina further variation creating another layer of privacy, at the time ofsending the message, the sender can encrypt the digital signature withthe recipient's public key.

Data packets of any description can be sent over a network from a senderto a recipient. Typical network structure involves numerous nodes, eachnode joined to neighboring nodes by links. Various systems are known forrouting data packets from a sending node to a destination node.According to a system referred to as “broadcasting,” a packet is sent toevery node in the network, eventually reaching the intended destination.This method tends to be reliable although costly due to redundanttransmissions. “Path specific routing” is another method, in which thesender establishes the path to the recipient. This latter method is lesscostly although not as reliable, because a single failure in the pathcan cause loss of a message.

U.S. Pat. No. 5,455,865 discloses a method of data packet routing over anetwork that may contain malicious failures. The sending node within oneof several sub-networks contains information of the local topology ofthe network and computes a route at least to a router for thatsub-network. This routing information is contained in the packet. Therouter computes the route to another router at another sub-network. Thisprocess is repeated until the packet reaches the router at thesub-network of the recipient, which determines a route to the recipient.

U.S. Pat. No. 5,751,813 discloses a method of using an encryption serverto receive and forward a message in such a way that eavesdroppers learnneither the content of the message nor the routing. The sender encryptshis transmission at two levels: content is encrypted with the sender'sprivate key, and the identity of the sender and recipient are encryptedwith the encryption server's public key. The encryption server receivessuch message and uses the server's private key to decrypt the secondlevel of encryption, yielding identification of sender and recipients.The content of the message remains encrypted with the sender's privatekey. The encryption server determines the identity of each recipient andthen uses the public key corresponding to each recipient to re-encryptthe message content and the identification of the sender. The encryptionserver then forwards the individually encoded versions of the message toeach corresponding recipient. Each recipient decrypts the entire messageusing two keys, the recipient's private key and the sender's public key.This system delivers an encrypted message to the recipient whileprotecting its confidentiality even from the encryption server. It alsoprotects the confidentiality of the sender's identity and protects thefact that the sender is communicating with the particular recipients.Due to the different encryptions of incoming and outgoing messages atthe encryption server, an eavesdropper would have difficulty correlatingwhich sender communicated with which recipient.

U.S. Pat. No. 5,479,514 discloses a method of secure communication amongprivate network nodes, allowing data to pass through selectednon-private transmission nodes without sharing encryption keys withthose non-private transmission nodes. Thus, independent vendors havingnodes located in the private network of another business need not beinformed of encryption keys, and it is not necessary for each privatenode to maintain a list of keys known to each other private node. Eachencrypted data packet carries the identification of the encrypting nodeand of a designated decrypting node that need not be the next node inthe network system. However, each pair of sending and receiving nodesshares a known key. The designated decrypting node recognizes its ownidentification in the packet and performs decryption followed byre-encryption with a second key, and forwards the packet to stillanother designated decrypting node that knows the second key. Thisprocess is repeated until the intended ultimate recipient node receivesthe packet. Independent vendor's nodes are by-passed in theencryption/decryption process, preventing loss of security while stilleliminating proliferation of keys.

U.S. Pat. No. 5,574,785 discloses a method of communication in which adata packet carries an identifier for a cipher key known to both thesender and recipient. If this identifier is incorrectly transmitted, themethod provides a way for the recipient to discover the correct cipherkey without further communicating with the sender. The packet carriesappended data that, if correctly decrypted, will be of known form orcontent. Thus, if the appended data decrypts incorrectly, the recipientcan test other cipher keys until the appended data decrypts correctly.

The prior known systems provide a partial foundation for secure andprivate communications. However, no one encryption system is likely toserve all areas of commerce or communications. The identity of the useris known to the server in each of the prior known systems, so thesesystems do not completely protect the privacy of the user. Prior knownsystems do not provide a method or apparatus to transfer value from auser to an electronic business, in exchange for goods or services, thatprotect the privacy of the user from the server and the electronicbusiness.

Certain encryption software cannot be exported from the United States.Because the United States is significant to many transactions, softwareexport restrictions can discourage commerce with other countries. Itwould be desirable for international commercial purposes to have acommunications system with a borderless reach that provides secure,private business transactions. Finally, it would be highly desirable fora borderless commercial system to provide an electronic or internetcurrency, so that electronic or internet commerce could be trulyborderless.

DISCLOSURE OF THE INVENTION

According to the method of the present invention, secured anonymouselectronic commerce takes place through an encryption server. First andsecond sequences of encryption key material are provided with the twocode sequences defining a pair of sequences in which each sequence ofthe pair is suited for decrypting a message that has been encryptedusing the other sequence of the pair. An anonymous first user isprovided the first sequence, encryption software, connection software,and an identifier associated with the first sequence, in exchange for apayment. The second sequence of is provided to the encryption server andan account associated with the encryption server is established to tracka value associated with use of the encryption key material of at leastthe first sequence. The first user encrypts data and transmits theencrypted data to the encryption server. The encryption server decryptsat least a portion of the encrypted data by using the second sequenceand adjusts the tracked value of the account in response to theutilization of the encryption key material of at least the firstsequence. Apparatus for secured electronic commerce includes a portabledata storage device, a data processing device and an encryption server.The portable data storage device has the first sequence, the identifier,the encryption software, the connection software and an associatedvalue. The data processing device is operable to access the portabledata storage device to encrypt and decrypt data and connect to theencryption server, which has the second sequence, to provide anonymousencrypted communication with the encryption server. The identifier isassociated with the first sequence to assure that a user remainsanonymous to the encryption server as well as any party that mightintercept the encrypted data.

Details of this invention are described in connection with theaccompanying drawings that bear similar reference numerals in which:

FIG. 1 is a schematic block diagram of a method embodying features ofthe present invention.

FIG. 2 is a schematic block diagram of apparatus embodying features ofthe present invention.

DETAILED DESCRIPTION OF THE INVENTION

Referring to FIG. 1, a method of secured electronic commerce includesproviding first and second sequences of encryption key material 11;providing to an anonymous first user, in exchange for a payment, thefirst sequence, an identifier associated with the first sequence,encryption instructions and connection instructions 12; providing thesecond sequence to an encryption server 13; establishing an accountaccessible to the encryption server 14; storing a value parameterassociated with the first sequence in the account 15; providingencrypted communications between the first user and the encryptionserver 16; providing services to the first user in response to theencrypted communications 17; receiving services from the first user inresponse to the encrypted communications 18; adjusting the valueparameter in response to providing the encrypted communications and inresponse to providing and receiving services 19; and ceasing providingencrypted communications and services when the value parameter isexhausted 20.

The first and second sequences of encryption material of the step ofproviding first and second sequences of encryption key material 11 arecomplementary sequences such that the encryption key material of the onesequence decrypts encrypted messages that have been encrypted with theother sequence. In the preferred embodiment, the first and secondsequences are identical one time pads. Alternatively, the first andsecond sequence can be sequences of identical session keys or aplurality of complimentary public and private keys.

In broad outline, the operation of the system is initiated by a firstuser, who in various specific types of transactions mentioned hereaftermay be called a message sender or a buyer, whether an individual orlegal entity. In other instances, the initiating party may be a messagereceiver, merchant, or seller. As a general term of reference, theinitiating party will be referred to as a user. Because the system ofcommerce is electronic, the user may be an entity utilizing a computeror may be the computer, itself, when programmed to function within thesystem. Further, the user may be any of various alternative electroniccommunication devices that perform functions similar to a computer. Forexample, various specialty electronic communication devices are knownfor conducting on-line activities over telephone lines, cable televisionlines, optic fiber lines, and wireless communications modes. The lattermay communicate using wireless transmission and reception systems, whichmay include satellite or land-based systems.

The operation of the processing system provides for the existence of asupervisory entity through which the user communicates. The supervisoryentity may be an electronic computer containing programmed instructionsfor operating within the system. According to present practice ofconducting on-line commerce, this supervisory entity may be acomputer-server operating within a network of computers. Acomputer-server may be regarded as being a hub or node in a network,through which a plurality of users are electronically connected forcommunicating with other portions of the network. The network may be apublic network such as the Internet or World Wide Web, a differentpublic network, or a private network.

This supervisory computer will be generally referred to as an encryptionserver. The significant purposes served by the encryption server areelectronic communication to and from users; encryption and decryption ofsuch communications, forwarding of communications to recipients andmesne recipients, receipt of reply communications from recipients andmesne recipients, monitoring existence of encryption code sequences,generating encryption code sequences, utilizing encryption codesequences, canceling or expiring encryption code sequences, andaccounting for transactions in code sequences.

In the step of providing to an anonymous first user, in exchange for apayment, the first sequence, an identifier associated with the firstsequence, encryption instructions and connection instructions 12, a useracquires the first sequence. Preferably the first sequence is acquiredindirectly so that the user can remain anonymous. In the preferredembodiment of the method, the user buys a portable data storage devicehaving the first sequence in a retail transaction. Alternatively, thefirst sequence could be downloaded by the user using an aliasedidentity. The identifier is a unique sequence of bytes and can be theonly identification for the first sequence.

The connection instructions and encryption instructions may be acquiredby the user with the first sequence and identifier or may be acquiredotherwise, such as by downloading from the encryption server. Theconnection instructions are generally in the form of software that canbe processed by a computer to connect to the encryption server,including telephone numbers for telephone connection and handshakes.Since telephone numbers may be blocked or may change for securityreasons, the connection instructions generally will include a largenumber of telephone numbers to be tried successively. The connectionsinstructions, including the telephone numbers, may also be updatedduring the step of providing encrypted communications between the firstuser and the encryption server 16, described hereinafter.

The encryption instructions generally include software that is appliedto data to encrypt or decrypt the data. The encryption instructions alsocontrol the usage of the first sequence. As examples, and not aslimitations, where the first sequence comprises a plurality of sessionkeys, the encryption instruction may retire the last used key and use anew key each time the user initiates a connection, after a predeterminednumber of bytes of communication, after a predetermined connection time,or after a predetermined chronological time, such as each day. Where thefirst sequence comprises a one-time pad, the encryption instructionsprevent reuse of any portion of the first sequence.

Providing the second sequence to an encryption server 13 includesstoring the second sequence on a data storage device accessible to theencryption server. An account, associated with the first and secondsequences, is established as an account accessible to the encryptionserver 14, and a value parameter, associated with the first sequence, isstored in the account 15. The value parameter is generally a monetaryvalue and may further represent a predetermined amount of time fornetwork access, service provision and electronic messaging.

Providing encrypted communications between the first user and theencryption server 16 is initiated by the user preparing a messagecontaining preselected data such as an instruction set or request. Whilethe content of the message is variable according to requirements of theuser, the message can be regarded as an item of value, such as apurchase order. The user communicates the message to the encryptionserver, for example, instructing the encryption server as to a serviceor product the user desires.

The message is encrypted for the transmission from the user toencryption server. The encryption utilizes the first sequence obtainedby the user. The user computer may perform the encryption, usingencryption programming available to it. There are many encryptionsystems known, including transaction keys, public and private keysystems, and the like. The specific software and system is selectableaccording to the needs and desires of the parties, with due regard tolocal, national and international regulations. The encryptionprogramming may be software that was obtained with or associated withthe first sequence. Alternatively, the software may be obtained from theencryption server either prior to or approximately contemporaneouslywith the transmission to the encryption server.

The encryption server receives the encrypted transmission from the user.The encryption server is structured and programmed to decrypt theencrypted message received from the user. Such decryption may be of apreselected part of the message or the entire message. For example, itmay be programmed that the encryption server decrypts only a designatedpart of the message that identifies an intended end recipient or mesnerecipient. Depending upon the requirements of the method of encryptionused, decryption may utilize the same key employed by the user toperform the encryption. Alternatively, decryption may employ acomplimentary set of data that is available to the encryption server,such as a public or private key of a public key and private key system.An important aspect of the invention is that the encryption server hasavailable the decryption key, enabling the encryption server to decryptthe user's message, as required.

With this encrypted transmission to the encryption server, the inventionhas achieved its initial goal. The user has dispatched a transmissionthat is difficult to intercept by an unauthorized source such as anelectronic eavesdropper. The user has maintained his anonymity from sucheavesdropper and, perhaps, from the encryption server, itself. With thisachievement, the system of this invention allows further steps andalternatives.

In one form of the invention, the entire message may have been directedto the encryption server. Accordingly, the encryption server decryptsthe entire message and acts upon it. For example, the message mayinstruct a search for a source of a product or service. The encryptionserver acts upon this instruction by seeking such a source. For purposesof carrying out instructions, the encryption server is programmed tocarry out a search over the connected network. The encryption servercarries out the search function and locates a source of the desiredservice or product. Such source may be referred to as the serviceprovider. The encryption server may direct a portion of the describedfunctions to a mesne recipient, such as an Internet search engine.Further, the timing of the encryption server operations may be delayedsubstantially from receipt of the message, so that eavesdroppers cannotcorrelate the search with the user's encrypted message.

In the step of providing services to the first user in response to theencrypted communications 17, the invention provides a method andapparatus for secure electronic commerce, which may include the transferof products or services. The scope of the transferred products mayinclude messages, data, services, tangible and intangible goods, andfinancial credits such as money.

When the encryption server has obtained the requested service orproduct, it follows further programming for encrypting the desiredservice or product in a message, or, where applicable, a verification ofthe order, to the user. The message is encrypted using a system thatallows the user to receive and decrypt it. A suitable encryption systememploys the same sequence obtained by the user and known to theencryption server. The message, containing the requested product orservice, is transmitted to the user, allowing the user to decrypt thereceived service or product.

The first user may at times function as a service provider and servicesmay be received from the first user in response to the encryptedcommunications 18. The value parameter is adjusted in response toproviding the encrypted communications and in response to providingservices 19. As an example, and not a limitation, where the firstsequence is a one time pad, the value parameter is adjusted in a mannerproportional to the usage of the one time pad so that when the one timepad is used up, the value parameter is exhausted. The value parameter isalso adjusted in proportion to the cost of service provided by serviceproviders so that the service providers are paid, directly orindirectly, by the encryption server. The value parameter may beadjusted for services provided by the first user either directly, orindirectly by reducing the rate charged to the first user for the stepof providing encrypted communications between the first user and theencryption server 16. The first user can thereby remain anonymous to theservice providers as well as the encryption provider. When the valueparameter is exhausted, the encryption server stops providing servicesand communication to the first user 20.

These functions are carried out in an environment that substantiallyeliminates the ability of eavesdroppers or hackers to know the contentof a transaction. From this description, it should be evident that theprocessing system protects the user and the contents of the user'smessage from unauthorized disclosure. In particular, the user's privacyand anonymity are protected. Communications between the user andencryption server are conducted in a way that maintains anonymity,despite the possible need for the encryption server to furthercommunicate the user's message to a third party service provider. Thereply or product supplied by the service provider is directed only tothe encryption server, further protecting the user from unauthorizedpublicity or loss of privacy.

The need for privacy has been documented in news reports of variouscommercial enterprises gathering and misusing information aboutindividual customers. For example, some reports reveal the practice ofplacing small false charges on credit card bills of those who tend tomake numerous small credit purchases and who, presumably, would beunlikely to notice an additional small charge. This type of misuse andinvasion of privacy are avoidable. By encrypting the message from theuser to the encryption server, and later in the process encrypting thereturn message from the encryption server to the user, the privacy ofthe user is ensured. Although a service provider or commercial vendorwill know what product or service has been provided, the identity of theend customer is hidden from the service provider, from its employees,and from outside hackers and on-line pirates. Encrypting a requestduring transmission from an encryption server to a service provider, andencrypting the reply from the service provider to the encryption servermay be desirable in some circumstances. However, protecting the identityand privacy of the user does not require such encryption to and from theultimate service provider vendor.

Among possible practical applications of this system are utilization ofshared software, retrieval of information, obtaining a product orservice, or engaging in an amusement or recreation. These applicationsmay be of subject matter presently available or hereafter conceived of.

A non-limiting example of such subject matter includes time-sharingcomputer programs, such as engineering, design, drafting, accounting,and scientific programs. The need for privacy in this utilization isclear, since sensitive business and financial data are likely to beprocessed. A related example is obtaining database contents, web siteinformation, journal papers, and publications. To the competitor oreavesdropper, these inquiries could provide valuable insights intobusiness plans, inventions, or personal interests.

Examples of a product or service may include medical advice, legaladvice, office supplies, and real property. The importance and need forconfidentiality of the transaction could range from trivial, for officesupplies, to vitally important and valuable competitive information,such as the future site of a new store or development project.

Amusements may include games of chance, either with or without monetarywagering. The need for personal privacy is evident, since gambling isillegal or unacceptable in certain jurisdictions and societal groups.Even if the conduct of electronic gambling were conducted in such amanner as to be lawful, a gambler might suffer social penalties orpersonal embarrassment if his private gambling activity were publiclyrevealed. In one embodiment of the present invention a lossless gamblingsystem credits the gambling gains to the account associated with thefirst sequence, debits losses, and invests the losses for the first userin investments that mature at a selected future time. The odds arebiased in favor of the provider of the lossless gambling, as is true ofother known gambling providers, so the first user will eventuallyexhaust the value parameter. The provider profits by the float from thetime the first user purchases the first sequence until the first userloses value.

In one embodiment, the system creates and manages encrypted electronicmessaging or “e-mail.” Messaging transactions can be carried out in atleast three distinct ways. According to a first method, a sender, who isthe user, protects his own privacy by ensuring that only encryptedcommunication is sent between himself and the encryption server.According to a second method, the first method is extended to ensurethat only encrypted communication is sent from the encryption server tothe service provider regarding the user's messages. The third methodextends the second, by ensuring that any response from the serviceprovider to the encryption server is encrypted, as well. A fourthpossible variation of method could offer the option of not encryptingthe responsive communication sent from the encryption server to theuser; however, this option would seem to be of little interest to theuser who is seeking privacy.

Additional variations are possible in the transmissions between theencryption server and service provider. These methods vary according tothe party bearing the expense of encryption. These variations allow theencrypted communications between the encryption server and serviceprovider to be either at the user's expense or at the service provider'sexpense. The choice between these variations may depend upon therelationship between the user and the service provider. For example, ina communication between strangers, the service provider may have nointerest in encryption, leaving the choice to the user, in which casethe user merely needs to instruct the encryption server how to handlethe response. However, if the user and service provider have an existingrelationship, each one may wish to provide encryption between itself andthe encryption server.

According to the first method, the encrypted messaging is conductedbetween a user and a second party receiver, which is the encryptionserver. In the second method, the encrypted messaging is furtherconducted between the encryption server and a third party receiver, theservice provider. The encryption server may be an encryption server thatmaintains the anonymity of at least the user and perhaps of both theuser and third party receiver.

An encryption server may perform a variety of steps that make itdifficult for an eavesdropper to breach the privacy of those using theserver. A basic step is the ability of the server to encrypt and decryptmessages and to both transmit and receive encrypted messages. Further,it may change the appearance of a message it receives for forwarding byencrypting the message in a different key. Thus, incoming and outgoingmessages are difficult to correlate. In addition, it may scramble theorder of messages and vary the communication methods. By these means,the encryption server performs as an intermediary between the sender andthird party receiver.

Both sender and third party receiver can be maintained as anonymous,even to the encryption server. While anonymity can be maintained, theencryption server requires certain minimum information in order to carryout is communication functions. These items of minimum information canbe supplied in an anonymous way by using a one-time-pad, or OTP system.The only identity required is an identification means related to thefirst and second sequences.

In an alternative embodiment, the user provides a communication point,such as a telephone number, to the encryption server to enable theencryption server to contact the user. Another type of communicationpoint is an e-mail box. The encryption server may provide an e-mail boxthat corresponds to the identifier of the first sequence. With thislatter system, the encryption server will have no knowledge of thesender or of the third party receiver, although it will be incumbentupon the sender and third party receiver to check his mail.

The invention may be used for transmitting confidential messages betweenparties other than the encryption server, for example by providingcooperating sequences of encryption key material to both the user andservice provider. The user may obtain the pair of sequences and supplythe second sequence to the service provider, thus allowing theencryption and decryption of electronic messages between them. Thesemessages may be email or another type of messages sent over theInternet, which may include service or data transmissions. Together thetwo sequences define a cooperating pair, and each pair may be associatedwith one or more identifying numbers, such as an identification andtracking account number and an e-mail account. Each sequence of the paircontains data suitable for identifying or linking to the account(s)common to the pair of sequences. The account is known to the encryptionserver, for monitoring and debiting purposes.

A first sequence contains encryption data suitable for encrypting amessage, such as at one end of a transmission, which will be termed thesending end. The second sequence contains data suitable for decryptingthe same message at the second end of the transmission, which will betermed the receiving end. The data on each sequence may be identicalrandom number sequences. Thus, encryption data and decryption data mayconstitute the same data on each pad. The use of identical data is anadvantage, as it simplifies tracking and accounting for sequence usageand exhaustion. Other encryption and decryption systems are known andmay be used with suitable modifications to the tracking software used bythe encryption server. The encryption server contains programmedinstructions suitable to recognize the first sequence and to obtain,recall, or create a tracking account and, if desired, an e-mail account,corresponding to the first sequence.

The sender creates a message that he desires to send in encrypted formto the third party receiver. The sender places the message in a computerfile, computer memory, an e-mail box, or another location where it canbe found by the encryption server. As a preliminary step, the sender mayencrypt his message by any suitable means. Commonly used encryptionmeans are a transaction key or a private and public key system.Alternatively, the sender may forgo the preliminary encryption and allowthe message to be in plain text, thus relying solely upon the one timepad for eventual encryption security. Regardless of which preliminaryencryption, if any, is selected and used, the sender determines when hismessage is ready for transmission and notifies the encryption server.The notification may by a direct telephone call or by e-mail message toan e-mail box associated with the first sequence. A preferred type ofnotification is by telephone line, such as by using a designated line ortelephone number associated with the encryption server. The notificationmay be accomplished by the connection instructions. Software programmingmay accomplish the notification by directing a computer to call theencryption server by use of a computer-controlled device, such as amodem. The connection instructions may provide a toll-free number orother calling system that costs the caller nothing, or whose cost isincorporated into a cost of obtaining the first sequence.

The telephone notification, under computer control, notifies theencryption server that the user of a specific first sequence, i.e., thesender, is prepared to send a message. The notification may includesufficient data to enable the encryption server to return acommunication to the sender. Thus, the software can identify the callingnumber or an electronically accessible on-line address. The encryptionserver terminates the sender's initial telephone call or other form ofcommunication as soon as the server has received sufficient data toenable a return communication. The encryption server then prepares toreceive the sender's message.

When the encryption server is prepared to receive the sender's message,it will return a communication to the sender. For example, theencryption server may enter a return call to the sender's computer,e-mail box, or such other location or facility that provides access tothe message. It is not necessary that the sender's first sequence beloaded into the same computer as the message. The software may instructthe encryption server to obtain the message from a physically orelectronically separate data repository. Likewise, the sender's firstsequence may be accessed by using a communication link to the firstsequence at a separate physical or electronic location. For purposes ofdescription, but without limitation, the location of both the messageand the sender's first sequence will be described as being the sender'scomputer.

The return call is preferred to be made through a communication linkother than the one used by the sender, so that a hacker or eavesdroppercannot readily monitor the return call. For example, the return call maybe made through a wide-area-telephone-service (WATS) line. By thismethod of communication to anonymous transmission points, variouslyselected by either the sender or encryption server, the sender isallowed to maintain privacy even from the encryption server.

Using software, the encryption server causes the sender's computer totransmit the message to the encryption server. Before the message passesover the communication line, the first sequence encrypts the message.The first sequence is consumed until exhausted. The software alsodeletes the transmitted message from the sender's computer, thus leavingbehind no trace of the transaction.

The management and exhaustion of the first sequence may be conductedaccording to other schemes. It may be desirable to conserve code andenable a single first sequence to provide a large amount of serviceusage. Accordingly, a first sequence contains a limited or preselectedamount of data, with the limit dictated by the data holding capacity ofthe media used. A degree of capacity increase by key reuse is possibleby several methods. The code may be broken into sequences or groupingsof bits or bytes. The number of bytes in each sequence can be varied atrandom from sequence to sequence. Each sequence may be reused for apredetermined number of times before the next sequence is employed. Theencryption server may use a random number selection to instruct the userwhere the encryption server and user computers are to cut off eachsequence and thereafter begin recycling that code sequence. Similarly,the encryption server may instruct the user and encryption servercomputers as to the number of bytes in each sequence. By these means,the service capacity of a first sequence may be enlarged. Thus, firstsequences may be supplied and sold over a large range of valuedenominations. High value denominations may use multiplier schemesbefore first sequences are exhausted, enabling them to trade atexponentially larger values, as compared to first sequence with aone-time pad.

The encryption server performs an accounting function by supervisingconsumption of value associated with the first sequences of encryptionkey material. As described, one form of direct value consumption isexhaustion of the code bits. The code bits have direct value for use inencrypting messages. Regardless of whether the code bits and sequencesare used once or reused many times, their eventual exhaustion representsa loss of value. The exhaustion may be by any effective means, such aserasing them from a computer memory or electronic storage device. Theirexhaustion may be by a record placed on or removed from an index oftheir identity, size, or location. Their exhaustion may be by debitingan account of monetary values associated with the code bits. Thus, codebits need not be deactivated from further encryption service ifassociated with monetary values, as long as the user maintains asufficient monetary worth in an associated debitable account. In such acase, first sequence can be used as long as the encryption server cancontinue to debit an account associated with the first sequence or thefirst user. Correspondingly, the user may receive account credits by thetransactions through the encryption server, further prolonging availableusage of a first sequence.

Upon exhaustion of a first sequence, further traffic in encryptedmessages will require acquisition of additional sequences of encryptionkey material, which can be purchased for value. Thus, for apredetermined price or account value, a user can consume a finitequantity of encoded message material and receive a finite quantity ofencoded responses, until the purchased code sequences are deemedexhausted by the encryption server.

The message received by the encryption server may be handled in any ofseveral ways. In order to prevent intrusion into the encryption serverby hackers or other unauthorized parties, or by viruses, the message maybe initially stored in temporary memory such as RAM, and at leastpartially decrypted. The decrypted portion of the message may beprevented from executing any executable code. If the message decryptscorrectly, the message is verified. The message is then transmitted tothe destination and the temporary memory is erased after eachtransmission.

In one system, the message is posted into an e-mail box corresponding tothe first sequence. It will reside there until a caller seeks it. Inaddition, the server tracks or monitors the range of bits used to sendthe message. With this data available, the encryption server permitsaccess to this e-mail only by a calling computer loaded with the secondsequence, carrying matching bit content. Even the sending party cannotretrieve the message, since his first sequence has exhausted the sendingencryption bits.

The receiving party may retrieve the message by a series of stepsfollowing those used by the sender. As discussed previously, thereceiving party may utilize a computer for his communication with theencryption server. He may utilize the second sequence by loading thesecond sequence on the same computer, or the second sequence may belocated in a physically or electronically separate location. Forpurposes of description and not limitation, the second sequence will bedescribed as loaded on the receiving party's single computer. Theencryption server may maintain one or more communication links, asnecessary, in order to manage message delivery.

The receiver may call via his computer, loaded with the second sequenceand software, via a toll-free telephone number. The software will assistthe encryption server in determining that the second sequence isproperly configured to be the recipient, i.e., has the requisite codebits on the second sequence. The software also will assist theencryption server in determining a point for return communication, suchas a return telephone number, and cut off the call. Thereafter, theencryption server will call and prepare to transmit the message. Whenready, the encryption server will return a communication to therecipient computer using an alternate communication line or mode, suchas a WATS line. When communication is established, the encryption serverwill transmit the message. Further, the encryption server will accessthe receiver's second sequence and, by software, decrypt the message byconsuming code from the second sequence. The recipient's second sequencethen is debited for the exhausted bits. If the message has beenencrypted in additional levels, such as with a transaction key or withpublic and private keys, the recipient can further decrypt the messageas required, using those known systems. As the message is delivered, theencryption server deletes the content from the e-mail box or from itsown records.

In a second variation of handling the encrypted message, it is possiblethe recipient will not be in possession of the second sequence inadvance of when the sender transmits. This situation requires that theencryption server notify the recipient of the message by use ofinstructions provided by the sender. The encryption server than mustprovide a means for the recipient to obtain the matching secondsequence. Using known systems of multi-level encryption or reservedaddress areas in an encrypted message, the sender can provide theencryption server with information of how to communicate with therecipient. The encryption server can provide the second sequence in ane-mail box, and notify the recipient by telephone of the message'savailability to be picked-up. Because the encryption server communicatesseparately with the sender and receiver, an outside observer cannotreadily determine a correlation between such messages.

A further embodiment of this encryption system enables commerce to beconducted on a secure basis. Such commerce requires that a user pay forhis transaction and that a vendor or service provider (service provider)receive payment for the product or service that is provided. Themonitoring of consumed bits from a first sequence that is a one-time pador plurality of session keys may track consumption of monetary value inaddition to, or in substitution for, consumption of encryption capacity.The exhaustion of data bits or code from the user's first sequence maybe proportionate to the value of a transaction, and the encryptionserver serves as a bank clearinghouse, forwarding payment from a buyeraccount to a seller account.

The overall scheme for conducting transactions in commerce requires thata buyer or user establish an account with the encryption server. Anaccount is established by the purchase of the first sequence. As in thecase of electronic messaging, the user establishes his commercial orfinancial relationship with the encryption server. The transaction isconducted similarly to electronic messaging, in that the user sends amessage to the encryption server. The message may be encrypted. Theencryption server decrypts the message and acts upon an instructiondirected to the encryption server. The instruction may order theencryption server to locate a service or to contact a specific serviceprovider in order to obtain the service. The encryption server may thenact upon the instruction, contacting the selected service provider orfirst locating a suitable service provider and then passing along theservice request. The encryption server may encrypt communications withthe service provider, as well. The service provider then returns therequested data or service to the encryption server, encrypted or not.The encryption server forwards the data or service to the user inencrypted form. In such a transaction, the encryption server may receivepayment such as a commission, which is paid by exhaustion of code fromthe buyer's first sequence. Encryption may be paid for as well, bysimilar exhaustion of the first sequence. However, when the firstsequence is serving as money, the exhaustion of the first sequence maybe more practically tied to the value of the transaction, rather than tothe actual bits employed in encryption.

A product bought and sold may be of a type that can be electronicallytransmitted, such as information, which can be sent from serviceprovider to user through the encryption server by the encryption systemspreviously described. One such information product is service allowingaccess to Internet pages. The encryption server may respond to variousfirst sequences according to specific programming or codes that limitthe subject matter that can be accessed or retrieved by use of aspecific first sequence. For example, a business may provide Internetaccess to its employees by supplying its employees with first sequencesthat are coded to allow access only to business-related sites on theInternet, or any other categorical subject matter limitation, includinga choice of specific sites that are approved for access. By thislimitation, employee computer time can be ensured to be used forauthorized areas of investigation. Thus, the first sequence may provideboth subject matter control and access time control, in addition tomaintaining confidentiality of subject matter for the business. It isequally possible and useful to encode company computer software tooperate only with company-authorized first sequences, further preventingnon-business utilization of company time and equipment.

On the opposite side of vendor transactions, the use of such firstsequences and the associated accounts in a business environment providesa way for Internet service providers and operators of content sites tobe paid for use. The difficulties in obtaining payment for informationare widely known among Internet sites. Having little alternative, manyinformation providers have developed restricted access sites, to whichvisitors must subscribe by supplying a credit card account and using apassword. One common problem is that a vendor faces intrusion by hackersor pirates with stolen passwords or stolen credit card information, whoin turn steal site information. Another problem is that a vendordiscourages access by likely customers who are afraid to reveal creditinformation over the Internet. Still a third problem is that many usefuland worthy sites may find the problems associated with establishingaccounts to be simply too much trouble and forgo the prospect ofpayments. All of these problems may restrict development of Internetsites and discourage improvement of site content. These limitations areovercome by automating payment to substantially every site by use of anencryption server monitoring and debiting OTPs used by the users.

In at least one embodiment of the invention, the encryption server alsomay provide access to the Internet, relying upon first sequence usageand accounting to be paid for this service. This type of servicepresently is provided through an Internet Service Provider (“ISP”), whotypically serves a customer base of subscribers. ISPs are paid for theirservice, typically by billing each subscriber. Accordingly, ISPs know anidentity for each subscriber, enabling the ISP to bill the subscriber orhis credit card account. The encryption server differs from a typicalISP in that it need not know the identity of the sender. A firstsequence is prepaid at purchase, and the funds already are held by theencryption server. Thus, a sender using a first sequence can access theInternet without subscribing to an ISP, enabling a further degree ofprivacy.

Even a system of very small payments from first sequence accounts fortime on-line and time at each viewed site could result in substantialfinancial rewards to the site owners and operators. Those providingintermediate access, such as conventional intermediate Internet serviceproviders, may find the first sequence accounts a desirable way to becompensated for on-line time or data throughput. Site owners may becompensated based upon the number of viewer visits or “hits” over time.Sites with exceptionally valuable content may establish a higher accessrate, triggered by software when the user enters the site or preselectedhigh value portions of the site. It is also possible for a vendor oradvertiser to reverse the flow of first sequence account paymentcredits, by providing a payment to Internet users who are willing toview advertisements, or to the encryption server for providingadvertising to Internet users. Thus, Internet commerce paid by firstsequence account time offers a new method of operating the Internet,paying Internet service providers for time used and paying Internetcontent providers for content viewed.

Of course, other types of tangible products may be the subject of vendortransactions, but their transmission may require conventional carriers.The advantage to all parties, in any type of transaction, is that theproduct is paid in advance, at the time the first sequence is purchased,and the encryption server holds the funds. Therefore, the vendor doesnot face the risks of bad checks, bad credit, and hacker or pirateintrusion. In order to assure vendor performance, the encryption serveror a separate intermediary organization may hold the vendor payment andpay the vendor when the vendor has performed.

One of the most significant benefits in a vendor transaction is that thevendor reliably receives payment. The method of payment may be atransfer of tangible funds into conventional accounts at a financialinstitution. For this purpose, each vendor may inform the encryptionserver of his banking or other payment preferences. However, anotherform of payment is the generation of additional first sequences. Theencryption server may satisfy payment obligations for a transmission ofdata from a vendor to the buyer by creating first sequence for thevendor's account. The value of the first sequence is equivalent to moneyand may offer the vendor an alternate mode of being paid. For example,the encryption server may generate first sequences in software form andpost them to the vendor's e-mail box on the encryption server. Thevendor would have a choice of holding the pads, using the pads, sellingthem, trading them, converting or bartering them into other forms ofvalue, including into cash. Thus, the first sequences, themselves,become an alternate form of money.

The encryption server might be paid for its many services, includingthose as an encryption server, an ISP, a mail forwarder, and a banker.Payment may be by similar deduction from the first sequence accounts ofthe buyer user or vendor service provider. In commercial transactions,the user may be paid a percentage of the transaction fee as compensationfor both on-line processing service and banking services. The encryptionserver also may sell the first sequences to users at a premium cost overand above the utilization value of the first sequence content, just asmoney order sellers charge a small commission for each transaction.

However, the encryption server may benefit from the float of funds itholds for unused OTP code value. If the earnings from such float aresufficient, the encryption server may be able to provide its services atno cost premium. Alternatively, the float or interest may be credited tothe first user, and if the first user sells the first sequence,transmission charges could be deducted first from the float or interest.The encryption server may protect the funds received in exchange forfirst sequences from currency fluctuations by converting and maintainingthe funds in bi-media investments, as disclosed in U. S. Pat. No.4,910,676 to the present inventor, incorporated herein by reference.

FIG. 2 shows apparatus for conducting secure electronic commerce,embodying features of the present invention, including a portable datastorage device 25, a server 26 and a data processing device 27. Theportable data storage device 25, or first sequence disc, includes afirst sequence, an identifier associated with a first sequence,connection instructions and encryption instructions. The portable datastorage device 25 may be embodied in a computer floppy disc, a fixed CD,and read-write CD, a DVD, an EPROM, or any other form of electronicallyreadable portable data storage device presently known or hereafterdeveloped.

The server 26, or encryption server, has the second sequence ofencryption key material, an account associated with the first sequencewith a value parameter, instructions for encrypting and decrypting databy using the second sequence, instructions for providing a connection toa first user and instructions for adjusting the value parameter. Theinstructions on the server 26 include executable programs and data, suchas telephone numbers and handshake data. The server 26 generallyconnects to a network 27, such as the Internet.

The data processing device 27 receives the portable data storage device25 and executes the software instructions of the portable data storagedevice 25 to encrypt and decrypt data, and to communicate with theserver 26. The data processing device 27 may connect to the server by acable, a phone line, a wireless connection or any other electroniccommunications means.

First sequences stored on recordable discs or fixed content discs, i.e.,CDs, DVDs, and similar media, may be bought or sold, anonymously, atmany types of commercial vendors. Cash sales are fully allowable anddesirable. In order to facilitate the transfer of funds in largedenominations, first sequences may be bought or sold at banks, savingsand loans, stock brokerage houses, ATM vending machines, check cashingservices, and other financial institutions, including commercial outletsfor money orders. For convenience, first sequences in smallerdenominations might be sold at convenience stores and drive-throughoutlets.

The encryption server may provide first sequences for public purchase bymany methods. Media with a first sequence may be offered for salepre-loaded with necessary software and codes. These may be purchased forresale by vendors having secure locations. The encryption server mayprovide an activation or disc loading service for use in less secureenvironments. For example, media for first sequences may be carried onstore shelves in blank or inactivated form. At checkout, when the discis purchased, it may be inserted into an on-line computer linked to theencryption server. The disc then is supplied with code content, or anactivation code, or other necessary content to make ready the firstsequence for use. Correspondingly, the vendor can cause the encryptionserver to cancel and replace media with first sequences that are stolenor lost from vendor's inventory.

In greater detail, electronic commerce is enabled by the purchase, sale,and trading of first sequences in denominated values, such as fromseveral hundred to several thousand dollars, or other monetary units, asmay be selected by the buying party.

In order to preserve anonymity, a pre-valued, purchased disc can begiven an identifying number by the owner or user, who then informs andinstructs the encryption server of the selected number. The first use ofthe disc may be of a one-time-use code, or a non-recycled part of thecode to transmit an identification number to the encryption server. Theselected identification number provides a basis for monetary or valueaccounting for the remainder of the code on the disc as the remainder isused and exhausted. The degree of anonymity provided by this randomassignment method makes it increasingly difficult to identify the usereven by the encryption server or by a malfeasant employee.

The use of first sequences as a form of money is aided by a system ofregistration or identification of each first sequence disc. A user maymaintain an account of first sequence discs owned by each anonymoususer. The account may be established and accessed by assigning apersonal identification number (PIN) selected by the user. Similarly,the user may assign an identification number to each disc and recordthis number with the encryption server. These two types ofidentification enable the transfer of ownership of each first sequencefrom the user's account to a different account. The user can transfer adisc by reporting the transfer by serial number to the encryptionserver. In turn, the new owner of the disc can assign a newidentification number and register the disc with his own PIN controlledaccount with the encryption server. The first sequence discs assume thecharacteristics of securities or money orders whose transfer iscarefully overseen.

With the creation of accounts accessed by owner's PIN numbers, thereneed not be physical first sequences or identification numbers toidentify such a tangible object. The purchase of first sequences ofencryption key material can be conducted at public terminals, which maybe located at the facilities that might also sell a tangible disc, ifrequired. As with the purchase of a money order, an on-site vendor canacknowledge receipt of payment and forward such payment to theencryption server by electronic means. As the encryption server receivessuch on-line payment, the encryption server then can grant codesequences of corresponding value to the anonymous purchaser, such as bycommunication using the public terminal. Thus, the anonymous on-linepurchaser can establish an account with the encryption server bycreating and supplying a PIN, or the purchaser may indicate apre-existing PIN-controlled account in which the encryption server is tocredit or deposit the purchased code sequences.

The registration of the tangible first sequence discs and intangiblefirst sequences prevents theft or other loss. Even physical loss offirst sequence disc need not result in a loss of value, as theencryption server can cancel a lost first sequence and restore themonetary value of the lost disc to the user's account. Correspondingly,the encryption server is protected from loss of its own records of firstsequence consumption when recordable first sequence discs are used. Eachtime the user uses a recordable first sequence disc, the first sequenceprovides a fresh record of utilization, which should be equivalent tothe encryption server's records.

As a first sequence is used in commercial transactions between buyer andseller, the buyer's account with the encryption server is debited witheach purchase until the first sequence is exhausted. The seller maycreate an equivalent account that is credited with the value of eachpurchase made by the buyer. A seller, such as a service providermerchant dealing on the internet, may retain the same account numberwith subsequent buyers and may accumulate content credits for use as maybe desired.

The first and second sequences may contain code for generatingpublic/private keys for use in transactions between holders of the twosequences. As in the case of e-mail messages, the transactions may bebroken down into two stages. In one stage, the public key can be madeopenly available and transmitted without encryption, while the privatekey is maintained by the party using each pad. Buyers generate a newpublic-private key with each newly purchased pad, while sellers have theoption to use a single public-private key pair on a permanent basis,thus easing access to the seller's public key.

A buyer ordering a product, such as data, that can be transmittedelectronically can receive the product in encrypted form into a e-mailbox established with the encryption server, having an addresscorresponding to his public key. The buyer's anonymity is maintainedthroughout the transaction. Similarly, the vendor may maintainanonymity, as the encryption server may send payment merely to ananonymous e-mail box.

Throughout the description, the encryption server has been referred toas though a single entity or single computer. The encryption server mayinclude multiple entities and multiple computers. Various functions,such as purchasing or selling first sequences, performing ISP functions,paying vendors, and maintaining funds, may be handled by differentstaffs and different computers in different locations, includingdifferent state or national jurisdictions. Indeed, it may be desirableto provide a network of encryption servers in order to conductelectronic commerce in accordance with the differing laws of variousjurisdictions. The functions should, of course, be linked throughelectronic means in order to provide a reliable and secure means ofserving users and SPs throughout the world.

Although the present invention has been described with a certain degreeof particularity, it is understood that the present disclosure has beenmade by way of example and that changes in details of structure may bemade without departing from the spirit thereof.

1. A method for conducting private secure electronic commerce comprisingthe steps of: providing first and second sequences of encryption keymaterial wherein said first sequence is suited for decrypting a messagethat has been encrypted using said second sequence and the secondsequence is suited for decrypting a message that has been encryptedusing the first sequence, and the first sequence and second sequenceeach include an identical plurality of sequentially arranged sessionkeys; associating a value parameter with the first sequence; providingthe first sequence to an anonymous user in exchange for a payment;providing encrypted data communications to said anonymous user untilsaid value parameter is exhausted; wherein said step of providingencrypted data communications includes sub-steps (a)-(c) of: (a)providing user-initiated and user-terminated connection to the anonymoususer; (b) monitoring a connection time that is the time that theanonymous user is connected; and (c) requiring the anonymous user toutilize a new session key from the plurality of session keys of thefirst sequence after a predetermined connection time; and adjusting thevalue parameter in response to said step of providing encrypted datacommunications, including adjusting said value parameter in response toutilization of the session keys of the first sequence such that when theplurality of session keys is exhausted, the value parameter isexhausted.
 2. A method for conducting private secure electronic commercecomprising the steps of: providing first and second sequences ofencryption key material wherein said first sequence is suited fordecrypting a message that has been encrypted using said second sequenceand the second sequence is suited for decrypting a message that has beenencrypted using the first sequence, and the first sequence and secondsequence each include an identical plurality of sequentially arrangedsession keys; associating a value parameter with the first sequence;providing the first sequence to an anonymous user in exchange for apayment; providing encrypted data communications to said anonymous useruntil said value parameter is exhausted; wherein said step of providingencrypted data communications includes sub-steps (a)-(b) of: (a)recording a start time when said provided encrypted data communicationfirst occurs; and (b) requiring said anonymous user to utilize a newsession key from said plurality of session keys of said first sequenceat predetermined intervals after said start time; and adjusting thevalue parameter in response to said step of providing encrypted datacommunications, including adjusting said value parameter in response toutilization of the session keys of the first sequence such that when theplurality of session keys is exhausted, the value parameter isexhausted.
 3. A method for conducting private secure electronic commercecomprising the steps of: providing first and second sequences ofencryption key material wherein said first sequence is suited fordecrypting a message that has been encrypted using said second sequenceand the second sequence is suited for decrypting a message that has beenencrypted using the first sequence, and the first sequence and secondsequence each include an identical plurality of sequentially arrangedsession keys; associating a value parameter with the first sequence;providing the first sequence to an anonymous user in exchange for apayment; providing encrypted data communications to said anonymous useruntil said value parameter is exhausted; wherein said step of providingencrypted data communications includes sub-steps (a)-(b) of: (a)monitoring the number of bytes of said data communications; and (b)requiring said user to utilize a new session key from said plurality ofsession keys of said first sequence after a predetermined number ofbytes of communications; and adjusting the value parameter in responseto said step of providing encrypted data communications, includingadjusting said value parameter in response to utilization of the sessionkeys of the first sequence such that when the plurality of session keysis exhausted, the value parameter is exhausted.
 4. A method forconducting private secure electronic commerce comprising the steps of:providing a first server that is an Internet service provider; providingto an anonymous first user, in exchange for a payment, a first sequenceof encryption key material, an identifier associated with said firstsequence, connection instructions for connecting to said first server,and encryption instructions for encrypting and decrypting data using thefirst sequence; providing to the first server said identifier and asecond sequence of encryption key material suitable for decrypting datathat is encrypted with the first sequence and for encrypting data thatcan be decrypted with the first sequence; establishing a first useraccount accessible to the first server, wherein said first user accountincludes the identifier and a first user value parameter that isproportional to said payment; providing encrypted data communicationsbetween said first user and the first server, wherein said step ofproviding encrypted data communications includes the first server'sproviding anonymous Internet access to the first user; and adjustingsaid first user value parameter in response to said step of providingencrypted data communications, wherein said step of adjusting includesadjusting the first user value parameter in response to the firstserver's providing anonymous Internet access.
 5. The method as set forthin claim 4, further including the steps of: receiving a request for aservice from said first user; locating on the Internet a serviceprovider that will provide said service; establishing a service provideruser account accessible to said first server including a serviceprovider value parameter; procuring said service for said first userfrom said service provider; and adjusting said first user valueparameter and said service provider value parameter in response to saidstep of procuring.