1. A user request comes with an added header with the user's version of events.
2. The provider adds their version of events and forwards it to an authenticator.
3. The authenticator cross checks the details and signatures and logs the transaction, optionally telling the provider "yes, this person is a paying participant".
I have a more detailed protocol writeup, which is easier to follow than the patent (which was lovingly converted to patentese by a lawyer). I'm at work, happy to email to interested parties. Best address to reach me is jacques@robojar.com
1. A user request comes with an added header with the user's version of events.
2. The provider adds their version of events and forwards it to an authenticator.
3. The authenticator cross checks the details and signatures and logs the transaction, optionally telling the provider "yes, this person is a paying participant".
I have a more detailed protocol writeup, which is easier to follow than the patent (which was lovingly converted to patentese by a lawyer). I'm at work, happy to email to interested parties. Best address to reach me is jacques@robojar.com