Hacker News new | past | comments | ask | show | jobs | submit login

Excluding all the fiddly bits:

1. A user request comes with an added header with the user's version of events.

2. The provider adds their version of events and forwards it to an authenticator.

3. The authenticator cross checks the details and signatures and logs the transaction, optionally telling the provider "yes, this person is a paying participant".

I have a more detailed protocol writeup, which is easier to follow than the patent (which was lovingly converted to patentese by a lawyer). I'm at work, happy to email to interested parties. Best address to reach me is jacques@robojar.com




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: