This invention relates to a network for delivering data; and processes, systems and machines for transacting electronic commerce through the network. More specifically it relates to an electronic commerce application that uses peer-to-peer file sharing technologies for effecting the content management and data transfer through the network.
A network is a group of two or more computer systems linked together. Computer networks and their use in the transfer of data have been known for some time. The theoretical foundations for the internet were laid out in a memorandum by Paul Baran in August 1964 titled “On Distributed Communications: 1. Introduction to Distributed Communications Network.” That memorandum outlined three different network topologies or geometric arrangements of the network (centralized, decentralized and distributed).
To communicate efficiently, computers in a network use a common set of rules and signals (protocol). The protocol determines the type of error checking to be used; what data compression method, if any, will be used; how the sending device will indicate that it has finished sending a message; and how the receiving device will indicate that it has received a message. Programmers may choose from a variety of standard protocols. Existing electronic commerce systems typically use Internet Protocol (IP) usually combined with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP is analogous to a postal system in that it allows the addressing of a package and dropping it in the system without a direct link between the sender and the recipient. TCP/IP, on the other hand, establishes a connection between two hosts so that they can send messages back and forth for a period of time.
Computer networks can be typically classified as falling into one of two broad architectures; peer-to-peer or client/server architecture. Most networks used for electronic commerce have a client server architecture. A server is a computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files. Any user on the network can store files on the server. A print server is a computer that manages one or more printers, and a network server is a computer that manages network traffic. A database server is a computer system that processes database queries.
Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems, however, a single computer can execute several programs at once. A server in this case could refer to the program that is managing resources rather than the entire computer.
Electronic commerce as used in this specification refers to all aspects of business and market processes enabled by the Internet and World Wide Web technologies. Electronic commerce can be between two businesses (B2B) transmitting funds, goods, services and/or data, between a business and a customer (B2C) between two consumers (C2C) or any possible combination of the aforementioned entities. Typically a prior art electronic commerce system such as illustrated in
For example, a merchant may in some circumstances host the commerce server on its own network. In this model the consumer would connect to the internet using an Internet service provider (ISP), find the merchant web site and connect to the commerce server operated by the merchant. This model would require the merchant to be responsible for the considerable investment in and operation of the commerce server and related applications. It also requires the consumer to access one merchant's content at a time.
Another model involves the use of a separate entity (commerce service provider or CSP) to operate the commerce server. This would be done for a fee to the merchant and has the advantage of relieving the merchant from the operation of the commerce server. Typical CSP's would include companies, like eBay, and Buy.com. Although the cost to each merchant utilizing a CSP can be reduced, the operation of the commerce server is still expensive and requires the use of powerful but expensive software such as Oracle to power their sites. These companies have to purchase and maintain millions of dollars worth of centralized hardware and software to operate their businesses. In some cases the CSP's have to employ many people to support their product acquisition, customer service, product handling/shipping operations, and build or contract for call centers to provide customer service for order status, shipment status and/or product information. From the prior art it is apparent that existing electronic commerce servers operate in a client server environment requiring significant investment in equipment and service. Examples of these prior art systems are discussed below.
U.S. Pat. No. 6,490,567, (Gregory, Dec. 3, 2002) describes a method for conducting electronic commerce over a network by substantially separating transaction functionality from merchant content. Electronic commerce transaction functionality is provided by a commerce server having a commerce database. The commerce server stores merchant and purchaser profile data and merchant content summaries on the commerce database. The purchaser browses and searches for product and merchant information using the commerce server, and is provided with more detailed information stored at a separate merchant content server system. The purchaser selects products to purchase, and a purchase order is sent to the commerce server. The commerce server initiates the settlement of accounts between the merchant and purchaser, and initiates order fulfillment for the selected product. The separation of transaction functionality and merchant content onto separate servers under the control of a commerce service provider and a merchant, respectively, provides a more efficient and effective way of carrying out electronic commerce over a network.
U.S. Pat. No. 6,591,260 (Schwarzhoff, Jul. 8, 2003) discloses a method and computer system for conducting commercial transactions by the exchange of electronic documents. The computer system includes a transaction services network, which comprises a plurality of transaction servers for providing services to support commercial transactions. Trading partners operate servers which communicate with the transaction services network via the Internet. The electronic documents are exchanged between trading partners engaged in a transaction.
U.S. Pat. No. 6,594,692 (Reisman, Jul. 15, 2003) describes an electronic information transport component that can be incorporated in a wide range of electronic information products, for example magazine collections, to automate the mass distribution of updates, such as current issues, from a remote server to a wide user base having a diversity of computer stations. Advantages of economy, immediacy and ease of use are provided. Extensions of the invention permit automated electronic catalog shopping with order placement and, optionally, order confirmation. A server-based update distribution service is also provided. In addition, an offline web browser system, with hyperlink redirection capabilities, a novel recorded music product with automated update capabilities and an Internet charging mechanism are provided.
U.S. Pat. No. 6,629,079 (Spiegel, Sep. 30, 2003) discloses a computer system for conducting electronic commerce including multiple servers.
Peer-to-Peer (P2P) refers to a topology and architecture of computers in a system. Typically, the “Peers” are personal computers (PCs) used by consumers to do ordinary tasks such as word processing, e-mail, internet access, web browsing and the like. These computers in general do not have stable Internet Protocol addresses. A P2P network is one in which two or more PCs share files and access to devices without requiring a separate server computer or server software. One available protocol for establishing P2P networks is Gnutella. The Gnutella protocol is different from a pure P2P architecture in that clients become servers and servers become clients all at once. Basically, anyone can be a client or a server, no matter how big or fast they are. A P2P network utilizing a Gnutella protocol is in effect a distributed environment. A consumer's PC can act as a server to people who want the files on that PC, and acts as a client to access files on other people's PCs. A Gnutella network is made up of many PCs acting as both clients and servers sending files back and forth. All communication is done over the TCP/IP protocol. Each piece of information is called a “packet”, just like in Internet terms.
A query works in a similar fashion to connecting. Computer 51 transmits a search query 70 through the network. It is propagated by computer 52 through messages 71, 72, and 73. Each computer (e.g. 52, 53, 54 and 55) receiving the message searches the content of its memory or storage device (e.g. 60, 61, 62 and 63) to determine whether a file matching the parameters of the query exists within the content of the memory. If a file exists matching the parameters of the query (e.g. as in memory 63 associated with computer 55) the computer will send a search response message 75 to the computer 52 that sent the query to computer 55. The message will indicate that it has a file that matches the query in its memory 63 and relevant address information. Computer 52 then sends a search response 76 to computer 51.
For file sharing, each computer (52, 53, 54 and 55) acts as a miniature web server using HyperText Transfer Protocol (HTTP), the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. Since the HTTP protocol is well established, existing code libraries can be used. When a search response message 76 is received by computer 51, computer 51 will connect to computer 55 in the same way a web browser would connect to a web server. The file can then be downloaded.
A number of prior art systems have described the use of P2P networks for exchanging files in an electronic commerce setting.
U.S. Patent Application 20020062310 (Marmor, publ. May 23, 2002) discloses A peer-to-peer commerce system that relies on being able to identify the geographic location of the electronic devices, e.g., computers or palm pilots. Where the computer or device is stationary, this can be indicated by inserting a zip code, address or telephone number in the computer code identifying the device. Where the device is mobile, this can be indicated manually in a similar fashion. In addition, global positioning satellite (“GSP”) devices may be incorporated with the device to give geographic location automatically. Further, if the device is a cellular telephone device, the cellular device has location information in terms of identifying the cell in which the device is broadcasting. The peer-to-peer search is passed simultaneously over various branches of a binary tree to applications controlling databases for various businesses. Each business application checks the query against the information on its database and provides it to the requesting computer when available. This system utilizes P2P technology but only to direct consumers to a store where the product can be found.
U.S. Patent Application 20020128935 (White, publ. Sep. 12, 2002) discloses a system that allows for independent authors to upload digital documents (and/or any other binary image) to a searchable database, define the terms of sale and descriptive information, protect document end-use with digital rights management, and retain all intellectual property rights and control at all times. The system also offers both publishers and purchasers the ability to conduct business without the need for individual human contact or disclosure of purchaser or seller contact information.
U.S. Patent Application No. 20020138399 (Hayes, publ. Sep. 26, 2002) discloses a method and system provide an electronic platform that enables any participant in a trading network to trade with any other participant in the trading network according to its own individual trading rules. The system enables retailers, distributors and manufacturers to trade with each other on a peer-to-peer basis. The system includes a central repository connected to the trading network. The central repository does not typically participate directly in trading activities, rather, it supports network activities and maintains information about each of the nodes. Trading activities are conducted on a peer-to-peer basis between the nodes in the network, and nodes obtain information from the central repository when needed. Thus, business transacted between two partners is not known to any node (or the central repository) except the two individual partners themselves.
The advantages of this P2P network are that processing can be distributed (that is allowing users of the network to schedule batch-jobs that are processed by the computers on the network during their idle time thereby decreasing the need for new computing resources); and users are allowed to exchange data directly without storing files on a centralized server. This avoids the need to establish a centralized server and allowing two users to communicate with each other directly.
Java is an object-oriented language simplified to eliminate language features that cause common programming errors. Java source code files (files with a java extension) are compiled into a format called bytecode (files with a .class extension), which can then be executed by a Java interpreter. Compiled Java code can run on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VMs), exist for most operating systems, including UNIX, the Macintosh OS, and Windows. Bytecode can also be converted directly into machine language instructions by a just-in-time compiler (JIT).
Java is a general purpose programming language with a number of features that make the language well suited for use on the World Wide Web. Small Java applications are called Java applets and can be downloaded from a Web server and run on a computer by a Java-compatible Web browser, such as Netscape Navigator or Microsoft Internet Explorer.
To meet the demand for convenient shopping on the Internet, many on-line shopping sites emerged. Over time, however, only a few achieved early market leadership, such as Amazon.com, Buy.com and AOL. Despite their growing popularity, the business models employed by these companies have inherent inefficiencies that negatively impact their ability to achieve and maintain profitability.
One of the disadvantages of existing Internet Shopping is that it is time consuming and inefficient: Today, consumers must visit a number of different Manufacturer sites to gather comparative data on a particular type of product they want to purchase. It is frustrating and time consuming. As a result, consumers are driven the mega-product sites that offer a wide array of products from different manufacturers.
Another disadvantage of existing sites is that their business models are based on distribution-driven product acquisition, leading to significant stocking and handling costs and inefficiencies: Most Internet resellers are all distribution-driven business models. They purchase products from distributors (who have added their mark-up) and then add their own mark-up. Their business model creates significant product acquisition, stocking, handling and shipping costs for the company/site and restricts their ability to offer lower prices.
Another disadvantage of existing systems is the costs of inventory ownership: Most Internet resellers own and stock their inventory. As a result, they incur warehousing, handling, shipping and other capital costs. This negatively impacts an Internet reseller's ability to offer the best price/value, expand new product offerings, causes delayed or improper shipments, increases delivery time and generates dissatisfied customers.
The typical business model and technology architecture used by existing systems lead to high employee staffing cost: Internet resellers have high staffing levels in order to input product data, staff warehouses, provide order fulfillment and customer service.
Yet another disadvantage of existing systems is that there is no user friendly product comparison functionality: Even though some Internet resellers offer feature, value and price comparisons of the products they sell, most offer only a select range of products (i.e.—electronics or housewares or shoes but not all on the same site). As a result, Internet shoppers have to go to a number of different reseller sites to gather the comparison data they need to make an intelligent buying decision.
Another disadvantage is that there is no pricing and value validation: In most cases, there is little or no validation of product claims on Internet reseller sites, such as links to consumer Union product reports.
Yet another disadvantage of existing systems is that they have a limited supplier base: Internet resellers are limited to product offerings that are stocked by their distributors. On the other hand, eBay offers products listed by its customer. Once the customer sells the product, for example a used computer, eBay has to constantly advertise to attract new sellers since the majority of its users are selling used products and, generally, do not have a replacement to list on the site.
For example, U.S. Pat. No. 6,490,567 discloses a Distributed electronic commerce is conducted over a network by substantially separating transaction functionality from merchant content. Electronic commerce transaction functionality is provided by a commerce server having a commerce database. The commerce server stores merchant and purchaser profile data and merchant content summaries on the commerce database. The purchaser browses and searches for product and merchant information using the commerce server, and is provided with more detailed information stored at a separate merchant content server system. The purchaser selects products to purchase, and a purchase order is sent to the commerce server. The commerce server initiates the settlement of accounts between the merchant and purchaser, and initiates order fulfillment for the selected product. The separation of transaction functionality and merchant content onto separate servers under the control of a commerce service provider and a merchant, respectively, provides a more efficient and effective way of carrying out electronic commerce over a network. This system requires the service provider to store merchant and purchaser profile data and merchant content summaries on a commerce database. This requires significant capital expenses, and maintenance of the data.
The disadvantages of the prior art system are overcome by the use of a network wherein the computers in the network use Web Services and XML schemas to communicate content between computers in the network. Web Services describes a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone. XML is used to tag the data, SOAP is used to transfer the data, WSDL is used for describing the services available and UDDI is used for listing what services are available. Web services allow organizations to communicate data without intimate knowledge of each other's IT systems behind the firewall.
Unlike traditional client/server models, such as a Web server/Web page system, Web services do not provide the user with a graphical user interface (GUI). Web services instead share business logic, data and processes through a programmatic interface across a network. The applications interface, not the users. Developers can then add the Web service to a GUI (such as a Web page or an executable program) to offer specific functionality to users.
Web services allow different applications from different sources to communicate with each other without time-consuming custom coding, and because all communication is in XML, Web services are not tied to any one operating system or programming language. For example, Java can talk with Perl, Windows applications can talk with UNIX applications. Web services do not require the use of browsers or HTML. Web services are sometimes called application services.
More specifically, the disadvantages of prior art electronic commerce systems are overcome by the novel the distributed electronic commerce system using peer-to-peer technology of the present invention.
One of the advantages of the network and the electronic commerce application is that it operates as a network with a distributed topology. By removing the need to duplicate and store content of each content provider the service provider does not have to purchase and maintain large databases or complex web-base administration applications. This allows for a significant reduction in overhead costs.
These objects and advantages are achieved by a novel network that provides a first set of content provider computers each of which stores the content the content provider operating the computer. This first set of content provider computers are connected to a gateway and designated as key nodes. A gateway is a node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet. In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway. A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. Very little filtering of data is done through routers.
The gateway is accessed by a user computer that is searching for content. The gateway translates and routes the search request to the key nodes along with addresses of a second set of content provider computers that the key nodes should access to further conduct searches for additional content. The key nodes search their own content and forward the search request to the second set of content provider computers (designated as secondary nodes) as requested by the gateway. Results from the secondary nodes are forwarded to the primary nodes and reported back to the gateway with the results of the primary nodes. The results are consolidated and reported back to the user initiating the search. Thus each content provider is responsible for storing and duplicating their own content. The service provider need only maintain a list of content provider addresses. Again, this reduces the need for expensive resources.
This network can provide significant advantages in an electronic commerce application.
By using the gateway to effect a search, the consumer will see product information from all manufactures that make and offer products of the type desired by the consumer for sale direct to the consumer.
The gateway technology of the present invention effectively and efficiently separates two networks: Consumer and Manufacturer. The gateway technology also provides a mechanism for communication between each
By moving most of the client-side work to the consumer application, the company does not need extensive web and application servers. Also, does not need the human capital to maintain these servers
For the consumer the system of the present invention provides the advantage of being able to shop all manufacturers for a given product for free (access to all participating manufacturers). The consumer can filter results according to product features. Further the system enables manufacturers to sell directly to the consumer with the product being dropped shipped to the consumer's specified location.
For the manufacturer, the system of the present invention avoids the need for separate data for its enterprise systems and electronic commerce systems. The manufacturer can use existing product databases to synchronize with the system of the present invention. Additionally because the manufacturer is selling directly to the consumer the manufacturer has control over the sale price paid by consumer. Because transactions are processed using credit cards there is a reduction in receivable time and delinquent purchases. The system of the present invention provides the manufacturer with an alternative distribution channel at significantly reduced cost. It also provides the manufacturer with greater control over products and accessories available for sale.
By using P2P technology the system of the present invention reduces the strain of network bandwidth on the electronic commerce service provider and it may further reduce network use by exploiting affinities among manufacturers that permit efficient routing of queries for product information.
With these and other advantages and features of the invention that will become apparent form this specification, the nature of the invention may be more clearly understood by reference to the following detailed description of the invention, to the appended claims and to the drawings
a through 10f illustrate the dynamic creation of an electronic commerce network using the invention.
a through 11g illustrate the operation of the peer-to-peer electronic commerce system.
a through 12c illustrate the consumer to consumer feedback network of the present invention.
Each user computer on the network 81 is connected to the network through a gateway 95. This connection may be through various well known means, for example, modem connection through an internet service provider. Each of the first subset of content provider computers (91a, 91b, 91c, etc.) are also connected in a similar fashion to the gateway 95. Each of the first subset of content provider computers 91a, 91b, 91c etc., defines a key node in the network 81. These key nodes are considered the first tier of content provider nodes in the network. At least one of first set of content provider computers (e.g. 91a) is connected to a second set of content provider computers 92a, 92 b, 92c, etc. Each of the second subset of content provider computers 92a, 92b, 92c etc., defines a node in a second tier of the network 81. At least one other of the second subset of content provider computers (e.g. 91c) may be connected to a third set of content provider computers (93a, 93b, 93c, etc.). Each of the second subset of content provider computers 92a, 92b, 92c etc., defines a node in a second tier of the network 81. As will be apparent, the network 81 may include a plurality of tiers each including a plurality of nodes. Associated with the gateway 95 is an application 96. The application 96 works with the gateway 95 to determine what computers will be connected thereby defining the network. Associated with application 96 is a list of content providers that are allowed access to the network 81 their addresses and information about the architecture of network 81. The information about the architecture of the network 81 would be constantly changing as content providers and users access the network.
When a content provider wants to be connected to the network it will send a message to the gateway 95 requesting connection. The gateway application 96 will check the identification data of the content provider to determine whether it has authorization to connect to the network. The gateway application 96 will then assign a node in the network to the content provider based on the availability of connection by other nodes in the network and the efficiency of the available nodes. The gateway 95 will communicate to the new content provider what node it will be connected to, and the content provider will communicate back to the gateway of the availability of further connections to it. The gateway application 96 will maintain a list of the addresses, the node connections and the availability of further connections. The gateway application 96 will also measure the performance of each node and reassign node connections in a way that optimizes the network performance.
The network operates by cascading search requests though each tier of nodes. For example, if User 1 desires to obtain certain content XYZ, User 1 will connect to the gateway 95 and initiate a search for content XYZ. The gateway 95 maintains a list of addresses of content providers indexed by search criteria. Gateway 95 will then send a message to the first set of computers (91a, 91b, 91c, etc. requesting that each perform a search for XYZ in their contents and requesting that they forward a search request to the second set of content provider computers (92a, 92b, 92c, etc.) instructing those computers to conduct a search of their contents for XYZ. Each content provider computer that finds a match for XYZ returns a copy of the content to the content provider computer instructing the search. So, for example, if computer 92b finds content that complies with the XYZ search parameters, it will return the content to computer 91a. Each of the first set of computers 91a, 91b, 91c, etc. will return their results to the gateway along with any results received from the second set of content provider computers. The gateway 95 will then return the results to the User 1. At the option of the user (e.g. User 1) the gateway maintains the address of User 1 as associated with a search for XYZ. User 2 can then request from the gateway the address of any user that has conducted a search for XYZ and communicate directly with that user of through the gateway 95.
Illustrated in
The consumer application 105 provides the interface for consumer to connect to the Gateway 121 and search available manufacturers for any product through keyword or product detail drill down menus. If the consumer is unable to connect, the consumer application 105 retries to connect to the Gateway 121. It also provides the interface for retrieved Manufacturer search results, allowing a comparison based on selected features or details. The consumer application 105 also allows the consumer to invoke a buy transaction that occurs at the Gateway application 123. The consumer application 105 also provides interface and Gnutella protocol handling for consumer-to-consumer product information and feedback queries as described in detail below.
Consumer Interaction Process
The consumer first instructs the consumer application 105 to connect to the Gateway 121, illustrated in
The consumer selects an item by clicking “Search” (Consumer search select step 155) and the consumer application 105 sends an http/xml based request to the Gateway 121, illustrated as step 157. This request is processed by the gateway 121 as described below.
Upon completion of the search the gateway 121 sends the results in http/xml format to the consumer application 105 and the consumer application 105 receives search results in step 159. The next step 161 is to convert the search results to a graphical user interface form using xsl templates to display the search results into an organized presentation. The consumer may opt to view available product media such as advertisements and product manuals in step 162.
The consumer can filter search results according to selected product feature or details in step 163.
To initiate a purchase, the consumer clicks a “buy now” button in step 165 which sends product data through an https (encrypted) request to a transaction engine application. The transaction engine application is a program that validates consumer username/password, retrieves user account and credit card information. The transaction engine application uses a commercially available credit card processing service (e.g. Nova) API to effect transaction and a Shipping/fulfillment/Tracking API (e.g. Fed-Ex) to schedule shipping. An API is a set of routines, protocols and tools for building software applications. Most operating environments provide an API so that programmers can write applications consistent with the operating environment. The transaction engine will send the details of the transaction to the credit card processing service server (124 in
The manufacturer application 109 provides an interface for manual product data entry; and in addition, provides a translation interface that will allow a manufacturer to point to their existing product databases to retrieve the required product detail information. The manufacturer application 109 will save product detail information in a file to be searched later by the Gateway 121 Gnutella based search request initiated by the consumer application 105. The manufacturer application 109 will also provide Gnutella protocol handling to allow for searches initiated by the consumer application 105 through the Gateway 121. Each search request will instruct the key manufacturer node to search the contents of its product detail files and forward the search to other secondary Manufacturer nodes. The manufacturer application 113 will initially communicate with the Gateway 121 for network connection parameters. Once received, the manufacturer application 113 will constantly update the Gateway 121 on its connection status and the status of local nodes (nodes connected directly to the manufacturer application 113).
The manufacturer application 113 will search and retrieve data about three subjects: (1) manufacturer identification (Manufacturer ID); (2) manufacturer product data; and (3) manufacturer financial transaction data (i.e. where is the money sent). This in effect creates a manufacturer network by linking the nodes searches of manufacturers of the same Item Tag to make the search of the manufacturer network faster and more efficient.
Manufacturer application 109 then receives connect parameters (names and addresses of available nodes) in step 202. The manufacturer application then attempts those connections with other manufacturer computers in step 203.
Manufacturer application 109 determines the success or failure of connection attempts in step 204. If the connection fails, then the manufacturer application 109 re-requests connection parameters from gateway in step 205. Upon successful connection the manufacturer application 109 reports the success to the Gateway 121. The node connected to also sends a status update to the gateway.
The Gateway 121 has built the network and receives constant updates about its speed and stability; therefore, when translating a consumer search request into a Gnutella request, the Gateway 121 can set the Time To Live (Time to Live is a field in the Internet Protocol (IP) that specifies how many more hops a packet can travel before being discarded or returned) for each Key Node. In this way, all available manufacturers are searched.
When a Manufacturer application 109 associated with a node requests entry into the network, the Gateway 121 will analyze the encrypted key assigned to each manufacturer application 109 to validate that the manufacturer application 109 is a valid and qualified application. Each appropriate gateway application 109 will execute the search instructed by the consumer and return the results to the Gateway 121.
The search results 262 (for example the result from node 107 E) are returned back to the Gateway 121 in Gnutella format. The gateway application 123 translates the results into an http/xml format 263 which is sent back to the originating consumer application 103.
a through 10f illustrate the way the network architecture is created for the electronic commerce system 101. The Figures illustrates a network having for example a Gateway, and nodes A-E. For each node there will be a manufacturer computer 107, a manufacturer application 109 and manufacturer product data 252 (as shown in
In
If the ID is valid, the Gateway 121 searches an architecture database at the Gateway 121 for available nodes as illustrated in
Using Java and SQL (structured query language, a standardized query language for requesting information from a database) to search in an architecture database table for nodes with available connections and analyzes for optimal connection. In this example the Gateway determines that nodes C, D, and E are available.
The Gateway 121 sends connection parameters (who to connect to) back to the manufacturer application (109a) using S-http protocol indicating that nodes C, D, and E are available (see
The node A manufacturer application 109a attempts to connect connection to the assigned manufacturer nodes C, D, and E and reports success/failure using http back to the Gateway 121 which logs the information in its architecture database. All pending and confirmed connections are stored so that the Gateway 121 always knows the architecture of the manufacturer network (in this example consisting of the Gateway 121 and nodes A, E and D).
a through 11f illustrate how the network handles a search request from a consumer.
In
Nodes A and D receive Gnutella based search request from Gateway 121 and in the case of node A, passes it on to node E or other manufacturer applications 109. The manufacturer applications 109a and 109d in node A and B respectively search their associated product data 252a and 252d. If a match is found the results are sent back to gateway 121 with the appropriate search request id (See
As shown in
To purchase a product, the consumer will click the buy button associated with the product information received from the search. The consumer application will send an S-http request to the gateway 121 including username/passwords authentication parameters and the relevant product and manufacturer details of the product selected (See
The gateway 121 then processes transaction and sends confirmation back to consumer application for logging through http. Once the buy request is received and validated, the transaction engine logs the details to an internal database, and the details are sent to the relevant consumer and manufacturer application
Consumer-To-Consumer Direct Communication
One of the advantages of the electronic commerce system 101 of the present invention is that it allows consumers to solicit and give feedback on products and services obtained from other consumers. Consumers can solicit any feedback logged by other consumers by sending a search request (Gnutella protocol) across the consumer network using standard Time-To-Live parameters.
a through 13c illustrate the methodology for this type of consumer to consumer direct communication. In
Consumer A then connects to the available nodes and solicits or gives feedback on products and services.
Consider a network with 2,000 manufacturers and the load on the electronic service provider resources should it try to connect to each manufacturer each time a customer request for a product comes in.
The most common way to handle a search is to assemble and index the data beforehand. This is, of course, the answer chosen by search engines as well as by many e-commerce portals. But the solution requires significant server resources, plus the expenditure of computational and networking effort in constant spidering and re-indexing (which also means that changes at the manufacturer end-points are not always immediately reflected in the central search engine). It is not a lightweight solution. Incidentally, indexing would eliminate none of the burden of finding a standard format and harmonizing data. Either the manufacturing end-points or the central server must do this. (Generic Internet search engines make the user do most of it).
The present invention rejects the indexing approach for something simpler and more direct. If it used traditional client/server computing to search 2,000 manufacturers, but without a central index to eliminate unlikely candidates, it would have to send 2,000 requests and handle the responses—and quickly. The networking and computational resources required would be formidable. However, utilizing P2P technology the electronic commerce service provider gateway sends requests only to a small number of sites. These return results (if any that match the customer's request are found), and pass on the identical requests to another set of sites. Each request hops from site to site until it has reached every node (or every relevant node, as will be described momentarily). The electronic commerce service provider Gateway has to handle responses only from sites that have positive results to report.
Efficiency may be further improved by chaining together sites that offer similar products; all consumer device manufacturers, for instance, could be on the same chain, and all automobile dealers on another. The electronic commerce service provider may examine the Schema of each product introduced into the system, and statically assigning the manufacturer a place in the networking chains (that is, making a fixed decision about which manufacturers are chained together). This form of classification has to be done just once for each new product, or perhaps be repeated occasionally to balance an unbalanced network. It is a much more efficient process than continuously searching the Web to feed pages to a web engine and re-indexing the whole network, as traditional search engines do.
From the foregoing it will be appreciated that, although specific embodiments of the invention have been described in this detailed description for the purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention.
For example The Gnutella protocol is one of many available protocols for effecting peer-to-peer communications. Similarly, http and S-http protocols are standard today but more advanced protocols may be developed and employed in the future in accordance to the teachings of this invention.