--- a/latest/use-cases/index.html Tue Mar 31 22:45:24 2015 -0500
+++ b/latest/use-cases/index.html Wed Apr 01 00:21:59 2015 -0400
@@ -221,21 +221,21 @@
</p>
<ul>
- <li>
+ <li>
Section 2 defines basic payment terms.
</li>
- <li>
+ <li>
Section 3 describes a common payment flow at a high
level. The group expects to work on additional
payment flows in future work.
</li>
- <li>
+ <li>
Section 4 is a specific narrative, labeled according
to the steps of section 3. Section 7 describes
additional familiar narratives to give a more complete picture
of how the payment phases apply.
</li>
- <li>
+ <li>
Section 6 lists the use cases - short scenarios that cover
diverse aspects of each payment step.
</li>
@@ -245,15 +245,15 @@
Each use case has:
</p>
<ul>
- <li>
+ <li>
A title and short description.
</li>
- <li>
+ <li>
Goals. How the use case advances one or more of the
<a href="https://www.w3.org/Payments/IG/wiki/ExecSummary#Goals">goals
for an interoperable Web payments framework</a>.
</li>
- <li>
+ <li>
Motivation. This is commentary to help explain why the use
case has been included, including how it relates to similar use cases.
</li>
@@ -264,16 +264,16 @@
</p>
<ul>
- <li>
+ <li>
Security/Privacy. Security or privacy issues that may arise through this use
case.
</li>
- <li>
+ <li>
Exceptions. Considerations in the case of specific exceptions (e.g., if a
user pays with a voucher and the <a>transaction</a> fails, the user's voucher
should be restored).
</li>
- <li>
+ <li>
Accessibility. Accessibility considerations (e.g., in multi-factor
authentication, management of biometrics in the case of users with some
disabilities).
@@ -402,18 +402,18 @@
</p>
<ol>
- <li>
+ <li>
Negotiation of Payment Terms
- </li>
- <li>
+ </li>
+ <li>
Negotiation of Payment Instruments
- </li>
- <li>
+ </li>
+ <li>
Payment Processing
- </li>
- <li>
+ </li>
+ <li>
Delivery of Product/Receipt and Reversals
- </li>
+ </li>
</ol>
<p>The descriptions below only discuss the interactions between the
@@ -458,12 +458,12 @@
</p>
<ul>
- <li>
+ <li>
<strong>Discovery of Offer</strong>. The <a>payer</a> discovers the
<a title="payee">payee's</a> offer (e.g., by browsing a Web page or
from a native application).
</li>
- <li>
+ <li>
<strong>Agreement on Terms</strong>. The <a>payer</a> and the
<a>payee</a> agree to what will be purchased, for how much,
in what currency, which <a title="payment scheme">payment schemes</a>
@@ -471,7 +471,7 @@
<a>payer</a> to authenticate themselves. The <a>payee</a> may generate an
invoice for the <a>payer</a>.
</li>
- <li>
+ <li>
<strong>Application of Marketing Elements</strong>. The <a>payer</a>
discovers and applies any loyalty programs, coupons, and other special offers
to the payment terms.
@@ -487,18 +487,18 @@
</p>
<ul>
- <li>
+ <li>
<strong>Discovery of Accepted Schemes</strong>. The <a>payer</a>
discovers the <a title="payment instrument">payment instruments</a> that
are accepted by the <a>payee</a>.
</li>
- <li>
+ <li>
<strong>Selection of Payment Instruments</strong>. The <a>payee</a>
selects one or more <a title="payment instrument">payment instruments</a>
that are available to the <a>payer</a> and are accepted by the
<a>payee</a>.
</li>
- <li>
+ <li>
<strong>Authentication to Access Instruments</strong>. The
<a title="payer">payer's</a> access to the <a>payment instrument</a>
is authenticated. The <a>payer</a> consents to pay. Note: This authentication
@@ -517,22 +517,22 @@
may be verified immediately or only after several days.
</p>
<ul>
- <li>
+ <li>
<strong>Initiation of Processing</strong>. Depending on the
<a>payment instrument</a>, the <a>payer</a> (e.g., when using
PayPal or Yandex Money), the <a>payee</a> (e.g., when using a credit card), or other
party (e.g., bank) initiates processing.
</li>
- <li>
+ <li>
<strong>Verification of Available Funds</strong>. The <a>payee</a> may
need to provide a proof of funds or a proof of hold to the <a>payer</a>
before finalizing payment and delivery of the product.
</li>
- <li>
+ <li>
<strong>Authorization of Transfer</strong>. The <a>payee</a> receives
proof that the transfer of funds has been authorized.
</li>
- <li>
+ <li>
<strong>Completion of Transfer</strong>. The <a>payment scheme</a>
determines the details of payment clearing and settlement. Transfer times
may vary from near-realtime to multiple days. The <a>payee</a>,
@@ -550,19 +550,19 @@
</p>
<ul>
- <li>
+ <li>
<strong>Delivery of Product</strong>. The <a>payer</a> receives goods or
services immediately, at a later date, automatically on a recurring basis,
etc. depending on the terms of the <a>purchase</a>. A digital proof of
payment may be required to access the product.
</li>
- <li>
+ <li>
<strong>Delivery of Receipt</strong>. Depending on the
<a title="payment scheme">payment scheme(s)</a> chosen, there are
various ways and times that a receipt may be delivered (e.g., credit card
receipt, digital proof of <a>purchase</a>, encrypted line-item receipt, etc.).
</li>
- <li>
+ <li>
<strong>Reversals</strong>. At time exceptions may occur (e.g., defective
product, application of store return policy, etc.). In this case, the <a>payee</a> initiates payment to the <a>payer</a>. The payment reversal may take different forms, including a refund to the <a>payer's</a> payment instrument, a refund using a different payment scheme, or store credit.
</li>
@@ -596,8 +596,8 @@
<section>
<h3>Negotiation of <a>purchase</a> Terms</h3>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Offer</strong>: Jill begins her <a>purchase</a> at
home on her laptop, where she browses the items on the PayToParty Web
site. On the way to work the next morning, she explores the catalog
@@ -607,93 +607,93 @@
PayToParty store near her office. She spots a few more items that
she thinks she'd like to <a>purchase</a>, but decides to wait until later to
make the <a>purchase</a>.
- </li>
+ </li>
- <li>
+ <li>
<strong>Agreement on Terms</strong>: That same evening at home,
Jill logs into her account on the PayToParty Web site, adding her
preferred items to her shopping cart. The total price appears on the
page.
- </li>
+ </li>
- <li>
+ <li>
<strong>Application of Marketing Elements</strong>: As Jill prepares to
check out, PayToParty offers her a discount of 10% if she uses the store's
loyalty card to pay.
- </li>
-</ul>
+ </li>
+ <ul>
</section>
<section>
<h3>Negotiation of Payment Instruments</h3>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Accepted Schemes</strong>: Given where Jill lives,
PayToParty offers her payment by credit card, debit card, the PayToParty
loyalty card, and PayPal, but not Jill's favorite cryptocurrency (which she
uses on other sites).
- </li>
+ </li>
- <li>
+ <li>
<strong>Selection of Payment Instruments</strong>: Jill pushes the "Pay Now to Party!" button and is presented with a number of options to pay, including her
credit card, her PayToParty loyalty card (which is highlighted to remind her
of the discount), and a PayPal account. There is also a gift card from
PayToParty that she received for her birthday, but she chooses not to
use it for this <a>purchase</a>.
- </li>
+ </li>
- <li>
+ <li>
<strong>Authentication to Access Instruments</strong>: Jill selects
the PayToParty loyalty card, which she enabled with theft-protection,
and is asked to input a code that is sent to her phone before the
<a>purchase</a> can be completed.
- </li>
-</ul>
+ </li>
+ <ul>
</section>
<section>
<h3>Payment Processing</h3>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Initiation of Processing</strong>. PayToParty receives a
message from Jill's device authorizing the payment. PayToParty
submits the message to their <a>payment processor</a>, requesting a
proof of hold for the funds.
</li>
- <li>
+ <li>
<strong>Verification of Available Funds</strong>. PayToParty
receives a proof of hold on Jill's funds for the <a>purchase</a> price of
the goods. The PayToParty night-shift employees begin packing her purchased
items for delivery the next day.
</li>
- <li>
+ <li>
<strong>Authorization of Transfer</strong>. Once Jill's package is ready to
go, PayToParty exchanges the proof of hold for a proof of payment by
re-submitting the request to the payment network. They receive a proof of
payment from the <a>payment processor</a>.
</li>
- <li>
+ <li>
<strong>Completion of Transfer</strong>. Since Jill's PayToParty loyalty card
operates as a credit card, the PayToParty site is immediately credited with
the <a>purchase</a> amount and the funds will be swept into their bank account
at the end of the week.
</li>
-</ul>
+ <ul>
</section>
<section>
<h3>Delivery of Product/Receipt and Reversals</h3>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Delivery of Receipt</strong>. Jill's cloud-based wallet
receives a detailed line-item digital receipt for the <a>purchase</a>.
- </li>
+ </li>
- <li>
+ <li>
<strong>Delivery of Product</strong>. Jill's package goes out by courier the
next morning and is on her doorstep before she leaves for work.
- </li>
-</ul>
+ </li>
+ <ul>
</section>
</section>
@@ -707,7 +707,7 @@
</p>
<ul>
- <li>
+ <li>
<strong>Connectivity</strong>. Connectivity requirements vary according to
use case. The types of connections a device may utilize include Internet
connectivity, proxied connections through short-range radio transmissions,
@@ -715,24 +715,24 @@
(NFC) or Bluetooth Low Energy (BTLE). Some use cases assume no
connectivity (e.g., user is temporarily unable to connect to a mobile phone
network or a WiFi hotspot).
- </li>
- <li>
+ </li>
+ <li>
<strong>Registered Payment Instruments</strong>. In order for the
<a>payer</a> to select and utilize
<a title="payment instrument">payment instruments</a>, they must be
registered in some way and discoverable by a browser, native application,
or other software.
- </li>
- <li>
+ </li>
+ <li>
<strong>Security</strong>. Keys, encryption, and other security technology
must be used to secure sensitive information. It is important that sensitive
information is not transmitted to parties that do not absolutely need to
know the information in order to complete the <a>transaction</a>.</li>
- <li>
+ <li>
<strong>Identity</strong>. There will be a consistent, interoperable
identifier used to identify the participants and accounts in a Web Payments
transaction.
- </li>
+ </li>
</ul>
</section>
@@ -975,7 +975,7 @@
</dd>
<dt>Motivation</dt>
<dd>
-There is a fairly large trial-ware industry that could benefit from
+There is a fairly large trial-ware industry that could benefit from
a simple way of executing a payment without requiring redirection
to another site to enter account and payment details.
</dd>
@@ -984,8 +984,8 @@
<dl class="dl-horizontal">
<dt>In-vehicle</dt>
<dd>
-Jeff listens to a lot of music on the way to work. The music station serves a digital offer along with the music stream. This enables Jeff to
-easily buy music that he really likes.
+Jeff listens to a lot of music on the way to work. The music station serves a digital offer along with the music stream. This enables Jeff to
+easily buy music that he really likes.
</dd>
<dt>Goals</dt>
<dd>
@@ -1023,18 +1023,18 @@
<a>entity</a>'s background, or verifiable statement by an entity about
another entity) in order to be cleared to make a purchase:
<ul>
- <li>
-PharmCo will only sell regulated drugs to someone with proof
+ <li>
+PharmCo will only sell regulated drugs to someone with proof
of an active pharmacist's license.
</li>
- <li>
+ <li>
WineCo will only sell wine to someone with proof of being over the age of 21.
</li>
- <li>
+ <li>
BoomCo will only ship industrial explosives to a business that can
provide evidence of construction permits, a contractor's license, and an explosives handling license.
</li>
- <li>
+ <li>
HomeLoanCo will not finalize a quote for a home mortgage without
a credit score report and an audited finances report.
</li>
@@ -1124,7 +1124,7 @@
</dd>
<dt>Motivation</dt>
<dd>It should be clear to a
-<a title="payer">payer</a> whether a
+<a title="payer">payer</a> whether a
<a>purchase</a> is one-time or recurring, prior to initiation of
the payment.
</dd>
@@ -1245,8 +1245,8 @@
<dl class="dl-horizontal">
<dt>Store Credit</dt>
<dd>
-When Rick arrives as the self-checkout kiosk,
-he scans five dress shirts and two new pair of slacks.
+When Rick arrives as the self-checkout kiosk,
+he scans five dress shirts and two new pair of slacks.
The kiosk mentions that Rick could save 15% off of his <a>purchase</a>
if he makes the <a>purchase</a> using store credit. He accepts the offer and
a new store credit card is placed in his payment application on his mobile
@@ -1321,7 +1321,7 @@
<dt>Motivation</dt>
<dd>
The same mechanism used to support existing
-<a title="payment scheme">payment schemes</a> should also
+<a title="payment scheme">payment schemes</a> should also
support emerging <a title="payment scheme">payment schemes</a>.
</dd>
</dl>
@@ -1357,7 +1357,7 @@
</dd>
<dt>Privacy / Security</dt>
<dd>
-Discovery of digital wallets must be done in such a way as to ensure
+Discovery of digital wallets must be done in such a way as to ensure
privacy protection.
</dd>
</dl>
@@ -1366,26 +1366,26 @@
<dt>Manual Selection</dt>
<dd>In many cases, the <a>payer</a> will select a payment instrument manually:
<ul>
- <li>
+ <li>
Marie has credit cards from three different institutions:
one for work (from BankA), one personal card (from BankB), and one retail card
(from PayCo). She wants to choose the right one depending on the context of her
purchase.
</li>
- <li>
+ <li>
Claire has one debit card and multiple credit cards from the same bank.
</li>
- <li>
+ <li>
Veronique wants to use a cryptocurrency in some cases (e.g.,
peer-to-peer payments).
</li>
- <li>
+ <li>
Seth participates in a loyalty program with his local grocery store and
can apply a variety of digital coupons when he visits the store.
<span class="issue">Is a loyalty card a payment instrument, or a credential?
</span>
</li>
- <li>
+ <li>
David wants to be able to manually arrange available
<a title="payment instrument">payment instruments</a> when they are presented
to him. <span class="issue">Why does this need to be standardized?
@@ -1415,22 +1415,22 @@
<dd>When a <a title="payer">payer's</a> personal preferences are known, it becomes possible to make selections for them automatically.
<ul>
- <li>
+ <li>
Jonny's payment software on his smart watch chooses the payment instrument that
will provide him with the biggest cost savings for each <a>purchase</a> he makes
throughout the week.
</li>
- <li>
+ <li>
PayCo wants Elizabeth to know that if she pays with the debit card preferred
by PayCo (because of a lower <a>transaction</a> fee for PayCo), she will benefit from a discount.
</li>
- <li>
+ <li>
Whenever Mary shops at BigFreshGrocery she uses the same credit card.
She wants payment to happen automatically with that card when she puts her
phone near the checkout terminal as well as when purchasing groceries online
from BigFreshGrocery.
</li>
- <li>
+ <li>
Lalana does not like to scroll. She wants the instruments she uses most often to appear at top of the displayed list of available payment instruments.
</li>
</ul>
@@ -1454,11 +1454,11 @@
<dt>Payer Privacy</dt>
<dd>We anticipate a range of privacy scenarios:
<ul>
- <li>
+ <li>
Lucio sends information about instruments he is willing to use to
TrustedMerchant, who provides a discount for access to his information.
</li>
- <li>
+ <li>
Carla does not want to share information about the
<a title="payment instrument">payment instruments</a> she uses with any
merchants, so that information is not shared with any online merchants.
@@ -1499,20 +1499,20 @@
<dt>Multi-Factor</dt>
<dd>We anticipate a range of authentication scenarios, leveraging a wide variety of approaches and device capabilities:
<ul>
- <li>
+ <li>
When Ian selects his debit card, he is prompted for a PIN.
</li>
- <li>
+ <li>
Wes has configured his debit card to require a fingerprint scan from his
mobile device and a Universal Two Factor (U2F) device to be used when
performing a <a>purchase</a> over $1,000.
</li>
- <li>
+ <li>
Frederic taps his phone at the grocery store to pay, and BankA sends him a
one-time password (OTP) on his mobile phone that he enters in a keypad at
the checkout counter.
</li>
- <li>
+ <li>
Nadia's bank asks her to use her two-factor authentication device and at
least one of their in-branch retinal scanners or palm-vein readers
before she is allowed to withdraw $25,000.
@@ -1530,7 +1530,7 @@
and rapid, widespread adoption.
</dd>
<dt>Motivation</dt>
- <dd>The payments architecture should support
+ <dd>The payments architecture should support
the authentication devices available today for
multi-factor authentication, as well as those of the future.
</dd>
@@ -1554,7 +1554,7 @@
<dt>Motivation</dt>
<dd>
Easing compliance with Know Your Customer (KYC) and
-Anti-Money Laundering (AML) regulations
+Anti-Money Laundering (AML) regulations
will ensure safer and faster <a title="payment scheme">payment schemes</a>.
</dd>
<dt>Exceptions</dt>
@@ -1572,15 +1572,15 @@
In current online and offline payment <a>transaction</a>s, biometric
authentication can be used instead of password-based authentication:
<ul>
- <li>
+ <li>
John registers his fingerprint with his payment provider so that he can
just use a fingerprint to pay for low-value items.
</li>
- <li>
+ <li>
Sarah registers her voiceprint and face with her payment provider for use
in <a>transaction</a>s greater than $1,000.
</li>
- <li>
+ <li>
Rico buys a $5,000 car for his daughter through an online dealership. His
<a>payment processor</a> requires a password plus two forms of biometric
identification. Rico doesn't have hands, so he uses a face and iris scan to
@@ -1609,16 +1609,16 @@
<dt>Security / Privacy</dt>
<dd>
<ul>
- <li>
+ <li>
An individual's privacy should be protected when performing any sort of
biometric authentication.
</li>
- <li>
+ <li>
Important data, such as the fingerprint template and private key, and
sensitive code should be stored and executed in a Trusted Execution
Environment (TEE).
</li>
- <li>
+ <li>
The fingerprint authentication protocol, which is capable of transmitting a
proof of fingerprint authentication credential, should not contain any
personal fingerprint data.
@@ -1662,12 +1662,12 @@
<dt>Payee-initiated</dt>
<dd>Some payments are initiated by the payee:
<ul>
- <li>
+ <li>
Richard choses to pay using a credit card at FlowerFriends. FlowerFriends
initiates payment processing using their <a>payment processor</a> to contact the
acquiring bank that handles credit card payments for FlowerFriends.
</li>
- <li>
+ <li>
Pitir has authorized RentSeekers to pull money out of his bank account on a
monthly basis in order to pay his rent. RentSeekers initiates a payment using
the ACH network to pull money from Pitir's bank account.
@@ -1702,13 +1702,13 @@
<dt>Payer-initiated</dt>
<dd>Some payments are initiated by the payer:
<ul>
- <li>
+ <li>
Once Sally has signed into PayPal to pay, PayPal initiates payment processing.
</li>
- <li>
+ <li>
Joakim uses his Bitcoin wallet to send money to his friend.
</li>
- <li>
+ <li>
Carson (in New York City) sends money to Vladamir (in Moscow) using
his Ripple client, which converts the currency from US Dollars to Rubels in
transit.
@@ -1792,17 +1792,17 @@
<dt>Proofs</dt>
<dd>Goods and services may be released at different times depending on the type of <a>transaction</a> being performed:
<ul>
- <li>
+ <li>
Zhang Wei orders 10 large boxes of envelopes from an online shop in
Tianjin. He uses an escrow service to provide a proof of escrow to the
online shop in order to get them to initiate the shipment.
</li>
- <li>
+ <li>
To protect Tibor's privacy when he <a title="purchase">purchases</a> candy
online, the store asks only for Tibor's verified shipping address and a
proof of payment to send him the chocolates.
</li>
- <li>
+ <li>
RockinRadio, SmoothSounds, and classicallyClassic are independent, specialized
music streaming services. They accept proof of <a>purchase</a> from each other
to provide a track that is in their online streaming catalogue even if it was
@@ -1847,20 +1847,20 @@
<dd>When a <a>transaction</a> occurs, the time it takes to transmit and receive
funds often vary according to the <a>payment scheme</a>:
<ul>
- <li>
+ <li>
Sophie uses a credit card to buy some gifts for her parents. The shop has
access to the funds in three days.
</li>
- <li>
+ <li>
Frank uses an electronic cheque to pay his rent. The rental agency has access
to the funds in 7 days.
</li>
- <li>
+ <li>
Felicity has chosen Bitcoin to pay for glasses online. The store
that sells the glasses has almost guaranteed access to the funds within
15 minutes.
</li>
- <li>
+ <li>
Vanessa uses Ripple to <a>purchase</a> a new work outfit in US Dollars.
Funds in Euros are available to OnlineWorkClothes within a few minutes.
</li>
@@ -1944,7 +1944,7 @@
<dd>
When Lilith buys music from a band at MusicBox and then goes to their
Web site to download additional content, no account is required, just a
-proof of <a>purchase</a> that is sent to the band's website, after which
+proof of <a>purchase</a> that is sent to the band's website, after which
MusicBox provides Lilith a link to download the additional content.
</dd>
<dt>Goals</dt>
@@ -2039,20 +2039,20 @@
At times, it becomes necessary to refund a <a title="payer">payer's</a>
payment:
<ul>
- <li>
+ <li>
Pele buys a slice of pizza with a credit card at a local restaurant
and is accidentally charged for five slices of pizza. He notices the
mistake after he pays and requests a refund, which the restaurant
manager approves. The overcharged funds are returned to his account.
</li>
- <li>
+ <li>
Teo claims that a blender that they purchased online was faulty and returns
the product to the merchant. The merchant provides the customer with a refund
in the form of store credit based on the return policy.
</li>
- <li><span class="issue">Should we include a scenario where the refund is to a different payment scheme, e.g., cash?</span>
+ <li><span class="issue">Should we include a scenario where the refund is to a different payment scheme, e.g., cash?</span>
</li>
- <li>
+ <li>
A financial crimes regulator identifies a criminal syndicate that is
operating via a number of fake identities. The fake identities are flagged
and an electronic message is sent to all
@@ -2116,77 +2116,77 @@
</p>
<h4>Negotiation of <a>Purchase</a> Terms</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Offer</strong>: Anna searches for a flight on
the booking website. She finds a flight for the ideal price and time.
- </li>
+ </li>
- <li>
+ <li>
<strong>Agreement on Terms</strong>: Anna selects the flight and agrees to the
terms and service associated with the ticket.
- </li>
+ </li>
- <li>
+ <li>
<strong>Application of Marketing Elements</strong>: <em>Not applicable to
this particular use case.</em>
- </li>
-</ul>
+ </li>
+ <ul>
<h4>Negotiation of Payment Instruments</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Accepted Schemes</strong>: The booking website takes
Alipay, Visa, MasterCard, and China UnionPay for payment.
- </li>
+ </li>
- <li>
+ <li>
<strong>Selection of Payment Instruments</strong>: Anna chooses Alipay for
payment.
- </li>
+ </li>
- <li>
+ <li>
<strong>Authentication to Access Instruments</strong>: Anna logs in the Alipay
with her account name and password. Anna is told that she will pay for the
airline ticket with 600RMB and she confirms it. Anna uses her fingerprint to
approve the payment.
- </li>
-</ul>
+ </li>
+ <ul>
<h4>Payment Processing</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Initiation of Processing</strong>: Anna's Alipay wallet initiates
the <a>transaction</a>.
</li>
- <li>
+ <li>
<strong>Verification of Available Funds</strong>: <em>Not applicable to
this particular use case.</em>
</li>
- <li>
+ <li>
<strong>Authorization of Transfer</strong>: Alipay initiates the payment to
the booking website based on Anna's prior fingerprint-based authorization.
</li>
- <li>
+ <li>
<strong>Completion of Transfer</strong>: The booking website gets a message
from Alipay that the transfer is complete.
</li>
-</ul>
+ <ul>
<h4>Delivery of Product/Receipt and Reversals</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Delivery of Receipt</strong>: The booking website sees that Anna's
airline ticket order has been paid and sends a receipt message to her
digital wallet.
- </li>
+ </li>
- <li>
+ <li>
<strong>Delivery of Product</strong>: The booking website sends an email to
Anna with the flight information including the airline, flight number,
departure time, and gate number.
- </li>
-</ul>
+ </li>
+ <ul>
</section>
<section>
@@ -2210,89 +2210,89 @@
<h4>Negotiation of Purchase Terms</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Offer</strong>: Lenne searches for "warm socks,
locally sourced" in her favorite search engine. A pair of Alpaca socks come up
as the first hit as the Alpaca's are nearby where she lives and the online
store (AlpacaToesCo) provides local delivery. She has a coupon in her
digital wallet for the store, but forgot long ago that it is there.
- </li>
+ </li>
- <li>
+ <li>
<strong>Agreement on Terms</strong>: Lenne goes to AlpacaToesCo and puts the
socks in her online shopping cart and is shown the price. Lenne provides her
shipping address to AlpacaToes.
- </li>
+ </li>
- <li>
+ <li>
<strong>Application of Marketing Elements</strong>: When Lenne puts the socks
in her online shopping cart, she's reminded of the "buy one, get one free"
coupon she has in her wallet. She adds another pair of socks and continues
with the checkout process.
- </li>
-</ul>
+ </li>
+ <ul>
<h4>Negotiation of Payment Instruments</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Discovery of Accepted Schemes</strong>: The website takes Visa,
Ripple, and Bitcoin for payment.
- </li>
+ </li>
- <li>
+ <li>
<strong>Selection of Payment Instruments</strong>: Lenne has a Visa card
as well as a local Ripple wallet and a cloud-based Bitcoin wallet. Lenne
selects her cloud-based Bitcoin wallet.
- </li>
+ </li>
- <li>
+ <li>
<strong>Authentication to Access Instruments</strong>: Since the value of the
payment is less than $50, Lenne isn't asked for her two-factor authentication
device to approve the <a>purchase</a>.
- </li>
-</ul>
+ </li>
+ <ul>
<h4>Payment Processing</h4>
-<ul>
+ <ul>
- <li>
+ <li>
<strong>Initiation of Processing</strong>: Lenne's cloud-based Bitcoin wallet
provider initiates the <a>transaction</a>.
</li>
- <li>
+ <li>
<strong>Verification of Available Funds</strong>: <em>Not applicable to
this particular use case.</em>
</li>
- <li>
+ <li>
<strong>Authorization of Transfer</strong>: AlpacaToesCo is sent a message
from the Bitcoin cloud wallet notifying them that the transfer has been
initiated. Lenne is told that she will receive a notification when the
item is shipped.
</li>
- <li>
+ <li>
<strong>Completion of Transfer</strong>: AlpacaToesCo gets a message from the
Bitcoin cloud wallet that the transfer is complete. A Bitcoin
<a>transaction</a> ID is included in the message so that AlpacaToesCo can
release the product when the appropriate number of verifications are made on
the <a>transaction</a>.
</li>
-</ul>
+ <ul>
<h4>Delivery of Product/Receipt and Reversals</h4>
-<ul>
- <li>
+ <ul>
+ <li>
<strong>Delivery of Receipt</strong>: AlpacaToesCo sees 6 verifications on the
transaction in the Bitcoin blockchain and sends a receipt of sale to Lenne's
cloud wallet. The store notifies Lenne that they have shipped her package.
- </li>
+ </li>
- <li>
+ <li>
<strong>Delivery of Product</strong>: AlpacaToesCo ships the package of socks
to Lenne and she receives them the next day.
- </li>
-</ul>
+ </li>
+ <ul>
</section>
</section>