AU2020102380A4 - IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING - Google Patents
IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING Download PDFInfo
- Publication number
- AU2020102380A4 AU2020102380A4 AU2020102380A AU2020102380A AU2020102380A4 AU 2020102380 A4 AU2020102380 A4 AU 2020102380A4 AU 2020102380 A AU2020102380 A AU 2020102380A AU 2020102380 A AU2020102380 A AU 2020102380A AU 2020102380 A4 AU2020102380 A4 AU 2020102380A4
- Authority
- AU
- Australia
- Prior art keywords
- user
- voice
- phone
- answer
- question
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
Our Invention "IMT-Voice Based Mobile Banking "is a method and 3-G mobile-based
system with voice-verification, password- Verification, Automatic Location Verification
capabilities that enable a user to 100% safely and securely allow transactions (may be
1.OORs to 5.00-L) with online financial transaction Al- based program account over the 3
G mobile phone in a convenient and user-friendly fashion only 3-G mobile phone
network.The invented system, method, and Al-Based computer program are provided for
interfacing a user device to a transaction system and also an interface is provided in order
to call a function on the transaction system for performing the transaction under verified
notification.The invented system aVoice based biometric authentication method, system,
and Al- Based computer program is to provide a highest secure voice verification solution
with a high accuracy rate that can prevent cheating via recording.The invented system
also transmitting to the user a question prompt requiring the user to speak out a voice
segment and an answer to a dynamic unique question the voice segment having a
corresponding text dependent speaker verification frame, structure, model enrolled
before the authentication.The segmenting in response to receiving the voice answer, the
voice segment part and the dynamic question and mappingquestion-answer part out from
the voice answer and verifying boundary smoothness between the voice segment and the
question-answer to the unique question within the voice answer.
15
USSD application server
GSM
Payebnetwork arab
Content server WAP gateway
Content
PayAent server provide
8583
Clearing and
settlement
Transaction server
Payee bank
Payer bankco
FIG. 2: IS A FLOWCHART SH OWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF
THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART)
Authenticating User in subsequent access
Method: Passphrase direct cornparison(sound recorded frorn user vs. sound stored in the systern)
,18
User to replay in 5 User In 314 -- + seconds with the authenticated
3 passphrase 30 status now able to
associated with access service
this sound when options (mamn
of registering with menu)
Application to A c Application to
randomly select compare ifr vaal E + one sound to be passphrase balance to
I played (challenge inomdvacustomer
question) phone with 3 8§7
Z 302 passphrase stored
304 31e rnte 324 - 322
*030
queston)assprae Yest
31
numErro 312 or332
message
Description
USSD application server GSM Payebnetworkarab
Content server WAP gateway
Content PayAent server provide 8583 Clearing and settlement
Transaction server
Payee bank Payer bankco
FIG. 2: IS A FLOWCHART SH OWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART) Authenticating User in subsequent access Method: Passphrase direct cornparison(sound recorded frorn user vs. sound stored in the systern) ,18 User to replay in 5 User In 314 -- + seconds with the authenticated 3 passphrase 30 status now able to associated with access service this sound when options (mamn of registering with menu)
Application to A c Application to randomly select compare ifr vaal E + one sound to be passphrase balance to I played (challenge inomdvacustomer question) phone with 3 8§7 Z 302 passphrase stored
304 31e rnte 324 - 322 Yest 31 queston)assprae *030
numErro 312 or332
message
IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING
"IMT- Voice-Based Mobile banking", our discovery is incorporated with ensuring safe and secure online financial transactions and money transfer through voice verification technology in your very own mobile phones.
How this invention differs from the existing ones?
We are all accustomed to the conventional ways of day to day transactions, in most of them we are required to fill in details of our credit cards or debit cards while making an online payment on different platforms or websites. The use of checks is also prevalent.
Though these are efficient in their use they are surely troublesome and decelerate the process of financial activities. For instance, not every individual carries their credit/debit card everywhere, not every person is aware as to what details to provide and what not. Also, people are hesitant to share their account details.
Cyber fraud is one of the banes of technology for humans. Every day we hear cases of online frauds and the invasion of people's privacy. Cybercrime rates are constantly increasing. With the world getting more digital with every passing day we need to find incentives to deal with this major issue.
Although there are methods for minimizing the ongoing frauds (for instance, including encryption methods to protect user details or using anti-fishing programs), they have their loopholes as well. For some of your financial transaction purposes, one might also require the wireless communication medium for it. People living in rural areas are not fortunate enough to access internet services, hence this raises the question of equality as well.
We also witness the inclusion of a separate page on some websites devised specifically for online payments, the page will direct you to the payment page with fewer inputs, for using a mobile phone even if it is installed with the best of technology, will have certain limitations corresponding to a computer/laptop.
All the developments have facilitated the process of financial transactions, but they are not very cost-friendly. Guaranteeing the safety of the users' information increases the expense of associated businesses. There are many obstacles like these that foster the demand for an alternative of the prevailing transaction arrangements, which is advantageous to both- one that keeps, the data of the users safe, and is cost-effective to businesses.
US5758322A*1994-12-091998-05-26International Voice Register, Inc.Method and apparatus for conducting point-of-sale transactions using voice recognition. US5893057A*1995-10-241999-04-06Ricoh Company Ltd.Voice-based verification and identification methods and systems. US6023688A*1997-11-282000-02-08Diebold, IncorporatedTransaction apparatus and method that identifies an authorized user by appearance and voice. US6070241A1997-02-202000-05-3OAnitek Verification, Inc.Third-party verification system and method. US6266640B1*1996-08-062001-07-24Dialogic CorporationData network with voice verification means. US6368177B11995-11-202002-04-09Creator, Ltd.Method for using a toy to conduct sales over a network. W02002021416A12000-09-072002-03-14Euronet Worldwide, Inc.Financial transaction system. KR20030090435A2002-05-232003-11-28System and method for financial transaction US20040030658A1 *2002-05-282004-02-12Cruz Carmen SantaElectronic ticket. US20040160957A1*2003-02-142004-08-19Coffman Stephen BlaineWireless datagram transaction protocol system US20040181467A1 *2003-03-142004-09-16Samir RaiyaniMulti-modal warehouse applications. US20040267665A12003-06-242004-12-30 Lg. CN1625888A2002-04-282005-06-08System and method for starting financial transaction service provided by remote communication operation mechanism. US20050184164A1*2004-02-242005-08-25Sun Microsystems, Inc. A Delaware CorporationMethod and apparatus for installing an application onto a smart card.
1. This invention intends to successfully create a 3-G technology mobile-based system with striking features like voice verification, testing of passwords, and locations of the users. This will enable you to make transactions from one rupee to five lakh rupees through a safe mobile network.
2. The added objective of the invention is to promote a transaction that can be accomplished under the confirmed notification. This will be executed using an Al Based computer program. The program interfaces the device of the user with the transaction system, in extension to that the users will also be equipped with an interface that is expected to call a function on the system.
3. The authentication process through the endowment of a voice-based biometric approach is another objective of this invention. The system needs to have a high precision to prevent any frauds. This is guaranteed by engaging an A-based computer program.
4. The next major objective of the creation is the addition of a system in which the users who are joining for the first time have to say a voice segment and then answer to a unique question that prompts, by speaking out aloud. Their voice is recorded to establish a verification criterion for the users' future transactions.
5. This objective is in relation to objective 4. The system needs to generate a method to distinguish between the part where the user says a voice segment and when there is a delivery of an answer to the proposed question.
The user is ought to follow several steps to utilize the generated transaction program. This will present him with the various services like conferring him with the options of checking balances, making payments, and transferring money. An internet connection is a must for first-time users for the registration process.
As a user, your first step will be to register yourself on the primary website of the program. You have to register with your phone number, following that, an easy to recall phone number (normally an 800 number) will be rendered which the user can approach to easily access their financial account. The dependency on an internet connection fades away after your first use. The next step for the user is to call the above-mentioned number to establish certain details for his account that can be operated through his phone. To boost up the security, a security coupon is attributed to the user which leads to the generation of a 6-digit code that needs to type in to accomplish the registration process.
Once the registration process is completed favorably, you will be qualified to access the mobile application of the program which will display the guideline features once after it is launched. The function of these sounds can be described in detail as:
- When the first sound plays, the user says a keyword which is recorded by the app in both sound and text form. - When the second sound plays, the user has to go through the same process as when the first sound was played. - Once the number of sounds picked by you has been played, you will be hearing a goodbye message played on the app. This will be the indication that you have successfully set-up your account on the phone.
Now, addressing the second time users. Here are the steps that the user will follow
-Call on the easy to recall number (usually 800 number) from your mobile. -The user will prove his number. -For heightening security, the user may also be asked to provide a numerical code. -User will play any of the sounds chosen before by him. -In 5 seconds, the user has to respond back with the keyword linked to the sound he selected, - The application will check the sound from its stored databases employing IVR capabilities, confirming it either with the sound form or text form. - If the verification is successful, the user is allowed to log in to his account and use the different services.
The transaction system proves profitable for the merchants as well. It attaches to the flexibility of payments in their business. Once a purchase is made by the customer, the merchant is rendered with a confirmation number. The merchant makes a call to the 800 number and after contentedly logging into his account, the merchant types in the confirmation number and expedites the payment process. The details of the transaction and the status of the payment are available to both customers and merchants on their respective phone applications.
Features of the invention
-Interfacing system- This performs the function of interfacing the user device to any transaction system. Under this function, commands are delivered from the user's device and the system comprises a module for receiving them successfully, resolving of the commands using a resolving module takes place, the process of authentication is carried out with the help of the authentication module, designating a function on the system is promoted through a service manager module, the transaction system transfers a response and the received response is finally passed to the user with the efficient use of transmitting module.
-Computer Program Product- This is particularly used to accomplish the requirement of developing an interface between the user device and the transaction system. Establishment of means of communication for making it possible for a processor to communicate with the user device with efficiency, reception of user transaction, authentication, allowing interfacing ways for application programming to ensure mapping of the transaction to a function on the transaction system, and forming ways of servicing for the allowance of designating the function through a processor, are some of the major functions of the computer program.
The following diagrammatic representations determine the structure and function of the inventions, followed by its salient characteristics and notable strengths. The manifestations aren't limited to the given pictures and are meant for explanatory purposes only.
Figure 1: The figure shows an obtained screenshot of a page where one can see the option of "Register Phone Number", which every first-time user will witness during the registration process.
Figure2: The representation through a flowchart in the second figure exhibits the steps in the process of setting up an account on the mobile application. Figures 3 and 4: Here the flowchart shows the steps in the verification process that takes place on your mobile application once the user has registered.
Figure 5: The steps while making a purchase by a customer are displayed in this figure.
Figure 6: The steps involved in facilitating an inter-account money transfer or transfer of money to one's own, can be seen here.
Figure 7: This shows how the invention works for a merchant accepting the payment using the application on his phone.
Preface Owing to the diagrammatical representations discussed above, the following is a detailed description of that to enhance your understanding regarding them.
To mention, the embodiments are for exemplary purposes only. There are other possible manifestations too. The nature of these manifestations is flexible. One can make the required alterations or developments as per the essence of the invention. The diagrams act as a blueprint to describe the ambit of the invention.
The credibility of the invention is worth mentioning, its multiple implementations in various encompassments of software, hardware, firmware, etc. are visibly portrayed in the given illustrations. Its implementation is not bounded by the being of any software code with regulations of hardware. Hence, the operational function of the invention is adjustable/modifiable as per the user's requirements.
Figure 1: The screenshotted image displaying "Register Phone Number", affiliated with the registration process of the transaction system.
- All the first time users need to proceed through the registration process. Fill in any contact number that is in routine use with a 3G network, one's landline number can also be typed in, or any conference call number used by an enterprise, etc. You can add multiple phone numbers as well. - Then the user will be asked to categorize his given phone number under the number type as, "home number", "office number", or "cell phone number". The phone number must be added along with the area code under the phone field 105.
Figure 2: The cited flowchart displays the steps to set up the account on your phone under the registration process for all first-time users. - Step 202 and 204-Dial in using your phone the 800 number provided by the system to gain access to the services on your phone. The 800 number is easy to recall and is toll free. - Step 206- The user's number will automatically be identified by the IVR technology in the system or else he may be asked to type in the number for verification.
- Step 208- This step comes into being when the system isn't automatically identifying the number and asks the user to do it manually.
- Step 210- The digits from the provided security token are entered. -Step 212- The application approves the phone number and the digits of the security token.
-Step 214- Verification of the login details by the transactional system.
-Step 216- After the verification process, the user is prompted by the question of whether this is his first time using the application or not.
- Step 222- This comes into being when the answer to the question prompted in Step 216 is "Yes". The user here will be asked to set up the account.
- Step 218 or 220- If the answer is "No" to the prompted question, the user has to go to steps 218/220 for the processes of authentication and conducting transactions.
- Step 222- An overture message will be played by the application This will be containing the details about the application, the purpose of the message will be to inform the user about the different services accessible on the application. It will also inform the user that he'll be listening to a series of sounds in a few moments. The number of sounds can be selected by the user as per his requirements for security. After each played sound, the user needs to record a voice segment over the phone application. The sounds are unique every time.
- Step 226- A sound is played.
-Step 228- After sound 1 is played, the user has to record a voice segment associated with the first sound within a time period of 5 seconds. The time period for recording the segment can be extended as well. It is recommended to record a paraphrase that is not very obvious or easy to detect in relation to the played sound. It will reduce the probability of fraud. But the paraphrase shouldn't be too difficult to remember as well, since the paraphrase will be required for further usage as well. It can be related to your day to activities, something that only you can know and can remember when needed.
-Step 230- The voice segment is accepted by the application
- Step 232- The voice segment received is to be stored for future use. It can be stored in both audio and text formats. For the audio format, the sound is directly stored and later when prompted is verified through IVR technology of the application. - procedure- 234- This step, another sound is played, and the same process of recording and storing the voice segment takes place. However, the sound is different from the first one and the user needs to record a different voice segment for it. The time period for response by the user is 5 seconds or more. Attaching a safe voice segment that is tough to be cracked easily by others should be the user's concern.
- Step 242- Application repeats step 232 to store the received voice segment in either audio or text format.
-Step 244- Repetition of steps 224-232 and 234-242.
- Step 246- A different sound is played. The user matches the same procedure of recording a paraphrase that easily triggers the next time he hears the sound within 5 seconds or more.
-Step 250- The recorded voice segment is received and is stored in the transactional system in text or audio format.
-Step 254- The system displays a "goodbye" message.
-Step 256- This is the final step that marks the completion of the registration process. The system has successfully stored the voice segments with the associated sounds which will be needed for the user's future use of the mobile-based application.
Figure 3: Steps for the authentication process of a user after the successful set up of his account on the mobile application. This is the description of a series of steps under Method 300 for the verification of the user after his first-time set-up of the application. It will be executed by either using audio formats or text formats.
- Step 218- The same as suggested above. If the answer is "no" for the implied question in step 218, move on to step 312.
-Step 302- The system will play any of the sounds chosen by you during the set-up process.
- Step 304- The user is required to identify the sound and remember the associated voice segment with it, the same that he recorded during the set-up.
-Step 306- User has 5 seconds to render the voice segment -Step 308- The system receives voice segment and with the effective usage of IVR technology, a comparison is made among the previously recorded voice segment, and the one received in step 306.
-Step 310- The software utilizes its logic to coordinate the voice segments. -Step 314- This step comes forward when the sounds match successfully. The user has now officially obtained access to the different services granted by the system.
- Step 318- Observe this step if you desire to gain information about the available balance in your account. This step is preceded by step 316 where the user requests for the balance details.
- Step 320- This step is to be followed for making purchases. ( Follow chevron "3" in step 322 for more details)
- Step 324- Follow this step to make a money transfer. ( Follow chevron "4" in step 326 for more details)
- Step 328- Following this step will allow the user to receive money. (Follow chevron "5" in step 330 for more details.)
The list of services is not confined to this. Aside from the services that we discussed, the user has the prospect to execute any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
- Step 332- The user after achieving his desired task exits the application and hereby the completion of method 300 takes place in step 330.
Figure 4: The flowchart here portrays the steps for the authentication process for all those users who have registered already on the mobile-based application. The illustration centers on the method evolved by the invention that utilizes the IVR technology to save the recorded voice segment after transforming it into text format. The stored information is used to make a comparison between the voice segments for future proposes.
This process is marked as Method 400 under the invention. Method 400 comprises the following steps:
-Step 220- This step is same as the step 220 illustrated in figure 2.
-Step 402- Based on step 220, which checks whether it is the user's first-time use of the services or not. If this is not the first time, then step 402 comes into the picture. The system will play any of the sounds picked by you during the set-up process.
- Step 408- The system utilizes the IVR technology to turn the received response from audio format to text format.
- Step 410- The system makes a comparison of the transformed text format to the stored text for the corresponding segments stored previously in either step 232, 242, or 252.
- Step 412- The step utilizes the basic logic of the program to investigate whether both the formats match or not.
-Step 414- If the system holds the process of matching the received responses as unsuccessful, an error message will be illustrated.
- Step 416- However, if the system declares the matching process as successful, step 416 will come into the picture. This step will note the successful authentication of the user and will enable the user to access different services provided by the system on his mobile phone.
-Step 418- This step illustrates the use of one of the services provided by the system balance inquiry. The user requests details of the balance in his account.
-Step 420- Based on step 418, as per the request of the user the information of the user's account balance is provided.
- Step 422- This step marks the use of other services provided by system- paying for purchases. (For more details follow chevron "3" in step 424 which is similar to chevron "3" in step 322.)
- Step 426- This step displays the process of transferring money. (For more details follow chevron "4" in step 428 which is similar to chevron "4" in step 326.)
- Step 430- This step presents the process of receiving money. (For more details follow chevron "5" in step 436 which is similar to chevron "5"in step 330.)
The list of services is not confined to this. Aside from the services that we discussed, the user has the license to execute any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
The user can exit the application in step 434 and this indicates the fulfillment of Method 400 in step 436.
Figure 5: This illustration concentrates on the steps for making a purchase using the mobile-based application.
The process is marked as Method 500 in the system, which consists of the following steps:
- Step 502- After getting successfully authenticated in step 322 or step 424, and opting for the service of paying for purchases, the user lands on step 502. For creating a purchase the user is provided with a reference number from the merchant. The system asks the user to provide the system with the reference number.
- Step 514- This step marks the completion of method 500.
Figure 6: The illustration in the form of a flowchart demonstrates the steps for making an inter-account money transfer or to transfer money to one's account.
The process is marked as Method 600 in the system. It involves the following steps:
- Step 602: The user after successfully establishing his details for access to different services in steps 326 or step 428 lands on step 602. - Step 614- If the user validates to conduct the transaction process, step 614 marks the continuation of the transaction and finally succeeds in sending an email to both the sender and the receiver.
- Along with an email, a confirmation call or text message is also received by both the involved parties.
- If the user denies continuing the transaction in step 612, the transaction process is canceled.
-Step 618- This step marks the completion of method 600.
Figure 7: This flowchart illustration demonstrates the steps involved in the process of receiving money.
The process is marked as Method 700 in the system. The method involves the following steps:
- Step 712- If the transferor cancels the payment in step 708, a confirmation mail regarding the cancellation of transfer will be sent to both the parties in step 712.
- Along with an email, a confirmation call or text message is also received by both the involved parties.
-Step 714- This step marks the completion of method 700.
The list of services is not limited to this. Apart from the services that we discussed, the user has the option to perform any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
The voice segments mentioned in figure 2 are subjective to change. For adjusting the recorded voice segments, the user needs to restart the process from the beginning from step 210. Although, the user is ought to type in another security code granted from the security token device, and then follow up the process of changing the desired voice segments. As mentioned earlier, the number of sounds can be increased depending on the user's requirement of security level.
The invention can also make use of a highly developed IVR with basic voice recognition capabilities for the verification processes. It is not limited to any particular software or IVR technology. Whereas, one can also use the combination of a basic IVR with advanced software processes for the developed invention.
Advantages of the invention
-Our invention ensures user security while making online transactions. The mobile-based application allows the user to conveniently handle any transaction, get details of his/her account anytime, anywhere by a single click on his mobile phone.
- It diminishes the dependency of the user on an internet connection or a WAP-enabled mobile phone.
- This invention acts as a portable wallet that stores all the account details of the user. The user no longer needs to carry multiple cards or memorize account numbers for the facilitation of any online transactions.
- The voice-based technology layers up the security levels and thereby reduces the risks of any fraudulent activities.
Conclusion
"IMT- Voice-Based Mobile banking", aims at leading to the formulation of a 3-G mobile based system that ensures better security through its voice verification technology. The system employs an efficient combination of password verification and location verification to provide a safe platform for the online transactions of up to five lakh rupees.
Claims (5)
1. Our Invention "IMT-Voice Based Mobile Banking "is a method and 3-G mobile-based system with voice-verification, password- Verification, Automatic Location Verification capabilities that enable a user to 100% safely and securely allow transactions (may be 1.OORs to 5.00-L) with online financial transaction Al- based program account over the 3-G mobile phone in a convenient and user-friendly fashion only 3-G mobile phone network. The invented system, method, and A-Based computer program are provided for interfacing a user device to a transaction system and also an interface is provided in order to call a function on the transaction system for performing the transaction under verified notification. The invented system a Voice based biometric authentication method, system, and Al- Based computer program is to provide a highest secure voice verification solution with a high accuracy rate that can prevent cheating via recording. The invented system also transmitting to the user a question prompt requiring the user to speak out a voice segment and an answer to a dynamic unique question the voice segment having a corresponding text dependent speaker verification frame, structure, model enrolled before the authentication. The segmenting in response to receiving the voice answer, the voice segment part and the dynamic question and mapping question-answer part out from the voice answer and verifying boundary smoothness between the voice segment and the question-answer to the unique question within the voice answer.
2. According to claims# the invention is to successfully create a 3-G technology mobile based system with striking features like voice verification, testing of passwords, and locations of the users. This will enable you to make transactions from one rupee to five lakh rupees through a safe mobile network.
3. According to claim,2# the invention is to promote a transaction that can be accomplished under the confirmed notification. This will be executed using an Al Based computer program. The program interfaces the device of the user with the transaction system, in extension to that the users will also be equipped with an interface that is expected to call a function on the system.
4. According to claim,2,3# the invention is to the authentication process through the endowment of a voice-based biometric approach is another objective of this invention.
The system needs to have a high precision to prevent any frauds. This is guaranteed by engaging an Al-based computer program.
5. According to claim,3# the invention is to the next major objective of the creation is the addition of a system in which the users who are joining for the first time have to say a voice segment and then answer to a unique question that prompts, by speaking out aloud. Their voice is recorded to establish a verification criterion for the users' future transactions. The invention is to the system needs to generate a method to distinguish between the part where the user says a voice segment and when there is a delivery of an answer to the proposed question.
FIG. 1: IS A SCREENSHOT SHOWING AN EXAMPLE “REGISTER PHONE NUMBER” PAGE ASSOCIATED WITH AN ONLINE FINANCIAL TRANSACTION PROGRAM ACCOUNT. (PRIOR ART)
FIG. 2: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART)
FIG. 3: IS A FLOWCHART SHOWING THE STEPS THE PHONE-SYSTEM APPLICATION TAKES IN AUTHENTICATING THE USER IF THE USER HAS ALREADY SET UP A PHONE-BASED ACCOUNT. (PRIOR ART)
FIG. 4: IS A FLOWCHART SHOWING THE STEPS THE PHONE-SYSTEM APPLICATION TAKES IN AUTHENTICATING THE USER IF THE USER HAS ALREADY SET UP A PHONE-BASED ACCOUNT. (PRIOR ART)
FIG. 5: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN PAYING FOR A PURCHASE WITH THE PHONE- SYSTEM APPLICATION. (PRIOR ART)
FIG. 6: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN PERFORMING A MONEY TRANSFER TO ANOTHER ACCOUNT OR TO THE USER'S OWN ACCOUNT. (PRIOR ART)
FIG. 7: IS A FLOWCHART SHOWING THE STEPS A MERCHANT TAKES IN RECEIVING MONEY FROM A BUYER WITH THE PHONE-SYSTEM APPLICATION. (PRIOR ART)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2020102380A AU2020102380A4 (en) | 2020-09-23 | 2020-09-23 | IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2020102380A AU2020102380A4 (en) | 2020-09-23 | 2020-09-23 | IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2020102380A4 true AU2020102380A4 (en) | 2020-11-05 |
Family
ID=73016653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2020102380A Ceased AU2020102380A4 (en) | 2020-09-23 | 2020-09-23 | IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2020102380A4 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143305A (en) * | 2021-11-19 | 2022-03-04 | 支付宝(杭州)信息技术有限公司 | Information display method, device and equipment |
-
2020
- 2020-09-23 AU AU2020102380A patent/AU2020102380A4/en not_active Ceased
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143305A (en) * | 2021-11-19 | 2022-03-04 | 支付宝(杭州)信息技术有限公司 | Information display method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10909538B2 (en) | Voice phone-based method and system to authenticate users | |
US11138607B2 (en) | Intelligent authentication | |
US8880434B2 (en) | Method and system for providing biometric authentication at a point-of-sale via a mobile device | |
US8583498B2 (en) | System and method for biometrics-based fraud prevention | |
US8065226B2 (en) | Method and system for performing a cash transaction with a self-service financial transaction terminal | |
US20080091543A1 (en) | Activating telephone-based services using a pos device | |
US20030074328A1 (en) | System and method for conducting a financial transaction using a communication device | |
US20090192940A1 (en) | System for providing cardless payment | |
US20140229388A1 (en) | System and Method for Data and Identity Verification and Authentication | |
US20050075985A1 (en) | Voice authenticated credit card purchase verification | |
US20070094095A1 (en) | Internet anti-fraud cardholder verification system | |
WO2017160491A1 (en) | Multi-level authentication for onboard systems | |
CA2772349A1 (en) | Authentication using application authentication element | |
US10665238B1 (en) | Alert through voice assistant | |
US20030069844A1 (en) | Transaction handling methods and systems | |
US20160350677A1 (en) | System and Method for Generating and Issuing Proofs of Enrollment | |
AU2020102380A4 (en) | IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING | |
WO2015153126A1 (en) | Method and system for obtaining credit | |
US9756182B1 (en) | Pre-authentication system and method for outgoing communication | |
JP3361504B2 (en) | Card payment automatic payment system | |
US20080162158A1 (en) | Authentication Services Compensation System | |
US20110106701A1 (en) | Method and apparatus for performing voice-based credit card processing | |
CA3076334A1 (en) | Systems and methods for electronic payments with fraud prevention | |
JP3762753B2 (en) | Telephone transaction support system and recording medium storing program for causing computer to perform processing in the system | |
AU2016277629A1 (en) | Authentication using application authentication element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |