AU2020102380A4 - IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING - Google Patents

IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING Download PDF

Info

Publication number
AU2020102380A4
AU2020102380A4 AU2020102380A AU2020102380A AU2020102380A4 AU 2020102380 A4 AU2020102380 A4 AU 2020102380A4 AU 2020102380 A AU2020102380 A AU 2020102380A AU 2020102380 A AU2020102380 A AU 2020102380A AU 2020102380 A4 AU2020102380 A4 AU 2020102380A4
Authority
AU
Australia
Prior art keywords
user
voice
phone
answer
question
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2020102380A
Inventor
Latha Banda
Rakesh Kumar Dwivedi
Arpit Jain
Tayyab Khan
Manisha Manjul
Bharat Bhushan Sagar
Biplab Kumar Sarkar
Karan Singh
Satvik Vats
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banda Latha Dr
Manjul Manisha Dr
Sarkar Biplab Kumar Prof Dr
Singh Karan Dr
Original Assignee
Banda Latha Dr
Manjul Manisha Dr
Sarkar Biplab Kumar Prof Dr
Singh Karan Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Banda Latha Dr, Manjul Manisha Dr, Sarkar Biplab Kumar Prof Dr, Singh Karan Dr filed Critical Banda Latha Dr
Priority to AU2020102380A priority Critical patent/AU2020102380A4/en
Application granted granted Critical
Publication of AU2020102380A4 publication Critical patent/AU2020102380A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Acoustics & Sound (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Our Invention "IMT-Voice Based Mobile Banking "is a method and 3-G mobile-based system with voice-verification, password- Verification, Automatic Location Verification capabilities that enable a user to 100% safely and securely allow transactions (may be 1.OORs to 5.00-L) with online financial transaction Al- based program account over the 3 G mobile phone in a convenient and user-friendly fashion only 3-G mobile phone network.The invented system, method, and Al-Based computer program are provided for interfacing a user device to a transaction system and also an interface is provided in order to call a function on the transaction system for performing the transaction under verified notification.The invented system aVoice based biometric authentication method, system, and Al- Based computer program is to provide a highest secure voice verification solution with a high accuracy rate that can prevent cheating via recording.The invented system also transmitting to the user a question prompt requiring the user to speak out a voice segment and an answer to a dynamic unique question the voice segment having a corresponding text dependent speaker verification frame, structure, model enrolled before the authentication.The segmenting in response to receiving the voice answer, the voice segment part and the dynamic question and mappingquestion-answer part out from the voice answer and verifying boundary smoothness between the voice segment and the question-answer to the unique question within the voice answer. 15 USSD application server GSM Payebnetwork arab Content server WAP gateway Content PayAent server provide 8583 Clearing and settlement Transaction server Payee bank Payer bankco FIG. 2: IS A FLOWCHART SH OWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART) Authenticating User in subsequent access Method: Passphrase direct cornparison(sound recorded frorn user vs. sound stored in the systern) ,18 User to replay in 5 User In 314 -- + seconds with the authenticated 3 passphrase 30 status now able to associated with access service this sound when options (mamn of registering with menu) Application to A c Application to randomly select compare ifr vaal E + one sound to be passphrase balance to I played (challenge inomdvacustomer question) phone with 3 8§7 Z 302 passphrase stored 304 31e rnte 324 - 322 *030 queston)assprae Yest 31 numErro 312 or332 message

Description

USSD application server GSM Payebnetworkarab
Content server WAP gateway
Content PayAent server provide 8583 Clearing and settlement
Transaction server
Payee bank Payer bankco
FIG. 2: IS A FLOWCHART SH OWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART) Authenticating User in subsequent access Method: Passphrase direct cornparison(sound recorded frorn user vs. sound stored in the systern) ,18 User to replay in 5 User In 314 -- + seconds with the authenticated 3 passphrase 30 status now able to associated with access service this sound when options (mamn of registering with menu)
Application to A c Application to randomly select compare ifr vaal E + one sound to be passphrase balance to I played (challenge inomdvacustomer question) phone with 3 8§7 Z 302 passphrase stored
304 31e rnte 324 - 322 Yest 31 queston)assprae *030
numErro 312 or332
message
IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING
FIELD OF THE INVENTION
"IMT- Voice-Based Mobile banking", our discovery is incorporated with ensuring safe and secure online financial transactions and money transfer through voice verification technology in your very own mobile phones.
BACKGROUND OF THE INVENTION
How this invention differs from the existing ones?
We are all accustomed to the conventional ways of day to day transactions, in most of them we are required to fill in details of our credit cards or debit cards while making an online payment on different platforms or websites. The use of checks is also prevalent.
Though these are efficient in their use they are surely troublesome and decelerate the process of financial activities. For instance, not every individual carries their credit/debit card everywhere, not every person is aware as to what details to provide and what not. Also, people are hesitant to share their account details.
Cyber fraud is one of the banes of technology for humans. Every day we hear cases of online frauds and the invasion of people's privacy. Cybercrime rates are constantly increasing. With the world getting more digital with every passing day we need to find incentives to deal with this major issue.
Although there are methods for minimizing the ongoing frauds (for instance, including encryption methods to protect user details or using anti-fishing programs), they have their loopholes as well. For some of your financial transaction purposes, one might also require the wireless communication medium for it. People living in rural areas are not fortunate enough to access internet services, hence this raises the question of equality as well.
We also witness the inclusion of a separate page on some websites devised specifically for online payments, the page will direct you to the payment page with fewer inputs, for using a mobile phone even if it is installed with the best of technology, will have certain limitations corresponding to a computer/laptop.
All the developments have facilitated the process of financial transactions, but they are not very cost-friendly. Guaranteeing the safety of the users' information increases the expense of associated businesses. There are many obstacles like these that foster the demand for an alternative of the prevailing transaction arrangements, which is advantageous to both- one that keeps, the data of the users safe, and is cost-effective to businesses.
PRIOR ART SEARCH
US5758322A*1994-12-091998-05-26International Voice Register, Inc.Method and apparatus for conducting point-of-sale transactions using voice recognition. US5893057A*1995-10-241999-04-06Ricoh Company Ltd.Voice-based verification and identification methods and systems. US6023688A*1997-11-282000-02-08Diebold, IncorporatedTransaction apparatus and method that identifies an authorized user by appearance and voice. US6070241A1997-02-202000-05-3OAnitek Verification, Inc.Third-party verification system and method. US6266640B1*1996-08-062001-07-24Dialogic CorporationData network with voice verification means. US6368177B11995-11-202002-04-09Creator, Ltd.Method for using a toy to conduct sales over a network. W02002021416A12000-09-072002-03-14Euronet Worldwide, Inc.Financial transaction system. KR20030090435A2002-05-232003-11-28System and method for financial transaction US20040030658A1 *2002-05-282004-02-12Cruz Carmen SantaElectronic ticket. US20040160957A1*2003-02-142004-08-19Coffman Stephen BlaineWireless datagram transaction protocol system US20040181467A1 *2003-03-142004-09-16Samir RaiyaniMulti-modal warehouse applications. US20040267665A12003-06-242004-12-30 Lg. CN1625888A2002-04-282005-06-08System and method for starting financial transaction service provided by remote communication operation mechanism. US20050184164A1*2004-02-242005-08-25Sun Microsystems, Inc. A Delaware CorporationMethod and apparatus for installing an application onto a smart card.
OBJECTIVES OF THE INVENTION
1. This invention intends to successfully create a 3-G technology mobile-based system with striking features like voice verification, testing of passwords, and locations of the users. This will enable you to make transactions from one rupee to five lakh rupees through a safe mobile network.
2. The added objective of the invention is to promote a transaction that can be accomplished under the confirmed notification. This will be executed using an Al Based computer program. The program interfaces the device of the user with the transaction system, in extension to that the users will also be equipped with an interface that is expected to call a function on the system.
3. The authentication process through the endowment of a voice-based biometric approach is another objective of this invention. The system needs to have a high precision to prevent any frauds. This is guaranteed by engaging an A-based computer program.
4. The next major objective of the creation is the addition of a system in which the users who are joining for the first time have to say a voice segment and then answer to a unique question that prompts, by speaking out aloud. Their voice is recorded to establish a verification criterion for the users' future transactions.
5. This objective is in relation to objective 4. The system needs to generate a method to distinguish between the part where the user says a voice segment and when there is a delivery of an answer to the proposed question.
SUMMARY OF THE INVENTION
The user is ought to follow several steps to utilize the generated transaction program. This will present him with the various services like conferring him with the options of checking balances, making payments, and transferring money. An internet connection is a must for first-time users for the registration process.
As a user, your first step will be to register yourself on the primary website of the program. You have to register with your phone number, following that, an easy to recall phone number (normally an 800 number) will be rendered which the user can approach to easily access their financial account. The dependency on an internet connection fades away after your first use. The next step for the user is to call the above-mentioned number to establish certain details for his account that can be operated through his phone. To boost up the security, a security coupon is attributed to the user which leads to the generation of a 6-digit code that needs to type in to accomplish the registration process.
Once the registration process is completed favorably, you will be qualified to access the mobile application of the program which will display the guideline features once after it is launched. The function of these sounds can be described in detail as:
- When the first sound plays, the user says a keyword which is recorded by the app in both sound and text form. - When the second sound plays, the user has to go through the same process as when the first sound was played. - Once the number of sounds picked by you has been played, you will be hearing a goodbye message played on the app. This will be the indication that you have successfully set-up your account on the phone.
Now, addressing the second time users. Here are the steps that the user will follow
-Call on the easy to recall number (usually 800 number) from your mobile. -The user will prove his number. -For heightening security, the user may also be asked to provide a numerical code. -User will play any of the sounds chosen before by him. -In 5 seconds, the user has to respond back with the keyword linked to the sound he selected, - The application will check the sound from its stored databases employing IVR capabilities, confirming it either with the sound form or text form. - If the verification is successful, the user is allowed to log in to his account and use the different services.
The transaction system proves profitable for the merchants as well. It attaches to the flexibility of payments in their business. Once a purchase is made by the customer, the merchant is rendered with a confirmation number. The merchant makes a call to the 800 number and after contentedly logging into his account, the merchant types in the confirmation number and expedites the payment process. The details of the transaction and the status of the payment are available to both customers and merchants on their respective phone applications.
Features of the invention
-Interfacing system- This performs the function of interfacing the user device to any transaction system. Under this function, commands are delivered from the user's device and the system comprises a module for receiving them successfully, resolving of the commands using a resolving module takes place, the process of authentication is carried out with the help of the authentication module, designating a function on the system is promoted through a service manager module, the transaction system transfers a response and the received response is finally passed to the user with the efficient use of transmitting module.
-Computer Program Product- This is particularly used to accomplish the requirement of developing an interface between the user device and the transaction system. Establishment of means of communication for making it possible for a processor to communicate with the user device with efficiency, reception of user transaction, authentication, allowing interfacing ways for application programming to ensure mapping of the transaction to a function on the transaction system, and forming ways of servicing for the allowance of designating the function through a processor, are some of the major functions of the computer program.
The following diagrammatic representations determine the structure and function of the inventions, followed by its salient characteristics and notable strengths. The manifestations aren't limited to the given pictures and are meant for explanatory purposes only.
BRIEF DESCRIPTION OF THE DIAGRAM
Figure 1: The figure shows an obtained screenshot of a page where one can see the option of "Register Phone Number", which every first-time user will witness during the registration process.
Figure2: The representation through a flowchart in the second figure exhibits the steps in the process of setting up an account on the mobile application. Figures 3 and 4: Here the flowchart shows the steps in the verification process that takes place on your mobile application once the user has registered.
Figure 5: The steps while making a purchase by a customer are displayed in this figure.
Figure 6: The steps involved in facilitating an inter-account money transfer or transfer of money to one's own, can be seen here.
Figure 7: This shows how the invention works for a merchant accepting the payment using the application on his phone.
DESCRIPTION OF THE INVENTION
Preface Owing to the diagrammatical representations discussed above, the following is a detailed description of that to enhance your understanding regarding them.
To mention, the embodiments are for exemplary purposes only. There are other possible manifestations too. The nature of these manifestations is flexible. One can make the required alterations or developments as per the essence of the invention. The diagrams act as a blueprint to describe the ambit of the invention.
The credibility of the invention is worth mentioning, its multiple implementations in various encompassments of software, hardware, firmware, etc. are visibly portrayed in the given illustrations. Its implementation is not bounded by the being of any software code with regulations of hardware. Hence, the operational function of the invention is adjustable/modifiable as per the user's requirements.
Figure 1: The screenshotted image displaying "Register Phone Number", affiliated with the registration process of the transaction system.
- All the first time users need to proceed through the registration process. Fill in any contact number that is in routine use with a 3G network, one's landline number can also be typed in, or any conference call number used by an enterprise, etc. You can add multiple phone numbers as well. - Then the user will be asked to categorize his given phone number under the number type as, "home number", "office number", or "cell phone number". The phone number must be added along with the area code under the phone field 105.
Figure 2: The cited flowchart displays the steps to set up the account on your phone under the registration process for all first-time users. - Step 202 and 204-Dial in using your phone the 800 number provided by the system to gain access to the services on your phone. The 800 number is easy to recall and is toll free. - Step 206- The user's number will automatically be identified by the IVR technology in the system or else he may be asked to type in the number for verification.
- Step 208- This step comes into being when the system isn't automatically identifying the number and asks the user to do it manually.
- Step 210- The digits from the provided security token are entered. -Step 212- The application approves the phone number and the digits of the security token.
-Step 214- Verification of the login details by the transactional system.
-Step 216- After the verification process, the user is prompted by the question of whether this is his first time using the application or not.
- Step 222- This comes into being when the answer to the question prompted in Step 216 is "Yes". The user here will be asked to set up the account.
- Step 218 or 220- If the answer is "No" to the prompted question, the user has to go to steps 218/220 for the processes of authentication and conducting transactions.
- Step 222- An overture message will be played by the application This will be containing the details about the application, the purpose of the message will be to inform the user about the different services accessible on the application. It will also inform the user that he'll be listening to a series of sounds in a few moments. The number of sounds can be selected by the user as per his requirements for security. After each played sound, the user needs to record a voice segment over the phone application. The sounds are unique every time.
- Step 226- A sound is played.
-Step 228- After sound 1 is played, the user has to record a voice segment associated with the first sound within a time period of 5 seconds. The time period for recording the segment can be extended as well. It is recommended to record a paraphrase that is not very obvious or easy to detect in relation to the played sound. It will reduce the probability of fraud. But the paraphrase shouldn't be too difficult to remember as well, since the paraphrase will be required for further usage as well. It can be related to your day to activities, something that only you can know and can remember when needed.
-Step 230- The voice segment is accepted by the application
- Step 232- The voice segment received is to be stored for future use. It can be stored in both audio and text formats. For the audio format, the sound is directly stored and later when prompted is verified through IVR technology of the application. - procedure- 234- This step, another sound is played, and the same process of recording and storing the voice segment takes place. However, the sound is different from the first one and the user needs to record a different voice segment for it. The time period for response by the user is 5 seconds or more. Attaching a safe voice segment that is tough to be cracked easily by others should be the user's concern.
- Step 242- Application repeats step 232 to store the received voice segment in either audio or text format.
-Step 244- Repetition of steps 224-232 and 234-242.
- Step 246- A different sound is played. The user matches the same procedure of recording a paraphrase that easily triggers the next time he hears the sound within 5 seconds or more.
-Step 250- The recorded voice segment is received and is stored in the transactional system in text or audio format.
-Step 254- The system displays a "goodbye" message.
-Step 256- This is the final step that marks the completion of the registration process. The system has successfully stored the voice segments with the associated sounds which will be needed for the user's future use of the mobile-based application.
Figure 3: Steps for the authentication process of a user after the successful set up of his account on the mobile application. This is the description of a series of steps under Method 300 for the verification of the user after his first-time set-up of the application. It will be executed by either using audio formats or text formats.
- Step 218- The same as suggested above. If the answer is "no" for the implied question in step 218, move on to step 312.
-Step 302- The system will play any of the sounds chosen by you during the set-up process.
- Step 304- The user is required to identify the sound and remember the associated voice segment with it, the same that he recorded during the set-up.
-Step 306- User has 5 seconds to render the voice segment -Step 308- The system receives voice segment and with the effective usage of IVR technology, a comparison is made among the previously recorded voice segment, and the one received in step 306.
-Step 310- The software utilizes its logic to coordinate the voice segments. -Step 314- This step comes forward when the sounds match successfully. The user has now officially obtained access to the different services granted by the system.
- Step 318- Observe this step if you desire to gain information about the available balance in your account. This step is preceded by step 316 where the user requests for the balance details.
- Step 320- This step is to be followed for making purchases. ( Follow chevron "3" in step 322 for more details)
- Step 324- Follow this step to make a money transfer. ( Follow chevron "4" in step 326 for more details)
- Step 328- Following this step will allow the user to receive money. (Follow chevron "5" in step 330 for more details.)
The list of services is not confined to this. Aside from the services that we discussed, the user has the prospect to execute any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
- Step 332- The user after achieving his desired task exits the application and hereby the completion of method 300 takes place in step 330.
Figure 4: The flowchart here portrays the steps for the authentication process for all those users who have registered already on the mobile-based application. The illustration centers on the method evolved by the invention that utilizes the IVR technology to save the recorded voice segment after transforming it into text format. The stored information is used to make a comparison between the voice segments for future proposes.
This process is marked as Method 400 under the invention. Method 400 comprises the following steps:
-Step 220- This step is same as the step 220 illustrated in figure 2.
-Step 402- Based on step 220, which checks whether it is the user's first-time use of the services or not. If this is not the first time, then step 402 comes into the picture. The system will play any of the sounds picked by you during the set-up process.
- Step 408- The system utilizes the IVR technology to turn the received response from audio format to text format.
- Step 410- The system makes a comparison of the transformed text format to the stored text for the corresponding segments stored previously in either step 232, 242, or 252.
- Step 412- The step utilizes the basic logic of the program to investigate whether both the formats match or not.
-Step 414- If the system holds the process of matching the received responses as unsuccessful, an error message will be illustrated.
- Step 416- However, if the system declares the matching process as successful, step 416 will come into the picture. This step will note the successful authentication of the user and will enable the user to access different services provided by the system on his mobile phone.
-Step 418- This step illustrates the use of one of the services provided by the system balance inquiry. The user requests details of the balance in his account.
-Step 420- Based on step 418, as per the request of the user the information of the user's account balance is provided.
- Step 422- This step marks the use of other services provided by system- paying for purchases. (For more details follow chevron "3" in step 424 which is similar to chevron "3" in step 322.)
- Step 426- This step displays the process of transferring money. (For more details follow chevron "4" in step 428 which is similar to chevron "4" in step 326.)
- Step 430- This step presents the process of receiving money. (For more details follow chevron "5" in step 436 which is similar to chevron "5"in step 330.)
The list of services is not confined to this. Aside from the services that we discussed, the user has the license to execute any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
The user can exit the application in step 434 and this indicates the fulfillment of Method 400 in step 436.
Figure 5: This illustration concentrates on the steps for making a purchase using the mobile-based application.
The process is marked as Method 500 in the system, which consists of the following steps:
- Step 502- After getting successfully authenticated in step 322 or step 424, and opting for the service of paying for purchases, the user lands on step 502. For creating a purchase the user is provided with a reference number from the merchant. The system asks the user to provide the system with the reference number.
- Step 514- This step marks the completion of method 500.
Figure 6: The illustration in the form of a flowchart demonstrates the steps for making an inter-account money transfer or to transfer money to one's account.
The process is marked as Method 600 in the system. It involves the following steps:
- Step 602: The user after successfully establishing his details for access to different services in steps 326 or step 428 lands on step 602. - Step 614- If the user validates to conduct the transaction process, step 614 marks the continuation of the transaction and finally succeeds in sending an email to both the sender and the receiver.
- Along with an email, a confirmation call or text message is also received by both the involved parties.
- If the user denies continuing the transaction in step 612, the transaction process is canceled.
-Step 618- This step marks the completion of method 600.
Figure 7: This flowchart illustration demonstrates the steps involved in the process of receiving money.
The process is marked as Method 700 in the system. The method involves the following steps:
- Step 712- If the transferor cancels the payment in step 708, a confirmation mail regarding the cancellation of transfer will be sent to both the parties in step 712.
- Along with an email, a confirmation call or text message is also received by both the involved parties.
-Step 714- This step marks the completion of method 700.
The list of services is not limited to this. Apart from the services that we discussed, the user has the option to perform any transaction like payment through checks, setting up debit/, credit cards, or communicate with the customer care representatives in times of grievances.
The voice segments mentioned in figure 2 are subjective to change. For adjusting the recorded voice segments, the user needs to restart the process from the beginning from step 210. Although, the user is ought to type in another security code granted from the security token device, and then follow up the process of changing the desired voice segments. As mentioned earlier, the number of sounds can be increased depending on the user's requirement of security level.
The invention can also make use of a highly developed IVR with basic voice recognition capabilities for the verification processes. It is not limited to any particular software or IVR technology. Whereas, one can also use the combination of a basic IVR with advanced software processes for the developed invention.
Advantages of the invention
-Our invention ensures user security while making online transactions. The mobile-based application allows the user to conveniently handle any transaction, get details of his/her account anytime, anywhere by a single click on his mobile phone.
- It diminishes the dependency of the user on an internet connection or a WAP-enabled mobile phone.
- This invention acts as a portable wallet that stores all the account details of the user. The user no longer needs to carry multiple cards or memorize account numbers for the facilitation of any online transactions.
- The voice-based technology layers up the security levels and thereby reduces the risks of any fraudulent activities.
Conclusion
"IMT- Voice-Based Mobile banking", aims at leading to the formulation of a 3-G mobile based system that ensures better security through its voice verification technology. The system employs an efficient combination of password verification and location verification to provide a safe platform for the online transactions of up to five lakh rupees.

Claims (5)

WE CLAIM
1. Our Invention "IMT-Voice Based Mobile Banking "is a method and 3-G mobile-based system with voice-verification, password- Verification, Automatic Location Verification capabilities that enable a user to 100% safely and securely allow transactions (may be 1.OORs to 5.00-L) with online financial transaction Al- based program account over the 3-G mobile phone in a convenient and user-friendly fashion only 3-G mobile phone network. The invented system, method, and A-Based computer program are provided for interfacing a user device to a transaction system and also an interface is provided in order to call a function on the transaction system for performing the transaction under verified notification. The invented system a Voice based biometric authentication method, system, and Al- Based computer program is to provide a highest secure voice verification solution with a high accuracy rate that can prevent cheating via recording. The invented system also transmitting to the user a question prompt requiring the user to speak out a voice segment and an answer to a dynamic unique question the voice segment having a corresponding text dependent speaker verification frame, structure, model enrolled before the authentication. The segmenting in response to receiving the voice answer, the voice segment part and the dynamic question and mapping question-answer part out from the voice answer and verifying boundary smoothness between the voice segment and the question-answer to the unique question within the voice answer.
2. According to claims# the invention is to successfully create a 3-G technology mobile based system with striking features like voice verification, testing of passwords, and locations of the users. This will enable you to make transactions from one rupee to five lakh rupees through a safe mobile network.
3. According to claim,2# the invention is to promote a transaction that can be accomplished under the confirmed notification. This will be executed using an Al Based computer program. The program interfaces the device of the user with the transaction system, in extension to that the users will also be equipped with an interface that is expected to call a function on the system.
4. According to claim,2,3# the invention is to the authentication process through the endowment of a voice-based biometric approach is another objective of this invention.
The system needs to have a high precision to prevent any frauds. This is guaranteed by engaging an Al-based computer program.
5. According to claim,3# the invention is to the next major objective of the creation is the addition of a system in which the users who are joining for the first time have to say a voice segment and then answer to a unique question that prompts, by speaking out aloud. Their voice is recorded to establish a verification criterion for the users' future transactions. The invention is to the system needs to generate a method to distinguish between the part where the user says a voice segment and when there is a delivery of an answer to the proposed question.
FIG. 1: IS A SCREENSHOT SHOWING AN EXAMPLE “REGISTER PHONE NUMBER” PAGE ASSOCIATED WITH AN ONLINE FINANCIAL TRANSACTION PROGRAM ACCOUNT. (PRIOR ART)
FIG. 2: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN SETTING UP A PHONE-BASED ACCOUNT IF THE USER IS ACCESSING THE PHONE-SYSTEM APPLICATION FOR THE VERY FIRST TIME. (PRIOR ART)
FIG. 3: IS A FLOWCHART SHOWING THE STEPS THE PHONE-SYSTEM APPLICATION TAKES IN AUTHENTICATING THE USER IF THE USER HAS ALREADY SET UP A PHONE-BASED ACCOUNT. (PRIOR ART)
FIG. 4: IS A FLOWCHART SHOWING THE STEPS THE PHONE-SYSTEM APPLICATION TAKES IN AUTHENTICATING THE USER IF THE USER HAS ALREADY SET UP A PHONE-BASED ACCOUNT. (PRIOR ART)
FIG. 5: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN PAYING FOR A PURCHASE WITH THE PHONE- SYSTEM APPLICATION. (PRIOR ART)
FIG. 6: IS A FLOWCHART SHOWING THE STEPS A USER TAKES IN PERFORMING A MONEY TRANSFER TO ANOTHER ACCOUNT OR TO THE USER'S OWN ACCOUNT. (PRIOR ART)
FIG. 7: IS A FLOWCHART SHOWING THE STEPS A MERCHANT TAKES IN RECEIVING MONEY FROM A BUYER WITH THE PHONE-SYSTEM APPLICATION. (PRIOR ART)
AU2020102380A 2020-09-23 2020-09-23 IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING Ceased AU2020102380A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2020102380A AU2020102380A4 (en) 2020-09-23 2020-09-23 IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2020102380A AU2020102380A4 (en) 2020-09-23 2020-09-23 IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING

Publications (1)

Publication Number Publication Date
AU2020102380A4 true AU2020102380A4 (en) 2020-11-05

Family

ID=73016653

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2020102380A Ceased AU2020102380A4 (en) 2020-09-23 2020-09-23 IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING

Country Status (1)

Country Link
AU (1) AU2020102380A4 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143305A (en) * 2021-11-19 2022-03-04 支付宝(杭州)信息技术有限公司 Information display method, device and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143305A (en) * 2021-11-19 2022-03-04 支付宝(杭州)信息技术有限公司 Information display method, device and equipment

Similar Documents

Publication Publication Date Title
US10909538B2 (en) Voice phone-based method and system to authenticate users
US11138607B2 (en) Intelligent authentication
US8880434B2 (en) Method and system for providing biometric authentication at a point-of-sale via a mobile device
US8583498B2 (en) System and method for biometrics-based fraud prevention
US8065226B2 (en) Method and system for performing a cash transaction with a self-service financial transaction terminal
US20080091543A1 (en) Activating telephone-based services using a pos device
US20030074328A1 (en) System and method for conducting a financial transaction using a communication device
US20090192940A1 (en) System for providing cardless payment
US20140229388A1 (en) System and Method for Data and Identity Verification and Authentication
US20050075985A1 (en) Voice authenticated credit card purchase verification
US20070094095A1 (en) Internet anti-fraud cardholder verification system
WO2017160491A1 (en) Multi-level authentication for onboard systems
CA2772349A1 (en) Authentication using application authentication element
US10665238B1 (en) Alert through voice assistant
US20030069844A1 (en) Transaction handling methods and systems
US20160350677A1 (en) System and Method for Generating and Issuing Proofs of Enrollment
AU2020102380A4 (en) IMT-Voice Based Mobile Banking: INTELLIGENTMONEY TRANSFER USING VOICE BASED MOBILE BANKING
WO2015153126A1 (en) Method and system for obtaining credit
US9756182B1 (en) Pre-authentication system and method for outgoing communication
JP3361504B2 (en) Card payment automatic payment system
US20080162158A1 (en) Authentication Services Compensation System
US20110106701A1 (en) Method and apparatus for performing voice-based credit card processing
CA3076334A1 (en) Systems and methods for electronic payments with fraud prevention
JP3762753B2 (en) Telephone transaction support system and recording medium storing program for causing computer to perform processing in the system
AU2016277629A1 (en) Authentication using application authentication element

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry