CL2014002923A1 - Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactions - Google Patents
Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactionsInfo
- Publication number
- CL2014002923A1 CL2014002923A1 CL2014002923A CL2014002923A CL2014002923A1 CL 2014002923 A1 CL2014002923 A1 CL 2014002923A1 CL 2014002923 A CL2014002923 A CL 2014002923A CL 2014002923 A CL2014002923 A CL 2014002923A CL 2014002923 A1 CL2014002923 A1 CL 2014002923A1
- Authority
- CL
- Chile
- Prior art keywords
- user
- account
- transactions
- authorization
- forcing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
La presente invención, se refiere a un procedimiento que obliga al usuario a iniciar sesión vía telefónica, antes de realizar las transacciones. Así, cuando no lo ha hecho, aunque roben datos y claves de tarjetas o Internet, no será posible acceder en forma fraudulenta a la cuenta bancaria o comercial del usuario. De ocurrir un intento de acceso ilícito, se le avisa en ese mismo momento en forma simultánea, al celular del usuario vía mensaje de texto, al proveedor de la cuenta por mensajería interna y, uThe present invention refers to a procedure that obliges the user to log in by telephone, before making the transactions. Thus, when you have not done so, even if you steal data and passwords from cards or the Internet, it will not be possible to fraudulently access the user's bank or commercial account. If an attempted illegal access occurs, the user’s cell phone will be notified simultaneously at the same time via text message, the account provider through internal messaging and, or
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CL2014002923A CL2014002923A1 (en) | 2014-10-29 | 2014-10-29 | Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactions |
PCT/CL2015/000058 WO2016065495A1 (en) | 2014-10-29 | 2015-10-29 | Computer security method for initiating a telephone session before carrying out bank or commercial transactions |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CL2014002923A CL2014002923A1 (en) | 2014-10-29 | 2014-10-29 | Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
CL2014002923A1 true CL2014002923A1 (en) | 2015-02-13 |
Family
ID=53404063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CL2014002923A CL2014002923A1 (en) | 2014-10-29 | 2014-10-29 | Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactions |
Country Status (2)
Country | Link |
---|---|
CL (1) | CL2014002923A1 (en) |
WO (1) | WO2016065495A1 (en) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8065226B2 (en) * | 2000-07-20 | 2011-11-22 | Citicorp Development Center, Inc. | Method and system for performing a cash transaction with a self-service financial transaction terminal |
US7685037B2 (en) * | 2001-03-26 | 2010-03-23 | 3MFuture Ltd. | Transaction authorisation system |
US7742984B2 (en) * | 2001-07-06 | 2010-06-22 | Hossein Mohsenzadeh | Secure authentication and payment system |
US20100235283A1 (en) * | 2006-03-21 | 2010-09-16 | Gerson Howard J | Financial transactions using a communication device |
US8959032B2 (en) * | 2012-10-10 | 2015-02-17 | Quisk, Inc. | Self-authenticating peer to peer transaction |
-
2014
- 2014-10-29 CL CL2014002923A patent/CL2014002923A1/en unknown
-
2015
- 2015-10-29 WO PCT/CL2015/000058 patent/WO2016065495A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2016065495A1 (en) | 2016-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2804763T3 (en) | Weak password detection method and apparatus | |
US9288062B2 (en) | Telephone caller authentication | |
BR112016014106A2 (en) | METHOD FOR ENHANCED SECURITY OF A COMMUNICATION DEVICE, AND, COMMUNICATION DEVICE | |
EA201891822A1 (en) | SECURITY OF PERSONAL DEVICES USING CRYPTOGRAPHY BASED ON ELLIPTIC CURVES TO SEPARATE A SECRET | |
BR112017002747A2 (en) | computer implemented method, and, computer system. | |
MX2017014141A (en) | Devices and methods for client device authentication. | |
MX2017012298A (en) | Payment processing system using encrypted payment information, and method therefor. | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
GB2579976A8 (en) | Identity verification using biometric data and non-invertible functions via blockchain | |
MX2019012571A (en) | Systems and methods for device verification and authentication. | |
WO2010093636A3 (en) | Devices, systems and methods for secure verification of user identity | |
MX361793B (en) | Method and system for secure authentication of user and mobile device without secure elements. | |
PH12017500552A1 (en) | Replaceable item authentication | |
MY166564A (en) | A system and method for privacy management for internet of things services | |
WO2011034619A8 (en) | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password | |
ES2952534T3 (en) | A method, system and apparatus using forward secure cryptography for verification of access codes | |
RU2013140418A (en) | SAFE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCIES | |
GB2542512A (en) | Authentication methods and systems | |
WO2017036201A1 (en) | Protection method for cardless account transfer or deposit withdrawal, and mobile phone system | |
EP3690777A3 (en) | Electronic device, certification agency server, and payment system | |
MX2018007696A (en) | Method and system for enhancing the security of a transaction. | |
WO2013182103A3 (en) | Encryption and decryption terminal and encryption and decryption method applied to same | |
RU2018115767A (en) | SYSTEM AND METHOD OF AUTHENTICATION AND ENCRYPTION WITH PROTECTION AGAINST INTERAPTION | |
MX2021008680A (en) | Techniques for call authentication. | |
CL2014002923A1 (en) | Security procedure that avoids fraud and instantly notifies the user when an attempt is made to illegally access bank or commercial accounts without the user's authorization, consists in forcing the user to initiate a telephone session, before using his account and making Your transactions |