CN1882963A - Transaction verification system - Google Patents

Transaction verification system Download PDF

Info

Publication number
CN1882963A
CN1882963A CNA2004800234579A CN200480023457A CN1882963A CN 1882963 A CN1882963 A CN 1882963A CN A2004800234579 A CNA2004800234579 A CN A2004800234579A CN 200480023457 A CN200480023457 A CN 200480023457A CN 1882963 A CN1882963 A CN 1882963A
Authority
CN
China
Prior art keywords
transaction
data
transaction processing
mobile communication
communication equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004800234579A
Other languages
Chinese (zh)
Inventor
塞尔维纳坦·纳拉因萨米
阿黛尔·K·纳拉因萨米
安德鲁·G·怀特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CN1882963A publication Critical patent/CN1882963A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This invention uses separate, parallel communication channels to authorise and authenticate a transaction. A primary data channel (PSTN, radio or the like) is used to communicate between the merchant terminal and the bank, and a parallel data channel (a mobile phone network for instance) is used for the authentication process. In the example, the transaction is initiated (on a primary data channel), using a POS terminal as a transaction processing client. The transaction processing server and financial services provider fulfill their normal functions. At this point, the process loops into a transaction authorisation component using the parallel data channel, that requires authentication of the transaction initiator (the card holder). In the example, communications on the parallel data channel are by way of SMS. In the authorisation process, the card holder receives an SMS requesting authorisation of the transaction. If the card holder is not the transaction initiator, the card holder can cancel the transaction. If the transaction can be authorised, an authentication process is initiated in which the mobile phone is programmed to require the entry of a normally secret code (such as a personal identification number (PIN)) that serves to authenticate the card holder and to give final authorisation of the transaction.

Description

Transaction verification system
Technical field
The present invention relates to the system of processes financial transactions.
Background technology
Be used at present in the system of authorizes financial transactions, be difficult to even the people that usually can not guarantee to start transaction certainly is believable and is to authorize to conclude the transaction.The processing that present financial institution carries out can obtain doing the fund seldom other work on the account that guarantees distribution.This processing is an authorized transactions after guaranteeing to finish the fund that exchange needs.But regrettably, this processing does not provide any type of authentication or does not make any other instruction on this concrete account of believable really and Authorized operation of the people who carries out this transaction.
Lack checking and be debatable and cause some fraud conditions, especially in the transaction based on the internet.
The present invention is also avoiding the swindle based in the transaction of check to be applied.Although electronic funds transfer device constantly increases and the use of this device constantly increases, commercial check is still one of main method of payment, when relating in particular to big number.Regrettably, check is the target of relatively easily being swindled.This mainly causes for this reality of manually-operated owing to the check fraud inspection still leadingly.
The present invention seeks to solve problem above-mentioned by the processing that provides a kind of authentication mechanism and carried out before authorized transactions.
In addition, the present invention seeks to introduce a kind of that make these process automations at least in part rather than depend on the current artificial confirmation and the mechanism of proof procedure.
In fact, the present invention is characterised in that and uses two communication port authorized transactions that independently (walk abreast).Particularly, this means and utilize main data channel (common user's telephone network (PSTN), radio etc.) between commercial terminal and bank, to communicate by letter, and be that checkout procedure between bank and the client is used a different data channel (for example mobile telephone network).The advantage of this method is, if swindle the data that need on intercepting and synchronous these two communication ports.Utilize 128 encryption key and before the request of bank server surpasses in two minutes (actual conditions in South Africa at present), the system of breaking in is impossible.
This document general introduction this PSTN as main data channel and mobile phone (GSM) network as the parallel mandate of the passage that moves in the performing check also and the application of authentication system.
Under the linguistic context in this explanation:
" server " provides any entity, machine, system or the application of the desired function of financial transaction verification system of the present invention;
" authorization code " is to allow to carry out code or other data of maintaining secrecy usually that exchange needs;
" control " is the ability of authorizing or forbidding transaction processing, and it reaches by providing or detaining the authorization code or other data that allow to carry out exchange's need usually;
Term " telecommunications " mainly uses under the conventional meaning that relates to the communication on the telephone network, but this term needn't only be subjected to the restriction of this explanation but explain it is possible widely under this linguistic context in each example, promptly should more broadly explain this term, for example comprise transmitting and receiving service;
Although this instructions general introduction is used as PSTN main data channel and mobile phone (GSM) net is used as the parallel mandate of the passage that moves in the performing check also and the application of checking system, should understand that this just carries out for purpose of explanation and be not used for scope of the present invention is limited on these communication ports.
Summary of the invention
Financial transaction verification system of the present invention comprises:
The transaction processing client computer;
Transaction processing server under the financial services provider control;
Programmatic telecommunication client computer under the transaction promoter controls;
This transaction processing client computer, this transaction processing server and this telecom client machine all are connected to or are suitable for being connected to telecommunications network;
In using, start by the transaction processing client computer and when handling transaction the transaction processing client computer be suitable for record:
Use the relevant data of the transaction of passing through transaction promoter startup down; And
This transaction promoter is for the relevant data of the accounts of finance of this financial services provider;
This transaction processing client computer is suitable for by telecommunications network the data of record being sent to this transaction processing server;
This transaction processing server is suitable for utilizing relevant this transaction promoter's data and the data of relevant this telecom client machine of in advance this financial services provider being stored form transaction authorization request to this telecom client machine;
This transaction processing server is suitable for sending this transaction authorization request by this telecommunications network to this telecom client machine;
This telecom client machine be programmed to request to authorization code of this telecom client machine input with as the prerequisite that this transaction authorization request is further handled; And
This telecom client machine also is programmed to transaction processing server and transaction processing client computer one or both of is sent result message, and:
If the input error authorization code, this result message is made of the transaction cancelling signal; And
If input proper authorization sign indicating number, this result message is made of the Trading Authorization signal.
This financial transaction verification system can be used as the telecom client machine to transaction promoter individual's mobile communication equipment (for example mobile phone) easily, in the case:
The financial services provider transaction originator data of storage in advance comprises unique mobile communication equipment data, and these data are unique to this mobile communication equipment and are stored in this equipment;
Transaction processing server is suitable for sending the unique mobile communication equipment data and the mandate of storing in advance to mobile communication equipment and please hands over;
Mobile communication equipment is programmed to, in case the data that reception sends, the relatively data of this transmission and the unique mobile communication equipment data that are stored in the equivalence in this mobile communication equipment;
The telecom client machine also is programmed to transaction processing server and transaction processing client computer one or both of is sent result message, and this result message alternately is made of transaction cancelling signal or Trading Authorization signal;
Mobile communication equipment also is programmed to:
If data that send and be stored in relatively failure between the equivalent data in the mobile communication equipment send the result message that is made of the transaction cancelling signal; And
If relatively success, the authorization code that request provides as the prerequisite of further handling this transaction authorization request in advance to this mobile communication equipment input; And
If import incorrect authorization code, send the result message that constitutes by the transaction cancelling signal; And
If import correct authorization code, send the result message that constitutes by the Trading Authorization signal.
This system can be adapted to, and Cancels Transaction under the incident of telecom client machine reception transaction cancelling signal, perhaps allows this transaction to enter foregone conclusion under the incident of telecom client machine reception Trading Authorization signal.
The present invention includes and one or more use for the system that illustrates in the above:
The transaction processing client computer;
Transaction processing server;
Telecommunication server; And
The telecom client machine.
In addition, the present invention includes a kind of method of verifying financial transaction, the method comprising the steps of:
On the transaction processing client computer, start transaction;
By the relevant data of this transaction processing client recording and this transaction and record transaction promoter relevant data to the financial account number of financial services provider;
Under the control of financial services provider, send recorded data from this transaction processing client computer to transaction processing server by telecommunications network;
To this transaction processing server provide previous that store for this financial services provider and with relevant data of telecom client machine under this transaction promoter controls;
Send and the relevant authorization requests of transaction that should start to this telecom client machine;
In case receiving such transaction authorization request requires this telecom client machine input as the authorization code of further handling the prerequisite of this transaction authorization request;
Send result message to this transaction processing server and this transaction processing client computer one or both of, and
If import incorrect authorization code, this result message is made of the transaction cancelling signal; And
If import correct authorization code, this result message is made of the Trading Authorization signal.
At the telecom client machine is under transaction promoter individual's the situation of mobile communication equipment (for example mobile phone), this method described above can be included in this financial services provider place stores the part to this mobile communication equipment data conduct unique and that store communication data relevant with this transaction promoter in this mobile communication equipment preliminary step, and this method also comprises step:
Send this unique mobile communication equipment data and authorization requests from this transaction processing server to this mobile communication equipment;
In this mobile communication equipment, in case data and authorization requests that reception sends, relatively the mobile communication equipment data of the equivalence of storing in unique mobile communication equipment data of Fa Songing and this mobile communication equipment; And
If data that send and the relatively failure that is stored in the equivalent data in this mobile communication equipment send the transaction cancelling signal to transaction processing server and transaction processing client computer one or both of; And
If relatively success requires to import the authorization code that the prerequisite of this transaction authorization request is further handled in the conduct that is provided in advance in the mobile communication equipment; And
If import incorrect authorization code, send the transaction cancelling signal to transaction processing server and transaction processing client computer one or both of; And
If import correct sign indicating number, send the Trading Authorization signal to transaction processing server and transaction processing client computer one or both of.
A kind of method of financial transaction of verifying can comprise additional step routinely:
Receive under the transaction cancelling signal incident at the telecom client machine, Cancel Transaction; And
Receive under the Trading Authorization signal event at the telecom client machine, allow transaction to enter foregone conclusion.
The method of this checking financial transaction can be applicable to also verify and relates to the transaction of using written negotiable bill that this method can comprise step routinely in the case:
Send negotiable bill by the negotiable bill publisher artificially that participates in and start transaction;
By the transaction processing client recording data relevant, comprise the tentation data relevant with this negotiable bill with this transaction;
Send recorded data from the transaction processing client computer to transaction processing server by telecommunications network;
Send the negotiable bill publisher code unique to financial services provider and transaction processing server one or both of to this negotiable bill publisher, thus transaction processing server is confirmed to send, comprising the tentation data relevant with this negotiable bill with should the relevant data of transaction;
Write down the data of being confirmed at transaction processing server; And
When in using, presenting this negotiable bill for payment, data that in this written negotiable bill data at par and the transaction processing server this negotiable bill write down relatively.
Under this mode, on negotiable bill, be provided with " electronic signature " in fact by the negotiable bill publisher who uses unique negotiable bill publisher code.If revise negotiable bill data at par, when in order to pay the comparison step failure that this negotiable bill can be summarized when presenting this negotiable bill in the above, payment can be rejected in the case.
Wherein the financial transaction of the transaction terminal that can communicate by letter as the transaction processing client computer, the method comprising the steps of in extensible authentication of the present invention:
Utilize mobile communication equipment to form and encrypt the transaction request that will send to this transaction terminal by first encryption key and the data that are exclusively used in this mobile communication equipment, and
The communication means that is enabled by this transaction terminal utilizes this mobile communication equipment directly to send transaction request to this transaction terminal;
Send this transaction request from this transaction terminal to transaction processing server;
On this transaction processing server:
Receive this transaction request;
Utilize this this mobile communication equipment of data identification that is exclusively used in this mobile communication equipment;
This mobile communication equipment is fetched this first encryption key that is stored in advance on this transaction processing server;
Utilize this first encryption key to decipher the transaction request of this encryption;
Handle this transaction request and produce the relevant result message of handling the result of this transaction request;
Generate second encryption key, this second encryption key is stored on this transaction processing server;
This second encryption key is sent to this transaction terminal;
Utilize this result message of this second encryption keys; And
The result message of this encryption is sent to this mobile communication equipment;
At this mobile communication equipment, extract and store this second encryption key and the result message of this encryption is sent to this transaction terminal; And
At this transaction terminal, the result message of deciphering the result message of this encryption and using this deciphering encourages this transaction terminal.
Description of drawings
Further specify the present invention with reference to the accompanying drawings, in the accompanying drawing:
Fig. 1 is the calcspar of explanation current credit card transaction operating process;
Fig. 2 is the calcspar of explanation internet business operating process;
Fig. 3 is the calcspar that explanation utilizes the credit card trade operating process of system of the present invention;
Fig. 4 is the calcspar based on the credit card trade operating process of internet that explanation utilizes system of the present invention;
Fig. 5 is the calcspar based on the bank transaction operating process of internet that explanation utilizes system of the present invention;
Fig. 6 is the calcspar that explanation utilizes the check trading operating process of system of the present invention;
Fig. 7 is that explanation utilizes the Trading Authorization in the check trading operating process of system of the present invention and the calcspar of confirmation;
A kind of realization of the present invention of the flowchart text of Fig. 8;
Fig. 9 is the calcspar of explanation according to the anti-locking system of check fraud of the present invention;
The calcspar explanation of Figure 10 realizes the equipment that the transaction terminal that can communicate by letter is used as the method for transaction processing client computer in transaction of the present invention; And
The calcspar of Figure 11 (wherein part is the process flow diagram form) illustrates a kind of realization to the inventive aspect shown in Figure 10.
Embodiment
May can understand financial transaction verification system of the present invention best by example with reference to the flowchart text of Fig. 8.
This flowchart text relates to can utilize the simple relatively financial transaction to point of sale (POS) payment terminal of the article payment bought of credit card or check thereon.Utilize credit card to be example, this credit card belongs to this people who buys and in this manual this person is the transaction promoter.The transaction promoter is called in this manual and has in the bank of financial services provider or other financial institution and the credit card account of this credit card link.
Financial services provider operation point of sales terminal, other electronic transaction terminal for example the computing machine that serves as the internet banking terminal of ATM (Automatic Teller Machine) (ATM) and its bank client network and be this network service.
This terminal network is normally from the operation of central server or group of server, and these servers are called transaction processing server in this manual.
In the typical credit card transaction, insert the brush credit card thereon and go up the input trade detail with the POS terminal (transaction processing client computer) of the promoter's that obtains concluding the business details (typically financial services provider held credit card number).
Then the automatic dial-up connection transaction processing server of this transaction processing client computer utilizes static line communication network or PSTN usually.
In the normal processes of incident, utilize present authoring system, authorize or refuse this transaction in the communication process between transaction processing server and financial services provider.
Should understand this network needn't be the static line network, especially owing to use mobile communications network more continually under this occasion.
In this simple licensing process, unlikely detect some credit card fraud patterns of present use, especially duplicate or clone credit card.
Two side's licensing processs are proposed to adopt in essence by system of the present invention for this reason, and it comprises initial transaction initiation part and final Trading Authorization part; The latter is devoted to final Trading Authorization and account holder (transaction promoter) checking.This verification step is to be undertaken by the transaction promoter, the transaction promoter is in the Optimal Control status and guides this verification step under the help of native system and financial services provider, and wherein financial services provider provides this transaction promoter's credit and serves as the transaction record keeper.It is important that this transaction record keeps function, because it not only is used to verify transaction and transaction promoter and is used to verify that in fact this transaction promoter authorizes the fact of this transaction, can swindle by recoup oneself discussed in detail thereby reduce the back.
Utilize simple credit card trade described above, example of the present invention shown in Fig. 8 utilizes the initiation member of POS terminal (transaction processing client computer), transaction processing server and the financial services provider guiding transaction on general communication stream under the normal function.But, utilize the discrete communication stream that constitutes by mobile communications network this moment, this process is recycled to the final Trading Authorization member of the ultimate authority that requires this transaction promoter (card holder who this account is had authority).
In the example that illustrates in the above, this communication network is to carry out the GSM net that data transmit by SMS communication on it.Should be appreciated that even not good, GPRS (general packet radio service) communication protocols parliament is equal to goodly works.
With reference to this process flow diagram, initiate transaction serving as on the POS terminal of transaction processing client computer as transaction promoter's card holder.Transaction data is input in this transaction processing client computer, these data generally include the details of trading value and transaction promoter credit card number, and wherein this details is to obtain in a usual manner by the magnetic stripe reader that forms this transaction processing client computer part is inserted the brush credit card.
Then, as in the conventional process, this transaction processing client computer dial-up connection forms the transaction processing server of this financial services provider network part and sends transaction data and transaction promoter account data as transaction authorization request to this transaction processing server.
This transaction processing server can obtain the financial records of this financial services provider and in case received by this transaction processing server, transaction processing server inquire about these records with judge this transaction whether finance go up permission-judge especially whether this transaction promoter's credit card account has the enough credit of permitting this transaction.As not, this transaction processing server sends signal to reach the effect of not authorizing this transaction, as taking place usually in the current transaction processing system to this transaction processing client computer simply.
If upward this transaction of permission of finance, this transaction processing server is searched this card holder or transaction promoter's suitable communication data in this financial service merchant's database, the promoter's that promptly should conclude the business in this case Mobile Directory Number.Then this transaction processing server sends to telecommunication server to transaction authorization request, and it is made of the SMS gateway in this example.In case receive, this telecommunication server converts this transaction authorization request to SMS, and this SMS sends on the telecom client machine that the mobile phone by the card holder constitutes.
Should understand this SMS gateway must be the gateway of enjoying the online preferential route power of mobile communication, thereby can not introduce excessive delay in this Trading Authorization process.
The card holder receives the SMS of a request authorized transactions on the mobile phone of oneself now.If the card holder is not this transaction promoter, then this card holder can should conclude the business in immediate cancel, and also may swindle the warning of crime if desired to the police to financial services provider.
In case do not authorize the selection of (or cancellation) this transaction usually by adopting by the suitable key on the mobile phone, this card holder sends a SMS to this telecommunication server, and the latter changes this SMS and sends cancelling signal by transaction processing server to this transaction processing server.This POS terminal as the transaction processing client computer does not then authorize the result of this transaction to show a piece of news to this.
Under the normal condition of incident, the card holder can be the transaction promoter.
Mobile phone as the telecom client machine is programmed to SMS and the wait input authorization code that shows that this contains this transaction authorization request.This yard got that the financial service merchant provides the card holder or the personal identification number's (PIN) that may be selected by the card holder form usually.
If the card holder selects to accept to authorize the option of this transaction, then by pressing suitable key or key group, this mobile phone sends a SMS to this telecommunication server.
The transaction data that should can comprise PIN and send to transaction processing server from the SMS of this (serving as the telecom client machine) mobile phone through telecommunication server.
In case receive checking transaction data and PIN data by transaction processing server.Especially, card holder's data verification PIN data of contrast financial services provider maintenance.If find that for certain reason these PIN data are invalid, send cancellation information to the transaction processing client computer, this client computer does not authorize the result of this transaction to show a piece of news for this.
Under normal circumstances and because these PIN data can be effectively by these PIN data of verification step in the telecom client machine, this transaction data can send to this financial services provider for processing in the case, normally this card holder's of debit account.
This transaction processing server also sends the Trading Authorization signal to the point of sales terminal that this serves as the transaction processing client computer, and the result that this terminal has been authorized for transaction shows a piece of news and produces conventional credit card subpoena for this card holder and transaction promoter signature.
Although with reference to credit card trade this system has been described above, this system works equally well in the authority checking of other financial transaction.
For example, if the transaction processing client computer is that this process of computing machine of serving as internet terminal almost is identical, require once more on the mobile phone of oneself, to import the PIN number to verify the mandate of this transaction as transaction promoter's card holder or account holder.
Once more, part is initiated in the transaction of this process and the Trading Authorization part is carried out on discrete communication stream, and provides ultimate authority by transaction promoter's mobile phone.
Utilize suitable point of sales terminal, under keypad, check reader or the form of the two, system of the present invention is also applicable to the transaction of checking based on check.
This transaction verification process is followed the course of summarizing above, and wherein the individual by this transaction of input PIN code request promoter on the promoter's that promptly concludes the business at personalized relatively equipment the mobile phone authorizes, so that provide final checking to this transaction.
Can utilize message and signal, especially bank account and the PIN code data of various forms of data encryptions encryptions as the part transmission of this Trading Authorization and validation process.
Top relevant financial transaction process is an example of the transaction processing ability of this system.
The present system 10 that mandate credit card trade shown in Figure 1 is adopted.Businessman submits client's credit card 12 to point of sale (POS) equipment 14 in this system.POS equipment 14 " is obtained " this transaction thus to the transaction processing server transmission request and the bank of the bank 16 that has this POS equipment.Normally (its South Africa example is called that SWIFINET finishes by common user's telephone network (PSTN) circuit or based on the service at wireless station for this.This obtains bank by authorisation network 20 that depends on PSTN usually and bank (the publisher bank 18) contact of issuing this card.
Depend on whether can obtain fund, ratify or refuse this request.
If approval, the account of businessman is preserved or transferred to the fund in the clients' accounts by publisher bank 18, publisher bank also correspondingly notice obtain bank 16.Then this obtains bank by this transaction of approved of POS equipment 14 notice businessmans.
Not having the people who uses credit card on any point of this process is legal possessor's assurance really.This process only guarantees the fund that can obtain.This is a process of only authorizing this transaction after guaranteeing to exist the fund of finishing this transaction.But regrettably, this process does not provide any type of checking or any other indication is provided the people's that concludes the business the lawful owner of card really.
The shortage checking is debatable and causes some fraud conditions, especially in the credit card trade based on the internet.
In so-called recoup oneself swindle, the card holder refuses typically to know that transaction takes place, and typical example comprises that the card holder declares not receive that article or the article of receiving and advertisement are not inconsistent.The swindle type that is called " friendly swindle " also belongs to this category.When the card holder wishes to avoid payment may this type of swindle appear embarrassing commodity (for example Pornograph printed matter).Because businessman seldom has the time swindle that these types appear in (perhaps ability, under the internet shopping situation) checking card holder's identity.The result is that the internet shopping is subjected to the attack of card holder's swindle and recoup oneself fine especially easily.
In on-line transaction, have only the financial institution that issues special credit card can conclude credit card end user's identity and authority.
Owing to verified before authorized transactions, parallel proof process of the present invention makes businessman exempt from the recoup oneself swindle.If it guarantees that the card holder knows that transaction is being carried out and the chance of this transaction of cancellation of concluding the business with having swindle.The participation of card holder in this process write down, and promptly passes through in the bank 16,18 one or two.
Credit card trade typically is categorized into two classes, promptly is the card transaction and is not card transaction (internet, phone trading).Data of on duplicating real credit card, storing and transfer to and take swindle (skimming fraud) when pseudo-card is gone up by force.Making great efforts to make such swindle for hour, require the transaction processing personnel to import some card information, normally be imprinted on or be pressed in the number on the card 12.Because card can not be finished transaction separately, parallel proof process protection card holder of the present invention.Before allowing any transaction, the third party of swindle must obtain credit card, have the cell phone of SIM and card holder's checking PIN.
When businessman does not occur businessman's swindle under the authorization conditions the card holder to the credit card number mandate and when obtaining fraudulent trading.Because credit card number can not make Trading Authorization separately, parallel proof process of the present invention can reduce businessman's swindle example.Businessman attempts authorizing any trade fair to show on the card holder's that can cancel cell phone under the permission that does not obtain the card holder thereon.May be programmed to as the cell phone of telecom client machine and to make transaction authorization request SMS comprise merchant number, businessman's title or the two is for the evidence that serves as the swindle of attempting later on.
Most of internets purchase system (as shown in Figure 2) relate on the online webpage 22 of businessman the details of input transaction promoter's credit card 12, normally the part of the cut-off date of card number, card and CVS number or it (being imprinted on a number on the back side of card usually).Utilize the common authorized transactions of these information.
Equally, there is not checking.Anyone can utilize credit card number to do shopping on the net.
Bank has adopted the way that may swindle of such type in the antagonism transaction, is usually directed to send the password that once generates to the client.This method depends on the client that this password arrives expectation, thereby man-in-the-middle attack is exposed this password (this is usually directed to the someone correct destination that is dressed up as, intercept information and the then password that sent of abuse).In order to resist this attack, some banks adopt the keypad that ejects on their website now, and it is intended that and prevents that computer worm from capturing thump.This system can get a beating.
Parallel proof process in the transaction cycle of the present invention comprises existing bank process, but also has the additional identification process before the approval transaction.
Online banking business (internet banking business) is easily, but does not have suitable security.The banking business of this form can be dangerous and bank has introduced some security systems, is included in the screen keypad of the key group that shows the scramble that has the PIN that is used for importing the client on client's the internet terminal.The another kind of method that adopts is to send the PIN of generation to the client with convenient on-line transaction by SMS.
These methods are tending towards introducing new weakness and are safety on the false meaning.At first, by can the rive security of keypad of the relative position that obtains click.The unrest of keypad is put based on set algorithm that can be decrypted.The client is exposed swindle in the fire wall back that computer worm or Trojan Horse are ensconced the client and SMS can be transferred on another phone or this phone is stolen.
The internet banking business can successfully be adopted the parallel proof process of the inventive method.Even still SMS is used as communications carrier, can guarantee user's identity.If this SMS is transferred on another phone, because SIM number of this phone is different with IMEI number, checking can failure.
Although the use of electronic funds transfer mechanism and this mechanism constantly increases, check remains a kind of in the commercial main method of payment, is especially relating under the situation of big number.Regrettably, check is relatively easily to be subjected to taking advantage of the target of being permitted.This mainly is because the check fraud detection still is main this reality with the manual operations.
Current check fraud is so common, thereby many businessmans no longer accept check as payment.The risk of accepting check is too high.Common problem is: the check of returning check drawer (RD) of the number that can not obtain arranging on the check, and clone's check of the beneficiary of change check on it, false signature on the check, or the like.At present, bank attempts by the visual signature screening or dials the family of calling out-customer and carry out the checking of certain form when some number on the check is wanted enchashment.Clearing house cheque just when the client permits only.Weakness in this system is to be transformed into the formal contact number of voice call from the client on any other phone.Bank can not guarantee that the people on the circuit other end is this client truly.
The correct parallel proof process of system of the present invention that realizes can be restricted to check fraud definitely minimum.Since whole process be finish automatically do not have an artificial intervention.
The anti-locking system of check fraud shown in Fig. 9 comprises three discrete subsystems:
Publisher's subsystem;
Central processing subsystem; And
Honour point (presentation point) subsystem.
Expect that a large amount of negotiable bill publishers can participate in such system.For honouring a subsystem also is like this, promptly can see and honour this system of participation in a large number.
Each publisher's subsystem 110 comprises the data entry terminal 112 and the preceding end-apparatus 116 of publisher that have local data base 114.End-apparatus 116 is used for providing data entry format to the distribution user before the publisher.It also provides internet link.
Central subsystem 1100 comprises central database 1102, publisher interface 1104 and honours point interface 1106.
Honour a little 1200 and comprise that respectively one has this is honoured the some data entry terminal of preceding end-apparatus 1104 of honouring that a little user provides data input and data query form.
This system that passes through in service is by following processing payment.
The check publisher who wishes this system of participation must be to this system registry.In check publisher's registration process, the registration negotiable bill publisher code unique in this system to this check publisher.These unique negotiable bill publisher codes can be stored in central subsystem 1100, or the part of central database 1102 or be stored in the discrete database.Negotiable bill publisher code can be anything in from the password to the biometric codes and different access levels can be set so that the operation of convenient this system.In this way, operating personnel can utilize the data entry format that end-apparatus 116 provides before the publisher that the data of relevant one or more check 118 are input in the local data base 114 that forms data entry terminal 112 parts.But the people who then requires to have publisher's last check signing authority imports negotiable bill publisher code, obtains affirmation and comes into force by its data relevant with check or check group 118.
Most of check fraud relate to payee or the number data of handling on the face of the value.The most important data of the relevant check of input in this system, thus relevant payee's, number (preferably literal ground and digitally) data and the relevant data that identifies this check comprised, typically be cheque number.Should import the relevant data on the date of this check of sending in addition routinely.
In case the data of relevant check 118 all are input in the data entry terminal 112, then the check publisher confirms these data by importing suitable circulation ticket publisher code.In fact the check publisher is provided with " electronic signature " on check in this way.Then the check of this " electronic signature " is sent to the payee for handling under conventional process.Simultaneously before the publisher end-apparatus 116 by Internetwork link relevant check 118 effectively after data send to the publisher interface 1104 of central subsystem 1100 and then these data sent to central database 1120 for handling and storing.
Then, wherein honour a little and can constitute by bank, bank teller machines or certain other settlement by check facility of payee honouring check that a little 1200 submissions have arrived the payee so that pay.
In a single day will honour in conventional check disposal system mainly utilizes the artificial technology to confirm check 118, comprise possible the altering and forge and relatively check signatory's actual signature and this signatory's sample signature of visual inspection check, so that judge any forgery whether occurs once more.
Different with this, system of the present invention does not require such inspection.
Honouring a little 1200, simply the related data of check 118 is being input to form and honours in a little preceding end-apparatus 1104 of honouring of point data entry terminal 1102 parts.End-apparatus 1104 is communicated by letter by the point interface 1106 of honouring of inside or Internetwork link and central subsystem 1100 before honouring a little, and this interface 1106 is mentioned the authentication data of relevant this check 118 and honoured in a little preceding end-apparatus 1104.The valid data of this check 118 and appear at the data at par of check 118 relatively immediately when this allows to honour.
Do not need other visual inspection or comparison.If these check 118 data at par are fully corresponding to stored valid data in the central database 1102, can be for this check of payment and settlement or account that can this payee of credit.
If the corresponding data of storage in the corresponding central database 1102 of the data transformation at par of this check 118 on the other hand can not be for this check of payment and settlement.
In addition, do not need to check that check does not need relatively to sign yet.
As shown in Figure 10 and 11, the present invention expands to the financial transaction that checking wherein is used as the transaction terminal that can communicate by letter the transaction processing client computer.
Referring now to cell phone or mobile phone are used as the personal communication devices the present invention is described.In addition, also with reference to point of sale (POS) terminal or ATM (Automatic Teller Machine) (ATM) are used as transaction terminal explanation the present invention.Thereby this just is not used for limiting the present invention purely as an example.
System 310 shown in Figure 10 is a kind of transaction processing systems that utilize cell phone 312 to communicate by letter with POS terminal or ATM 314.The trade fair of request requires the mandate of the financial processing mechanism that is made of financial services provider 316 in this situation in this transaction processing system 310.For ease of reference, this transaction terminal can be an ATM.
Communication between ATM 314 and the financial services provider 316 is by gsm communication device 318.Alternatively or replenish ground, the communication between ATM 314 and the financial services provider 316 can the general communication net that comprises ATM 314 for example routine call carry out on the net.
In order to strengthen the security of transaction processing system 310, the communication between cell phone 312 and the ATM 314 is by very short range communications link.Most of cell phones have infrared transceiver 320.Infrared is comparatively safe short range communication form.Can make ATM 314 load onto infrared transceiver 322 relatively simply.
Wish that the people who initiates transaction imports trade detail simply on cell phone 312, and utilize the appropriate characteristics on this phone to send first infrared signal to ATM 314.
With reference to Figure 11 this process is described best.
As can be as can be seen from Figure 11, the people who wishes to initiate transaction be by transaction data (DT Rr) start in the input phone 312.In case registration in transaction processing system 310 can be provided one by one people's identification code (PIN) and this moment to related people and can be pointed out this people that this PIN is input in the cell phone 312 as data (DPIN).In this cell phone 312, utilize the identification code (ID) (it can be the sequence number of manufacturer or certain other telephone identifying code that distributes) of first encryption key (K1), phone 312 and data (DPIN and the DT of previous input to system's 310 registrations the time Rr) encrypt the data (DT imported RrAnd DPIN).At the transaction request E (DT for preparing to encrypt Rr) time needn't use all these information.
Then by 324 transaction request (E (DT that encrypt of first Infrared Transmission Rr)) send to ATM 314.Can be with expressly sending phone ID.
In case receive among the ATM 314, by the transaction request (E (DT that transmits 326 encryptions Rr)) and phone ID send to financial services provider 316.
The message that financial services provider 316 receives (E (DT Rr): ID) now must deciphering.
Financial services provider 316 is the data of relevant user of storage and phone 312 in its database, and these data are linked to phone 312 by phone ID, user's most important data PIN (DPIN) and first encryption key (K1).The back describes the also mode of storage encryption key that produces in detail.
In case receive the transaction request (E (DT that encrypts Rr): ID), the data of financial services provider 316 these storages of retrieval, it can decipher the transaction request (E (DT of this encryption to utilize these data (especially K1:DPIN) Rr)) and can handle this transaction request.
The result of this processing or positive (for example the distribution of fund or show account information) or can be other result (for example, not the distribution of fund, do not show account information, the fund of not transferring ownership or other message).
Must be people and the ATM 314 of result message communicating to this transaction of request, it finishes some operation because especially can require ATM 314 responses, in view of this information may be responsive, encrypts this message.
Carry out this encryption by the financial services provider that generates second encryption key (K2).Second encryption key (K2) be stored in the database of financial services provider 316 and and phone ID link with later the fetching of facility to this key.Second encryption key (K2) or its derivant can serve as decruption key (K1) in next transaction processing operating process.
Suppose and authorize this transaction, financial services provider produces a Trading Authorization message (DT Ra).It typically is phone ID, PIN number (DPIN) and and this Trading Authorization message (DT that financial services provider 316 is utilized second encryption key (K2) and other data Ra) relevant data encrypt this Trading Authorization message (DT Ra).
Follow by the GSM net the Trading Authorization message (E (DT of this encryption Ra)) send to phone 312, wherein the transmission form of most convenient is Short Message Service (SMS) message 328.Simultaneously, by the communication 330 between financial services provider 316 and the ATM 314, financial services provider 316 sends to ATM 314 to second encryption key (K2).
In case in phone 312, receive, by 332 Trading Authorization message (E (DT that encrypt of second infrared messages Ra)) send to ATM 314.
In ATM 314, utilize from the Trading Authorization message (E (DT of second encryption key (K2) enabling decryption of encrypted of financial services provider 316 receptions Ra)).Second encryption key (K2) be the part as infrared communication 332 send on the phone 312 and the Trading Authorization message (DT of this deciphering Ra) be used for instructing the operation of ATM 314.In this example, indication ATM 314 is somebody's turn to do fund allocation the people of transaction to raw requests.
In phone 312, now second encryption key (K2) is stored in the database.
Explanation internet banking business in Fig. 4.The client logins on the internet of bank banking business webpage.Authentication server sends the checking request to client's cell phone.The client confirms that he knows logging request and imports his/her PIN.If PIN, SIM number and IMEI number conform to his/her account of client access with record.
Another application of the invention is in financial transaction verification system explanation in Fig. 6 and 7 of check trading.
When the client provides the check that supplies payment and before this check of clearing, bank sends check information to this client's cell phone.This client confirms oneself to know this transaction and sends his/her password.Then the SMS that encrypts is sent to authentication server from client's cell phone by WIG.This authentication server correctly responds by cross-check IMEI, SIM card number, MSISDN and password authentication client.Thereby any difference on these parameters can cause authentication failed to refuse this check.
This system can also be used in (referring to Fig. 7) in the process that is similar to the credit card trade operating process.The seller can be sure of to exist on client's the account lawful owner of this check account of enough funds and this client like this.

Claims (16)

1. a financial transaction verification system comprises:
The transaction processing client computer;
Transaction processing server under the financial services provider control;
Programmatic telecommunication client computer under the transaction promoter controls;
This transaction processing client computer, this transaction processing server and this telecom client machine all are connected to or are suitable for being connected to communication network;
When passing through the startup of transaction processing client computer and handling transaction in using, the transaction processing client computer is suitable for record:
Use the relevant data of the transaction of passing through transaction promoter startup down; And
This transaction promoter is to the relevant data of the accounts of finance of this financial services provider;
This transaction processing client computer is suitable for by communication network the data of record being sent to this transaction processing server;
This transaction processing server is suitable for utilizing relevant this transaction promoter's data and the data of relevant this telecom client machine of in advance this financial services provider being stored form transaction authorization request to this telecom client machine;
This transaction processing server is suitable for sending this transaction authorization request by this telecommunications network to this telecom client machine;
This telecom client machine be programmed to request to authorization code of this telecom client machine input with as the prerequisite that this transaction authorization request is further handled; And
This telecom client machine also is programmed to transaction processing server and transaction processing client computer one or both of is sent result message, and:
If the input error authorization code, this result message is made of the transaction cancelling signal; And
If input proper authorization sign indicating number, this result message is made of the Trading Authorization signal.
2. according to the financial transaction verification system of claim 1, wherein this telecom client machine is transaction promoter individual's a mobile communication equipment, in this system:
The financial services provider transaction originator data of storage in advance comprises unique mobile communication equipment data, and these data are unique to this mobile communication equipment and are stored in this equipment;
Transaction processing server is suitable for sending to mobile communication equipment the unique mobile communication equipment data and the authorization requests of storage in advance;
Mobile communication equipment is programmed to, in case the data that reception sends, the relatively data of this transmission and the unique mobile communication equipment data that are stored in the equivalence in this mobile communication equipment;
The telecom client machine also is programmed to transaction processing server and transaction processing client computer one or both of is sent result message, and this result message alternately constitutes by the transaction cancelling signal or with the Trading Authorization signal;
Mobile communication equipment also is programmed to:
If data that send and be stored in relatively failure between the equivalent data in the mobile communication equipment send the result message that is made of the transaction cancelling signal; And
If relatively success, the authorization code that request provides as the prerequisite of further handling this transaction authorization request in advance to this mobile communication equipment input, and
If import incorrect authorization code, send the result message that constitutes by the transaction cancelling signal; And
If import correct authorization code, send the result message that constitutes by the Trading Authorization signal.
3. according to the financial transaction verification system of one of aforesaid right requirement, it is suitable for:
This transaction of cancellation under the incident of telecom client machine reception transaction cancelling signal; And
Under the incident of telecom client machine reception Trading Authorization signal, allow this transaction to enter foregone conclusion.
4. and the transaction processing client computer of using together according to the system of above-mentioned arbitrary claim.
5. and the transaction processing server that uses together according to the system of above-mentioned arbitrary claim.
6. and the telecommunication server that uses together according to the system of above-mentioned arbitrary claim.
7. and the telecom client machine that uses together according to the system of above-mentioned arbitrary claim.
8. method of verifying financial transaction comprises step:
On the transaction processing client computer, start transaction;
By the relevant data of this transaction processing client recording and this transaction and record transaction promoter relevant data to the financial account number of financial services provider;
Under the control of financial services provider, send recorded data from this transaction processing client computer to transaction processing server by telecommunications network;
To this transaction processing server provide previous that store for this financial services provider and with relevant data of telecom client machine under this transaction promoter controls;
Send and the relevant authorization requests of transaction that should start to this telecom client machine;
In case receiving such transaction authorization request requires this telecom client machine input as the authorization code of further handling the prerequisite of this transaction authorization request;
Send result message to this transaction processing server and this transaction processing client computer one or both of, and
If import incorrect authorization code, this result message is made of the transaction cancelling signal; And
If import correct authorization code, this result message is made of the Trading Authorization signal.
9. the method for checking financial transaction according to Claim 8, wherein this telecom client machine is transaction promoter individual's mobile communication equipment and financial services provider the unique data storage with in being stored in this mobile communication equipment of this mobile communication equipment is become the part of the communication data relevant with this transaction promoter, and this method comprises additional step:
Send this unique mobile communication equipment data and authorization requests from this transaction processing server to this mobile communication equipment;
In this mobile communication equipment, in case data and authorization requests that reception sends, relatively the mobile communication equipment data of the equivalence of storing in unique mobile communication equipment data of Fa Songing and this mobile communication equipment; And
If data that send and the relatively failure that is stored in the equivalent data in this mobile communication equipment send the transaction cancelling signal to transaction processing server and transaction processing client computer one or both of; And
If relatively success requires to import the authorization code that the prerequisite of this transaction authorization request is further handled in the conduct that is provided in advance in the mobile communication equipment; And
If import incorrect authorization code, send the transaction cancelling signal to transaction processing server and transaction processing client computer one or both of; And
If import correct sign indicating number, send the Trading Authorization signal to transaction processing server and transaction processing client computer one or both of.
10. according to Claim 8 or the method for 9 checking financial transaction, comprise additional step:
Receive under the transaction cancelling signal incident at the telecom client machine, Cancel Transaction; And
Receive under the Trading Authorization signal event at the telecom client machine, allow transaction to enter foregone conclusion.
11. the method for checking financial transaction according to Claim 8, wherein this transaction relates to the written negotiable bill of use, and the method comprising the steps of:
Send negotiable bill by the negotiable bill publisher artificially that participates in and start transaction;
By the transaction processing client recording data relevant, comprise the tentation data relevant with this negotiable bill with this transaction;
Send recorded data from the transaction processing client computer to transaction processing server by telecommunications network;
Send the negotiable bill publisher code unique to financial services provider and transaction processing server one or both of to this negotiable bill publisher, thus transaction processing server is confirmed to send, comprising with the relevant tentation data of bill that should flow with should the relevant data of transaction;
Write down the data of being confirmed at transaction processing server; And
When in using, presenting this negotiable bill for payment, data that in this written negotiable bill data at par and the transaction processing server this negotiable bill write down relatively.
12. the method for an operational processes server that uses in the financial transaction verification method according to claim 11, the method comprising the steps of:
Reception is from the input of the data relevant with negotiable bill that participate in the negotiable bill publisher;
From each participate in negotiable bill publisher and just with every the unique negotiable bill publisher of Data Receiving code that this negotiable bill is relevant;
By the negotiable bill publisher code and the negotiable bill publisher code that is stored in the transaction processing server of input relatively like this, confirm the validity of each negotiable bill publisher code of input like this; And
When presenting negotiable bill for payment, allow the data that a visit is stored specific negotiable bill of honouring of participation, thus the data that manifest on the nominal value of the data that can relatively store and this negotiable bill.
13. the method for checking financial transaction according to Claim 8, wherein this transaction is used as the transaction processing client computer to the transaction terminal that can communicate by letter, and the method comprising the steps of:
Utilize mobile communication equipment to form and encrypt the transaction request that will send to this transaction terminal by first encryption key and the data that are exclusively used in this mobile communication equipment, and
The communication means that is enabled by this transaction terminal utilizes this mobile communication equipment directly to send transaction request to this transaction terminal;
Send this transaction request from this transaction terminal to transaction processing server;
On this transaction processing server:
Receive this transaction request;
Utilization is exclusively used in this mobile communication equipment of data identification of this mobile communication equipment;
This mobile communication equipment is fetched this first encryption key that is stored in advance on this transaction processing server;
Utilize this first encryption key to decipher the transaction request of this encryption;
Handle this transaction request and produce the relevant result message of handling the result of this transaction request;
Generate second encryption key, this second encryption key is stored on this transaction processing server;
This second encryption key is sent to this transaction terminal;
Utilize this result message of this second encryption keys; And
The result message of this encryption is sent to this mobile communication equipment;
At this mobile communication equipment, extract and store this second encryption key and the result message of this encryption is sent to this transaction terminal; And
At this transaction terminal, the result message of deciphering the result message of this encryption and using this deciphering encourages this transaction terminal.
14., wherein in transaction processing operating process circulation subsequently, use second encryption key of storing in transaction processing server and the mobile communication equipment as first encryption key according to the method for the checking financial transaction of claim 13.
15. according to the method for the checking financial transaction of claim 14, wherein each repeat business is handled operating process and is utilized code saltus step technology to generate second encryption key.
16., wherein in the process of encrypting the transaction request that will send to transaction processing server, also utilize this transaction request of unique code encryption to the people of this requests transaction according to the method for the checking financial transaction of arbitrary claim in the claim 13 to 15.
CNA2004800234579A 2003-06-30 2004-06-30 Transaction verification system Pending CN1882963A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
ZA200305129 2003-06-30
ZA03/5129 2003-06-30
ZA03/6980 2003-09-08
ZA03/8654 2003-11-06

Publications (1)

Publication Number Publication Date
CN1882963A true CN1882963A (en) 2006-12-20

Family

ID=37520241

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004800234579A Pending CN1882963A (en) 2003-06-30 2004-06-30 Transaction verification system

Country Status (1)

Country Link
CN (1) CN1882963A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514536A (en) * 2012-06-28 2014-01-15 马克西姆综合产品公司 Secure payments with untrusted devices
WO2014032207A1 (en) * 2012-08-30 2014-03-06 Wong Kamfu Bank card accounting system with dynamic risk management and corresponding method
CN104951256A (en) * 2015-04-28 2015-09-30 珠海街邻网络有限公司 Printing method, printer and server
CN106575416A (en) * 2014-07-31 2017-04-19 诺克诺克实验公司 System and method for authenticating a client to a device
CN110111087A (en) * 2011-08-30 2019-08-09 D·耶格尔 System and method for authorizing the transaction using not expectable password
CN110892431A (en) * 2017-07-16 2020-03-17 万事达卡国际公司 Method and system for improved transaction processing and routing
US10762181B2 (en) 2013-03-22 2020-09-01 Nok Nok Labs, Inc. System and method for user confirmation of online transactions
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10798087B2 (en) 2013-10-29 2020-10-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12033157B2 (en) 2011-08-30 2024-07-09 Ov Loop, Inc. Systems and methods for authorizing a transaction with an unexpected cryptogram
CN110111087B (en) * 2011-08-30 2024-01-02 欧威环公司 System and method for authorizing transactions utilizing unpredictable passwords
CN110111087A (en) * 2011-08-30 2019-08-09 D·耶格尔 System and method for authorizing the transaction using not expectable password
CN103514536A (en) * 2012-06-28 2014-01-15 马克西姆综合产品公司 Secure payments with untrusted devices
US9858560B2 (en) 2012-06-28 2018-01-02 Maxim Integrated Products, Inc. Secure payments with untrusted devices
US11341472B2 (en) 2012-06-28 2022-05-24 Maxim Integrated Products, Inc. Secure payments with untrusted devices
WO2014032207A1 (en) * 2012-08-30 2014-03-06 Wong Kamfu Bank card accounting system with dynamic risk management and corresponding method
CN104685519A (en) * 2012-08-30 2015-06-03 黄金富 Bank card accounting system with dynamic risk management and corresponding method
US11929997B2 (en) 2013-03-22 2024-03-12 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US10762181B2 (en) 2013-03-22 2020-09-01 Nok Nok Labs, Inc. System and method for user confirmation of online transactions
US10798087B2 (en) 2013-10-29 2020-10-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
CN106575416A (en) * 2014-07-31 2017-04-19 诺克诺克实验公司 System and method for authenticating a client to a device
CN106575416B (en) * 2014-07-31 2020-12-04 诺克诺克实验公司 System and method for authenticating a client to a device
CN104951256A (en) * 2015-04-28 2015-09-30 珠海街邻网络有限公司 Printing method, printer and server
CN104951256B (en) * 2015-04-28 2018-03-13 珠海街邻网络有限公司 A kind of Method of printing, printer and server
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
CN110892431B (en) * 2017-07-16 2023-08-25 万事达卡国际公司 Method and system for improved transaction processing and routing
CN110892431A (en) * 2017-07-16 2020-03-17 万事达卡国际公司 Method and system for improved transaction processing and routing
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication

Similar Documents

Publication Publication Date Title
CN1279498C (en) Code identification method and system
CN1155919C (en) Transaction method carried out with a mobile apparatus
US8930273B2 (en) System and method for generating a dynamic card value
CN1271485C (en) Device and method for proceeding encryption and identification of network bank data
US7379920B2 (en) System and method for facilitating electronic financial transactions using a mobile telecommunication device
CN1908981A (en) Wireless computer wallet for physical point of sale (pos) transactions
US20050119968A1 (en) Systems and methods for verifying identities in transactions
US20060106699A1 (en) System and method for conducting secure commercial order transactions
CN114650139A (en) Authentication password for interaction
CN1449540A (en) Method and system of securely collecting, storing, and transmitting information
CN1635525A (en) Security Internet payment system and security Internet payment authentication method
CN101034449A (en) Method, system and mobile terminal for implementing electronic payment
CN1302406A (en) Method and system for secure transactions in computer system
CN1561498A (en) Apparatus, method and system for payment using mobile device
KR20100135249A (en) Transaction server configured to authorize payment transactions using mobile telephone devices
CN101051372A (en) Method for safety verifying financial business information in electronic business
CN1579079A (en) Enhanced privacy protection in identification in a data communications network
CN1579080A (en) User access control to distributed resources on a data communications network
CN1882963A (en) Transaction verification system
CN1897027A (en) Authentication services using mobile device
CN1802647A (en) Facilitating and authenticating transactions
WO2006023745A2 (en) Conducting secure financial transactions independent of physical location
KR20010087564A (en) User authentification system and the method using personal mobile device
CN1110003C (en) Universal payment coding system for bank
US20200097968A1 (en) System and logic to convert an existing online bank transfer transaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20061220