EP3100220A1 - Method for securing an electronic transaction - Google Patents
Method for securing an electronic transactionInfo
- Publication number
- EP3100220A1 EP3100220A1 EP15707823.9A EP15707823A EP3100220A1 EP 3100220 A1 EP3100220 A1 EP 3100220A1 EP 15707823 A EP15707823 A EP 15707823A EP 3100220 A1 EP3100220 A1 EP 3100220A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- transaction
- phone
- end user
- audio
- audio file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/305—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wired telephone networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/16—Payments settled via telecommunication systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3272—Short range or proximity payments by means of M-devices using an audio code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
Definitions
- the present invention regards a system and a method for securing an electronic transaction, and more particularly a system and a method for securing an electronic transaction between an application server and an end user.
- Public Key Infrastructure would be a good technological candidate for protecting transactions, but the deployment rate in the market is relatively small due to large costs, cumbersome logistics and with a general lack of interoperability between heterogeneous deployments.
- the system and method solves the above mentioned problems by securing an electronic transaction between an application server and an end user. This is done without sharing any secrets between any parties over insecure equipment, environments or networks.
- the system and method enables the end user to verify an electronic transaction towards an application server, out of band of cyber criminals or other unauthorized parties, without requiring any other pre-requisite on the end user side than being able to take a phone call within the proximity of a computer with a working loudspeaker connected to a network.
- An application server generates a transaction secret connected to this
- the reason may be that the application has been trigged by a risk parameter, either within the application or provided by another source.
- the application After generating the originating transaction secret, the application generates a proxy secret (PS) that correlates to the origin transaction secret, typically a random number or cryptographically made fingerprint, like a hash value of the transaction secret.
- PS proxy secret
- the application server is then generating and sending a Verification Order (VO) to the Transaction Verification Server (TVS).
- VO Verification Order
- TVS Transaction Verification Server
- TVS is either directly or indirectly connected to at least one Telecom
- the VO includes minimum a trustworthy phone number, order number, the PS, transaction details and a language indicator.
- the VO may optionally include several control indicators (CI) and requirements for each of them, such as identification indicators (II) that shall be used as part of the transaction verification mechanism, call control indicators (CCI) or positioning indicators (PI) that shall be used before the transaction verification mechanism is being started.
- CI control indicators
- II identification indicators
- CCI call control indicators
- PI positioning indicators
- Requirements for (II) may be using an integrated Voice Biometrics system, another type of biometrics system, PKI system, DTMF based authentication method e.g. from a phone banking system, or similar, where the end user already is enrolled.
- Requirements for (CCI) may be denying transaction verification
- Requirement for (PI) may be denying transaction verification service if the correlated geographical distance between web-IP of the end users computer and the end users mobile positioning parameter is outside an acceptable geographical distance stated in the VO.
- the next step of the transaction verification mechanism is starting a process where TVS converts the relevant content delivered within the received VO into audio files with different purposes.
- Audio file #1 comprises a synthetic voice of the ordered language reading the transaction details.
- Audio file #2 comprises the (PS) as an instrumented audio message to be streamed as a sound circuit through the audio based equipment of the end user.
- the audio file #2 is also equipped with error correction and redundancy mechanisms ensuring higher quality and efficiency of the subsequent audio transmission.
- the next step of the process of the transaction verification mechanism is that TVS prepare for setting up the call to the user on the basis of the phone number retrieved from the VO.
- the TVS is able to detect twin SIMs, call forwarding setup, conference call setup or other relevant issues from the telecom network depending of a peer agreement with the integrated Telecom Operator.
- the TVS is able to detect the geographical positioning data for each of the end user devices -computer and mobile phone and if required in the VO providing a correlated distance between the devices.
- TVS is setting up the call towards the end user.
- TVS plays the audio file # 1 over the phone call presenting transactions details in the ordered language, upon optionally identifying the user by a specified method retrieved from the VO.
- the end users identity validation task is provided from TVS to the integrated voice biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
- the end users identity validation task is provided from TVS to the integrated biometrics system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification
- the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
- the end users identity validation task is provided from TVS to the integrated system as a sub-task, waiting for the validation result before TVS proceeds to the next phase of the transaction verification mechanism.
- the next step is that the TVS starts playing audio file #2, streaming the instrumented audio message through the users two devices verifying that the equipment is under both physical and logical control of the identified user.
- the user By operating the physical movement of the phone, the user now verifies the transaction by letting the audio stream from the
- loudspeaker of the computer be recorded by the microphone of the phone. a.
- the user wants to cancel the transaction verification, the user only needs to hang up the phone call and thereby physically prohibit the transaction from being executed.
- TVS is after decoding comparing the inbound audio with the outbound audio of audio file #2.
- TVS analyse the bit stream and audio packets, adjust the inbound audio with error correction and redundancy measures of the TVS audio based protocol until perfect match possibly is achieved.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO20140098A NO337813B1 (en) | 2014-01-28 | 2014-01-28 | Procedure for securing an electronic transaction |
PCT/NO2015/050018 WO2015115908A1 (en) | 2014-01-28 | 2015-01-28 | Method for securing an electronic transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3100220A1 true EP3100220A1 (en) | 2016-12-07 |
Family
ID=52598808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15707823.9A Ceased EP3100220A1 (en) | 2014-01-28 | 2015-01-28 | Method for securing an electronic transaction |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3100220A1 (en) |
NO (1) | NO337813B1 (en) |
WO (1) | WO2015115908A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6934858B2 (en) * | 1999-12-15 | 2005-08-23 | Authentify, Inc. | System and method of using the public switched telephone network in providing authentication or authorization for online transactions |
GB2427286A (en) * | 2005-06-11 | 2006-12-20 | Harley Clark | Financial transaction method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7082533B2 (en) * | 2000-08-04 | 2006-07-25 | First Data Corporation | Gauging risk in electronic communications regarding accounts in ABDS system |
US7461258B2 (en) * | 2002-05-24 | 2008-12-02 | Authentify, Inc. | Use of public switched telephone network for capturing electronic signatures in on-line transactions |
US8934865B2 (en) * | 2006-02-02 | 2015-01-13 | Alcatel Lucent | Authentication and verification services for third party vendors using mobile devices |
EP1921578A1 (en) * | 2006-11-13 | 2008-05-14 | Yellow One Asset Management Ltd. | Payment method and system between the buyer and seller by means of a third party |
US20120203695A1 (en) * | 2011-02-09 | 2012-08-09 | American Express Travel Related Services Company, Inc. | Systems and methods for facilitating secure transactions |
NO333223B1 (en) * | 2011-07-13 | 2013-04-15 | Trond Lemberg | Alternate PIN transfer |
US20130204786A1 (en) * | 2012-02-03 | 2013-08-08 | Daniel Mattes | Verification of Online Transactions |
-
2014
- 2014-01-28 NO NO20140098A patent/NO337813B1/en unknown
-
2015
- 2015-01-28 EP EP15707823.9A patent/EP3100220A1/en not_active Ceased
- 2015-01-28 WO PCT/NO2015/050018 patent/WO2015115908A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6934858B2 (en) * | 1999-12-15 | 2005-08-23 | Authentify, Inc. | System and method of using the public switched telephone network in providing authentication or authorization for online transactions |
GB2427286A (en) * | 2005-06-11 | 2006-12-20 | Harley Clark | Financial transaction method |
Non-Patent Citations (1)
Title |
---|
See also references of WO2015115908A1 * |
Also Published As
Publication number | Publication date |
---|---|
NO20140098A1 (en) | 2015-07-29 |
NO337813B1 (en) | 2016-06-27 |
WO2015115908A1 (en) | 2015-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10764043B2 (en) | Identity and content authentication for phone calls | |
US20090025075A1 (en) | On-demand authentication of call session party information during a telephone call | |
CN101248613B (en) | Authentic device admission scheme for a secure communication network, especially a secure ip telephony network | |
US8156335B2 (en) | IP address secure multi-channel authentication for online transactions | |
US9077566B2 (en) | Caller ID callback authenticationi for voice over internet protocol (“VoIP”) deployments | |
US8522344B2 (en) | Theft of service architectural integrity validation tools for session initiation protocol (SIP)-based systems | |
US7920680B2 (en) | VoIP caller authentication by voice signature continuity | |
US8345871B2 (en) | Fast authentication over slow channels | |
US20150333914A1 (en) | Method and system for authentication | |
US8681783B2 (en) | Prevention of call spoofing in a Voice over Internet Protocol (VoIP) network | |
US20090046839A1 (en) | Verifying authenticity of called party in telephony networks | |
US11042613B2 (en) | Enhanced user authentication based on device usage characteristics for interactions using blockchains | |
KR20140005306A (en) | Continuous voice authentication for a mobile device | |
CN102802150B (en) | phone number verification method, system and terminal | |
US8769623B2 (en) | Grouping multiple network addresses of a subscriber into a single communication session | |
US8023654B2 (en) | Securing multimedia network communication | |
US10893414B1 (en) | Selective attestation of wireless communications | |
CN110839036B (en) | Attack detection method and system for SDN (software defined network) | |
US20230088868A1 (en) | Systems and methods for indicating and managing a validation of a caller identification to prevent identity spoofing | |
Du et al. | {UCBlocker}: Unwanted call blocking using anonymous authentication | |
US10063699B1 (en) | Method, apparatus and computer program product for verifying caller identification in voice communications | |
KR101216005B1 (en) | System for protecting SIP internet phone attack under encrypted signal circumstance | |
CN113194069B (en) | Communication tracing method, communication tracing device and medium based on block chain | |
EP3100220A1 (en) | Method for securing an electronic transaction | |
CN112865975A (en) | Message security interaction method and system, and signaling security gateway device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20160829 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20180307 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: OKAY AS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20201015 |