FR2746202A1 - Secure marking to allow electronic detection of lost or falsified cheques - Google Patents
Secure marking to allow electronic detection of lost or falsified cheques Download PDFInfo
- Publication number
- FR2746202A1 FR2746202A1 FR9603161A FR9603161A FR2746202A1 FR 2746202 A1 FR2746202 A1 FR 2746202A1 FR 9603161 A FR9603161 A FR 9603161A FR 9603161 A FR9603161 A FR 9603161A FR 2746202 A1 FR2746202 A1 FR 2746202A1
- Authority
- FR
- France
- Prior art keywords
- check
- encryption
- certification
- checks
- bank
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
- G07F7/0886—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
Landscapes
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Storage Device Security (AREA)
Abstract
Description
PROCEDE ET DISPOSITIF DE DETECTION INFORMATIQUE PAR
CARTE A PUCE DE CHEQUES PERDUS VOLES OU FALSIFIES EN
L'ABSENCE D'INTERVENTION DE LA VICTIME.METHOD AND DEVICE FOR COMPUTER DETECTION BY
CHIP CARD OF LOST CHECKS STOLEN OR FALSIFIED IN
NO INTERVENTION OF THE VICTIM.
La présente invention a pour objet un procédé et un dispositif de mise en oeuvre de celui-ci qui est basé sur l'adjonction d'une codification de cartification des deux élements principaux du libellé: l'ordre et le montant ; et ce, au moyen d'un libelleur codificateur de format analogue à celui d'un carnet d'adresse électronique. Ce qui permet, conime nous allons pouvoir le constater au cours de la description qui va suivre, de faire barrage aussi bien à l'utilisation indue des chèques volés ou perdus qu'à celles des chèques falsifiés au cours d'une interception illicite durant letn transit.The subject of the present invention is a method and a device for implementing it which is based on the addition of a codification of cartification of the two main elements of the wording: the order and the amount; using a format coding label similar to that of an e-mail address book. This allows, as we will see in the following description, to block both the improper use of stolen or lost checks and falsified checks during an unlawful interception during transit.
D'autres avantages du procédé qui fait l'objet de la présente invOltion et du dispositif qui le met en oeuvre apparaîtront au regard de la description des figures qui représentent:
FIGURE 1 > une we de face d'un mode de iéalisation du libelleur qui met en oeuvre le procédé qui fait l'objet de la présente invention.Other advantages of the method which is the subject of the present invention and of the device which implements it will appear with regard to the description of the figures which represent:
FIG. 1 is a front view of an embodiment of the invention which implements the method which is the subject of the present invention.
FIGURE 2 : une vue en coupe du libelleur.FIGURE 2: a sectional view of the designer.
FIGURE 3 : une maquette du libellé de chèque donnéc à titre d'exemple non lirnitatif.FIGURE 3: A model of the check wording given as a non-qualifying example.
FIGURE 4 : une vue schématique grossière de l'interrogateur par fax répondant
oui sans problème ou non avec problème. FIGURE 4: A rough schematic view of the answering fax interrogator
yes no problem or no problem.
LE. PROCEDE:
Il consiste à authentifier la source d'émission des chèques par l'adjonction d'un codage chiffré des deux éléments essentiels de son libellé: : le nom du bénéficiaire du chèque et la somme qui lui est allouée au moyen d'un libelleur électronique 5 qui peut se présenter avantageusement son la foraine d'un ordinateur de poche avec un clavier alpha numérique. Ce libelleur cextificateur 5 devient codeur au moyen d'une carte à puce comme suit: la calte à puce contiens un codage spécifique individuel pour chaque compte, de chaque lettre de l'alphabet pour N rangs d'utilisation qui est mémorisé dans la mémoire informatique de la banque. Ce qui permet un cryptage individualise' d'un utilisateur à l'autre sein d'un même organisme bancaire. Mais afin d'éviter une extrapolation de l'algorithme cte gestion de codage sur la base d'un échantillon même important de chèques d'un même émetteur et donc d'un même c < )de de base en paiticulier en cas d'interceptions de chèques libellés, on paramètrera ce codage par une deuxième variable qui sera. le cryptage obtenu par le codage du montant. On pourra même au besoin y ajouler une troisième variable comme par exemple le rang du chèque libellé au sein de son carnet à souche. Ces paramètrages étant assurés par le processeur (non représenté) du libelleur 5 selon les mêmes lois que celles mémorisées dans le programme de la banque. THE. PROCESS:
It consists in authenticating the source of issuance of checks by adding an encrypted coding of the two essential elements of its wording: the name of the beneficiary of the check and the amount allocated to it by means of an electronic which can be advantageously its the fairground of a handheld computer with an alpha numeric keypad. This enciphering fabricator 5 becomes an encoder by means of a smart card as follows: the smart card contains an individual specific coding for each account, of each letter of the alphabet for N ranks of use which is stored in the computer memory form the bank. This allows for individualized encryption from one user to another within the same banking organization. But in order to avoid an extrapolation of the coding management algorithm on the basis of a very large sample of checks of the same issuer and therefore of the same base number in particular in the event of interceptions. of checks written, we will parameterize this coding by a second variable which will be. the encryption obtained by the coding of the amount. We can even add a third variable if necessary, such as the rank of the check written in his book. These settings being provided by the processor (not shown) of the fabricator 5 according to the same laws as those stored in the program of the bank.
Sachant que la machine ne fonctionne qu'au moyen de la calte à puce et que l'activation de celle-ci après insertion de la carte 8 dépend elle même d'un code d'entrée il faudra, pour utiliser un chèque volé être également en possession de la carte, de son code d'accès et d'une machine. ll en résulte qu'avant même que le propriétaire d'lm chéquier ne se soit aperçu de sa disparition, il est déjà protégé. Knowing that the machine only works by means of the chip smart and that the activation of it after insertion of the card 8 itself depends on an input code it will be necessary to use a stolen check to be also in possession of the card, its access code and a machine. As a result, even before the owner of a checkbook has noticed his disappearance, he is already protected.
Car aussi bien: en chambre de compensation qu'au niveau de la banque de l'émetteur du chèque, une lecture optique de celui sur un dispositif infornatique disposant de l'ensemble des données de cryptage, tout libellé de chèque non effectué selon les règles de ce clyptage révélera par Sa non conformité, son caractère illicite.Because as well: in the clearing house at the level of the bank of the issuer of the check, an optical reading of the one on a computer device having all the encryption data, any check wording not made according to the rules this clyptage will reveal by its non conformity, its illicit character.
Cette lecture optique pourra être même effectuée au rnoyen de l'interrogation du système informatique par fax, via le lecture optique dont il suffit d'assurer le chargement par automatique de l'arrivage de celui-ci. (Chaque fax de chèque libellé de cette façon transreis par tout bénéficiaire désireux de s'assurer de la validité de celuici.; pour permettre à un commerçant de s'assurer qu'il ne s'agit pas d'un chèque volé utilisé avant même l'alerte du possesseur du compte)
Le libelleur 5 pourra donc également se présenter sous la forme d'une calculette électronique équipée d'un lecteur 12 de carte à puce analogue à ceux qui équipent les téléphones portables. 11 est équipé d'un tableau d'affichage à cristaux liquides 6, d'un clavier alpha numérique 7 et dans une seconde version d'une imprimante du type de celles qui sont adjointes à certaines calculettes de poche ; contenant un processeur qui gère les algorithmes propres au cryptage du codage contenu dans la dite calte à puce 8 du dit libelleur 5. L'utilisateur du libelleur électronique S selon la présente invention verra apparaître une fois qu'il aura libellé : le nom du bénéficiaire ainsi que le montant de la somme correspondant au montant du chèque et qu'il les aura validées une série de chiffres qui constituent le cryptage et résultent du paramétrage selon les lois que nous avons définies plus haut. This optical reading can be even carried out by means of the interrogation of the computer system by fax, via the optical reading of which it is sufficient to ensure the loading by automatic delivery of it. (Each check fax written in this manner transcribed by any beneficiary wishing to verify the validity of the check, to enable a merchant to ensure that it is not a stolen check used even before the alert of the owner of the account)
The designer 5 may also be in the form of an electronic calculator equipped with a smart card reader 12 similar to those that equip mobile phones. 11 is equipped with a liquid crystal display board 6, a digital alpha keyboard 7 and in a second version of a printer of the type of those which are associated with certain pocket calculators; containing a processor that manages the algorithms specific to the encryption of the encoding contained in said smart chip 8 of the said denier 5. The user of the electronic designer S according to the present invention will appear once he has written: the name of the beneficiary as well as the amount of the sum corresponding to the amount of the check and that it will have validated them a series of figures which constitute the encryption and result from the parameterization according to the laws which we defined above.
Le libelleur de chèque de sécuritc 5 selon la présente invention sera bien sûr avantageusement connectable à toues les imprimantes du commerce au moyen d'un connecteur standard 9 Dans un cas comme dans l'autre, le chèque sera libellé avec le nom du bénéficiaire ainsi que le montant du chèque et le cryptage auquel aboutit le parainétrage du code personnel de codage de la carte, paramétré éventuellement à leur tour par les algorithmes spécifiques de sa machine lesquels sont à leur tour paramétrés par le résultat de cryptage auquel aba t le libellé de la somme pour aboutir au cryptage final 2 et 3 tel qu'il apparaît à à ù(rLt indicatif d'exemple sur le chèque l. The security check wording 5 according to the present invention will of course be advantageously connectable to all commercially available printers by means of a standard connector. In either case, the check will be denominated with the name of the beneficiary as well as the amount of the check and the encryption that results from the paragnoting of the card's personal coding code, which may in turn be set by the machine's specific algorithms, which are in turn parameterized by the encryption result to which the wording of the sum to result in the final encryption 2 and 3 as it appears at ù (example indicative on the check l.
Le lectewlr optique de la banque relié à son infonnatique détectera éventuellement même en temps réel toute anomalie entre le cryptage délivré et celui qui aurait dû l'être. Attendu que le chèque est imprime. avec un signe ineffaçable de reconnaissance comme une couleur particulière par exemple et/ou la mention Chèque à cryptage de haute sécurité ainsi que le N de Fax,il ne pourra pas être utilisé sans la carte à puce ni sans le code d'entrée de celle-ci , voire dans une version plus sophistiquée offrant davantage de sécurité encore sans encore la machine spécifique, qui pourra avantageusement, dans ce cas, être remplacée par un ordinateur relié à une imprimante. The optical readout of the bank connected to its computer will eventually detect even in real time any anomaly between the encryption issued and that which should have been. Whereas the check is printed. with an indelible sign of recognition such as a particular color for example and / or the mention Check with high security encryption and the N of Fax, it can not be used without the smart card or without the input code of the one or even in a more sophisticated version offering even more security without the specific machine, which can advantageously, in this case, be replaced by a computer connected to a printer.
Outre le Çait que le chèque se présente de manière tout à fait spécifique dans son aspect, la couleur par exemple et/ou une mention très voyante CHEQUE HAUTE SECURITE fera que tout chèque haute sécurité selon la présente invention qui serait libellé sans son cryptage de certification n'aurait plus aucun crédit auprès de quiconque. In addition to the fact that the check is very specific in its appearance, the color for example and / or a very conspicuous mention CHECK HIGH SECURITY will make any high security check according to the present invention which would be worded without its certification encryption no longer have any credit with anyone.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9603161A FR2746202A1 (en) | 1996-03-13 | 1996-03-13 | Secure marking to allow electronic detection of lost or falsified cheques |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9603161A FR2746202A1 (en) | 1996-03-13 | 1996-03-13 | Secure marking to allow electronic detection of lost or falsified cheques |
Publications (1)
Publication Number | Publication Date |
---|---|
FR2746202A1 true FR2746202A1 (en) | 1997-09-19 |
Family
ID=9490147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR9603161A Withdrawn FR2746202A1 (en) | 1996-03-13 | 1996-03-13 | Secure marking to allow electronic detection of lost or falsified cheques |
Country Status (1)
Country | Link |
---|---|
FR (1) | FR2746202A1 (en) |
-
1996
- 1996-03-13 FR FR9603161A patent/FR2746202A1/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10726151B2 (en) | Methods and apparatus for securely displaying digital images | |
US11301585B2 (en) | Methods and apparatus for securely displaying digital images | |
US8612854B2 (en) | Methods and apparatus for securely displaying digital images | |
TWI511518B (en) | Improvements relating to multifunction authentication systems | |
US5673320A (en) | Method and apparatus for image-based validations of printed documents | |
US20130243266A1 (en) | iPassport Apparatus and Method | |
FR2860670A1 (en) | METHOD OF SECURING TRANSACTION FROM CARDS HAVING UNIQUE AND INREPRODUCIBLE IDENTIFIERS | |
US8152056B2 (en) | Secure cards and methods | |
KR20090005336A (en) | Methods and systems for secure transactions with electronic devices | |
FR2471632A1 (en) | APPARATUS AND METHOD FOR ENCODING AND DECODING A CARD DELIVERED TO AN INDIVIDUAL BY AN ENTITY | |
MXPA06008875A (en) | Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information. | |
FR2985344A1 (en) | BANK CARD AND METHOD OF RESPONSE TO A TRANSACTION REQUEST. | |
WO2010100064A1 (en) | Method for securely drawing up a virtual multiparty contract capable of being physically represented | |
Rosenbaum | Grokking bitcoin | |
FR2746202A1 (en) | Secure marking to allow electronic detection of lost or falsified cheques | |
Masters et al. | Forensic data recovery and examination of magnetic swipe card cloning devices | |
Souvignet et al. | Payment card forensic analysis: From concepts to desktop and mobile analysis tools | |
Salman | Identity theft on social media for the system of banking sector in Islamabad | |
Chaum | Numbers can be a better form of cash than paper | |
Singh et al. | A proposed framework to prevent financial fraud through ATM card cloning | |
Ashraf et al. | IRISteg: A novel approach to improve the security of mobile banking transactions by using iris data in Steganography | |
Qiz | Electronic payment system and blockchain as its vital part | |
Rohilla | Strengthening Financial Resilience: A Holistic Approach to Combatting Fraud | |
FR2806185A1 (en) | Secure transaction procedure between a purchaser and a vendor, uses certification body providing transaction number and validation key to transaction parties and to financial body | |
Rachmadi | Model for Data Hiding Using Steganography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ST | Notification of lapse |