FR3060172A1 - Transaction method relating to a vehicle. - Google Patents

Transaction method relating to a vehicle. Download PDF

Info

Publication number
FR3060172A1
FR3060172A1 FR1662336A FR1662336A FR3060172A1 FR 3060172 A1 FR3060172 A1 FR 3060172A1 FR 1662336 A FR1662336 A FR 1662336A FR 1662336 A FR1662336 A FR 1662336A FR 3060172 A1 FR3060172 A1 FR 3060172A1
Authority
FR
France
Prior art keywords
terminal
relating
image
user
telecommunications network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
FR1662336A
Other languages
French (fr)
Inventor
Xavier Dequest
Remy Defoin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cg Lib
Original Assignee
Cg Lib
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cg Lib filed Critical Cg Lib
Priority to FR1662336A priority Critical patent/FR3060172A1/en
Priority to FR1662336 priority
Publication of FR3060172A1 publication Critical patent/FR3060172A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/06Buying, selling or leasing transactions

Abstract

The method relating to a transaction concerning a vehicle comprises the implementation of the following steps: a first terminal (11) transmits on a telecommunications network an image of a first user (12) of the first terminal, and - a server transmits the image on a telecommunications network to a second terminal (13) of a second user (14). The transmissions take place in connection with a predetermined transaction file relating to a vehicle between the two users.

Description

® FRENCH REPUBLIC

NATIONAL INSTITUTE OF INDUSTRIAL PROPERTY © Publication number:

(to be used only for reproduction orders)

©) National registration number

060 172

62336

COURBEVOIE

©) Int Cl 8 : G 06 Q 30/06 (2017.01)

PATENT INVENTION APPLICATION

A1

©) Date of filing: 12.12.16. (30) Priority: ©) Applicant (s): CG LIB Simplified joint stock company - FR. ©) Inventor (s): DEQUEST XAVIER and DEFOIN REMY. @) Date of public availability of the request: 15.06.18 Bulletin 18/24. (56) List of documents cited in the preliminary search report: See the end of this brochure (© References to other related national documents: ©) Holder (s): CG LIB Simplified joint-stock company. ©) Extension request (s): ©) Agent (s): LLR.

104 / TRANSACTION METHOD RELATING TO A VEHICLE.

FR 3 060 172 - A1

The method relating to a transaction relating to a vehicle comprises the implementation of the following steps:

a first terminal (11) transmits an image of a first user (12) of the first terminal over a telecommunications network, and

- a server transmits the image over a telecommunications network to a second terminal (13) of a second user (14).

The transmissions take place in relation to a predetermined transaction file relating to a vehicle between the two users.

-1 Vehicle transaction method

The invention relates to transactions relating to a vehicle.

More particularly, the invention relates to sales transactions of used vehicles with in particular the control of the identity of the persons concerned by the transaction. The invention also relates to the recording and payment of these transactions.

Usually, the stages of identity verification of the seller of the vehicle, payment of the vehicle, documents attached to the vehicle and registration of the new owner of the vehicle with the competent services are separate. These steps are either separated by several hours or even several days, as is most often the case, or are not carried out.

In particular, the buyer and seller of the vehicle cannot verify their mutual identities with certainty from the outset. The usual way of proceeding is therefore either tedious or unreliable.

An object of the invention is to improve the security of the transaction.

To this end, there is provided according to the invention a method relating to a transaction relating to a vehicle, comprising the implementation of the following steps:

a first terminal transmits an image of a first user of the first terminal over a telecommunications network, and

- a server transmits the image over a telecommunications network to a second terminal of a second user, the transmissions taking place in relation to a predetermined transaction file relating to a vehicle between the two users.

When the buyer and the seller meet for the first time, one of them can use the image they receive on their terminal, for example their phone, to physically identify the other. This allows him to recognize him in order to exchange views with him and to validate the fact that the image received does indeed come from the person met physically.

The terminal can be a telephone, a tablet or a laptop for example.

Preferably, the second terminal transmits on a telecommunications network a second image of the second user of the second terminal, and a server transmits the second image on a telecommunications network to the first terminal.

Thus, the first user can in turn on his terminal identify the second user. The transaction is thus secured on both sides with regard to identities.

- 2 Advantageously, prior to the preceding steps, at least one of the terminals saves an image of a document relating to an identity of the user of this terminal.

Thus, the image or images exchanged correspond to identity documents, which makes it possible to reinforce the reliability of the identification between the two users.

Preferably, the image or at least one of the images results from a prior extraction of a face from a document relating to an identity of the user.

Thus, we extract from the identity document the photograph of the user's face and it is this photograph that we send to the other user. This not only makes it possible to view the face in more detail, but above all to hide identity information present on the identity document which would not be intended to be made public.

Advantageously, prior to the steps described first,

the first terminal transmits at least one geolocation data item from the first terminal over a telecommunications network,

the second terminal transmits at least one geolocation datum from the second terminal over a telecommunications network, and

- a server performs a geographic proximity test between the first and second terminals.

Thus, the connection or even the transaction continues only if the terminals are close to each other. In this way, the users of the terminals, the buyer and the seller of the vehicle, are forced to meet physically. They can then identify themselves through the images they have received and validate the fact that they are the right interlocutors. This validation is necessary to continue the transaction. This can prevent certain critical steps, such as a payment, from being carried out before a physical meeting between a buyer and a seller.

Preferably, the proximity test includes the implementation of the following steps:

- from the geolocation data of the first and second terminals respectively, determine a distance between the first and second terminals, and

- compare the determined distance to a predetermined threshold.

Thus, if the calculated distance is less than the predetermined threshold, it is estimated that the respective users of the first and second terminals are close to each other, or even in the same place. The following steps are then those described first, concerning the exchange of images. So if they both confirm that the people in front of them match the images from the identity documents that were sent to them, the transaction can continue.

Advantageously, the threshold comprises a constant, for example of 6 meters, to which a tolerance value, for example of 20 meters, is added.

-3 Thus, the constant is a value set up in the process and common to all the terminals. It can be 6 meters, a value that applies to everyone. On the other hand, the tolerance value can vary from 0 to more than 20 meters, depending on the type of terminal, even the type of geolocation device of the terminal and the accuracy of the geolocation at the time of calculation. Thus, if the two geolocation devices of the terminals are considered to be very precise, this value can be 0. In this case, if the tolerance value is 0 meters, and the constant value is 6 meters, it means that 'it is estimated that if the terminals are distant from each other by 6 meters or less, their users are considered to be close to or even in the same place, and therefore able to talk to each other. The value of 6 meters is an example and other values between 2 and 15 meters are possible for example.

Preferably, a server transmits at least one message to the first and second terminals over a telecommunications network, inviting users of the first and second terminals to approach each other.

Thus, if a proximity test result indicates that users are not close enough to each other, they are encouraged to get closer and may not be able to transmit the images of their faces to them. The proximity test can be repeated several times until the users are considered to be close to each other.

Advantageously, prior to the steps described first,

a server transmits at least one code over a telecommunications network to at least one of the first and second terminals so that the or each terminal displays the code or one of the codes, and

- once the or each code entered on the terminal other than that which received the code, a server transmits on a telecommunications network at least to one of the first and second terminals a proposal for linking the first and second terminals .

Thus, the code is transmitted to one of the users, whether the seller or the buyer. The latter, if he wants to connect his terminal with that of the other user, sends the code to the latter. This is worth proposition of connection. To accept this proposal, the other user must enter the code in their terminal. This implies acceptance of the connection. One can alternatively provide two codes, one to the seller, another to the buyer, which exchange codes to lead to the connection of their respective terminals.

Preferably, prior to the steps described first,

- by means of the terminal, an image of a document relating to a user identity is produced or saved by the user,

- the terminal identifies relevant data within the image,

-4- the terminal calculates a scriptural sequence from other image data, and

- the terminal compares the relevant data to the scriptural sequence.

Thus, a data item written on the document, for example an identity card, is compared with data transcribed through a "Machine readable zone" present on this card, so as to verify the information written on the card. We can then confirm or not that this document is not a forgery.

According to the invention, a method is also provided for a transaction of a vehicle, comprising the implementation of the following steps:

- a user's terminal obtains a first image of a document relating to a user's identity,

the terminal transmits the first image over a telecommunications network, this transmission taking place in relation to a predetermined transaction file relating to a vehicle,

- the terminal takes at least one image directly from the user of the terminal and transmits the image or at least one of the images over a telecommunications network.

Thus, even in the case where the user performs a transaction alone, called a single-party transaction, a remote third party can verify his identity by comparing his face received from an identity document saved on his terminal to a second image taken at through the terminal forming a self-portrait. This allows the third party to verify that the user is the owner of the identity document.

Advantageously, the terminal takes several images directly from the user and transmits one of the images over the network.

Thus, the terminal realizes for example a self-portrait in movement or selfie motion of the user. It is a sequence of photos or a short film, the terminal of which then extracts an image to send to the server. This characteristic improves the security of the process by limiting the possibilities of fraud. Indeed, a malicious person could have the terminal take a photograph of a photograph of a person other than him. Making several images or even a film complicates such fraud.

Alternatively, a device compares the first and second images.

So, here, no need for third parties to verify the identity of the user.

Advantageously, this process relates to obtaining a vehicle registration certificate.

This process is used to verify that the applicant for the gray card is indeed the holder of the identity document that he has registered.

There is also provided according to the invention a program comprising code instructions capable of controlling the implementation of a method according to the invention when it is executed on a computer, as well as a method of making the program available.

-5precedent on a telecommunications network for downloading.

A system is also provided according to the invention relating to a transaction relating to a vehicle, comprising:

a first terminal arranged to transmit an image of a first user of the first terminal over a telecommunications network, and

- a server arranged to transmit the image over a telecommunications network to a second terminal of a second user, the transmissions taking place in relation to a predetermined transaction file relating to a vehicle between the two users.

It is a system for implementing a method in accordance with the invention presented above.

A telecommunication terminal is also provided according to the invention, arranged to extract a face of a user of the terminal from an image of a document relating to an identity of the user, and to transmit the image on a telecommunications network, this transmission taking place in relation to a predetermined transaction file relating to a vehicle.

It is a terminal making it possible to implement a method in accordance with the invention presented above.

According to the invention, a server is also provided, arranged to determine whether the faces of two separate images correspond to the same user, the images relating to a transaction relating to a vehicle.

It is a server making it possible to implement a method in accordance with the invention presented above.

According to the invention, there is also provided a database comprising an electronic recording medium comprising in recorded form at least two images of different users concerned by the same transaction relating to a vehicle.

According to the invention, a server is also provided, arranged, when it receives a first image of a document relating to an identity of a user concerned by a transaction relating to a vehicle, to obtain a second image by extracting a face from the user from the first image, and transmit this second image over a telecommunications network.

It is also a server making it possible to implement a method in accordance with the invention presented above.

We will now describe embodiments of the invention by way of nonlimiting examples and with the support of the appended drawings in which:

- Figure 1 is a block diagram of a method according to the invention relating to a transaction relating to a vehicle,

-6- Figures 2 to 11 are parts of this block diagram which will be detailed below, and

- Figures 12 and 13 are block diagrams illustrating another embodiment of the method of the invention.

FIG. 1 shows a block diagram 10 of a method relating to a transaction relating to a vehicle according to the invention. Here, the transaction is a sale of the used vehicle between a buyer 12 and a seller 14. Figure 1 is a general view of the method of selling the vehicle.

The method is implemented by means of a mobile terminal 11 of the buyer 12, of a mobile terminal 13 of the seller 14, and of at least one remote server and, for France, of a connection to the System of State Vehicles registration. These devices exchange messages for this via one or more telecommunications networks. One or more computer programs hosted in the form of one or more applications within each terminal and of the server implement most of the steps of the method which will be described.

General procedure

In broad outline, the process proceeds as follows.

Identification of the seller 14 and the buyer 12 is carried out using the terminal 11 of the buyer 12 and the terminal 13 of the seller 14 and using a remote server via a telecommunications network.

Buyer's mobile terminal 12 records data relating to proof of domicile of buyer 12.

The seller's terminal 14 records data relating to a gray card. This data is analyzed and positioned in the vehicle transfer declaration form (s), or more generally any document relating to a registration request, by the application.

If the data are verified as valid, an encrypted link twinning takes place by exchange of cryptography keys between the terminal of the buyer 12 and that of the seller 14.

The data relating to the vehicle registration document are checked with the data from a remote official server of the administration relating to vehicles.

The gray card is crossed out and a photograph is taken of it by means of the terminal 13 of the seller 14. If the data of this gray card are verified as compliant by the terminal, the data are recorded, failing which the transaction is aborted.

Thereafter, by steps not illustrated in FIG. 1 but illustrated in FIGS. 6 to 8, the geolocation of the buyer and the seller is carried out in order to calculate the distance separating them, and images of the faces of one and on the other are exchanged

-7so that they can identify themselves and make physical contact. These geolocation and photo exchange steps will be detailed later. Once the buyer and seller confirm that they have identified each other visually, the process continues.

A message is sent to the vehicle server for the calculation of the registration registration fee.

Optionally, the costs of the application implementing the method are calculated.

Buyer 12 requests the bank transaction via the telecommunications network. In case of refusal by the banking organization, the transaction is abandoned. If accepted, payment is scheduled for the next 48 hours. If this payment was not validated within 48 hours, it is canceled.

The contractual data are summarized for seller 14 and buyer 12.

A transfer certificate for seller 14 and buyer 12 and a request for a registration certificate for buyer 12 are generated by the application.

To allow the buyer 12 and seller 14 to electronically sign the documents, a single-use password (or OTP) is sent to them by the server associated with the application on their respective terminals. After entering these passwords by the buyer and the seller on their terminals, if the passwords are correct, a file is created in the application.

The data relating to the transfer certificate is sent by the server relating to the application to the server relating to vehicles. Those relating to the request for a registration certificate are stored on the server pending the physical receipt of the crossed gray card. The vehicle server sends a message indicating whether the transaction is accepted or not.

If the transaction is refused, the file is canceled in the application and the payment is automatically canceled after 48 hours.

If the transaction is validated, so is the payment.

A message such as an email is triggered by the application and is sent via a server to the buyer 12, the message including as an attachment the declaration of transfer, the registration request, a payment receipt and a relative invoice to the application. He is also told the process concerning the step of returning the gray card.

An email is triggered by the application and is sent to seller 14 via the application with the assignment document attached.

Buyer 12 sends the crossed gray card to a management center by post. After checking the latter, the data relating to the certificate request

-8 registration are sent by the server associated with the application to the server relating to vehicles.

Similarly, although this is not illustrated in FIG. 1, the buyer can, alone, using his terminal, carry out an operation relating to the transaction, for example to request the issue of a crisis card. This process will be described later. To achieve this, an identity check will be described.

Using the following figures, which for some of them are portions of Figure 1, we will now detail some parts of the implementation of this process.

Identification of people

Figure 2 is a block diagram 16 of a step of identifying the buyer 12 and the seller 14. This step is shown in boxes 18 and 20 in Figure 1. As seen in Figure 2, the first step is to identify the seller 14 and the buyer 12. To do this, the seller 14, or the buyer 12, activates an application on a telecommunication terminal 11 or 13, here a smartphone-type telephone of the buyer 12 and a terminal 13 of seller 14 of the same type as that of buyer 12. This application initiates the identification of the party to the transaction. The application therefore presents a welcome message 18 and requests the buyer 12 or seller 14 to enter at least one piece of information relating to an identity document. In this case, it requests a document relating to a user identity, which will be called "identity document" below. These steps are shown in box 22 of Figure 2.

Using an optical reader of terminal 11 or 13, buyer 12 or seller 14 photographs the identity document. The latter can be a passport as well as a national identity card or a residence permit. Instead of taking a photograph, the user may select a document that he already has in memory in the terminal. It is possible that, upstream, the application asks the user to select the type of document that he intends to photograph or save, from a list of predefined document types including for example the following types: passport, card identity, driving license, residence permit, student card, other.

In the absence of such a choice, using dedicated software installed on a server, the application itself identifies the type of identity document recorded or photographed by the user.

Once the type of document is known and the document saved or photographed, the application extracts at least one relevant data from it to identify buyer 12 or seller 14.

If optical scanning did not extract all the required data,

-9The application prompts buyer 12 or seller 14 to start the operation again and then manually enter the missing data on terminal 11 or 13 in the event of another failure.

Then, the application calculates a script sequence that should contain a "Machine readable zone" of the identity document. It is a series of characters defining a code that includes the identity documents and which makes it possible to control the data presented by the identity document. This "Machine readable zone" is located on the lower level on French identity cards and includes two lines of characters.

Then, the application compares this calculated character sequence with the "Machine Readable Zone" of the identity document which was extracted using the optical reader. If the two character strings do not match, the application invites the buyer 12 or the seller 14 to correct the data entered manually and / or read using the optical reader. These steps are shown in box 24 in Figure 2.

If the character strings match, the terminal 11 or 13 sends, by means of the application, to a remote server 26 on a telecommunications network such as a telephone network or the Internet network a message comprising the relative data or data the identity of buyer 12 or seller 14, who are here the persons concerned by the transaction. In the following, without further details, the telecommunications network used will be one such type of network. Then, the server 26 determines whether this or these data correspond to the data recorded in a predetermined database of the server 26. Thus, the server 26 is here a server relating to identity documents of people. However, as will be discussed below, nothing prevents the method of the invention from a single server performing the actions of all the servers combined or, on the contrary, that tasks are distributed over multiple servers.

Then, the server 26 sends a message to the terminal 11 or 13 indicating whether the verification has given a compliant or non-compliant result. If the message indicates for example that the identity document has been declared stolen, the terminal 11 or 13 prevents the process from proceeding to the next step which will be described later. These steps are represented in box 28 in FIG. 2. In this case, the process is interrupted and the transaction does not take place.

In addition, the buyer 12 records by means of the optical reader a proof of address according to a step of the method described in FIG. 3 and similar to that previously described except for the fact that, in this embodiment, the proof of address is not verified by sending a message to a server. According to a variant of this embodiment, it is done by means similar to those previously described.

- 10 We will now describe, with reference to Figure 4, the next step of the process.

Verification of a document relating to the vehicle

This step concerns the identification of a document relating to the vehicle subject to the transaction. This document is here a vehicle registration certificate also called "gray card" according to the practice in France. According to variants of this embodiment, the document can be any type of document relating to the vehicle.

This process step is similar to that described above. As shown in box 30 in FIG. 4, the application of the terminal 11 or 13 of the buyer 12 and / or of the seller 14 generates a welcome message, then requires extracting at least one item of data from the registration certificate by means of the optical reader of terminal 11 or 13. Once this has been done, the application possibly requires manually entering at least one piece of data that the application of terminal 11 or 13 could not identify after optically reading the certificate of registration.

Then, the application calculates a scriptural sequence that should contain a "Machine readable zone" of the registration certificate and compares this sequence with that extracted from the registration certificate. These steps are shown in box 32.

In the event of inconsistency between these scriptural sequences, the application of terminal 11 or 13 prevents the continuation of the process relating to the transaction. In the event of compliance, as can be seen in box 34 of FIG. 1, the terminal 11 or 13 sends a message to a server 36 on a telecommunications network comprising at least one piece of data relating to the vehicle extracted from the registration certificate. Then, the server 36 determines whether this datum conforms to datum recorded in a predetermined database. This data relating to the vehicle corresponds to a vehicle registration, vehicle taxation, a vehicle make, a vehicle model, a vehicle engine and / or to a date of first registration of the vehicle.

In addition, the message relates in particular to a property of the vehicle. Thus, the server 36 is here relating to vehicles or to documents relating to the ownership of the vehicles, for example a server of the "Vehicle registration system" type as produced by the French administration. This verifies the feasibility of the sale by checking a certain number of information such as for example that the fact that the vehicle is not declared stolen.

If the server 36 determines that the data included in the message sent by the terminal 11 or 13 is in accordance with that recorded, it sends a message on the same telecommunications network to the terminal 11 or 13. Following receipt of this message, the registration certificate is registered by terminal 11 or 13.

- 11 Pairing of terminals

The next step, represented in FIG. 5 and on the frame 38 of FIG. 1, is that of the connection between the terminals 11, 13 of the buyer 12 and of the seller 14.

To do this, a server 40 sends a message over a telecommunications network to the terminal 11 of the buyer 12. Of course, for this step, the roles of the buyer 12 and the seller 14 can be changed. The message includes in particular a scriptural sequence comprising verification data. Terminal 11 of buyer 12 sends terminal 13 of seller 14 a similar message over a telecommunications network. By means of the optical reader of his terminal 13 or manually, the seller 14 enters the verification data into his terminal 13. The application of the terminal 13 of the seller 14 then performs a predetermined logic test on the basis of the verification data. Here, it is a test of conformity between the message received on the telecommunications terminal 13 and that entered by the seller 14.

If the test leads to a predetermined result, here the compliance set out above, a direct connection is established between the two terminals 11, 13. As seen in FIG. 5, a message is sent by the server 40 to the terminal 11 , 13 of buyer 12 and seller 14 or through one of the terminals 11, 13 to the other terminal 11 or 13 to indicate that the connection is established. According to a variant, the connection is established between the two terminals 11, 13 via the server 40.

Geographic proximity test

The next step, illustrated in Figures 6, 7, and 8, is to determine the respective geographic positions of the buyer and the seller. For this, the terminals 11 and 13 respectively of the buyer 12 and the seller 14 transmit their geographic position to a server. This server can be one of the servers 26, 36, or 48 described, or another. This is the case for all the servers of the invention. To this end, the terminals 11 and 13 include geolocation means, for example of the GPS type (for the English term Global positioning System). The transmission of the geographic position then results in the sending of the GPS coordinates of the terminal. This sending takes place in a message including one or more data relating to the transaction and / or to the user

Using this data, a server calculates a geographical distance between the terminals 11 and 13, that is to say between the users 12 and 14. This distance is used to determine whether or not the users 12 and 14 are close to each other. one another, as part of what is called a proximity test. The distance calculation and this test are carried out at the same time in the following way: a so-called basic or constant distance is used,

- 12 by 3 meters. We also use, as described below, a tolerance distance which can be adjusted according to several factors, for example according to the type of smartphone or the degree of accuracy of the geolocation measurement. In this case and by default, this tolerance distance is 10 meters.

We must then distinguish two cases:

- in the classic case, a geolocation position has three dimensions: latitude, longitude and altitude. In this case, for each of the users, a virtual sphere is determined having as its center the geolocation coordinates of the terminal and a radius equal to the base distance (3 meters) to which the tolerance distance (10 meters) is added. If the two spheres, each surrounding a smartphone, collide, it means that users 12 and 14 are close to each other. It is then estimated that the proximity test is validated.

- in the two-dimensional case (latitude and longitude only) illustrated in Figures 7 and 8, a virtual circle is determined for each of the parts with the geolocation coordinates of the terminal as a center and a radius equal to the base distance (3 meters ) to which the tolerance distance (10 meters) is added. If the two circles overlap, the validity test is validated: buyers 12 and 14 are close to each other.

Another way of looking at it is as follows: this calculation amounts to determining a distance between two points representing the two respective terminals. Instead of a base distance of 3 meters and a tolerance distance of 10 meters, we then speak of a base distance, or constant, of 6 meters, to which we add a tolerance value, for example 20 meters.

In any case, if the proximity test is not validated, then the transaction is stopped. A server then sends a message to the buyer and the seller asking them to get closer to each other. The proximity test can thus be repeated several times, automatically or at the request of users 12 and / or 14, who may have moved between two tests in order to get closer. Once it is validated, we go to the next step.

Selection and exchange of images

A server retrieves documents relating to an identity of each user, recorded or photographed as described in the "identification of persons" section. For each image, the server or another device performs a division, as illustrated in FIG. 9. In this case, the smartphone knows the type of document saved (see the "identification of people" part) and knows by example that it is an identity card. So he knows where on the map

- 13 find the identity photo and the face, and what are its dimensions. It is thanks to this knowledge that he performs the selection of the face. Once the selection has been made, the image to be considered in the exchange of images of the suite therefore consists only of the face, and not of other information from the identity card. Optionally, the application can have a system verifying that the selected image includes a face. In addition, it is possible that the type of document is not known to the terminal, or that the document is a poorly taken photograph of an identity document. In this case, the face photograph will not be at its predefined position and will be badly selected. To overcome this, it is possible within the framework of the invention to provide means making it possible to detect a face on a document and to select this face.

Instead of the selection being made on one or more servers, the application located on the terminals may be able to make this selection itself.

Then the image, which represents only the user's face, is sent to the other user by the server. Thus, the face of the buyer 12 is sent to the terminal 13 of the seller 14, and, as illustrated in FIG. 9, the face of the seller 14 is sent to the terminal 11 of the buyer 12.

Since the proximity test has been validated and therefore the buyer 12 and the seller 14 are close to each other, the fact of receiving each other's photographs allows them to identify themselves and therefore to make contact physically or to verify that they are talking to the right person.

The application then asks buyer 12 and seller 14 to confirm that they have both identified themselves visually using the photographs. If so, we continue the process. On the other hand, if one of the two does not confirm having recognized his interlocutor, the transaction is aborted.

Transaction process

Then, as can be seen in box 42 of FIG. 1, by exchanges of messages on the telecommunications network between the server 36 and the terminals 11, 13 of the buyer 12 and of the seller 14, the costs and taxes related to the transaction are calculated.

Then, as seen in box 44 of Figure 1 and in Figure 11, we proceed to the payment step of the transaction.

To do this, as can be seen in box 46 of FIG. 10, the buyer 12 enters in his terminal 11 data relating to a bank card. Then, the terminal 11 sends over the network to a server of the bank of the buyer 12 a message comprising data relating to the bank card. The bank's server manages the authorization to carry out the financial transaction. If applicable, the bank's server sends a message confirming the aforementioned authorization to terminal 13 of the purchaser 14. Otherwise,

- 14the transaction is canceled as shown in box 48.

If the money transfer is not effective within 48 hours, the payment is canceled otherwise, it is validated and the server 36 sends a message to a server 48 to indicate that the payment has been made.

The server 48 is intended for the implementation of the method according to the invention. It is able to exchange messages with the server 36 and with the terminals 11, 13 of the buyer and the seller 14.

Then, as can be seen in box 50 of FIG. 1, the registration certificate of the locked vehicle is again checked according to a process similar to that described with reference to FIG. 4 with regard to the unlined certificate.

Then, as seen in box 52, the application installed on the terminals 11, of the buyer 12 and of the seller 14 gathers the data related to the transaction to generate an electronic contract. This contract is signed electronically using a process described in Figure 11.

As seen in this figure, the server 48 sends a message, in this embodiment by SMS, comprising a script sequence to the terminals 11, 13 of the buyer 12 and the seller 14. The script sequences sent to the buyer 12 and seller 14 may be similar or different.

Then, the buyer 12 and the seller 14 each enter the script sequence on their terminals 11, 13 so that the installed application verifies that the script sequences entered correspond to those emitted by the server 24.

If the verification on the terminals 11, 13 is conclusive, the signature is validated and the transaction is completed. Otherwise, the transaction is aborted.

Administrative registration

After the electronic signature, the process continues in accordance with frame 54. The server 48 exchanges messages on the network with the terminals 11,13 of the buyer 12 and the seller 14.

Thus, the server 48 generates an electronic transfer declaration for the buyer 12, a registration request form and an electronic transfer declaration for the seller 14. Then, at least one of the terminals 11, 13 sends a message to the server 36. This message includes at least one piece of data relating to the transaction. More specifically, the terminal 11 or 13 sends the server 22 a message comprising data relating to the vehicle, for example the change in ownership of the vehicle. This message is intended to modify data relating to the vehicle recorded in the database of the server 36, for example the owner of the vehicle.

Then, as seen in box 56 of FIG. 1, once the server 36 has received the message confirming that the transaction and that the payment has been made, it generates a message on the network intended for a buyer's email address 12. The message includes the electronic transfer document, an electronic invoice for the transaction and the electronic registration request form. Likewise, it sends a message on the network to a seller's email address 14 including the electronic transfer document. Finally, it sends a message to the server 48 to confirm the recording of the transaction.

As can be seen, at the stages of the method described above, the terminal 11 or 13 is arranged to prepare and send over the telecommunications network at least one message which specifically aims to determine whether the data conforms to the data recorded in a database.

Similarly, the server 36 is arranged to receive from the telecommunications network a message comprising data relating to the vehicle or to a person concerned by a transaction relating to the vehicle and to determine, when it receives this message, whether this data complies with the data recorded on a predetermined database.

Method of implementing the process after a transaction

In the case where the seller 14 does not wish an electronic transaction, the buyer 12 has the possibility with the process of electronically sending the transfer document as well as the request for a registration certificate. The sequence of steps for this purpose has been illustrated in FIG. 12. The method of the invention in the present embodiment takes place as follows. It is therefore assumed here that the transaction took place independently of the process and prior to the implementation of the latter.

The buyer 12 enters his identity in the terminal 11 as already indicated.

This identity can be checked via a process which will be described in the following part.

He performs an optical reading or a photograph of a proof of address by means of his terminal 11, in a similar manner.

He does the same for the gray card.

If necessary, it enters the missing information in the terminal 11.

The latter automatically determines whether all the necessary information has been entered. Otherwise, it requests a referral or an entry of the missing information.

The terminal 11 then performs a calculation of the tax or fees to be paid for the registration of the registration.

If necessary, it calculates the fees to be paid for the implementation of the process.

- 16II then sends a payment order to a banking organization on a telecommunications network.

The validity of this order is checked in the same way as explained above.

If this order is not valid, the process stops.

Otherwise, a registration request is transmitted by the terminal on the telecommunications network to the ad hoc server. Furthermore, the registration request and the invoice are transmitted by the terminal 11 to the buyer 12 in electronic form.

Consequently, it can be seen that the application extracts at least one piece of data relating to the identity of the buyer 12 and to his home by means of the optical reader of his terminal 13. If necessary, he manually enters missing data. Then, he receives on his terminal 13 a message indicating the total cost of the transaction taking into account the taxes and fees related to the use of the method according to the invention. He makes the payment according to the process described above and then receives a message on his email address including the invoice for the transaction, the transfer document and the electronic registration request form.

Similarly, its terminal 13 sends a message to the server 22 comprising a completed registration request form.

Similarly, in the case where the buyer 12 does not want an electronic transaction, the seller 14 has the possibility with the method of electronically sending the assignment document. The sequence of steps for this purpose has been illustrated in FIG. 13. The method of the invention in the present embodiment takes place as follows. It is therefore assumed here that the transaction took place independently of the process and prior to the implementation of the latter.

The seller 14 enters his identity in his terminal 13 as already indicated.

He performs an optical reading or a photograph of the gray card by means of his terminal 13, in a similar manner or not if he no longer has it

It performs a partial or total entry of the missing information in the terminal 13.

The latter automatically determines whether all the necessary information has been entered. Otherwise, it requests a referral or an entry of the missing information.

The terminal 13 then performs, if necessary, a calculation of fees to be paid for the implementation of the method.

It then sends a payment request via a server to a banking organization on a telecommunications network.

The validity of this order is checked in the same way as explained above.

- 17If this order is not valid, the process stops.

Otherwise, the assignment is transmitted by the terminal 13 on the telecommunications network to the ad hoc server. Furthermore, the assignment and the invoice are transmitted by the terminal 13 to the seller 14 in electronic form. Thus, for the seller 14, the method comprises the following steps: he extracts at least one data item relating to his identity, then a data item relating to the vehicle by means of the optical reader of his terminal 13. If necessary, he manually enters missing data . Then, once the payment has been made, he receives the assignment document and an invoice for the transaction on his email address. Likewise, its terminal 13 sends the session document to the server 36.

In both cases, the method is implemented after completion of the transaction only in order to record it.

In the case where the method is implemented in accordance with the first mode, that is to say that it comprises steps relating to the transaction itself, the steps described with reference to FIG. 12 and to FIG. 13 are also preferably done as a supplement.

Identity check during a single party procedure

During a single-party transaction, for example when, in accordance with the preceding part, a user makes requests or seeks to update his information relating to the transaction of a vehicle concerning him, one can seek to control his identity. For this, and in the same way as in the bipartite transactions described above, a server, or the application itself, cuts a face of the user from the document relating to his identity which he has provided. This could include, for example, selecting their photograph from their identity card.

Secondly, a server sends him a message asking him to take a picture of his face using his terminal. The application thus uses the camera located on the user's terminal so that he can take a self-portrait, via a sequence of photographs, otherwise called "motion selfie", to ensure that we are in the presence of the user himself and not in the presence of a photograph. From this sequence, a photograph of his face is extracted by the terminal and transmitted to a server in the same way as the previously cut photograph.

Thus, on the same server, we find the photograph of his face cut out, or selected, from an image of an identity document which he provided, and a second image forming the self-portrait which has just to be realized. A trusted third party, located at a distance, can then compare the two images to confirm or not the fact that

- 18 the user who uses the online service is indeed the one whose identity information has been provided. It may be a person from a department of an official administration.

Alternatively, this comparison can be carried out by automated means for recognizing and comparing faces located at a distance.

As a result, if the two images match, the one-party transaction can continue. Otherwise, it is stopped.

In all of these embodiments, the terminals 11, 13 and the servers 26, 36 and 48 are capable of executing a program of their own and comprising code instructions capable of implementing the steps of the method which concern them when it is executed on a computer.

This program is also made available on a telecommunications network such as the Internet for download.

The terminal 11 and / or 13 of the buyer 12 and / or the seller 14 and the server 36 form a system relating to the transaction of the vehicle, the terminal 11 and / or 13 and the server being arranged according to the provisions described above. above.

In addition, the terminal is arranged to extract a face of a user of the terminal from an image of a document relating to an identity of the user, and to transmit the image over a telecommunications network, this transmission. taking place in relation to a predetermined transaction file relating to a vehicle. For example, the transmission includes one or more data relating to the transaction, such as data identifying a transaction file.

In addition, in the case where it performs the selection operation itself, the server, or one of the servers, is arranged to determine whether the faces of two distinct images correspond to the same user, the images being relative to a vehicle transaction. In addition, the server or another server can be arranged to, when it receives a first image of a document relating to an identity of a user concerned by a transaction relating to a vehicle, obtain a second image by extracting a face of the user from the first image, and transmit this second image over a telecommunications network.

In the preceding description, this server can be chosen from among the servers 26, 36, 48 or be another server.

In addition, a database includes an electronic recording medium comprising in recorded form at least two images of different users concerned by the same transaction relating to a vehicle.

In all of the above, the terminals 11, 13 are mobile terminals such as cellular telephones. It can also be tablets or even computers

- 19people.

We see that the method of the invention, which is advantageously implemented on an application of a mobile terminal, makes it possible to verify the identity of the interlocutors.

Of course, many modifications can be made to the invention without departing from the scope thereof. In particular, the steps of geolocation, proximity testing, selection and sending of images can be carried out at other times in the process. For example, these steps can be carried out before handing over the vehicle key, to be sure that the right people meet.

For the self-portrait, a simple photograph of the user can be taken by the terminal, rather than a sequence of photographs.

We can use any type of telecommunications network or any type of terminal.

It is conceivable to implement the method so that geolocation data is associated with some of the other stages or with all the stages by means of the terminals used.

In addition, the time at which the payment is made and / or the verification of the payment is not a limiting characteristic of the invention. Indeed, according to variants of the embodiment presented above, the payment can be made at the very beginning of the process relating to the transaction or at the end of this process. In addition, it is also possible to operate a prepayment stage. The payment order is checked and recorded, but the transfer is only triggered after a predetermined time after the transaction has been recorded, for example, this time can be two days.

Likewise, one can control and record a payment order, the execution of which is subject to a positive return, from the Vehicle Registration System of the State or of a similar body in another country, as to the status of the vehicle. subject of the transaction.

Likewise, the method may relate to a transaction which concerns several vehicles, in particular for a transaction between professionals. In this case, the transfer can be triggered periodically, for example monthly.

Furthermore, the method can of course be carried out in a similar manner when the transaction concerns both natural and legal persons. In the latter case, the data relating to the identification of the legal person may relate to a registration number, of the KBIS type in France, of the company or any other data making it possible to identify this legal person.

Claims (19)

1. Method relating to a transaction relating to a vehicle, comprising the implementation of the following steps:
- a first terminal (11) transmits on a telecommunications network an image of a first user (12) of the first terminal, and
- a server (26, 36, 48) transmits the image on a telecommunications network to a second terminal (13) of a second user (14), the transmissions taking place in relation to a predetermined transaction file relating to a vehicle between the two users (12, 14).
2. Method according to the preceding claim, in which:
the second terminal (13) transmits on a telecommunications network a second image of the second user (14) of the second terminal (13), and
- a server transmits the second image over a telecommunications network to the first terminal (11).
3. Method according to any one of the preceding claims, in which, prior to the steps of claim 1 and / or 2, at least one of the terminals (11, 13) saves an image of a document relating to an identity of the user of this terminal.
4. Method according to any one of the preceding claims, in which the image or at least one of the images results from a prior extraction of a face from a document relating to an identity of the user ( 12, 14).
5. Method according to any one of the preceding claims, in which, prior to the steps of claim 1,
the first terminal (11) transmits at least one geolocation data item from the first terminal over a telecommunications network,
the second terminal (13) transmits at least one geolocation datum from the second terminal over a telecommunications network, and
- A server performs a geographic proximity test between the first and second terminals (11, 13).
6. Method according to the preceding claim, in which the proximity test comprises the implementation of the following steps:
- 21 - from the geolocation data of the first and second terminals respectively (11,13), determine a distance between the first and second terminals (11, 13), and
- compare the determined distance to a predetermined threshold.
7. Method according to the preceding claim, wherein the threshold comprises a constant, for example of 6 meters, to which a tolerance value is added, for example of 20 meters.
8. Method according to any one of claims 5 to 7, in which a server (26, 36, 48) transmits on a telecommunications network at least one message to the first and second terminals (11, 13), inviting users of the first and second terminals (11, 13) to approach each other.
9. Method according to any one of the preceding claims, in which, prior to the steps of claim 1,
- a server (26, 36, 48) transmits at least one code over a telecommunications network to at least one of the first and second terminals (11, 13) so that the or each terminal (11, 13) displays the code or one of the codes, and
- once the or each code entered on the terminal (11,13) other than that which received the code, a server (26, 36, 48) transmits on a telecommunications network to at least one of the first and second terminals a proposal to link the first and second terminals (11,13).
10. Method according to any one of the preceding claims, in which, prior to the steps of claim 1,
- by means of the terminal (11, 13), an image of a document relating to a user identity is produced or saved by the user (12, 14),
- the terminal identifies relevant data within the image,
- the terminal calculates a scriptural sequence from other image data, and
- the terminal compares the relevant data to the scriptural sequence.
11. Method relating to a transaction of a vehicle, comprising the implementation of the following steps:
- a terminal (11, 13) of a user (12, 14) obtains a first image of a document relating to an identity of the user (12, 14),
- the terminal transmits the first image over a telecommunications network, this
- 22 transmissions taking place in relation to a predetermined transaction file relating to a vehicle, and
- the terminal (11, 13) takes at least one image directly from the user (12, 14) of the terminal and transmits the image or at least one of the images over a telecommunications network.
12. Method according to the preceding claim, wherein the terminal (11,13) takes several images directly from the user (12,14) and transmits one of the images over the network.
13. Method according to the preceding claim, wherein a device (26, 36, 48) compares the first and second images.
14. Method according to any one of claims 11 to 13, relating to the obtaining of a vehicle registration certificate.
15. Program comprising code instructions capable of controlling the implementation of a method according to any one of the preceding claims when it is executed on a computer.
16. Method for providing a program according to the preceding claim on a telecommunications network for downloading.
17. System relating to a transaction relating to a vehicle, characterized in that it comprises:
- a first terminal (11, 13) arranged to transmit an image of a first user of the first terminal over a telecommunications network, and
- a server (26, 36, 48) arranged to transmit the image on a telecommunications network to a second terminal of a second user, the transmissions taking place in relation to a predetermined transaction file relating to a vehicle between the two users (12, 14).
18. Telecommunication terminal (11, 13), arranged for:
- extract a face of a user (12, 14) from the terminal (11, 13) from an image of a document relating to the identity of the user, and
- transmit the image on a telecommunications network, this transmission taking place in relation to a predetermined transaction file relating to a vehicle.
-2319. Server (26, 36, 48), characterized in that it is arranged to determine whether the faces of two distinct images correspond to the same user (12, 14), the images being relating to a transaction relating to a vehicle.
20. Database comprising an electronic recording medium comprising in recorded form at least two images of different users (12, 14) concerned by the same transaction relating to a vehicle.
10 21. Server (26, 36, 48), characterized in that it is arranged for:
- when it receives a first image of a document relating to an identity of a user (12, 14) concerned by a transaction relating to a vehicle, obtain a second image by extracting a face from the user (12, 14 ) from the first image, and
- transmit this second image over a telecommunications network.
1/10 □ i i3-jzh8r ^ i4 -A
Actor \> - 11! - Vepd ^ ur --- 20 î> H
Ψ r Buyer Transfer Declaration I I 1 Seller assignment statement Request registration i ®
2/10
MRZOK
Basic query stolen cards S Stolen cards
Abort transaction Jr ^
Yes
Ψ
Identification successful .28
FR1662336A 2016-12-12 2016-12-12 Transaction method relating to a vehicle. Pending FR3060172A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
FR1662336A FR3060172A1 (en) 2016-12-12 2016-12-12 Transaction method relating to a vehicle.
FR1662336 2016-12-12

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR1662336A FR3060172A1 (en) 2016-12-12 2016-12-12 Transaction method relating to a vehicle.

Publications (1)

Publication Number Publication Date
FR3060172A1 true FR3060172A1 (en) 2018-06-15

Family

ID=58054302

Family Applications (1)

Application Number Title Priority Date Filing Date
FR1662336A Pending FR3060172A1 (en) 2016-12-12 2016-12-12 Transaction method relating to a vehicle.

Country Status (1)

Country Link
FR (1) FR3060172A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050174975A1 (en) * 2004-02-11 2005-08-11 Vicinity Messaging Corporation System and method for wireless communication between previously known and unknown users
US20120088524A1 (en) * 2010-10-06 2012-04-12 Connectquest System and method for facilitating interpersonal contacts and social and commercial networking
WO2016131083A1 (en) * 2015-02-20 2016-08-25 S2D Pty Ltd Identity verification. method and system for online users

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050174975A1 (en) * 2004-02-11 2005-08-11 Vicinity Messaging Corporation System and method for wireless communication between previously known and unknown users
US20120088524A1 (en) * 2010-10-06 2012-04-12 Connectquest System and method for facilitating interpersonal contacts and social and commercial networking
WO2016131083A1 (en) * 2015-02-20 2016-08-25 S2D Pty Ltd Identity verification. method and system for online users

Similar Documents

Publication Publication Date Title
US20180039770A1 (en) Multi-Factor Profile and Security Fingerprint Analysis
US20200090182A1 (en) Authenticating remote transactions using a mobile device
US10453159B2 (en) Digital identity
US20190378100A1 (en) System and method for transferring funds
US20200034838A1 (en) System and method for consumer fraud protection
JP5932053B2 (en) Network-accessible point-of-sale management device instance
US10078821B2 (en) System and method for securely registering a recipient to a computer-implemented funds transfer payment network
US10009332B2 (en) Method and apparatus for remote identity proofing service issuing trusted identities
US10410235B2 (en) Using mix-media for payment authorization
US20180268231A1 (en) Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously
US8913725B1 (en) Residence-based calling rates, system and method
TWI591554B (en) Electronic ticket security system and method
US20140089198A1 (en) Method and System to Verify the Identity of a User
CA2662033C (en) Transaction authorisation system & method
US7757945B2 (en) Method for electronic payment
US20140214670A1 (en) Method for verifying a consumer's identity within a consumer/merchant transaction
US10692085B2 (en) Secure electronic payment
US20150302409A1 (en) System and method for location-based financial transaction authentication
US8700003B2 (en) Geographical location authentication method
AU2014281770B2 (en) Speech transaction processing
JP3207192B1 (en) Authentication method and device
US20150294313A1 (en) Systems, apparatus and methods for improved authentication
KR101651696B1 (en) System for authentication , and method thereof
EP1026644A1 (en) Method and apparatus for performing electronic transactions
US20060173776A1 (en) A Method of Authentication

Legal Events

Date Code Title Description
PLFP Fee payment

Year of fee payment: 2

PLSC Search report ready

Effective date: 20180615

PLFP Fee payment

Year of fee payment: 4