GB2237670A - Reciprocal transfer system - Google Patents

Reciprocal transfer system Download PDF

Info

Publication number
GB2237670A
GB2237670A GB9023551A GB9023551A GB2237670A GB 2237670 A GB2237670 A GB 2237670A GB 9023551 A GB9023551 A GB 9023551A GB 9023551 A GB9023551 A GB 9023551A GB 2237670 A GB2237670 A GB 2237670A
Authority
GB
United Kingdom
Prior art keywords
value
parameter
transfer
user
control means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9023551A
Other versions
GB2237670B (en
GB9023551D0 (en
Inventor
Fergus Ion Duncan
William Carter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MIDLAND BANK PLC
De la Rue Systems Ltd
Original Assignee
MIDLAND BANK PLC
De la Rue Systems Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB898924847A external-priority patent/GB8924847D0/en
Application filed by MIDLAND BANK PLC, De la Rue Systems Ltd filed Critical MIDLAND BANK PLC
Priority to GB9023551A priority Critical patent/GB2237670B/en
Publication of GB9023551D0 publication Critical patent/GB9023551D0/en
Publication of GB2237670A publication Critical patent/GB2237670A/en
Application granted granted Critical
Publication of GB2237670B publication Critical patent/GB2237670B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A reciprocal transfer system for transfer involving a user and supplier (e.g. retailer) comprises a biometric feature analyser (4) which obtains at least one feature from the user and verifies it to provide a resulting parameter. This parameter is combined with other parameters which may be unrelated to the identification of the user to produce a final risk assessment parameter. Control means (3) indicate to the supplier whether or not the transaction should proceed in accordance with the final risk assessment parameter. <IMAGE>

Description

RECIPROCAL TRANSFER SYSTEM The invention relates to a transfer of value application in which a user wishes to receive services or goods from a supplier in return for a reciprocal transfer of funds or commitment to recognise the value of the service supplied.
In a typical multilateral decision making situation, each party has a different set of interests and priorities and frequently there has to be a compromise between conflicting decision criteria. For example, in the case of a typical payment situation involving a customer (bank account holder), a retailer and a bank, the customer desires no fraudulent use of the account, the retailer wants guaranteed payment without turning down any customers, and the bank wants no repudiations (particularly successful ones) with processed transactions.
When cash is involved in the transfer of value, the supplier has a guarantee that the funds or commitment supplied by the user will be recognised by the issuer of the cash. However, more recently it has become common for users to tender a credit or debit card which does not in itself guarantee that funds or commitment will be guaranteed by the issuer of the card who provides a main element of the Reciprocal Transfer Service.
The invention is concerned with such multilateral exchanges in which there are at least three parties, that is the user, the supplier, and the reciprocal transfer service which will often be a bank.
In the past, the reciprocal transfer service has had to rely on the decision ability of the supplier to confirm that the user is positively identified and that the supplier is granted authority to access the users account. Generally this has involved requesting the user to provide his signature which is then visually compared with a reference signature on a card. In some situations, the supplier has been provided with aids to assist with this comparison such as a signature pad.
There is a need for the reciprocal transfer service to have more control over transfers of value and to reduce the reliance on the supplier.
In accordance with one aspect of the present invention, a reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means coupled to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means being adapted thereafter to indicate to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
In accordance with a second aspect of the present invention, a method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system comprises obtaining from the user at least one biometric feature; performing a verification analysis on the feature and generating at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
We have recognised the inherent problems with biometric methods of user verification which cannot in general give 100% confidence in the verification of identity. Consequently, we now propose combining the results of the biometric verification analysis with other, typically application specific, parameters independent of the biometric features so as to reduce the effect of the uncertainty of the biometric analysis itself.
In one example, the control means has a store for storing at least the recent history of previous uses of the system by each user, that history being used by the control means to constitute one of the additional parameters. Typically, the significance attached to the history will reduce with time and in practice the store may comprise a circular buffer arranged to contain a limited, fixed number of transaction details.
Alternatively, or in addition to the above, the control means may include a store for storing parameters relating to the user which are selected singly or in combination by the control means to constitute one of the additional parameters. These stored parameters relating to the user may include physical characteristics such as age, sex, social group, psychological profile, handedness, and application related parameters.
In addition or alternatively to the above, the additional parameters may be chosen from the following; a) Supplier profile parameters eg type of service (for example retailer classification), typical levels of service (for example average transaction values) and risk level of location; b) Probability of fraud; c) Value of service; d) Time and date of transaction; e) Environmental conditions.
The predetermined algorithm preferably has the form; R = W1 F1 (P1, P2 ...PN) + W2 F2 (P1, P2 ... PN) + ...
where R is the final risk assessment parameter, W1 W2 etc are respective weights, P1 P2 etc are the parameter values, and F1, F2 etc are functions generating a score or absolute value for a given parameter set.
In one application, the control means compares the final risk assessment parameter (R) with at least one threshold to determine whether the transaction of value can proceed.
In the preferred arrangement, the thresholds define 3 bands so that if the final risk assessment parameter falls in one band the control means indicates that the transaction of value can proceed, if it falls in another band the control means indicates that the transfer of value cannot proceed, and if it falls in an intermediate band the control means performs a further algorithm.
This further algorithm may be similar to the algorithm defined above but makes use of different weighting factors so that the parameters are combined in a different manner.
Typically the control means will be sited together with the biometric frature analyser at the point at which the transaction occurs (i.e. point of sale) and off-line to the reciprocal transfer service provider. The control means may also be sited remote from the biometric feature analyser at some central location and on line to the reciprocal transfer service provider. Furthermore there may be a number of biometric analysers connected to a common control means.
This arrangement is particularly suitable for use in an electronic funds transfer at point of sale (EFTPOS) system since the reciprocal transfer system can automatically indicate to the EFTPOS system that a transaction of value can proceed wallowing that transfer of value to proceed automatically with a minimum of operator intervention.
The parameter or parameters generated by the biometric feature analyser can indicate the degree to which a submitted biometric feature is simular to a reference feature and preferably these parameters correspond to those described in our co-pending British
patent applicationlfiled on the 3rd November 1989 and entitled "Improvements relating to individual verification" (Agents Ref: 30/3035/01).
An example of an EFTPOS system incorporating a reciprocal transfer system and method according to the invention will now be described with reference to the accompanying drawings, in which: Figure 1 is a block diagram of an off-line system; and, Figure 2 is a block diagram of an on-line system.
In both the reciprocal transfer applications described, a number of parties are involved including at least the following: The consumer's bank, the retailer's bank and the EFTPOS acquirer who gives the service transfer guarantee to the retailer that the transfer of value may proceed. The EFTPOS acquirer provides apparatus to the retailer to initiate the reciprocal transfer and to assist in the verification of the consumer or user. The consumer's bank issues an identification token such as a card to the consumer to provide a machine readable method of identifying the consumer's account.
In the apparatus shown in Figure 1, a card reader 1 is provided such as a Swipe reader which reads from a consumer's card details of his bank account and the like together with reference biometric data. The account details are fed from the reader to a conventional EFTPOS terminal 2 while the reference biometric data is fed to a microprocessor 3. In this example, the microprocessor 3 is provided locally to the EFTPOS terminal 2. A biometric feature analyser 4 is connected to the microprocessor 3 and is adapted to obtain from the consumer current biometric features. In another example the microprocessor 3 may be a combined element of EFTPOS terminal 2 i.e. one microprocessor may service both the biometric and EFTPOS functions.
In one example, the consumer presents his card to the retailer who places the card in the card reader 1 to allow the reference biometric data and the bank account data to be down loaded to the microprocessor 3 and EFTPOS terminal 2 respectively. The consumer then supplies the necessary biometric data in the form of a submission to the analyser 4. For example, this can comprise writing his signature on a signature pad forming part of the analyser 4, the analyser then obtaining from that signature, data relating to both static and dynamic characteristics of the signature. These features are then supplied to the microprocessor 3 which performs a signature analysis on the submitted data and the reference data. This analysis would typically be of the form described in more detail in the co-pending British application mentioned above the content of which is included herein by reference.The result of that biometric or signature analysis is the generation of a number of parameters including a confidence of match, a variance, a vulnerability, and a composite biometric level of confidence. The confidence of match parameter is derived from the comparison of the biometric submission with the reference; the variance parameter is derived from an assessment of the level of variance exhibited by the service user or consumer over a period of time and provides an indication of whether the confidence of match parameter is within an acceptable range; and the vulnerability parameter is an assessment of the degree of difficulty in forging/counterfietting the biometric property of the user or consumer. The composite biometric level of confidence is derived from a function which combines the 3 parameters mentioned above together with the possibility of a fraudulent service user.This composite biometric level of confidence parameter is denoted PR1.
A second parameter PR2 provides a composite service provider/type of service risk assessment and is generated from one or a combination of the following parameters: i). Service provider profile. This identifies the service provider and defines characteristics such as type of service (e.g. retailer classification), typical levels of service (e.g. average transaction value) and risk level of location.
The concept of floor limits in point of sale payments is a mechanism used to quantify the risk level of the location, and is not a primary parameter type.
ii). Probability of fraud. This value may vary over time or between service providers. This is an input to the biometric verification sub-system to allow the composite biometric verification sub-system to allow the composite biometric level of confidence to be generated.
iii). Value of Service. This is the value that is processed by the reciprocal transfer system, e.g.
transaction amount.
iv). Time and date. The time of day, day of week, and special seasons of the year may all be significant.
v). Environmental issues. These cover factors such as climatic conditions.
A third parameter PR3 defining a composite user risk assessment is produced for one or a combination of the following parameters: i). Usage pattern. This is a record of previous use and assumes that significance reduces the further one goes back in time. In practice, this is likely to be a circular buffer limited to a fixed number of transactions.
ii). User profile. This covers any other parameters which are significant to the application such as physical characteristics (e.g. age, sex, social group, psychological profile, handed-ness) and application related parameters.
Each of these parameters PR1, PR2, PR3 is a function of one or more of the base parameters preferred to and for example PR2 can be defined as: SCORE = [ W1 * F (service provider profile) + spp 2 vts (value and type of service) + W3 * Ftd (time and date) + W4 * F ei (environmental issues) ] where: W, W1 4 are signed weighting values.
F is a function which generates a ssp numeric value by classifying the details comprising the service provider profile.
Fvts is a function which generates a numeric value by classifying the value of the transaction, and possibly also the type of transaction.
F td is a function which generates a numeric value by classifying time, date and possible special periods (e.g. pre-Christmas) into risk levels.
F . Is a function which tests for ei special circumstances surrounding environmental issues such as extremes of temperature.
Similarly, Function PR3 can be defined as: SCORE = [ W5 * F (user profile) + sup W6 * F (usage pattern, transaction up value and type, time and date) where: S. .6 are signed weighting values.
F is a function which generates a sup numeric value by classifying the details comprising the user profile.
F is a function which generates a up numeric value by analysing the previous pattern of usage and comparing it to the circumstance surrounding the current one.
The output scores for the three composite parameters are then classified into respective classes or bands to define three such classes, giving the values X in the range 1 ... x+l from PR1 Y in the range 1 ... y+l from PR2 Z in the range 1 ... z+l from PR3 The microprocessor 3 includes a three dimensional look-up table whose elements are addressed by the band or class values, the three bands derived above being used therefore to address the look-up tables to obtain a risk assessment parameter.Each element of the array contains one of the following set of values: -1 Pass - proceed with transfer-of value 0 Fail - do not proceed with transfer of value 1 Resort to SA1 for decision 2 Resort to SA2 for decision n Resort to SAn for decision Each SA (Secondary Algorithm) is a function which has as input all the individual parameters listed above plus the composite functions PR1 - PR3. For each SAn, a different set of weights exists, one for each input parameter. Like the above functions, each value is multiplied by the weighting and all products added together to produce a score.
The score of each SA is divided into three bands by n two thresholds, which are again unique to each SA. Band 1 means fail, band 2 means resort to other procedures, and band 3 means pass.
Clearly, different SA's will attach different priorities to different categories of risk. For example, where the value is modest but the biometric risk is high, more detailed attention will be paid to the biometric parameters. Similarly, a high value transaction may attach more significance to the usage pattern.
In the Figure 1 example, the card supplied by the consumer contains the biometric reference data as well as the bank account data to enable local operations.
Figure 2 illustrates a different arrangement in which the computer which decides and determines the final risk assessment parameter is located remotely from the EFTPOS terminal 2. In this example, the consumer's card identifies the bank account and the location of the consumer's reference data in a store 5 remote from the terminal 2, typically at the banks premises. Biometric features are obtained from the consumer by the analyser 4 and sent via the EFTPOS terminal 2 aiong a link 6 to the consumers bank 7. Typically, the link 6 forms part of a conventional EFTPOS system. A computer 8 located at the consumer's bank then extracts the reference biometric data from the store 5 and performs the biometric analysis together with the further risk analysis to generate the final risk assessment parameter in the same way as described above in connection with Figure 1, this final risk assessment parameter then being supplied back to the terminal along a link 9 to control whether the transaction of value proceeds or not.

Claims (10)

1. A reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser (4) for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means (3) connected to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
2. A system according to claim 1, wherein the control means include a store for storing a history of previous use by the user, the history being used by the control means as one of the additional parameters.
3. A system according to claim 1 or claim 2, wherein the control means stores parameters relating to the profile of each user for use alone or in combination as an additional parameter.
4. A system according to any of the preceeding claims, wherein one or more of the additional parameters is selected from: a) Supplier profile parameters; b) Probability of fraud; c) Value of service; d) Time and date of transaction; e) Environmental conditions.
5. A system according to any of the preceeding claims, wherein the predetermined algorithm has the form: R = W1 F1 (P1, P2 ... PN) + W2 F2 (P1, P2 ... PN) + ...
where R is the final risk assessment parameter, W1 W2 etc are respective weights, P1 P2 etc are the parameter values, and F1, F2 etc are functions generating a score or absolute value for a given parameter set.
6. A system according to any of the preceeding claims, wherein the control means includes comparison means to compare the final risk assessment parameter with at least one threshold.
7. A system according to claim 6, wherein the thresholds define 3 bands so that if the final risk assessment parameter falls in one band the control means indicates that the transfer of value can proceed, if it falls in another band the control means indicates that the transfer of value cannot proceed, and if it falls in an intemediate band the control means performs a further algorithm.
8. A system according to claim 7, wherein if the final risk assessment parameter lies in the intermediate band then the control means determines a further final risk assessment parameter (R') in accordance with the formula: R' = W1' F1 (P1, P2 ... PN) + W2' F2 (P1, P2 ... PN) + ..
where W1', W2' etc are respective weights, Pl, P2 etc are the parameter values, and F1, F2 etc are functions generating a score or absolute value for a given parameter set.
9. A transfer of value system comprising transaction apparatus for debiting funds from a user and crediting those funds to a supplier; and a reciprocal transfer system according to any of the preceeding claims, for indicating to the apparatus whether or not the transfer can proceed.
10. A method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system, the method comprising obtaining from the user at least one biometric feature; performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
GB9023551A 1989-11-03 1990-10-30 Reciprocal transfer system Expired - Fee Related GB2237670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9023551A GB2237670B (en) 1989-11-03 1990-10-30 Reciprocal transfer system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB898924847A GB8924847D0 (en) 1989-11-03 1989-11-03 Reciprocal transfer system
GB9023551A GB2237670B (en) 1989-11-03 1990-10-30 Reciprocal transfer system

Publications (3)

Publication Number Publication Date
GB9023551D0 GB9023551D0 (en) 1990-12-12
GB2237670A true GB2237670A (en) 1991-05-08
GB2237670B GB2237670B (en) 1993-04-07

Family

ID=26296151

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9023551A Expired - Fee Related GB2237670B (en) 1989-11-03 1990-10-30 Reciprocal transfer system

Country Status (1)

Country Link
GB (1) GB2237670B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0652540A1 (en) * 1993-11-08 1995-05-10 NCR International, Inc. Self-service business system
WO1999048056A1 (en) * 1998-03-16 1999-09-23 Giesecke & Devrient Gmbh Method and device for verifying a biometric characteristic
WO2001022201A1 (en) * 1999-09-20 2001-03-29 Ethentica, Inc. Context sensitive dynamic authentication in a cryptographic system
EP1202228A1 (en) * 2000-10-17 2002-05-02 Varette Limited A user authentication system and process
EP1323089A1 (en) * 2000-08-04 2003-07-02 First Data Corporation Entity authentication in electronic communications by providing verification status of device
EP1450321A1 (en) * 2003-02-21 2004-08-25 Swisscom Mobile AG Method and system for detecting possible fraud in paying transactions
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
CN100409617C (en) * 2003-01-30 2008-08-06 微软公司 System and method of authenticating validity and dropoff
US7577621B2 (en) 1999-09-20 2009-08-18 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US7877611B2 (en) 2000-03-08 2011-01-25 Aurora Wireless Technologies, Ltd. Method and apparatus for reducing on-line fraud using personal digital identification
US8155322B2 (en) 2006-11-07 2012-04-10 Security First Corp. Systems and methods for distributing and securing data
US8271802B2 (en) 2004-10-25 2012-09-18 Security First Corp. Secure data parser method and system
US8601498B2 (en) 2010-05-28 2013-12-03 Security First Corp. Accelerator system for use with secure data storage
US8650434B2 (en) 2010-03-31 2014-02-11 Security First Corp. Systems and methods for securing data in motion
US8654971B2 (en) 2009-05-19 2014-02-18 Security First Corp. Systems and methods for securing data in the cloud
US8745372B2 (en) 2009-11-25 2014-06-03 Security First Corp. Systems and methods for securing data in motion
US8898464B2 (en) 2008-02-22 2014-11-25 Security First Corp. Systems and methods for secure workgroup management and communication
US9397827B2 (en) 2007-09-14 2016-07-19 Security First Corp. Systems and methods for managing cryptographic keys
US9733849B2 (en) 2014-11-21 2017-08-15 Security First Corp. Gateway for cloud-based secure storage
US9881177B2 (en) 2013-02-13 2018-01-30 Security First Corp. Systems and methods for a cryptographic file system layer

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2658097T3 (en) 2005-11-18 2018-03-08 Security First Corporation Method and secure data analysis system
BRPI0720132A2 (en) 2006-12-05 2015-07-21 Security First Corp Improved tape backup method that uses a secure data analyzer.
US8473756B2 (en) 2008-01-07 2013-06-25 Security First Corp. Systems and methods for securing data using multi-factor or keyed dispersal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002080A1 (en) * 1979-03-19 1980-10-02 Ncr Co Identity verification apparatus and method
GB2112190A (en) * 1981-12-23 1983-07-13 Omron Tateisi Electronics Ltd Personal identification system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1980002080A1 (en) * 1979-03-19 1980-10-02 Ncr Co Identity verification apparatus and method
GB2112190A (en) * 1981-12-23 1983-07-13 Omron Tateisi Electronics Ltd Personal identification system

Cited By (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0652540A1 (en) * 1993-11-08 1995-05-10 NCR International, Inc. Self-service business system
US6798334B1 (en) 1998-03-16 2004-09-28 Giesecke & Devrient Gmbh Method and device for verifying a biometric characteristic
WO1999048056A1 (en) * 1998-03-16 1999-09-23 Giesecke & Devrient Gmbh Method and device for verifying a biometric characteristic
US8494969B2 (en) 1999-09-20 2013-07-23 Security First Corp. Cryptographic server with provisions for interoperability between cryptographic systems
WO2001022322A3 (en) * 1999-09-20 2001-10-11 Ethentica Inc Electronic commerce with cryptographic authentication
US9613220B2 (en) 1999-09-20 2017-04-04 Security First Corp. Secure data parser method and system
US9298937B2 (en) 1999-09-20 2016-03-29 Security First Corp. Secure data parser method and system
WO2001022201A1 (en) * 1999-09-20 2001-03-29 Ethentica, Inc. Context sensitive dynamic authentication in a cryptographic system
US8726033B2 (en) 1999-09-20 2014-05-13 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
WO2001022322A2 (en) * 1999-09-20 2001-03-29 Ethentica, Inc. Electronic commerce with cryptographic authentication
US7802104B2 (en) 1999-09-20 2010-09-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7260724B1 (en) 1999-09-20 2007-08-21 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7391865B2 (en) 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US8332638B2 (en) 1999-09-20 2012-12-11 Security First Corp. Secure data parser method and system
US7577621B2 (en) 1999-09-20 2009-08-18 Security First Corporation Cryptographic server with provisions for interoperability between cryptographic systems
US8214650B2 (en) 1999-09-20 2012-07-03 Security First Corporation Context sensitive dynamic authentication in a cryptographic system
US7877611B2 (en) 2000-03-08 2011-01-25 Aurora Wireless Technologies, Ltd. Method and apparatus for reducing on-line fraud using personal digital identification
EP1323089A4 (en) * 2000-08-04 2006-04-19 First Data Corp Entity authentication in electronic communications by providing verification status of device
EP1323089A1 (en) * 2000-08-04 2003-07-02 First Data Corporation Entity authentication in electronic communications by providing verification status of device
EP1202228A1 (en) * 2000-10-17 2002-05-02 Varette Limited A user authentication system and process
CN100409617C (en) * 2003-01-30 2008-08-06 微软公司 System and method of authenticating validity and dropoff
EP1450321A1 (en) * 2003-02-21 2004-08-25 Swisscom Mobile AG Method and system for detecting possible fraud in paying transactions
WO2004075130A1 (en) * 2003-02-21 2004-09-02 Swisscom Mobile Ag Method and system for uncovering potential cases of fraud in payment transactions
US7610040B2 (en) 2003-02-21 2009-10-27 Swisscom Mobile Ag Method and system for detecting possible frauds in payment transactions
US9935923B2 (en) 2004-10-25 2018-04-03 Security First Corp. Secure data parser method and system
US9338140B2 (en) 2004-10-25 2016-05-10 Security First Corp. Secure data parser method and system
US9871770B2 (en) 2004-10-25 2018-01-16 Security First Corp. Secure data parser method and system
US8271802B2 (en) 2004-10-25 2012-09-18 Security First Corp. Secure data parser method and system
US9985932B2 (en) 2004-10-25 2018-05-29 Security First Corp. Secure data parser method and system
US8769699B2 (en) 2004-10-25 2014-07-01 Security First Corp. Secure data parser method and system
US9906500B2 (en) 2004-10-25 2018-02-27 Security First Corp. Secure data parser method and system
US9992170B2 (en) 2004-10-25 2018-06-05 Security First Corp. Secure data parser method and system
US8904194B2 (en) 2004-10-25 2014-12-02 Security First Corp. Secure data parser method and system
US9009848B2 (en) 2004-10-25 2015-04-14 Security First Corp. Secure data parser method and system
US9047475B2 (en) 2004-10-25 2015-06-02 Security First Corp. Secure data parser method and system
US9135456B2 (en) 2004-10-25 2015-09-15 Security First Corp. Secure data parser method and system
US11178116B2 (en) 2004-10-25 2021-11-16 Security First Corp. Secure data parser method and system
US9294444B2 (en) 2004-10-25 2016-03-22 Security First Corp. Systems and methods for cryptographically splitting and storing data
US9294445B2 (en) 2004-10-25 2016-03-22 Security First Corp. Secure data parser method and system
US8155322B2 (en) 2006-11-07 2012-04-10 Security First Corp. Systems and methods for distributing and securing data
US8787583B2 (en) 2006-11-07 2014-07-22 Security First Corp. Systems and methods for distributing and securing data
US9774449B2 (en) 2006-11-07 2017-09-26 Security First Corp. Systems and methods for distributing and securing data
US9397827B2 (en) 2007-09-14 2016-07-19 Security First Corp. Systems and methods for managing cryptographic keys
US8898464B2 (en) 2008-02-22 2014-11-25 Security First Corp. Systems and methods for secure workgroup management and communication
US8654971B2 (en) 2009-05-19 2014-02-18 Security First Corp. Systems and methods for securing data in the cloud
US8745372B2 (en) 2009-11-25 2014-06-03 Security First Corp. Systems and methods for securing data in motion
US8745379B2 (en) 2009-11-25 2014-06-03 Security First Corp. Systems and methods for securing data in motion
US9589148B2 (en) 2010-03-31 2017-03-07 Security First Corp. Systems and methods for securing data in motion
US9443097B2 (en) 2010-03-31 2016-09-13 Security First Corp. Systems and methods for securing data in motion
US9213857B2 (en) 2010-03-31 2015-12-15 Security First Corp. Systems and methods for securing data in motion
US8650434B2 (en) 2010-03-31 2014-02-11 Security First Corp. Systems and methods for securing data in motion
US10068103B2 (en) 2010-03-31 2018-09-04 Security First Corp. Systems and methods for securing data in motion
US8601498B2 (en) 2010-05-28 2013-12-03 Security First Corp. Accelerator system for use with secure data storage
US9881177B2 (en) 2013-02-13 2018-01-30 Security First Corp. Systems and methods for a cryptographic file system layer
US10402582B2 (en) 2013-02-13 2019-09-03 Security First Corp. Systems and methods for a cryptographic file system layer
US9733849B2 (en) 2014-11-21 2017-08-15 Security First Corp. Gateway for cloud-based secure storage
US10031679B2 (en) 2014-11-21 2018-07-24 Security First Corp. Gateway for cloud-based secure storage

Also Published As

Publication number Publication date
GB2237670B (en) 1993-04-07
GB9023551D0 (en) 1990-12-12

Similar Documents

Publication Publication Date Title
GB2237670A (en) Reciprocal transfer system
US4734564A (en) Transaction system with off-line risk assessment
US5615277A (en) Tokenless security system for authorizing access to a secured computer system
US5231569A (en) Account transaction system
US5384449A (en) Authorization matching system
US6732919B2 (en) System and method for using a multiple-use credit card
US7158947B1 (en) Method for selectively blocking remote purchase requests
US8433648B2 (en) Method and system for engaging in a transaction between a consumer and a merchant
US4812628A (en) Transaction system with off-line risk assessment
US20050125343A1 (en) Method and apparatus for monetizing personal consumer profiles by aggregating a plurality of consumer credit card accounts into one card
US20070174164A1 (en) Network/Processor Fraud Scoring for Card Not Present Transactions
JP2006507563A (en) Method and system for a multi-purpose trading platform
US20070174208A1 (en) System and Method for Global Automated Address Verification
US20090094124A1 (en) Real-time point-of-sale change-of-address processing
US20110295745A1 (en) Systems and methods for appending supplemental payment data to a transaction message
US20020069158A1 (en) Method and system for providing a secured multi-purpose electronic account
US20060026098A1 (en) Method and apparatus for effecting payment
EP1230610A1 (en) System and method for offering and providing secured credit card products
MXPA02000486A (en) Dynamic currency conversion for card payment systems.
CA2561139A1 (en) Point-of-sale customer identification system
US20140172646A1 (en) Method for selectively verifying or blocking remote purchase requests
US20150235207A1 (en) Risk mitigating transaction authorization
US20090171838A1 (en) Systems and methods wherein a credit product is offered in accordance with usage of a pre-paid card account
US20150235208A1 (en) Proof-of-verification network
US20150235221A1 (en) Proof-of-verification network for third party issuers

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20051030