GB2237670A - Reciprocal transfer system - Google Patents
Reciprocal transfer system Download PDFInfo
- Publication number
- GB2237670A GB2237670A GB9023551A GB9023551A GB2237670A GB 2237670 A GB2237670 A GB 2237670A GB 9023551 A GB9023551 A GB 9023551A GB 9023551 A GB9023551 A GB 9023551A GB 2237670 A GB2237670 A GB 2237670A
- Authority
- GB
- United Kingdom
- Prior art keywords
- value
- parameter
- transfer
- user
- control means
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A reciprocal transfer system for transfer involving a user and supplier (e.g. retailer) comprises a biometric feature analyser (4) which obtains at least one feature from the user and verifies it to provide a resulting parameter. This parameter is combined with other parameters which may be unrelated to the identification of the user to produce a final risk assessment parameter. Control means (3) indicate to the supplier whether or not the transaction should proceed in accordance with the final risk assessment parameter. <IMAGE>
Description
RECIPROCAL TRANSFER SYSTEM
The invention relates to a transfer of value application in which a user wishes to receive services or goods from a supplier in return for a reciprocal transfer of funds or commitment to recognise the value of the service supplied.
In a typical multilateral decision making situation, each party has a different set of interests and priorities and frequently there has to be a compromise between conflicting decision criteria. For example, in the case of a typical payment situation involving a customer (bank account holder), a retailer and a bank, the customer desires no fraudulent use of the account, the retailer wants guaranteed payment without turning down any customers, and the bank wants no repudiations (particularly successful ones) with processed transactions.
When cash is involved in the transfer of value, the supplier has a guarantee that the funds or commitment supplied by the user will be recognised by the issuer of the cash. However, more recently it has become common for users to tender a credit or debit card which does not in itself guarantee that funds or commitment will be guaranteed by the issuer of the card who provides a main element of the Reciprocal Transfer Service.
The invention is concerned with such multilateral exchanges in which there are at least three parties, that is the user, the supplier, and the reciprocal transfer service which will often be a bank.
In the past, the reciprocal transfer service has had to rely on the decision ability of the supplier to confirm that the user is positively identified and that the supplier is granted authority to access the users account. Generally this has involved requesting the user to provide his signature which is then visually compared with a reference signature on a card. In some situations, the supplier has been provided with aids to assist with this comparison such as a signature pad.
There is a need for the reciprocal transfer service to have more control over transfers of value and to reduce the reliance on the supplier.
In accordance with one aspect of the present invention, a reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means coupled to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means being adapted thereafter to indicate to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
In accordance with a second aspect of the present invention, a method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system comprises obtaining from the user at least one biometric feature; performing a verification analysis on the feature and generating at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
We have recognised the inherent problems with biometric methods of user verification which cannot in general give 100% confidence in the verification of identity. Consequently, we now propose combining the results of the biometric verification analysis with other, typically application specific, parameters independent of the biometric features so as to reduce the effect of the uncertainty of the biometric analysis itself.
In one example, the control means has a store for storing at least the recent history of previous uses of the system by each user, that history being used by the control means to constitute one of the additional parameters. Typically, the significance attached to the history will reduce with time and in practice the store may comprise a circular buffer arranged to contain a limited, fixed number of transaction details.
Alternatively, or in addition to the above, the control means may include a store for storing parameters relating to the user which are selected singly or in combination by the control means to constitute one of the additional parameters. These stored parameters relating to the user may include physical characteristics such as age, sex, social group, psychological profile, handedness, and application related parameters.
In addition or alternatively to the above, the additional parameters may be chosen from the following;
a) Supplier profile parameters eg type of service (for example retailer classification), typical levels of service (for example average transaction values) and risk level of location;
b) Probability of fraud;
c) Value of service;
d) Time and date of transaction;
e) Environmental conditions.
The predetermined algorithm preferably has the form; R = W1 F1 (P1, P2 ...PN) + W2 F2 (P1, P2 ... PN) + ...
where R is the final risk assessment parameter, W1 W2 etc are respective weights,
P1 P2 etc are the parameter values, and
F1, F2 etc are functions generating a score or absolute value for a given parameter set.
In one application, the control means compares the final risk assessment parameter (R) with at least one threshold to determine whether the transaction of value can proceed.
In the preferred arrangement, the thresholds define 3 bands so that if the final risk assessment parameter falls in one band the control means indicates that the transaction of value can proceed, if it falls in another band the control means indicates that the transfer of value cannot proceed, and if it falls in an intermediate band the control means performs a further algorithm.
This further algorithm may be similar to the algorithm defined above but makes use of different weighting factors so that the parameters are combined in a different manner.
Typically the control means will be sited together with the biometric frature analyser at the point at which the transaction occurs (i.e. point of sale) and off-line to the reciprocal transfer service provider. The control means may also be sited remote from the biometric feature analyser at some central location and on line to the reciprocal transfer service provider. Furthermore there may be a number of biometric analysers connected to a common control means.
This arrangement is particularly suitable for use in an electronic funds transfer at point of sale (EFTPOS) system since the reciprocal transfer system can automatically indicate to the EFTPOS system that a transaction of value can proceed wallowing that transfer of value to proceed automatically with a minimum of operator intervention.
The parameter or parameters generated by the biometric feature analyser can indicate the degree to which a submitted biometric feature is simular to a reference feature and preferably these parameters correspond to those described in our co-pending British
patent applicationlfiled on the 3rd November 1989 and entitled "Improvements relating to individual verification" (Agents Ref: 30/3035/01).
An example of an EFTPOS system incorporating a reciprocal transfer system and method according to the invention will now be described with reference to the accompanying drawings, in which:
Figure 1 is a block diagram of an off-line system; and,
Figure 2 is a block diagram of an on-line system.
In both the reciprocal transfer applications described, a number of parties are involved including at least the following: The consumer's bank, the retailer's bank and the EFTPOS acquirer who gives the service transfer guarantee to the retailer that the transfer of value may proceed. The EFTPOS acquirer provides apparatus to the retailer to initiate the reciprocal transfer and to assist in the verification of the consumer or user. The consumer's bank issues an identification token such as a card to the consumer to provide a machine readable method of identifying the consumer's account.
In the apparatus shown in Figure 1, a card reader 1 is provided such as a Swipe reader which reads from a consumer's card details of his bank account and the like together with reference biometric data. The account details are fed from the reader to a conventional EFTPOS terminal 2 while the reference biometric data is fed to a microprocessor 3. In this example, the microprocessor 3 is provided locally to the EFTPOS terminal 2. A biometric feature analyser 4 is connected to the microprocessor 3 and is adapted to obtain from the consumer current biometric features. In another example the microprocessor 3 may be a combined element of EFTPOS terminal 2 i.e. one microprocessor may service both the biometric and EFTPOS functions.
In one example, the consumer presents his card to the retailer who places the card in the card reader 1 to allow the reference biometric data and the bank account data to be down loaded to the microprocessor 3 and EFTPOS terminal 2 respectively. The consumer then supplies the necessary biometric data in the form of a submission to the analyser 4. For example, this can comprise writing his signature on a signature pad forming part of the analyser 4, the analyser then obtaining from that signature, data relating to both static and dynamic characteristics of the signature. These features are then supplied to the microprocessor 3 which performs a signature analysis on the submitted data and the reference data. This analysis would typically be of the form described in more detail in the co-pending British application mentioned above the content of which is included herein by reference.The result of that biometric or signature analysis is the generation of a number of parameters including a confidence of match, a variance, a vulnerability, and a composite biometric level of confidence. The confidence of match parameter is derived from the comparison of the biometric submission with the reference; the variance parameter is derived from an assessment of the level of variance exhibited by the service user or consumer over a period of time and provides an indication of whether the confidence of match parameter is within an acceptable range; and the vulnerability parameter is an assessment of the degree of difficulty in forging/counterfietting the biometric property of the user or consumer. The composite biometric level of confidence is derived from a function which combines the 3 parameters mentioned above together with the possibility of a fraudulent service user.This composite biometric level of confidence parameter is denoted PR1.
A second parameter PR2 provides a composite service provider/type of service risk assessment and is generated from one or a combination of the following parameters:
i). Service provider profile. This identifies the service provider and defines characteristics such as type of service (e.g. retailer classification), typical levels of service (e.g. average transaction value) and risk level of location.
The concept of floor limits in point of sale payments is a mechanism used to quantify the risk level of the location, and is not a primary parameter type.
ii). Probability of fraud. This value may vary over time or between service providers. This is an input to the biometric verification sub-system to allow the composite biometric verification sub-system to allow the composite biometric level of confidence to be generated.
iii). Value of Service. This is the value that is processed by the reciprocal transfer system, e.g.
transaction amount.
iv). Time and date. The time of day, day of week, and special seasons of the year may all be significant.
v). Environmental issues. These cover factors such as climatic conditions.
A third parameter PR3 defining a composite user risk assessment is produced for one or a combination of the following parameters:
i). Usage pattern. This is a record of previous use and assumes that significance reduces the further one goes back in time. In practice, this is likely to be a circular buffer limited to a fixed number of transactions.
ii). User profile. This covers any other parameters which are significant to the application such as physical characteristics (e.g. age, sex, social group, psychological profile, handed-ness) and application related parameters.
Each of these parameters PR1, PR2, PR3 is a function of one or more of the base parameters preferred to and for example PR2 can be defined as: SCORE = [ W1 * F (service provider profile) +
spp 2 vts (value and type of service) +
W3 * Ftd (time and date) +
W4 * F ei (environmental issues) ] where: W, W1 4 are signed weighting values.
F is a function which generates a
ssp
numeric value by classifying the
details comprising the service
provider profile.
Fvts is a function which generates a
numeric value by classifying the
value of the transaction, and
possibly also the type of
transaction.
F td is a function which generates a
numeric value by classifying time,
date and possible special periods
(e.g. pre-Christmas) into risk
levels.
F . Is a function which tests for
ei special circumstances surrounding
environmental issues such as
extremes of temperature.
Similarly, Function PR3 can be defined as: SCORE = [ W5 * F (user profile) +
sup
W6 * F (usage pattern, transaction
up value and type, time and
date) where: S. .6 are signed weighting values.
F is a function which generates a
sup numeric value by classifying the
details comprising the user profile.
F is a function which generates a
up numeric value by analysing the
previous pattern of usage and
comparing it to the circumstance
surrounding the current one.
The output scores for the three composite parameters are then classified into respective classes or bands to define three such classes, giving the values
X in the range 1 ... x+l from PR1 Y in the range 1 ... y+l from PR2
Z in the range 1 ... z+l from PR3
The microprocessor 3 includes a three dimensional look-up table whose elements are addressed by the band or class values, the three bands derived above being used therefore to address the look-up tables to obtain a risk assessment parameter.Each element of the array contains one of the following set of values:
-1 Pass - proceed with transfer-of value 0 Fail - do not proceed with transfer of value
1 Resort to SA1 for decision
2 Resort to SA2 for decision
n Resort to SAn for decision
Each SA (Secondary Algorithm) is a function which has as input all the individual parameters listed above plus the composite functions PR1 - PR3. For each SAn, a different set of weights exists, one for each input parameter. Like the above functions, each value is multiplied by the weighting and all products added together to produce a score.
The score of each SA is divided into three bands by
n two thresholds, which are again unique to each SA. Band 1 means fail, band 2 means resort to other procedures, and band 3 means pass.
Clearly, different SA's will attach different priorities to different categories of risk. For example, where the value is modest but the biometric risk is high, more detailed attention will be paid to the biometric parameters. Similarly, a high value transaction may attach more significance to the usage pattern.
In the Figure 1 example, the card supplied by the consumer contains the biometric reference data as well as the bank account data to enable local operations.
Figure 2 illustrates a different arrangement in which the computer which decides and determines the final risk assessment parameter is located remotely from the
EFTPOS terminal 2. In this example, the consumer's card identifies the bank account and the location of the consumer's reference data in a store 5 remote from the terminal 2, typically at the banks premises. Biometric features are obtained from the consumer by the analyser 4 and sent via the EFTPOS terminal 2 aiong a link 6 to the consumers bank 7. Typically, the link 6 forms part of a conventional EFTPOS system. A computer 8 located at the consumer's bank then extracts the reference biometric data from the store 5 and performs the biometric analysis together with the further risk analysis to generate the final risk assessment parameter in the same way as described above in connection with Figure 1, this final risk assessment parameter then being supplied back to the terminal along a link 9 to control whether the transaction of value proceeds or not.
Claims (10)
1. A reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser (4) for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means (3) connected to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
2. A system according to claim 1, wherein the control means include a store for storing a history of previous use by the user, the history being used by the control means as one of the additional parameters.
3. A system according to claim 1 or claim 2, wherein the control means stores parameters relating to the profile of each user for use alone or in combination as an additional parameter.
4. A system according to any of the preceeding claims, wherein one or more of the additional parameters is selected from:
a) Supplier profile parameters;
b) Probability of fraud;
c) Value of service;
d) Time and date of transaction;
e) Environmental conditions.
5. A system according to any of the preceeding claims, wherein the predetermined algorithm has the form: R = W1 F1 (P1, P2 ... PN) + W2 F2 (P1, P2 ... PN) +
...
where R is the final risk assessment parameter,
W1 W2 etc are respective weights,
P1 P2 etc are the parameter values, and
F1, F2 etc are functions generating a score or absolute value for a given parameter set.
6. A system according to any of the preceeding claims, wherein the control means includes comparison means to compare the final risk assessment parameter with at least one threshold.
7. A system according to claim 6, wherein the thresholds define 3 bands so that if the final risk assessment parameter falls in one band the control means indicates that the transfer of value can proceed, if it falls in another band the control means indicates that the transfer of value cannot proceed, and if it falls in an intemediate band the control means performs a further algorithm.
8. A system according to claim 7, wherein if the final risk assessment parameter lies in the intermediate band then the control means determines a further final risk assessment parameter (R') in accordance with the formula: R' = W1' F1 (P1, P2 ... PN) + W2' F2 (P1, P2 ... PN) + ..
where W1', W2' etc are respective weights, Pl, P2 etc are the parameter values, and
F1, F2 etc are functions generating a score or absolute value for a given parameter set.
9. A transfer of value system comprising transaction apparatus for debiting funds from a user and crediting those funds to a supplier; and a reciprocal transfer system according to any of the preceeding claims, for indicating to the apparatus whether or not the transfer can proceed.
10. A method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system, the method comprising obtaining from the user at least one biometric feature; performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9023551A GB2237670B (en) | 1989-11-03 | 1990-10-30 | Reciprocal transfer system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB898924847A GB8924847D0 (en) | 1989-11-03 | 1989-11-03 | Reciprocal transfer system |
GB9023551A GB2237670B (en) | 1989-11-03 | 1990-10-30 | Reciprocal transfer system |
Publications (3)
Publication Number | Publication Date |
---|---|
GB9023551D0 GB9023551D0 (en) | 1990-12-12 |
GB2237670A true GB2237670A (en) | 1991-05-08 |
GB2237670B GB2237670B (en) | 1993-04-07 |
Family
ID=26296151
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9023551A Expired - Fee Related GB2237670B (en) | 1989-11-03 | 1990-10-30 | Reciprocal transfer system |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2237670B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0652540A1 (en) * | 1993-11-08 | 1995-05-10 | NCR International, Inc. | Self-service business system |
WO1999048056A1 (en) * | 1998-03-16 | 1999-09-23 | Giesecke & Devrient Gmbh | Method and device for verifying a biometric characteristic |
WO2001022201A1 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Context sensitive dynamic authentication in a cryptographic system |
EP1202228A1 (en) * | 2000-10-17 | 2002-05-02 | Varette Limited | A user authentication system and process |
EP1323089A1 (en) * | 2000-08-04 | 2003-07-02 | First Data Corporation | Entity authentication in electronic communications by providing verification status of device |
EP1450321A1 (en) * | 2003-02-21 | 2004-08-25 | Swisscom Mobile AG | Method and system for detecting possible fraud in paying transactions |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
CN100409617C (en) * | 2003-01-30 | 2008-08-06 | 微软公司 | System and method of authenticating validity and dropoff |
US7577621B2 (en) | 1999-09-20 | 2009-08-18 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
US7877611B2 (en) | 2000-03-08 | 2011-01-25 | Aurora Wireless Technologies, Ltd. | Method and apparatus for reducing on-line fraud using personal digital identification |
US8155322B2 (en) | 2006-11-07 | 2012-04-10 | Security First Corp. | Systems and methods for distributing and securing data |
US8271802B2 (en) | 2004-10-25 | 2012-09-18 | Security First Corp. | Secure data parser method and system |
US8601498B2 (en) | 2010-05-28 | 2013-12-03 | Security First Corp. | Accelerator system for use with secure data storage |
US8650434B2 (en) | 2010-03-31 | 2014-02-11 | Security First Corp. | Systems and methods for securing data in motion |
US8654971B2 (en) | 2009-05-19 | 2014-02-18 | Security First Corp. | Systems and methods for securing data in the cloud |
US8745372B2 (en) | 2009-11-25 | 2014-06-03 | Security First Corp. | Systems and methods for securing data in motion |
US8898464B2 (en) | 2008-02-22 | 2014-11-25 | Security First Corp. | Systems and methods for secure workgroup management and communication |
US9397827B2 (en) | 2007-09-14 | 2016-07-19 | Security First Corp. | Systems and methods for managing cryptographic keys |
US9733849B2 (en) | 2014-11-21 | 2017-08-15 | Security First Corp. | Gateway for cloud-based secure storage |
US9881177B2 (en) | 2013-02-13 | 2018-01-30 | Security First Corp. | Systems and methods for a cryptographic file system layer |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ES2658097T3 (en) | 2005-11-18 | 2018-03-08 | Security First Corporation | Method and secure data analysis system |
BRPI0720132A2 (en) | 2006-12-05 | 2015-07-21 | Security First Corp | Improved tape backup method that uses a secure data analyzer. |
US8473756B2 (en) | 2008-01-07 | 2013-06-25 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1980002080A1 (en) * | 1979-03-19 | 1980-10-02 | Ncr Co | Identity verification apparatus and method |
GB2112190A (en) * | 1981-12-23 | 1983-07-13 | Omron Tateisi Electronics Ltd | Personal identification system |
-
1990
- 1990-10-30 GB GB9023551A patent/GB2237670B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1980002080A1 (en) * | 1979-03-19 | 1980-10-02 | Ncr Co | Identity verification apparatus and method |
GB2112190A (en) * | 1981-12-23 | 1983-07-13 | Omron Tateisi Electronics Ltd | Personal identification system |
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0652540A1 (en) * | 1993-11-08 | 1995-05-10 | NCR International, Inc. | Self-service business system |
US6798334B1 (en) | 1998-03-16 | 2004-09-28 | Giesecke & Devrient Gmbh | Method and device for verifying a biometric characteristic |
WO1999048056A1 (en) * | 1998-03-16 | 1999-09-23 | Giesecke & Devrient Gmbh | Method and device for verifying a biometric characteristic |
US8494969B2 (en) | 1999-09-20 | 2013-07-23 | Security First Corp. | Cryptographic server with provisions for interoperability between cryptographic systems |
WO2001022322A3 (en) * | 1999-09-20 | 2001-10-11 | Ethentica Inc | Electronic commerce with cryptographic authentication |
US9613220B2 (en) | 1999-09-20 | 2017-04-04 | Security First Corp. | Secure data parser method and system |
US9298937B2 (en) | 1999-09-20 | 2016-03-29 | Security First Corp. | Secure data parser method and system |
WO2001022201A1 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Context sensitive dynamic authentication in a cryptographic system |
US8726033B2 (en) | 1999-09-20 | 2014-05-13 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
WO2001022322A2 (en) * | 1999-09-20 | 2001-03-29 | Ethentica, Inc. | Electronic commerce with cryptographic authentication |
US7802104B2 (en) | 1999-09-20 | 2010-09-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7260724B1 (en) | 1999-09-20 | 2007-08-21 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US8332638B2 (en) | 1999-09-20 | 2012-12-11 | Security First Corp. | Secure data parser method and system |
US7577621B2 (en) | 1999-09-20 | 2009-08-18 | Security First Corporation | Cryptographic server with provisions for interoperability between cryptographic systems |
US8214650B2 (en) | 1999-09-20 | 2012-07-03 | Security First Corporation | Context sensitive dynamic authentication in a cryptographic system |
US7877611B2 (en) | 2000-03-08 | 2011-01-25 | Aurora Wireless Technologies, Ltd. | Method and apparatus for reducing on-line fraud using personal digital identification |
EP1323089A4 (en) * | 2000-08-04 | 2006-04-19 | First Data Corp | Entity authentication in electronic communications by providing verification status of device |
EP1323089A1 (en) * | 2000-08-04 | 2003-07-02 | First Data Corporation | Entity authentication in electronic communications by providing verification status of device |
EP1202228A1 (en) * | 2000-10-17 | 2002-05-02 | Varette Limited | A user authentication system and process |
CN100409617C (en) * | 2003-01-30 | 2008-08-06 | 微软公司 | System and method of authenticating validity and dropoff |
EP1450321A1 (en) * | 2003-02-21 | 2004-08-25 | Swisscom Mobile AG | Method and system for detecting possible fraud in paying transactions |
WO2004075130A1 (en) * | 2003-02-21 | 2004-09-02 | Swisscom Mobile Ag | Method and system for uncovering potential cases of fraud in payment transactions |
US7610040B2 (en) | 2003-02-21 | 2009-10-27 | Swisscom Mobile Ag | Method and system for detecting possible frauds in payment transactions |
US9935923B2 (en) | 2004-10-25 | 2018-04-03 | Security First Corp. | Secure data parser method and system |
US9338140B2 (en) | 2004-10-25 | 2016-05-10 | Security First Corp. | Secure data parser method and system |
US9871770B2 (en) | 2004-10-25 | 2018-01-16 | Security First Corp. | Secure data parser method and system |
US8271802B2 (en) | 2004-10-25 | 2012-09-18 | Security First Corp. | Secure data parser method and system |
US9985932B2 (en) | 2004-10-25 | 2018-05-29 | Security First Corp. | Secure data parser method and system |
US8769699B2 (en) | 2004-10-25 | 2014-07-01 | Security First Corp. | Secure data parser method and system |
US9906500B2 (en) | 2004-10-25 | 2018-02-27 | Security First Corp. | Secure data parser method and system |
US9992170B2 (en) | 2004-10-25 | 2018-06-05 | Security First Corp. | Secure data parser method and system |
US8904194B2 (en) | 2004-10-25 | 2014-12-02 | Security First Corp. | Secure data parser method and system |
US9009848B2 (en) | 2004-10-25 | 2015-04-14 | Security First Corp. | Secure data parser method and system |
US9047475B2 (en) | 2004-10-25 | 2015-06-02 | Security First Corp. | Secure data parser method and system |
US9135456B2 (en) | 2004-10-25 | 2015-09-15 | Security First Corp. | Secure data parser method and system |
US11178116B2 (en) | 2004-10-25 | 2021-11-16 | Security First Corp. | Secure data parser method and system |
US9294444B2 (en) | 2004-10-25 | 2016-03-22 | Security First Corp. | Systems and methods for cryptographically splitting and storing data |
US9294445B2 (en) | 2004-10-25 | 2016-03-22 | Security First Corp. | Secure data parser method and system |
US8155322B2 (en) | 2006-11-07 | 2012-04-10 | Security First Corp. | Systems and methods for distributing and securing data |
US8787583B2 (en) | 2006-11-07 | 2014-07-22 | Security First Corp. | Systems and methods for distributing and securing data |
US9774449B2 (en) | 2006-11-07 | 2017-09-26 | Security First Corp. | Systems and methods for distributing and securing data |
US9397827B2 (en) | 2007-09-14 | 2016-07-19 | Security First Corp. | Systems and methods for managing cryptographic keys |
US8898464B2 (en) | 2008-02-22 | 2014-11-25 | Security First Corp. | Systems and methods for secure workgroup management and communication |
US8654971B2 (en) | 2009-05-19 | 2014-02-18 | Security First Corp. | Systems and methods for securing data in the cloud |
US8745372B2 (en) | 2009-11-25 | 2014-06-03 | Security First Corp. | Systems and methods for securing data in motion |
US8745379B2 (en) | 2009-11-25 | 2014-06-03 | Security First Corp. | Systems and methods for securing data in motion |
US9589148B2 (en) | 2010-03-31 | 2017-03-07 | Security First Corp. | Systems and methods for securing data in motion |
US9443097B2 (en) | 2010-03-31 | 2016-09-13 | Security First Corp. | Systems and methods for securing data in motion |
US9213857B2 (en) | 2010-03-31 | 2015-12-15 | Security First Corp. | Systems and methods for securing data in motion |
US8650434B2 (en) | 2010-03-31 | 2014-02-11 | Security First Corp. | Systems and methods for securing data in motion |
US10068103B2 (en) | 2010-03-31 | 2018-09-04 | Security First Corp. | Systems and methods for securing data in motion |
US8601498B2 (en) | 2010-05-28 | 2013-12-03 | Security First Corp. | Accelerator system for use with secure data storage |
US9881177B2 (en) | 2013-02-13 | 2018-01-30 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US10402582B2 (en) | 2013-02-13 | 2019-09-03 | Security First Corp. | Systems and methods for a cryptographic file system layer |
US9733849B2 (en) | 2014-11-21 | 2017-08-15 | Security First Corp. | Gateway for cloud-based secure storage |
US10031679B2 (en) | 2014-11-21 | 2018-07-24 | Security First Corp. | Gateway for cloud-based secure storage |
Also Published As
Publication number | Publication date |
---|---|
GB2237670B (en) | 1993-04-07 |
GB9023551D0 (en) | 1990-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2237670A (en) | Reciprocal transfer system | |
US4734564A (en) | Transaction system with off-line risk assessment | |
US5615277A (en) | Tokenless security system for authorizing access to a secured computer system | |
US5231569A (en) | Account transaction system | |
US5384449A (en) | Authorization matching system | |
US6732919B2 (en) | System and method for using a multiple-use credit card | |
US7158947B1 (en) | Method for selectively blocking remote purchase requests | |
US8433648B2 (en) | Method and system for engaging in a transaction between a consumer and a merchant | |
US4812628A (en) | Transaction system with off-line risk assessment | |
US20050125343A1 (en) | Method and apparatus for monetizing personal consumer profiles by aggregating a plurality of consumer credit card accounts into one card | |
US20070174164A1 (en) | Network/Processor Fraud Scoring for Card Not Present Transactions | |
JP2006507563A (en) | Method and system for a multi-purpose trading platform | |
US20070174208A1 (en) | System and Method for Global Automated Address Verification | |
US20090094124A1 (en) | Real-time point-of-sale change-of-address processing | |
US20110295745A1 (en) | Systems and methods for appending supplemental payment data to a transaction message | |
US20020069158A1 (en) | Method and system for providing a secured multi-purpose electronic account | |
US20060026098A1 (en) | Method and apparatus for effecting payment | |
EP1230610A1 (en) | System and method for offering and providing secured credit card products | |
MXPA02000486A (en) | Dynamic currency conversion for card payment systems. | |
CA2561139A1 (en) | Point-of-sale customer identification system | |
US20140172646A1 (en) | Method for selectively verifying or blocking remote purchase requests | |
US20150235207A1 (en) | Risk mitigating transaction authorization | |
US20090171838A1 (en) | Systems and methods wherein a credit product is offered in accordance with usage of a pre-paid card account | |
US20150235208A1 (en) | Proof-of-verification network | |
US20150235221A1 (en) | Proof-of-verification network for third party issuers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | ||
PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20051030 |