GB2383497A - Transaction verification using a mobile telephone network - Google Patents

Transaction verification using a mobile telephone network Download PDF

Info

Publication number
GB2383497A
GB2383497A GB0130760A GB0130760A GB2383497A GB 2383497 A GB2383497 A GB 2383497A GB 0130760 A GB0130760 A GB 0130760A GB 0130760 A GB0130760 A GB 0130760A GB 2383497 A GB2383497 A GB 2383497A
Authority
GB
United Kingdom
Prior art keywords
mobile telephone
transaction
network
specific data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0130760A
Other versions
GB2383497B (en
GB0130760D0 (en
Inventor
Richard Ormson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Technologies UK Ltd
Original Assignee
NEC Technologies UK Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Technologies UK Ltd filed Critical NEC Technologies UK Ltd
Priority to GB0130760A priority Critical patent/GB2383497B/en
Publication of GB0130760D0 publication Critical patent/GB0130760D0/en
Publication of GB2383497A publication Critical patent/GB2383497A/en
Application granted granted Critical
Publication of GB2383497B publication Critical patent/GB2383497B/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A financial transaction is verified using a user code, transaction data and mobile telephone specific information. The user verification may use information relating to the location, cell, network or number of the cellular phone. The user code may be a PIN or a user account number. The verification signal may be a pass/fail decision or a credit score percentage. The customer's normal spending patterns may be used to determine the credit worthiness, by using location, past habits, common purchases and monthly spend. Based on a cumulative value of network security, fraud detection and user authentication a purchase may be approved or refused.

Description

<Desc/Clms Page number 1>
TRANSACTION VERIFICATION USING A MOBILE TELEPHONE NETWORK FIELD OF THE INVENTION The present invention relates to the verification of transactions using a mobile telephone network BACKGROUND OF THE INVENTION The use of mobile telephones in organised crime is increasing, in particular in the field of fraudulent transactions. As part of the ongoing upgrade to cellular communication networks, operators are looking to provide new services to enhance usage of the networks and hence their revenue. One application that seems likely to become widespread is mobile commerce-the ability to perform transactions over a mobile handset or other user device. Mobile commerce potentially includes all commercial activities that are currently performed over the Internet; buying physical goods, buying services, electronic banking and so on.
Unfortunately, the introduction of mobile commerce also introduces greater potential for fraud. Tracing fraudulent use of stolen or cloned handsets and/or credit details is virtually impossible in a mobile environment.
SUMMARY OF THE INVENTION We have identified the need to provide greater security to recipients of mobile telephone calls, by providing a mechanism for the recipient to verify a transaction conducted by a mobile telephone caller.
<Desc/Clms Page number 2>
The invention is defined in the independent claims. An embodiment of the invention comprises a system with three inputs respectively for transaction data, a user code and mobile telephone specific data. A verifier receives these three inputs and provides a verification signal as a function of the inputs. The call recipient can choose to allow or deny a transaction based on the call verification signal. The advantage of this system is that there are two independent sources of information by which a transaction can be verified, namely the user code and the mobile telephone specific data. A transaction initiated with two unmatched sources may be used to generate a verification signal indicating that the transaction should be denied.
In the preferred embodiment, the mobile telephone specific data indicates the identity and location of the mobile telephone. The location in particular, we have appreciated, provides a mechanism for verification because the owner of the mobile telephone is likely to have a usual pattern of movement and operate with a range of usual user codes, such as credit card numbers or bank account numbers. Any transactions outside the usual patterns/ranges can be viewed as dubious.
BRIEF DESCRIPTION OF THE FIGURES An embodiment of the invention will now be described by way of example only and with reference to the accompanying figures in which: Figure 1: is a schematic view of a call made using a system embodying the invention; and Figure 2: shows a transaction verification matrix for use in the verifier of Figure 1.
<Desc/Clms Page number 3>
DESCRIPTION OF A PREFERRED EMBODIMENT The main component in the system embodying the invention is a verifier 20, which can be implemented as a separate processor, or as part of a mobile telephone network.
Preferably, the verifier will be controlled by an independent agency. A mobile telephone 10 communicates with a network 12 via a radio link 11 in the usual manner.
The call is then provided to a recipient 14 over a communications link 16, which could be a landline or another radio link. In addition, data link 18 provides mobile telephone specific data to the recipient 14. The data link 18 could be the same physical link as the communications link 18. The mobile telephone specific data includes one or more of the identity of the network used, the ID of the mobile handset 10 and the physical location of the handset 10, to the accuracy of a cell or better. It is particularly the location data which provides an advantage. The location data could be derived by GPS, EOTD or other location derivation technology.
The recipient 14 wishes to ensure that any transaction received via the network 12 is from a non-fraudulent source, and so provides data over three input lines to the verifier 20. The first input line 22 passes a user code provided by the user over link 16 as part of the call.
The second input line 24 provides transaction data, which can be an amount and/or type of product, and specifies sufficient data to identify the transaction to be verified. The third input line 26 provides the mobile telephone specific data, which is preferably the location of the mobile telephone 10, and a network ID and a mobile handset ID. Any subset of this information may be used.
The verifier generates a verification signal over line 28 to the recipient 14. The verification signal could be a simple one bit 0 or 1, pass or fail, but is preferably a
<Desc/Clms Page number 4>
score expressed as a percentage or similar. This allows the recipient to decide whether a transaction is authorised depending upon the score.
The system is applicable to a wide variety of transaction types, and could be used between individuals on companies as a way of ensuring callers are authorised to undertake given acts. The system is particularly suited to transactions in which the user code is a credit card number or bank account number.
Most credit card companies use a scoring system when deciding when to authorise a transaction. By analysing the customer's normal spending pattern rogue transactions can, in many cases, be identified and barred. The usual credit card fraud prevention systems use factors such as: 1. Is the transaction with a retailer the customer has recently used? 2. Is the transaction for goods or services that the customer has recently bought? 3. Is the customer's current monthly spending unusual? The specific calculations made vary between systems, but the principle is the same. In general, the result of each calculation is not a simple yes or no, but a score indicating how unusual the transaction being considered is for the customer requesting it. Based on the cumulative total of the scores, a decision is made as to whether to authorise, refer, or refuse the transaction.
The present system introduces new factors into the existing credit scoring system: 1. Did the transaction originate in a mobile network? This is very easy to ascertain, given a small change
<Desc/Clms Page number 5>
to the transaction system used by online retailers, and co-operation from the network.
2. If so, what is the identity of the network? The network should be happy to make this information available in the name of increased security. The user could object to such information being made available under data protection law, but subject to appropriate data protection policy by the card issuers, this should not be a problem. If such a policy is in place and the user still refuses to release information, then this fact can be taken as an input to the credit score. It is likely that the existing wording of credit card agreements coves such data anyway.
3. If available, what is the ID of the handset initiating the transaction? Again, this information is subject to data protection law as it is specific to a user. The ID provided is a network function and could be any of several things. Examples are the user's mobile phone number, the user's IP address and any of the IDs used internally by the mobile network.
4. If available, what is the physical location of the handset initiating the transaction. The latest mobile network technology allows the physical location of a handset to be determined; this information is available to the network and can be made available to outside agencies (although again within the constraints of data protection law).
Using the above data within the existing credit scoring systems, a more secure system is provided. The system can be configured as follows for credit card transactions.
Transactions on the same credit card but originating within different mobile networks are suspicious.
Transactions made on the same card but from different
<Desc/Clms Page number 6>
mobile handsets are suspicious. Transactions made from widely differing locations are suspicious. The exact degree of suspicion attributed to each of the above factors is specific to the card user, based on transaction history. A transaction verification matrix is shown in Figure 2 and comprises the pertinent information stored for generation of a verification message in the example given.

Claims (12)

  1. CLAIMS 1. A method of verifying a transaction conducted over a mobile telephone network between a mobile telephone user and a recipient, comprising: - receiving a user code provided by a user to the recipient via a mobile telephone and the network; - receiving transaction data generated by the recipient relating to the transaction; - receiving mobile telephone specific data generated either by the mobile telephone or the network relating to the mobile telephone; and - generating a verification signal derived as a function of the user code, transaction data and mobile telephone specific data.
  2. 2. A method according to claim 1, wherein the mobile telephone specific data includes the identity of the network via which the transaction is conducted.
  3. 3. A method according to either of claim 1 or 2, wherein the mobile telephone specific data includes an identification number of the mobile telephone.
  4. 4. A method according to any of claims 1,2 or 3, wherein the mobile telephone specific data includes the cell within the network from which the transaction is conducted.
  5. 5. A method according to any preceding claim, wherein the mobile telephone specific data includes the location of the mobile telephone.
    <Desc/Clms Page number 8>
  6. 6. A method according to any preceding claim, wherein the user code is an account number or a PIN.
  7. 7. A transaction verification system for use with a mobile telephone network in which data unique to a mobile telephone is received from mobile telephones at the network, comprising: - a first input for receiving a user code provided by a user to the recipient via a mobile telephone and the network; - a second input for receiving transaction data generated by the recipient relating to the transaction; - a third input for receiving mobile telephone specific data generated either by the mobile telephone or the network relating to the mobile telephone; and - a verifier for generating a verification signal derived as a function of the user code, transaction data and mobile telephone specific data.
  8. 8. A system according to claim 7, wherein the mobile telephone specific data includes the identity of the network via which the transaction is conducted.
  9. 9. A system according to claim 7 or 8, wherein the mobile telephone specific data includes an identification number of the mobile telephone.
  10. 10. A system according to claims 7,8 or 9, wherein the mobile telephone specific data includes the cell within the network from which the transaction is conducted.
    <Desc/Clms Page number 9>
  11. 11. A system according to claims 7 to 10, wherein the mobile telephone specific data includes the location of the mobile telephone.
  12. 12. A system according to claims 7 to 11, wherein the user code is an account number or a PIN.
GB0130760A 2001-12-21 2001-12-21 Transaction verification using a mobile telephone network Expired - Lifetime GB2383497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0130760A GB2383497B (en) 2001-12-21 2001-12-21 Transaction verification using a mobile telephone network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0130760A GB2383497B (en) 2001-12-21 2001-12-21 Transaction verification using a mobile telephone network

Publications (3)

Publication Number Publication Date
GB0130760D0 GB0130760D0 (en) 2002-02-06
GB2383497A true GB2383497A (en) 2003-06-25
GB2383497B GB2383497B (en) 2005-09-07

Family

ID=9928256

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0130760A Expired - Lifetime GB2383497B (en) 2001-12-21 2001-12-21 Transaction verification using a mobile telephone network

Country Status (1)

Country Link
GB (1) GB2383497B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7503489B2 (en) 2005-04-26 2009-03-17 Bpriv, Llc Method and system for monitoring electronic purchases and cash-withdrawals
US8032438B1 (en) * 2008-03-12 2011-10-04 Jpmorgan Chase Bank, N.A. Method and system for automating fraud authorization strategies
US20120246076A1 (en) * 2009-09-30 2012-09-27 Rakuten, Inc. Credit card fraud prevention system
US8413898B2 (en) 2005-04-26 2013-04-09 Guy Heffez Method and system for monitoring electronic purchases and cash-withdrawals
US8640197B2 (en) 2005-04-26 2014-01-28 Guy Heffez Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information
US8650103B2 (en) 2001-10-17 2014-02-11 Ebay, Inc. Verification of a person identifier received online
CN105933334A (en) * 2016-06-20 2016-09-07 联动优势科技有限公司 Fraudulent application judging method and device, and fraudulent application information collection method and device
US9727867B2 (en) 2005-04-26 2017-08-08 Guy Hefetz Method for detecting misuse of identity in electronic transactions
US10521786B2 (en) 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US11308477B2 (en) 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions
US11354667B2 (en) 2007-05-29 2022-06-07 Spriv Llc Method for internet user authentication

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11818287B2 (en) 2017-10-19 2023-11-14 Spriv Llc Method and system for monitoring and validating electronic transactions
US12034863B2 (en) 2009-01-21 2024-07-09 Spriv Llc Methods of authenticating the identity of a computer
US11978052B2 (en) 2011-03-28 2024-05-07 Spriv Llc Method for validating electronic transactions

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0367361A2 (en) * 1988-10-31 1990-05-09 Gte Telecommunication Services Incorporated Customer activation system
GB2307618A (en) * 1995-11-21 1997-05-28 At & T Corp Detecting fraudulent telephone calls
JP2001273451A (en) * 2000-03-28 2001-10-05 Toshiba Corp Mobile communication terminal
GB2365264A (en) * 2000-07-25 2002-02-13 Vodafone Ltd System and method of authentication
US20020052754A1 (en) * 1998-09-15 2002-05-02 Joyce Simon James Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0367361A2 (en) * 1988-10-31 1990-05-09 Gte Telecommunication Services Incorporated Customer activation system
GB2307618A (en) * 1995-11-21 1997-05-28 At & T Corp Detecting fraudulent telephone calls
US20020052754A1 (en) * 1998-09-15 2002-05-02 Joyce Simon James Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment
JP2001273451A (en) * 2000-03-28 2001-10-05 Toshiba Corp Mobile communication terminal
GB2365264A (en) * 2000-07-25 2002-02-13 Vodafone Ltd System and method of authentication

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8650103B2 (en) 2001-10-17 2014-02-11 Ebay, Inc. Verification of a person identifier received online
US7503489B2 (en) 2005-04-26 2009-03-17 Bpriv, Llc Method and system for monitoring electronic purchases and cash-withdrawals
US8413898B2 (en) 2005-04-26 2013-04-09 Guy Heffez Method and system for monitoring electronic purchases and cash-withdrawals
US8640197B2 (en) 2005-04-26 2014-01-28 Guy Heffez Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information
US9727867B2 (en) 2005-04-26 2017-08-08 Guy Hefetz Method for detecting misuse of identity in electronic transactions
US10521786B2 (en) 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US11308477B2 (en) 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions
US11354667B2 (en) 2007-05-29 2022-06-07 Spriv Llc Method for internet user authentication
US8032438B1 (en) * 2008-03-12 2011-10-04 Jpmorgan Chase Bank, N.A. Method and system for automating fraud authorization strategies
US20120246076A1 (en) * 2009-09-30 2012-09-27 Rakuten, Inc. Credit card fraud prevention system
US9898727B2 (en) * 2009-09-30 2018-02-20 Rakuten, Inc. Credit card fraud prevention system
CN105933334A (en) * 2016-06-20 2016-09-07 联动优势科技有限公司 Fraudulent application judging method and device, and fraudulent application information collection method and device

Also Published As

Publication number Publication date
GB2383497B (en) 2005-09-07
GB0130760D0 (en) 2002-02-06

Similar Documents

Publication Publication Date Title
US8924295B2 (en) User terminal location based credit card authorization servers, systems, methods and computer program products
Merritt Mobile money transfer services: the next phase in the evolution of person-to-person payments
US12126648B2 (en) Utilizing trust tokens to conduct secure message exchanges
EP1250685B1 (en) Banking system with enhanced identification of financial accounts
US7761381B1 (en) Method and system for approving of financial transactions
US20050278192A1 (en) Method and system for detecting possible frauds in payment transactions
US20120084203A1 (en) System and method for secure transactions using device-related fingerprints
US20070133768A1 (en) Fraud detection for use in payment processing
US20010016835A1 (en) Method of payment by means of an electronic communication device
US20140344155A1 (en) Out of band authentication and authorization processing
US20100153276A1 (en) Method and system for online payment and identity confirmation with self-setting authentication fomula
GB2383497A (en) Transaction verification using a mobile telephone network
WO2007117632A2 (en) Sim-centric mobile commerce system for deployment in a legacy network infrastructure
CN103020820A (en) Transaction payment method and system
JP2006518503A (en) Method and module for closing or unlocking a deposit account
CN102197407A (en) System and method of secure payment transactions
US20020082986A1 (en) Method for payment in exchange
WO2016094592A1 (en) Mobile application solution for payment validation
KR20060109562A (en) Method for approving a settlement of a financetransaction depend on an outsider
US20020069162A1 (en) Method for payment, user equipment, server, payment system and computer program product
KR20070049418A (en) Checking system for individual credit scoring information using cellular phone
Brookson GSM (and PCN) Security and Encryption
Abdullaev et al. Security challenge and issue of mobile banking in Republic of Uzbekistan: A state of art survey
US20100332349A1 (en) Systems and methods for fund transfers using prepaid calling cards and telephones
CN1963856A (en) Authentication method of safety of finance business on network

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)