GB2383497A - Transaction verification using a mobile telephone network - Google Patents
Transaction verification using a mobile telephone network Download PDFInfo
- Publication number
- GB2383497A GB2383497A GB0130760A GB0130760A GB2383497A GB 2383497 A GB2383497 A GB 2383497A GB 0130760 A GB0130760 A GB 0130760A GB 0130760 A GB0130760 A GB 0130760A GB 2383497 A GB2383497 A GB 2383497A
- Authority
- GB
- United Kingdom
- Prior art keywords
- mobile telephone
- transaction
- network
- specific data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
- G06Q20/4037—Remote solvency checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A financial transaction is verified using a user code, transaction data and mobile telephone specific information. The user verification may use information relating to the location, cell, network or number of the cellular phone. The user code may be a PIN or a user account number. The verification signal may be a pass/fail decision or a credit score percentage. The customer's normal spending patterns may be used to determine the credit worthiness, by using location, past habits, common purchases and monthly spend. Based on a cumulative value of network security, fraud detection and user authentication a purchase may be approved or refused.
Description
<Desc/Clms Page number 1>
TRANSACTION VERIFICATION USING
A MOBILE TELEPHONE NETWORK FIELD OF THE INVENTION The present invention relates to the verification of transactions using a mobile telephone network BACKGROUND OF THE INVENTION The use of mobile telephones in organised crime is increasing, in particular in the field of fraudulent transactions. As part of the ongoing upgrade to cellular communication networks, operators are looking to provide new services to enhance usage of the networks and hence their revenue. One application that seems likely to become widespread is mobile commerce-the ability to perform transactions over a mobile handset or other user device. Mobile commerce potentially includes all commercial activities that are currently performed over the Internet; buying physical goods, buying services, electronic banking and so on.
Unfortunately, the introduction of mobile commerce also introduces greater potential for fraud. Tracing fraudulent use of stolen or cloned handsets and/or credit details is virtually impossible in a mobile environment.
SUMMARY OF THE INVENTION We have identified the need to provide greater security to recipients of mobile telephone calls, by providing a mechanism for the recipient to verify a transaction conducted by a mobile telephone caller.
<Desc/Clms Page number 2>
The invention is defined in the independent claims. An embodiment of the invention comprises a system with three inputs respectively for transaction data, a user code and mobile telephone specific data. A verifier receives these three inputs and provides a verification signal as a function of the inputs. The call recipient can choose to allow or deny a transaction based on the call verification signal. The advantage of this system is that there are two independent sources of information by which a transaction can be verified, namely the user code and the mobile telephone specific data. A transaction initiated with two unmatched sources may be used to generate a verification signal indicating that the transaction should be denied.
In the preferred embodiment, the mobile telephone specific data indicates the identity and location of the mobile telephone. The location in particular, we have appreciated, provides a mechanism for verification because the owner of the mobile telephone is likely to have a usual pattern of movement and operate with a range of usual user codes, such as credit card numbers or bank account numbers. Any transactions outside the usual patterns/ranges can be viewed as dubious.
BRIEF DESCRIPTION OF THE FIGURES An embodiment of the invention will now be described by way of example only and with reference to the accompanying figures in which: Figure 1: is a schematic view of a call made using a system embodying the invention; and Figure 2: shows a transaction verification matrix for use in the verifier of Figure 1.
<Desc/Clms Page number 3>
DESCRIPTION OF A PREFERRED EMBODIMENT The main component in the system embodying the invention is a verifier 20, which can be implemented as a separate processor, or as part of a mobile telephone network.
Preferably, the verifier will be controlled by an independent agency. A mobile telephone 10 communicates with a network 12 via a radio link 11 in the usual manner.
The call is then provided to a recipient 14 over a communications link 16, which could be a landline or another radio link. In addition, data link 18 provides mobile telephone specific data to the recipient 14. The data link 18 could be the same physical link as the communications link 18. The mobile telephone specific data includes one or more of the identity of the network used, the ID of the mobile handset 10 and the physical location of the handset 10, to the accuracy of a cell or better. It is particularly the location data which provides an advantage. The location data could be derived by GPS, EOTD or other location derivation technology.
The recipient 14 wishes to ensure that any transaction received via the network 12 is from a non-fraudulent source, and so provides data over three input lines to the verifier 20. The first input line 22 passes a user code provided by the user over link 16 as part of the call.
The second input line 24 provides transaction data, which can be an amount and/or type of product, and specifies sufficient data to identify the transaction to be verified. The third input line 26 provides the mobile telephone specific data, which is preferably the location of the mobile telephone 10, and a network ID and a mobile handset ID. Any subset of this information may be used.
The verifier generates a verification signal over line 28 to the recipient 14. The verification signal could be a simple one bit 0 or 1, pass or fail, but is preferably a
<Desc/Clms Page number 4>
score expressed as a percentage or similar. This allows the recipient to decide whether a transaction is authorised depending upon the score.
The system is applicable to a wide variety of transaction types, and could be used between individuals on companies as a way of ensuring callers are authorised to undertake given acts. The system is particularly suited to transactions in which the user code is a credit card number or bank account number.
Most credit card companies use a scoring system when deciding when to authorise a transaction. By analysing the customer's normal spending pattern rogue transactions can, in many cases, be identified and barred. The usual credit card fraud prevention systems use factors such as: 1. Is the transaction with a retailer the customer has recently used? 2. Is the transaction for goods or services that the customer has recently bought? 3. Is the customer's current monthly spending unusual? The specific calculations made vary between systems, but the principle is the same. In general, the result of each calculation is not a simple yes or no, but a score indicating how unusual the transaction being considered is for the customer requesting it. Based on the cumulative total of the scores, a decision is made as to whether to authorise, refer, or refuse the transaction.
The present system introduces new factors into the existing credit scoring system: 1. Did the transaction originate in a mobile network?
This is very easy to ascertain, given a small change
<Desc/Clms Page number 5>
to the transaction system used by online retailers, and co-operation from the network.
2. If so, what is the identity of the network? The network should be happy to make this information available in the name of increased security. The user could object to such information being made available under data protection law, but subject to appropriate data protection policy by the card issuers, this should not be a problem. If such a policy is in place and the user still refuses to release information, then this fact can be taken as an input to the credit score. It is likely that the existing wording of credit card agreements coves such data anyway.
3. If available, what is the ID of the handset initiating the transaction? Again, this information is subject to data protection law as it is specific to a user. The ID provided is a network function and could be any of several things. Examples are the user's mobile phone number, the user's IP address and any of the IDs used internally by the mobile network.
4. If available, what is the physical location of the handset initiating the transaction. The latest mobile network technology allows the physical location of a handset to be determined; this information is available to the network and can be made available to outside agencies (although again within the constraints of data protection law).
Using the above data within the existing credit scoring systems, a more secure system is provided. The system can be configured as follows for credit card transactions.
Transactions on the same credit card but originating within different mobile networks are suspicious.
Transactions made on the same card but from different
<Desc/Clms Page number 6>
mobile handsets are suspicious. Transactions made from widely differing locations are suspicious. The exact degree of suspicion attributed to each of the above factors is specific to the card user, based on transaction history. A transaction verification matrix is shown in Figure 2 and comprises the pertinent information stored for generation of a verification message in the example given.
Claims (12)
- CLAIMS 1. A method of verifying a transaction conducted over a mobile telephone network between a mobile telephone user and a recipient, comprising: - receiving a user code provided by a user to the recipient via a mobile telephone and the network; - receiving transaction data generated by the recipient relating to the transaction; - receiving mobile telephone specific data generated either by the mobile telephone or the network relating to the mobile telephone; and - generating a verification signal derived as a function of the user code, transaction data and mobile telephone specific data.
- 2. A method according to claim 1, wherein the mobile telephone specific data includes the identity of the network via which the transaction is conducted.
- 3. A method according to either of claim 1 or 2, wherein the mobile telephone specific data includes an identification number of the mobile telephone.
- 4. A method according to any of claims 1,2 or 3, wherein the mobile telephone specific data includes the cell within the network from which the transaction is conducted.
- 5. A method according to any preceding claim, wherein the mobile telephone specific data includes the location of the mobile telephone.<Desc/Clms Page number 8>
- 6. A method according to any preceding claim, wherein the user code is an account number or a PIN.
- 7. A transaction verification system for use with a mobile telephone network in which data unique to a mobile telephone is received from mobile telephones at the network, comprising: - a first input for receiving a user code provided by a user to the recipient via a mobile telephone and the network; - a second input for receiving transaction data generated by the recipient relating to the transaction; - a third input for receiving mobile telephone specific data generated either by the mobile telephone or the network relating to the mobile telephone; and - a verifier for generating a verification signal derived as a function of the user code, transaction data and mobile telephone specific data.
- 8. A system according to claim 7, wherein the mobile telephone specific data includes the identity of the network via which the transaction is conducted.
- 9. A system according to claim 7 or 8, wherein the mobile telephone specific data includes an identification number of the mobile telephone.
- 10. A system according to claims 7,8 or 9, wherein the mobile telephone specific data includes the cell within the network from which the transaction is conducted.<Desc/Clms Page number 9>
- 11. A system according to claims 7 to 10, wherein the mobile telephone specific data includes the location of the mobile telephone.
- 12. A system according to claims 7 to 11, wherein the user code is an account number or a PIN.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0130760A GB2383497B (en) | 2001-12-21 | 2001-12-21 | Transaction verification using a mobile telephone network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0130760A GB2383497B (en) | 2001-12-21 | 2001-12-21 | Transaction verification using a mobile telephone network |
Publications (3)
Publication Number | Publication Date |
---|---|
GB0130760D0 GB0130760D0 (en) | 2002-02-06 |
GB2383497A true GB2383497A (en) | 2003-06-25 |
GB2383497B GB2383497B (en) | 2005-09-07 |
Family
ID=9928256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0130760A Expired - Lifetime GB2383497B (en) | 2001-12-21 | 2001-12-21 | Transaction verification using a mobile telephone network |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2383497B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7503489B2 (en) | 2005-04-26 | 2009-03-17 | Bpriv, Llc | Method and system for monitoring electronic purchases and cash-withdrawals |
US8032438B1 (en) * | 2008-03-12 | 2011-10-04 | Jpmorgan Chase Bank, N.A. | Method and system for automating fraud authorization strategies |
US20120246076A1 (en) * | 2009-09-30 | 2012-09-27 | Rakuten, Inc. | Credit card fraud prevention system |
US8413898B2 (en) | 2005-04-26 | 2013-04-09 | Guy Heffez | Method and system for monitoring electronic purchases and cash-withdrawals |
US8640197B2 (en) | 2005-04-26 | 2014-01-28 | Guy Heffez | Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information |
US8650103B2 (en) | 2001-10-17 | 2014-02-11 | Ebay, Inc. | Verification of a person identifier received online |
CN105933334A (en) * | 2016-06-20 | 2016-09-07 | 联动优势科技有限公司 | Fraudulent application judging method and device, and fraudulent application information collection method and device |
US9727867B2 (en) | 2005-04-26 | 2017-08-08 | Guy Hefetz | Method for detecting misuse of identity in electronic transactions |
US10521786B2 (en) | 2005-04-26 | 2019-12-31 | Spriv Llc | Method of reducing fraud in on-line transactions |
US11308477B2 (en) | 2005-04-26 | 2022-04-19 | Spriv Llc | Method of reducing fraud in on-line transactions |
US11354667B2 (en) | 2007-05-29 | 2022-06-07 | Spriv Llc | Method for internet user authentication |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11818287B2 (en) | 2017-10-19 | 2023-11-14 | Spriv Llc | Method and system for monitoring and validating electronic transactions |
US12034863B2 (en) | 2009-01-21 | 2024-07-09 | Spriv Llc | Methods of authenticating the identity of a computer |
US11978052B2 (en) | 2011-03-28 | 2024-05-07 | Spriv Llc | Method for validating electronic transactions |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0367361A2 (en) * | 1988-10-31 | 1990-05-09 | Gte Telecommunication Services Incorporated | Customer activation system |
GB2307618A (en) * | 1995-11-21 | 1997-05-28 | At & T Corp | Detecting fraudulent telephone calls |
JP2001273451A (en) * | 2000-03-28 | 2001-10-05 | Toshiba Corp | Mobile communication terminal |
GB2365264A (en) * | 2000-07-25 | 2002-02-13 | Vodafone Ltd | System and method of authentication |
US20020052754A1 (en) * | 1998-09-15 | 2002-05-02 | Joyce Simon James | Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment |
-
2001
- 2001-12-21 GB GB0130760A patent/GB2383497B/en not_active Expired - Lifetime
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0367361A2 (en) * | 1988-10-31 | 1990-05-09 | Gte Telecommunication Services Incorporated | Customer activation system |
GB2307618A (en) * | 1995-11-21 | 1997-05-28 | At & T Corp | Detecting fraudulent telephone calls |
US20020052754A1 (en) * | 1998-09-15 | 2002-05-02 | Joyce Simon James | Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment |
JP2001273451A (en) * | 2000-03-28 | 2001-10-05 | Toshiba Corp | Mobile communication terminal |
GB2365264A (en) * | 2000-07-25 | 2002-02-13 | Vodafone Ltd | System and method of authentication |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8650103B2 (en) | 2001-10-17 | 2014-02-11 | Ebay, Inc. | Verification of a person identifier received online |
US7503489B2 (en) | 2005-04-26 | 2009-03-17 | Bpriv, Llc | Method and system for monitoring electronic purchases and cash-withdrawals |
US8413898B2 (en) | 2005-04-26 | 2013-04-09 | Guy Heffez | Method and system for monitoring electronic purchases and cash-withdrawals |
US8640197B2 (en) | 2005-04-26 | 2014-01-28 | Guy Heffez | Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information |
US9727867B2 (en) | 2005-04-26 | 2017-08-08 | Guy Hefetz | Method for detecting misuse of identity in electronic transactions |
US10521786B2 (en) | 2005-04-26 | 2019-12-31 | Spriv Llc | Method of reducing fraud in on-line transactions |
US11308477B2 (en) | 2005-04-26 | 2022-04-19 | Spriv Llc | Method of reducing fraud in on-line transactions |
US11354667B2 (en) | 2007-05-29 | 2022-06-07 | Spriv Llc | Method for internet user authentication |
US8032438B1 (en) * | 2008-03-12 | 2011-10-04 | Jpmorgan Chase Bank, N.A. | Method and system for automating fraud authorization strategies |
US20120246076A1 (en) * | 2009-09-30 | 2012-09-27 | Rakuten, Inc. | Credit card fraud prevention system |
US9898727B2 (en) * | 2009-09-30 | 2018-02-20 | Rakuten, Inc. | Credit card fraud prevention system |
CN105933334A (en) * | 2016-06-20 | 2016-09-07 | 联动优势科技有限公司 | Fraudulent application judging method and device, and fraudulent application information collection method and device |
Also Published As
Publication number | Publication date |
---|---|
GB2383497B (en) | 2005-09-07 |
GB0130760D0 (en) | 2002-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8924295B2 (en) | User terminal location based credit card authorization servers, systems, methods and computer program products | |
Merritt | Mobile money transfer services: the next phase in the evolution of person-to-person payments | |
US12126648B2 (en) | Utilizing trust tokens to conduct secure message exchanges | |
EP1250685B1 (en) | Banking system with enhanced identification of financial accounts | |
US7761381B1 (en) | Method and system for approving of financial transactions | |
US20050278192A1 (en) | Method and system for detecting possible frauds in payment transactions | |
US20120084203A1 (en) | System and method for secure transactions using device-related fingerprints | |
US20070133768A1 (en) | Fraud detection for use in payment processing | |
US20010016835A1 (en) | Method of payment by means of an electronic communication device | |
US20140344155A1 (en) | Out of band authentication and authorization processing | |
US20100153276A1 (en) | Method and system for online payment and identity confirmation with self-setting authentication fomula | |
GB2383497A (en) | Transaction verification using a mobile telephone network | |
WO2007117632A2 (en) | Sim-centric mobile commerce system for deployment in a legacy network infrastructure | |
CN103020820A (en) | Transaction payment method and system | |
JP2006518503A (en) | Method and module for closing or unlocking a deposit account | |
CN102197407A (en) | System and method of secure payment transactions | |
US20020082986A1 (en) | Method for payment in exchange | |
WO2016094592A1 (en) | Mobile application solution for payment validation | |
KR20060109562A (en) | Method for approving a settlement of a financetransaction depend on an outsider | |
US20020069162A1 (en) | Method for payment, user equipment, server, payment system and computer program product | |
KR20070049418A (en) | Checking system for individual credit scoring information using cellular phone | |
Brookson | GSM (and PCN) Security and Encryption | |
Abdullaev et al. | Security challenge and issue of mobile banking in Republic of Uzbekistan: A state of art survey | |
US20100332349A1 (en) | Systems and methods for fund transfers using prepaid calling cards and telephones | |
CN1963856A (en) | Authentication method of safety of finance business on network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |