Processing

Please wait...

Settings

Settings

Goto Application

1. EP3751489 - FINANCIAL TRANSACTION CONTROL SYSTEM, APPLICATION THEREFOR, AND FINANCIAL TRANSACTION CONTROL METHOD

Office
European Patent Office
Application Number 18873137
Application Date 08.02.2018
Publication Number 3751489
Publication Date 16.12.2020
Publication Kind A4
IPC
G06Q 20/34
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
34using cards, e.g. integrated circuit cards or magnetic cards
G06Q 20/18
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
08Payment architectures
18involving self-service terminals , vending machines, kiosks or multimedia terminals
G06Q 20/20
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
08Payment architectures
20Point-of-sale network systems
G06Q 20/32
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
32using wireless devices
G06Q 20/40
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
CPC
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 21/6218
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
G06F 21/78
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
78to assure secure storage of data
G06F 21/32
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
32using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/4012
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
401Transaction verification
4012Verifying personal identification numbers [PIN]
G06Q 20/40145
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
401Transaction verification
4014Identity check for transactions
40145Biometric identity checks
Applicants MATSUNAGA CHIKARA
Inventors MATSUNAGA CHIKARA
Designated States
Priority Data 2017039703 02.11.2017 JP
Title
(DE) FINANZTRANSAKTIONSSTEUERUNGSSYSTEM, ANWENDUNG DAFÜR UND FINANZTRANSAKTIONSSTEUERUNGSVERFAHREN
(EN) FINANCIAL TRANSACTION CONTROL SYSTEM, APPLICATION THEREFOR, AND FINANCIAL TRANSACTION CONTROL METHOD
(FR) SYSTÈME DE CONTRÔLE DE TRANSACTION FINANCIÈRE, APPLICATION S'Y RAPPORTANT ET PROCÉDÉ DE CONTRÔLE DE TRANSACTION FINANCIÈRE
Abstract
(EN)
Problem to be solved: To provide a financial transaction control system that makes it possible to prevent unauthorized use via skimming or identity fraud by a third party in financial transactions such as use of credit and use of debit. Solution: A financial transaction control system in which an open secret code and a close secret code are set and registered in a financial transaction processing application file generated for each user account. Authentication of an open secret code transmitted by a user terminal is required in processing for opening a financial transaction processing application file, and when financial transaction information is subsequently received from a financial transaction and editing processing for editing the financial transaction information in the financial transaction processing application file is performed, an approval request regarding the financial transaction information is transmitted to the user terminal, the financial transaction control system waits for a reply including approval information, and after authentication of a close secret code included in the approval information included in the reply. The transmitting processing for transmitting the financial transaction data to a payment management system and close processing for closing the financial transaction processing application file are performed.

(FR)
Le problème décrit par la présente invention consiste à fournir un système de contrôle de transaction financière qui permet d'empêcher une utilisation non autorisée par le biais d'un copiage ou d'une fraude d'identité par un tiers dans des transactions financières telles que l'utilisation de crédit et l'utilisation de débit. La solution consiste en un système de contrôle de transaction financière dans lequel un mot de passe ouvert et un mot de passe de fermeture sont définis et enregistrés dans un fichier d'application de traitement de transaction financière généré pour chaque compte d'utilisateur. Une authentification d'un mot de passe ouvert transmis par un terminal utilisateur est nécessaire lors du traitement pour ouvrir un fichier d'application de traitement de transaction financière et, lorsque des informations de transaction financière sont ensuite reçues d'un agent financier et qu'un traitement d'édition pour éditer les informations de transaction financière dans le fichier d'application de traitement de transaction financière est effectué, une requête d'approbation se rapportant aux informations de transaction financière est transmise au terminal utilisateur, le système de contrôle de transaction financière attend une réponse comportant des informations d'approbation et, après l'authentification d'un mot de passe de fermeture inclus dans les informations d'approbation incluses dans la réponse, un traitement pour transférer des données de traitement de transaction financière à un système de gestion de paiement et un traitement pour fermer le fichier d'application de traitement de transaction financière sont effectués.