Processing

Please wait...

Settings

Settings

Goto Application

1. SG11202008682Y - FINANCIAL TRANSACTION CONTROL SYSTEM, APPLICATION THEREFOR, AND FINANCIAL TRANSACTION CONTROL METHOD

Office
Singapore
Application Number 11202008682Y
Application Date 08.02.2018
Publication Number 11202008682Y
Publication Date 30.12.2020
Publication Kind A1
IPC
G06Q 20/34
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
34using cards, e.g. integrated circuit cards or magnetic cards
CPC
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 21/6218
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
G06F 21/78
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
78to assure secure storage of data
G06F 21/32
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
32using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/4012
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
401Transaction verification
4012Verifying personal identification numbers [PIN]
G06Q 20/40145
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
401Transaction verification
4014Identity check for transactions
40145Biometric identity checks
Applicants MATSUNAGA Chikara
Inventors MATSUNAGA Chikara
Title
(EN) FINANCIAL TRANSACTION CONTROL SYSTEM, APPLICATION THEREFOR, AND FINANCIAL TRANSACTION CONTROL METHOD
Abstract
(EN)
80 FINANCIAL TRANSACTION CONTROL SYSTEM, APPLICATION THEREFOR, AND FINANCIAL TRANSACTION CONTROL METHOD Abstract To provide a financial transaction control system preventing unauthorized 5 use by a third party in financial transactions. A financial transaction control system (100) in which an open secret code and a close secret code are set in a financial transaction processing application file (112) for each user account. Authentication of an open secret code by a user terminal (200) is required for opening a financial 10 transaction processing application file (112). When financial transaction is received, an approval request is transmitted to the user terminal (200). The financial transaction control system (100) waits approval information and executes authentication of a close secret code in the approval information. The financial transaction data is transmitted to a payment 15 management system (500) and close processing for closing the financial transaction processing application file (112) are performed. [Fig. 1] 20