WO2006125449A1 - Using the finger print data base to identify the financial associations customers - Google Patents

Using the finger print data base to identify the financial associations customers Download PDF

Info

Publication number
WO2006125449A1
WO2006125449A1 PCT/EG2005/000018 EG2005000018W WO2006125449A1 WO 2006125449 A1 WO2006125449 A1 WO 2006125449A1 EG 2005000018 W EG2005000018 W EG 2005000018W WO 2006125449 A1 WO2006125449 A1 WO 2006125449A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
database
bank
lists
organizations
Prior art date
Application number
PCT/EG2005/000018
Other languages
French (fr)
Inventor
Tamer Abdelhafez Aly
Original Assignee
Tamer Abdelhafez Aly
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tamer Abdelhafez Aly filed Critical Tamer Abdelhafez Aly
Publication of WO2006125449A1 publication Critical patent/WO2006125449A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Definitions

  • the objective is to prevent any one - but the original customer himself- from using the card to deal with the customer's accounts and to prevent cheating the electronic card in case of losing it or knowing it's data by any illegal way.
  • this number consists of 8 (eight) digits that is usually printed on the cards (the first eight digits). These numbers are the issuer bank's number after that the issuer bank add another group of numbers for every client (more five or eight digits) to identify every client who get an additional printed (P.I.N) code in a closed envelope. Based on those procedures the client can use this card to make any banking action all over the world.
  • the previous operation is based on:
  • Client's bank or the card holder bank which has the authority to issue the cards.
  • P. S the step of the pin code inputting and checking the I.D card can be canceled because last procedures are more secure which can reduce the expense on the long term.
  • the forged I.D is the most common method also counterfeiting the client signature is also a common method to deal with the clients account in an illegal way.
  • 5+6+7 immediate time replying using FP database without any paperwork.
  • 1+2+3+4 time planning sequence for a new application request going through ID , FP data entrance , reviewing the general database & immediate reply .
  • 5+6+7 immediate direct reply to completing the application or going though the security procedures because of bad list existence .

Abstract

Using the fingerprint database by scanning the wide client's database and store it in the bank (2) as a first step, when the client (1) asking for issuing card the data is recording on the magnetic stripe of the card, when the client make a transaction on the A.T.M (7) or on the point of sale (6) or even on the bank directly he is asked for entering an instant fingerprint, the next step is comparing the instant fingerprint with the one on the bank database (or with the one on the magnetic stripe of the electronic card) to identify the personality of the client with an exact legal way and make a secure transaction and then secure collection. As a result of collecting data banks can exchange these data with the international organizations which can classify it and make a clients lists according to the legal or illegal dealings. By making the classified lists the international organizations can exchange their lists with each other to gain wide database security. The goverments's organizations in each country may cooperate with the international organizations to take the security steps to deal with deferent lists and exchange the legal information with the international organization.

Description

TECHNECAL FIELD:
To add the fingerprint database to identify the bank's customers and electronic cards users for people who use it to withdraw from their accounts through the A.T.Ms (automatic teller machine) or to buy from the P.O.S (point of sales). The objective is to prevent any one - but the original customer himself- from using the card to deal with the customer's accounts and to prevent cheating the electronic card in case of losing it or knowing it's data by any illegal way.
Also to identify the banks clients through their documented data base to guarantee that the one who has the authority to deal with the account is the client himself with a lawful method. That will decrease the losses that come as a result of cheating and fraud.
So we can consider the financial institutions (like banks ) as the field that obtain the most implantation of using those database
BACK GROUKD ART:
JWhen any client makes an application for making an account in any bank or for issuing an electronic card the bank must materialize the personal data of the client by checking the I.D or the passport in addition to confirming his authorized signature.
In case of issuing an electronic card these data must be restored in a magnetic stripe card to make it safer and will be stored in horizontal paths. The bank accepts those cards as a way of payment according to the reading of the information that is stored in this magnetic card. To make it more secure the client's bank must have a license from the international organizations (like VISA & MASTER CARD) to deal with customers with these systems. Therefore every bank must have his unique unrepeated number (B.I.N) that can deal with other members (banks) and with the international organization.
In usual this number consists of 8 (eight) digits that is usually printed on the cards (the first eight digits). These numbers are the issuer bank's number after that the issuer bank add another group of numbers for every client (more five or eight digits) to identify every client who get an additional printed (P.I.N) code in a closed envelope. Based on those procedures the client can use this card to make any banking action all over the world. The previous operation is based on:
1- Client's bank: or the card holder bank which has the authority to issue the cards.
2- the card holder : the user of the card for personal use all over the world
3- point of sale (P.O. S) : the merchants that makes the transactions with electronic cards after an agreement with a bank to supply them with the necessary tools to deal with customers in return for signing the bills
4- the merchant's bank : which the merchants deal with to collect their bills and supply them with tools as per the agreement between them
5- the international organization: which works as a clearinghouse and transferring the money between the issuer bank and the merchant bank and giving the licenses for the financial association to work through the electronic cards business.
In addition to the previous systems regarding the traditional way in banks on the classic operation like withdrawing and transferring is based on checking the paper data of the client like ID, passport & his authorized signature, but in the electronic transaction with cards there are another security method like a three dimension photo to guarantee the safety of the plastic card (like the water mark in money) and it's hard to forged in addition to that there is a place for the signature of the client to be identified with the one on the bill . In addition to this every client has a personal code number (P. LN) which is not appearing on the card and this number is the security code that the A.T.M machines recognized the client and accept the transaction as a legal one.
Those systems are usable until the present time all over the world in addition to some kind of smartcards that is not generalized until now like the silicon (chip card) that let the data stored safety to add and charge the customer accounts and (memory chip), (smart chip), (super smart chip) that includes a processor and magnetic stripe and display screen which call a programmed credit card.
DISCLOSURE OF THE INVENTION
1- when the client comes to any bank to make an account or to issue an electronic card the finger print must be taken to the client data base by a hand scanner, special hardware that is designed to pick up and restore the fingerprint database, and storing this data on the main frame of the bank data through the operating system 2- Verifying the data and ensuring the sameness of the stored data base with the enclosures of the client details.
3- Feeding the computer with the verified data and making the inclusion of this data on his data base and on the magnetic stripe card on the electronic cards
4- Before any action on the client account he must enter an instant fingerprint direct on the specialized machine.
5- Verifying the entered fingerprint with the one on the magnetic stripe of the card holder (automatically).
6- Matching those data with the stored on the bank and in case of identification the client is allowed to get through his account.
-in case of rejecting this operation the security arrangement can be started
P. S: the step of the pin code inputting and checking the I.D card can be canceled because last procedures are more secure which can reduce the expense on the long term.
* We can use this project widely with low cost throw organizations & institutions which can control the dynamic of banks by generalization it by ruling it throw the organizations (like visa & master card as an example)with supervision on banks.
Also, that we can apply it directly on banks & institutions which deal with electronic cards & financial associations that deal with clients by using new additional technology for the financial associations by entering the hand scanner system and connecting it with the banks & financial associations computers & on the front of the A.T.M machines and at the P.O. S and linking them all by the international organizations (like visa)
* Through the practical using of the cards and making the financial transactions directly there were a large number of cheating and fraud cases to gain the money in an illegal way. Those criminal transactions might be done by individuals or by well organized gangs who has the electronic awareness. One of the common examples on fraud and cheating is to make a structural A.T.M machine and connecting it with a computer to record the data that entered by the client, scheming the card also is a way of cheating, using the simpleminded people to know an information that can be used to withdraw from their account, collusion of the client (or the merchant) himself also is a possibility in some cases to buy from the (P.O. S) with a forged card is very common is some countries. through the direct dealing with banks so much cheating cases had been recorded and some times it's ended with a lawful dispute which can end after a period of time and sometimes the financial institution losses their money. The forged I.D is the most common method also counterfeiting the client signature is also a common method to deal with the clients account in an illegal way.
BRIEF DESCRIBTION OF DRAWING
Rg :1
Clarifying the data flow in the traditional system 1= original client
2= bank (storing and recording client's data) 3= international organization (monitoring and organizing the banks agreements) 4= merchant bank (connecting the client's bank and collect for the P.O. S and setofF charges . 5= point of sales (accepting the client's cards) 6= A.T.M ( direct transactions to withdrawing and access accounts
=based on the valid data=ID+ authorized signature = the client can ask for issuing cards & check
Fig :2
Clarifying the shortage in the traditional system= 1= client /fraudulent /schemed card holder 2= bank (identifying the ID & signature) if this step is overstepped the whole last circle is completed 3=international organization( when the original client complaining it stating to investigate ) 4+5+6= accepting & collecting the incorrect transaction
Fig:3
The treatment of the shortage in the traditional system by using fingerprint database to feedback data in every single transaction. S
1= client/fraudulent
2= bank (asking for instant fingerprint) identifying the stored database and give an immediate reply
3= international organization (recording the fraud history & monitoring the conflicts
4+5+6 = secure transaction and collection
Fig 4, Fig 5 Fig 6 Fig 7
The sequence & collaboration diagrams to record and issue the cards based on the time and place dimensions under the hypothetical of fraudulent database existence.
Fig : 4
1= client 2= ATMs or POS 3= collected FP database A= FP entrance 5= identification 4= accept / reject 5= completing the transaction / security procedures.
Fig : 5
1+2+3+4= time sequence for complete transaction at the same (time and place ) through the client- ATM-database- identification .
5+6+7 = immediate time replying using FP database without any paperwork.
Fig:6
1= client 2= data recording unit (bank) 3= client's database 4= new application 5= searching through the (general) database unit for any previous fraud cases 6= accept / reject recording 7= complete the recording for the application / security procedures
Fig:7
1+2+3+4 = time planning sequence for a new application request going through ID , FP data entrance , reviewing the general database & immediate reply .
5+6+7 = immediate direct reply to completing the application or going though the security procedures because of bad list existence .
Fig : 8
1= client 2= bank(s) 3= general collected database 4= classified grouped database (international organization exchanging data co.)
5= international organizations (like visa) 6= bad client's list 7= clear client's list 8= cooperative governmental organizations (like police) Fig 9:
1= client 2 = bank(s) 3+4+5= deferent international organizations 6=general (huge) database
(where banks makes a collecting for customers database and interchanging it with the international organizations which makes the collecting , classification and preparing the client's list (with each others) then feedback their banks with the classified lists in cooperation with the governmental organizations (police) in each county.
Fig 10: (preview)
1= client 2 = bank(s) (a)= the gathered data transformed from the international organizations (as a member)
(b)= the bank's own clients.
3= the international organizations) that collected the database from banks (members) , other international organizations (partners) and then classifying it into list (bad - clear ) then resending it to the (members) and to the cooperative governmental organizations.
4 = cards data circulation 5= bus banks (collecting & supporters)
6 = P.0.S 7 = A.T.M (s)
8 = governmental organizations which dealing with the client (as a citizen) and exchanging information that needed for the legal procedures with the international organizations.

Claims

1- adding the fingerprint request to the bank's orders beside the traditional applications (ID+ signature) for the new and the earlier bank's clients.
2- collecting these database in legal procedures.
3- Recording those data to magnetic stripe card for the E-cards clients.
4- Equipping the (ATM)s and the (POS)s with the supplemental sets to read the additional data on the cards.
5- Forwarding the collecting database to the international organizations (visa/master) to monitor , classify and make lists ( bad&clear list ).
6- Exchanging database between the international organizations to make a huge database lists.
7- Feeding back the banks with updated lists
8- Cooperating with the government's security organizations (like police) to go through the legal procedures in case of bad lists treatment and to exchanging the information lists if necessary.
PCT/EG2005/000018 2005-05-21 2005-05-28 Using the finger print data base to identify the financial associations customers WO2006125449A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EG2005050243 2005-05-21
EG2005050243 2005-05-21

Publications (1)

Publication Number Publication Date
WO2006125449A1 true WO2006125449A1 (en) 2006-11-30

Family

ID=37451639

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EG2005/000018 WO2006125449A1 (en) 2005-05-21 2005-05-28 Using the finger print data base to identify the financial associations customers

Country Status (1)

Country Link
WO (1) WO2006125449A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19636677A1 (en) * 1996-09-10 1998-04-30 Hasan Javanbakhsh Cash transaction machine
EP1207503A2 (en) * 2000-11-09 2002-05-22 Jinsam Kim System and method of authenticating a credit card using a fingerprint
US6636620B1 (en) * 1997-11-28 2003-10-21 Nec Corporation Personal identification authenticating with fingerprint identification
US20040195314A1 (en) * 2003-04-07 2004-10-07 Lee Ki Deak Credit transaction system and method using fingerprint information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19636677A1 (en) * 1996-09-10 1998-04-30 Hasan Javanbakhsh Cash transaction machine
US6636620B1 (en) * 1997-11-28 2003-10-21 Nec Corporation Personal identification authenticating with fingerprint identification
EP1207503A2 (en) * 2000-11-09 2002-05-22 Jinsam Kim System and method of authenticating a credit card using a fingerprint
US20040195314A1 (en) * 2003-04-07 2004-10-07 Lee Ki Deak Credit transaction system and method using fingerprint information

Similar Documents

Publication Publication Date Title
CA2602317C (en) Negotiable instrument authentication systems and methods
US5341428A (en) Multiple cross-check document verification system
US5365046A (en) Preventing unauthorized use of a credit card
US6036344A (en) Secure check processing system and method
US11907957B2 (en) Advanced check clearance system
US8616440B2 (en) Alternative banking system for managing traditional and nontraditional markets
CN102509238A (en) Bank non-cash business processing method, apparatus and system
EP1370999A1 (en) System for affecting orders for payment with identification by means of card data and fingerprint
US20060131389A1 (en) Data card authentication system and method
US20050197945A1 (en) Optical banking card
KR100588238B1 (en) Bank cheque system with cheques having magnetized strips and/or storage chips
RU2463659C2 (en) Bank card authentication system and method
US20080265017A1 (en) Credit card and security system
US20060092476A1 (en) Document with user authentication
JPH04227567A (en) Data transfer device and data transfer terminal device
WO2006125449A1 (en) Using the finger print data base to identify the financial associations customers
RU2124752C1 (en) Method for making money transactions using smart cards
JPH08202774A (en) Electronic receipt filing card and device for performing access to this card
KR20070026738A (en) Recording medium for managing paper-base(or valuable papers)
Nasution et al. Turnitin
CN201917972U (en) Automatic teller machine with anti-counterfeiting function
Moise Types of Bank Cards Related Frauds
KR20070026735A (en) Management terminal for paper-base(or valuable papers)
GB2385186A (en) User identification in electronic financial transactions
KR20070059038A (en) Management terminal for paper-base(or valuable papers)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

NENP Non-entry into the national phase

Ref country code: RU

WWW Wipo information: withdrawn in national office

Country of ref document: RU

122 Ep: pct application non-entry in european phase

Ref document number: 05746435

Country of ref document: EP

Kind code of ref document: A1