Unlock instant, AI-driven research and patent intelligence for your innovation.

A financial transaction control system, an application and a method of the same

a financial transaction and control system technology, applied in the field of financial transaction fraud prevention, can solve the problems of low security level, false signatures, prior individual authentication processing, etc., and achieve the effect of effectively protecting unauthorized use and preventing card unauthorized us

Inactive Publication Date: 2021-02-25
MATSUNAGA CHIKARA
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The financial transaction control system described in this patent prevents unauthorized use of cards. It works by assigning a special code to a user's account, allowing them to open and edit financial transaction information. However, if the code is used for unauthorized purposes, the system will detect it and close the application file, preventing further use. This makes it easy for users to approve and protect against unauthorized use.

Problems solved by technology

However, there are problems in the prior individual authentication processing described above.
When a sign of a user is used as the personal authentication means of a credit card, the security level is low.
That is, the signature may be false.
In addition, the staff at the store may not have enough experience or enough skill in sign authentication.
Next, when a personal identification number is used as the personal identification means of the credit card, the security level is not enough.
It may be inferred by third party and may be leaked out to a third party during the use of a credit card payment terminal in a certain financial transaction, so that a credit card may be illegally used.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A financial transaction control system, an application and a method of the same
  • A financial transaction control system, an application and a method of the same
  • A financial transaction control system, an application and a method of the same

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

[0088]A financial transaction control system 100A according to the present invention and a user application 210A using the same are described.

[0089]FIG. 1 is a schematic view showing the configuration of the financial transaction control system 100A of Embodiment 1 and a user application 210A according to the Embodiment 1. In addition to a financial transaction control system 100A and a user application 210A, a user terminal 200A, a user medium 300, a store terminal / EC site 400, and a payment management system 500A are shown in FIG. 1.

[0090]The financial transaction control system 100A is a system for controlling a financial transaction accompanied by credit use or debit use by a user.

[0091]The financial transaction control system 100A is provided between the user terminal 200A and the payment management system 500A. It may be provided on the user terminal 200A or on the payment management system 500A. In this example, the financial transaction control system 100A is provided on the...

embodiment 2

[0175]An example of Embodiment 2 is shown, in which the user ID holding medium 300 is not required, and electronic credit financial transaction processing and electronic debit financial transaction processing in which the user ID information necessary for financial transaction processing and the like are computerized in the smart phone 200.

[0176]In the following description, as an example, the financial transaction control system 100B of the electronic payment applying to the electronic payment application 260B and user account information 270B installed in the user terminal 200B and the user account information 560B of the payment processing unit 530 is described. These electronic payment application 260B and user account information 270B installed in the user terminal 200B and the user account information 560B of the payment processing unit 530 are not limited. The user application 210B of the user terminal 200b and the financial transaction processing application 110B of the fina...

embodiment 3

[0212]An example of Embodiment 3 is shown, in which the availability status information and the availability status information state control part are provided, and a security level is improved by performing invalid default processing at normal time. It is shown as so-called electronic credit financial transaction process or an electronic debit financial transaction process in which the user ID holding medium 300 is not required in the same manner as in Embodiment 2.

[0213]FIG. 17 is the drawing showing a configuration example of the financial transaction control system 100C according to the Embodiment 3. As shown in FIG. 17, the financial transaction control system 100C according to this Embodiment 3 comprises at least the financial transaction processing application 110C and the secret code authentication part 120C.

[0214]In this Embodiment 3, the financial transaction processing application 110C includes the availability status information state control part 111C and the user appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

[Problem to be solved] To provide a financial transaction control system that makes it possible to prevent unauthorized use via skimming or identity fraud by a third party in financial transactions such as use of credit and use of debit.[Solution] A financial transaction control system in which an open secret code and a close secret code are set and registered in a financial transaction processing application file generated for each user account. Authentication of an open secret code transmitted by a user terminal is required in processing for opening a financial transaction processing application file, and when financial transaction information is subsequently received from a financial transaction and editing processing for editing the financial transaction information in the financial transaction processing application file is performed, an approval request regarding the financial transaction information is transmitted to the user terminal, the financial transaction control system waits for a reply including approval information, and after authentication of a close secret code included in the approval information included in the reply. The transmitting processing for transmitting the financial transaction data to a payment management system and close processing for closing the financial transaction processing application file are performed.

Description

TECHNICAL FIELD[0001]The present invention relates to the technical field of fraud prevention in financial transactions involving credit use and debit use.BACKGROUND ART[0002]Financial transactions using a credit card, a cash card, or the like are widely spread because of high convenience. In recent years, electronic payment systems have become popular, and electronic payment using credit function applications and debit function applications incorporated into smart phones have been increasing.[0003]Financial transactions using a credit function and a debit function are convenient and are expected to become more popular in the future, but there is also a problem associated with unauthorized use. When the cards are lost or stolen, there is a possibility that the cards are illegally used. There is also a possibility that skimming damage may occur.[0004]To prevent unauthorized use of a credit card or a cash card, various measures are taken in the past.[0005]One of the prior personal aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06F21/32
CPCG06Q20/40145G06F21/32G06Q20/4012G06F21/602G06F21/6218G06F21/78H04W4/40H04W12/06H04L63/0861B60W40/09G07C5/085G07C9/00309G07C2009/00388
Inventor MATSUNAGA, CHIKARA
Owner MATSUNAGA CHIKARA