Movatterモバイル変換


[0]ホーム

URL:


GB2237670A - Reciprocal transfer system - Google Patents

Reciprocal transfer system
Download PDF

Info

Publication number
GB2237670A
GB2237670AGB9023551AGB9023551AGB2237670AGB 2237670 AGB2237670 AGB 2237670AGB 9023551 AGB9023551 AGB 9023551AGB 9023551 AGB9023551 AGB 9023551AGB 2237670 AGB2237670 AGB 2237670A
Authority
GB
United Kingdom
Prior art keywords
value
parameter
transfer
user
control means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9023551A
Other versions
GB2237670B (en
GB9023551D0 (en
Inventor
Fergus Ion Duncan
William Carter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MIDLAND BANK PLC
De la Rue Systems Ltd
Original Assignee
MIDLAND BANK PLC
De la Rue Systems Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB898924847Aexternal-prioritypatent/GB8924847D0/en
Application filed by MIDLAND BANK PLC, De la Rue Systems LtdfiledCriticalMIDLAND BANK PLC
Priority to GB9023551ApriorityCriticalpatent/GB2237670B/en
Publication of GB9023551D0publicationCriticalpatent/GB9023551D0/en
Publication of GB2237670ApublicationCriticalpatent/GB2237670A/en
Application grantedgrantedCritical
Publication of GB2237670BpublicationCriticalpatent/GB2237670B/en
Anticipated expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

A reciprocal transfer system for transfer involving a user and supplier (e.g. retailer) comprises a biometric feature analyser (4) which obtains at least one feature from the user and verifies it to provide a resulting parameter. This parameter is combined with other parameters which may be unrelated to the identification of the user to produce a final risk assessment parameter. Control means (3) indicate to the supplier whether or not the transaction should proceed in accordance with the final risk assessment parameter. <IMAGE>

Description

RECIPROCAL TRANSFER SYSTEMThe invention relates to a transfer of value application in which a user wishes to receive services or goods from a supplier in return for a reciprocal transfer of funds or commitment to recognise the value of the service supplied.
In a typical multilateral decision making situation, each party has a different set of interests and priorities and frequently there has to be a compromise between conflicting decision criteria. For example, in the case of a typical payment situation involving a customer (bank account holder), a retailer and a bank, the customer desires no fraudulent use of the account, the retailer wants guaranteed payment without turning down any customers, and the bank wants no repudiations (particularly successful ones) with processed transactions.
When cash is involved in the transfer of value, the supplier has a guarantee that the funds or commitment supplied by the user will be recognised by the issuer of the cash. However, more recently it has become common for users to tender a credit or debit card which does not in itself guarantee that funds or commitment will be guaranteed by the issuer of the card who provides a main element of the Reciprocal Transfer Service.
The invention is concerned with such multilateral exchanges in which there are at least three parties, that is the user, the supplier, and the reciprocal transfer service which will often be a bank.
In the past, the reciprocal transfer service has had to rely on the decision ability of the supplier to confirm that the user is positively identified and that the supplier is granted authority to access the users account. Generally this has involved requesting the user to provide his signature which is then visually compared with a reference signature on a card. In some situations, the supplier has been provided with aids to assist with this comparison such as a signature pad.
There is a need for the reciprocal transfer service to have more control over transfers of value and to reduce the reliance on the supplier.
In accordance with one aspect of the present invention, a reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means coupled to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means being adapted thereafter to indicate to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
In accordance with a second aspect of the present invention, a method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system comprises obtaining from the user at least one biometric feature; performing a verification analysis on the feature and generating at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
We have recognised the inherent problems with biometric methods of user verification which cannot in general give 100% confidence in the verification of identity. Consequently, we now propose combining the results of the biometric verification analysis with other, typically application specific, parameters independent of the biometric features so as to reduce the effect of the uncertainty of the biometric analysis itself.
In one example, the control means has a store for storing at least the recent history of previous uses of the system by each user, that history being used by the control means to constitute one of the additional parameters. Typically, the significance attached to the history will reduce with time and in practice the store may comprise a circular buffer arranged to contain a limited, fixed number of transaction details.
Alternatively, or in addition to the above, the control means may include a store for storing parameters relating to the user which are selected singly or in combination by the control means to constitute one of the additional parameters. These stored parameters relating to the user may include physical characteristics such as age, sex, social group, psychological profile, handedness, and application related parameters.
In addition or alternatively to the above, the additional parameters may be chosen from the following;a) Supplier profile parameters eg type of service (for example retailer classification), typical levels of service (for example average transaction values) and risk level of location;b) Probability of fraud;c) Value of service;d) Time and date of transaction;e) Environmental conditions.
The predetermined algorithm preferably has the form; R = W1 F1 (P1, P2 ...PN) + W2 F2 (P1, P2 ... PN) + ...
where R is the final risk assessment parameter, W1 W2 etc are respective weights,P1 P2 etc are the parameter values, andF1, F2 etc are functions generating a score or absolute value for a given parameter set.
In one application, the control means compares the final risk assessment parameter (R) with at least one threshold to determine whether the transaction of value can proceed.
In the preferred arrangement, the thresholds define 3 bands so that if the final risk assessment parameter falls in one band the control means indicates that the transaction of value can proceed, if it falls in another band the control means indicates that the transfer of value cannot proceed, and if it falls in an intermediate band the control means performs a further algorithm.
This further algorithm may be similar to the algorithm defined above but makes use of different weighting factors so that the parameters are combined in a different manner.
Typically the control means will be sited together with the biometric frature analyser at the point at which the transaction occurs (i.e. point of sale) and off-line to the reciprocal transfer service provider. The control means may also be sited remote from the biometric feature analyser at some central location and on line to the reciprocal transfer service provider. Furthermore there may be a number of biometric analysers connected to a common control means.
This arrangement is particularly suitable for use in an electronic funds transfer at point of sale (EFTPOS) system since the reciprocal transfer system can automatically indicate to the EFTPOS system that a transaction of value can proceed wallowing that transfer of value to proceed automatically with a minimum of operator intervention.
The parameter or parameters generated by the biometric feature analyser can indicate the degree to which a submitted biometric feature is simular to a reference feature and preferably these parameters correspond to those described in our co-pending British
patent applicationlfiled on the 3rd November 1989 and entitled "Improvements relating to individual verification" (Agents Ref: 30/3035/01).
An example of an EFTPOS system incorporating a reciprocal transfer system and method according to the invention will now be described with reference to the accompanying drawings, in which:Figure 1 is a block diagram of an off-line system; and,Figure 2 is a block diagram of an on-line system.
In both the reciprocal transfer applications described, a number of parties are involved including at least the following: The consumer's bank, the retailer's bank and the EFTPOS acquirer who gives the service transfer guarantee to the retailer that the transfer of value may proceed. The EFTPOS acquirer provides apparatus to the retailer to initiate the reciprocal transfer and to assist in the verification of the consumer or user. The consumer's bank issues an identification token such as a card to the consumer to provide a machine readable method of identifying the consumer's account.
In the apparatus shown in Figure 1, a card reader 1 is provided such as a Swipe reader which reads from a consumer's card details of his bank account and the like together with reference biometric data. The account details are fed from the reader to a conventional EFTPOS terminal 2 while the reference biometric data is fed to a microprocessor 3. In this example, the microprocessor 3 is provided locally to the EFTPOS terminal 2. A biometric feature analyser 4 is connected to the microprocessor 3 and is adapted to obtain from the consumer current biometric features. In another example the microprocessor 3 may be a combined element of EFTPOS terminal 2 i.e. one microprocessor may service both the biometric and EFTPOS functions.
In one example, the consumer presents his card to the retailer who places the card in the card reader 1 to allow the reference biometric data and the bank account data to be down loaded to the microprocessor 3 and EFTPOS terminal 2 respectively. The consumer then supplies the necessary biometric data in the form of a submission to the analyser 4. For example, this can comprise writing his signature on a signature pad forming part of the analyser 4, the analyser then obtaining from that signature, data relating to both static and dynamic characteristics of the signature. These features are then supplied to the microprocessor 3 which performs a signature analysis on the submitted data and the reference data. This analysis would typically be of the form described in more detail in the co-pending British application mentioned above the content of which is included herein by reference.The result of that biometric or signature analysis is the generation of a number of parameters including a confidence of match, a variance, a vulnerability, and a composite biometric level of confidence. The confidence of match parameter is derived from the comparison of the biometric submission with the reference; the variance parameter is derived from an assessment of the level of variance exhibited by the service user or consumer over a period of time and provides an indication of whether the confidence of match parameter is within an acceptable range; and the vulnerability parameter is an assessment of the degree of difficulty in forging/counterfietting the biometric property of the user or consumer. The composite biometric level of confidence is derived from a function which combines the 3 parameters mentioned above together with the possibility of a fraudulent service user.This composite biometric level of confidence parameter is denoted PR1.
A second parameter PR2 provides a composite service provider/type of service risk assessment and is generated from one or a combination of the following parameters:i). Service provider profile. This identifies the service provider and defines characteristics such as type of service (e.g. retailer classification), typical levels of service (e.g. average transaction value) and risk level of location.
The concept of floor limits in point of sale payments is a mechanism used to quantify the risk level of the location, and is not a primary parameter type.
ii). Probability of fraud. This value may vary over time or between service providers. This is an input to the biometric verification sub-system to allow the composite biometric verification sub-system to allow the composite biometric level of confidence to be generated.
iii). Value of Service. This is the value that is processed by the reciprocal transfer system, e.g.
transaction amount.
iv). Time and date. The time of day, day of week, and special seasons of the year may all be significant.
v). Environmental issues. These cover factors such as climatic conditions.
A third parameter PR3 defining a composite user risk assessment is produced for one or a combination of the following parameters:i). Usage pattern. This is a record of previous use and assumes that significance reduces the further one goes back in time. In practice, this is likely to be a circular buffer limited to a fixed number of transactions.
ii). User profile. This covers any other parameters which are significant to the application such as physical characteristics (e.g. age, sex, social group, psychological profile, handed-ness) and application related parameters.
Each of these parameters PR1, PR2, PR3 is a function of one or more of the base parameters preferred to and for example PR2 can be defined as: SCORE = [ W1 * F (service provider profile) +spp 2 vts (value and type of service) +W3 * Ftd (time and date) +W4 * F ei (environmental issues) ] where: W, W1 4 are signed weighting values.
F is a function which generates asspnumeric value by classifying the details comprising the serviceprovider profile.
Fvts is a function which generates anumeric value by classifying thevalue of the transaction, andpossibly also the type oftransaction.
F td is a function which generates anumeric value by classifying time,date and possible special periods(e.g. pre-Christmas) into risklevels.
F . Is a function which tests forei special circumstances surroundingenvironmental issues such asextremes of temperature.
Similarly, Function PR3 can be defined as: SCORE = [ W5 * F (user profile) +supW6 * F (usage pattern, transactionup value and type, time anddate) where: S. .6 are signed weighting values.
F is a function which generates asup numeric value by classifying thedetails comprising the user profile.
F is a function which generates aup numeric value by analysing theprevious pattern of usage andcomparing it to the circumstancesurrounding the current one.
The output scores for the three composite parameters are then classified into respective classes or bands to define three such classes, giving the valuesX in the range 1 ... x+l from PR1 Y in the range 1 ... y+l from PR2Z in the range 1 ... z+l from PR3The microprocessor 3 includes a three dimensional look-up table whose elements are addressed by the band or class values, the three bands derived above being used therefore to address the look-up tables to obtain a risk assessment parameter.Each element of the array contains one of the following set of values:-1 Pass - proceed with transfer-of value 0 Fail - do not proceed with transfer of value1 Resort to SA1 for decision2 Resort to SA2 for decisionn Resort to SAn for decisionEach SA (Secondary Algorithm) is a function which has as input all the individual parameters listed above plus the composite functions PR1 - PR3. For each SAn, a different set of weights exists, one for each input parameter. Like the above functions, each value is multiplied by the weighting and all products added together to produce a score.
The score of each SA is divided into three bands byn two thresholds, which are again unique to each SA. Band 1 means fail, band 2 means resort to other procedures, and band 3 means pass.
Clearly, different SA's will attach different priorities to different categories of risk. For example, where the value is modest but the biometric risk is high, more detailed attention will be paid to the biometric parameters. Similarly, a high value transaction may attach more significance to the usage pattern.
In the Figure 1 example, the card supplied by the consumer contains the biometric reference data as well as the bank account data to enable local operations.
Figure 2 illustrates a different arrangement in which the computer which decides and determines the final risk assessment parameter is located remotely from theEFTPOS terminal 2. In this example, the consumer's card identifies the bank account and the location of the consumer's reference data in a store 5 remote from the terminal 2, typically at the banks premises. Biometric features are obtained from the consumer by the analyser 4 and sent via the EFTPOS terminal 2 aiong a link 6 to the consumers bank 7. Typically, the link 6 forms part of a conventional EFTPOS system. A computer 8 located at the consumer's bank then extracts the reference biometric data from the store 5 and performs the biometric analysis together with the further risk analysis to generate the final risk assessment parameter in the same way as described above in connection with Figure 1, this final risk assessment parameter then being supplied back to the terminal along a link 9 to control whether the transaction of value proceeds or not.

Claims (10)

1. A reciprocal transfer system for use in a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the system comprising a biometric feature analyser (4) for obtaining from the user at least one biometric feature and for performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and control means (3) connected to the biometric feature analyser for combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user, to generate a final risk assessment parameter, the control means thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
10. A method of determining whether to perform a transfer of value involving a user who is to receive goods or services from a supplier in return for funds or a commitment to recognise the value of the received goods or services, the user and the supplier conducting the transfer of value in conjunction with a reciprocal transfer system, the method comprising obtaining from the user at least one biometric feature; performing a verification analysis on the feature to generate at least one parameter representing the result of the analysis; and combining in accordance with a predetermined algorithm the verification analysis parameter or parameters with one or more parameters relating to the transfer of value operation and unrelated to the identification of the user to generate a final risk assessment parameter, the reciprocal transfer system thereafter indicating to the supplier in accordance with the final risk assessment parameter whether or not the transaction of value can proceed.
GB9023551A1989-11-031990-10-30Reciprocal transfer systemExpired - Fee RelatedGB2237670B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
GB9023551AGB2237670B (en)1989-11-031990-10-30Reciprocal transfer system

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
GB898924847AGB8924847D0 (en)1989-11-031989-11-03Reciprocal transfer system
GB9023551AGB2237670B (en)1989-11-031990-10-30Reciprocal transfer system

Publications (3)

Publication NumberPublication Date
GB9023551D0 GB9023551D0 (en)1990-12-12
GB2237670Atrue GB2237670A (en)1991-05-08
GB2237670B GB2237670B (en)1993-04-07

Family

ID=26296151

Family Applications (1)

Application NumberTitlePriority DateFiling Date
GB9023551AExpired - Fee RelatedGB2237670B (en)1989-11-031990-10-30Reciprocal transfer system

Country Status (1)

CountryLink
GB (1)GB2237670B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP0652540A1 (en)*1993-11-081995-05-10NCR International, Inc.Self-service business system
WO1999048056A1 (en)*1998-03-161999-09-23Giesecke & Devrient GmbhMethod and device for verifying a biometric characteristic
WO2001022201A1 (en)*1999-09-202001-03-29Ethentica, Inc.Context sensitive dynamic authentication in a cryptographic system
EP1202228A1 (en)*2000-10-172002-05-02Varette LimitedA user authentication system and process
EP1450321A1 (en)*2003-02-212004-08-25Swisscom Mobile AGMethod and system for detecting possible fraud in paying transactions
EP1323089A4 (en)*2000-08-042006-04-19First Data CorpEntity authentication in electronic communications by providing verification status of device
US7260724B1 (en)1999-09-202007-08-21Security First CorporationContext sensitive dynamic authentication in a cryptographic system
US7391865B2 (en)1999-09-202008-06-24Security First CorporationSecure data parser method and system
CN100409617C (en)*2003-01-302008-08-06微软公司System and method of authenticating validity and dropoff
US7552333B2 (en)2000-08-042009-06-23First Data CorporationTrusted authentication digital signature (tads) system
US7558965B2 (en)2000-08-042009-07-07First Data CorporationEntity authentication in electronic communications by providing verification status of device
US7577621B2 (en)1999-09-202009-08-18Security First CorporationCryptographic server with provisions for interoperability between cryptographic systems
US7877611B2 (en)2000-03-082011-01-25Aurora Wireless Technologies, Ltd.Method and apparatus for reducing on-line fraud using personal digital identification
US8155322B2 (en)2006-11-072012-04-10Security First Corp.Systems and methods for distributing and securing data
US8271802B2 (en)2004-10-252012-09-18Security First Corp.Secure data parser method and system
US8601498B2 (en)2010-05-282013-12-03Security First Corp.Accelerator system for use with secure data storage
US8650434B2 (en)2010-03-312014-02-11Security First Corp.Systems and methods for securing data in motion
US8654971B2 (en)2009-05-192014-02-18Security First Corp.Systems and methods for securing data in the cloud
US8745372B2 (en)2009-11-252014-06-03Security First Corp.Systems and methods for securing data in motion
US8898464B2 (en)2008-02-222014-11-25Security First Corp.Systems and methods for secure workgroup management and communication
US9397827B2 (en)2007-09-142016-07-19Security First Corp.Systems and methods for managing cryptographic keys
US9733849B2 (en)2014-11-212017-08-15Security First Corp.Gateway for cloud-based secure storage
US9881177B2 (en)2013-02-132018-01-30Security First Corp.Systems and methods for a cryptographic file system layer

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1952575B1 (en)2005-11-182017-12-27Security First Corp.Secure data parser method and system
CN101689230A (en)2006-12-052010-03-31安全第一公司 Improved Tape Backup Method
AU2009204512B2 (en)2008-01-072014-06-12Security First Corp.Systems and methods for securing data using multi-factor or keyed dispersal

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1980002080A1 (en)*1979-03-191980-10-02Ncr CoIdentity verification apparatus and method
GB2112190A (en)*1981-12-231983-07-13Omron Tateisi Electronics LtdPersonal identification system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO1980002080A1 (en)*1979-03-191980-10-02Ncr CoIdentity verification apparatus and method
GB2112190A (en)*1981-12-231983-07-13Omron Tateisi Electronics LtdPersonal identification system

Cited By (57)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP0652540A1 (en)*1993-11-081995-05-10NCR International, Inc.Self-service business system
US6798334B1 (en)1998-03-162004-09-28Giesecke & Devrient GmbhMethod and device for verifying a biometric characteristic
WO1999048056A1 (en)*1998-03-161999-09-23Giesecke & Devrient GmbhMethod and device for verifying a biometric characteristic
US7391865B2 (en)1999-09-202008-06-24Security First CorporationSecure data parser method and system
US7802104B2 (en)1999-09-202010-09-21Security First CorporationContext sensitive dynamic authentication in a cryptographic system
US9613220B2 (en)1999-09-202017-04-04Security First Corp.Secure data parser method and system
US9298937B2 (en)1999-09-202016-03-29Security First Corp.Secure data parser method and system
WO2001022322A3 (en)*1999-09-202001-10-11Ethentica IncElectronic commerce with cryptographic authentication
US8214650B2 (en)1999-09-202012-07-03Security First CorporationContext sensitive dynamic authentication in a cryptographic system
US7260724B1 (en)1999-09-202007-08-21Security First CorporationContext sensitive dynamic authentication in a cryptographic system
US8332638B2 (en)1999-09-202012-12-11Security First Corp.Secure data parser method and system
WO2001022201A1 (en)*1999-09-202001-03-29Ethentica, Inc.Context sensitive dynamic authentication in a cryptographic system
US8494969B2 (en)1999-09-202013-07-23Security First Corp.Cryptographic server with provisions for interoperability between cryptographic systems
US7577621B2 (en)1999-09-202009-08-18Security First CorporationCryptographic server with provisions for interoperability between cryptographic systems
US8726033B2 (en)1999-09-202014-05-13Security First CorporationContext sensitive dynamic authentication in a cryptographic system
US7877611B2 (en)2000-03-082011-01-25Aurora Wireless Technologies, Ltd.Method and apparatus for reducing on-line fraud using personal digital identification
EP1323089A4 (en)*2000-08-042006-04-19First Data CorpEntity authentication in electronic communications by providing verification status of device
US7558965B2 (en)2000-08-042009-07-07First Data CorporationEntity authentication in electronic communications by providing verification status of device
US7552333B2 (en)2000-08-042009-06-23First Data CorporationTrusted authentication digital signature (tads) system
EP1202228A1 (en)*2000-10-172002-05-02Varette LimitedA user authentication system and process
CN100409617C (en)*2003-01-302008-08-06微软公司System and method of authenticating validity and dropoff
US7610040B2 (en)2003-02-212009-10-27Swisscom Mobile AgMethod and system for detecting possible frauds in payment transactions
EP1450321A1 (en)*2003-02-212004-08-25Swisscom Mobile AGMethod and system for detecting possible fraud in paying transactions
WO2004075130A1 (en)*2003-02-212004-09-02Swisscom Mobile AgMethod and system for uncovering potential cases of fraud in payment transactions
US9009848B2 (en)2004-10-252015-04-14Security First Corp.Secure data parser method and system
US9338140B2 (en)2004-10-252016-05-10Security First Corp.Secure data parser method and system
US9992170B2 (en)2004-10-252018-06-05Security First Corp.Secure data parser method and system
US9871770B2 (en)2004-10-252018-01-16Security First Corp.Secure data parser method and system
US9985932B2 (en)2004-10-252018-05-29Security First Corp.Secure data parser method and system
US8769699B2 (en)2004-10-252014-07-01Security First Corp.Secure data parser method and system
US9906500B2 (en)2004-10-252018-02-27Security First Corp.Secure data parser method and system
US11178116B2 (en)2004-10-252021-11-16Security First Corp.Secure data parser method and system
US8904194B2 (en)2004-10-252014-12-02Security First Corp.Secure data parser method and system
US8271802B2 (en)2004-10-252012-09-18Security First Corp.Secure data parser method and system
US9047475B2 (en)2004-10-252015-06-02Security First Corp.Secure data parser method and system
US9135456B2 (en)2004-10-252015-09-15Security First Corp.Secure data parser method and system
US9935923B2 (en)2004-10-252018-04-03Security First Corp.Secure data parser method and system
US9294445B2 (en)2004-10-252016-03-22Security First Corp.Secure data parser method and system
US9294444B2 (en)2004-10-252016-03-22Security First Corp.Systems and methods for cryptographically splitting and storing data
US8787583B2 (en)2006-11-072014-07-22Security First Corp.Systems and methods for distributing and securing data
US9774449B2 (en)2006-11-072017-09-26Security First Corp.Systems and methods for distributing and securing data
US8155322B2 (en)2006-11-072012-04-10Security First Corp.Systems and methods for distributing and securing data
US9397827B2 (en)2007-09-142016-07-19Security First Corp.Systems and methods for managing cryptographic keys
US8898464B2 (en)2008-02-222014-11-25Security First Corp.Systems and methods for secure workgroup management and communication
US8654971B2 (en)2009-05-192014-02-18Security First Corp.Systems and methods for securing data in the cloud
US8745372B2 (en)2009-11-252014-06-03Security First Corp.Systems and methods for securing data in motion
US8745379B2 (en)2009-11-252014-06-03Security First Corp.Systems and methods for securing data in motion
US9589148B2 (en)2010-03-312017-03-07Security First Corp.Systems and methods for securing data in motion
US9443097B2 (en)2010-03-312016-09-13Security First Corp.Systems and methods for securing data in motion
US9213857B2 (en)2010-03-312015-12-15Security First Corp.Systems and methods for securing data in motion
US8650434B2 (en)2010-03-312014-02-11Security First Corp.Systems and methods for securing data in motion
US10068103B2 (en)2010-03-312018-09-04Security First Corp.Systems and methods for securing data in motion
US8601498B2 (en)2010-05-282013-12-03Security First Corp.Accelerator system for use with secure data storage
US9881177B2 (en)2013-02-132018-01-30Security First Corp.Systems and methods for a cryptographic file system layer
US10402582B2 (en)2013-02-132019-09-03Security First Corp.Systems and methods for a cryptographic file system layer
US9733849B2 (en)2014-11-212017-08-15Security First Corp.Gateway for cloud-based secure storage
US10031679B2 (en)2014-11-212018-07-24Security First Corp.Gateway for cloud-based secure storage

Also Published As

Publication numberPublication date
GB2237670B (en)1993-04-07
GB9023551D0 (en)1990-12-12

Similar Documents

PublicationPublication DateTitle
GB2237670A (en)Reciprocal transfer system
US4734564A (en)Transaction system with off-line risk assessment
US5615277A (en)Tokenless security system for authorizing access to a secured computer system
US5231569A (en)Account transaction system
US6732919B2 (en)System and method for using a multiple-use credit card
US7158947B1 (en)Method for selectively blocking remote purchase requests
US8433648B2 (en)Method and system for engaging in a transaction between a consumer and a merchant
US4812628A (en)Transaction system with off-line risk assessment
US20050125343A1 (en)Method and apparatus for monetizing personal consumer profiles by aggregating a plurality of consumer credit card accounts into one card
US8660944B2 (en)Systems and methods to select a credit migration path for a consumer
US20070174208A1 (en)System and Method for Global Automated Address Verification
US20090094124A1 (en)Real-time point-of-sale change-of-address processing
US20110295745A1 (en)Systems and methods for appending supplemental payment data to a transaction message
US20020069158A1 (en)Method and system for providing a secured multi-purpose electronic account
EP1230610A1 (en)System and method for offering and providing secured credit card products
MXPA02000486A (en)Dynamic currency conversion for card payment systems.
US20140172646A1 (en)Method for selectively verifying or blocking remote purchase requests
US20150235207A1 (en)Risk mitigating transaction authorization
US20090171838A1 (en)Systems and methods wherein a credit product is offered in accordance with usage of a pre-paid card account
US20060026098A1 (en)Method and apparatus for effecting payment
US20150235221A1 (en)Proof-of-verification network for third party issuers
US20150235208A1 (en)Proof-of-verification network
US20030163417A1 (en)Methods and systems for processing transaction requests
US20100161478A1 (en)Computer payment banking system and method
US9619800B1 (en)Systems and methods for processing transactions

Legal Events

DateCodeTitleDescription
732EAmendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)
PCNPPatent ceased through non-payment of renewal fee

Effective date:20051030


[8]ページ先頭

©2009-2025 Movatter.jp