Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
USING THE FINGER PRINT DATA BASE TO IDENTIFY THE FINANCIAL ASSOCIATIONS CUSTOMERS
Document Type and Number:
WIPO Patent Application WO/2006/125449
Kind Code:
A1
Abstract:
Using the fingerprint database by scanning the wide client's database and store it in the bank (2) as a first step, when the client (1) asking for issuing card the data is recording on the magnetic stripe of the card, when the client make a transaction on the A.T.M (7) or on the point of sale (6) or even on the bank directly he is asked for entering an instant fingerprint, the next step is comparing the instant fingerprint with the one on the bank database (or with the one on the magnetic stripe of the electronic card) to identify the personality of the client with an exact legal way and make a secure transaction and then secure collection. As a result of collecting data banks can exchange these data with the international organizations which can classify it and make a clients lists according to the legal or illegal dealings. By making the classified lists the international organizations can exchange their lists with each other to gain wide database security. The goverments's organizations in each country may cooperate with the international organizations to take the security steps to deal with deferent lists and exchange the legal information with the international organization.

Inventors:
ALY TAMER ABDELHAFEZ (EG)
Application Number:
PCT/EG2005/000018
Publication Date:
November 30, 2006
Filing Date:
May 28, 2005
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ALY TAMER ABDELHAFEZ (EG)
International Classes:
G07F7/10; G07F19/00
Foreign References:
EP1207503A22002-05-22
US20040195314A12004-10-07
DE19636677A11998-04-30
US6636620B12003-10-21
Download PDF:
Claims:
CLAIMS
1. adding the fingerprint request to the bank's orders beside the traditional applications (ID+ signature) for the new and the earlier bank's clients.
2. collecting these database in legal procedures.
3. Recording those data to magnetic stripe card for the E. cards clients.
4. Equipping the (ATM)s and the (POS)s with the supplemental sets to read the additional data on the cards.
5. Forwarding the collecting database to the international organizations (visa/master) to monitor , classify and make lists ( bad&clear list ).
6. Exchanging database between the international organizations to make a huge database lists.
7. Feeding back the banks with updated lists.
8. Cooperating with the government's security organizations (like police) to go through the legal procedures in case of bad lists treatment and to exchanging the information lists if necessary.
Description:
TECHNECAL FIELD:

To add the fingerprint database to identify the bank's customers and electronic cards users for people who use it to withdraw from their accounts through the A.T.Ms (automatic teller machine) or to buy from the P.O.S (point of sales). The objective is to prevent any one - but the original customer himself- from using the card to deal with the customer's accounts and to prevent cheating the electronic card in case of losing it or knowing it's data by any illegal way.

Also to identify the banks clients through their documented data base to guarantee that the one who has the authority to deal with the account is the client himself with a lawful method. That will decrease the losses that come as a result of cheating and fraud.

So we can consider the financial institutions (like banks ) as the field that obtain the most implantation of using those database

BACK GROUKD ART:

JWhen any client makes an application for making an account in any bank or for issuing an electronic card the bank must materialize the personal data of the client by checking the I.D or the passport in addition to confirming his authorized signature.

In case of issuing an electronic card these data must be restored in a magnetic stripe card to make it safer and will be stored in horizontal paths. The bank accepts those cards as a way of payment according to the reading of the information that is stored in this magnetic card. To make it more secure the client's bank must have a license from the international organizations (like VISA & MASTER CARD) to deal with customers with these systems. Therefore every bank must have his unique unrepeated number (B.I.N) that can deal with other members (banks) and with the international organization.

In usual this number consists of 8 (eight) digits that is usually printed on the cards (the first eight digits). These numbers are the issuer bank's number after that the issuer bank add another group of numbers for every client (more five or eight digits) to identify every client who get an additional printed (P.I.N) code in a closed envelope. Based on those procedures the client can use this card to make any banking action all over the world.

The previous operation is based on:

1- Client's bank: or the card holder bank which has the authority to issue the cards.

2- the card holder : the user of the card for personal use all over the world

3- point of sale (P.O. S) : the merchants that makes the transactions with electronic cards after an agreement with a bank to supply them with the necessary tools to deal with customers in return for signing the bills

4- the merchant's bank : which the merchants deal with to collect their bills and supply them with tools as per the agreement between them

5- the international organization: which works as a clearinghouse and transferring the money between the issuer bank and the merchant bank and giving the licenses for the financial association to work through the electronic cards business.

In addition to the previous systems regarding the traditional way in banks on the classic operation like withdrawing and transferring is based on checking the paper data of the client like ID, passport & his authorized signature, but in the electronic transaction with cards there are another security method like a three dimension photo to guarantee the safety of the plastic card (like the water mark in money) and it's hard to forged in addition to that there is a place for the signature of the client to be identified with the one on the bill . In addition to this every client has a personal code number (P. LN) which is not appearing on the card and this number is the security code that the A.T.M machines recognized the client and accept the transaction as a legal one.

Those systems are usable until the present time all over the world in addition to some kind of smartcards that is not generalized until now like the silicon (chip card) that let the data stored safety to add and charge the customer accounts and (memory chip), (smart chip), (super smart chip) that includes a processor and magnetic stripe and display screen which call a programmed credit card.

DISCLOSURE OF THE INVENTION

1- when the client comes to any bank to make an account or to issue an electronic card the finger print must be taken to the client data base by a hand scanner, special hardware that is designed to pick up and restore the fingerprint database, and storing this data on the main frame of the bank data through the operating system

2- Verifying the data and ensuring the sameness of the stored data base with the enclosures of the client details.

3- Feeding the computer with the verified data and making the inclusion of this data on his data base and on the magnetic stripe card on the electronic cards

4- Before any action on the client account he must enter an instant fingerprint direct on the specialized machine.

5- Verifying the entered fingerprint with the one on the magnetic stripe of the card holder (automatically).

6- Matching those data with the stored on the bank and in case of identification the client is allowed to get through his account.

-in case of rejecting this operation the security arrangement can be started

P. S: the step of the pin code inputting and checking the I.D card can be canceled because last procedures are more secure which can reduce the expense on the long term.

* We can use this project widely with low cost throw organizations & institutions which can control the dynamic of banks by generalization it by ruling it throw the organizations (like visa & master card as an example)with supervision on banks.

Also, that we can apply it directly on banks & institutions which deal with electronic cards & financial associations that deal with clients by using new additional technology for the financial associations by entering the hand scanner system and connecting it with the banks & financial associations computers & on the front of the A.T.M machines and at the P.O. S and linking them all by the international organizations (like visa)

* Through the practical using of the cards and making the financial transactions directly there were a large number of cheating and fraud cases to gain the money in an illegal way. Those criminal transactions might be done by individuals or by well organized gangs who has the electronic awareness. One of the common examples on fraud and cheating is to make a structural A.T.M machine and connecting it with a computer to record the data that entered by the client, scheming the card also is a way of cheating, using the simpleminded people to know an information that can be used to withdraw from their account, collusion of the client (or the merchant) himself also is a possibility in some cases to buy from the (P.O. S) with a forged card is very common is some countries.

through the direct dealing with banks so much cheating cases had been recorded and some times it's ended with a lawful dispute which can end after a period of time and sometimes the financial institution losses their money. The forged I.D is the most common method also counterfeiting the client signature is also a common method to deal with the clients account in an illegal way.

BRIEF DESCRIBTION OF DRAWING

Rg :1

Clarifying the data flow in the traditional system 1= original client

2= bank (storing and recording client's data) 3= international organization (monitoring and organizing the banks agreements) 4= merchant bank (connecting the client's bank and collect for the P.O. S and setofF charges . 5= point of sales (accepting the client's cards) 6= A.T.M ( direct transactions to withdrawing and access accounts

=based on the valid data=ID+ authorized signature = the client can ask for issuing cards & check

Fig :2

Clarifying the shortage in the traditional system= 1= client /fraudulent /schemed card holder 2= bank (identifying the ID & signature) if this step is overstepped the whole last circle is completed 3=international organization( when the original client complaining it stating to investigate ) 4+5+6= accepting & collecting the incorrect transaction

Fig:3

The treatment of the shortage in the traditional system by using fingerprint database to feedback data in every single transaction.

S

1= client/fraudulent

2= bank (asking for instant fingerprint) identifying the stored database and give an immediate reply

3= international organization (recording the fraud history & monitoring the conflicts

4+5+6 = secure transaction and collection

Fig 4, Fig 5 Fig 6 Fig 7

The sequence & collaboration diagrams to record and issue the cards based on the time and place dimensions under the hypothetical of fraudulent database existence.

Fig : 4

1= client 2= ATMs or POS 3= collected FP database A= FP entrance 5= identification 4= accept / reject 5= completing the transaction / security procedures.

Fig : 5

1+2+3+4= time sequence for complete transaction at the same (time and place ) through the client- ATM-database- identification .

5+6+7 = immediate time replying using FP database without any paperwork.

Fig:6

1= client 2= data recording unit (bank) 3= client's database 4= new application 5= searching through the (general) database unit for any previous fraud cases 6= accept / reject recording 7= complete the recording for the application / security procedures

Fig:7

1+2+3+4 = time planning sequence for a new application request going through ID , FP data entrance , reviewing the general database & immediate reply .

5+6+7 = immediate direct reply to completing the application or going though the security procedures because of bad list existence .

Fig : 8

1= client 2= bank(s) 3= general collected database 4= classified grouped database (international organization exchanging data co.)

5= international organizations (like visa) 6= bad client's list 7= clear client's list 8= cooperative governmental organizations (like police)

Fig 9:

1= client 2 = bank(s) 3+4+5= deferent international organizations 6=general (huge) database

(where banks makes a collecting for customers database and interchanging it with the international organizations which makes the collecting , classification and preparing the client's list (with each others) then feedback their banks with the classified lists in cooperation with the governmental organizations (police) in each county.

Fig 10: (preview)

1= client 2 = bank(s) (a)= the gathered data transformed from the international organizations (as a member)

(b)= the bank's own clients.

3= the international organizations) that collected the database from banks (members) , other international organizations (partners) and then classifying it into list (bad - clear ) then resending it to the (members) and to the cooperative governmental organizations.

4 = cards data circulation 5= bus banks (collecting & supporters)

6 = P.0.S 7 = A.T.M (s)

8 = governmental organizations which dealing with the client (as a citizen) and exchanging information that needed for the legal procedures with the international organizations.