finance
The method of protection when making payments through the mobile banking application
Each bank has its own security programs and systems. This complicates the standardization of protective measures within the framework of the result of intellectual activity.
The method is aimed at improving the security of payments
Today, Internet fraud is a real threat, and all the special services of the world are working to protect against it.
problem
The payment cards available today, debit or credit, largely depend on the programs and management of the server center.
Connecting the cardholder to the management of their capital, as an operator of their personal account, together with the bank
solving the problem
By changing the number of bank cards and separating their functions
In what way?
pluses
Significant reduction of bank and client risk
Minimizing the number of employees attracted by banks
In order for the depositor to manage his accounts, the bank opens a bank account for the client and issues him three interconnected bank cards.
how does it work?
Each card has its own functions and password protection.
main map
operating card
working card
main card
  • It is directly connected to the bank account and the operating card.
  • Works with the main and work cards.
operating card
working card
  • Receives money from the operating card for financial transactions and transfers the client's money to the operating card for subsequent transfer to a bank account.
  • Does not have direct access to the bank account.
  • Transfers money from a bank account to an operating card and from an operating card to a bank account.
  • Transfers money from the main card to the working one.
  • Accepts the owner's money from the work card and transfers it to the main card to place it in a bank account.
  • Does not have direct access to the bank account.
  • Does not participate in the issuance of cash and purchase and sale.
  • Accepts funds for purchase and sale transactions, cash withdrawals, and any types of payments.
Bank
customer's account
personal account
  • Opens an account for a client
  • Through the mobile application provides access to account management
  • Issues 3 bank cards
  • The system excludes unauthorized access from the bank account
  • The responsibility for managing the account falls on the bank's client
  • The Bank can reduce costs and the number of customer service employees
Transfers money between the account and the operating card via LC
basic
Purchase and sale
Cash withdrawal
working
operating room
Only transfers money between the main card and the working one
The relevance of this topic is extremely high
Countering social engineering and fraud
Learn more about the process
The present invention is aimed at achieving a technical result, which consists in improving the security of payment transactions using electronic cards when making payments in real time. Today it is very difficult to protect yourself from Internet fraud, and everyone knows this. Numerous laws are being adopted to combat fraud, international meetings of interested structures are devoted to this issue, all special services of the world are making great efforts to prevent these crimes. Having studied and analyzed a large number of works and inventions in the field of banking, the author drew certain conclusions and submitted materials for registration of documents to the patent office.
There is an application 2019127969 RU. But the disadvantage is the disclosure of the protection mechanism, since banks have their own protection mechanisms and software. Another application No. 2021108302 received an expert opinion that the proposed methodology is the economic activity of banks. But the Federal Law "On Economic Activity" says that in order to carry out economic activity, it is necessary to own an object of economic activity. That is, as long as the subject does not have the right to own any object, and in this case the object is the intellectual property of the author, then without the consent of the author, banks cannot use the object in their economic activities.
The author continues to improve the way to ensure that ordinary people do not suffer from the criminal activities of dishonest people. And, of course, he hopes that this problem will be solved safely. The author will also be glad that his modest work will be used for the benefit of people.

As a rule, banks are commercial structures and sell their services. To do their job, they need certain tools, namely software. For phys. and legal entities use payment cards, and these cards are the property of the bank. The bank's client only temporarily owns them and, after the expiration of the prescribed period and in case of continued cooperation, replaces them with others. At the request of phys. persons the bank enters into a contract with him — an agreement. Based on the agreement, the bank transmits information about the account and payment card and registers on the bank's server.
After that, the cardholder can independently activate the card through an ATM, an application or with the help of a bank manager, replace the PIN code key and then perform the necessary operations: make payments or withdrawals, transfer money to a bank card.

When applying the "Method of protection when making payments through mobile applications of banks", the control scheme changes.
At the usual conclusion of the contract, the client usually receives one payment card. It can be a debit or credit card. But in our case, the number of bank cards varies.
  • The client receives three electronic cards divided into blocks, usually having their own PIN numbers — the main keys. These are the main, operational-transit and working cards.
  • Each card has its own task to ensure the protection of client capital from fraud.
  • The client, the cardholder, together with the cards receives instructions on how to use them, studies how the system works and downloads the mobile application of the bank with which he has concluded an agreement.
  • Opening the mobile application, he registers and activates all his cards. The cards can be either plastic or virtual, as a rule, the working one can be both.

What does the bank win in this case, and what does the client win compared to the scheme that is used in the bank's services scheme today?
Today, modern technologies are used in order to obtain benefits — profit.
The Bank will be freed from the unnecessary burden and pressure associated with participating in lawsuits as a party affected by fraud. The newly applied technological process will free banks from the constant need to be in a state of anxiety and keep a large number of employees in this regard, software and technical loads will decrease, because now the bank will not need to control operations independently carried out by the client. The bank delegates this function to the cardholder. There will be no need to make phone calls and send SMS messages to the client.

What will the bank 's client get from the use of the new technology ?
  • The client will know that the bank's employees will not call him or send SMS messages, and if such a need arises, he himself will need to contact the bank.
  • There will be no reason for the bank to detain its money or to detain any transactions. As a rule, it is recommended not to keep money in payment cards, so unspent funds are returned back through the operating-transit card to the main card and then to the bank account for further storage.
  • Now the bank's client will independently plan his expenses, when and where it is necessary to spend or transfer funds, pay or perform other financial transactions using a work card that has the ability to use all existing achievements in the field of banking: work on Android, use QR, etc.

The affected party in this case will be fraudsters, because it will be possible to get all the card numbers and all the PIN codes of the cards using either direct violence or "hypnosis". But that's another story:)
Those insignificant sums of money of temporary balances on the work card "will not excite the appetite of scammers." And for the sake of this money, they will not have the desire to commit illegal actions using complex or expensive schemes committed by individual fraudsters or organized criminal groups
Report:
The invention relates to a method of payment confirmation in remote access mode. The technical result is to increase the security of conducting payment transactions using a bank card divided into blocks of a chain, when making payments in real time. Unified, adaptable for all banking systems of protection, then there is a promising development of a protection program. Introducing a certain change in the architecture of the application solves the problem, this problem is one of the main functions of the applications, when registering and changing the user authentication of the user. Fraudsters using the methods of phishing, vishing and smishing forms receive information and a user change is made. In this way, the card holder's accounts are accessed. Dividing the card account function into three divided card functions, as the main one is the card account, operational and working card is closed in unauthorized entry to the card holder's accounts. This main card is a card account and the card is linked to accounts and buries money, can be applied as current, credit and deposit at one time, the function is limited can not pay for the service, is used to receive and transfer money. The internal banking operation is working, the card holder sends the required amount to the operating card, the incoming from the operating card is automatically credited to the main card. The card holder directs the target and task to repay the loan or to their own accounts, the card is used as a debit and credit card — for this you need to put your own money into the account and set the desired payment mode in your personal account. The second card the operating card connects the main card with the working card, the function is limited, does not store money, does not participate in the purchase and sale performs the reception function. From the card, the money is sent by the card holder to the working card, from the working card, the incoming money to the operating card is automatically credited to the main card, an internal banking operation is performed, information and instructions about fraud are mixed on this block. The working card is connected to the accounts through the operating card, receives money to perform the operation, the card holder pays the bill, purchases via the Internet, withdraws cash through an ATM terminal. The time of money storage is limited and the unused money card holder automatically returns the operating card from the operating to the main card.

August 10, 2022
© 2021 ООО “ИЧП ЕДИНСТВО ХАЛИКОВА X.”