Method for bank card holder to control authorised transactions in payment system using bank card restricting fraudulent transactions in case of compromise of card

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to providing secure transactions in payment systems using bank cards. The technical result is the low risk of card transactions that are unauthorised by the card holder when the card is compromised. In the method of conducting authorised card transactions, the card holder changes said card parameters in advance to permitting parameters by sending an authenticated request to a processing centre of the issuer, thereby permitting one or more authorised transactions; an authorised transaction can be approved by the processing centre of the issuer only if card parameters permitting said transaction were established by an authentication request by the card holder.

EFFECT: present solution minimises the risk of transactions that are unauthorised by a card holder in any environment of using cards and is distinguished by the capability for use in existing systems for controlling authorised transactions.

3 cl, 5 dwg

 

The technical field to which the invention relates

The present invention generally relates to Bank payment systems, and more specifically to security operations in the payment system using Bank cards.

The level of technology

Currently, the use of Bank cards for financial transactions has become commonplace in our everyday life. The Bank card used for ATM cash withdrawal, cash transfer, cashless payment of goods and services in stores through POS-terminals and Internet.

The basis of the above-mentioned and similar transparent to cardholders operations are complex software and hardware systems card payment systems, which, in General, are distributed and interconnected with the ability to communicate and function which meets numerous technical specifications and protocols and is governed by the applicable laws, regulations and departmental regulations, international agreements, the details of which are set forth in particular in the books of "Plastic cards", Bystrov, L. V. et al., 5th ed., Moscow: "BDC-press", 623 p., 2005 [D1] and "Plastic cards. Practical encyclopedia", Andreev A. A. and others, Moscow: concern "Banking Business Center", 310 �., 2-e Izd., 1998 [D2]. Description widely known (in particular, from [D1], [D2]) aspects of payment card systems in the present description is not given so as not to obscure its essence.

Due to the wide use of Bank cards and the expansion of their uses, as well as the increasing number of environments in which operations are performed, with each of the years all the more urgent becomes the question of their protection against possible fraudulent use. The scammers are actively using the account details compromised cards how to make fake cards, and direct use of these details in environments that do not require physical presentation of the card, in particular for carrying out payment transactions in trade and service companies via the Internet.

International payment systems are constantly improving methods of protection against fraudulent transactions, the most radical method to date it is possible to consider the use of chip technologies (banking smart cards EMV standard), the main drawback which can be considered as the cost of technology implementation by issuers and acquirers, requiring the use of the respective chip cards and equipment (ATMs, POS-terminals), supporting the possibility of their service.

Specifically for the Internet, the international payment System Vsa was proposed security Protocol 3-D Secure. Protocol specification Visa 3-D Secure has been published by Visa in 2001. It is designed to ensure the security of payments with Bank cards in the Internet environment due authentication by the Issuer to cardholders during online purchases. This Protocol is otherwise called Verified by Visa terms of Visa and SecureCode terminology MasterCard. The introduction of this security Protocol for Internet payments by credit cards will significantly reduce the risk of fraud transactions. Disadvantages that limit the use of the method of protection using the security Protocol 3-D Secure, are the relatively high cost of its implementation is that the method provides protection only transactions in the Internet environment, not protecting the card against fraudulent use in other environments.

Also the prior art method of control over the activity of using the card - U.S. patent US 7389275 B2 (System for personal authorization control for card transactions). The system provides the possibility of using different types of limits for transactions on the card. The card holder has the opportunity to set their own restrictions on the types of transactions, amounts, number of transactions, the types of retail stores and their geographical location, etc. Due to the flexibility provided� possibilities for setting parameters, such configuration of the card holder profile permitted activity card allows you to limit the possibility of unauthorized (fraudulent) use of the card within the established holder of limits and restrictions. The disadvantage of this method can be considered that within the established limits and restrictions can undergo the operation as initiated by the cardholder, and any unauthorized fraudulent transactions. Thus, this method and system also does not provide complete protection against the use of card details in case of compromise.

Summary of the invention

The current ideology of the use of the card implies that the holding of authenticating operations on it may at any time 24×7. In fact, this leads to the fact that even when the card holder does not use, the card itself is in an enabled state and is a kind of an open purse, which can look anyone. Continuing the analogy with the cash and the wallet seems quite strange to walk down the street, holding a pre-open purse with money, explaining to myself that it is open because "suddenly want to buy something". How often the card holder uses the card within days�? Time two, and it's possible that actually uses it. But the map-"purse" is open throughout the day.

A natural extension of this idea is the desire to provide the cardholder the option to keep this "purse" closed and open it only when he really has the desire to pay in it money.

The present invention is to provide a method of control by a holder of a credit card the possibility of implementation of the authorization of transactions in the payment system using Bank cards, limiting the possibility of fraudulent transactions in the case of compromise cards that provide cardholders with a mechanism to control permission/prohibition of acts of authenticating card transactions and generally to minimize the risk of unauthorized use of the card.

The second object of the present invention is to provide a method of control by a holder of a credit card the possibility of implementation of the authorization of transactions in the payment system using Bank cards, limiting the possibility of fraudulent transactions in the case of compromise of card that it is possible to implement and use the already existing technology of control of the authorization �of piracy.

An additional object of the present invention is to provide ease of control operations while creating minimal inconvenience to cardholders when performing usual operations with maps.

The technical result from the use of the claimed invention is to reduce the risk of gaining unauthorized by the cardholder (fraudulent) transactions on the card in case it is compromised. While the claimed invention allows to minimize the risk of unauthorized card transactions in any environment use maps.

The technical result from the use of the claimed invention is that its use is possible based on existing technologies of control of the operations of authenticating, in particular with the use of existing systems SMS-informing about operations and especially active SMS services on the map.

The task of achieving the specified technical result is solved by the following:

the first essential feature is that, initially (in a normal, constant for card condition) the conduct of any authenticating card transactions is prohibited. This is determined by the settings of the card in the PC of the Issuer, such as the state of the map "not to serve" or prohibiting autorizat�þ limits for transactions, for example, the zero value of the limit on the number of operations per day;

the second essential feature is the ability of the cardholder to change the settings above card to allow, by filing an authenticated request to the HRC of the Issuer, for example, using non-voice SMS messages in mobile communication environment with a pre-registered in the HRC Issuer's mobile phone number;

the third important feature is that, by an authenticated request to change the above options, and allow or deny transactions, the cardholder may pre-authorize the conduct of one, several or unlimited number of transactions, including providing a period of time, for example to allow operations on 30 minutes).

the fourth essential feature is that of authenticating operation may be approved by the HRC of the Issuer only if the holder of the card has been pre-authenticated request is set to the card, allowing it, for example, the card holder is permitted to conduct a single operation, in such a case, a single request for authorization will be standard (full-time) authorisation, all subsequent requests will be rejected.

Brief description of the drawings

The invention p�explained by the schema.

Fig.1 is a block diagram of the sequence of operations of a preferred embodiment of the method according to the present invention.

Fig.2 is a schematic diagram illustrating the features of the authorization process in a preferred embodiment of the method according to the present invention.

Fig.3 is a schematic diagram illustrating features of carrying out the authorisation and refusal of authorisation in a preferred embodiment of the method according to the present invention.

Fig.1 and 2 present the following notation:

The HRC of the Issuer and the PC of the acquirer - processing center (GTZ) of the Issuer and the processing center of the acquirer, respectively.

PCs, generally speaking, is a holistic system, which is a complex of interrelated software and hardware solutions, which provides life cycle of banking products based on Bank cards and, accordingly, is responsible for conducting related operations and management. The PC includes a number of subsystems, in particular the front office.

Front office - front office processing center that performs, including authentication options.

PS authorization - the authorization subsystem, which is part of front office who directly performs authorization functions (rejection/confirmation of authorization operations).

AA with SMS interface - CE�ver authentication with SMS interface.

PAYPAK - subsystem authenticated change of parameters of activity of the card.

DB PA parameter database activity cards.

Fig.4 and 5 illustrate a possible variant of implementation of the software interface phone/smartphone, ensuring the preparation and sending of the request to modify the activity of the map.

Description of a preferred embodiment of the invention

Next, with reference to Fig.1, 2, 3, 4, 5 outlines in General terms the structure and functioning principles of the present invention, this description is widely known (in particular, from [D1], [D2]) aspects of payment card systems is not given so as not to obscure its essence.

Previously, to identify the card holder in the processing center card Issuer registers the mobile phone number to the cardholder.

It is expected that new products or customize existing software and hardware in the PC of the Issuer implements the functions provide the ability to provide the following functionality:

authentication of incoming requests in the form of SMS messages to change settings activity cards (with SA SMS interface - server authentication with SMS interface);

- authenticated change of parameters of activity cards according to incoming requests from cardholders through With� with SMS interface, as well as the analysis of the received transaction authorization with the issuance of a permit to conduct a standard login procedure, as well as the adjustment of the parameters of the activity cards upon successful authorization (AIPAC - subsystem authenticated change the settings activity cards);

- storage of the registered mobile numbers of cardholders and parameters of the activity cards (DB PA parameter database activity cards).

When implementing the inventive method the implementation of authenticating transactions using Bank cards consists of 2 sequentially executed phases.

Initially, the parameters of the cards processing centre of the card Issuer determining the possibility of authorization of transactions (for example, the status of the card or registered in the processing center of an Issuer limits activity cards), have the meaning which precludes any authorization of card transactions.

Phase 1

Change the map parameters that determine the possibility of authorization of transactions.

In step 1 the card holder sends to the processing center card Issuer a request for authorization of card transactions in the form of non-voice messages (SMS) using a mobile phone or similar device with a mobile phone number pre-ZAR�observed in the processing center card Issuer. The format and content of messages are determined by the HRC and pre-known to the cardholder. Creating and sending messages can be done using a specially developed software telephone/smartphone, a possible variant of implementation of its interface is shown in Fig.4 and 5.

Next, in phase 2 SA with SMS interface, which is part of AIPAC gets sent by the cardholder of the request and in step 3 performs the authentication of the card holder by the mobile phone number that sent the request.

If the authentication is successfully passed (the specified mobile phone number registered in the PC and possibly query parameters that refer to a specific map indicate the identity of the card the card holder is registered in the PC with a mobile phone number that sent the request) PAYPAK in step 5 makes a change to the map parameters that determine the possibility of authorization of transactions, the new settings are reflected in the DB PA for a roadmap.

Next, after reflecting the new settings in the DB PA at stage 6 is sent to non-voice response message (SMS message) to the registered in the PC, the mobile phone number of the cardholder for the purpose of notification of successful processing of the request.

If authentication� failed, change the map parameters that determine the possibility of authorization of transactions, not made. It is possible the direction registered in the PC, the mobile phone number of cardholder non-voice messages (SMS) on a non-successful attempt to change the settings of the card.

The result of phase 1 is to change the map parameters that determine the possibility of authorization of transactions in a state that allows to hold the card holder of authenticating operation (or multiple operations, depending on the value in the request parameters).

Phase 2

Conducting operations that require authorization.

After performing phase 1 of the card transaction can be made by the holder at any convenient time. However, it is expected that phase 1 before phase 2.

In step 7, the cardholder shall use the card, and it performs cash advance at ATM, POS-Cash, pays for the goods or services, presenting the card to the merchant, carries out the payment transaction on the Internet, etc. the Operation in step 7 is conducted in a conventional (as provided by the terms of use of the card).

In step 8 by the use of the card is the formation and transmission in the PC card Issuer authorization request for the transaction.

Front office HRC Issuer captures authorization transaction. The obtained PS Authorization of the authorization request in step 9 is tested using AIPAC, where AIPAC analyzes registered in the DB PA map parameters determining the possibility of authorization of transactions.

If in step 9 AIPAC determined that registered in the DB PA map parameters determining the possibility of authorization of transactions, allow the operation, the stage 11 on which the substation conducted a standard Authorization procedure authorization, within which are, in particular, the following validation perform the requested operation:

status, validity and authenticity card;

- the adequacy of funds for the transaction;

- the validity of the type of operation;

- restrictions on one-time or daily money transactions or other restrictions.

Upon successful completion of the standard authorization procedure in step 12 PAYPAK adjusts to the DB PA the map parameters that determine the possibility of authorization of transactions taking into account the success of the last transaction.

For example, if a cardholder has previously been permitted to conduct the same operation, then in step 12 PAYPAK changes the card settings that determine the perturbation�of authorization of transactions by which precludes any authorization of transactions with the card.

If in step 9 AIPAC determined that registered in the DB PA map parameters determining the possibility of authorization of transactions, prohibit the operation, the stage 10 on which there is a refusal of authorization without holding the PS standard Authorization procedure authorization.

Next, in step 13, the Front office of the HRC Issuer generates and sends a response to the authorization request, whether the conduct is requested in step 7 of the operation. Accordingly, depending on obtained in step 13 of the answer, the operation in step 14 is completed by the provision of the requested services (cash withdrawals, transactions, etc.) or the refusal thereof.

The result of phase 2 is to grant or deny the requested operation of authenticating depending on installed options, and determining authorization of the transactions and the adjustment of these parameters in the case of a successful operation.

It should be noted that due to the presence of phase 1, the possibility of unauthorized (fraudulent) transactions on phase 2, illustrated in Fig.3, is limited to the time period in which the card parameters determining the possibility of authorization of transactions, is located in permit condition. Thus, in case�e application of phase 1 to allow for a single operation immediately before the phase 2 virtually eliminates the possibility of unauthorized use of the card.

The terminology used

Authorization transaction (Authorization) - the set of transactions to obtain permission or waiver granted by the issuing Bank for carrying out operations for a specific amount with a Bank card that generates the obligation of the Issuer for the execution of operations on the mentioned amount, the requested amount will be blocked on the customer's account.

Authentication - the authentication data and the subjects of information interaction based solely on themselves received data (in information interaction data received from the claimed sender and neacaeny).

The cardholder (Cardholder) - a natural person using the services of the issuing Bank for conducting banking operations, having a Bank account, which the user of the Bank card on the basis of a contract with the issuing Bank.

Payment system (Payment system) - the system of exchange transactions and settlement between the parties-participants of the system using the combination of information technology equipment by the parties, subject to the General rules governing the transfer of funds between banks and other financial institutions, which is characterized by the presence of contractual and licensing bases, trademarks, financial guarantees, internal�their operating rules and standards.

The payee/merchant (Merchant) - a legal or natural person using the services of the Bank for conducting banking operations, the enterprise trade (the merchant, the seller) is engaged in the sale of goods and/or services, receiving purchase orders, receiving as a means of payment credit card.

Operation/Transaction (Transaction) is initiated by the Client or the Beneficiary for a set of successive operations performed by the participants of the Payment system to serve Customers - cardholders (in particular, for the implementation of the access to the account for the purpose of obtaining information on account balance, debit, credit accounts, implementation of financial calculations with use of Bank cards).

The acquiring Bank (Acquirer) is the Bank-participant of the Payment system, a financial institution that has a contractual relationship with the enterprise trade and service (Payee) to the service for the purpose of making data about transactions made with Bank cards, sends them to the Payment system for making payments on these transactions.

The Issuer ("Issuer") is a Bank - participant of the Payment system, a financial institution, which shall issue (releases) of Bank cards, receives transaction data produced by Clients�AMI, performs Client authentication and authorization, transaction, guarantees payment made by the Clients transactions and classifies the amounts of transactions to Customer accounts.

The invention has been disclosed above with reference to a specific variant of its implementation. For professionals can be obvious and other variants of the invention, does not alter his nature as revealed in the present description. Accordingly, the invention should be considered limited in scope only by the following claims.

1. Method of control by a holder of a credit card the possibility of implementation of the authorization of transactions in the payment system using Bank cards, limiting the possibility of fraudulent transactions in the case of compromise of the card by controlling the parameters of the card in the processing center card Issuer in determining whether authorization of transactions, characterized in that initially the parameters of the card in the processing center of the Issuer determining the possibility of authorization of transactions, such as card status or limits activity cards, have the meaning which precludes any authorization of transactions with the card and lead to the refusal of the authorization processing center, comprising stages, allowing the card holder to perform operational�and using a card in which:
card holder for prior authorization of committing one of a limited or unlimited number of transactions sends to the processing center the Issuer authenticated requests their permission prior to performing operations on the map and changing the map settings in the processing center of an Issuer, such as status cards or limits activity cards,
the cardholder conducts a transaction on the card, during which processing center card Issuer receives a transaction authorization, the
processing center card Issuer performs the processing of the incoming transaction authorization and conducts regular authorization procedure if the parameter settings of the card in the processing center of an Issuer, such as status cards or limits activity card, authorize transactions, or their deviation from the denial of authorization if the parameter settings of the card in the processing center of an Issuer, such as status cards or limits activity cards, prohibit the conduct of operations;
characterized in that the identifier of the card holder when you change the map parameters in the processing center of an Issuer that determine the possibility of authorization of transactions, used the mobile phone number previously registered�registers in the processing center card Issuer;
characterized by the fact that as a method of authentication when the request to change the map parameters in the processing center of an Issuer that determine the possibility of authorization of transactions, is applied one or two-way exchange nagolosovat messages between the processing center of the card Issuer and the card holder mobile phone holder card or similar device using a mobile phone number pre-registered in the processing center card Issuer.

2. A method according to claim 1, characterized by the fact that authenticated the cardholder's request to change the map parameters in the processing center of an Issuer that determine the possibility of authorization of transactions, may contain parameters that define the number of transactions, amount of transactions and the period of time for which they are allowed.

3. A method according to claim 1, characterized in that when the request to change the map parameters in the processing center of an Issuer that determine the possibility of authorization of transactions, does not exclude the possibility of multi-factor strong authentication of the cardholder, and authentication and inquiry available to the cardholder by the Issuer of the card of e-banking systems.



 

Same patents:

FIELD: physics, computation hardware.

SUBSTANCE: invention relates to creation and operation of data base of vacancies and manpower resources. Search system for every selected data element defines its rating and processes data of data base and includes structuring in relational view of data on structure, terms and interrelations as to official characteristics with allowance for taxonomy and ontology of subject area as well as compilation of the rating of indices making the matrix and their ranging. Clients-physical persons define the priorities of criteria for fulfilled job and selection of a company. Besides, they enter the obligatory magnitude of criteria and varying ranged indices for selection of vacancies to be automatically processed by the system in scoring mode. For this, these are ganged after determination of their mean arithmetic value. Client-physical person defines the obligatory values of criteria and varying ranged indices for personnel selection. The latter are processed by the system in scoring mode. For this all candidates selected in compliance with used complex of search criterion after definition of their mean arithmetic value get the rating in the list of resumes of selected candidates for client-physical person the make the decision on.

EFFECT: accelerated search at ranging of data on personnel or vacancies.

8 cl, 1 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to the field of optimisation of selection and delivery of products in a trading network. The system for the network optimisation implemented by the computer comprises: the first processor for data processing for data receiving and storage in data memory; the second processor for data processing for obtaining at least one input data for conditional dynamic options in a network; the third processor for data processing for obtaining at least one input data set for the specified network to define the specified chosen products with use of at least one optimised filters; the fourth processor for data processing for delivery of at least one of the named products at least to one of the named organisations participating in a trade network and the fifth processor for data processing for data recording relating to the named delivered products, in the data memory.

EFFECT: optimisation of selection of a product or service with reference to requirements of clients and ensuring dynamic integration of these requirements.

16 cl, 5 dwg

FIELD: physics, control.

SUBSTANCE: invention relates to computer engineering. A climate control device, having a network interface configured to receive a request to use the climate control device; transmit an authorisation request to a payment system in response to receiving said request; receive an activation message containing information associated with the payment system in response to the authorisation request; transmit a payment message to the payment system based on a plurality of usage parameters, wherein the payment message leads to the deduction of funds from the account of the user; a user interface configured to receive user input which identifies a climate control programme containing a temperature parameter, a humidity parameter, an ionisation parameter, a dryer parameter, an air purification parameter, a sound parameter and a fragrance parameter, wherein each of said parameters is associated with a corresponding one of a plurality of times, a plurality of durations and a plurality of set values; and a climate control subsystem configured to change the environment based on the climate control programme.

EFFECT: automated climate control on a confined territory.

13 cl, 1 tbl, 11 dwg

FIELD: medicine.

SUBSTANCE: invention relates to transfusiology and is intended for application in medical institutions in planning and transfusion to patient of preserved donated blood components. Method is realised with application of bar-coding technology, with formation of unified information and technological system, where databank of patients who have transfusions of donated blood components in anamnesis is maintained; transfusion plan, with respect to which available components of donated blood are estimated, is composed in accordance with operation plan, and request is sent to blood centre for missing volume of donated blood components, data about obtained blood components are automatically included into medical information system.

EFFECT: ensuring safety of transfusion of donated blood components.

7 cl, 18 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to activation of services using algorithmically configured keys. The method of user subscription to the service comprises: identification in the computer of issuer of the user who is authorized for subscription to a service on the basis of a criteria determined by an issuer; extraction by a computer of the issuer of data associated with the user and shared data element which is shared by the issuer computer and the service provider computer; formation of the first activation code by the issuer computer and sending the first activation code to the user; and the user sends the first activation code and data associated with the user to the service provider computer; and the service provider computer forms the second activation code and authorizes the user for subscription to service, if the first and the second activation codes are identical.

EFFECT: prevention of violation of security of data processing system.

20 cl, 9 dwg

FIELD: medicine.

SUBSTANCE: invention relates to medical working process of visualisation. System contains: control unit (114), containing processor (116); and multitude of processing executives (102), connected with it, with processor (116) realising control of realisation with feedback of plane of medical visualisation working process by means of multitude of processing executives (102), and processor (116) is made with possibility of inquiring electronic medical information, dealing with and/or not dealing with visualisation from one or more processing executives; formation of plan of visualisation procedure working process by means of visualisation procedure, based on information inquired; reception of signal, indicating due date of planned visualisation procedure; downloading visualisation protocol, corresponding to visualisation procedure, into visualisation system, used for visualisation procedure; realisation of scanning by means of visualisation system; and updating plan of visualisation procedure working process.

EFFECT: increased reliability of patient diagnostics.

15 cl, 9 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to systems and methods of conducting a transaction to acquire available goods or services using stored means associated with designation. The methods include: receiving, at a point of sale, identifiers of goods or services selected for acquisition, and designation; determining if the goods or services comprise available goods or services; calculating the sum required to acquire the available goods or services; determining if the stored means are enough to acquire the available goods or services; using the stored means to acquire the available goods or services; and using an additional funding source provided by the customer to acquire any goods or services which are not available goods or services. The system implements said methods.

EFFECT: high accuracy and reliability of a transaction, which includes an additional alternative source.

18 cl, 9 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to a computer-readable data medium of a web configuration system, a method of customising a welding system and a web configuration system for customising a welding system. The web configuration system includes at least one processor and one or more tangible, computer-readable media at least collectively including or storing instructions executable by the at least one processor. The instructions include instructions to limit configuration options for a welding system based on user selection of a power source for the welding system, instructions to calculate a weld cable size for the welding system based on the user selection of the power source and user selection of input voltage, instructions to assign weld cable characteristics based on the weld cable size and a user selected cable length, and instructions to assemble a welding system order based at least on the user selection of the power source and the weld cable characteristics.

EFFECT: obtaining a computer-readable data medium of a web configuration system.

20 cl, 10 dwg

FIELD: medicine.

SUBSTANCE: invention relates to control of sugar level in blood. Method contains the following stages: multitude of measurements of glucose level in user's blood is carried out by means of microprocessor; multitude of measurements of glucose level in blood is stored in memory device; it is determined whether the last measurement of glucose level in blood, performed at specified moment of time during the day, is lower than the first threshold, which constitutes about 70 mg of glucose per decilitre of blood, or higher than the second threshold, which constitutes about 150 ml of glucose per decilitre of blood; it is estimated by means of microprocessor if, at least, one measurement of glucose level from multitude of measurements, carried out in time interval approximately 3-hour long relative to specified time, at which the last measurement of glucose level in blood for previous days, was lower the first threshold or higher than second threshold; it is notified that for the same time period for previous days multitude of measurements of glucose level in blood shows the tendency of reduction of glucose level in blood relative to the first threshold or of increase of glucose layer relative to the second threshold.

EFFECT: increased accuracy of determination of user's state for control of diabetes course.

24 cl, 17 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to technology of automatic selection of extra data, for example, ad, guide data, extra data, data on operating performances. Thus, processing, storage and/or transmission resources can be saved. This device for automatic selection of extra data to be included in content comprises classifier connected with user profile and selection means connected with extra data base. Extra data of definite category is placed in appropriate or contrasting context depending on used interest in thus goods category. Profiles of user are automatically classified as profiles with either pronounces or weak interest in this category.

EFFECT: adapted selection of extra data to be included in the content for twofold decrease in total volume of extra data.

11 cl, 2 dwg

FIELD: computer science, in particular, system for situational analysis of passenger transportation.

SUBSTANCE: system has block for selection of database addresses, block for forming recording signals and reading server database, block for controlling selection of data, first and second registers, block for comparing codes, five blocks for selecting record parameters, memory block, first group memory block, second group memory block, third group memory block.

EFFECT: higher speed of operation of system due to localization of range of data search addresses in server database using voyage group identifiers and given time period.

11 dwg

FIELD: technologies for realization of an additional useful effect during purchase of consumer goods.

SUBSTANCE: method for realization of additional useful effect includes dispensing an individual code to consumer, providing access to commonly accessed data transfer network by means of appropriate data processing device, while wherein a software storage is present. Access to storage is performed by means of individual code, launched selected software remains accessible for a certain time, and after anticipated number of accesses individual code is blocked for any further access.

EFFECT: expanded functional capabilities and range of technical means of communication network for users, purchasing goods.

3 cl

FIELD: commerce.

SUBSTANCE: method involves selling goods by way of selling system comprising stores, distributing center and selling terminal chain; transmitting signals from buyer communication means to store communication means, said signals containing information on goods ordered by buyers, and transmitting signals from buyer communication means to store and/or distributing center, said signals containing information on selling terminals selected by buyers; preparing in stores ordered goods for sending and sending said goods to distributing center and further from distributing center to selling terminals selected by buyers; also transmitting signals from store communication means to selling terminal communication means, said signals containing information on buyers orders, and/or transmitting information carriers from stores to selling terminals, said information carriers containing information on buyers orders, with goods being stored in selling terminals and dispensed therefrom to buyers. Also disclosed is goods remote selling system.

EFFECT: reduced time and costs, increased turnover of merchandize and simplified construction of delivery means.

4 cl, 3 dwg

FIELD: method and system for data exchange for facilitating upholding of laws and standards on information transfers and confidentiality of individuals.

SUBSTANCE: method includes stages: transferring from system to user computer a notification, that object confirmed agreement to sanctioned confidentiality and data protection rules; receipt by system of confirmation of individual of receipt of object by server or confirmation, that object will receive and use personal data in accordance to laws active in the country where individual or object is located; transferring by system to server of data object about agreement of individual to aforementioned receipt; receipt of data object from server, containing personal data of individual; periodical check of agreement of object.

EFFECT: improved reliability of information exchanges.

2 cl, 15 dwg

FIELD: engineering of educational equipment, in particular, technology for performing exams with use of computer-based equipment.

SUBSTANCE: method includes forming on machine-readable carrier of database of simplified informative-mathematical models of operation of industries or organizations, aforementioned carrier is given to examinee with notification of variant, data are selected from database for forming more precise model of operation of organization or industry. From server along Internet network information about current values of macro- and micro-economical coefficients of country and the world are received, on basis of which examinee develops dependencies, allowing process calculations pertaining to financial and managing activities of organization or industry in given time interval, recording aforementioned dependencies on machine-readable carrier and checking these by examiner.

EFFECT: improved objectivity of estimation of knowledge of examinees.

3 cl

FIELD: engineering of systems for producing individually optimized products in accordance to request from client.

SUBSTANCE: device is made for producing care products for house pets in accordance to client requests, including food for house pets, wherein integrated client interface is used, based on the Internet, and controlling process for a series of actions, device is configured for receipt of individual data about house pets, receipt of orders for appropriate care product for house pets for each buyer, controlling equipment operation during production for processing each request, care products for house pets in accordance to requirements of each client, and for tracking product delivery through delivery system to house of client.

EFFECT: possible processing of orders from clients for food for house pets and presentation of care scheme data in accordance to individual data pertaining to house pets.

7 cl, 3 dwg

FIELD: engineering of information accumulation system, in particular - technology for performing an interactive game.

SUBSTANCE: each user is provided with means for identification as game participant, provided with a mark. As a mark, optical signal source is used. Positioning of device for receiving optical signals is performed relatively to multiple users. Source position of identification means of game participant is held relatively to means for receiving optical signals in accordance to game conditions. Game objects and rules are given to participants and game start signal is given. User targets his mark to appropriate means for receiving optical signals. Optical signals are received from game participants and received optical signals are registered in registration device. Signals are processed in accordance to given program and results are outputted on an information carrier.

EFFECT: possible polling of large group of participants and detection of winners, while maintaining anonymousness of results.

6 dwg

FIELD: engineering of equipment for processing documents.

SUBSTANCE: device has detector system for detecting characteristic signs of documents, controlling system for realization functions, connected to information, received by detector system and/or to documents processing method, aforementioned system includes memorizing device for storing a set of codes, each of which corresponds to appropriate function, and is made with possible permission of function use, if it is confirmed that transferred permitting code corresponds to one of stored function codes.

EFFECT: simplified adjustment processes of software-hardware equipment complex.

3 cl, 6 dwg

FIELD: engineering of computerized information-analytic trading means, possible use for negotiating orders for buying and selling during performing of trade operations with cashless payment using communication network.

SUBSTANCE: system has authorization and registration block, roles block, block for controlling price offers, price forming block, block for controlling formulas, logistics block, block for controlling agreements, block for finding goods and making agreements, ordering block, block for accepting, block for forming goods movement graphs, display block, block for forming characteristics of goods and goods batches, block for controlling goods, block for purchasing goods, payment block, block for registering goods at warehouses, balances block, notifications block, documents registration block, block for payments and determining payments, automatic procedures block, activation block, analytics block, goods card block, marketing block, participants block, sells block.

EFFECT: expanded functional capabilities due to control over deliveries and quality of goods and services.

1 dwg

FIELD: computer science, in particular, engineering of information effect system of information-marketing centers in integrated electronic trading infrastructure.

SUBSTANCE: system has three registration devices, two adders, block for selecting supporting recording address, block for selecting supporting reading address, block for selecting query source address, block for selecting current record address, block for forming temporal period address, block for forming database addresses, block for controlling recording and reading of data and data dispensing block.

EFFECT: improved system speed of operation by excluding renewable data search across whole database of electronic trading and localizing search only by temporal and individual signs of goods identifiers.

9 dwg

Up!