Abstract: The present invention generally relates to a total control interface transaction system and its method thereof. The method comprises sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here; processing the message and thereupon transferring the message from the central bank to a receiving bank; sending a copy of a first payment message from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on; and sending another copy of the first payment message from the central bank to the local hub of receiving bank.
The present disclosure relates to banking and financial services. More particularly, the present disclosure relates to a total control interface transaction system and its method using 4-tiered architecture.
BACKGROUND OF THE INVENTION
There have been many systems available to perform bank transactions that prevents the illegal use of credit cards in shopping malls, by telephone, Internet and especially Automated Teller Machines (ATM). Personal Identity Numbers (PIN), the use of mother's maiden names as a hidden identification, and forcing credit card holders to have additional Access cards such as a driver's licence are examples of these initiatives. Since static knowledge is quickly learned and passed on to other people, any effort to use it has disadvantages. Once you have the static identity number, you can use it to make unauthorised credit card payments before the scam is discovered and the credit card account is locked.
Today, each purchase using a credit card, where the credit card is not present such as for internet or telephone transactions, must be accompanied by an additional security number, designated the CVV (card verification and validation) number. The CVV number may be alternatively called CVV2 or CID (card identification) or CCV (credit card verification or validation) by various credit card companies. The CVV number is typically on the back of the credit card, as with Master Card or Visa, but may be on the front of the card, as with American Express. The CVV number typically uses three digits, but may use four as with American Express. Merchants are not allowed to store CVV numbers in their database with the credit card number as a security measure. Because CVV numbers are not in the merchant's database, CVV numbers will not be disseminated if a merchant's database is compromised, assuming the merchant follows the rules and does not record the CVV number. Since the CVV number is not in the database, each transaction must be accompanied by a new request for the CVV number from the cardholder.
However, the current exiting solutions are single tier system, two tier system and three tier system.
The single tier system is a V - Shape RTGS, an erstwhile system used in nationalized banks mostly in India. In this system, the sending bank sends full payment message in one go to the receiving bank, usually the central bank, just like the RBI in India, settles the payment and sends the full payment message of clearance to the receiving bank, who acknowledges the message in order to complete the transaction. In RTGS (Real Time Gross Settlement), payments are processed in two stages i.e. queuing and processing. In this V Shape, time taken is more as there is a single tier technology in use i.e. The Client Server Technology which is cumbersome in nature. This technique was used way back in the 1950s, 60s and 70s.
The second-tier system is advent of new technologies, upgradation of computing platforms also took place, making transaction a bit faster, but along came the complexities too. In this Y - Shape, the full payment message is broken into two parts, the full payment and the settlement request, central ban sends it to a central processor at stage 3 and from there it goes to the receiving bank at stage 5. So, with the inclusion of 5 steps, this method is cumbersome in nature. This method was prevalent in 1980s and works upon the 2-tier client server technology.
The third-tier system is a L- Shape method, the first message oscillates between sending bank and central bank, which processes the request and sends it back to the sending bank, which sends it again to the receiving bank as final acknowledgement. Here, the sending itself serves as a linking pin between the sending and the receiving bank unlike the above two cases where central bank was the linking pin. This method runs on the 3-tier technology and was used in the 1980s.
In all of the systems used above, emphasis was laid only on speed, but in this new T-Shape used in 1990s and 2000s, importance began to be given to safety also. In this method, the first goes from the sending bank to the central bank, settlement, and then from central bank to the receiving bank. But here an additional feature is there, which differentiates this method from the other erstwhile methods used above. That feature is the copy of the first message from the sending bank to the receiving bank for safety and record purpose. This method laid the foundation of the future methods in an adaptive environment. In all of the systems used above, emphasis was laid only on speed, but in this new T- Shape used in 1990s and 2000s, importance began to be given to safety also.
In one prior art solution (US9390410B2), an automated transaction system and settlement processes is disclosed. Disclosed is a mobile platform that enables unique tap-and-connect transaction processing and settlement, which allows consumers, merchants, financial institutions and other third parties to strengthen their relationships through a local transaction network that offers more efficient transaction processing and settlement for reduced per-transaction cost and risk management costs and increased security.
In another prior art solution (US9390410B2), a method and system for facilitating electronic funds transactions is disclosed. A method and system for executing electronic funds transactions using a merchant-based debit (MBD) card in a merchant-centric system that provides for reduced fees to acquiring merchants and remitting a portion of the collected fees to issuing merchants. The system also preferably provides information sharing on consumer transactions with merchants to facilitate consumer-based incentive programs and the like.
In the view of the forgoing discussion, it is clearly portrayed that there is a need to have a total control interface transaction system and its method thereof.
SUMMARY OF THE INVENTION
The present disclosure seeks to provide a bank transaction system and method to ease the processing of financial instruments throughout the banking industry both Nationalized and Private, particularly in the business process job function.
In an embodiment, a total control interface transaction system is disclosed. The system includes a centralized server unit for sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here. The system further includes a central processing unit configured with the centralized server for processing the message and thereupon transferring the message from the central bank to a receiving bank. Then, a copy of a first payment message is sent from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on. Thereafter, another copy of the first payment message is sent from the central bank to the local hub of receiving bank.
In an embodiment, more than one host and many dumb terminals are attached and flow of transactions takes place both between host - terminal and terminal -terminal.
In an embodiment, a system of storage of informational archives is used in Indian Nationalized Banks, where in the Local Hub Manager is in charge of all such records.
In an embodiment, the Hubs are mostly located inside regional or zonal offices of such participating banks.
In an embodiment, the system further comprises a verification unit for verifying the first payment messages at every terminal.
In another embodiment, a method for total control interface transaction system is disclosed. The method includes sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here. The method further includes processing the message and thereupon transferring the message from the central bank to a receiving bank. The method further includes sending a copy of a first payment message from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on. The method further includes sending another copy of the first payment message from the central bank to the local hub of receiving bank.
In an embodiment, the central bank occupying a center stage.
In an embodiment, flow of messages assuming shape of the alphabet X and copy of message is used in case of any discrepancy, fraud, misuse, unauthorized access, risk mitigation, sabotage, fire etc.
In an embodiment, the client server architecture is basically a network of computers which manages resources over network itself with an aid of centralized node.
In an embodiment, storage and retrieval bottlenecks is eliminated to a large extent due to the random access to any document at any level, at any time, by any authorized person.
An object of the present disclosure is to perform easy collation and processing of data through a centralized server.
Another object of the present disclosure is to provide quick inward and outward remittance enabled as full message report generated immediately.
Another object of the present disclosure is to facilitate lesser cumbersomeness in three tier technology as copy of messages also generated in system.
Another object of the present disclosure is to provide Storage/Retrieval longevity possible as central sends receipts to local hubs of both the sending and the receiving banks.
Another object of the present disclosure is to manage Hard/Soft resources by a single host through an attached central processor.
Yet another object of the present invention is to deliver an expeditious and cost-effective method for total control interface transaction system.
To further clarify advantages and features of the present disclosure, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present disclosure will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram of a total control interface transaction system in accordance with an embodiment of the present disclosure;
Figure 2 illustrates a flow chart of a method for total control interface transaction system in accordance with an embodiment of the present disclosure; and
Figure 3 illustrates an architecture of a total control interface transaction system in accordance with an embodiment of the present disclosure.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present disclosure. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION:
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar
language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings.
Referring to Figure 1, a block diagram of a total control interface transaction system is illustrated in accordance with an embodiment of the present disclosure. The system 100 includes a centralized server unit 102 for sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here. The centralized server is secured with end-to-end transaction.
In an embodiment, a central processing unit 104 is configured with the centralized server 102 for processing the message and thereupon transferring the message from the central bank to a receiving bank. The
In an embodiment, a copy of a first payment message is sent from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on. Thereafter, another copy of the first payment message is sent from the central bank to the local hub of receiving bank.
In an embodiment, more than one host and many dumb terminals are attached and flow of transactions takes place both between host - terminal and terminal -terminal.
In an embodiment, a system of storage of informational archives is used in Indian Nationalized Banks, where in the Local Hub Manager is in charge of all such records.
In an embodiment, the Hubs are mostly located inside regional or zonal offices of such participating banks.
In an embodiment, the system further comprises a verification unit 106 for verifying the first payment messages at every terminal.
Figure 2 illustrates a flow chart of a method for total control interface transaction system in accordance with an embodiment of the present disclosure. At step 202, the method 200 includes sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here.
At step 204, the method 200 includes processing the message and thereupon transferring the message from the central bank to a receiving bank.
At step 206, the method 200 includes sending a copy of a first payment message from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on.
At step 208, the method 200 includes sending another copy of the first payment message from the central bank to the local hub of receiving bank. In an embodiment, the central bank occupying a center stage.
In an embodiment, flow of messages assuming shape of the alphabet X and copy of message is used in case of any discrepancy, fraud, misuse, unauthorized access, risk mitigation, sabotage, fire etc.
In an embodiment, the client server architecture is basically a network of computers which manages resources over network itself with an aid of centralized node.
In an embodiment, storage and retrieval bottlenecks is eliminated to a large extent due to the random access to any document at any level, at any time, by any authorized person.
In this method, the first goes from the sending bank to the central bank, settlement, and then from central bank to the receiving bank. But here an additional feature is there, which differentiates this method from the other erstwhile methods used above. That feature is the copy of the first message from the sending bank to the receiving bank for safety and record purpose. This method laid the foundation of the future methods in an adaptive environment.
Figure 3 illustrates an architecture of a total control interface transaction system in accordance with an embodiment of the present disclosure. In the view of the above technology transitions, we have endeavored to invent X- Shape, RTGS which novels the features of storage/retrieval/speed/accuracy/safety derived from the earlier V, Y, L and T shapes. This method uses the modern adaptive four tier architecture wherein the host plays and intelligent part described below.
In this X- Shape, first the messages of payment will go from the sending bank to the central bank, which plays an intelligent and pivotal role here. Then the message will be processed and in second step, the message will go from central bank to the receiving bank, in the third step, a copy of the first payment message will go from central bank to the local hub of the sending bank storage/retrieval and reporting purposes later on. Similarly, in the fourth step, copy of the first payment message will go from the central bank to the local hub receiving bank. Hence, the central bank occupying the center stage and the flow of messages assuming the shape of the alphabet X. The copy of the message is used in case of any discrepancy, fraud, misuse, unauthorized access, risk mitigation, sabotage, fire etc.
This method is named X because of the directional flow of the messages. Mostly applicable in nationalized banks as RTGS usually takes place above two lacs and post de-monetization and Covid, govt, as imposed certain restrictions on the quantum and the frequency of transactions in private sector banks.
The Hub System: This system of storage of informational archives is used in Indian Nationalized Banks, where in the Local Hub Manager is in charge of all such records. Hus are mostly located inside the regional or zonal offices of such participating banks. In this X Shape, another beautiful feature is that we see a combination of the old, archaic and the new systems together. The artificial record system is rigid in nature but in case of any exigency, it can be accessed randomly.
The major technology used in this invention is the Client Server Architecture. CSA is basically a network of computers which manages resources over the network itself with the aid of centralized node. Like the Central Bank is this case. There are 4 types of CSAs elucidated as below.
Single Tier: In this type, there is one host and one dumb terminal and the flow of transactions happen between these two only.
Two Tier: In this type, host is one and the dumb terminals attached are two and the flow of transactions happens between these three.
Three Tier: In this type, host is one, and the dumb terminals attached are three. But the flow of transactions does not only take place between host and terminal but between terminals too. This feature is added due to safety of transactions. This method serves as the base of the modem adaptive four tier architecture.
Four Tier: In this type, there is more than one host and many dumb terminals attached. Flow of transactions takes place both between host - terminal and terminal -terminal. Additional importance is laid on safety and accuracy of dealings.
The system disclosed in accordance with the present disclosure facilitates fast and secured bank transactions. The disclosure facilitates easy collation and processing of data through a centralized server 102. The disclosure facilitates quick inward and outward remittance enabled as full message report generated immediately. The disclosure facilitates lesser cumbersomeness in three tier technology as copy of messages also generated in system. The disclosure facilitates storage/Retrieval longevity possible as central sends receipts to local hubs of both the sending and the receiving banks. The disclosure facilitates Hard/Soft resources managed by a single host through an attached central processor.
Features of the system:
1) The patent is of semi-technical nature, belongs to the Banking and Financial Services Industry.
2) It will ease the processing of financial instruments throughout the banking industry both Nationalized and Private, particularly in the business process job function.
3) Till now, the entire banking industry is using 3-tiered architecture, this design aims to use the 4-tiered architecture, called as the "Total Control Interface".
4) The processing time tends to get reduced by 15 minutes per instrument after the application is brought into use.
5) Also, the storage and retrieval bottlenecks will be eliminated to a large extent due to the random access to any document at any level, at any time, by any authorized person.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.
WE CLAIM:
1. A method for total control interface transaction system, the method comprises:
sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here;
processing the message and thereupon transferring the message from the central bank to a receiving bank;
sending a copy of a first payment message from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on; and
sending another copy of the first payment message from the central bank to the local hub of receiving bank.
2. The method as claimed in claim 1, wherein the central bank occupying a center stage.
3. The method as claimed in claim 1, wherein flow of messages assuming shape of the alphabet X and copy of message is used in case of any discrepancy, fraud, misuse, unauthorized access, risk mitigation, sabotage, fire etc.
4. The method as claimed in claim 1, wherein the client server architecture is basically a network of computers which manages resources over network itself with an aid of centralized node.
5. The method as claimed in claim 1, wherein storage and retrieval bottlenecks is eliminated to a large extent due to the random access to any document at any level, at any time, by any authorized person.
6. A total control interface transaction system, the system comprises:
a centralized server unit for sending messages of payment from a sending bank to a central bank, which plays an intelligent and pivotal role here;
a central processing unit configured with the centralized server for processing the message and thereupon transferring the message from the central bank to a receiving bank;
wherein a copy of a first payment message is sent from the central bank to a local hub of sending bank for storage/retrieval and reporting purposes later on; and
wherein another copy of the first payment message is sent from the central bank to the local hub of receiving bank.
7. The system as claimed in claim 6, wherein more than one host and many dumb terminals are attached and flow of transactions takes place both between host - terminal and terminal -terminal.
8. The system as claimed in claim 6, wherein a system of storage of informational archives is used in Indian Nationalized Banks, where in the Local Hub Manager is in charge of all such records.
9. The system as claimed in claim 8, wherein the Hubs are mostly located inside regional or zonal offices of such participating banks.
10. The system as claimed in claim 9, comprises a verification unit for verifying the first payment messages at every terminal.
| # | Name | Date |
|---|---|---|
| 1 | 202111025556-COMPLETE SPECIFICATION [08-06-2021(online)].pdf | 2021-06-08 |
| 1 | 202111025556-STATEMENT OF UNDERTAKING (FORM 3) [08-06-2021(online)].pdf | 2021-06-08 |
| 2 | 202111025556-DECLARATION OF INVENTORSHIP (FORM 5) [08-06-2021(online)].pdf | 2021-06-08 |
| 2 | 202111025556-REQUEST FOR EARLY PUBLICATION(FORM-9) [08-06-2021(online)].pdf | 2021-06-08 |
| 3 | 202111025556-DRAWINGS [08-06-2021(online)].pdf | 2021-06-08 |
| 3 | 202111025556-FORM-9 [08-06-2021(online)].pdf | 2021-06-08 |
| 4 | 202111025556-FIGURE OF ABSTRACT [08-06-2021(online)].jpg | 2021-06-08 |
| 4 | 202111025556-FORM 1 [08-06-2021(online)].pdf | 2021-06-08 |
| 5 | 202111025556-FIGURE OF ABSTRACT [08-06-2021(online)].jpg | 2021-06-08 |
| 5 | 202111025556-FORM 1 [08-06-2021(online)].pdf | 2021-06-08 |
| 6 | 202111025556-DRAWINGS [08-06-2021(online)].pdf | 2021-06-08 |
| 6 | 202111025556-FORM-9 [08-06-2021(online)].pdf | 2021-06-08 |
| 7 | 202111025556-DECLARATION OF INVENTORSHIP (FORM 5) [08-06-2021(online)].pdf | 2021-06-08 |
| 7 | 202111025556-REQUEST FOR EARLY PUBLICATION(FORM-9) [08-06-2021(online)].pdf | 2021-06-08 |
| 8 | 202111025556-COMPLETE SPECIFICATION [08-06-2021(online)].pdf | 2021-06-08 |
| 8 | 202111025556-STATEMENT OF UNDERTAKING (FORM 3) [08-06-2021(online)].pdf | 2021-06-08 |