专利摘要:
Procedure to generate and validate a file associated with an electronic transaction, which can be a payment or a payment request, making the transaction in a secure manner between a payer and a receiver; the method may comprise generating, by the payer, the file associated with the electronic transaction incorporating, in an image file, a reference to the electronic transaction and a cryptogram; in addition, the method may also comprise receiving, by the receiver, the file associated with the generated electronic transaction; extract from the file associated with the electronic transaction received the image file, the reference to the electronic transaction and the cryptogram; the file associated with the electronic transaction is validated by determining whether the file associated with the received electronic transaction is correct or incorrect, in the case that it is correct, a validation signal can be generated to carry out the transaction. (Machine-translation by Google Translate, not legally binding)
公开号:ES2648255A1
申请号:ES201630873
申请日:2016-06-28
公开日:2017-12-29
发明作者:Juan Carlos DELGADO ARNAU
申请人:Banco Santander SA;
IPC主号:
专利说明:

Procedure, system and computer program to generate and validate a file associated with an electronic transaction and the file generated by said procedure
This description refers to a procedure to generate and validate a file 5 associated with an electronic transaction. In addition, it refers to a system and computer program suitable for carrying out the procedure.
STATE OF THE PREVIOUS TECHNIQUE
10 Today, the world is full of people connected in mobility. According to some forecasts, in the year 2020, worldwide, 90% of people over the age of six will have a mobile phone (Source: Ericsson Mobility Report - June 2015).
15 On the other hand, clearly the consumption of social networks is not a passing fad but rather has already become a habit. According to some estimates, seven out of ten mobile internet users connect to a social platform (for example, Twitter, Facebook, Instagram, Google+ or Linkedin) through their device (for example, smartphone or tablet) and the 29% do it daily (Source: website
20 https://www.territoriocreativo.es/socialholic-introduccion).
Similarly, the use of instant messaging and multimedia applications over the Internet (for example, Messenger, Whatsapp or Telegram), which can be part of a social network, has had an exponential growth. So, for example, putting as
25 WhatsApp application reference, it is estimated that every day (an average day) 200 million voice notes, 30 billion messages (sent and received) and 700 million images are shared (Source: website -http: // www.laverdad.com/tecnologia/91360whatsapp-la-app-de-mensajeria-mas-utilizada-en-el-mundo.html). This growth is also applicable to email client applications.
30 Despite all this growth described, transactions (for example, payments or payment requests) through these types of applications (both social networks, instant messaging and email) are still to be exploited.


There are mobile phone or tablet applications on the market that link messaging along with payments (for example, Pingit). In some cases, already used messaging applications are used to include a payment, although they need to reach an integration agreement with the courier company (for example, Pingit-Twitter).
5 There is also a solution that without reaching an agreement with the social network can insert as a text message a link to a payment (for example, PayKey), but for this requires a specific keyboard that includes a new key be installed on the mobile device of payment that triggers the process without leaving the application of the social network. The inconvenience of this
The solution is, on the one hand, that it requires changing the telephone keypad compromising the client's confidence in security (man-in-the-middle) and, on the other hand, the need to indicate the beneficiary's reference in the payment process even if the "chat" in progress is with the same beneficiary.
15 Consequently, there is a need for a system that at least partially solves the problems mentioned above.
EXPLANATION OF THE INVENTION
20 In a first aspect, a procedure is provided to generate a file associated with
an electronic transaction This procedure may include: -Receiving data related to the electronic transaction; -Get a reference to the electronic transaction generated from the data
received relating to the electronic transaction; 25 -Receive an image file;
- Generate the file associated with the electronic transaction from the incorporation, in the image file received, of at least the reference to the electronic transaction obtained.
30 Thus, with the generation of this file associated with the electronic transaction, this electronic transaction (for example, payments or payment requests) can be completed through, for example, social networks, instant messaging applications or email in a simple way to present natural compatibility with the way these networks or applications work, since no integration is required


with the social network or the application because it simply uses it. Since the file associated with the transaction is an image file, it is possible to carry out the transaction by sending this image between the sender of the transaction and the recipient of the transaction, that is, to achieve the objective of performing an electronic transaction naturally in networks
5 social or through the applications described uses the generalized capacity of these to be able to share images (for example, photographs).
In some examples, generate the file associated with the electronic transaction from the incorporation, in the received image file, of at least the reference to the transaction
The electronic obtained can comprise incorporating, in the received image file, at least the reference to the electronic transaction obtained in the form of image metadata.
According to some examples, generate the file associated with the electronic transaction to
From the incorporation, in the received image file, of at least the reference to the electronic transaction obtained may comprise incorporating, in the received image file, at least the reference to the electronic transaction obtained in the form of a code after the end of image mark.
20 On the other hand, the procedure may include: -Codifying at least the reference to the electronic transaction obtained; and in which to generate the file associated with the electronic transaction from the incorporation, in the received image file, of at least the reference to the electronic transaction obtained may comprise:
25 -Include, in the received image file, at least the reference to the encrypted electronic transaction.
In some examples, coding at least the reference to the electronic transaction obtained may comprise:
30-Generate a code representative of at least the reference to the electronic transaction; in which to incorporate, in the received image file, at least the reference to the encoded electronic transaction may comprise:


- Incorporate, in the received image file, the code representing at least the reference to the electronic transaction visibly in the image.
For example, this code representative of at least the reference to the electronic transaction 5 can be selected from at least one linear barcode or a two-dimensional code, such as a two-dimensional barcode or a QR code.
In some examples, the procedure may comprise:-Get an electronic fingerprint of the received image file;
10-Obtain an electronic fingerprint of the file associated with the electronic transaction from the electronic fingerprint obtained from the image file received, and the reference to the electronic transaction obtained.
Basically, in these examples, obtaining the electronic footprint of the file associated with
15 the electronic transaction can be made by obtaining the electronic fingerprint of the image file and subsequently obtaining the electronic fingerprint of the file from the electronic fingerprint obtained from the image file, and from the reference to the transaction.
Alternatively, obtaining the electronic fingerprint of the file associated with the transaction
20 electronic could be done by obtaining the electronic footprint of the image file that incorporates the reference to the transaction.
According to some examples, the procedure may comprise obtaining a cryptogram from the electronic fingerprint obtained from the file associated with the transaction
25 electronics
In some examples, obtaining a cryptogram from the electronic fingerprint obtained from the file associated with the electronic transaction may comprise obtaining the cryptogram by encrypting the electronic fingerprint obtained from the file associated with the transaction.
30 electronics This encryption can be done, for example, with the private key associated with the electronic transaction payer.
In some examples, generate the file associated with the electronic transaction from the incorporation, in the received image file, of at least the reference to the transaction


The electronic obtained can also include incorporating, in the received image file, the cryptogram in the form of a code after the image end mark, obtaining a secure file associated with the electronic transaction.
5 According to some examples, generating the file associated with the electronic transaction from the incorporation, in the received image file, of at least the reference to the obtained electronic transaction may also include incorporating, in the received image file, the cryptogram in the form of image metadata, obtaining a secure file associated with the electronic transaction.
10 On the other hand, coding at least the reference to the electronic transaction obtained may include:
- Encode the reference to the electronic transaction obtained and the cryptogram obtained; 15 and in which to incorporate, in the received image file, at least the reference to the encoded electronic transaction may comprise:
- Incorporate, in the received image file, the reference to the electronic transaction and the encrypted cryptogram, obtaining a secure file associated with the electronic transaction.
20 In some examples, encoding the reference to the electronic transaction obtained and the cryptogram obtained may comprise:
- Generate a code representative of the reference to the electronic transaction and the cryptogram; 25 in which to incorporate, in the received image file, the reference to the electronic transaction and the encrypted cryptogram may comprise:
- Incorporate, in the received image file, the code representing the reference to the electronic transaction and the cryptogram visibly in the image, obtaining a secure file associated with the electronic transaction.
30 This code representative of the electronic transaction reference can be selected from at least one linear barcode or two-dimensional code, such as a two-dimensional barcode or a QR code.


Thus, in any of the cases described, the file associated with the electronic transaction may comprise or be formed by the image file that incorporates both the reference to the transaction and the cryptogram.
5 In addition, the electronic footprint can comprise a cryptographic hash value. This hash value can be obtained by applying a cryptographic hash function to a consistent version of the file associated with the electronic transaction. The expression "consistent version" refers to a format of the file that always produces the same hash value when the same cryptographic hash function is applied.
10 A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-sized bit string, the hash (encryption) value, such that an accidental or intentional change in the file changes the value of hash
15 One hash function that can be used is the SHA-256 which belongs to the set of cryptographic hash functions of the SHA-2 standard, although another hash function can be used if, for example, it is demonstrated in the future that SHA-256 does not It is safe enough. The safety of a hash function is determined by its resistance to collisions. So despite
20 that SHA-256 is used in the present examples, it could be replaced in the future by another hash function with better collision resistance (i.e., safer), such as, for example, SHA-3, which is a new hash standard currently in development.
The data related to the electronic transaction mentioned above can be selected
25 of at least one of the following: -Data concerning the concept of electronic transaction; -Data concerning the validity of the electronic transaction; -Data concerning the amount of the electronic transaction; -Data concerning the payer of the electronic transaction.
30 With reference to the amount, this can also contemplate the type of currency (euros, dollars, pounds, etc.) although the type of currency could consider data relating to the electronic transaction independently.


In some examples, the electronic transaction is selected from a payment or a payment request. Additionally, the electronic transaction can also refer, for example, to a collection request (several recipients of the file associated with the transaction can make a payment), a purchase request (for example, by selecting an image of a product) or a gift voucher (agreed with a specific provider).
According to a second aspect, a computer program is provided. This computer program may comprise program instructions to cause a computer system to perform a procedure to generate a file associated with an electronic transaction, such as the one described above. This computer program may be stored in physical storage media, such as recording media, a computer memory, or a read-only memory, or it may be carried by a carrier wave, such as electrical or optical.
In a third aspect, a system is provided to generate a file associated with a
electronic transaction This system may include:
- Means to receive data related to the electronic transaction;
- Means to obtain a reference to the electronic transaction generated from
the data received regarding the electronic transaction;
- Means to receive an image file;
- Means to generate the file associated with the electronic transaction from the
incorporation, in the received image file, of at least the reference to the
electronic transaction obtained.
Basically, the system for generating a file associated with an electronic transaction must be able to reproduce the procedure described above, for example, by electronic and / or computer means. Said electronic / computer means may be used interchangeably, that is, one part of the described means may be electronic means and the other part may be computer means, or all described means may be electronic means or all described means may be computer means .
Examples of a system comprising only electronic means (ie, a purely electronic configuration) may be such a programmable electronic device.


such as a CPLD (Complex Programmable Logic Device), an FPGA (Field Programmable Gate Array) or an ASIC (Application-Specific Integrated Circuit).
An example of a system to generate a file associated with an electronic transaction
5 comprising only computer means may be a computer system comprising a memory and a processor, in which the memory stores computer program instructions executable by the processor, these instructions comprising functionalities for executing a procedure, such as described above, for generate a file associated with an electronic transaction, that is, in order to generate the
10 different actions and activities for which the system has been programmed. Thus, for example, in this case the system can be a mobile device, such as a smartphone or a tablet. This system can be used by the payer of an electronic transaction that, therefore, requires the generation of the file associated with the electronic transaction.
A system for generating a file associated with an electronic transaction that combines electronic and computer means may comprise a processor, in which the memory stores computer program instructions executable by the processor, these instructions comprising functionalities for executing at least part of a
20 procedure to generate a file associated with an electronic transaction, as described above. In addition, the system may comprise electronic circuits designed to execute those parts of the procedure that are not implemented by the computer instructions.
25 According to another aspect, a file associated with an electronic transaction is provided. This file may include: -An image file; -A reference to the electronic transaction incorporated in the image file.
In addition, this file may comprise a cryptogram of the image file that incorporates the reference to the electronic transaction, incorporated in the image file, as well as data relating to the electronic transaction.


In another aspect, a procedure is provided to validate a file associated with an electronic transaction. This file can be generated from a procedure to generate a file associated with an electronic transaction, as described above. This validation procedure may include:
- Receive the file associated with the generated electronic transaction; -Extract from the file associated with the electronic transaction received at least the image file and the reference to the electronic transaction; -Validate the file associated with the electronic transaction from at least the image file and the reference to the electronic transaction extracted.
Thus, when the recipient of the electronic transaction receives the file associated with the electronic transaction (that is, an image file that at least incorporates the reference to the transaction, either for example as image metadata or as a code afterwards) of the end of image mark), you must validate it for the electronic transaction to complete. The validation may depend on the data contained in the image file (only reference to the transaction, reference to the transaction + cryptogram, etc.).
In some examples, extracting from the file associated with the electronic transaction received at least the image file and the reference to the electronic transaction may comprise, when the file associated with the electronic transaction comprises a code visible in the image representative of the reference to the electronic transaction. electronic transaction:
- Extract the image file; -Decoding the code representing the reference to the electronic transaction visible in the image to extract the reference to the electronic transaction.
According to some examples. The validation procedure may include, when the file associated with the electronic transaction is a secured file comprising a cryptogram:
- Extract the cryptogram from the secured file associated with the electronic transaction; in which to validate the file associated with the electronic transaction from at least the image file and the reference to the electronic transaction extracted includes:
- Validate the file associated with the electronic transaction from the image file, the reference to the electronic transaction and the cryptogram extracted.


On the other hand, extracting from the file associated with the electronic transaction received at least the image file and the reference to the electronic transaction may comprise, when the file associated with the electronic transaction is a secured file comprising a code visible in the representative image of the reference to the electronic transaction and of
5 cryptogram: -Extract the image file; -Decoding the code visible in the representative image of the reference to the
electronic and cryptogram transaction to extract the reference to the electronic transaction and the cryptogram; 10 in which to validate the file associated with the electronic transaction from at least the image file and the reference to the electronic transaction extracted includes: -Validate the file associated with the electronic transaction from the image file, of the reference to the electronic transaction and the cryptogram extracted.
15 In some examples, the validation procedure may comprise obtaining, from the extracted cryptogram, a first electronic fingerprint.
In addition, obtaining, from the extracted cryptogram, a first electronic fingerprint may comprise, when the cryptogram is obtained from encrypting the electronic fingerprint of the
20 file associated with the electronic transaction, decrypt the extracted cryptogram. This cryptogram decryption can be done from the public key of the transaction payer, if the encryption has been done previously with your private key.
According to some examples, the validation procedure may comprise
25 also obtain a second electronic footprint of the file associated with the electronic transaction from the image file and the reference to the electronic transaction extracted.
The validation procedure may also include:
30 -Get an electronic fingerprint of the extracted image file; -Get a second electronic fingerprint of the file associated with the electronic transaction from the electronic fingerprint obtained from the extracted image file, and the reference to the extracted transaction.


On the other hand, validating the file associated with the electronic transaction from the image file, the reference to the electronic transaction and the extracted cryptogram may include:
- Compare the first electronic fingerprint obtained from the cryptogram extracted with the second electronic fingerprint obtained from the file associated with the electronic transaction;
- Determine the file associated with the electronic transaction received as correct, in case the first electronic fingerprint and the second electronic fingerprint are the same;
- Determine the file associated with the electronic transaction received as incorrect, 10 in case the first electronic fingerprint and the second electronic fingerprint are not equal.
In some examples, validate the file associated with the electronic transaction from the image file, the reference to the electronic transaction and the cryptogram extracted
15 may include, in case of determining the file associated with the electronic transaction received as incorrect: -Generate a file warning signal associated with the incorrect electronic transaction.
20 According to another aspect, a computer program is provided. This computer program may comprise program instructions to cause a computer system to perform a procedure to validate a file associated with an electronic transaction such as that described above. This computer program may be stored in physical storage media, such as storage media.
25 recording, a computer memory, or a read-only memory, or it may be carried by a carrier wave, such as electrical or optical.
In accordance with yet another aspect, a system is provided to validate a file associated with an electronic transaction. This file associated with an electronic transaction
30 can be generated from a system to generate a file associated with an electronic transaction described above. The system for validating a file associated with an electronic transaction may comprise: -Means for receiving the file associated with the generated electronic transaction;


- Means to extract from the file associated with the electronic transaction received at least the image file and the reference to the electronic transaction; -Means to validate the file associated with the electronic transaction from at least the image file and the reference to the electronic transaction extracted.
Basically, the system for validating a file associated with an electronic transaction must be able to reproduce the procedure for validating a file associated with an electronic transaction described above, for example, by electronic and / or computer means. Said electronic / computer means may be used interchangeably, that is, one part of the described means may be electronic means and the other part may be computer means, or all described means may be electronic means or all described means may be computer means .
Examples of a system for validating a file associated with an electronic transaction comprising only electronic means (i.e., a purely electronic configuration) can be a programmable electronic device such as a CPLD (Complex Programmable Logic Device), an FPGA (Field Programmable Gate) Array) or an ASIC (Application-Specific Integrated Circuit).
An example of a system for validating a file associated with an electronic transaction comprising only computer means may be a computer system comprising a memory and a processor, in which the memory stores computer program instructions executable by the processor, these instructions comprising functionalities to execute a procedure, such as the one described above, to validate a file associated with an electronic transaction, that is, in order to generate the various actions and activities for which the system has been programmed. Thus, for example, in this case the system can be a mobile device, such as a smartphone or a tablet. This system can be used by the recipient of an electronic transaction that, therefore, requires the validation of a file associated with an electronic transaction.
A system for validating a file associated with an electronic transaction that combines electronic and computer means may comprise a processor, in which the memory stores computer program instructions executable by the processor,


These instructions include functionalities to execute at least part of a procedure to validate a file associated with an electronic transaction, such as the one described above. In addition, the system may comprise electronic circuits designed to execute those parts of the procedure that are not implemented by
5 computer instructions.
According to another aspect, a procedure is provided for conducting an electronic transaction between a payer and a recipient of the electronic transaction. This electronic transaction may be a payment that the payer must make to the recipient. The procedure
10 may include: -Receiving data related to the payment, this data comprising at least the amount of the payment to be made by the payer; -Make a charge in a payment payer account from the amount of payment received; 15 -Abonar the charge made in the payer's account in an intermediate account associated with the payment;
- Generate a reference to the payment from data received related to the payment and the intermediate account associated with the payment, this reference being the payment generated adequate to generate a file associated with the payment in accordance with a
20 procedure for generating a file associated with an electronic transaction, as described above;
- Receive payment acceptance by the recipient upon receipt of the file associated with the payment, from at least the validation of the file associated with the payment in accordance with a procedure to validate a file associated with a transaction
Electronics, as described above; -Transfer the payment amount from the intermediate account to the account of the payment recipient, after receiving the acceptance of the payment by the recipient.
In some examples, the procedure for carrying out an electronic transaction may include: - Receiving an electronic fingerprint of the image file that is part of the file associated with the payment generated;


- Obtain an electronic fingerprint of the file associated with the payment from the electronic fingerprint obtained from the image file received, and from the reference to the payment generated.
5 In addition, the procedure may include obtaining a cryptogram from the electronic fingerprint obtained from the file associated with the payment.
According to some examples, obtaining a cryptogram from the electronic fingerprint obtained from the file associated with the payment may comprise obtaining the cryptogram by encrypting the electronic fingerprint obtained from the file associated with the payment. This encryption can be done with a private key of the payment payer.
At this point it is important to note that the validation of the file associated with the payment can be done automatically (for example, from the cryptogram) or from the action 15 of a user.
It is also important to note that the cryptogram obtained may be suitable to generate a file associated with the payment according to a procedure to generate a file associated with an electronic transaction (that is, in this case a payment), as
20 described above.
According to some examples, the procedure for carrying out an electronic transaction may include: - Obtaining a first electronic fingerprint from the cryptogram (this cryptogram 25 can be obtained, depending on the scenario, by the system to generate a
file associated with a transaction described above or by this system); -Get a second electronic fingerprint of the file associated with the payment; -Compare the first electronic fingerprint obtained from the cryptogram with the second
electronic footprint obtained from the file associated with the payment; 30 -Determine the file associated with the payment as correct, in case the first electronic fingerprint and the second electronic fingerprint are the same; -Determine the file associated with the payment as incorrect, in case the first electronic fingerprint and the second electronic fingerprint are not equal.


In some examples, the payment information may further comprise the mobile phone number of the payment recipient, and the procedure may comprise: -Sending an electronic message to the mobile phone number of the recipient,
this electronic message comprising at least one OTP key; in which to receive the acceptance of the payment by the recipient upon receipt of the file associated with the payment may include:
- Receive the OTP key.
In this way, the recipient of the file associated with the electronic transaction is authenticated before the transaction is completed. This security measure may be adequate, for example, when the amount of the transaction is high and verification of the payment recipient is required.
In accordance with another aspect, a computer program is provided comprising program instructions to cause a computer system to perform a procedure to perform an electronic transaction between a payer and a recipient of the electronic transaction, this electronic transaction may be a payment that the The payer must make the receiver, as one of those described above. This computer program may be stored in physical storage media, such as recording media, a computer memory, or a read-only memory, or it may be carried by a carrier wave, such as electrical or optical.
In accordance with yet another aspect, a system is provided for performing an electronic transaction between a payer and a recipient of the electronic transaction. This transaction may be a payment that the payer must make to the recipient. The system may include:
- Means to receive data related to the payment, this data comprising at least the amount of the payment to be made by the payer; -Means to make a charge in a payment payer account from the amount of payment received; -Means to pay the charge made to the payer's account in an intermediate account associated with the payment; -Means to generate a reference to the payment based on data received regarding the payment and the intermediate account associated with the payment, this reference being the payment


generated adequate to generate a file associated with the payment according to a procedure to generate a file associated with an electronic transaction, such as the one described above;
- Means to receive payment acceptance by the recipient upon receipt of the
5 file associated with the payment, from at least the validation of the file associated with the payment according to a procedure to validate a file associated with an electronic transaction, such as the one described above;
- Means to transfer the payment amount from the intermediate account to the account of the payment recipient, after receiving the acceptance of the payment by the recipient.
10 Basically, the system to carry out an electronic transaction between a payer and a recipient of the electronic transaction, this transaction being a payment that the payer must make to the recipient, must be able to reproduce the procedure to perform an electronic transaction between a payer and a recipient of the transaction
15 electronics described above, for example, by electronic and / or computer means. Said electronic / computer means may be used interchangeably, that is, one part of the described means may be electronic means and the other part may be computer means, or all described means may be electronic means or all described means may be computer means .
20 Examples of a system for conducting an electronic transaction between a payer and a recipient of the electronic transaction comprising only electronic means (i.e., a purely electronic configuration) may be a programmable electronic device such as a CPLD (Complex Programmable Logic Device) , an FPGA (Field Programmable
25 Gate Array) or an ASIC (Application-Specific Integrated Circuit).
An example of a system for performing an electronic transaction between a payer and a recipient of the electronic transaction comprising only computer means may be a computer system comprising a memory and a processor, in which the
The memory stores computer program instructions executable by the processor, these instructions comprising functionalities to execute a procedure, such as the one described above, to perform an electronic transaction between a payer and a receiver of the electronic transaction, that is, in order to generate the various actions and activities for which the system has been programmed. So, for example, in


In this case, the system can be a computer system, such as a computer or a set of computers (for example, a server-type computer system).
A system for conducting an electronic transaction between a payer and a recipient of the
The electronic transaction that combines electronic and computer means may comprise a processor, in which the memory stores computer program instructions executable by the processor, these instructions comprising functionalities for executing at least part of a procedure for performing an electronic transaction between a payer and a recipient of the electronic transaction, as described above.
10 In addition, the system may comprise electronic circuits designed to execute those parts of the procedure that are not implemented by the computer instructions.
According to another aspect, a procedure for performing a transaction is provided.
15 electronic between a payer and at least one receiver of the electronic transaction. This electronic transaction may be a payment request made by the payer to the recipient. The procedure may include: -Receiving data related to the payment request, this data comprising at least the amount of the payment to be made by the recipient;
20 -Generate a reference to the payment request based on data received regarding the payment and the payer's account, this reference being the payment generated adequate to generate a file associated with the payment request in accordance with a procedure to generate a file associated with an electronic transaction, as described above;
25 -Receive acceptance of payment by the recipient upon receipt of the file associated with the payment request, upon validation of the file associated with the payment request in accordance with a procedure to validate a file associated with an electronic transaction , as described above; -Make a charge on a recipient account from the amount of payment received,
30 after receiving payment acceptance by the recipient; -Abonar the charge made in the payer's account.
In accordance with yet another aspect, a computer program is provided. This computer program may comprise program instructions to cause a system


IT will perform a procedure to perform an electronic transaction between a payer and at least one recipient of the electronic transaction, this transaction being a payment request that the payer makes to the recipient, as described above. This computer program may be stored in a media of
5 physical storage, such as recording media, a computer memory, or a read-only memory, or it can be carried by a carrier wave, such as electrical or optical.
According to another aspect, a system for conducting an electronic transaction is provided
10 between a payer and at least one recipient of the electronic transaction. This electronic transaction may be a payment request that the payer makes to the recipient. The system may comprise: -Means to receive data related to the payment request, this data comprising at least the amount of the payment to be made by the recipient;
15 -Means to generate a reference to the payment request from data received related to the payment and the payer's account, this reference being the payment generated adequate to generate a file associated with the payment request in accordance with a procedure for generate a file associated with an electronic transaction, as described above;
20 -Means to receive the acceptance of payment by the recipient upon receipt of the file associated with the payment request, upon validation of the file associated with the payment request in accordance with a procedure to validate a file associated with a electronic transaction, as described above; -Means to make a charge in a recipient account from the amount of
25 payment received, after receiving payment acceptance by the recipient; -Media to pay the charge made to the payer's account.
Basically, the system to perform an electronic transaction between a payer and a recipient of the electronic transaction, this transaction being a payment request 30 that the payer makes to the recipient, must be able to reproduce the procedure for performing an electronic transaction between a payer payer and a recipient of the electronic transaction, this transaction being a payment request made by the payer to the recipient, described above, for example, by electronic and / or computer means. Such electronic / computer means can be used interchangeably, it is


that is, one part of the described means can be electronic means and the other part can be computer means, or all the described means can be electronic means or all the described means can be computer means.
Examples of a system for conducting an electronic transaction between a payer and a recipient of the electronic transaction comprising only electronic means (i.e., a purely electronic configuration) may be a programmable electronic device such as a CPLD (Complex Programmable Logic Device), an FPGA (Field Programmable Gate Array) or an ASIC (Application-Specific Integrated Circuit).
An example of a system for performing an electronic transaction between a payer and a recipient of the electronic transaction comprising only computer means may be a computer system comprising a memory and a processor, in which the memory stores computer program instructions executable by the processor, comprising these instructions functionalities to execute a procedure, such as the one described above, to perform an electronic transaction between a payer and a receiver of the electronic transaction, that is, in order to generate the various actions and activities for which The system has been programmed. Thus, for example, in this case the system can be a computer system, such as a computer or a set of computers (for example, a server-type computer system).
A system for performing an electronic transaction between a payer and an electronic transaction receiver that combines electronic and computer means may comprise a processor, in which the memory stores computer program instructions executable by the processor, these instructions comprising functionalities for executing the less part of a procedure to perform an electronic transaction between a payer and a recipient of the electronic transaction, such as described above. In addition, the system may comprise electronic circuits designed to execute those parts of the procedure that are not implemented by the computer instructions.
Other objects, advantages and features of embodiments of the invention will be apparent to the person skilled in the art from the description, or can be learned with the practice of the invention.


BRIEF DESCRIPTION OF THE DRAWINGS
Particular embodiments of the present invention will now be described by way of non-limiting example, with reference to the accompanying drawings, in which:
Figure 1 shows a schematic diagram of the general system according to some examples; Figure 2 shows a schematic flow chart of a procedure for generating a
10 file associated with an electronic transaction, according to other examples; Figure 3a shows an example of an image file associated with an electronic transaction; Figure 3b shows a second example of an image file associated with an electronic transaction;
15 Figure 4 shows a schematic flow chart of a procedure for validating a file associated with an electronic transaction, according to some examples; Figures 5a to 5h show schematic diagrams of different graphical user interfaces. 20 DETAILED EXHIBITION OF REALIZATION MODES
In the present examples, Figure 1 shows a first system 10 associated with a first user 10 ’, which is the electronic transaction payer; a second system 11 associated with a second user 11 ’, which is the recipient of the transaction; and a third system
25 12 to carry out the electronic transaction from data provided by both the first system 10 and the second system 11 and / or data that have been previously provided.
More specifically, the first system 10 is configured to generate an associated file
30 to the electronic transaction initiated and, once the file has been generated, send it through any social network, email or any other means that allows the sending of computer files in image format 13 to the second system 11 for validation. Once validated, the third system 12 is responsible for completing the transaction.


On the other hand, the second system 11 is configured to validate the file associated with the electronic transaction initiated by the first system 10, whose validation causes the third system 12 to complete the electronic transaction. This validation can be performed automatically or may require the intervention of a user.
5 With respect to the third system 12, based on the information received from the first system 10 regarding the electronic transaction initiated (amount, currency, etc.) and the validation of the file associated with the transaction by the second system 11 , finally complete the transaction.
10 Any of the three systems described 10,11,12 may have, for example, a purely computer configuration, a purely electronic configuration or a computer / electronic configuration.
15 Examples of a system with a purely electronic configuration can be a programmable electronic device such as a CPLD (Complex Programmable Logic Device), an FPGA (Field Programmable Gate Array) or an ASIC (Application-Specific Integrated Circuit).
20 Examples of a purely computer system can be a system comprising at least one memory and one processor, in which the memory stores computer program instructions executable by the processor, these instructions being intended to execute the corresponding system functionalities (they depend on each system), that is, in order to generate the various actions and activities for which the system has
25 been scheduled. Thus, for example, the system may be a computer (for example, a laptop or desktop computer), a set or network of computers (for example, a server-type computer system), a mobile device such as a smartphone or a tablet, or a portable device such as a smart watch.
The computer program executed by the processor may be stored in physical storage media (ie, for example the memory described above), such as recording media, a computer memory, or a read-only memory, or it may be carried by a carrier wave, such as electrical or optical.


The computer program may be in the form of source code, object code or an intermediate code between source code and object code, such as partially compiled form, or in any other form suitable for use in the implementation of the described procedures.
5The carrier medium can be any entity or device capable of carrying the program.
For example, the carrier medium may comprise storage means, such as a ROM, for example, a CD ROM or a semiconductor ROM, or a storage medium.
10 magnetic recording, for example, a hard disk. In addition, the carrier means may be a transmissible carrier medium such as an electrical or optical signal that can be transmitted via electrical or optical cable or by radio or other means.
When the computer program is contained in a signal that can be transmitted
15 directly by means of a cable or other device or means, the carrier means may be constituted by said cable or other device or means.
Alternatively, the carrier means may be an integrated circuit in which the computer program is encapsulated (embedded), said circuit being adapted
20 integrated to perform or to be used in performing the relevant procedures.
In the case of a system that combines an electronic / computer configuration, it may comprise a processor, in which the memory stores computer program instructions executable by the processor, these instructions being intended for
25 execute at least part of the system's functionalities. On the other hand, the system comprises electronic circuits designed to execute those functionalities that are not implemented by the computer instructions.
In the present examples, the first system 10 is a smartphone that makes use of
30 the 10 ’payer of the electronic transaction; the second system 11 is also a smartphone used by the receiver 11 of the electronic transaction; while the third system 12 is a server-type computer system (which can be, for example, in the cloud).


In these examples, the communication between each of the three systems is done through wireless communication systems, based on GSM, GPRS, 3G, 4G technology or satellite technology (for example, if the communication is done through a global network of communication, such as the Internet). These wireless communication systems too
5 could be short range, for example, Bluetooth, NFC, Wifi, IEEE 802.11 or Zigbee.
Depending on the nature of each of the systems, some or all of the communication systems can also be wired. In this case, these communication systems could be based, for example, on serial ports, such as USB, micro
10 USB, mini USB, Firewire or Ethernet.
Since in the present examples the first system 10 is a smartphone, the aforementioned computer program is an application (app) that runs on said smartphone. This application should have as its first objective the generation of
15 file associated with the transaction. To do this, this application must be able to execute the following procedure to generate the file associated with the electronic transaction: -Receive data related to the electronic transaction, such as the transaction amount, the concept of the transaction, the validity of the transaction (i.e. its start date and / or its expiration date) and / or data related to the payer
20 and / or the recipient of the electronic transaction. This data can be received by the app through a graphical user interface shown on the smartphone screen and on which the transaction payer acts. That is, this data can be provided by the transaction payer, either only once when the app is configured (for example, the credit card or account number
25 bank of the payer 10 ’) or each time a transaction is made (for example, the amount, the start date, the expiration date, etc.); -Get a reference to the electronic transaction initiated from at least the data received relating to the electronic transaction. This reference to the initiated transaction is generated in a way that identifies the initiated transaction
30 unique for example by assigning a sequential number or an increasing number associated with the moment it is generated, etc; and so the third system 12 can complete it. The reference may be generated by the server system 12 at the beginning of the transaction based on certain data related to the electronic transaction provided by the smartphone 10 of the transaction payer and / or 24


from data that you have previously received, as described in the previous point;
- Receive an image file. This image file can always be the same for all transactions or the payer 10 ’can select the one you want to
5 which, for example, is related to the electronic transaction. In case of selection by the payer, he can provide / select the image file to be used from a graphical user interface that is shown through the screen of the smartphone 10;
- Generate the file associated with the electronic transaction from the incorporation,
10 in the image file received, of at least the reference to the electronic transaction obtained. Thus, the generated file associated with the electronic transaction is nothing more than a modified image file, but it is still an image file.
15 To incorporate the reference to the transaction in the image file, different ways can be used. Thus, for example, the reference to the transaction can be incorporated in the form of image metadata or in the form of code after the image end mark. It is also possible to encode the reference to the transaction (for example, by generating a code representative of the reference to the transaction), for example, in the form of a code
20 of linear bars or a two-dimensional code, such as a two-dimensional bar code or a QR code, and incorporate this code in the image file in a visible way in the image. In any of the cases described, the reference to the transaction can be incorporated into the image file.
25 Although with what has been described so far it would be sufficient to generate the file associated with the electronic transaction, with the intention of improving security at the time of performing the electronic transaction (that is, to secure the file associated with the transaction), it can it is convenient to also incorporate a cryptogram in the image file along with the reference to the transaction.
30 To obtain this cryptogram, the app can follow different processes.
As can be seen in Figure 2, the first system 10 of the payer 10 ’, for example an app if it is a smartphone, can obtain an electronic fingerprint 21 of the


Image file 22 received previously. This fingerprint 21, together with the data of the transaction 30, is communicated to the third system 12 to initiate the transaction and assign a reference 25 to the transaction. Subsequently, the third system 12 can obtain 23 an electronic fingerprint 24 of the file associated with the transaction from the electronic fingerprint 21 5 of the image file, and of reference 25 to the previously obtained transaction. Then, this electronic fingerprint 24 of the file associated with the transaction can be encrypted 26 (for example, from the payer's private key 10 ', which can be associated with the payer, for example, at the time of its configuration or of the initial registration of the payer 10 'in the first system 10 of the payer 10' or in the third system 12,
10 obtaining the cryptogram 27 described.
Alternatively, the app could obtain the electronic fingerprint directly from the file associated with the transaction (that is, from the image file that incorporates the reference to the transaction), to be subsequently encrypted using, for example, the private key of the transaction.
15 ordering 10 ’, obtaining cryptogram 27.
As will be discussed later, as the server system 12 is the one that generates the reference to the transaction, it may be this server system 12 (through for example a computer program configured for it) that obtains the aforementioned cryptogram 27, for
20 then return it to smartphone 10 of the payer 10 ', to incorporate it into the image file 22 and obtain a file 29 associated with the secured transaction.
At this point it is important to note that an electronic fingerprint can comprise a cryptographic hash value. This hash value can be obtained by applying a
25 cryptographic hash function to a consistent version of the file associated with the electronic transaction. The expression "consistent version" refers to a file format that always produces the same hash value when the same cryptographic hash function is applied.
30 A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-sized bit string, the hash (encryption) value, such that an accidental or intentional change in the file changes the value of hash


One hash function that can be used is the SHA-256 which belongs to the set of cryptographic hash functions of the SHA-2 standard, although another hash function can be used if, for example, it is demonstrated in the future that SHA-256 is not Safe enough The safety of a hash function is determined by its resistance to collisions. Thus, although SHA-256 is used in the present examples, it could be replaced in the future by another hash function with better collision resistance (i.e., safer), such as, for example, SHA-3 , which is a new hash standard currently in development.
Whatever the process used, once the cryptogram 27 has been obtained, it must be incorporated 28 in the image file 22, in order to obtain a file 29 associated with the secured transaction. For this, the cryptogram can be incorporated into the image file 22, for example, in the form of a code after the image end mark (before or after the reference to the transaction) or in the form of image metadata.
It is important to note that it is possible that both the reference 25 to the transaction and the cryptogram 27 are incorporated into the image file 22 as image metadata. It is also possible that both are incorporated into the image file as a code after the image end mark. But it is also possible that each of them is incorporated differently (the reference to the transaction as metadata and the cryptogram as code or vice versa).
Alternatively, it is also possible to encode the reference 25 to the transaction together with the cryptogram 27 (for example, by generating a code representative of the transaction reference together with the cryptogram), for example, in the form of a linear bar code or a two-dimensional code, such as a two-dimensional bar code or a QR code, and incorporate in the image file 22 this code visibly in the image, by a reversible process, such as a reversible process of inclusion and extraction in a part of the given image of the representative code, which guarantees the integrity of both the reference and the image. Therefore, both the reference to the transaction and the cryptogram are incorporated into the image file. It is also possible to code only the reference to the transaction or only the cryptogram and use an alternative process (for example, as metadata or as a code) for the cryptogram or for the reference to the transaction, respectively.


In addition, the app can incorporate in the image file part or all of the data related to the transaction received (for example, the amount of the transaction, the type of currency and / or the concept of the transaction) visibly in the picture.
5 Figure 3a shows a first example of a file associated with the generated electronic transaction, in which data related to the transaction are incorporated in a visible way in the image.
Figure 3b shows a second example of a file similar to the previous one that incorporates
10 also a QR code representative of the reference to the transaction and / or the cryptogram, as described above.
Once the computer program running on the first system 10 of the payer 10 '(for example an app on a smartphone) has obtained the file (either secured or not) associated with the electronic transaction, it must be configured to send it to the recipient of the transaction (more specifically, in the present examples, to the smartphone 11 of the recipient 11 'of the transaction) to validate it through their app. In the present examples, this sending of the file associated with the transaction is done through a wireless communication system, for example 4G, as described
20 previously.
This sending, given that the file associated with the electronic transaction is no more than an image file, can be made naturally through any social network or instant messaging application 13 (for example, Messenger, Whatsapp, Telegram, etc.) .) or even through email (for example, email), based on their ability to share images. Therefore, it is not necessary to integrate or establish agreements with the different social networks or messaging applications; They should only have the ability to share images. The interaction between the app described above that runs on smartphone 10 of the payer will be described later
30 10 ’of the transaction and the app of the social network, messaging, etc., which also runs on the smartphone 10 of the payer 10’ of the transaction.
Anyway, when the second system 11 of the receiver 11 'of the electronic transaction (for example, a smartphone) receives the file associated with the transaction (secured


or not, that is, it incorporates a cryptogram or not), this file can be processed by an app that runs on it, with a functionality intended to validate the received file associated with the transaction.
5 At this point it is important to note that the app to generate the file associated with the transaction and the app to validate the file associated with the transaction can be the same. Depending on whether the smartphone user is a payer or receiver, one functionality or another of the app will be used. They can also be different apps, one for each functionality.
10 On the other hand, it is important to note that the validation of the file is related to the process of generating it.
Thus, if the file has not been secured, that is, it does not incorporate a cryptogram (the
15 file associated with the transaction consists of an image file that incorporates a reference to the transaction and / or data related to the transaction), the smartphone app 11 of the recipient 11 'of the transaction should only show a graphic interface of user with a control element configured so that the receiver 11 'can accept the transaction. If the receiver acts on this control element, a
20 control signal to the server system 12 that triggers the completion of the electronic transaction.
In other examples, this validation can be done automatically by the app itself that runs on smartphone 11 of receiver 11 ’.
25 In the event that the file associated with the transaction is secured (that is, it incorporates a cryptogram), its validation may depend on how the cryptogram has been incorporated into the image file. Basically, it is necessary to differentiate whether the cryptogram has been encoded or not (for example, by means of a linear bar code or a two-dimensional code,
30 as described above) or if the reference to the transaction has been coded or not.
Figure 4 shows a flow chart of a procedure to validate a file associated with an electronic transaction, in which neither the cryptogram nor the reference to the


Transactions have been encoded (that is, they have been incorporated into the image file either as image metadata or as a code after the end of the image).
This procedure can include: 5 -Receive the file 40 associated with the generated electronic transaction; -Extract 41 from file 40 associated with the electronic transaction received image file 42, reference 43 to the electronic transaction and cryptogram 44; -Get 45 a first electronic fingerprint 46 from the cryptogram 44 extracted (in the case that the electronic fingerprint has been encrypted with the private key of the
10 10 'of the transaction during the generation of the file associated with the transaction, this obtaining of the first electronic fingerprint can be done by decrypting the cryptogram with the public key of the payer);
- Obtain 47 an electronic fingerprint 48 from the extracted image file 42; -Get 49 a second electronic fingerprint 50 from the electronic fingerprint 48 15 obtained from file 42, and from reference 43 to the extracted transaction; - Compare 51 the first electronic fingerprint 46 obtained with the second electronic fingerprint 50 obtained; -Determine the file associated with the electronic transaction received as correct, in case the first electronic fingerprint 46 and the second electronic fingerprint 50 20 are the same (they are coincident);
- Determine the file 40 associated with the electronic transaction received as incorrect, in case the first electronic fingerprint and the second electronic fingerprint are not equal.
25 In the case of the determination of the file as correct, a validation signal can be automatically generated to the server system 12, to carry out the transaction. Alternatively, in case of correct file determination, the app can generate a graphical user interface that allows the receiver 11 ’to act on a control element to validate the transaction. The performance of the receiver on this element of
The control can generate a control signal (validation signal) to the server system 12, which authorizes it to complete the transaction.
On the other hand, in case of determining the file associated with the electronic transaction received as incorrect, the procedure can also include the generation of a signal of


File notification associated with the incorrect electronic transaction. This notice can be displayed through the screen of the smartphone 11 of the receiver 11 'of the transaction and / or can also be communicated to the payer 10' through his smartphone 10.
5 In the event that during the generation of the file associated with the transaction the cryptogram was obtained based on a fingerprint of the image file that incorporates the reference to the transaction (that is, the cryptogram was not obtained on the basis to an electronic fingerprint of the image file, and of the reference to the transaction), the obtaining, in the present procedure, of the second electronic fingerprint is made by obtaining
10 of the electronic footprint of the image file that incorporates the reference to the transaction.
In the event that the reference to the transaction is encoded (for example, by means of a linear bar code or a two-dimensional code, as described above), for the extraction of said reference to the transaction the decoder must be decoded.
15 representative code of the same, while the electronic fingerprint of the image file must be obtained with the original image file 22, that is, without this code (this can be done because during the generation of the file, the code has been incorporated into the image file through a reversible process).
20 Similarly, if the file associated with the transaction incorporates a code that represents both the reference to the transaction and the cryptogram, it is necessary to decode this code to extract both the reference to the transaction and the cryptogram, while to obtain the fingerprint electronic image file is necessary to remove the code representative of the reference to the transaction and the cryptogram (remember that the code is
25 has incorporated this image file through a reversible process).
It is important to note that, in certain cases, some of the stages described for the different procedures (basically generation of the file associated with the transaction and validation of this file) can both be executed in the first system 10 of the payer
30 10 '(for example, a smartphone) as in the server system 12, or both in the second system 11 of the receiver 11' of the transaction and in the server system 12, respectively.


Thus, in the procedure of generating the file associated with an electronic transaction (whether or not the reference to the transaction and / or the encrypted cryptogram), the electronic fingerprint of the file associated with the transaction can be obtained both on the smartphone 10 of the payer 10 '(in this case the telephone must have previously received the 5 reference to the transaction) as in the server system 12. In the latter case, as this server system 12 is responsible for generating the reference to the transaction, You already have it to generate the electronic footprint of the file associated with the transaction. In spite of this, whatever the case may be, at some point the server system 12 must provide the transaction 10 with reference 10 to the smartphone 10 of the transaction, so that
10 can incorporate it into the image file.
In the event that the file associated with the transaction comprises the image file that incorporates the reference to the transaction, obtaining the electronic fingerprint of this file associated with the transaction can both be done on the smartphone 10 of the payer
15 10 ’of the transaction, through the app described above, as in server system 12, although in this case, it is necessary to send the image file that incorporates the reference to the transaction, to server system 12.
Basically, a good option may be to avoid sending the file to the server system 12
20 for processing (obtaining the electronic fingerprint, etc.), both for security issues of the cryptographic processes to be performed and for issues of bandwidth utilization of the communication system used.
The same goes for obtaining the cryptogram, since so much can be done in the
25 smartphone 10 of the payer 10 'of the transaction (in this case the app running on the phone 12 must have access to the payer's private key) as in the server system 12 (in this case the server system is the one You must have access to the private key of the payer of the transaction and must have previously received the electronic fingerprint obtained from the file on telephone 10 of the payer 10 ').
30 With respect to the validation of the file associated with the transaction, the fingerprint of the file can be obtained both in the telephone 11 of the receiver 11 'of the transaction and in the server system 12. If it is performed in the server system 12, this one must have


previously received the reference to the extracted transaction and the electronic fingerprint of the image file, or the electronic fingerprint of the file, if it incorporates the reference to the transaction.
In the case of cryptogram decryption, it can also be done on telephone 11 of the
5 receiver 11 'of the transaction or in the server system 12. In any case it is necessary to have access to the public key of the payer 10' of the transaction. If the decryption is performed on the server system, it must have previously received the cryptogram extracted on the telephone 11 of the receiver 11 ’.
10 Again, in the validation of the file, it is desirable to avoid sending the image file due to security issues and / or bandwidth used. Despite this, this shipment can occur if desired.
Therefore, the server system 12 must be configured to perform or complete the
15 electronic transaction. In addition, it must also be configured to assist in the generation of the file associated with the transaction by the smartphone 10 of the payer 10 'of the transaction. For example, this server system 12 (through a computer program suitable for this, in the case of a computer system) must be configured to generate the reference to the transaction, obtain the
20 cryptogram, etc. as described above.
At this point it is important to note that an electronic transaction can basically be selected from, for example: -A payment order;
25 -A payment request order; -A collection order; -A purchase order; -A gift voucher delivery.
30 In the case of a payment order (that is, the payer wishes to make a payment to the recipient), the server system 12 must be able to: -Receive data related to the payment, this data comprising at least the amount of the payment to be made by the payer. You may also receive other payment information, such as the concept of the transaction, the start and / or expiration date, etc .; 33


- Make a charge in a payment payer account (either, for example, because you have a bank account number or a credit or debit card number of the payer or a reference to an electronic money account, etc.) from the amount of payment received. This payment payer account can
5 having been provided upon registration of the user in the system, may have been provided during the configuration of the app running on the telephone 10 of the payer 10 'or may have been provided to the server system 12 by the telephone 10 of the 10 'payer; -Add the charge made to the payer's account in an intermediate account
10 associated to the payment; -Generate a reference to the payment (reference to the transaction in general) from data received related to the payment and the intermediate account associated with the payment. This payment reference may be suitable for generating a file associated with the payment according to a generation procedure, such as the one described above;
15 -Receive the acceptance of the payment by the recipient 11 '(more specifically, from his telephone 11) upon receipt of the file associated with the payment, after its validation in accordance with a validation procedure, as described above; -Transfer the payment amount from the intermediate account to the account of the payment recipient, after receiving the acceptance of the payment by the recipient.
20 In the event that, once the expiration date has been reached, the file has not been validated manually (by the receiver) or automatically (by the app) from the telephone 11 of the receiver 11 'of the transaction, the order is reversed, paying the payment amount to the payer's account.
25 On the other hand, in case of certain amounts (for example, for high amounts), for security reasons, a verification of the receiver can be made before payment is made. For this, for example, the recipient's mobile number could be provided, to allow the sending of an OTP key through, for example, an SMS.
30 Accordingly, the server system 12 may comprise a payment platform (for example, a BlockChain server) that allows to manage charges and credits in bank accounts. Additionally, if the encryption / decryption described above are performed in the


server system 12, can also comprise a security module (for example, HSM) that stores the keys (both private and public) and resolves the cryptography.
In the event that this encryption / decryption can be performed on the first system 10 of the
5 ordering 10 'of the transaction, the security module may be comprised in this first system 10. Similarly, if the encryption / decryption is performed in the second system 11 of the receiver 11' of the transaction, the security module may be included in this second system 11. If this encryption / decryption can be performed in several of the systems described, each of them can comprise the module of
10 security.
If the transaction is a payment request order (that is, the payer requires the recipient to make a payment), the server system 12 must be able to: -Receive data related to the payment request, this data comprising the less the 15 amount of the payment to be made by the recipient;
- Generate a reference to the payment request from data received regarding the payment and the payer's account, this reference being the appropriate payment to generate the file associated with the payment request as described above;
20 -Receive the acceptance of payment by the recipient upon receipt of the file associated with the payment request, upon validation (manual or automatic) of the file associated with the payment request, as described above;
- Make a charge in a recipient account from the amount of payment received, after receiving the acceptance of payment by the recipient; 25 -Abonar the charge made in the payer's account.
If the transaction is a collection order, an order can be generated that presents as a characteristic having a temporary collection account linked to the payer, where it is possible to keep track of what has been collected. In this case, the file 30 associated with the transaction can be sent, for example, to social network groups or to groups in instant messaging applications (or to several email recipients). These in turn can send to other receptors, thus facilitating their virality. The participation of the recipients of the order is the same as when the transaction is an order


payment request, except that the recipients, in the case of collection, can optionally and voluntarily increase the minimum payment amount associated with the order.
There is also the possibility that the transaction is a purchase order. Since companies are gradually incorporated into social networks, the examples contemplate the purchase of products. This is based on a catalog of products in images that may contain overprinted in the image, for example, the price and a product description. The payer (specifically the buyer) can select the image of the product to buy, payment is made and a file associated with the purchase is generated with the image of the product, which can be used as a payment receipt for the purchase. The communication of the order to the receiver can be done in two ways:
- The payer sends to the recipient the file associated with the purchase of the product through
of a social network, etc. for the recipient to attend the order already paid;
- Online from the server system 12. In this case it would not be necessary to send
the file associated with the purchase to the receiver, leaving the file as proof of
payment. The file could include, if necessary, information (in the form of a
bars, QR or even information that can be sent through NFC in the
moment of redemption of the voucher) to be able to make an exchange in a store
face to face.
On the other hand, the transaction could take the form of a gift voucher. For this, the payer can select the image of, for example, a supplier (Amazon, MediaMarkt, El Corte Inglés, FNAC, etc.) and make the payment in the same way described above for a payment order. However, the value of the payment does not remain in a transitory account but is paid to the provider, which returns a reference that activates the value of the gift voucher in the file associated with the voucher, so that it can be redeemable for the products or services from the provider. Thus, this gift voucher file can be sent to a recipient as a gift.
Figure 5 shows possible examples of graphical user interfaces generated by both the app that runs on the telephone 10 of the payer 10 'of the transaction and the app that runs on the phone 11 of the receiver 11' of the same . Clearly, in case both the first system 10 and the second system 11 are not mobile devices, these interfaces could be different since, for example, a computer of


Desktop or a laptop usually has greater capacity for graphic processing and a larger screen.
Thus, Figure 5a shows an interface 150 showing the moment at which a potential payer is chatting (for example, by means of an application of a social network or an instant messaging application, although it could also be from an email application electronic) with a possible receiver. At a time of the chat, the payer decides to send a payment order (or it could be any of the options mentioned above: payment request order, etc.) to the recipient.
Figure 5b shows an interface 151 in which the payer selects, by acting on the appropriate control element of the interface, to attach a photo.
Figure 5c shows an interface 152 in which the payer selects, by acting on the control element referenced as "My payments" (ie, the app that runs on the phone 10 of the payer 10 ', which has been described in detail above), select the photo to be attached through the app and not through the camera of the phone 10. As mentioned above, this photo could always be the same and this stage of file selection would not be necessary of image.
Figure 5d shows an interface 153, which has already been generated by the app running on the telephone 10 of the payer. In it you can see several elements on which the payer can act. Thus, you can enter the payment amount in text item 153a or currency type through control item 153b. You can also enter in a second text element 153c the mobile number of the receiver 11, mainly in cases where the payment amount is high and a verification of the receiver prior to payment is necessary. Thus, it is possible to send an OTP key to this mobile number via, for example, SMS, from the server system 12 to the telephone 11 (corresponding to the entered mobile number) of the receiver, so that before payment this receiver can enter this OTP key in a corresponding text element of the interface generated in the telephone 11 of the payment receiver 11 ', as will be described later. An element 153d of the default payment method is also shown in interface 153, which can be configured at any time. Finally, with the intention of securing the payment further, the payer may have a credit card.


keys or a password that you can enter in element 153e of interface 153. Once all the requested information has been entered, the payer can accept the generation of the file associated with the payment from the control element 153f of the push-button type.
5 As can be seen in Figure 5e, with this acceptance by the payer and by sending certain information to the server system 12 (for example, the payment amount, the credit card number, the account number bank, etc.) to obtain the reference to the payment and / or a cryptogram, the interface 154 shows the file 154a associated with the payment, which is nothing more than an image file that incorporates the reference to the transaction,
10 the amount in visible format, the cryptogram, etc. Therefore, the app of the telephone 10 of the payer 10 ', based on information available and information received from the server system 12, generates the file associated with the payment, which is sent to the telephone 11 of the receiver 11' through an application of a social network, an instant messaging application, etc.
15 Consequently, as shown in the interface 155 of Figure 5f, the receiver 11 'receives, through its telephone 11, the file 154a associated with the payment, previously generated in the telephone 10 of the payer 10'.
20 Figure 5g shows an interface 156 that is generated in the telephone 11 of the payment recipient, so that he can select to open the file received with the app referred to as “My payments” (an element 156a is shown that when the receiver act on it, the file associated with the payment is opened through the app).
25 As can be seen in Figure 5h, from the interface 157 shown, this app authenticates the file (from the cryptogram it incorporates) and pays the amount indicated previously in the bank account designated by default in the receiver's app 11 'of payment. Alternatively, this validation of the file associated with the payment could be done manually by the recipient of the payment (or the payment request).
30 In the case of an automatic validation, what the app that runs on the smartphone 11 of the receiver 11 'of the transaction performs, is to verify, among other possible things, that the hash of the file associated with the transaction and the hash of the transaction File obtained from the cryptogram are the same. In case it is not, the app does not allow the completion of the


transaction, which can be shown on the screen of both the smartphone 11 of the receiver and the smartphone 10 of the payer 10 'of the transaction.
Although only some particular embodiments and examples of the
In the invention, the person skilled in the art will understand that other alternative embodiments and / or uses of the invention are possible, as well as obvious modifications and equivalent elements. In addition, the present invention encompasses all possible combinations of the specific embodiments that have been described. The numerical signs relative to the drawings and placed in parentheses in a claim are only to try to increase the
10 understanding of the claim, and should not be construed as limiting the scope of protection of the claim. The scope of the present invention should not be limited to specific embodiments, but should be determined only by an appropriate reading of the appended claims.

权利要求:
Claims (17)
[1]
1. Procedure to generate and validate a file associated with an electronic transaction,
characterized by the fact that the procedure comprises: -Receiving data related to the electronic transaction; -Receive an image file; -Get an electronic fingerprint of the received image file; -Get a reference to the electronic transaction generated from the data
received relating to the electronic transaction;
- Generate the file associated with the electronic transaction from the incorporation, in the image file received, of at least the reference to the electronic transaction obtained;
- Obtain an electronic fingerprint of the file associated with the electronic transaction from the electronic fingerprint obtained from the image file received, and from the reference to the electronic transaction obtained;
- Obtain a cryptogram from the electronic footprint obtained from the file associated with the electronic transaction; -Get a secured file associated with the electronic transaction through the
incorporation of the cryptogram in the file associated with the electronic transaction; -Receive the secured file associated with the generated electronic transaction; -Extract from the secured file associated with the electronic transaction received at
minus the image file, the reference to the electronic transaction and the cryptogram; -Validate the file associated with the electronic transaction from at least the file
Image, reference to electronic transaction and cryptogram extracted; -Get, from the extracted cryptogram, a first electronic fingerprint; -Get an electronic fingerprint of the extracted image file; -Get a second electronic fingerprint of the file associated with the transaction
electronic from the electronic footprint obtained from the extracted image file and
of the reference to the extracted transaction; in which to validate the file associated with the electronic transaction from the image file, the reference to the electronic transaction and the cryptogram extracted includes:
- Compare the first electronic fingerprint obtained from the cryptogram extracted with the second electronic fingerprint obtained from the file associated with the electronic transaction;

- Determine the file associated with the electronic transaction received as correct, in case the first electronic fingerprint and the second electronic fingerprint are the same;
- Determine the file associated with the electronic transaction received as incorrect, 5 in case the first electronic fingerprint and the second electronic fingerprint are not equal.
[2]
2.  Method according to claim 1, wherein obtaining a secured file associated with the electronic transaction by incorporating the cryptogram in the associated file 10 to the obtained electronic transaction, comprises:
- Incorporate, in the received image file, at least the reference to the electronic transaction obtained and the cryptogram obtained in the form of image metadata.
[3]
3.  Method according to claim 1, wherein obtaining a secured file associated with the electronic transaction by incorporating the cryptogram into the file associated with the electronic transaction, comprises:
- Incorporate, in the received image file, at least the reference to the electronic transaction obtained and the cryptogram obtained in code form after the image end mark.
[4]
4. Method according to claim 1, further comprising: -Codifying at least the reference to the electronic transaction and the cryptogram obtained; and in which obtaining a secured file associated with the electronic transaction by incorporating the cryptogram into the file associated with the electronic transaction comprises:
- Incorporate, in the received image file, at least the reference to the electronic transaction and the encrypted cryptogram.
Method according to claim 4, wherein coding at least the reference to the electronic transaction obtained and the cryptogram obtained comprises:
- Generate a code representing at least the reference to the electronic transaction and the cryptogram obtained;

in which to incorporate, in the received image file, at least the reference to the electronic transaction and the encrypted cryptogram comprises: -Incorporate, in the received image file, the code representing at least the reference to the electronic transaction and the Cryptogram visibly in the 5 image.
[6]
6. The method according to claim 5, wherein the code representing at least the reference to the electronic transaction and the cryptogram is selected from the following: - A linear barcode;
10 -A two-dimensional code, such as a two-dimensional barcode or a QR code.
[7]
7. Method according to claim 1, wherein obtaining a cryptogram from the electronic fingerprint obtained from the file associated with the electronic transaction comprises:
15-Obtain the cryptogram by encrypting the electronic footprint obtained from the file associated with the electronic transaction.
[8]
8. The method according to claim 1, wherein the electronic fingerprint comprises a
cryptographic hash value. twenty
[9]
9. Method according to any one of claims 1 to 8, wherein generating the file associated with the electronic transaction from the incorporation, in the received image file, of at least the reference to the electronic transaction obtained further comprises:
25 -Include, in the received image file, received data related to the electronic transaction visibly in the image.
[10]
10. The method according to any one of claims 1 to 9, wherein the data relating to the electronic transaction is selected from at least one of the
30 following: -Data concerning the concept of the electronic transaction; -Data concerning the validity of the electronic transaction; -Data concerning the amount of the electronic transaction; -Data concerning the payer of the electronic transaction.

[11]
11. A method according to any one of claims 1 to 10, wherein the electronic transaction is selected from a payment or a payment request.
12. Method according to any one of claims 5 to 11, wherein extracting from the file associated with the electronic transaction received at least the image file and the reference to the electronic transaction comprises, when the file associated with the electronic transaction is a secured file comprising a code visible in the representative image of the reference to the electronic transaction and the cryptogram:
10 -Extract the image file; Decode the code visible in the representative image of the reference to the electronic transaction and the cryptogram to extract the reference to the electronic transaction and the cryptogram.
[13]
13. The method of claim 1, wherein obtaining, from the extracted cryptogram, a first electronic fingerprint comprises, when the cryptogram is obtained at
From encrypting the electronic footprint of the file associated with the electronic transaction: -Descipry the extracted cryptogram.
[14]
14. The method according to claim 1, wherein validating the file associated with the
20 electronic transaction from the image file, the reference to the electronic transaction and the cryptogram extracted includes, in case of determining the file associated with the electronic transaction received as incorrect:
- Generate a file warning signal associated with the incorrect electronic transaction. 25
[15]
15. Computer program comprising program instructions to cause a computer system to perform a method according to any one of claims 1 to 14 to generate and validate a file associated with an electronic transaction.
16. Computer program according to claim 15, which is stored on recording media.
[17]
17. Computer program according to any one of claims 15 or 16, which is carried by a carrier signal.

[18]
18. System for generating and validating a file associated with an electronic transaction, characterized by the fact that the system comprises: -Means for receiving data related to the electronic transaction;
5 -Means to receive an image file; -Means to obtain an electronic fingerprint of the received image file; -Means to obtain a reference to the electronic transaction generated from
the data received regarding the electronic transaction; -Means to generate the file associated with the electronic transaction from the incorporation, in the image file received, of at least the reference to the electronic transaction obtained;
- Means for obtaining an electronic fingerprint of the file associated with the electronic transaction from the electronic fingerprint obtained from the image file received, and the reference to the electronic transaction obtained;
15 -Means to obtain a cryptogram from the electronic footprint obtained from the file associated with the electronic transaction;
- Means for obtaining a secure file associated with the electronic transaction by incorporating the cryptogram into the file associated with the electronic transaction;
20 -Means to receive the secured file associated with the generated electronic transaction;
- Means to extract from the secured file associated with the electronic transaction received at least the image file, the reference to the electronic transaction and the cryptogram;
25 -Means to validate the file associated with the electronic transaction from at least the image file, the reference to the electronic transaction and the cryptogram extracted;
- Means to obtain, from the extracted cryptogram, a first electronic fingerprint; 30 -Means to obtain an electronic fingerprint of the extracted image file;
- Means for obtaining a second electronic fingerprint of the file associated with the electronic transaction from the electronic fingerprint obtained from the extracted image file and the reference to the extracted transaction;

- Means for comparing the first electronic fingerprint obtained from the cryptogram extracted with the second electronic fingerprint obtained from the file associated with the electronic transaction;
- Means to determine the file associated with the electronic transaction received 5 as correct, in case the first electronic fingerprint and the second electronic fingerprint are the same;
- Means to determine the file associated with the electronic transaction received as incorrect, in case the first electronic fingerprint and the second electronic fingerprint are not equal.
[19]
19. File associated with an electronic transaction generated by a method for generating and validating according to any one of claims 1-14, characterized in that it comprises:
- An image file; 15 -A reference to the electronic transaction incorporated in the image file. -A cryptogram of the image file that incorporates the reference to the electronic transaction, incorporated into the image file.
[20]
20. File according to claim 19, further comprising: - Data relating to the electronic transaction.











类似技术:
公开号 | 公开日 | 专利标题
US9406063B2|2016-08-02|Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token
ES2761345T3|2020-05-19|Systems and methods to process mobile payments by providing credentials to mobile devices without secure elements
US9460322B2|2016-10-04|Mobile reader device
ES2502341T3|2014-10-03|Secure payment system in a wireless communications network
CN105453483B|2019-05-31|For method and apparatus derived from the key based on image
WO2016055877A1|2016-04-14|Global world universal digital mobile and wearable currency image token and ledger
US10482460B2|2019-11-19|Method and apparatus for facilitating electronic payments using a wearable device
US20140279403A1|2014-09-18|Methods and systems for executing mobile currency transactions
US8533123B2|2013-09-10|Systems and methods for conducting contactless payments using a mobile device and a magstripe payment card
US20150262052A1|2015-09-17|Omni smart card
KR101935341B1|2019-01-04|Securely generating time and location bounded virtual transaction cards using mobile wallets without involving third parties or point of sale terminals
ES2606602T3|2017-03-24|Method for generating a code, method and authorization system for an operation
US10395232B2|2019-08-27|Methods for enabling mobile payments
CN104282091A|2015-01-14|Bill data generating/transmitting/storing/authenticating method
JP2022501862A|2022-01-06|Systems and methods for cryptographic authentication of non-contact cards
WO2015067001A1|2015-05-14|Electronic wallet and method for using same, mobile terminal and electronic ticket transaction system
PT2195769E|2013-11-27|Method based on a sim card performing services with high security features
ES2648255B1|2018-09-10|Procedure, system and computer program to generate and validate a file associated with an electronic transaction and the file generated by said procedure.
CN110060055A|2019-07-26|Digital asset trustship method, apparatus and electronic equipment in a kind of block chain
JP2022508026A|2022-01-19|Systems and methods for cryptographic authentication of non-contact cards
ES2797111T3|2020-12-01|Secure exchange of sensitive data via a token and barcode-based network
EP2131318A1|2009-12-09|Methods and device for electronic entities to exchange and use rights
US10748140B1|2020-08-18|Enhanced security for digital wallets in multiple devices
ES2667485T3|2018-05-11|Systems and procedures for the transmission of user-specific data with enhanced data protection
US11171781B2|2021-11-09|System and method which using blockchain protects the privacy of access code and the identity of an individual seeking online access
同族专利:
公开号 | 公开日
ES2648255B1|2018-09-10|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US7216232B1|1999-04-20|2007-05-08|Nec Corporation|Method and device for inserting and authenticating a digital signature in digital data|
US20050067487A1|2002-02-12|2005-03-31|Brundage Trent J.|Identification document including embedded data|
法律状态:
2018-09-10| FG2A| Definitive protection|Ref document number: 2648255 Country of ref document: ES Kind code of ref document: B1 Effective date: 20180910 |
优先权:
申请号 | 申请日 | 专利标题
ES201630873A|ES2648255B1|2016-06-28|2016-06-28|Procedure, system and computer program to generate and validate a file associated with an electronic transaction and the file generated by said procedure.|ES201630873A| ES2648255B1|2016-06-28|2016-06-28|Procedure, system and computer program to generate and validate a file associated with an electronic transaction and the file generated by said procedure.|
[返回顶部]