[go: up one dir, main page]

Khater, 2024 - Google Patents

Criminalization of Forgery of Electronic Payment Cards in Jordanian Legislation.

Khater, 2024

View PDF
Document ID
10538391174227491253
Author
Khater M
Publication year
Publication venue
Pakistan Journal of Criminology

External Links

Snippet

The article analyses the penal protection of electronic payment cards from forgery through a linguistic and virtual description of the notion of electronic payment cards. In addition to identifying the types of these cards, such as the credit card, the ATM card, and the debit card …
Continue reading at www.pjcriminology.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip

Similar Documents

Publication Publication Date Title
Camp et al. Token and notational money in electronic commerce
Al Jabouri et al. Flying instruments and their impact on the national economy and the extent of their control (CTS guidelines model)
Khater Criminalization of Forgery of Electronic Payment Cards in Jordanian Legislation.
Atiyah et al. Legal status of cryptocurrency circulation in Iraq: lessons from the United Arab Emirates and the United States
Rafalskyi Offences in the sphere of virtual assets turnover and analysis of their qualification
Hyman Bitcoin atm: A criminal's laundromat for cleaning money
Linn Regulating the cross‐border movement of prepaid cards
Arthur Williams Credit card fraud in Trinidad and Tobago
Edelbacher Fraud and Corruption: A European Perspective
Fisher The UK's faster payment project: avoiding a bonanza for cybercrime fraudsters
Stamevski et al. The concept of" white-collar" crime
Budhram Examining the unique security features of a credit card with the aim of identifying possible fraudulent use
Alsharu Law and Humanities Quarterly Reviews
Rotaru The Check in the Light of the Provisions of the Criminal Law
Denis Liability and the Digital Age: Comparative Analysis of the Australian, South African and CIS States Legislative Approaches
Smith Plastic card fraud
Sinaga A JURIDICAL OF BANK EMPLOYEES PERMITTING THE CRIME EMBEDDING IN POSITION ACCORDING TO LAW NUMBER 10 OF 1998 CONCERNING BANKING
Moise Types of Bank Cards Related Frauds
Tubishat et al. The Credit Card and the Crimes Associated with It
Рафальський Offences in the sphere of virtual assets turnover and analysis of their qualification. Правопорушення у сфері обігу віртуальних активів та аналіз їх кваліфікації
Derrar The intelligent and digital payment system between the advantages granted to the customer and the surrounded risks
Kaid Financial brokerage contract as a model for electronic commercial trading on the Algerian Stock Exchange
Preiss The consequences of anonymous access to the financial payments system
Paturochman Crime Analysis of Payment Transactions Using Checks and Giro Bilyets
Rizal Blank Cheques Commercial Law Perspective