GB2360617A - Identifying the owner of a card or code, eg credit card - Google Patents

Identifying the owner of a card or code, eg credit card Download PDF

Info

Publication number
GB2360617A
GB2360617A GB0007114A GB0007114A GB2360617A GB 2360617 A GB2360617 A GB 2360617A GB 0007114 A GB0007114 A GB 0007114A GB 0007114 A GB0007114 A GB 0007114A GB 2360617 A GB2360617 A GB 2360617A
Authority
GB
United Kingdom
Prior art keywords
key code
card
computer
owner
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0007114A
Other versions
GB0007114D0 (en
Inventor
Kuo-Shen Liu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0007114A priority Critical patent/GB2360617A/en
Publication of GB0007114D0 publication Critical patent/GB0007114D0/en
Publication of GB2360617A publication Critical patent/GB2360617A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A method of identifying the owner of a credit card or the like, requires the card owner to obtain a key code (number) e.g. through the card owner's specific telephone or mobile telephone with a caller I.D function via a communication network to access the computer of a CA (Certification Authority) then key-in a password preset by the card owner The CA's computer will produce a random number key code to inform the card owner, if the password is correct for the phone's caller I.D. In the meantime, the CA's computer will store the encrypted key code (the key code plus a cryptic number preset by card owner). When using the card for purchase, electronic commerce, mail orders or the like, the card number and encrypted key code will be requested to be transmitted together to the CA's computer for checking. The transaction will not be accepted if the encrypted key code is incorrect. Once the key code is checked, it may be automatically destroyed regardlless whether it is correct or incorrect and the card will be completely invalid if the CA's computer does not have its key code. Therefore this method proposes to prevent fraud using fake or stolen credit cards, or the card owner denying use of his/her credit card.

Description

2360617 TME: A MIETHOD OF IDENTEPYING THE OWNER OF THE CREDIT CARD OR THE
LIKE (ANY IDENTIFICATION CARD OR CODE) BACKGROUND OF THE INVENTION
a) Technical Field of the Invention
The present invention relates to a method of identifying card owner using credit card or other I.D or certification (or code), and in particular, a method of preventing one from fiaud with fake or stolen credit cards or card owner denying the using.
b) Description of the Prior Art
The wide application of credit cards or the like has provided convenience to people of the contemporary world. But there is an increasing amount of fi-aud through fake or stolen credit cards, which causes the issuing bank of the credit cards to lose money In Taiwan, it was estimated that issuing banks had sufFered a loss of more thart NT 1 billion per year.
In view of advanced technology developments, e-conunerce and mail order have become more and more wide-spre&L These services relate to special shopping and transactions which are dillerent from the use of credit cards. Thus, the identification of the genuine person using a credit card in these transactions is very important so as to avoid problems occurred m credit cards crimes, such as fake credit cards, stolen credit cards, or denial of a credit card ction.
. L...
2 SUNIY OF THE EWENTION Accordingly, it is an object of the present invention to provide a method of identifying a card owner who is using credit card or the like, wherein the card owner has to obtain a key code (number) prior to utilization of the card in a transaction, then the key code with encryption and the card are transmitted and checked (compared) by the CA (certification authority) so as to avoid credit card fl-aud such as the use fake or stolen credit cards or denial of transactions on the part of the credit card owner.
Yet another object of the present invention is, wherein the card owner will use a specific phone or mobile phone with caller I.D function, (see note D via a conunuffication network to the computer of the Certification Authority, then the card owner can access a key code after keying in a preset password.
One aspect of the present invention is when the card owner accesses the CA's computer to enter the password for acquiring a key code. The CAs computer will immediately produce a key code which will be a random number to inform the card owner. In the meantime, the CA's computer will store the encrypted key code (the key code plus a cryptic nwnber preset by the card owner) for checking.
When the card owner uses the card for purchase, E-cointnerce: or mail order etc, he or she will trarismit the card nximber with the encrypted key code to the Certification Authority for checking whether the encrypted key code is correct or not.
The key code will be vanished once is checked. The card will be invalid if the Certification Authority's computer has no the cards key code.
The foregoing objects and summary provide only a brief introduction to the present invention. To fiffly appreciate these and other objects of the present invention as well as the invention itself, all of which will become apparent to those 3 skilled in the ar the following detailed description of the invention and the claims should be read m conjunction with the accompanying drawings. Throughout the specification and drawings identical reference numerals refer to identical or similar parts. Many other advantages and features of the present invention will become manifest to those versed in the art upon maldng reference to the detailed description and the accompanying sheets of drawings in which a preferred structural embodiment incorporating the principles of the present invention is shown by way of illustrative example. Note 1. When thephone called, its phone No. will be sent to the receiver automatically. So in this application, the CMs computer will know the caller's (card owner) credit card No. by recognizing the received phone No.
4 BREF DESCRIMON OF TBE DRAWINGS Fig. 1 is a flow chart showing the CTI (computer telephony integration) system for accessing the key code by specific phones in accordance with the present invention. 5 Fig. 2 is a flow chart showing the application on voice shopping in accordance with the present invention. Fig. 3 is a flow chart showing the CTI system for accessing the key code plus other appendant security and convenience devices in accordance with the present invention.
DETAILED DESCREMON OF TVE PREFERRED EMBODEWENT For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings. Specific language will be used to describe same. It will, nevertheless, be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications m the illustrated device, and such firther applications of the principles of the invention as illustrated herein being contemplated as would nonnally occur to one skilled in the art to which the invention relates.
In accordance with the present method of accessing a key code, the card holder has to apply fromthe CA to access the key code. 71he method comprises the following steps:
1) The card owner files a request with the card issuing bank or authority to seek protection of his credit card or any identification card (or code), i.e., the need of a encrypted key code to be incorporated when using the card. 15 At the same time,' the user provides the Certification Authority with a specific phone or mobile phone with caller I.D function to allow the accession of the key code (a few telephones can also be provided). 2) The CA will mail to the card owner a beginning password and the owner shall confirm receipt. 71he authority keeps a record in the 20 computer with respect to user's card number, and the specific telephone number as well as the password for accessing the key code. lhe authority also establishes a device for key code accessing. This device is a Computer Telephony Integration (CTI), and provides a representative telephone number for accessing to the computer.
6 3) The CA may be the card issuing authority (card issuing bank), or an independent authority which is computer-linked to the card issuing authority via any communication network.
4) The computer of the certification authority will not accept two similar cards for registration, or a specific telephone for two different cards.
5) When the card owner has completed the above procedures, using the registered specific telephone, the key code can be obtained via communication network to access to the CAs computer. The procedures are shown in flow chart of Fig. 1, as follows:
A. Ihe card owner will dial the CA's representative phone number to access to the computer by his or her specific telephone as the specific telephone has a caller I.D function, so the computer will receive the phone number of the specific phone automatically, then the computer will find the credit card owner's card number by the specific telephone number from its files.
B. Then, the credit card owner will key-in his or her password. Ihe computer then compares the card number with the password. If correct the next procedure then can be applie& C. When the first call is connected, the computer shall request the card owner to set a cryptic number for incorporating of key code (for instance, enter 11, if the key code is 20, the required encrypted key code will be 31 when using the credit card).
This cryptic code should be permanently retained by the card owner. The computer will store the encrypted key code for 7 cheffing. D. The password can be changed optionally. After the first access to the computer, the card owner-should change the password, then for the next access to the computer, the new password should be used.
E. As shown in the figure 1, after a correct password has been entered,_therthe card owner presses 1, the key code can be accessed by and informed to the card owner.
6. Based on the above procedures, the access of key code is simple and convenient. For example, if the representative phone number is 8 digits, the password is 4 digits. Then, only 13 digits have to be entered.
7. Key code is a random number produced by the computer. It means there is no way to dee or calculate or forecast the code by a rule.
8. After the key code is obtained, it can be used in the following, examples:
A. To purchase with a credit card, card owner hands the card to the selling party and at the same time the card owner should inform the selling party of the encrypted key code so that the selling party can enter the code for checldng with the CM computer through the card issuing bark The selling party will reject the ction if the encrypted key code is incorrect.
B. In e-conunerce, the card owner will enter the card number, 8 and the enciypted key code to the CA via selling party and card issuing bank. As all the computers of the selling party, payment bank issuing bank and CA are linked, whether the encrypted key code is correct or not can be checked and confirmed immediately. If it is used in electronic banking, the selling party represents the electronic bank.
C. For mail order, as shown in Fig. 2, the card owner makes a call by phone into a voice computer integrated system here m shown, and enters the card number with the encrypted key code. As the computer of the system and the CA are linked via the card issuing bank, so the CA will check the encrypted key code and confirm immediately. If the encrypted key code is correct then the card owner can key m the product code, and the transaction is then completed, and the card owner cannot deny the transaction.
9. After the encrypted key code has been checked once, it will be destroyed regardless of whether it is correct or incorrect.
10. The CA can use either only one computer for both accessing the key code and the encrypted key code checking or it can use two separate, linked computers.
11. If the password or cryptic code is forgotten a new application has to be lodged with the CA.
9 12. In applicatior the present invention can be incorporated with some appendant security and convenience devices, shown in Fig. 3, wherein: A. Appendant security a. The key code can be transmitted to and displayed on a mobile phone or pager via wireless data transmission, and the mobile phone and pager number can be set by the owner. b. Prior to using the key code after it is obtained, a period of time can be set to destroy automatically 10 the key code or the card owner can access into the computer to destroy the key code.
B. Convenience.
a. In accessing a key code, it can be accessed without using the specific telephone. For example, the card owner keys in the asterisk () key and the specific telephone number and then keys m the password.
Also, the hash (#) key can be keyed m and then follow by the owners I.D number and the password.
b. The cryptic code may not be permanently set It is changeable.
C. Ihe key code is set in such a way that it is not destroyed after use so as to allow multiple use until it is destroyed by the card owner or a new key code is accessed.
d. It can be set in such a way that no key code is required if a credit tmmction is below a certain amount.
e. If the password is incorrect three or more times, then the system is shut down.
E The specific telephone can be changed.
g. A plurality of key codes in sequence can be accessed and used once.
It will be understood that each of the elements described above, or two or more together may also find a useful application in other types of methods dilTering from the type described above.
While certain novel features of this invention have been shown and described and are pointed out 'm the annexed claim, it is not intended to be limited to the details above, since it will be understood that various omissions, modifications, substitutions and changes in the forms and details of the device illustrated and in its operation can be made by those sIdlled in the art without departing m any way from the spirit of the present invention.

Claims (8)

CLAIMS:
1. A method of identifying the owner of credit card or the like (any identification card or code), characterized in that:
(i) the card must be used together with an unique encrypted. key code, so when using the card for purchase, E-commerce, mad order and the like,, the card number and the encrypted key code must be transmitted to a CMs (Certification Authority's) computer for checking and comparing with the encrypted key code stored in the CA's computer, the key code will be destroyed once it is checked, and the card will be completely invalid if the CA's computer does not have the car&s same key code; (ii) the card owner obtains the key code from CA's CTI (Computer Telephony Integration System) by using a specific phone or mobile phone with caller I.D function via a communication network with a key-in password which is preset by the card owner, and when the card owner dials to the CA's representative phone number by the specific telephone, the CA's CT1 will receive the specific phone number through the caller I.D ftmetion and then the CAs CTI will find tile referred card number from its file, the Ws CTI will permit the card owner to access the key code if the key-in password is correct and corresponds to the card owner's card number and password stored in the CA's CT1; (iii) when the card owner is accessing the key code, the CAs computer will immediately produce a key code through a random numbering system and inforin the card owner and m the meantime, the CMs computer will 12 encrypt the key code by a cryptic code preset by the card owner and store the encrypted key code; and (iv) the CA may be the card issuing authority or an independent authority with computer linked to the card issuing authority, and the CA can use either only one computer for both accessing key code and checking the encrypted key code or it can be two separate linked computers, in which one computer will be the CTI and the other will perform the checking key code.
2. The method of identifying the owner of the credit card or the Eke is the card owner is set forth in Claim 1, wherein prior to using the key code after the key code is obtained, a period of time can be set to automatically destroy the key code or the card owner can access into the CA's CTI to destroy the key code.
3. The method as set forth in Claim 1, wherein the key code is set in such a way that it is not destroyed after checking so as to allow multiple use until the card owner accesses the CAs CTI to destroy it or a new key code is acquired.
4. The method as set forth in Claim 1, wherein the card owner can use any telephone to access the key code and for example, after the card owner dials the CA's representative phone number, he or she should key-in a " " key plus the specific phone number or key in a " # " key plus his or her I.D number, then key-in the password to access the CA's CTI.
5. The method as set forth in claim 1. The encrypt code can be set to be changed or canceled.
6. The method as set forth in Claim 1, wherein the key code can be shown on the mobile phone or pager via wireless data transmission.
13
7. The method as set forth in Claim 1, wherein a plurality of key codes can be accessed for next use in sequence.
8. Ihe method as set forth in Claim 1, wherein the method can be applied on voice transaction with inputting encrypted key code for checkmg, 5 the transaction is accepted and completed immediately if the CA's computer has confirmed the encrypted key code, the conventional mail order can be changed to this form as it will be more convenient for buyer, and the encrypted key code can be treated as the traditional signature.
GB0007114A 2000-03-24 2000-03-24 Identifying the owner of a card or code, eg credit card Withdrawn GB2360617A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0007114A GB2360617A (en) 2000-03-24 2000-03-24 Identifying the owner of a card or code, eg credit card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0007114A GB2360617A (en) 2000-03-24 2000-03-24 Identifying the owner of a card or code, eg credit card

Publications (2)

Publication Number Publication Date
GB0007114D0 GB0007114D0 (en) 2000-05-17
GB2360617A true GB2360617A (en) 2001-09-26

Family

ID=9888310

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0007114A Withdrawn GB2360617A (en) 2000-03-24 2000-03-24 Identifying the owner of a card or code, eg credit card

Country Status (1)

Country Link
GB (1) GB2360617A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1615183A1 (en) * 2004-07-07 2006-01-11 Streamboys B.V. Internet payment verification method and system
WO2017071478A1 (en) * 2015-10-28 2017-05-04 深圳光启智能光子技术有限公司 Photon-based ca authentication method and system
CN109949478A (en) * 2019-03-21 2019-06-28 深圳神盾卫民警用设备有限公司 Card card destroying method, card card destroy equipment and readable storage medium storing program for executing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3938091A (en) * 1972-03-17 1976-02-10 Atalla Technovations Company Personal verification system
GB2060233A (en) * 1979-10-09 1981-04-29 Atalla Technovations Securing Data Transmissions
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3938091A (en) * 1972-03-17 1976-02-10 Atalla Technovations Company Personal verification system
GB2060233A (en) * 1979-10-09 1981-04-29 Atalla Technovations Securing Data Transmissions
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1615183A1 (en) * 2004-07-07 2006-01-11 Streamboys B.V. Internet payment verification method and system
WO2017071478A1 (en) * 2015-10-28 2017-05-04 深圳光启智能光子技术有限公司 Photon-based ca authentication method and system
US10911247B2 (en) 2015-10-28 2021-02-02 Kuang-Chi Intelligent Photonic Technology Ltd. Photon-based CA authentication method and system
CN109949478A (en) * 2019-03-21 2019-06-28 深圳神盾卫民警用设备有限公司 Card card destroying method, card card destroy equipment and readable storage medium storing program for executing

Also Published As

Publication number Publication date
GB0007114D0 (en) 2000-05-17

Similar Documents

Publication Publication Date Title
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US8285648B2 (en) System and method for verifying a user's identity in electronic transactions
US20090055319A1 (en) Novel card-less, name-less, number-less, and paper-less method and system of highly secure completely anonymous customer-merchant transactions
US20040088551A1 (en) Identifying persons seeking access to computers and networks
US20030194071A1 (en) Information communication apparatus and method
US8751349B1 (en) Audio-equipped transaction card systems and approaches
US6990586B1 (en) Secure data transmission from unsecured input environments
US20070187482A1 (en) Point of Sale Transaction Method and System
WO2005079050A1 (en) A-computer accounting system with a lock using in a bank and the corresponding method used for secure payment by phone
US20010027116A1 (en) Electronic wallet
CN102880955A (en) Highly-safe fingerprint payment method
CN100454809C (en) Nonrecurring countersign and business confirmation method
US20040039708A1 (en) Electronic seal, IC card, authentication system using the same, and mobile device including such electronic seal
US20020078360A1 (en) Method of conducting transactions
JP3925613B2 (en) Personal authentication system and personal authentication method
GB2360617A (en) Identifying the owner of a card or code, eg credit card
US6983485B1 (en) Method and apparatus for authentication for a multiplicity of services
KR20000064172A (en) TESN Proof Type Phone Banking Service System
KR20000037178A (en) Phonenumber Proof Type Tele-banking Service System
JP2002324219A (en) Card authentication system
JP2001243391A (en) Credit card settlement system
CN100377146C (en) Portable mobile communication device and its method of processing finance document file
CA2627108A1 (en) A pin number security system for debit card and credit card
WO2001052203A1 (en) Online credit card security system
WO2002100061A2 (en) Method for improving security in data communication networks

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)