CN100397388C - Digital card online safety inspection system and method of safety inspection - Google Patents

Digital card online safety inspection system and method of safety inspection Download PDF

Info

Publication number
CN100397388C
CN100397388C CNB031203450A CN03120345A CN100397388C CN 100397388 C CN100397388 C CN 100397388C CN B031203450 A CNB031203450 A CN B031203450A CN 03120345 A CN03120345 A CN 03120345A CN 100397388 C CN100397388 C CN 100397388C
Authority
CN
China
Prior art keywords
card
card number
digital
digital card
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031203450A
Other languages
Chinese (zh)
Other versions
CN1499398A (en
Inventor
曾永光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB031203450A priority Critical patent/CN100397388C/en
Publication of CN1499398A publication Critical patent/CN1499398A/en
Application granted granted Critical
Publication of CN100397388C publication Critical patent/CN100397388C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a digital card on-line security inspection system for the identity identification, the theft protection, the theft inspection and the self-help lost reporting of a digital card. A logarithmic word card uses compound card numbers, wherein a main card number is an ordinal number, and an auxiliary card number is an invisible dynamic random number. After the card is used every time, the auxiliary card number is updated at random and is stored in a database of an information management center and an information carrier of the digital card in a storage mode of old-number preservation and new-number storage. Each digital card also has the initial auxiliary card number printed on the surface of the carrier of the digital card, and the initial auxiliary card number is covered by paint; the initial auxiliary card number can be seen when the paint is scraped, and the initial auxiliary card number is stored in the database simultaneously; the main card number is used for discriminating the adaptability of the card, the auxiliary card number is used for discriminating the effectiveness of the digital card, and the initial auxiliary card number is used for discriminating the true and false of the digital card. The digital card on-line security inspection system realizes the functions of identification, theft protection, theft inspection, self-help lost reporting, etc. of the digital card by processing, reading and writing, storing and discriminating the data of the main card number, the auxiliary card number, the initial auxiliary card number, a password, the number of a terminal machine, date and time of card cashing, etc. When the method is adopted, the time and the place of the information theft of the digital card can be inspected, and continuous use of the theft card can be prevented.

Description

Digital card safety on line check system and safety detection method
Technical field
The present invention relates to recording of information and administrative skill, specifically, relate to a kind of read-write of passing through the digital card internal information, realize the authentication of digital card, antitheft robber and self-service digital card safety on line check system and the safety detection method of reporting the loss looked into.
Background technology
Along with the development of digital technology, advantage such as convenient, fast and multi-functional has been widely used in fields such as bank, security, trust, telecommunications, commerce, health, tourism, diet, industry and commerce, the tax, customs, public security, traffic to digital card with it.But because digital card is as information carrier, the various numerical informations on it can be replicated, and are special in easier being replicated such as magnetic card, IC storage card, TM cards.Thereby, guarantee that digital card account's safety has become card issuer and card holder's questions of common interest.
As the main kind of digital card, magnetic card and TM card price are low, but forge easily; IC-card and light-card are difficult to forge, but the price height.Because the application of digital card more and more widely, and is also more and more serious at the crime of digital card.Net November 18 calendar year 2001 according to golden sheep, the Taiwan credit card was stolen the brush amount of money from 1998, and sharply increase progressively every year, by 500,000,000 yuan of New Taiwan Currencies, is increased to 3,000,000,000 yuan.16 days November calendar year 2001 of People's Net news, Beijing once took place in three days madness swipe the card steal for 400 times the amount of money reach 760 surplus ten thousand Renminbi.The first half of the year in 1992, because because of failing to use the event of online trade OLTP, the credit card business loss of prestige scholar (VISA), Master (Master), three families of American Express (American Express) is tens million of dollars to the communication network problem on Guangzhou, Shenzhen and other places.Be the swindler use pseudo-card, useless card steal and cheat due to (draw in " technology of IC-card and the application " of publishing the 25th page) from the Electronic Industry Press.In the distribution process of magnetic card, the loss of VISA and Master card is about 1% of sales volume according to statistics, and wherein 85% belongs to debt, and all the other 15% losses belong to multiple reasons such as crime.Cause the appearance of this situation, the defective of magnetic card itself is odjective cause (the 21st page ibid.).
Utilize the false digital card of forging to usurp account funds at present and become typical digital card sort of crimes.The safety problem that digital card exists has become the key issue that needs to be resolved hurrily in its application.Known in the industry steal the consumer credit card information by way of mainly having: by bank " outside the interior remarkable ability ghost ", the bank client data is leaked, colludes with stealing the neck customer deposit with puppet card group; Perhaps record machine by puppet card group in the miniature side of the other peace of cash machine, withdrawer's password is decoded and is got under the record.In addition, utilize the number in the detail form that computer decoding withdrawer leaves in addition, achieve the goal by the computer account transfer again.Steal digital card information at present and mainly contain multiple means such as intercepting and capturing statement of account, spy on card number password, wiretapping, in terminal device, add encapsulation card machine, obtain and obtain the managerial personnel internally, utilize multiple means to be forged afterwards again from the internet.What is more, and the high-tech means of also utilizing that has is dissected digital card and terminal device, cracks the fabrication method, forge in a large number then, thus the general safety of serious threat digital card system, particularly off-line system.
At above these forgery means, digital card safe precaution measure commonly used at present is not outer to be had modes such as the encryption of card internal information, the encryption of chip software and hardware, digital card and terminal device two-way authentications.Though also obtained some effects, this also causes the digital card cost to improve thereupon, perhaps can't seek unity of standard, and causes the problems such as poor compatibility of card.
At present known digital card information management system is divided into two kinds of on-line system (in-line system) and off-line systems (off-line system), the former safety coefficient height, but system's investment is greatly, and latter system small investment, but safety coefficient is low.Adopt off-line system (off-line system) to realize the deal in cash or the transfer of funds in fields such as commerce, finance, trade, promptly in deal in cash or transfer of funds process, block getting in touch between fund holder and the surrenderee.As the exercise question of authorizing " RMH System, Inc. " on March 17th, 1987 is the U.S. Pat 4 of " off-line type cash card system and method ", 650,978 propose a kind of system, its fundamental element is a cash card, it is a recording medium with the magnetic stripe, and record comprises the information of the security document of card holder's number of the account, closing balance, card on it.For guaranteeing the safe handling of card, this system is provided with a magnetic hysteresis equipment, the number bar that each card is all had a random writing when depositing the record magnetic stripe in advance, this number bar can in use repeat to read, but can not accurately be made a copy of, thereby become a key of magnetic stripe, can improve the safety in utilization of card with this.Adopt this method, no doubt reducing cash circulation, improve transfer of funds speed, aspects such as reduction running cost show intrinsic advantage, but alleged only raising safety precaution aspect of performance, because technical development can't be satisfied antitheft requirement.
On the other hand, the present most widely used banking system of digital card generally is divided into two parts to the authentication of bank card.The one, to the identification of card number, each tame bank major part is all taked scrambled to card number, and what have also uses identification code; The 2nd, adopt user cipher.The problem that they exist is that the authentication information in the card is static number, cryptographic algorithm easy crack.Even it is stolen that the user finds account funds, timeliness is slow owing to reporting the loss, and it is stolen therefore can't to prevent account funds to continue in the shortest time.And system is difficult to the stolen time place of automatic discriminant information.
Summary of the invention
In order to address the above problem, the present invention proposes a kind of digital card safety on line check system and safety detection method, with realize that digital card is safe and convenient to use, make false card difficulty, use that false card is dangerous, anti-theft measure is tight, look into the robber promptly and accurately, report the loss conveniently technique effect, finally reach the purpose of safe antitheft.
For achieving the above object, a first aspect of the present invention provides a kind of digital card safety on line check system, is made up of five parts such as digital card, card sender, terminating machine, Center For Information Management and networks.Wherein:
Described digital card is for having a carrier digital card to what the card internal information was read and write by read write line;
Described card sender comprises hair fastener main frame and hair fastener peripherals, and wherein the hair fastener main frame comprises the hair fastener host CPU, and it links to each other with first communication interface, the first random number code maker, first memory, first database and an I/O interface respectively; And a described I/O interface links to each other with hair fastener peripherals;
Described terminating machine comprises end host and terminal peripherals, and wherein end host comprises end host CPU, and it links to each other with chronotron, second communication interface, second memory, the 2nd I/O interface and interface integrated circuit board respectively; And described the 2nd I/O interface is connected with terminal peripherals; Described interface integrated circuit board links to each other with terminal peripherals;
Described Center For Information Management comprises central host, prepositive communication computer and central periphery equipment, wherein central host comprises central host CPU, and it links to each other with first counter, second counter, the 3rd storer, comparer, the second random number code maker, second database, the 3rd database, the 4th database and the 3rd I/O interface respectively; And described the 3rd I/O interface links to each other with prepositive communication computer, central periphery equipment respectively;
Described network links to each other with Center For Information Management by prepositive communication computer, and first communication interface by described card sender links to each other with card sender respectively, and links to each other with terminating machine by the second communication interface of terminating machine;
The digital card of digital card safety on line check system of the present invention can be the digital card of user cipher, also can be the digital card of no user password;
Described digital card can be magnetic card, IC-card, light-card, TM card;
Described digital card can be suitable for multiple medium and multiple password form simultaneously;
The card sender of digital card safety on line check system of the present invention can be one one or multi-section;
The terminating machine of digital card safety on line check system of the present invention can be one one or multi-section;
Described terminating machine can be one or more in POS machine, the ATM;
Described hair fastener peripherals can be an one or a few portion in display, keyboard, printer, the digital card read write line;
Described terminal peripherals can be an one or a few portion in display, operator's keyboard, user's keyboard, printer, digital card read write line, alarm, counting module, fuel charger, vending machine, ticket machine, automatically-controlled door, gamma camera, OCR wand, the meter electronics;
Described central periphery equipment can be an one or a few portion in display, keyboard, printer, the alarm;
The network of digital card safety on line check system of the present invention can be one or more among LAN (Local Area Network), internet, DDN, the PSTN;
Described digital card read write line can be an one or a few portion in magnetic card read write line, IC-card read write line, light-card read write line, the TM card reader.
According to a second aspect of the present invention, a kind of digital card safety detection method that is suitable for above-mentioned digital card safety check system is proposed.Described safety detection method comprises the steps:
Generate main card number, original auxiliary card number, the original password of digital card by card sender, and give digital card manufacturer with these data and make digital card;
Hair fastener person is input to card sender with the main card number and the personal information of digital card;
The card sender first random number code maker generates secondary card number, and by the digital card read write line the main card number of digital card, secondary card number and part personal information is write in the information carrier of digital card;
Card sender is issued Center For Information Management with described main card number, original auxiliary card number, original password, secondary card number, card sender numbering, card-issuing date time and personal information; And with corresponding file maintenance in second database and the 3rd database at this center;
When swiping the card, end host reads the digital card read write line from digital card main card number, secondary card number and terminating machine numbering, the time on date of swiping the card etc. are dealt into Center For Information Management together;
Central host will be taken out the secondary card number of this digital card and the secondary card number received from second database and be sent into comparer and compare; When secondary card number comparative result equates, system assert that this card is effective, and by the new secondary card number of second random number code maker generation, replaces the secondary card number in this digital card carrier and second database;
Unequal when secondary card number comparative result, system assert that this card is a dead card, and central host utilizes main card number and secondary card number to find terminating machine numbering and the date time of digital card information when stolen from the 3rd database; From the 4th database, find simultaneously from this time on date used digital card on this terminating machine so far, and change the secondary card number of these digital card in second database; The user is behind the correct original auxiliary card number of terminating machine input then, and system assert that this card is true card, and changes the secondary card number of this card, recovers its validity, otherwise system assert this card and be false card, refuses this card continuation use;
Effective card for system is assert after the user inputs password, correctly then allow to use, otherwise refusal uses;
When the user when terminating machine selects to report the loss function, with main card number and password entry terminal machine, terminating machine with itself and terminating machine numbering, report the loss the time on date and report the loss information such as function code and be dealt into Center For Information Management together, and carry out main card number
When the user when terminating machine selects to report the loss function, with main card number and password entry terminal machine, terminating machine with itself and terminating machine numbering, report the loss the time on date and report the loss information such as function code and be dealt into Center For Information Management together, and carry out main card number retrieval and password compares; Password is correct, then accepts to report the loss, and the second random number code maker generates new secondary card number, original auxiliary card number and password, replaces corresponding information in second database, and terminal printer is printed and reported the loss list simultaneously; Otherwise refusal is reported the loss.
Adopt system and method for the present invention, its general principle be digital card authentication, antitheft, look into and steal and self-service reporting the loss will lean on the numeral of random variation to solve.And the foregoing invention thinking is on the digital card original base, and for digital card is set up a secondary card number, the card number of it and digital card (for ease of being called main card number after the difference) is formed the compound card number of digital card, also sets up an original auxiliary card number for digital card.Main card number is a visible ordinal number that is fixed with, and it not only is kept in digital card information carrier and the database, but also be printed on the digital card carrier the surface and be printed in the statement of account.Secondary card number is a sightless random number, and it only is kept in digital card information carrier and the database, and after swiping the card, it all changes at every turn, and therefore compound card number has randomness and dynamic.The original auxiliary card number is a random number, and it only is printed on digital card carrier surface (cover with coating, scrape off as seen) and preserves in the database.Set up first database simultaneously, i.e. digital card original information data storehouse; Second database, i.e. digital card basic information database; The 3rd database, i.e. digital card card using information database; The 4th database, i.e. terminating machine card using information database.System is by to the processing of main card number, secondary card number, original auxiliary card number, password, terminating machine numbering and the data such as time on date of swiping the card (read-write, preserve, differentiate), realize digital card authentication, antitheft, look into and steal and self-service function such as report the loss.Specifically, adopt the digital card safety on line check system of the present invention of said structure and the safety detection method realized by this method can produce following technique effect:
1. increase the difficulty of forging false digital card, safe in utilization convenient again
Owing to adopt compound card number, wherein main card number can be looked into the cardamonin inspection for card holder and operator for as seen the ordinal number numbering is arranged.And the secondary card number that increases is a random number, it with main card number between no any related, both invisible, do not appear at such as in the carriers such as statement of account yet, almost stopped the channel that might be decrypted.Even non-card holder knows the method for making and the main card number thereof of digital card, as long as do not know the secondary card number of digital card, the vacation card available rate of producing so is low-down.So both be not afraid of others and seen main card number and password, need not lie in the keeping of statement of account again, greatly strengthened digital card security and convenience in use.For example, secondary card number is 6 decimal system random numbers, the possibility of once guessing right less than 1,000,000/, thereby it is just very big to make the cost of false card.
And the digital card of prior art, card number is one ordinal number numbering, just can make vacation and block as long as know the method for making (comprise cryptographic algorithm, the people that often this cryptographic algorithm is easy to be familiar with code breaking cracks) of digital card and the card number of expressing.On the one hand, hair fastener unit will remind the card holder not abandon statement of account and will often change password, and on the other hand, the card holder worries that still other people steal its card number and password by number of ways.Therefore, existing digital card not only safety but also not too convenient not too in use.
2. strengthen recognition capability greatly, strengthen the risk of using false card the vacation card
If digital card information is stolen, and be made into false card.Because the dynamic of compound card number has guaranteed digital card uniqueness in use, avoided two above digital card (comprising Zhen Ka and false card) in system, effectively to use simultaneously.The card of taking seriously uses prior to the vacation card, because variation has taken place the secondary card number in Zhen Ka and described second database, and the false not synchronous change of interior secondary card number that blocks becomes " dead card ", therefore false card Once you begin uses and will be found by central host, and the notice terminating machine is warned.When the vacation card uses prior to true card, because variation has taken place in secondary card number in the false card and second database, and the secondary card number of Zhen Kanei synchronous change not becomes " dead card ", and therefore true card is in case reuse and also can obtain central host by warning that terminating machine sends.Referring to table 1.After the card holder imported correct original auxiliary card number (having only true card just to have), the secondary card number that system will be somebody's turn to do in the true card and second database was changed.Like this, both can recover the validity of true card immediately, and can make false card become " dead card " again.In case false card occurs once more and can be found immediately, has therefore both prevented to continue enlargement loss, make again and hold false card person found danger, the security that has improved system are greatly in use arranged at any time.
Below the table 1 of comparison to(for) secondary card number in Zhen Ka and the false card information carrier and the secondary card number in second database is shown, as easy as rolling off a logly discerned automatically by Center For Information Management.
Table 1
Use order The secondary card number of true card The secondary card number of false card
True card is used earlier Identical with the secondary card number in second database Different with the secondary card number in second database
False card is used earlier Different with the secondary card number in second database Identical with the secondary card number in second database
According to prior art, because the information that is used to authenticate in the card is static, therefore the vacation card of making is as long as authentication information is identical with true card, and in use system just is difficult to differentiate.Because system can not stick into row identification automatically to true and false, even the password not match of appropriator input (really block the holder because of the memory reason, also input password by mistake through regular meeting) uses false card also not have much risks.Even digital card is stolen sometimes, (when usurping, the card person do not find that account funds is few if do not cause observable loss as stealing, do not steal cash immediately, steal again when abundant) etc. account funds, the true card owner also is difficult to find, unless it has changed password, otherwise just be difficult to eliminate the stolen hidden danger of continuation.
3. the clue of false card can be provided, can prevent the digital card of the information that is stolen in the same time and place to continue stolen again
According to safety detection method of the present invention, also the old new storage mode of depositing is being stayed in described secondary card number employing.In case find " dead card ", system is by blocking clue to being somebody's turn to do the retrieval of the secondary card number of " dead card " in described the 3rd database, can finding to steal---steal the time and the terminating machine numbering of digital card information, referring to table 2.Can adopt an effective measure immediately like this, prevent that continuing the robber in this crime place blocks.Simultaneously, system also can find from time of stealing digital card information used other digital card on this terminating machine so far by the 4th database, and change the secondary card number of these digital card in second database, thereby avoid these digital card to continue stolen possibility.Just steal one of digital card information made at the same time together and permit a leave in the card, in case wherein have a false card to be found or to have a true card to find stolen, this card of permitting a leave just becomes " dead card " afterwards, all can be by system discovery if re-use.Therefore accomplish to find an a collection of true card of false card protection, both reached to look into automatically and stolen antitheft effect, greatly improved the risk of using false card again.Simultaneously, hair fastener unit can scout effectively according to stealing the card clue, calls to account to the person of possessing of terminating machine by scouting the result.So both can prevent inner crime, reduce the possibility of on terminating machine, stealing client's digital card data, and can improve the terminating machine person's of possessing sense of responsibility again, safeguard hair fastener unit and card holder's interests positively.
Following table 2 illustrates the comparison for the secondary card number that keeps in secondary card number in Zhen Ka and the false card information carrier and the 3rd database, and Center For Information Management can be found digital card information automatically and when and where be stolen.
Table 2
Use order The secondary card number of true card The secondary card number of false card
True card is used earlier Identical with last secondary card number in this digital card record of the 3rd database Identical with the secondary card number of stolen that time of true card information of preserving in this digital card record of the 3rd database
False card is used earlier Identical with the secondary card number of stolen that time of true card information of preserving in this digital card record of the 3rd database Identical with last secondary card number in this digital card record of the 3rd database
According to prior art, be difficult to from one or two false card finding, find out the stolen time of digital card information, stolen place, therefore both can't protect the safety of other simultaneously stolen digital card, be difficult to prevent from this terminating machine, to continue to take place to steal the phenomenon of card again.
4. can limit the total degree of inputing password every day by mistake, reduce and steal the card person guesses password right by conjecture possibility
System every day is by inputing the accumulative total of password number of times the same day by mistake to digital card, restriction every day maximum bad passwords number of times, can reduce the possibility that the stolen card person of password of digital card guesses right so effectively.For example: the number of times that password is inputed in restriction every day by mistake is 20 times, when password is 4 decimal system random numbers, calculates theoretically, needs 500 days ability to guarantee that 100% guesses password right.
According to prior art, do not provide this function.Only allow the number of times of input password mistake to limit to once swiping the card, stealing the card person can be by the conjecture password of repeatedly swiping the card.
5. can realize reporting the loss of digital card by terminating machine, raising is reported the loss ageing
When digital card was lost or be stolen, its owner can carry out the self-service operation of reporting the loss by the function of reporting the loss that terminating machine provides.So both made things convenient for user and hair fastener unit, and improved again and reported the loss timeliness, avoided because of reporting the loss the untimely loss that may cause.
According to prior art, digital card will be reported the loss, and its owner must have the effect certificate and go through the formalities to hair fastener unit.And generally speaking, report the loss and want just to come into force after 24 hours.On the one hand, the digital card owner may be because of for the moment not being with certificate or far away from hair fastener unit, even hair fastener unit comes off duty and can't in time report the loss.Even report the loss on the other hand, but before coming into force, digital card still might be stolen, thereby cause damage.
6. can add up vacation card quantity and the access times of having found automatically
System can add up the quantity of " dead card " in good time, on a macro scale, and distinguish the true and false of digital card according to the original auxiliary card number of input, and vacation is sticked into the row counting, thus the sum of definite false card.According to retrieval (looking into corresponding secondary card number) number of times, determine the access times of false card simultaneously to described the 3rd database.Therefore hair fastener unit can understand the loss that false card causes in time, on a macro scale.
According to prior art, be difficult to provide automatically to finding the various statisticss of false card.
7. the adaptability to existing system and equipment is strong
Use digital card safety on line check system of the present invention, the hardware of existing system is changed little, software change difficulty neither be very high, therefore can adapt to the transformation of existing online digital card system.Aspect the manually-operated difficulty, need carry out swiping the card for twice (Card Reader is write card for the second time for the first time) to taking the manual directly mode of swiping the card, only increase the workload of once swiping the card; Alternate manner does not increase the manually-operated workload.
In sum, the special secondary card number that uses of the present invention can be interpreted as to each digital card and mix several card numbers, be 6 decimal numbers as secondary card number, just is equivalent to have above 1,000,000 card numbers; And the original auxiliary card number that will use especially is interpreted as unique sign that the discriminating digit card is true and false.Which secondary card number is digital card use in each the use, all once produced at random by system in the use last.People both can't see that unpredictable again, therefore the forgery to digital card had increased difficulty, has increased risk to usurping, clue is provided, brought safety, brought convenience to reporting the loss to the user to looking into the robber.The effect that safety detection method reached that native system adopted is difficult to substitute with general measure, also is difficult to can accomplish with general cost.
Description of drawings
With reference to the detailed description of accompanying drawing, will make technical characterictic of the present invention, characteristics and advantage become more clear by following to an embodiment, wherein:
Fig. 1 represents to be suitable for the carrier structure synoptic diagram of magnetic card of the digital card safety on line check system of the embodiment of the invention;
Fig. 2 represents the block scheme of embodiment of the invention digital card safety on line check system structure;
Fig. 3 represents the generation of embodiment of the invention magnetic card raw data and the process flow diagram that magnetic card is made;
Fig. 4 represents that embodiment of the invention hair fastener unit provides the process flow diagram of magnetic card to the application user;
When Fig. 5 represents that the embodiment of the invention uses magnetic card to enter transaction to the process flow diagram of its authentication;
Fig. 6 represents that the embodiment of the invention handles the process flow diagram of non-native system magnetic card;
Fig. 7 represents the effectively process flow diagram of card of embodiment of the invention processing;
Fig. 8 represents the process flow diagram of embodiment of the invention processing input password and checking;
Fig. 9 represents embodiment of the invention processing " dead card " and looks into robber's process flow diagram;
Figure 10 represents the process flow diagram of embodiment of the invention processing input original auxiliary card number and checking;
Figure 11 represents that the embodiment of the invention handles taking the process flow diagram of anti-theft measure stealing used magnetic card on the card information terminating machine;
Figure 12 represents the process flow diagram of the false card of embodiment of the invention processing;
Figure 13 represents the self-service process flow diagram of reporting the loss of embodiment of the invention processing magnetic card;
Figure 14, Figure 15 represent that the invention process handles secondary card number precedence diagram.
Embodiment
The following method that further describes digital card safety on line check system of the present invention by specific embodiment and use this system realization digital card safety on line to check with reference to the figure explanation, promptly by to the processing such as read-write, preservation and differentiation of digital card information, realize magnetic card authentication, antitheft, look into and steal and self-service flow process of function such as reporting the loss.
Fig. 1 illustrates the synoptic diagram of a kind of magnetic card carrier structure that is suitable for digital card safety on line check system of the present invention.Fig. 2 then illustrate the present invention the authentication on terminating machine of managed fund account's magnetic card, antitheft, look into and steal and the self-service example that is applied as of reporting the loss process, the block scheme of the digital card safety on line check system structure of digital card safety on line check system embodiment of the present invention is described.
At first, brief description is applicable to the physical arrangement of magnetic card of present embodiment digital card safety on line check system and safety detection method and the information content of preservation thereof.Then describe the hardware configuration and the database structure of present embodiment system in detail.Introduce raw information generation, making and the distribution process of magnetic card then in detail.Last different situations that in use occur according to magnetic card, detailed description system carry out authentication, antitheft, look into and steal and self-service each process of reporting the loss.
Specify as follows:
1. the structure of magnetic card and information
As shown in Figure 1, the suitable magnetic card of digital card safety on line check system of the present invention and safety detection method comprises the main body of superficial layer and card.Be printed with visible main card number and original auxiliary card number in the described superficial layer, the latter is a random number, but covers with coating, scrapes off as seen.This original auxiliary card number is produced by the first random number code maker in the hair fastener main frame shown in Figure 2, and card issuer, card holder and terminal operator all can't directly see, also are not printed in the various bills of this digital card.
Magnetic card is printed with on the surface main card number and the original auxiliary card number as information carrier, also stores static main card number that comprises this card and the information such as dynamic secondary card number that generate at random with the magnetic stripe form in the main body of card, and the information in the magnetic stripe is sightless.
This magnetic card is provided with user cipher, and joins the original password envelope.Described message in cipher package is drawn together superficial layer and nexine.Be printed with visible main card number in the described superficial layer, be printed with original password in the described nexine, tear just as seen.Described original password is a random number, and is produced by the first random number code maker in the hair fastener main frame shown in Figure 2.
2. digital card safety check system
With reference to Fig. 2, this illustrates the structure of present embodiment digital card safety on line check system.
As shown in Figure 2, the system of present embodiment comprises five parts such as magnetic card, card sender, terminating machine, Center For Information Management and internet.
Information in the described magnetic card can be read and write by the magnetic card read write line, and one group of total k of magnetic card opens, and wherein k is more than or equal to 1.The back is that example describes with magnetic card 1, abbreviates magnetic card for convenience as.
Described card sender has p portion, and wherein p is more than or equal to 1.The back is that example describes with card sender 1, abbreviates card sender for convenience as.Described card sender comprises hair fastener main frame and hair fastener peripherals.Described hair fastener main frame comprises hair fastener host CPU, first communication interface, the first random number code maker, first memory, first database and an I/O interface.Described hair fastener main frame is connected with hair fastener peripherals such as hair fastener display, hair fastener keyboard, hair fastener printer and the first magnetic card read write lines respectively by an I/O interface.
Described terminating machine has q portion, and wherein q is more than or equal to 1.The back is that example describes with terminating machine 1, and terminating machine is called in letter for convenience.Described terminating machine comprises end host and terminal peripherals.Described end host comprises end host CPU, chronotron, second communication interface, second memory, the 2nd I/O interface and interface integrated circuit board.Described end host is connected with a part of terminal peripherals such as terminal display, operator's keyboard and terminal printers respectively by the 2nd I/O interface.Described end host also is connected with another part terminal peripherals such as the second magnetic card read write line, first alarm and user's keyboards by the interface integrated circuit board.
Described Center For Information Management partly comprises central host, prepositive communication computer and central periphery equipment.Wherein said central host comprises central host CPU, first counter, second counter, the 3rd storer, comparer, the second random number code maker, second database, the 3rd database, the 4th database and the 3rd I/O interface.Described central host links to each other with central periphery equipment such as prepositive communication computer and central display, center keyboard, center printer, second alarms respectively by the 3rd I/O interface.
Described Center For Information Management links to each other by prepositive communication computer, internet, first communication interface with card sender.
Described Center For Information Management links to each other by prepositive communication computer, internet, second communication interface with terminating machine.
The described first random number code maker is used to generate original auxiliary card number, original password and the secondary card number of digital card.
The original auxiliary card number that the described second random number code maker is used to generate the secondary card number of digital card and reports the loss digital card.
After described chronotron is used for terminating machine and sends alerting signal, leave the setup time that the terminal management personnel deal with appearance " dead card " for.
Described first counter is used to add up the vacation of being found by the native system inspection and blocks total number, and second counter then is used to add up the various false use total degree that blocks that native system has been found.
Described comparer is used for the comparison between the corresponding information with database of digital card carrier information, promptly is used for authentication informations such as the secondary card number of comparative figures card, original auxiliary card number and password.
3. database structure
As one of core cell of realizing present embodiment digital card safety on line check system and safety detection method is database in the system.Described database comprises:
(1) first database
Described first database is preserved the source book such as main card number, original auxiliary card number and original password that comprise magnetic card.This database is used for the making and the hair fastener of magnetic card.Its file structure is:
Field name master card number original auxiliary card number original password
The type character alphabetic character
Width W 1 W2 W3
Wherein:
" type " expression field name data layout;
" width " expression field name data the longest admissible figure place;
W1, W2, W3 are respectively the figure place of main card number, original auxiliary card number, original password.
Concrete file structure in the present embodiment is:
Field name master card number original auxiliary card number original password
The type character alphabetic character
Width 18 66
If: the digital card safety on line check system of present embodiment is responsible for possessing k altogether and is opened magnetic card, and then the k that preserves of first database opens the source book of magnetic card and is:
Recording mechanism master's card number original auxiliary card number original password
1 main card number 1 original auxiliary card number 1 original password 1
---
K master's card number k original auxiliary card number k original password k
(2) second databases
Described second database is preserved the basic documents such as main card number, original auxiliary card number, password, secondary card number, the wrong counting of password and other information that comprise magnetic card.When the user changed password, system just changed the intrarecord password of this magnetic card in this database.When magnetic card was swiped the card, system replaced the intrarecord secondary card number of this magnetic card in this database with the new secondary at random card number that produces.The wrong counting of password was inputed the total degree accumulative total of password the same day by mistake for magnetic card, and system's timing every day with it clear 0 once.This database is used for the authentication of magnetic card, antitheft, self-service reporting the loss and information management etc.Its file structure is:
The wrong counting of the secondary card number password of field name master card number original auxiliary card number password out of Memory
Type character alphabetic character character integer T1
Width W 1 W2 W3 W4 W5 W6
Decimal place
Wherein:
" out of Memory " can be one or more in name, native place, sex, date of birth, educational background, height, body weight, province card number, the term of validity and the remaining sum etc." T1 " is the field name type that is complementary with " out of Memory ".
W1, W2, W3, W4, W5, W6 are respectively the figure place of field names such as main card number, original auxiliary card number, password, secondary card number, the wrong counting of password and other information.
The decimal digits that " decimal place " comprises for the field of value type need be specified decimal digits as fields such as height, body weight, remaining sums.
Concrete file structure in the present embodiment is:
The wrong counting of the secondary card number password of field name master card number original auxiliary card number password name remaining sum
Type character alphabetic character character integer character numerical value
Width 18 66628 11
Decimal place 2
The remaining sum of deposit in " remaining sum " expression magnetic card, unit is a unit, for example: " 1688.28 " expression Ka Neishang has 1688.28 yuan of remaining sums.
If: the digital card safety on line check system of present embodiment is responsible for possessing k altogether and is opened magnetic card, and then the k that preserves of second database opens the basic document of magnetic card and is:
The wrong counting of the secondary card number password of recording mechanism master's card number original auxiliary card number password name remaining sum
1 several 1 name, 1 remaining sum 1 of the secondary card number of 1 main card number 1 original auxiliary card number 1 password l
---
K several k name k remaining sum k of the secondary card number of k master's card number k original auxiliary card number k password k
(3) the 3rd databases
Described the 3rd database is preserved and is comprised the main card number when magnetic card is swiped the card at every turn, secondary card number, terminating machine numbering, the data of swiping the card such as time on date and other card using information of swiping the card.This database is used for looking into of magnetic card and steals and information management.Its file structure is:
The secondary card number terminating machine of field name master card number is numbered other card using information of time on date of swiping the card
Type character alphabetic character date time T 2
Width W 1 W4 W7 W8 W9
Decimal place
Wherein:
" other card using information " can be the purposes of swiping the card, in the volume of swiping the card etc. one or more." T2 " is the field name type that is complementary with " other card using information ".If swipe the card volume, then its type is a numeric type, and will specify decimal place.
W1, W4, W7, W8, W9 are respectively the figure place of field names such as main card number, secondary card number, terminating machine numbering, the time on date of swiping the card, other card using information.
" time on date " adopts form to adopt international " moon/day/year hour: branch: second " form, and for example: " 02/28/1998 10:38:26 " represents 10: 38: 26 on the 28th February in 1998.
Concrete file structure in the present embodiment is:
The secondary card number terminating machine numbering of field name master card number time on the date type amount of money of swiping the card of swiping the card
Type character alphabetic character time on date integer numerical value
Width 18 6 12 19 1 11
Decimal place 2
Annotate: the type of swiping the card is 1: hair fastener (it is the card-issuing date time that the relevant terminal machine is numbered card sender numbering, the time on date of swiping the card), 2: report the loss 3: withdraw the money 4: deposit, 5: shopping, 6: service
For example, if two main card numbers are respectively the magnetic card of main card number 1 and main card number 2, be used n time and m time respectively after, then the data of swiping the card of these two magnetic cards of preserving in the 3rd database is:
The secondary card number terminating machine numbering of recording mechanism master's card number time on the date type amount of money of swiping the card of swiping the card
1 main card number 1 secondary card number 11 numbering 11 times on date, 11 Class1,1 amount of money 11
---
N master's card number 1 secondary card number 1n numbering 1n time on date 1n Class1 n amount of money 1n
N+1 master's card number 2 secondary card number 21 numbering 21 times on date, 21 types, 21 amount of money 21
---
N+m master's card number 2 secondary card number 2m numbering 2m time on date 2m type 2m amount of money 2m
Annotate:
1. in record 1, record be the data of magnetic card when hair fastener of main card number 1, promptly number 11 and number for card sender, the time on date 11 is the card-issuing date time, Class1 1 is 1, the deposit when amount of money 11 is hair fastener.
2. n+1 in record, record be the data of magnetic card when hair fastener of main card number 2, promptly numbering 21 is the card sender numbering, the time on date 21 is the card-issuing date time, type 21 is 1, the deposit when amount of money 21 is hair fastener.
(4) the 4th databases
Described the 4th database is preserved and is comprised the terminating machine numbering when terminating machine is swiped the card at every turn, main card number, the time on date of swiping the card, the data of swiping the card such as sign and other card using information of reporting to the police.This database is used for the antitheft and information management of magnetic card.Its file structure is:
The field name terminating machine is numbered main card number time on date other card using information of sign of reporting to the police of swiping the card
Type character character time on date character T2
Width W 6 W1 W8 W10 W9
Wherein:
" swipe the card the time on date " with " other card using information " should be consistent with corresponding recorded content in the 3rd database.
" sign of reporting to the police " initial value is " 0 ".When the system discovery terminating machine is stolen card information, from the 4th database, find out and steal information time to current time used digital card on this terminating machine, if corresponding " sign of reporting to the police " is " 0 ", then change " 1 " into, and change the secondary card number of these magnetic cards in second database into another random number.
W6, W1, W8, W10, W9 are respectively the figure place of terminating machine numbering, main card number, the time on date of swiping the card, the field names such as sign and other card using information of reporting to the police.
Concrete file structure in the present embodiment is:
The field name terminating machine is numbered main card number time on the date sign type amount of money of swiping the card of reporting to the police of swiping the card
Type character character time on date character integer numerical value
Width 12 18 19 11 11
Decimal place 2
For example, if terminating machine is numbered the terminating machine of numbering 1, in use brushed f altogether and opened magnetic card; Another terminating machine is numbered the terminating machine of numbering 2, in use brushes g altogether and opens magnetic card.The data of swiping the card of the two station terminal machines of preserving in such the 4th database is:
The recording mechanism terminating machine is numbered main card number time on the date sign type amount of money of swiping the card of reporting to the police of swiping the card
1 numbering, 1 main 11 time on date of card number, 11 " 0 " Class1,1 amount of money 11
---
F numbers 1 main card number 1f time on date 1f " 0 " Class1 f amount of money 1f
F+1 numbers 2 main 21 time on date of card number, 21 " 0 " types, 21 amount of money 21
---
F+g numbers 2 main card number 2g time on date 2g " 0 " type 2g amount of money 2g
Below in conjunction with Fig. 3 to Figure 13 illustrate the authentication of magnetic card on terminating machine of using above-mentioned management capital account, antitheft, look into and steal and self-service using method of reporting the loss process embodiment digital card safety check system, also promptly adopt the digital card safety detection method embodiment of this check system.
1. the generation of magnetic card raw data and magnetic card are made
Fig. 3 illustrates the generation and the magnetic card of magnetic card raw data and makes flow process.
At first, generate the magnetic card raw data by card sender.At step S302, specify the main card number scope of a collection of magnetic card by hair fastener unit; And the scope of main card number is input to (step S303) the hair fastener main frame from the hair fastener keyboard.Then at step S304, the first random number code maker respectively generates an original auxiliary card number and original password for each main card number; And deposit main card number, original auxiliary card number and the original password etc. of this batch magnetic card in first database (step S305) by the hair fastener host CPU.
Then, carry out the making of magnetic card carrier.At step S306, magnetic card manufacturer making magnetic card is given with main card number and original auxiliary card number by hair fastener unit.And then magnetic card manufacturer is printed on the surface of magnetic card carrier with main card number and original auxiliary card number, and covers the original auxiliary card number (step S307) on magnetic card surface with coating.The magnetic card that makes is given hair fastener unit (step S308) at last by magnetic card manufacturer.
At last, carry out the making of password envelope.At step S309, hair fastener unit gives the printing trader with main card number and original password and makes the password envelope.And then the printing trader is printed onto main card number and original password in the password envelope, and sealing password envelope (step S310).The printing trader gives hair fastener unit (step S311) with the password envelope that makes at last.Thereby finish the manufacturing process of magnetic card.
2. the granting of magnetic card
Fig. 4 illustrates the dispensing flow path of magnetic card.
At first, hair fastener person distributes magnetic card, input data for the applicant, and carries out writing operation.Promptly at step S402, hair fastener person distributes a magnetic card to the applicant, and with main card number, the full name of applicant of this magnetic card and deposit the amount of money in and be input to the hair fastener main frame from the hair fastener keyboard.Then at step S403, produce a secondary card number by the first random number code maker.At step S404, hair fastener display prompts writing operation; Swipe the card step S405 hair fastener person, the hair fastener host CPU is write main card number and secondary card number in this magnetic card by the first magnetic card read write line by an I/O interface.
Then, related data is issued Center For Information Management.Promptly at step S406, the hair fastener host CPU takes out the original auxiliary card number and the original password of this magnetic card from first database.At step S407, the hair fastener host CPU by first communication interface with main card number, original auxiliary card number, original password, secondary card number, full name of applicant, deposit the amount of money, card sender numbering and card-issuing date time etc. in and issue Center For Information Management by the internet.Central host CPU receives the data (step S408) that card sender is sent by the 3rd I/O interface from prepositive communication computer.
Center For Information Management deposits data in the corresponding database in after receiving above-mentioned data.Promptly by central host CPU, at step S409, with main card number, original auxiliary card number, original password, secondary card number, full name of applicant and deposit amount of money etc. in and add in second database; At step S410, main card number, secondary card number, card sender numbering, card-issuing date time, the type of swiping the card and deposit etc. are added in the 3rd database.
At last, Center For Information Management notice card sender has been finished file maintenance, thereby finishes hair fastener work.Promptly at step S411, central host CPU is received data successfully to instruct by the 3rd I/O interface and issues card sender by prepositive communication computer and internet.At step S412, the hair fastener host CPU receives this instruction by first communication interface.After card sender is received above-mentioned information, hair fastener display prompts " file maintenance finishes " (step S413); Hair fastener person gives the applicant (step S414) with magnetic card and password envelope, finishes hair fastener.
3. the authentication of magnetic card
Below the process flow diagram of contrast Fig. 5 is described the authentication process when using the present embodiment magnetic card.This flow process is the main flow of safety detection method of the present invention, differentiates the applicability of magnetic card on the one hand, sees promptly whether it can use at native system (being differentiated by main card number); Differentiate the validity (differentiating) of magnetic card on the other hand by secondary card number.
At first terminal display prompting Card Reader operation (step S502) is then swiped the card on terminating machine by card holder or operator, and the second magnetic card read write line by wherein reads main card number and secondary card number (step S503) in the magnetic card.Then, when step S504, end host CPU fetches main card number and secondary card number by the interface integrated circuit board from the second magnetic card read write line; And main card number, secondary card number, terminating machine numbering and the time on date of swiping the card etc. are issued Center For Information Management through second communication interface and internet.At step S505, the data that central host CPU sends from prepositive communication computer receiving terminal machine by the 3rd I/O interface.
Center For Information Management is after receiving these data, and central host CPU looks into the main card number (step S506) of this magnetic card from second database, to differentiate the applicability of magnetic card.Lookup result is (step S507) in two kinds of situation:
(1) can not find out main card number.The inapplicable native system of this magnetic card is described, then at step S508, the step S61 that forwards Fig. 6 to handles non-native system magnetic card flow process.
(2) find main card number.Illustrate that this magnetic card is suitable for native system, then when step S509, central host CPU sends the secondary card number of this magnetic card in the secondary card number of this magnetic card and second database into comparer together, carries out magnetic card validity and differentiates.Result relatively is divided into two kinds of situations (step S510) again:
1. secondary card number difference.This magnetic card is described for " dead card ", promptly or be false card; Be true card, but stolen.Then at step S511, the step S901 that forwards Fig. 9 to handles " dead card " flow process.
2. secondary card number is identical.Illustrate that this magnetic card is effective card, promptly or be not stolen true card; Be false card, but after stealing true card information, true card did not reuse.Then at step S512, the step S701 that forwards Fig. 7 to handles effectively card flow process.
4. handle non-native system magnetic card flow process
Fig. 6 illustrates the process of handling non-native system magnetic card.At the step S508 of Fig. 5, Center For Information Management can not find out the main card number of magnetic card in database after, promptly forward the beginning (step S61) of this flow process to.
At first, at step S62, central host CPU issues terminating machine by the instruction that the 3rd I/O interface will block non-native system magnetic card by prepositive communication computer and internet.Then, at step S63, end host CPU receives this instruction by the second communication interface.Then, at step S64, terminal display prompting " this blocks non-native system magnetic card ".At last, move back card and end operation (step S65).
5. effective treatment scheme of blocking
Below the process flow diagram of contrast Fig. 7 is described the processing procedure of present embodiment to effective card.The secondary card number of stochastic and dynamic and the existing technology that produce in this flow process and preserve have fundamental difference, also are core points of the present invention.At the step S512 of Fig. 5, if comparer promptly forwards the beginning (step S701) of this flow process to the coming to the same thing of two secondary card number comparisons in magnetic card and the database.
Produced a secondary card number (step S702): central host CPU replaces this magnetic card in second database with this pair card number secondary card number (step S703) by the second random number code maker before this.Then, by central host CPU, main card number, secondary card number, terminating machine numbering and the time on date of swiping the card etc. are added to the record back of the 3rd this magnetic card of database at step S704; At step S705, the record back of adding in the 4th database this terminating machine such as terminating machine numbering, main card number, the swipe the card time on date and the sign initial value of reporting to the police etc.And at step S706, central host CPU should issue terminating machine by the 3rd I/O interface by prepositive communication computer and internet by the pair card number.
Then, end host CPU fetches secondary card number (step S707) from the second communication interface; Terminal display prompting user or operator swipe the card (step S708).When swiping the card, end host CPU crosses the second magnetic card read write line by the interface board cartoon secondary card number is write (step S709) in the magnetic card.At last, at step S710, the step S801 that forwards Fig. 8 to handles input password and checking flow process.
6. import the treatment scheme of password and checking
Fig. 8 represents to handle the process flow diagram of input password and proof procedure.Fig. 7 finish the secondary card number of effective card changed and preserves various brushing card datas after, forward (the step S801) of this flow process to from step S710, the entitlement whether card holder is had this magnetic card is carried out the password confirming of last pass.
At first, at step S802, central host CPU will input password counting unit T clear 0 by mistake in this password authentification; And, from second database, look into the wrong counting unit of password of this magnetic card at step S803.At step S804, judge and inputed the number of times whether the password mistake has surpassed regulation the same day, judge promptly whether the wrong counting of password equals 20.In two kinds of situation:
(1) count=20 if password is wrong, then at step S805, central host CPU will input the password mistake same day by the 3rd I/O interface and issue terminating machine above 20 times instruction by prepositive communication computer and internet.At step S806, end host CPU receives this instruction by the second communication interface; And at step S807, terminal display prompting password mistake on the same day is above 20 times; Afterwards, at step S808, move back card or gulp down card, end operation.
(2) if the wrong counting ≠ 20 of password then at step S809, judges whether T equals 3.In two kinds of situation:
1. as if T=3, then at step S810, central host CPU will input the password mistake by the 3rd I/O interface and issue terminating machine above 3 times instruction by prepositive communication computer and internet.At step S811, end host CPU receives this instruction by the second communication interface; And at step S812, terminal display prompting input password mistake is above 3 times.Forward step S808 then to.
2. T<3, terminal display prompting user " input password " (step S813) then, user by user's keyboard input password after (step S814).End host CPU fetches password by the interface integrated circuit board from user's keyboard, and by second communication interface and internet password is issued Center For Information Management (step S815).Then, the password (step S816) sent from prepositive communication computer receiving terminal machine by the 3rd I/O interface of central host CPU.And the password of this magnetic card in the password and second database sent into comparer (step S817) together.Result relatively is divided into two kinds of situations (step S818) again:
(1) password difference.At step S819, wrong counting unit of the password of this magnetic card and T all add 1.At step S820, central host CPU issues terminating machine with the instruction that requires to re-enter password by prepositive communication computer and internet by the 3rd I/O interface.At step S821, end host CPU receives this instruction by the second communication interface." the password mistake is re-entered in the terminal display prompting at step S822! ".Forward step S803 then to, restart to input password and proof procedure.
(2) password is identical.At step S823, central host CPU is effectively instructed this magnetic card authentication by the 3rd I/O interface and issues terminating machine by prepositive communication computer and internet.At step S824, end host CPU receives this instruction by the second communication interface; And at step S825, terminal display prompting " this magnetic card authentication is effectively ".At last, finish authentication (step S826).
7. the processing of " dead card " and look into robber's flow process
Below the process flow diagram of contrast Fig. 9 is described the processing procedure of present embodiment to " dead card ", and this process is that the present invention looks into robber and antitheft core, also is the difficult point that system and safety detection method will solve.At the step S511 of Fig. 5, if comparer is different to two in magnetic card and the database secondary card numbers results relatively, promptly forward the beginning (step S901) of this flow process to, system looks into robber, antitheft processing.
At first, at step S902, central host CPU looks for from the record of the 3rd this magnetic card of database and the identical secondary card number of the secondary card number of magnetic card, and at step S903, will search number of times and subtract 1 and send into M (M is a storage unit).
Below implication and the computing method of M are done detailed explanation.Here said M means be stolen at that time the secondary card number change frequency of secondary card number when being found of card information.When " dead card " was true card, M was the stolen number of times of this true card; When " dead card " was false card, this really blocks stolen number of times obviously was 1, and M does not then have practical significance.For example, one really be stuck in use for its 3rd time in its information stolen by other people, and after this, copy the information reproduction in this true card to become false card.The precedence that true and false card uses after being stolen by information below is elaborated to the secondary card number order of this magnetic card of preservation in the 3rd database and the computing method of M value in two kinds of situation.
When the vacation card prior to the use of participating in business of this true card, and after should the vacation card having used 4 times, true card just reuses, the secondary card number of this magnetic card of preservation is seen Figure 15 in proper order in then described the 3rd database.
Figure C0312034500231
Figure C0312034500232
True card card holder holds true card in its 4th and participates in business when using, the secondary card number of this magnetic card that its secondary card number of system discovery and second database are preserved (is secondary card number 7, specifically see the step S509-S510 of Fig. 5) difference, then last secondary card number (being secondary card number 7) is looked into from this magnetic card record of the 3rd database.When finding the 5th time, it is identical with the secondary card number of true card to find secondary card number 3.M equals to search number of times and subtracts 1, and M=4 (being 5-1) then promptly should true card have had 4 numbers altogether stolen.
Take seriously card prior to uses of participating in business of vacation card, and after this true card used 4 times again, the false card just brought into use, and the secondary card number of this magnetic card of preservation is seen Figure 14 in proper order in then described the 3rd database.
Figure C0312034500241
Figure C0312034500242
False card card holder participates in business when using holding false card first, the secondary card number of this magnetic card that its secondary card number of system discovery and second database are preserved (is secondary card number 7, specifically see the step S509-S510 of Fig. 5) difference, then last secondary card number (being secondary card number 7) is looked into from this magnetic card record of the 3rd database.When finding the 5th time, it is identical with the secondary card number of false card to find secondary card number 3.The calculating of M is with preceding identical, but should vacation card access times obviously be 1.The true and false processing that reaches the M value how to differentiate " dead card " specifies in Figure 10.
Then, at step S904, in two kinds of situation to lookup result:
(1) finds secondary card number.At step S905, central host CPU takes out main card number, the steal information terminating machine of magnetic card and numbers, swipes the card the time on date from this record of the 3rd database, and send the center printer prints with this terminating machine of the swiping the card numbering and the time on date of swiping the card.At step S906, turn to the step S111 of Figure 11, promptly call processing to taking the anti-theft measure flow process stealing the used magnetic card of card information terminating machine.
(2) can not find out secondary card number.At step S907, central host CPU reaches " the terminating machine numbering that can't find steal information " with main card number, this terminating machine numbering of swiping the card, the time on date of swiping the card and send the center printer prints together.Where stolen because of determining when, can't determine also whether card information is stolen, so with clear 0 (the step S908) of M.
Then, at step S909, central host CPU issues second alarm by the 3rd I/O interface with alarm command, and at step S910, second alarm sends alerting signal.Then, at step S911, central host CPU issues terminating machine by the instruction that the 3rd I/O interface will require the card holder to import the original auxiliary card number by prepositive communication computer and internet.
End host CPU receives this instruction (step S912) by the second communication interface.After receiving instruction, end host CPU issues first alarm (step S913) by the interface integrated circuit board with alarm command; First alarm sends alerting signal (step S914).
At last, at step S915, chronotron enters the time-delay timing.Can allow the terminal management personnel like this before terminating machine prompting user imports the original auxiliary card number, have time enough to be on the scene, so that " dead card " that disposal system is found.Timing is arrived, and then at step S916, the step S1001 that forwards Figure 10 to handles input original auxiliary card number and checking flow process, and the true and false of " dead card " differentiated at last.
8. import the treatment scheme of original auxiliary card number and checking
Figure 10 represents the process flow diagram of embodiment of the invention processing input original auxiliary card number and proof procedure.
Below contrast the process flow diagram of Figure 10, the differentiation process that the detailed description system is true and false to " dead card ", this process is one of difference of the present invention and prior art, also is one of main points of the present invention.From the step S916 of Fig. 9, forward the beginning (step S1001) of this flow process to.
At first, at step S1002, terminal display prompting " input original auxiliary card number "; At step S1003, the card holder is by user's keyboard input original auxiliary card number.If overtime nothing input, then system thinks that this card is false card, forwards step S1008 to; Otherwise at step S1004, end host CPU fetches the original auxiliary card number by the interface integrated circuit board from user's keyboard, and by second communication interface and internet the original auxiliary card number is issued Center For Information Management.
Then, at step S1005, the original auxiliary card number that central host CPU sends from prepositive communication computer receiving terminal machine by the 3rd I/O interface.And at step S1006, central host CPU sends the original auxiliary card number of this magnetic card in the original auxiliary card number and second database into comparer together.Comparative result is (step S1007) in two kinds of situation:
(1) original auxiliary card number difference.At step S1008, the step S121 that forwards Figure 12 to handles false card flow process.
(2) the original auxiliary card number is identical.At step S1009, the M value is differentiated:
1. M equals 0.Then forward step S1012 to.
2. M is not equal to 0.At step S1010, second counter adds M, and promptly false card has used M time altogether, so all false use total degrees that block that system has found add M.At step S1011, first counter adds 1, i.e. the vacation found of system blocks total number and adds 1.
Then, at step S1012, central host CPU is with the wrong counting unit clear 0 of the password of looking into this magnetic card in second database.At step S1013, central host CPU is blocked this for the effective instruction of card by the 3rd I/O interface and issues terminating machine by prepositive communication computer and internet.At step S1014, end host CPU receives this instruction by the second communication interface.And at step S1015, " this card allows to use for effectively blocking in the terminal display prompting! ".
At last, at step S1016, the step S701 that forwards Fig. 7 to handles effectively card flow process.
9. to taking the treatment scheme of anti-theft measure stealing used magnetic card on the card information terminating machine
Figure 11 illustrates the embodiment of the invention and finds card information after being stolen on certain terminating machine, and system employs prevention to used other magnetic card on this terminating machine and continues stolen measure flow process.This measure is that prior art is not available, also is one of main points of the present invention, and it can greatly improve the risk of appropriator, in use causes the feared state of mind for appropriator, thereby produces huge deterrent effect.From the step S907 of Fig. 9, forward the beginning (step S111) of this flow process to.
At step S112, central host CPU finds out the main card number of used magnetic card of time to current time on steal information date and the sign of reporting to the police from the record of the 4th database steal information terminating machine.At step S113, judge whether to finish.If finish, then forward step S115 to.Otherwise, at step S114, the sign of reporting to the police is differentiated, the result in two kinds of situation:
(1) warning sign is not equal to " 0 ", and illustrative system is reported to the police, and has taked the precautionary measures.At step S115, finish antitheft processing procedure, return the step S909 of Fig. 9.
(2) warning sign equals " 0 ", and illustrative system is not reported to the police, and then takes preventive measures.At step S116, change warning sign corresponding in the record of the 4th this terminating machine of database into " 1 ".Then, at step S117, the second random number code maker produces a secondary card number.At step S118, central host CPU replaces the secondary card number of this magnetic card in second database with this pair card number.Forward step S112 at last to, continue to look into next record.
For example: a terminating machine is numbered the terminating machine of numbering 6, in use brushes g altogether and opens magnetic card, is found 3 of times on date by system simultaneously and steals card information, and the current time is time on date g.The data of swiping the card of this terminating machine of preserving in such the 4th database (i the data of swiping the card that is recorded as terminating machine numbering 1-5 arranged before it) is:
The recording mechanism terminating machine is numbered main card number time on the date sign type amount of money of swiping the card of reporting to the police of swiping the card
I+1 numbers 6 main 1 time on date 1 " 0 " of the card number Class1 amount of money 1
I+2 numbers 6 main 2 time on date of card number, 2 " 0 " types, 2 amount of money 2
I+3 numbers 6 main 3 time on date of card number, 3 " 1 " types, 3 amount of money 3
I+4 numbers 6 main 4 time on date of card number, 4 " 1 " types, 4 amount of money 4
I+5 numbers 6 main 5 time on date of card number, 5 " 1 " types, 5 amount of money 5
---
I+g numbers 6 main card number g time on date g " 1 " type g amount of money g
Secondary card number corresponding with the digital card of main card number 3-master card number g in second database will make corresponding changes.
10. false treatment scheme of blocking
Figure 12 illustrates the vacation card processing procedure of the embodiment of the invention to finding.From the step S1008 of Fig. 9, forward the beginning (step S121) of this flow process to.
At first, at step S122, second counter adds 1, and promptly the use total degree of the various false card found of system adds 1.At step S123, first counter adds 1, and promptly total number of the various false card found of system adds 1.
Then, at step S124, central host CPU is that the false instruction that blocks is issued terminating machine by prepositive communication computer and internet by the 3rd I/O interface with this card.At step S125, end host CPU receives this instruction by the second communication interface.
At step S126, " this card is false card, does not allow to use in the terminal display prompting at last! ", and, confiscate magnetic card and end operation at step S127.
11. the self-service treatment scheme of reporting the loss of magnetic card
Figure 13 represents the self-service process flow diagram of reporting the loss of embodiment of the invention processing magnetic card.
Below contrast the process flow diagram of Figure 13, the detailed description system is to the self-service processing procedure of reporting the loss of magnetic card, and this process is one of difference of the present invention and prior art, also is one of main points of the present invention.The person of reporting the loss enters the beginning (step S1301) of this flow process after terminal is selected to report the loss function.
At first, at step S1302, terminal display prompting " input magnetic card master card number "; At step S1303, the person of reporting the loss imports main card number by user's keyboard; At step S1304, end host CPU fetches main card number by the interface integrated circuit board from user's keyboard.At step S1305, terminal display prompting " input magnetic card password "; At step S1306, the person of reporting the loss is by user's keyboard input password; At step S1307, end host CPU fetches password by the interface integrated circuit board from user's keyboard.At step S1308, end host CPU by second communication interface and internet with main card number, password, terminating machine numbering, report the loss the time on date and report the loss function code and issue Center For Information Management.At step S1309, the data that central host CPU sends from prepositive communication computer receiving terminal machine by the 3rd I/O interface.
Then, at step S1310, central host CPU looks into the main card number of this magnetic card from second database.At step S1311, judge lookup result, in two kinds of situation:
(1) do not find main card number, then at step S1312, central host CPU issues terminating machine with main card number or the wrong instruction of password input by prepositive communication computer and internet by the 3rd I/O interface.At step S1313, end host CPU receives this instruction by the second communication interface; " main card number or password mistake are re-entered in the terminal display prompting at step S1314! ".Then, forward step S1302 to, re-enter main card number and password.
(2) find main card number, then at step S1315, central host CPU sends the password of this magnetic card in the password and second database into comparer together.Comparative result is (at step S1316) in two kinds of situation:
1. password is inequality, then forwards step S1312 to and handles (processing procedure is identical with (1)).
2. password is identical, and then at step S1317, the second random number code maker produces each one in original auxiliary card number, secondary card number and password respectively.At step S1318, central host CPU replaces the corresponding information of this magnetic card in second database with new original auxiliary card number, secondary card number and the password that produces; And at step S1319, with main card number, secondary card number, terminating machine numbering, report the loss the time on date and report the loss the record back that function code etc. is added the 3rd this magnetic card of database to; Afterwards, at step S1320, with main card number, terminating machine numbering, report the loss the time on date and report the loss function code and send the center printer prints.At step S1321, central host CPU issues terminating machine by the instruction that the 3rd I/O interface is reported the loss this magnetic card success by prepositive communication computer and internet.At step S1322, end host CPU receives this instruction by the second communication interface; And at step S1323, with main card number, terminating machine numbering, report the loss the time on date and report the loss the function code end printer prints of making arrangements for his funeral.At step S1324, terminal display prompting " report the loss successfully, please fetch and report the loss list ", last, at step S1325, the person of reporting the loss fetches and reports the loss list, end operation.
Specifically describe digital card safety on line check system structure of the present invention in the above by way of example and use on the basis of operating process of digital card safety on line inspection method of this digital card safety on line check system, the further comparison by similar technology in system and method for the present invention and the prior art is so that understand marrow of the present invention more fully.
First aspect, the generation form of compound card number and original auxiliary card number.As mentioned above, used digital card is provided with secondary card number in the digital card safety on line check system of the present invention, and the main card number of described secondary card number and digital card is formed the compound card number of digital card; Described digital card also has the original auxiliary card number.Wherein main card number is by pre-determined one of hair fastener unit the ordinal number numbering to be arranged, and secondary card number and original auxiliary card number are random number.
List the generation form of digital card card number of the present invention and the contrast of prior art individual features in the following table 3
Table 3
Figure C0312034500281
Second aspect, the status flag of compound card number and original auxiliary card number.The main card number of the used digital card of the present invention and original auxiliary card number are unique numbers, are static.And in each the use, secondary card number but is the number of a variation, is dynamic.Just the existing static state of authentication information has dynamic again.
List the state of digital card card number of the present invention and the contrast of prior art individual features in the following table 4:
Table 4
Figure C0312034500291
The third aspect, the preserving type of compound card number and original auxiliary card number.Main card number both had been printed on the surface (as seen) of digital card carrier, was written to again in the information carrier and database of digital card.Secondary card number is written in the information carrier (change) and database (keep and change, be called and stay old depositing newly) of digital card, and is not printed on the surface (invisible) of digital card carrier.The original auxiliary card number is printed on the surface of digital card carrier, but covers (scraping overlayer off promptly as seen) with coating, is not written to the information carrier of digital card, only is written in the database.
List the preserving type of digital card card number of the present invention and the contrast of prior art individual features in the following table 5:
Table 5
Figure C0312034500292
Fourth aspect, the effect of compound card number, original auxiliary card number and password.Main card number is the identity symbol of digital card, and it is as the outstanding feature of digital card.It is unique constant, also can think first sect that system is provided with.Therefore have only main card number to drop within the scope of system's regulation, digital card just is adapted at this system and uses.
Secondary card number is replenishing of main card number effect and expansion, and a main card number can have a plurality of secondary card numbers corresponding with it in the different moment.In each the use, it is a random variation, but a main card number can only have a secondary card number corresponding with it simultaneously, and therefore for system, at a time the effective secondary card number of digital card is again unique.Can think that it is second sect that system is provided with, and second sect is made up of a plurality of wickets, synchronization can only be opened a wicket (corresponding some secondary card numbers).After passing through, system specifies the wicket (corresponding another secondary card number) that next time can open again.
The original auxiliary card number is the true and false unique sign of discriminating digit card, and its role is equivalent to the skeleton key at system second sect.When digital card gone to the wrong way wicket (be system find secondary card number not to) and when can't pass second sect, system requirements comes the true and false of discriminating digit card by the original auxiliary card number.If genuine, system allows by second sect, and specifies the wicket that next time can open.If false, system does not allow by second sect.
Password is to differentiate whether the card holder has the sign of digital card legitimate right, can think that it is the 3rd sect that system is provided with.And the 3rd sect is made up of a plurality of wickets, and synchronization can only be opened a wicket (corresponding some passwords), but opens which wicket by the prior appointment of the owner, and wanting to change also is to be determined by the owner.
Below list the effect of digital card card number of the present invention, password and the contrast of prior art individual features in the table 6:
Table 6
Figure C0312034500301
What should illustrate is, though the authentication of top magnetic card with the managed fund account on terminating machine, antitheft, look into and steal and the self-service process of reporting the loss is an example, digital card safety on line check system of the present invention and inspection method are described, this is not a limitation of the present invention.In fact, system and method for the present invention is applicable to any known digital card, comprises the digital card carrier of magnetic stripe, IC chip, optical recording layer and any recording medium that other can be read and write by read write line.Range of application and management object to system and digital card do not limit yet in addition.Can be applied to bank, security, trust, telecommunications, commerce, health, tourism, diet, industry and commerce, the tax, customs, public security, traffic and other field.The object of management can be the information of fund, stock, futures, air ticket, ticket, admission ticket, air time, electric weight, the water yield, article, data and other various uses.

Claims (17)

1. a digital card safety on line check system is made up of five parts such as digital card, card sender, terminating machine, Center For Information Management and networks, it is characterized in that:
Described digital card is for having a carrier digital card to what the card internal information was read and write by read write line, and digital card is provided with main card number, original auxiliary card number, secondary card number;
Described card sender comprises hair fastener main frame and hair fastener peripherals, and wherein the hair fastener main frame comprises the hair fastener host CPU, and it links to each other with first communication interface, the first random number code maker, first memory, first database and an I/O interface respectively; And a described I/O interface links to each other with hair fastener peripherals, and the first random number code maker by card sender during hair fastener produces original auxiliary card number and secondary card number;
Described terminating machine comprises end host and terminal peripherals, and wherein end host comprises end host CPU, and it links to each other with chronotron, second communication interface, second memory, the 2nd I/O interface and interface integrated circuit board respectively; And described the 2nd I/O interface is connected with terminal peripherals; Described interface integrated circuit board links to each other with terminal peripherals;
Described Center For Information Management comprises central host, prepositive communication computer and central periphery equipment, wherein central host comprises central host CPU, and it links to each other with first counter, second counter, the 3rd storer, comparer, the second random number code maker, second database, the 3rd database, the 4th database and the 3rd I/O interface respectively; And described the 3rd I/O interface links to each other with prepositive communication computer, central periphery equipment respectively, the second random number code maker by Center For Information Management during transaction produces a new secondary card number to replace original secondary card number in the digital card, and the second random number code maker by Center For Information Management after digital card is reported the loss produces new original auxiliary card number and secondary card number;
Described network links to each other with Center For Information Management by prepositive communication computer, and first communication interface by described card sender links to each other with card sender respectively, and links to each other with terminating machine by the second communication interface of terminating machine.
2. digital card safety on line check system as claimed in claim 1 is characterized in that: described digital card is that the digital card of user cipher or the digital card of no user password are arranged.
3. digital card safety on line check system as claimed in claim 1 is characterized in that: described digital card comprises magnetic card, IC-card, light-card, TM card.
4. digital card safety on line check system as claimed in claim 1 is characterized in that: described digital card is applicable to multiple medium and multiple password form simultaneously.
5. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described card sender can be one one or multi-section.
6. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described terminating machine can be one one or multi-section.
7. digital card safety on line check system as claimed in claim 6 is characterized in that: described terminating machine is one or more in POS machine, the ATM.
8. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described hair fastener peripherals can be an one or a few portion in display, keyboard, printer, the digital card read write line.
9. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described terminal peripherals can be an one or a few portion in display, operator's keyboard, user's keyboard, printer, digital card read write line, alarm, counting module, fuel charger, vending machine, ticket machine, automatically-controlled door, gamma camera, OCR wand, the meter electronics.
10. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described central periphery equipment can be an one or a few portion in display, keyboard, printer, the alarm.
11. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described digital card read write line can be an one or a few portion in magnetic card read write line, IC-card read write line, light-card read write line, the TM card reader.
12. as each described digital card safety on line check system of claim 1 to 4, it is characterized in that: described network comprises one or more among LAN (Local Area Network), internet, DDN, the PSTN.
13. the digital card safety detection method with the described digital card safety check system of claim 1 is characterized in that described method comprises the steps:
Generate main card number, original auxiliary card number, the original password of digital card by card sender, and give digital card manufacturer with these data and make digital card;
Hair fastener person is input to card sender with the main card number and the personal information of digital card;
The card sender first random number code maker generates secondary card number, and by the digital card read write line the main card number of digital card, secondary card number and part personal information is write in the information carrier of digital card;
Card sender is issued Center For Information Management with described main card number, original auxiliary card number, original password, secondary card number, card sender numbering, card-issuing date time and personal information; And with corresponding file maintenance in second database and the 3rd database at this center;
When swiping the card, end host reads the digital card read write line from digital card main card number, secondary card number and terminating machine numbering, the time on date of swiping the card etc. are dealt into Center For Information Management together;
Central host will be taken out the secondary card number of this digital card and the secondary card number received from second database and be sent into comparer and compare; When secondary card number comparative result equates, system assert that this card is effective, and by the new secondary card number of second random number code maker generation, replaces the secondary card number in this digital card carrier and second database;
Unequal when secondary card number comparative result, system assert that this card is a dead card, and central host utilizes main card number and secondary card number to find terminating machine numbering and the date time of digital card information when stolen from the 3rd database; From the 4th database, find simultaneously from this time on date used digital card on this terminating machine so far, and change the secondary card number of these digital card in second database; The user is behind the correct original auxiliary card number of terminating machine input then, and system assert that this card is true card, and changes the secondary card number of this card, recovers its validity, otherwise system assert this card and be false card, refuses this card continuation use;
Effective card for system is assert after the user inputs password, correctly then allow to use, otherwise refusal uses;
When the user when terminating machine selects to report the loss function, with main card number and password entry terminal machine, terminating machine with itself and terminating machine numbering, report the loss the time on date and report the loss information such as function code and be dealt into Center For Information Management together, and carry out main card number retrieval and password compares; Password is correct, then accepts to report the loss, and the second random number code maker generates new secondary card number, original auxiliary card number and password, replaces corresponding information in second database, and terminal printer is printed and reported the loss list simultaneously; Otherwise refusal is reported the loss.
14. as method as described in the claim 13, it is characterized in that: described original auxiliary card number is a fixing random number, is stored in the database, and is printed on the digital card carrier surface, the back covers with coating, scrapes off as seen.
15. as method as described in the claim 13, it is characterized in that: described secondary card number is a random variation, and staying old depositing in the information carrier that new storage mode is stored in database and digital card, and invisible.
16. as method as described in the claim 15, it is characterized in that: the secondary card number of described random variation, promptly every use once back are a new secondary card number by randomly changing.
17., it is characterized in that: describedly stay the old new storage mode of depositing, after promptly each the use, both kept the secondary card number before changing, change current secondary card number again as method as described in the claim 15.
CNB031203450A 2002-10-31 2003-03-15 Digital card online safety inspection system and method of safety inspection Expired - Fee Related CN100397388C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031203450A CN100397388C (en) 2002-10-31 2003-03-15 Digital card online safety inspection system and method of safety inspection

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN02135063.9 2002-10-31
CN02135063 2002-10-31
CNB031203450A CN100397388C (en) 2002-10-31 2003-03-15 Digital card online safety inspection system and method of safety inspection

Publications (2)

Publication Number Publication Date
CN1499398A CN1499398A (en) 2004-05-26
CN100397388C true CN100397388C (en) 2008-06-25

Family

ID=34276010

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031203450A Expired - Fee Related CN100397388C (en) 2002-10-31 2003-03-15 Digital card online safety inspection system and method of safety inspection

Country Status (1)

Country Link
CN (1) CN100397388C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542672A (en) * 2010-12-13 2012-07-04 周锡卫 System and method for actively preventing information cards from being stolen
CN106257493B (en) * 2016-08-30 2024-03-19 重庆市城投金卡信息产业(集团)股份有限公司 Identification method and identification system for traffic preference card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000067214A1 (en) * 1999-04-28 2000-11-09 Gift Pd Corporation Method of issuing pre-paid card and method of authorizing pre-paid card and supervising balance thereof
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000067214A1 (en) * 1999-04-28 2000-11-09 Gift Pd Corporation Method of issuing pre-paid card and method of authorizing pre-paid card and supervising balance thereof
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card

Also Published As

Publication number Publication date
CN1499398A (en) 2004-05-26

Similar Documents

Publication Publication Date Title
US11908030B2 (en) Secure transaction system
US10134033B2 (en) Payment system and method using IC identification card
US4214230A (en) Personal identification system
CN103714626B (en) Many password early warning types can different card control bank card
EP0729120A2 (en) Method and apparatus for image based validations of printed documents
US20030233557A1 (en) Electronic signature verification method and apparatus
US20100169223A1 (en) Payment System and Method Using an IC Identification Card
US9196111B1 (en) Automated teller machine (“ATM”) dynamic keypad
JPS6149714B2 (en)
JPS645783B2 (en)
CN101894424A (en) Trading card processing system and method for improving safety
US20060174134A1 (en) Secure steganographic biometric identification
Korauš et al. SECURITY ASPECTS: PROTECTION OF PEOPLE IN CONNECTION WITH THE USE OF PERSONAL IDENTIFICATION NUMBERS.
Murugesh Advanced biometric ATM machine with AES 256 and steganography implementation
CN106097601A (en) Banking system and the method for account is entered without card intelligence
CN100397388C (en) Digital card online safety inspection system and method of safety inspection
CN101482996A (en) Finance terminal and finance system and its implementing method
WO2004052656A2 (en) Document with user authentication
JP2006293454A (en) Personal identification method and system
CN201307313Y (en) Financial terminal and a financial system
Gupta et al. Secure Withdrawal From Atm Using Biometric Fingerprint
Shailesh et al. VARIED PIN ENTRY SYSTEM USING DYNAMIC PASSWORD
Motseki Prospects and challenges in the investigation of credit card fraud in Vall Region of the Gauteng Province, South Africa
KR100542596B1 (en) The ID authentication system ? method of the bank's ATM ? card verification terminal.
KR20030016338A (en) Cash card system using rfid skill and operating method therof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080625

Termination date: 20130315