CN1313576A - Method for discriminating user of card (credit card) or code to be its owner - Google Patents

Method for discriminating user of card (credit card) or code to be its owner Download PDF

Info

Publication number
CN1313576A
CN1313576A CN 00103784 CN00103784A CN1313576A CN 1313576 A CN1313576 A CN 1313576A CN 00103784 CN00103784 CN 00103784 CN 00103784 A CN00103784 A CN 00103784A CN 1313576 A CN1313576 A CN 1313576A
Authority
CN
China
Prior art keywords
card
pins
computer
card holder
holder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 00103784
Other languages
Chinese (zh)
Inventor
刘国胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 00103784 priority Critical patent/CN1313576A/en
Publication of CN1313576A publication Critical patent/CN1313576A/en
Pending legal-status Critical Current

Links

Images

Abstract

A method for discriminating the user of a card (credit card) to be its owner features that the card owner uses a special telephone with incoming display to dial an authencated computer and input a cipher to obtain a random number as key. The key is encrypted and then stored in the computer. When the card owner uses the card for shopping he provides the card number and the encrypted key to computer for comparison. The encypted key is used once only, and then immediated destroyed, so the card can not be used again.

Description

Distinguish the method for the user of card such as credit card or code for the original card owner
The present invention relates to a kind of method of distinguishing the user of card such as credit card or code for the original card owner, especially finger is a kind of need obtain a pins earlier before credit card uses, computer comparison for authenticated unit, and destroyed after once in comparison, prevent the discrimination method forging, duplicate or falsely use to reach.
Current, because the large-scale popularization of credit card, though bring suitable convenience in people's life, but the crime that the thing followed is forged, duplicated, falsely uses even the card holder denies etc. afterwards, dispute thing, make card holder and hair fastener unit that (bank) causes many losses, according to the statistics of units concerned, only Taiwan 1 year because of the amount of money that forged credit card lost promptly up to about 1,000,000,000 yuan of New Taiwan Currency, make hair fastener unit be unequal to burden, treat effective improvement in fact.
And along with the progress of science and technology, ecommerce and mail-order are day by day flourishing, this kind is different from the special shopping and the transaction of swiping the card then and there, just seems especially important for the identification of identity, can produce because of duplicate, forge or falsely use or I deny etc. causing heavy losses afterwards to avoid as above using credit card.
So, fundamental purpose of the present invention, promptly providing a kind of recognition credit card users such as (identity cards) method for card holder's (being the original card owner), mainly be before using, to obtain a pins earlier by the card holder, via the comparison of authenticated unit, with reach anti-counterfeiting, anti-duplicate, anti-falsely using or purpose that I deny afterwards.
Aforesaid discrimination method, but be that the password of setting with me is obtained pins again after entering the computer of authenticated unit by the telephone for special use that the card holder shows with setting incoming call via communication network.
Aforesaid discrimination method, this pins is to be entered when getting pins in the card holder by the computer of the unit of demonstration, when the input cryptographic core to after correct, produced with random number by computer immediately, and, remain in the computer by after the encryption agreement encryption of this computer with card holder's setting.
Aforesaid discrimination method, be in the card holder swipe the card shopping, mailorder or when carrying out ecommerce, send card number simultaneously and encrypt after pins, for the computer comparison of authenticated unit.
Aforesaid discrimination method is that promptly by the computer auto-destruct of authenticated unit, computer is is promptly no longer accepted any pins, enters with password until the card holder again and gets new pins after the card holder uses (being the computer comparison) pins once.
Principal feature of the present invention and novelty thereof, will be below cooperating appended illustrated embodiment detailed description and more become clear, as shown in the figure:
Fig. 1 is the process flow diagram that the present invention gets pins.
Fig. 2 is the process flow diagram that the present invention is used in the voice mail-order.
Fig. 3 is that of the present invention another got pins embodiment process flow diagram.
Pins adquisitiones of the present invention mainly is to be filed an application to authenticated unit by the card holder earlier, and its step is as follows:
1. the card holder is to issuing bank or hair fastener unit; file an application the credit card or the identity card (or code) protected (need add that promptly pins can use) of its use, my telephone for special use (or mobile phone) number of getting pins (can write down as in the family, a plurality of phones such as company) is provided simultaneously.
2. give the applicant by the password of authenticated unit mailing sealing, and the payment received that adds their confirmation, otherwise in certain hour by the computer auto-destruct, authenticated unit is with card number and get the telephone number of pins, and password etc. is based upon the computer inside of its setting, and sets up the equipment of getting pins, this equipment is a computer telephone integration system (CTI, Computer Telephone Integration), and provides a representative telephone number, for entering computer.
3. this authenticated unit is to can be hair fastener unit (issuing bank), or with the individual of hair fastener unit's pc connection.
4. the computer of authenticated unit will can not be accepted two identical card number logins, also can not accept same telephone for special use and be set in two different cards.
5. the card holder is after finishing above-mentioned program, telephone for special use that promptly can its registration, and the computer that enters authenticated unit via communication network is obtained pins, and its flow process is shown in Fig. 1 (Fig. 1 illustrates to set telephone for special use and gets the computer telephone integration system of pins):
A. the card holder dials representative with the telephone for special use of setting and number enters computer, inputs password again.
B. computer will contrast in card number with the caller ID telephone number of telephone for special use with the card holder, again with card number comparison password, if errorless next program of being allowed for access.
When C. connecting for the first time, computer will require the card holder to set to encrypt agreement, and (as by 11, if the pins of obtaining is 20, when then using credit card, the pins of its input is required to be 31, and this enciphered digital be permanent reservation.)
D. password can be changed arbitrarily, thus enter for the first time computer configure encrypt agreement after, should be earlier by 2, with change of secret code, enter system is handy new password next time, as shown in the figure, by 1, can obtain pins behind the input password.
6. can be learnt by above-mentioned program that obtaining of pins is very simple and convenient, if representative number is 8 figure places, password is 4 figure places, and its total can obtain by 13 numerals.
7. pins is the random number that computer produces at random, can't judge according to this or infer with probability or rule.
8, after pins is compared once, no matter mistake is promptly destroyed immediately.
9. pins forgets that can to get one again newer, but password and encrypt agreement if forget must be applied for again to authenticated unit.
10. this pins is used as follows after obtaining:
A. swipe the card when shopping, the card holder will block when giving businessman, inform the pins after the encryption simultaneously, compare via merchant bank and issuing bank to the computer of authenticated unit for businessman's input, can accept after errorless.
When B. using ecommerce, the card holder inputs to authenticated unit with the pins of card number after encrypting via businessman and hair fastener unit, the computer of businessman is line together also, can determine whether immediately into the card holder (original card owner), if when being used in e-bank, then businessman promptly represents e-bank.
When C. being used in mail-order, the fax etc. because the present mail-order approach data of must filling out is signed again, often allow and subscribe buyer (card holder) and feel trouble, use the present invention, can be as shown in Figure 2, Fig. 2 illustrates voice mail-order process flow diagram, by the card holder with the phone computerized speech system of dragging on, simultaneously send card number with button and encrypt after pins, commercial disignation by button input mail-order, the computer of this computerized speech system and the pc connection of authenticated unit finish transaction through comparing errorless rear, and the card holder can't be in deny afterwards.
But 11. the present invention in using the also measure of add-on security and convenience, as shown in Figure 3, Fig. 3 illustrates and adds that other reaches the computer telephone integration system that makes things convenient for measure to get pins safely, wherein:
A. security:
A. pins also can be via wireless data transmission to mobile phone or calling set, and can set up on their own.
B. but pins takes out and uses preceding setting-up time, by the computer auto-destruct, also can enter computer and initiatively destroy.
C. encrypt can set more complicated, as+,-, *, ÷.
Whether d. if successfully enter system's (being that password is errorless), then system can report the number of times that enters to work as sequence number earlier, once invaded by other people to allow the card holder check, and sequence number can be by 0 to 9 circulation.
E. after inputing password, hit or miss, all can notify the card holder immediately at every turn, have other people to invade with vigilance via the means of communication (phone or calling set) that the card holder sets.
B. convenience:
When a. getting pins, also can be obtain, only need input * keyboard, by special-purpose telephone number, press password again and get final product again, also can import the # keyboard, press card number again and press password again and get final product with the telephone for special use of setting.
B. pins is encrypted and also can not set, or does not set permanent.
C. pins also can be set not ruining of using, and for repeatedly using, until initiatively entering destruction, or gets new pins.
D. can set one below the amount of money, not need pins.
E. three mistake sides of password with close.
F. the telephone number of variable special use.
G. can once (enter system) and get a plurality of pins, use in regular turn.
Pins also can be imported card number on network and password is obtained 12. get.

Claims (8)

1. method of distinguishing the user of card such as credit card or code for the original card owner, with prevent its card be replicated, forge, falsely use or this human card after deny etc. situation it is characterized in that the method comprises following process:
By the card holder to have the telephone for special use that caller identification sets, enter the computer of authenticated unit via communication network, and the password that input sets up on their own reaches a pins, instantly the computer by authenticated unit produces a pins with random number, and after the encryption that sets with card holder agreement encrypted, reside in the computer, by computer this pins is informed the card holder simultaneously;
The card holder in swipe the card, ecommerce or when mail-order, send card number simultaneously and encrypt after this pins confess the computer comparison of card unit via hair fastener unit, to confirm card holder's identity;
Encrypted pins in this authenticated unit computer after using comparison once, though to mistake promptly by auto-destruct, when in the computer during no pins, this card is a complete failure.
2. the method for claim 1 is characterized in that, described pins can be destroyed from being advanced into computer by the card holder before taking out not use, or is set in auto-destruct in the certain hour.
3. the method for claim 1 is characterized in that, described pins can be selected to set and keep for repeatedly using by the card holder, obtains new sign indicating number again or initiatively enters destruction until the card holder.
4. the method for claim 1 is characterized in that, the card holder can also non-ly set the special-purpose specific keyboard of phone input, to obtain pins.
5. the method for claim 1 is characterized in that, the encryption agreement of this pins is to can be any compute mode or be set at alterability, or is cancelled.
6. the method for claim 1 is characterized in that, this pins can be via wireless data transmission to be shown in mobile phone or calling set.
7. the method for claim 1 is characterized in that, a plurality of pins are got by the system that can once enter, and uses in regular turn.
8. the method for claim 1 is characterized in that, this pins can apply to the transaction that places an order of voice mail-orders or voice, judges immediately that pins after the encryption is whether errorless and whips up transaction via computer.
CN 00103784 2000-03-10 2000-03-10 Method for discriminating user of card (credit card) or code to be its owner Pending CN1313576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 00103784 CN1313576A (en) 2000-03-10 2000-03-10 Method for discriminating user of card (credit card) or code to be its owner

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 00103784 CN1313576A (en) 2000-03-10 2000-03-10 Method for discriminating user of card (credit card) or code to be its owner

Publications (1)

Publication Number Publication Date
CN1313576A true CN1313576A (en) 2001-09-19

Family

ID=4577110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 00103784 Pending CN1313576A (en) 2000-03-10 2000-03-10 Method for discriminating user of card (credit card) or code to be its owner

Country Status (1)

Country Link
CN (1) CN1313576A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100370743C (en) * 2004-06-16 2008-02-20 华为技术有限公司 Interacting method for customer apparatus and network apparatus
CN102817168A (en) * 2012-04-12 2012-12-12 洪荣豪 Shearing device of circular knit towel weaving machine

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100370743C (en) * 2004-06-16 2008-02-20 华为技术有限公司 Interacting method for customer apparatus and network apparatus
CN102817168A (en) * 2012-04-12 2012-12-12 洪荣豪 Shearing device of circular knit towel weaving machine
CN102817168B (en) * 2012-04-12 2016-04-06 洪荣豪 The sheep shearing unit of tubular knitting towel braiding machine

Similar Documents

Publication Publication Date Title
US5940511A (en) Method and apparatus for secure PIN entry
AU2007202243B2 (en) System portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
US6990586B1 (en) Secure data transmission from unsecured input environments
US9069975B2 (en) Device and method for concealing customer information from a customer service representative
US5724423A (en) Method and apparatus for user authentication
CN108197890A (en) A kind of Self-Service processing method, apparatus and system
CN102638447B (en) Method and device for system login based on autonomously generated password of user
US20090217035A1 (en) Bilaterally Generated Encryption Key System
CN108090761A (en) Block chain token method of payment based on credible two-dimension code
CN110245482B (en) Authentication method and system
CN105320864A (en) Method and apparatus for processing event operation
JPWO2003069489A1 (en) Identification method
WO2004114075A2 (en) Method, system, and apparatus for identification number authentication
WO2006117806A2 (en) Bilaterally generated encryption key system
CN100454809C (en) Nonrecurring countersign and business confirmation method
US20030038707A1 (en) Method for secured identification of user's id
CN106534479A (en) Cell phone password protection system based on implicit code identification and implicit conversion
US20020078360A1 (en) Method of conducting transactions
CN1313576A (en) Method for discriminating user of card (credit card) or code to be its owner
US20040243855A1 (en) Method for providing secure access to a digital resource
CN105897708A (en) Information protection method and mobile terminal
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN1963856A (en) Authentication method of safety of finance business on network
WO2005086559A2 (en) System and method for identity verification by dynamic codifier interface
JP2967456B2 (en) Authentication system

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication