TW200823807A - Anti-fraudulent method for financial service system using telephone number and identification code - Google Patents

Anti-fraudulent method for financial service system using telephone number and identification code Download PDF

Info

Publication number
TW200823807A
TW200823807A TW95143014A TW95143014A TW200823807A TW 200823807 A TW200823807 A TW 200823807A TW 95143014 A TW95143014 A TW 95143014A TW 95143014 A TW95143014 A TW 95143014A TW 200823807 A TW200823807 A TW 200823807A
Authority
TW
Taiwan
Prior art keywords
financial
card
account
credit card
identification code
Prior art date
Application number
TW95143014A
Other languages
Chinese (zh)
Inventor
Chung-Yu Lin
Original Assignee
Chung-Yu Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung-Yu Lin filed Critical Chung-Yu Lin
Priority to TW95143014A priority Critical patent/TW200823807A/en
Publication of TW200823807A publication Critical patent/TW200823807A/en

Links

Abstract

The present invention relates to an anti-fraudulent method for financial service system using telephone number and identification code. In various current financial operating systems, the account owner will further provide a set of joined telephone number and identification code to all the banks having account transactions with; and, in the internal computer database of all the banks having transactions with, they not only store the existed relating personal identification data, financial card account password, credit card data or the data of "user name" and "OTP token" of on-line banking of the account owner, but also additionally register and store the authorization verification data for the dedicated "telephone number and identification code" in the authorization verification database inside the bank. When the bank is conducting various financial services for the account owner, such as teller deposit/withdrawal or money remittance, ATM deposit/withdrawal or money transfer with financial card, swiping credit card or on-line swiping), it will not only execute the verification and matching on the original account number, password, OTP token in the computer database inside the bank, but also concurrently compare matching of the authorization verification data of the dedicated "telephone number and identification code" registered and stored in the authorization verification database inside the bank, so that the bank can concurrently ensure if the entry or the transaction service is actually a transaction with real authorization by the account owner. Thus, the present invention can prevent the occurrence of fraudulency, such as fraudulent money withdrawal, theft withdrawing or card swiping whenever the identification data is stolen, or the financial card is lost or its password is known, or credit card or personal data are lost.

Description

200823807 九、發明說明: 【發明所屬之技術領域】 * 本發明係提供—種「以^話號碼及識«做為金融 服務系'統中防弊之方法」,其是透過銀行開戶的帳戶擁 有者向所錢行提供-耗列的「電耗碼或識另f 碼」’並將訪「電話號碼或識料」登錄儲存於該銀 行内部的電腦資料庫內,使其做為銀行與帳戶擁有者之 • 間各項金融服務上的授權認證依據,除能確保彼此各項 金融交易上的更為安全外,更能有效杜絕金錢被盜領、 詐領或信用卡被盜刷等犯罪行為發生。 【先前技術】 按’自從塑膠貨幣問世以來,許多金融市場的交 易行為除傳統親臨銀行櫃台辦理外,更多的是已由 金融卡、信用卡等非現鈔塑式來完成,另加:網路 的盛行與便利,使得金融卡或信用卡的使用更加延 .伸至網路線上的消費型態,但隨著其使用普遍性的 . «大卻㈣生出許多金融交易丨㈣《與弊端如 下: • 一、當金融卡不慎遺失或遭竊時·· 由於銀fr業者競爭的關係,許多人均同時擁有—張 以上不同家銀行所製發的金融卡,而每年卻也都在發生 200823807 金融卡遺失的案件’雖然撿拾或偷竊而來的他人金融 卡,在未知其密碼的情況下是㈣盜領其金錢的,但只 要持卡人週遭朋友或同事在別有用&下,並不難探知其 密碼,例如··某些持卡人在ATM存取款的過程中,被 周遭有心人士的蓄意偷窺7而得知其密碼,再尾隨持卡 人伺機偷竊來取得其金融卡,或者,有些怕記不住自己 金融卡密碼者,常會將其密碼書寫在小紙片上後再與金 融卡置放一起,乃反而輕易地洩露了密碼,再者,更有 許多人有將個人身份證件(如身份證、健保卡、駕駛執 照、學生證、工作證等)與金融卡合置於同一皮夹內的 習It,遇有皮夹遺失或遭竊時,撿拾者或偷竊者即會將 個人身份證件上的數字資料,先行多次排列組合,再經 多次的嘗試錯誤修正後而得知密碼;凡此諸多原因及方 法而獲取他人金融卡及其密碼後,而再加以盜領成功的 案件確實不在少數,然而遭受此些實質損失金錢的遺失 者或遭竊者除自嘆倒楣外,更得面對打電話趕緊一家一 家銀行去掛失金融卡,以及後續請領補發金融卡等繁雜 手續的精神損失負荷。 二、當包含金融卡在內的帳戶被金融罪犯使用時: 近來諸多的金融犯罪案件也有逐年增加的趨勢,政 府與銀行業者莫不急於設立許多防範措施,諸如:規定 200823807 銀行開戶需具備第二身份證件、設定每日ATM轉帳金 額上限、加強宣導金融犯罪型態之認識與檢舉、金融從 業人員加強辨識金融犯罪之再教育、以及強力查缉人頭 帳戶與通報註銷等,然而透過人頭帳戶(亦稱假帳戶) 行詐騙轉帳匯款之案件仍是層出不窮,且最令警方扼腕 的是,某些犯罪者配合具有電腦專長的人員,經由網路 (Internet)擷取他人銀行帳戶,再輾轉由他人帳戶(非人 頭帳戶)轉S人犯罪者的帳戶內來取得贓款,有時為增 加警万追緝的難度,會增加轉匯的次數,如此一來便會 有許多不知情的帳戶擁有者被當成嫌疑共犯來被偵 辦,而蒙受不白之萝驵闽潙 _ ., y 之兔興困擾,迫些犯罪31態亦是對眾多 使用網路銀行或從事網路商業活動者的拌腳石。 三、當信用卡不慎遺失或遭竊或遭偽造時: 持信用卡來從事日常食、仿、 — 依住、仃、育、樂等消 費已疋現代人極為普遍的消眷 一 趨π洎費板式,再加上發行信用 銀行各種優惠商業策略推波 七± n工 反助瀾下,许多人更是同時持 有多張的is用卡,因此,告 口此田化用卡遣失或遭竊時,也就 成為金融犯罪者另一犯罪佶 就 竊取而來的信用卡,去盜刷滕^ 八還失或 經常發生,遺失或遭竊信用卡的桂广來換取金錢便 /t , g, B4 、持卡人不但須蒙受金錢 損失,R時遷得撥電話向發 銀仃掛失,並承擔後續短 200823807 暫"、、卡使用的不便窘境’萬—被製造 的信用卡時,還得為涉嫌偽造文 2偽造自己 減反增呢?如第卡屢遭偽造盜刷的案件至今仍不 程,當信用卡持卡者^係為現行信用卡之使用流 者〇至店家或網路交易對#γ卽 卡或線上刷卡+ _ X易對象1仃刷 / 吁碌店豕或網路交易對象 仃信用卡銀行2要求_描, 王動向發 資訊處理中 Λ,】由發行信用卡銀行2內部 β處理㈣卡持卡者〗 (如卡號資料、刷卡金額额 “㈣4後 同意授權,,的指亍予^ 條件符合則會回覆” 予店豕或網路交易對象1,並在兮店 或網路交易對象1沾則u 1任成店 成功、 、、機上或網路頁面上顯示刷卡200823807 IX. INSTRUCTIONS: [Technical field to which the invention pertains] * The present invention provides a method for "preventing fraudulent numbers and knowledge as a financial service system", which is owned by an account opened by a bank account. The person will provide the "power consumption code or identification code" of the money line and store the "phone number or identification" in the bank's internal computer database to make it a bank and account. In addition to ensuring the security of each other's financial transactions, it is more effective to prevent money from being stolen, fraudulent or credit card stolen. . [Prior Art] According to 'Since the advent of plastic currency, many financial markets have been dealt with in addition to traditional in-country counters, and more have been done by non-cash, such as financial cards and credit cards, plus: The prevalence and convenience of the financial card or credit card is extended to reach the consumption pattern on the Internet, but with its universal use. «Big but (4) gave birth to many financial transactions 四 (4) "The disadvantages are as follows: 1. When the financial card is inadvertently lost or stolen... Due to the competition of the silver fr industry, many people have the same financial card issued by different banks, but they are still in the year 200823807. The case 'Although the financial card of someone else who picks up or steals is (4) stealing its money without knowing its password, it is not difficult to find out if the cardholder is surrounded by friends or colleagues. Passwords, for example, some cardholders in the process of ATM deposit and withdrawal, are deliberately peeked by the people around them to know their passwords, and then follow the cardholders to steal the opportunity to obtain them. Melting cards, or some people who are afraid of not remembering their financial card passwords, often write their passwords on small pieces of paper and then put them together with the financial cards, but they easily leak the passwords. Moreover, many people have A person who puts a personal identification document (such as an ID card, health insurance card, driver's license, student ID card, work permit, etc.) and a financial card in the same wallet. When the wallet is lost or stolen, the picker or the thief That is, the digital data on the personal identification document will be arranged and combined several times in advance, and then the password will be known after repeated attempts to correct the password; after obtaining the financial card of another person and its password for various reasons and methods, There are indeed a few cases of successful thieves. However, in addition to self-sighing, those who have suffered such substantial losses of money have to face the call to hurry to a bank to report the loss of the financial card, and follow-up reimbursement. The mental loss load of complicated procedures such as financial cards. 2. When accounts including financial cards are used by financial criminals: Recently, many financial crime cases have also increased year by year. Governments and banks are not eager to set up many preventive measures, such as: requiring 200823807 to open a second bank Documents, setting a daily ATM transfer limit, strengthening awareness and reporting of financial crime patterns, strengthening the recognition of financial crimes by financial practitioners, and vigorously investigating headcount accounts and reporting cancellations, however, through headcount accounts ( Also known as fake accounts. The cases of fraudulent transfer and remittances are still endless, and the most serious thing for the police is that some offenders cooperate with people with computer expertise to take other people’s bank accounts via the Internet and then transfer them to others. The account (non-head account) is transferred to the S-criminal account to obtain the levy. Sometimes it is more difficult to increase the frequency of the police, and the number of remittances will increase. As a result, there will be many uninformed account holders. Being treated as a suspected accomplice to be investigated, and suffering from a white radish _., y rabbit is troubled, forced some 31 is a state crime also many use online banking or to engage in commercial activities of Internet stumbling. 3. When a credit card is lost or stolen or forged: The use of a credit card for daily food, imitation, reliance, sputum, education, music, etc. has become a very common phenomenon in modern people. In addition, with the issuance of various preferential business strategies of credit banks, many people are holding more than one iss at the same time. Therefore, the use of this card is rescinded or stolen. At that time, it became a credit card stolen by another financial criminal. The stolen credit card was stolen or often happened. The lost or stolen credit card of Guiguang was exchanged for money/t, g, B4, Cardholders not only have to suffer monetary losses, but when they move, they can make a phone call to report the loss of the bank, and bear the shortcomings of the short-term 200823807 temporary, and the use of the card is inconvenient. Text 2 falsification of self-reduction and increase? If the card is repeatedly forged and stolen, the case is still not working. When the credit card holder is the current credit card, the user can go to the store or online transaction to #γ卽卡 or online credit card + _ X easy object 1仃 / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / After the amount of (4) 4, you agree to the authorization, and the instructions will be returned to the store or the online transaction object1, and in the store or online transaction object 1 Swipe on the machine or on the web page

成功,反之,若條件不符A 一 、13,則回覆”不同意授權,,的指 不予店家或網路交易對翕 、、 ’並在頭店家或網路交易對 象1的刷卡機上或網路¥而, ΪΤ 六 、面上頦示刷卡失敗;前述刷卡 乂易過程中,店家人員儅 ,m 僅從刷卡單上的簽名來核對與 心用卡上的簽名字跡每 、 時 e 、相同,通常只要簽名不太離譜 時’店豕人員均會予以兮 乂私可,而盜刷者要仿造簽名並非 /、:-在盜刷削依樣畫葫蘆多練習該信用卡上的簽 名字跡幾次後,均能瞳臨 豕騙過關,再者,網路線上刷卡更 ^須看簽名字跡,只需依序輸人卡號,使用年限等資料 p可’由此觀之’在現行信用卡的使用上既無任何簡易 200823807 又可靠的機制來做為防堵反制的措施下,不論真卡或偽 卡的盜刷案件發生率-再地不斷升高,也就不足為奇 矣。 【發明内容】 本發明之主要目的在提供—種「以電話號碼及識別 竭做為金融服務系統中防弊之方法」,係由金融開戶之 戶擁有I自行提供—組併列「電話號碼及識別碼」 :專屬k權岭邊資料’給其所有開立帳戶往來的金融單 位’而該所有開立帳戶往來的金融單位在核對該帳戶擁 有者的相關身份證明資料後’即將該組併列「電話號瑪 及識別碼」的專屬«認證資料,給予登錄儲存在其金 融單位的內部電腦資料庫;當各金融單位受理帳戶擁有 者_ 進行各項金融服務時,例如:臨櫃存取款或匯款、持 、融卡至ATM存取款或轉帳匯款、網路銀行轉帳匯款 等’除執㈣原有帳號、密碼、動態密碼卡等查核比對 外’更同步執行比對其與登錄儲存於該金融單位內部電 腦資料庫中專屬「電話號碼及識別碼」的授權認證資料 是否相符合’使銀行能同步確定該項或該次的交易服 務’是否確為該帳戶擁有者真正授權下所為之交易,進 而可避免㈣份資料遭竊,或錢卡遺失及其密碼被竊 知等’所導致金錢被盜領或詐領等弊端情事的發生。 200823807" …之另-目的在提供—種「以電話號 碼做為金融服務系統中防弊 力座」係由金融開戶之 帳戶擁有者,自行提供 吓A 电话號碼及識別碼」 的專屬授權認證資料,給其所有開立帳戶往來的金融單 f'而以所有開ϋ帳戶往來的金融單位在核對該帳戶擁 有者的相關身份證明資料後,即將該組併列「電話號锡Success, on the other hand, if the conditions do not match A, 13, then reply "disagree with the authorization, the finger does not give the store or online transaction confrontation," and in the first store or online transaction object 1 on the credit card machine or network Road ¥, ΪΤ 、 颏 颏 颏 颏 颏 、 、 、 、 ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; ; Usually, as long as the signature is not too outrageous, the store staff will give it a smuggling, and the thief will copy the signature not /, :- After the pirate brushing and painting the hoist, practice the signature on the credit card several times. , can be on the verge of cheating, and then, the online network card is more necessary to see the signature, just enter the card number in order, the age and other information p can be 'from this view' in the use of the current credit card Without any simple 200823807 and reliable mechanism to prevent and block counter-measures, it is not surprising that the incidence rate of stolen brush cases of real cards or fake cards is increasing again. The main purpose of the invention is to provide The use of telephone numbers and identification as a means of preventing fraud in the financial services system is provided by the financial account-opening households. The self-provided group - the "phone number and identification code": the exclusive k-ling edge information" The financial unit that is in the account of the account's and all the financial units that have opened the account after the verification of the relevant identity certificate of the account owner's will be listed in the group's exclusive "phone number and identification code" The internal computer database stored in its financial unit; when each financial unit accepts the account owner _ for various financial services, such as: deposit or withdrawal, remittance, holding, credit card to ATM deposit or withdrawal, or transfer remittance, Online bank transfer and other remittances, etc., except for the original account number, password, and dynamic password card, etc., are more synchronous than the external "phone number and identification code" stored in the internal computer database of the financial unit. Whether the authorization information is consistent with the 'enforcement of the bank to determine whether the transaction or the transaction service' is indeed authorized by the account owner In order to trade, it is possible to avoid (four) theft of information, or the loss of money card and the hacking of the password, etc., resulting in the occurrence of fraudulent or fraudulent charges. 200823807" ...the other is to provide "exclusive use of the telephone number as a financial service system", which is the exclusive authorized certification information provided by the account holder of the financial account opening and providing the scared A phone number and identification code. , for all financial accounts that open accounts with them, and the financial units that exchanged accounts with all open accounts, after checking the relevant identification information of the account holders, the group will be tied for "phone number tin"

及識別碼」的專屬授權認證資料,給予登錄儲存在其金 融單位的内部電腦資料庫;當各金融單位受理帳戶擁有 者持信用卡進行刷卡或線上刷卡時,除執行對原有卡號 查核比對外’更同步執行比對其與登錄儲存於該金融單 位内部電腦資料庫中專屬「電話號碼及識別碼」的授權 認證資料是否相符合,使銀行能同步確定該項或該次的 刷卡交易,是否確為該帳戶擁有者真正授權下所為之信 用卡交易,進而可避免因信用卡遺失、遭竊等,所導致 被盜刷弊端情事的發生。 【實施方式】 如第二圖所示,本發明是一種「以電話號碼及識 別碼做為金融服務系統中防弊之方法」,其步驟包含: a、 至金融單位填寫「存款相關業務申請書」辦理 開戶。 b、 依法定「存款開戶總約定書」之規定,憑身 10 200823807 份證及第二身份證明文件,並就簽名或蓋章擇—或合 併留存建擋於金融單位備查。 開戶者自行提供一組併列的「電話號碼及識 別瑪」給金融單位,以做為其專屬之授權認證資料。 / d、由金融單位依「受理開戶作業檢核表」審查 後’核准開戶並核發開戶帳薄及/或金融卡。 _ e、金融單位將開戶者之個人身分資料、帳戶名、 金融卡號及密瑪等資料,登錄儲存於其內部的電腦資 料庫內,並將該開戶者所 者所扶仏專屬二「電話號碼及識 別碼」授權認證資料, 另且錄儲存於其内部電腦所設 的”授權認證資料庫”内。 其中’前述各步驟φ张 查「 驟中所述I「存款相關業務申請 曰」、存款開戶麴幼令告 ^「 等 〜约疋曰」及「受理開戶作業檢核表」 事項或合約條款,均定的諸多 國家之法律來制定„ 融單位自行依據其所屬 位ϋ^ 成,不同國家及其所屬的金融單 u對其所使用的名稱雖备古4 . 冉雖曰有些許不同,但相關法徨 所規範的本質仍廛h 那(關法律 買仍屬相同’先併予說明。 而’在該步驟士、 中I「電話號碼,係可為 者(即帳戶擁有者你可為開戶 個人—翻 豕中或公司的固網電話號碼,或為 個人仃動電話號碼,茨為 -对有國別碼及區域碼的固網 200823807 電話號碼,或是冠有國別 別碼^-Γ , 町仃動電話號碼;且該「識 =係可由任何在電腦中可輸入的文字、數字、符 諕或其兩者以上之組合所 符 戶擁w ,並得由開戶者(即帳 )在提供登錄儲存後,依 之产萨十、4 依循金融單位所規範 式,逕自做隨時任意之修改或變更。 授權步驟e中該金融單位內部電腦所設之” ==,,,_更叫^ 中所建置:,,:控’而是屬於外界其他電腦系統 單2 "外心受權認證資料庫”,使能降低該金融 皐位電l f乍業系'統的維護成本。 績如第三圖及第阳闻略― 反第四圖所不,係本發明使用於親 臨銀行植檀辦理金融服務之流程;當帳戶擁有者2〇 攜帶開戶帳薄與簽章至銀杆 銀 _辦理存、取款或 …時,先填寫金額於存款單或取款單或座款 皁上’以及其帳戶的帳號與密碼,接著再輸入其授 權認證資料31專屬之「電話號瑪及識別碼」【例如: 1234567 (電§舌號瑪)+ J〇hnLinsGG7(識別碼)】後, 該銀行内部的銀行電腦資訊處理中心32,除立即 執行既有核對帳戶戶名、帳號、密碼等資料與金額 外’並同時會對建置於該銀行3〇內的授權認證資料 庫33發出”要求比對”的指令,在有比對得出與登錄 12 200823807 儲存於該授權認證資料庫33內完全相符合之一組 電活號碼及識別碼」時,該授權認證資料庫3 3即 口覆給該銀行電腦資訊處理中心3 2 一個,,認證符 口的指令,且該銀行電腦資訊處理中心32亦隨即 ,帳戶擁有者2G發出存取款或匿款成功的認息,使 士帳戶擁t纟20完成其所要求的存t款或匯款等手 广同時也表示茲次的交易服務,確實是該帳戶擁 有者20真正授權下所完成的一次金融交易。 、 …☆比對得出與登錄儲存於該授權認證資 、庫33內’無任何相符合的 '組「電話號碼及識別 ^時,該授權認證資料33即會回覆給該銀行電腦 f訊處理中心3 2 —個,,句嚷丁# 如―、 個5忍證不符,,的指令,並藉由該 、艮仃電腦資訊處理中心32 $ + ^ fx出重新輸入,,的訊息給And the exclusive authorization information of the identification code is given to the internal computer database stored in its financial unit; when each financial unit accepts the account holder to take a credit card for swiping or online credit card, in addition to performing the check on the original card number than the external ' Synchronous execution is more consistent with the authorization information registered with the exclusive "telephone number and identification code" stored in the internal computer database of the financial unit, so that the bank can simultaneously determine whether the credit card transaction or the credit card transaction is confirmed. The credit card transaction that the account owner actually authorizes, thereby avoiding the loss of the credit card, theft, etc., resulting in theft and fraud. [Embodiment] As shown in the second figure, the present invention is a "method of preventing fraud in a financial service system by using a telephone number and an identification code", and the steps include: a. Filling in a "deposit-related business application" to a financial unit "Open an account." b. Set the “General Agreement for Deposit Account Opening” in accordance with the law, and use the certificate of the 200828807 and the second identification document, and choose to sign or seal the joint venture or the financial institution for future reference. The account holder provides a set of "phone numbers and identifications" for the financial unit to provide their own authorized certification materials. / d. The financial unit will approve the account opening and issue the account book and/or financial card according to the “Acceptance Checklist for Account Opening Work”. _ e, the financial unit will store the personal identification information, account name, financial card number and Mimar of the account holder, and store it in its internal computer database, and the account holder will support the exclusive "phone number". And the identification code" authorizes the authentication data, and records it in the "authorized authentication database" set up by its internal computer. Among them, 'the above-mentioned steps φ check the "I-deposit-related business application" mentioned in the paragraph, the deposit account opening and closing instructions, the "waiting for the account opening checklist" or the contract terms, The laws of many countries are formulated to formulate the sufficiency of the unit according to its own position. The names of the different countries and their financial statements are used for the ancients. Although they are slightly different, they are related. The essence of the law of the law is still 廛h (the legal purchase is still the same 'first and explained. And 'in this step, the middle I phone number, can be the person (ie the account owner you can open an account - Translating the company's fixed-line telephone number, or personally inciting the telephone number, the code is - the fixed network 200823807 telephone number with country code and area code, or the country code ^-Γ, The town has a telephone number; and the "identification" can be provided by any combination of words, numbers, symbols, or a combination of two or more that can be entered in the computer, and is provided by the account holder (ie, account). After logging in and storing, according to the production of Sa 10, 4 follow the gold The standard of the unit can be modified or changed at any time. The authorization step e in the internal computer of the financial unit is set to "==,,, _ more called ^ built in:,: control" but belongs to the outside world Other computer systems, single 2 "external authorized database, can reduce the maintenance cost of the financial system. The performance is as shown in the third figure and the first news. The invention is used in the process of processing financial services in the bank of the bank; when the account owner carries the account book and the signature to the silver pole _ for deposit, withdrawal or ..., the amount is first filled in the deposit slip or withdrawal Single or seat soap on 'and the account number and password of its account, and then enter its authorized identification information 31 exclusive "phone number and identification code" [example: 1234567 (electric § tongue number Ma) + J〇hnLinsGG7 (identification After the code), the bank's internal computer information processing center 32, in addition to immediately executing the existing check account account name, account number, password and other information and gold extra 'and at the same time will be built in the bank's 3 授权 certification Database 33 issued" The instruction of the comparison is obtained by comparing the group of the live number and the identification code completely in accordance with the registration 12 200823807 stored in the authorized authentication database 33. The bank computer information processing center 3 2, an authentication token, and the bank computer information processing center 32 is immediately followed, the account owner 2G issues a deposit or withdrawal or a successful transfer of interest, the account holder T纟20 completes the required deposits or remittances, and also refers to the transaction service, which is indeed a financial transaction completed under the real authorization of the account owner. 20, ... ☆ comparison and When the login is stored in the authorized authentication resource, the library 'no phone number and identification ^, if there is no matching group', the authorized authentication data 33 will be returned to the bank computer processing center 3 2 -, sentence嚷丁#, such as ―, 5 forbearance does not match, the instruction, and by the 艮仃 computer information processing center 32 $ + ^ fx re-enter, the message to

20自=有者2G’換言之,除非是真正的帳戶擁有者 1自己’或經該帳戶擁有者20同意所告知其「電話 號瑪及識別碼」的代理人之 戶戶女^ ^ 任何人即使出具帳 戶戶名、帳號及密瑪等資料,仍因在無法得知「電 話號碼及識別碼」的情淠下π 待知电 J Μ況下,而不能在臨 下來取得該帳戶擁有| 的形 摊,者2〇帳戶内的任何 此’對於非由帳戶擁有者20真正授 、 取款行為將能完全杜绝、的非法臨櫃 g再者,則述銀行30現有内 200823807 部金融電腦作業军20 from = 2G' in other words, unless it is the real account owner 1 own' or the account owner 20 agrees to inform the agent of the "phone number and identification code" of the woman ^ ^ anyone even The information on the account name, account number and Mima is still in the form of _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Anyone in the account of the 2 〇 account will be able to completely eliminate the illegal scams that are not authorized by the account holder 20, and the bank 30 existing financial and computer operations in 200823807

系統的軟、硬設備,在既有# H 均已非常完備,其可能不願額外花:運下 需授權認證資料庫 建置本發明所 只要銀行、將=本… 程式稍作修改,:將=The system's soft and hard devices are very complete in both #H, and they may not be willing to spend extra money: the license database must be authorized to build the invention, as long as the bank, the = this program is slightly modified, will =

路”送至建置要求比對的指令,經由網 認證資㈣40,仍=另—電腦系統中的外部授權 認證功能,因為、、:對相符合或不相符合的 ::金融單位相互連網,每-位在各金融銀行I 開”的帳戶擁有者20,其所提供專屬「電話號瑪 及識別碼以授權認證資料,均經由各金融銀行 、、接透過網路W而登錄儲存於該外部授權認證 資料庫40內’故各銀行3。&要導入本發明的技術程 度極為簡單’除立即可實施外又不增加營運成本。 再如第五圖及第六圖所示,係本發明使用於 ATM機器50(俗稱自動櫃員機)金融服務之流程;當 帳戶擁有者20攜帶金融卡至ATM機器50,辦理存、 取紙或匯政手續時,先將金融卡插入ATM機器50 & ’經輸入金融卡密碼及金額後,該Atm機器50操 作畫面上會出現一「電話號碼及識別碼」攔位51, 帳戶擁有者20必須在該r電話號碼及識別碼」攔位 200823807 1內輸入其專屬「電話號碼及識別碼」的授權認證 資料52,否則無法進行後續的交易程序,若已輸入 正確的「電話號碼及識別碼」之授權認證資料52【例 如· 123 45 67 (電話號碼)+ J〇hnLins〇〇7(識別碼)】 後,該ATM機器50所屬銀行6〇的銀行電腦資訊處 理中心61,除立即執行既有核對金融卡號及密碼資 料與金額外,並同時會對建置於該銀行6〇內的授權 認證資料庫62發出,,要求比對,,的指令,在有比對得 出與登錄儲存於該授權認證資料庫62內,完全相符 口之組「電話號碼及識別碼」時,該授權認證資 料庫62即會回覆給銀行電腦資訊處理中心6〗一個,, 言忍證符合,,的指令,且該銀行電腦資訊處理中心6ι 亦隨即發出,,同意存款或出鈔或轉帳,,成功的訊息至 ATM機器50,而使該持有金融卡的帳戶擁有者2〇, 可從該ATM機器50上完成其所需之存款或出鈔或 轉帳成功之交易手續,同時也表示該次在ATM機器 50上的交易服務,確實是該帳戶擁有2〇真正授權下 所完成的一次金融交易。 反之’若比對得出與登錄儲存於該授權認證資 料庫62內’無任何相符合的「電話號碼及識別 碼J時’該授權認證資㈣62即會_給該銀行電 15 200823807 腦資訊處理中心61 -個”認證不符,,的指令,並藉由 該銀行電腦資訊處理中心61而使atm機器5〇:的 晝面出現”重新輸入’’ Γ電話號瑪及識別瑪」的訊息 給帳戶擁有者20;因此,任何搶拾或偷竊所取得的 金融卡,即使得知其密瑪,亦會因不知「電話號碼 及識制」,而無法從ATM機器50上來取款或轉帳 竊得贓款’相對地’因不慎遣失或遭竊金融卡的帳戶擁The road is sent to the construction request for comparison instructions, via the network certification (4) 40, still = another external authorization function in the computer system, because, : the match or non-conformity:: financial units interconnected , the account owner 20 of each financial bank I open, the exclusive "phone number and identification code to authorize the authentication data, all registered via the financial bank, and then stored in the network W. In the external authorization certificate database 40, the bank 3 is the same as the technology to be introduced into the present invention. It is extremely simple to implement, and it does not increase the operating cost, as shown in the fifth and sixth figures. Inventing the financial service process for the ATM machine 50 (commonly known as the ATM); when the account owner 20 carries the financial card to the ATM machine 50, in the process of depositing, withdrawing or remittance, first insert the financial card into the ATM machine 50 & 'After entering the financial card password and amount, a "phone number and identification code" block 51 will appear on the operation screen of the Atm machine 50, and the account owner 20 must be in the r phone number and identification code "200823807 1 Enter the authorization code 52 of its exclusive "telephone number and identification code". Otherwise, the subsequent transaction procedure cannot be performed. If the correct "phone number and identification code" has been entered, the authorization information 52 [eg · 123 45 67 (phone number) ) + J〇hnLins〇〇7 (ID) After the ATM machine 50 belongs to the bank computer information processing center 61 of the bank, in addition to immediately executing the existing check-up financial card number and password information and gold extra, and at the same time The authorized authentication database 62, which is placed in the bank's 6〇, is issued, and the request for comparison, the instruction is completely matched with the login and stored in the authorized authentication database 62. When the number and identification code are used, the authorized certification database 62 will reply to the bank computer information processing center 6 and the instructions of the forcible certificate, and the bank computer information processing center 6ι will also be issued immediately, agreeing Deposit or issue a banknote or transfer, a successful message to the ATM machine 50, and the account holder holding the financial card can complete the required deposit or deposit from the ATM machine 50. Or transfer the success of the transaction procedures, also said the transaction service on the ATM machine 50 is indeed the account has 2〇 a financial transaction authorized under really done. On the other hand, if the comparison is made with the "phone number and identification code J that is stored in the authorized authentication database 62", the authorization certificate (4) 62 will be sent to the bank 15 200823807 Brain information processing The center 61 - "authentication does not match the order, and with the bank computer information processing center 61, the atm machine 5": the face appears "re-enter" 'Γ phone number and identification horse" message to the account Owner 20; therefore, any financial card obtained by looting or stealing, even if it is known to its Mima, will not be able to withdraw money or transfer money from the ATM machine 50 because it does not know the "telephone number and knowledge". Relatively 'accidentally lost or stolen financial card account

有者20,也不必再害怕帳戶內的金錢遭盜領所導致的 實質金錢損失’更不必急著打電話向核發金融卡的銀行 來通報掛失之手續’故可消除來自偷竊他人金融卡及密 碼的犯罪案件。 /再者,如第六圖所示者,該ATM機器50所屬銀 行60a導入本發明之方法時,其内部亦可免去建置 授權認證資料庫62的成本’而選擇每次將來自A, 機器5 0的电活號碼及識別碼」專屬授權認證資料 52 ”工銀行黾Ι&資訊處理中心61 a送出,,要求比對” 指令,再透過網路W傳送至外界的外部授權認證資 料庫40,仍可達成執行比對是否相符合之認證功能。 又如第七圖及第八圖所示,係本發明使用於網 路線上轉帳匯款金融服務之流程;當帳戶擁有者20 經由網路w連結至所屬帳戶的網路銀行7〇後,在其 200823807 顯示頁面的主攔位71内,除應輸入,,使用者名稱及 動態密瑪(〇TP)”之既有規定與金額外,必須再於另 -增設的授權認證欄位中,輸人其專屬「電話號瑪 ‘ 及識別瑪」的授權認證資料72【例如:1234567(電 話號碼RJohnUns 〇〇7(識別碼)】,否則無法進行後 續的轉帳程序’若已輪入正確的「電話號竭及識別 冑」之授權認證資料72後,該網路銀行7〇的電腦 # #訊處理中心73,除立即執行既有核對使用者名稱 及動態密碼(OTP)與轉帳金額外,並同時會對建置於 內部系統的授權認證資料庫74發出,,要求比對,,的指 7在有比對#出與登錄儲存於該授權認證資料庫 74內完全相符合之-組「電話號碼及識別碼」時, 裔授權認證資料庫74即會回覆給電腦資訊處理中心 73個4邊符合,,的指令,且該電腦資訊處理中心 73亦隨即發出 '線上轉帳成功”的訊顯 -麵路銀行Μ㈣面上,得供帳戶擁有者20 = :其上網工具(例如電腦、pDA等)的顯示屏幕上,而 知知線上轉帳(付款)交易完成,同時也表示該次在線 ,i的交易服務,確實是該帳戶擁有者2〇真正授權下 所完成的一筆金融交易。 反乙,右比對得出與登錄儲存於該授權認證資 17 200823807 料庫74內’無任何相符合的一 &「電話號碼及識別 碼」時,該授權認證資料庫74即會回覆給該電腦資 訊處理中心73 —個,,認證不符,,的指令,並藉由該電 腦資訊處理中心73而使網路銀行70的頁面上,出 現”重新輸入”「電話號碼及識別碼」的訊息給帳戶 擁有者20 ;因此,即便再具有高度電腦專長的專家,Some 20, there is no need to fear the real money loss caused by the stolen money in the account. 'More need to rush to call the bank that issued the financial card to report the report of the loss.' It can eliminate the financial card and password from stealing others. Criminal case. / Further, as shown in the sixth figure, when the bank 60a to which the ATM machine 50 belongs is introduced into the method of the present invention, the cost of constructing the authorization authentication database 62 may be removed from the inside, and each time it is selected from A, The machine's 50-digit electric number and identification code "exclusive authorized certification data 52" is sent by the Industrial Bank 黾Ι & Information Processing Center 61 a, requesting the comparison" command, and then transmitted to the outside external authorized authentication database through the network W 40. It is still possible to achieve an authentication function that complies with the comparison. As shown in the seventh and eighth figures, the present invention is used in the process of transferring funds and remittance financial services on the Internet; when the account owner 20 is connected to the online bank of the account via the network w, 200823807 In the main block 71 of the display page, in addition to the input, the user name and the dynamic MME (〇TP) have both the provisions and the gold extra, and must be added to the additional-added authorization field. Its exclusive "Certificate Number" and "Identification" authorization data 72 [example: 1234567 (telephone number RJohnUns 〇〇 7 (ID)], otherwise the subsequent transfer procedure cannot be performed 'if the correct "phone number has been entered" After the authorization and identification data 72 of the "exhaustion", the online bank 7 computer's computer processing center 73, in addition to immediately executing the existing check user name and dynamic password (OTP) and transfer money extra, and at the same time For the authorized authentication database 74 built into the internal system, the request is compared, and the finger 7 is completely matched with the login and stored in the authorized authentication database 74 - the group "phone number and Identification code The Authorized Certification Database 74 will reply to the computer information processing center with 73 four-sided compliance instructions, and the computer information processing center 73 will immediately issue the 'Online Transfer Successful' on the Display-Focus Bank (4). For the account owner 20 = : on the display screen of its online tools (such as computer, pDA, etc.), and knowing that the online transfer (payment) transaction is completed, also indicates that the online, i transaction service, is indeed the account Owner 2 is a financial transaction completed under the real authorization. Anti-B, right comparison and registration are stored in the authorized certification resource 17 200823807 Vault 74 'Nothing matches one & Phone number and identification At the time of the code, the authorized authentication database 74 will reply to the computer information processing center 73, the authentication error, and the instruction, and the computer information processing center 73 is used to make the online banking 70 page. The message "Re-enter" "Phone Number and Identification Number" appears to the account owner 20; therefore, even if you have an expert with a high degree of computer expertise,

雖在竊得他人帳戶資料後,而想進行線上轉帳獲得贓 款,仍會因無法得知其「電話號碼及識別碼」的授權 認證資料下無法得逞,更遑論能進行掩飾犯行之多 次轉帳伎倆矣。 再者’如第Λ圖所示者,該網路銀行7()a所屬銀 行的電腦資訊處理中心73a,宜由却十1么丄 丁、“a,其内部亦可免去建置授 權認證資料庫74的成太,而、联裡产t、 _ 成本而選擇母次將來自電腦資 訊處理中心7 3 a的「雷★壬雜吃 i p舌號馬及識別竭」專屬授權 認證資料72a’經該電腦資訊處理中们3a送出,,要 求比對’’指令’再透過網路㈣送至外界的外部授權 涊證資料庫40,供W + > 達成執行比對是否相符合之認 證功能。 九圖所示,係本發明中以電話號碼及 做為信用卡使用流程防弊之方法,其步驟包含: a、填寫信用卡發卡銀行所提供之「信用卡, 200823807Even after stealing the account information of others, and wanting to make an online transfer to obtain the money, it will still be unable to obtain the authorization information of the "telephone number and identification code", but it can be used to cover up the multiple transfer of the crime. Hey. Furthermore, as shown in the figure, the computer information processing center 73a of the bank of the 7()a of the online banking bank should be free from the authorization of the establishment. In the database 74, Cheng Tai, and Lian Li, t, _ cost and choose the mother and son will come from the computer information processing center 7 3 a "Lei ★ 壬 吃 ip tongue horse and identification exhaust" exclusive authorization certification data 72a' After being sent by the computer information processing 3a, it is required to compare the ''command' and then send it to the external external authorization certificate database 40 through the network (4) for W+> to achieve an authentication function that complies with the execution comparison. . The figure shown in the figure is a method for preventing fraud by using a telephone number and a credit card. The steps include: a. Fill in the credit card provided by the credit card issuing bank, 200823807

於該Γί§用卡申請書上留在 提供身份誇與第1 存簽名的形式,並 供信用卡發卡銀…h件及相關財力證明,以 I卞銀仃建檔備存,· c、申請信用卡者自行提供' 碼及識別碼,技户m k 更口舌號 權認證資料;用卡發卡銀行,以做為其專屬之授 給信:、:=發卡銀行審查後’核發信他 用卡發卡銀行將持卡人之個人身分資料及信 出、、&料,登錄儲存於其内部的電腦資料庫 二二將該信用卡持卡人所提供專屬之「電話號瑪及 識別瑪J授權1¾ ★容,备# 、 〜p斗,另登錄儲存於其內部電腦所 設的”授權認證資料庫,,內。 其中,該步驟C中之「電話號碼」,係可為信用卡 持卡人家中或公司的固網電話號瑪’或個人行動電話 號瑪,或是冠有國別瑪及區域碼的固網電話號碼,或 是冠有國別碼的行動電話號碼者;且該「識別瑪」, 係可由任何在電腦中可輸入的文字、數字、符號或其 兩者以上之組合所構成,並得由信用卡持卡人在提供 且錄儲存後’依循信用卡發卡銀行所規範之流程或方 200823807 式’而可主動進行做隨時任意之修改或變更者。 又,步騾e.中該信用卡發卡銀行内部電腦所設之” 授權認證資料庫”,係可變更設置於非屬該信用卡發 卡銀行内部的電腦系統所操控,而是屬於外界其他電 腦系統中所建置之”外部授權認證資料庫”,使能降低 該信用卡發卡銀行電腦作業系統的維護成本。 睛參閱第十圖所示,係本發明使用於信用卡的 實施例;當信用卡持卡者10至店家或網路交易對象 1行刷卡或線上刷卡時,店家人員先將信用卡於刷卡 機上過卡後’即會要求該信用卡持切10,必須再 於該刷卡機上按壓輸入其信用卡所相對應的「電話 號碼及識別瑪」之授權認證資料3,假若,該信用卡 持卡者1〇不願依店家人員之指示按壓輸入時’店家 人員可立制㈣信用切切1Q當次㈣卡交 易,同樣地,信用卡持卡者1() & h u、〇 於線上刷卡時,其網 路頁面上亦會有要求輸入其作 共用卡所相對應的「電 話號碼及識別竭」之授權認證資料3,假如,用 卡者!。不職該授權認證資料3時,便:被拒絕 其線上刷卡手續;上述之程 、工%序即可作為防止 為的第一道防衛機制。 因此’當信用卡持卡者 逼續叙店家人員或線 20 200823807 上…,接著在刷卡機上按屋或網路頁面中輸入 其「電嶋及識別碼」之授權認證資料3後," 卡發卡銀行9〇内部的銀行電腦資訊處理中心91 :除 立即執行既有核對持卡者之卡號資料與刷卡金額 外’並㈣會對建置於内部系統的授權認證資料庫 92、發出:要求比對,,的指令’在有比對得出與登錄儲 存於該杈權認證資料庫92內完全相符合之—組 話號碼及識別碼」時,兮&说i / ,」時孩杈權認證資料庫92即會回 覆給銀行電腦資訊處理中心91_ 1固涊邊符合,,的指 令,且該銀行電腦資訊#挪士、 讯處理中心91亦隨即發出,,同 意授權刷卡”的訊息给法索 、、 店豕或網路交易對象i,即可 完成成功刷卡之手璿· ^、 千''買,反二,除真正的信用卡持卡 者10本人知道其「雷# 活琥碼及識別碼J以外,其他 任何撿拾、偷竊或偽造所 运所取侍的信用卡,將因無法 侍知「電話號碼及識別碼 , 馬」I k權認證資料3下, 而無法盜刷使用該不當取猎 取侍的信用卡,相對地,因不 慎遺失或遭竊信用卡的信用 用卞持卡者10,也不必再堂 怕被盜刷所導致的實質金錢纟α 相失,更不必急著打電話向 核發佗用卡的銀行來通報掛· r天I手細,故確實可完全消 除信用卡被盜刷的犯罪案件。 综上所陳,本發明應用「绝 : 电話號碼及識別碼J作 200823807 為銀行與帳戶擁有者間之授權認證資料,使其做為銀 行與帳戶擁有者之間各項金融服務上的授權認證依 據,除能確保彼此各項金融交易上的更為安全外,更能 ' 有效杜絕金錢被盜領、詐領或信用卡被盜刷等犯罪行為 發生,確具有高度創新與產業利用性;至於使用「電話 號碼」及「識別碼」的優點,在本案發明人另外於 民國93年4月30日(2004年4月3〇日)向鈞局 • 所提出冑93 1 12373冑「以數個特定電話號瑪依序排 列組合成之數字串列冠上識別碼作為搜尋網際網路 特定電腦IP位址之系統」之發明專利中,已有揭露 陳述,且本案發明人亦在隨後按依該技術內容而設 立了 「www.2udgeCom」網站,來實際加以實施運作 至今,完全達成所預期之功效,惟,有關其運用之 電腦軟硬體技術均為熟悉該項技術人員所公知,且 # 亦非本案之標的,故在此不予贅述,特予說明。 【圖式簡單說明】 - 第一圖:係習知信用卡使用流程之方塊圖。 , 第二圖:係本發明之步騾方塊圖。 第三圖··係本發明使用於親臨銀行櫃檯辦理金融服 務的流程圖之一。 第四圖:係本發明使用於親臨銀行櫃檯辦理金融服 22 200823807 務的流程圖之二。 第五圖:係本發明使用於ATM自動樞員機之金融 • 服務流程圖之一。 第八圖·係本發明使用於ATM自動樞員機之金融 服務流程圖之二。 第七圖:係本發明使用於網路線上轉帳匯款金融服 務之流程圖之一。 • 第八圖··係本發明使用於網路線上轉帳匯款金融服 務之流程圖之二。 第九圖:係本發明應用於信用卡使用流程之步驟方 塊圖。 第十圖·係本發明使用於信用卡流程之流程圖。 【主要元件符號說明】 • 丨·店家或網路交易對象 2、90-發行信用卡銀行 10-信用卡持卡者 • 20-帳戶擁有者 • 30、30a、6〇a-銀行 3 ' 31、3la、52、72、72a_授權認證資料 32、32a、61、61a、73、73a、9卜銀行電腦資訊處理 中心 23 200823807 33、62、74、92-授權認證資料庫 40-外部授權認證資料庫 50- ATM機器 51- 「電話號碼及識別碼」欄位 70、70a-網路銀行 71-主欄位 W-網路In the Γί§ card application, you will stay in the form of providing the identity and the first deposit signature, and will issue the credit card for the credit card... and the relevant financial proof, and keep it in the file. Provide 'code and identification code, technology mk more tongue-and-mouth authentication information; use card issuing bank to make its own exclusive letter:,:= after issuing bank review, 'issued the letter, he used the card issuing bank to hold the card Personal identity information and credits, and & materials, registered in its internal computer database 22 The credit card holder provides the exclusive "phone number and identification Ma J authorized 13⁄4 ★ Rong, preparation # , ~p bucket, another login stored in its internal computer set up "authorized authentication database, inside. The "telephone number" in the step C may be a fixed-line telephone number of the credit card holder's home or the company, or a personal mobile phone number, or a fixed-line telephone with a country code and an area code. The number, or the mobile phone number with the country code; and the "identification horse" can be composed of any text, number, symbol or combination of two or more that can be entered in the computer, and can be obtained by credit card. After providing and recording, the cardholder can follow the process specified by the credit card issuing bank or the party 200823807 and can actively make any modifications or changes at any time. In addition, the “authorization authentication database” set up by the internal computer of the credit card issuing bank in step e. can be changed and installed in a computer system other than the credit card issuing bank, but belongs to other computer systems in the outside world. The establishment of the "external authorization certification database" enables the maintenance cost of the credit card issuing bank computer operating system to be reduced. Referring to the tenth figure, the invention is used in the embodiment of the credit card; when the credit card holder 10 goes to the store or the online transaction object to swipe or swipe the card, the store staff first passes the credit card on the credit card machine. After that, the credit card will be required to be cut 10, and the credit card corresponding to the "telephone number and identification horse" corresponding to the credit card must be pressed on the credit card machine, if the credit card holder is unwilling When pressing the input according to the instructions of the store staff, 'the store staff can make the (4) credit cut 1Q (four) card transaction, and similarly, the credit card holder 1 () & hu, when swiping online, the online page also There will be an authorization certificate 3 for the "telephone number and identification" that corresponds to the corresponding card, if the card is used! When the authorization information 3 is not in use, it is rejected: its online card processing procedure; the above-mentioned procedures and labor order can be used as the first defense mechanism to prevent it. Therefore, 'When the credit card holder pushes on the store staff or line 20 200823807..., then enter the “Electricity and Identification Code” authorization information 3 on the house or network page on the credit card machine, " card Issuer Bank 9〇 Internal Bank Computer Information Processing Center 91: Except for immediately executing the card number information of the existing check card holder and the card credit additional 'and (4) will be placed on the internal system authorized certification database 92, issued: request ratio The instruction ', when there is a comparison to the login and the identity code and the identification code stored in the authentication database 92, 兮& say i / ," The Certification Database 92 will reply to the Bank Computer Information Processing Center 91_1, and the Bank’s computer information #诺士, 讯处理中心91 will be issued immediately, agree to authorize the card to send the message to the law. So, the store, or the online transaction object i, you can complete the successful credit card. ^, Thousand ''buy, the second, in addition to the real credit card holder 10 I know its "雷#活琥码 and identification Other than code J, other Picking up, stealing or falsifying the credit card you are using will not be able to sneak into the "phone number and identification code," and you will not be able to steal the credit card used for improper hunting. Because the credit card of the lost or stolen credit card is used for the cardholder 10, it is not necessary to be afraid of the actual money 纟α lost by the stolen brush, and it is not necessary to rush to call the bank that issued the card. The notification hangs · r days I hand fine, so it can completely eliminate the criminal cases of credit card theft. In summary, the present invention applies the "absolute: phone number and identification code J for 200823807 as the authorization information between the bank and the account owner, so as to authorize the financial services between the bank and the account owner. In addition to ensuring that each other's financial transactions are more secure, the basis for certification is more effective in preventing crimes such as money being stolen, fraudulent or credit card stolen, and it is highly innovative and industrially usable; Using the advantages of "telephone number" and "identification code", the inventor of this case was also presented to the bureau on April 30, 1993 (April 3, 2004) 胄93 1 12373胄" In the invention patent of the specific serial number of the telephone number and the digital serial number identification code as the system for searching the IP address of the specific computer of the Internet, the disclosure has been disclosed, and the inventor of the present invention also follows the The technical content has set up the "www.2udgeCom" website to actually implement the operation so far, and fully achieve the expected effect. However, the computer software and hardware technology used for its use are familiar with the technology. It is well known to the person, and # is not the subject of this case, so it will not be described here. [Simple description of the diagram] - The first picture: is a block diagram of the process of using the credit card. The second figure is a block diagram of the invention. The third figure is one of the flow charts for the present invention to be used for personal financial services at a bank counter. The fourth picture is the second flow chart of the invention used in the financial counter 22 200823807. Figure 5: One of the financial service flowcharts used in the ATM automatic caller of the present invention. The eighth figure is the second flow chart of the financial service used in the ATM automatic hub machine of the present invention. Figure 7 is a flow chart of the present invention for use in online money transfer remittance financial services. • Figure 8 is the second flow chart of the financial services used for the transfer of funds on the Internet. Fig. 9 is a block diagram showing the steps of the present invention applied to the credit card usage flow. Figure 11 is a flow chart of the present invention for use in a credit card process. [Description of main component symbols] • 丨·Store or online transaction object 2, 90-issuing credit card bank 10-credit card holder • 20-account owner • 30, 30a, 6〇a-bank 3 '31, 3la, 52, 72, 72a_ Authorized certification materials 32, 32a, 61, 61a, 73, 73a, 9 Bank Computer Information Processing Center 23 200823807 33, 62, 74, 92 - Authorized Certification Database 40 - External Authorization Certification Database 50 - ATM Machine 51 - "Phone Number and Identification Code" Field 70, 70a - Internet Banking 71 - Main Field W-Network

24twenty four

Claims (1)

200823807 十、申請專利範圍: L-種「以電話號瑪及識別碼做為金融服務系統中防弊之 方法J,其步驟包含·· • a、至金融單位填寫「存款相關業務申請書」辦理 開戶; 、b、依法定「存款開戶總約定書」之規定,憑身 份證及第二身份證明文件,並就簽名或蓋章擇—或合 • 併留存建擋於金融單位備查; 口 c、 開戶者自行提供—组併列的「電話號碼及識 «」給金融單位’以做為其專屬之授權認證資料; d、 由金融單位依「受理開戶作業檢核表」審查 後’核准開戶並核發開戶帳薄及/或金融卡;及 e、 金融單位將開戶者之個人身分資料、帳戶 纟、金融卡號及密碼等資料,登錄儲存於其内部的電 麵庫内’並將該開戶者所提供專屬之「電話號碼 •及識別瑪」授權認證資料’另登錄儲存於其內部電腦 所設的”授權認證資料庫,,内。 _ 2·如申請專利範圍第1項所述之「以電話號碼及識别碼 •做為金融服務系統中防弊之方法」,其中,步驟a所述 I「存款相關業務申請書」、步驟b所述之「存款開 戶總約定書」及其有關身份證明文件與簽章形式、以 25 200823807 及步驟d所述之「受理開戶作業撿核表」等書類或審 核標準,其在格式或内容中所規定的諸多事項或合約 條款’均係由各金融單位自行依據其所屬國家之法律 • 來制定而成。 ‘ 3·如申請㈣範圍第1項所述之「以電話號碼及識別碼 做為金融服務系統中防弊之方法」,其中,該步驟c中 之「電話號冑」,係、可為開戶纟家中或公司的固網電 參 言舌號瑪,或個人行動電話號碼,或是冠有國別碼及區 域碼的固網電話號碼,或是冠有國別碼的行動電話號 碼者。 4·如申請專利範圍第!項所述之「以電話號碼及識別碼 做為金融服務系統中防弊之方法」,其中,該步驟。中 乙「識別碼」’係可由任何在電腦中可輸入的文字、 數子、符號或其兩者以上之組合所構成,且得由開戶 者在提供登錄儲存後,依循金融單位所規範之流㈣ 方式而可主動進行做隨時任意之修改或變更者。 "明專利章&圍第1項所述之「以電話號碼及識別瑪 做為金融服務系統中㈣之方法」,其中,步驟e中該 、、者所提供專屬之「電話號碼及識別碼」授權認證 、、:更飞且錄儲存於非屬該金融單位內部電腦系統 所操控之,,外部授權認證資料庫,,中者。 26 200823807 6. 一種「以電話料及__為 方法」,其步騾包含·· 用卡使用流程防弊之 a、填寫信用+雜_ 之「信用卡申請 書 、發卡銀行所提供 b、於該「信用卡申請查 提#身H m # 曰」上留存簽名的形式,並 灰两身份g登與第二身份 卫 M ^ m , '月又件及相關財力證明以 供七用卡發卡銀行建檔備存; "以 ° 申請is用卡者自行_值 仃供一組併列的「蒂 碼及識別碼」給户用+微电卩-舌號 播… ‘用卡發卡銀行,以做為其專屬之授 權認證資料; 升寻屬S授 d、由信用卡發卡銀 丄 4胥i俊,核發信用卡;及 e、信用卡發卡銀行將接I 丁跟仃將持卡人I個人身 用卡卡號等資料,登錄儲左“一 貧科及 內,並將該信用卡持卡人所提供專 庫 ^ , 两寻屬之電話號碼及 識別碼」授權認證資料,另Α左年 科3登錄儲存於其內部電腦所 設的”授權認證資料庫”內。 7·如申請專利範圍第6項所述之「 以電話號碼及識別碼 做為信用卡使用流程防弊之方法」,其中,步驟&與步 驟b所述「信用卡申請書及立右/ 明曰」反其有關身份證明文件與 簽章形式’其在格式或内容中㈣定的諸多事項或合 約條款’均係由各信用卡發卡銀行自行依據其所屬國 27 200823807 家之法律來制定而成。 8·如申請專利範園第6項 # 、斤、i 以電話號碼及識別;5¾ 做為信用卡使用流程防弊之方法並出、、冰 I1 、「 〈万庙」,其中,頭步驟〇中 ^ 電話號碼」,係可A # si 網雷…卡持卡人家中或公司的固 電p舌琥碼,或個人行動雷 P舌琥碼,或是冠有國別碼 及E域碼的固網電話號碼, _ 話號瑪者。 號馬自是冠有國別碼的行動電 9·如申請專利範圍第6項 t ^ ^ ^ 、 以電話號碼及識別碼 做馮彳日用卡使用流程防弊之 夕「也 之万法」,其中,該步驟c中 識別碼」,係可由任何在雷《士 數生hh ΊίΤ在電腦中可輸入的文字、 數子、知號或其兩者以上之 ,; 且合所構成,且得由信用 卡持卡人在提供登錄儲存 範之产"、+ 心“用卡發卡銀行所規 變更者。 動進仃做隨時任意之修改或 1Q·如申請專利範圍第6 做騎以輯4 I「以電話Μ及識別碼 做為心用卡使用流程防弊 居」,其中,步騾e中該 心用卡持卡人所提供專屬费饰 m^^^ 电話號碼及識別碼」授 權涊證資料,更可昝德綠+、 」說 ^ ^ ' 於非屬該信用卡發卡銀行 內部電腦系統所操控之,,外 仃 呷杈權涊g登資料庫,,中者。 28200823807 X. Patent Application Scope: L-type "The method of using the telephone number and identification code as a method for preventing fraud in the financial service system, the steps of which include ··· a, to the financial unit to fill out the "deposit-related business application" Opening an account; b, stipulates the "General Agreement for Deposit Account Opening" in accordance with the law, with the identity card and the second identity document, and selects or seals the signature or seal and keeps it in the financial unit for reference; The account holder provides the "phone number and knowledge «" for the financial unit's as the exclusive authorized certification data; d. The financial unit approves the account opening and approval according to the "accepted account opening check list" Account opening and/or financial card; and e, the financial unit will store the personal identification information, account number, financial card number and password of the account holder, and store it in the internal electricity store' and provide it to the account holder. The exclusive "Phone Number and Identification" authorized certification data is also stored in the "Authorized Certification Database" set up on its internal computer. _ 2·If you apply for The "Telephone number and identification code as a method for preventing fraud in the financial services system" mentioned in the first paragraph of the scope, wherein the "deposit-related business application" described in step a, and the deposit account described in step b The General Appointment and its relevant identification documents and signature forms, such as the book acceptance or auditing standards described in 25 200823807 and step d, are subject to various matters specified in the format or content or The terms of the contract are formulated by the financial institutions themselves according to the laws of the country in which they belong. '3. If the telephone number and identification code are used as methods for preventing fraud in the financial service system as described in item 1 of the application (4), the "telephone number" in the step c is for opening an account. The home network or the company's fixed-line electricity, the voice number, or the personal mobile phone number, or the fixed-line phone number with the country code and area code, or the mobile phone number with the country code. 4. If you apply for a patent scope! The "method of using the telephone number and identification code as a method of preventing fraud in the financial service system", which is the step. The "Identification Code" of the B may be composed of any combination of words, numbers, symbols or a combination of two or more in the computer, and the account holder shall follow the flow specified by the financial institution after providing the login and storage. (4) Ways to take the initiative to make any modifications or changes at any time. "The method of using the telephone number and identification horse as the financial service system (4)" in the first paragraph of the patent, and the exclusive "phone number and identification" provided in step e. Code" authorization certification,: more flight and recorded in the computer system not controlled by the financial unit, external authorized authentication database, the middle. 26 200823807 6. A method of "using telephone materials and __ as a method", the steps including: · Using the card to prevent fraud, filling in credits + miscellaneous _ "credit card application, issuing bank b, in the " Credit card application check-up #body H m # 曰" on the form of the signature, and the gray identity and the second identity guard M ^ m, 'monthly and related financial certificates for the seven-use card issuing bank to prepare Save; " Apply the is card with the user's own _ value 仃 for a group of "code and identification code" for the household + micro-electricity - tongue number broadcast ... 'use the card issuing bank, as its exclusive Authorized certification information; Rising to search for S, d by credit card, issuing 4, i Jun, issuing credit card; and e, credit card issuing bank will receive I Ding and will be the cardholder I personal use card number and other information, Log in to the left of the "one poor and the inside, and the credit card holder provided by the library ^, the two search phone numbers and identification code" authorized authentication information, and the left year of the account 3 login stored in its internal computer Within the "Authorization Certification Database". 7. If the telephone number and identification code are used as the method for preventing fraudulent use of the credit card, as described in the sixth paragraph of the patent application, the steps & and step b describe the "credit card application and the right / clear The anti-identification document and the signature form 'the many matters or contract terms set in the format or content (4) are formulated by each credit card issuing bank according to the laws of its country 27 200823807. 8. If you apply for the patent Fanyuan item #6, jin, i by phone number and identification; 53⁄4 as a credit card use process to prevent fraud, and out, ice I1, ""Million Temple", of which, the first step ^ Phone number", can be A # si net mine... card holder's home or company's solid power p tongue, or personal action Ray P tongue, or the country code and E domain code solid Web phone number, _ voice number. No. Ma is the mobile phone with the country code. 9. If you apply for the patent scope, item 6 ^ ^ ^ ^, use the phone number and identification code to do the use of the Feng Wei daily card. , wherein the identification code in the step c is any text, a number, a knowledge number, or both, which can be input in a computer, or a combination thereof; The credit card holder provides the registration and storage of the product ", + heart "with the card issuing bank's rules change. Move in and do any modification at any time or 1Q. If you apply for the patent scope, the sixth is to ride the series 4 I" The telephone number and the identification code are used as the card use process to prevent fraud. In the step e, the card is provided by the card holder. The m^^^ phone number and identification code are authorized. The information can be more 昝德绿+, ”say ^ ^ ' is not controlled by the internal computer system of the credit card issuing bank, and the foreign party is the database. 28
TW95143014A 2006-11-20 2006-11-20 Anti-fraudulent method for financial service system using telephone number and identification code TW200823807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95143014A TW200823807A (en) 2006-11-20 2006-11-20 Anti-fraudulent method for financial service system using telephone number and identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95143014A TW200823807A (en) 2006-11-20 2006-11-20 Anti-fraudulent method for financial service system using telephone number and identification code

Publications (1)

Publication Number Publication Date
TW200823807A true TW200823807A (en) 2008-06-01

Family

ID=44771321

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95143014A TW200823807A (en) 2006-11-20 2006-11-20 Anti-fraudulent method for financial service system using telephone number and identification code

Country Status (1)

Country Link
TW (1) TW200823807A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI403146B (en) * 2009-01-21 2013-07-21 Chung Yu Lin Method and system for establishing network crime by telephone number and authorization code and source identification code
TWI810533B (en) * 2021-03-08 2023-08-01 玉山商業銀行股份有限公司 Method and system for financial proof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI403146B (en) * 2009-01-21 2013-07-21 Chung Yu Lin Method and system for establishing network crime by telephone number and authorization code and source identification code
TWI810533B (en) * 2021-03-08 2023-08-01 玉山商業銀行股份有限公司 Method and system for financial proof

Similar Documents

Publication Publication Date Title
US10521798B2 (en) Digital financial transaction system
US8745698B1 (en) Dynamic authentication engine
US11379816B2 (en) Secure electronic payment system
US20100044430A1 (en) Automated Remittance Network
US20110173122A1 (en) Systems and methods of bank security in online commerce
US20100229245A1 (en) System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations
US11907957B2 (en) Advanced check clearance system
CN101627574A (en) The system and method that is used for the transaction vetting service
US20060186195A1 (en) System for increasing the security of credit and debit cards transactions
JP2010505161A (en) System and method for verifying user identity in electronic transactions
KR20150109323A (en) System and method for funds transfer processing
US20060074798A1 (en) Financial instrument, system, and method for electronic commerce transactions
JP2007537517A (en) How to prevent unauthorized use of a credit card by a third party
US20110225045A1 (en) Paperless Coupon Transactions System
Stremlau et al. Courts, clans and companies: mobile money and dispute resolution in Somaliland
KR20080023282A (en) A method for paying money using human body-related information in commercial transaction systems
TW200823807A (en) Anti-fraudulent method for financial service system using telephone number and identification code
JP6511409B2 (en) Transaction locking system and transaction locking method in financial institution
Geva Consumer Liability in Unauthorized Electronic Funds Transfers
TW200941410A (en) Method of using a telephone number and an identification code as fraud prevention in a financial service system
JP6689917B2 (en) Personal authentication method at financial institutions
KR20140064242A (en) Method of processing account transfer, server performing the same and system performing the same
TWI272820B (en) Electronic passbook and plastic money anti-fake and burglarproof system
France et al. Biometrics improving financial accessibility
KR20190043512A (en) Method of processing account transfer, server performing the same and system performing the same