TW200928991A - A simple mechanism to prevent the credit card being used by an illegal user - Google Patents

A simple mechanism to prevent the credit card being used by an illegal user Download PDF

Info

Publication number
TW200928991A
TW200928991A TW96148158A TW96148158A TW200928991A TW 200928991 A TW200928991 A TW 200928991A TW 96148158 A TW96148158 A TW 96148158A TW 96148158 A TW96148158 A TW 96148158A TW 200928991 A TW200928991 A TW 200928991A
Authority
TW
Taiwan
Prior art keywords
signature
card
name
cardholder
credit card
Prior art date
Application number
TW96148158A
Other languages
Chinese (zh)
Inventor
Hann-Tzong Chern
Original Assignee
Hann-Tzong Chern
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hann-Tzong Chern filed Critical Hann-Tzong Chern
Priority to TW96148158A priority Critical patent/TW200928991A/en
Publication of TW200928991A publication Critical patent/TW200928991A/en

Links

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

Since the invention of SIM card of cellular phone, the problem of fake card can be solved gradually. However, the card can still be used by an illegal user when it is lost or stolen. Usually, it is not easy to judge a legal user from the signature since anyone can learn the signature from signed name of the credit card. Therefore, we invent a process to embed the signature of the card holder in a signed character string at the credit card. Without showing the signature clearly, the credit card will be much safer than now.

Description

200928991 九、發明說明: 【發明所屬之技術領域】 電子(加密/解密) 【先前技術】 晶片姆,㈣卡會依讀卡機的輸人來產生不同的輸出。 由於母-晶片卡對於相同的輸人會有自己獨特的輸出,讀卡 機可提供本身的輸入與晶卡片的輸出,由系統來判斷信用"卡 ❺ 的真偽。晶片卡獨特的輪出是由-數位錄匙來決定,此—系 統提供的麟隱齡晶4之内,無法讀丨與複製,所以偽卡 的問題可望獲得解決。雖然如此,如果無法解決盜刷的問題 銀行及其客戶仍齡因為制卡的遺失及被_招致重大的 扣失。目前防止盜刷的唯一機制是客戶在信用卡背面的簽 名。由於此-簽名置於信用卡,拾獲或竊得卡片的人都可經 由學習來制近㈣簽名,遇上沒有經驗或不負責任的售貨 ⑩ 貝,W用者仍財以過關。因此我們發明-個機制,讓盜刷 者無法得知持卡人使用的簽名,但商店則仍然可以由卡片來 判斷使用者_繼,㈣_麵止絕大雜的盜刷情 形。此-機制將不會對改變目前系統的運作與卡片的使用方 式,但將提供商家更多判斷是否盜刷的資訊,期望由於本發 明所提供的機制,使持卡人在遺失卡片後,能有更多的保障, 使得持卡人不會因細自敎,料敢某些侧卡上街。 5 200928991 田我們收到新的制卡,發卡銀行會要求我們立刻在卡片背 面簽名。日後,我們在特約商店消心寺,商家會要求賬單上 、二#卡片上的簽名有相同的筆跡,至於持卡人的簽名為 何’並不重要。理論上來說,如此之方式已可驗證消費者是否 為合法的卡片持有人。但在實務上,拾獲或竊得信用卡者 會有-段時間去學習卡片上的簽名,加上沒有經驗的售貨員, 有時候,假的簽名健可以侧。再加上東方人怕事的個性 有時不敢也不輯料上的些微差異去窮根究底,經常必須 等到持卡人發针㈣教後,才倾止㈣相行為。因 此,除了簽名之外,應該有一個客觀的機制去判斷消費者是否 為合法的卡片持有人’只要看到賬單上的簽名,就可以很青 ㈣告訴財,這不是你與發卡銀行蚊祕名。為了達到 這個目的’我們將提出-個方式,讓銀行從信用卡上面找出 數個數字,把它轉換為柯隨個數字,這鋪換後的數字將 通知給持卡人知道,持卡人在收到卡片後,將為自己選定一 個簽名’此-簽名可以為自己本名或本名的同音異字,也可以 為任何持卡人能記住的名字,以此為與發卡銀行約定的簽名, 並依照通知上的數字,將此―簽錢在姆應的位置上,其他 空格上則隨意簽名,_護真正簽名的所在。拾贱竊取卡 片者將無法從簽名齡騎出持卡人的簽名,只要平時能保 有自己在簽名欄上的秘密,即使是至親好有也無法冒用自己 200928991 的信用卡。 【實施方式】 便我立—個數字轉換的機制,為了說明上的方 U 機構建立__為··將五位十進位數字 的—位數’這邊X代表1至4的數字。這轉換可以是200928991 IX. Description of the invention: [Technical field of invention] Electronic (encryption/decryption) [Prior Art] The chip, (4) card will produce different outputs depending on the input of the card reader. Since the mother-wafer card has its own unique output for the same input, the card reader can provide its own input and the output of the crystal card, and the system can judge the authenticity of the credit" card. The unique round-out of the chip card is determined by the digital-numbered key. This is the system that can not be read and copied within the Linyin Crystal 4, so the problem of the fake card is expected to be solved. Nonetheless, if the problem of stolen brushing cannot be solved, the bank and its customers are still young because of the loss of the card and the loss of the company. The only mechanism currently preventing theft is the signature of the customer on the back of the credit card. Since this signature is placed on a credit card, the person who picks up or steals the card can learn to make a (4) signature, and if there is no experience or irresponsible sales of 10, the W user still has to pass the customs. Therefore, we invented a mechanism that would make it impossible for the thief to know the signature used by the cardholder, but the store can still judge the user by the card, and then (4) _ face the most complicated pirate. This mechanism will not change the way the current system operates and the card is used, but will provide the merchant with more information on whether to steal or not. It is expected that the card holder will be able to lose the card after the card is lost due to the mechanism provided by the present invention. There are more guarantees, so that cardholders will not be self-satisfied, and they will dare to take some side cards to the streets. 5 200928991 Tian We received a new business card and the issuing bank will ask us to sign the back of the card immediately. In the future, we will be in the special shop Xiaoxin Temple. The merchant will ask for the same handwriting on the bill and the signature on the second card. It is not important as to the cardholder's signature. In theory, this approach has proven that the consumer is a legitimate card holder. However, in practice, the person who picks up or steals the credit card will have a period of time to learn the signature on the card, plus the inexperienced salesperson. Sometimes, the fake signature can be side. Coupled with the personality of the Orientals who are afraid of things, sometimes they dare not go through the slightest differences in the collection, and often have to wait until the cardholder sends a needle (4) after teaching, only to stop the (four) phase behavior. Therefore, in addition to the signature, there should be an objective mechanism to determine whether the consumer is a legitimate card holder. 'As long as you see the signature on the bill, you can be very green (four) telling the money, this is not your mosquito card with the issuing bank. name. In order to achieve this goal, 'we will propose a way for banks to find a few numbers from the credit card and convert it to a number with Ke. The converted number will inform the cardholder that the cardholder is After receiving the card, you will choose a signature for yourself. 'This signature can be the homonym of your own name or your real name, or any name that the cardholder can remember, as the signature agreed with the issuing bank, and The number on the notice, the signing money in the position of M Ying, the other spaces are free to sign, _ protect the real signature. Picking up and stealing card players will not be able to ride the cardholder's signature from the age of signature, as long as they can keep their own secrets on the signature bar, even if they are close relatives, they can't use their credit card of 200928991. [Embodiment] Let me establish a mechanism for digital conversion. In order to explain the above-mentioned square U mechanism, the number of digits of the five digits of the digits is represented by the number of digits from 1 to 4. This conversion can be

_對絲的以,切叹·加贿留下三錄,再把它們 王轉為1至4的數字,或是任何其他方法。 2.發卡機構把每張_卡卡財的某五位數經猶述機制轉為三 位數字後,將此三位數與信时—起寄給制卡帽人。例如: 王小明可能收到的三位數為423。 3.收到信用卡後’信时持有人為自己選定—個名字以做為與發 卡銀行約定的簽名,此-名字可以為信用卡持有人容易記住但 別人猜不到的名字,例如中小學同學名字,小時鄰居的名字等 等。持卡人亦可為了方便,以自己的本名為選定的名字。 4·收到信用卡後,持卡人依發卡機構的說明及通知中的三位數字, 以選好的名字簽在簽名攔的相對位置上,例如:如果王小明為自 己選的名字是李小非,而他收到的數字為423,則他將把李小非 這三字分別簽在信用卡背面簽名欄上第一攔的第四位、第二攔 的第二位及第三欄的第三位。再把簽名攔上的其他空格,簽上 其他名字,以迷惑曰後意圖冒用者,例如:王小明的簽名棚被簽 7 200928991 ^的子可能為,,陳林黃李,大小社,忠轉仁”。如此,盜刷者 猜到的機率只有1/64,但被抓到的機率則為63/64。 如果持卡人選定的名字為本人名字,他將依發卡機構提供的三 位數,以平常習慣把本騎入相對應的空格,其他空格則以本名 但不同的寫法簽名。例如:王小明的簽名欄可為”王王王王, 小小小小’明明明明”。其中,只有依據似填入的是本人習慣 的簽名,其他則是以不同的寫法簽入的。 ❹6.持卡人消費時,應以約定的名字及平常的習慣簽帳,商家則通過 發卡機構提供的電子設備、列表或網路上的伺服器,以持卡人卡 號中的某五位數,轉相對應的三位數字,然後在信用卡上找出 持卡人約定的簽名。如果持卡人在簽單上的簽名與其約定的簽 名相同,商家再去比對其筆跡,否則商家可考慮拒絕此一筆交 易。例如:有人駐小_卡去料,但其使_簽名並不 是其選定的李小非,即使筆跡近似,商家仍可拒絕此—筆交易, ❹或者商家亦可請其㈣話至針斯,料分驗霜取得持卡 人約定的簽名後再進行交易。 7. 持卡人也可以將自己本人的名字簽在簽名攔上,其他的空格則 打上叉的符號,如此商家不會做數字的轉換,而只會依舊制比對 其筆跡。如此,持卡人可以有較大的方便與風險。 8. 商家亦可取其快速,只對於高額的消費,做數字的轉換,再檢查 其簽名,對於低額的消費,則接受信用卡背面上任何簽名,只依 8 200928991 舊制檢查其筆跡。如此,商家可以有較大的方便與風險。 【圖式簡單說明】 【主要元件符號說明】_ For the silk, sigh and add a bribe to leave three records, then turn them to a number from 1 to 4, or any other method. 2. The card issuer will transfer the three digits of each _卡卡财 to a three-digit number through the Syrian mechanism, and then send the three digits to the cardholder. For example: Wang Xiaoming may receive a three-digit number of 423. 3. After receiving the credit card, the holder chooses the name for the letter as the signature agreed with the issuing bank. This name can be a name that the credit card holder can easily remember but cannot be guessed by others, such as primary and secondary schools. The name of the classmate, the name of the hour neighbor, and so on. Cardholders may also choose their own name for their convenience. 4. After receiving the credit card, the cardholder signs the relative position of the signature block according to the name of the card issuer and the three digits in the notice. For example, if Wang Xiaoming chooses the name for himself, Li Xiaofei, and he If the number received is 423, he will sign the three characters of Li Xiaofei on the signature block of the back of the credit card, the fourth place on the first block, the second place on the second block, and the third place in the third column. Then mark the other spaces on the signature and sign other names to confuse the person who intends to use it. For example: Wang Xiaoming’s signature shed was signed 7 200928991 ^ The child may be, Chen Lin Huang Li, large and small, loyal Ren.” So, the chance of the stolen brusher is only 1/64, but the probability of being caught is 63/64. If the name chosen by the cardholder is his name, he will be based on the three-digit number provided by the card issuer. In normal habits, I will ride the corresponding space, and other spaces will be signed by my own name but differently. For example, Wang Xiaoming’s signature column can be “Wang Wang Wang Wang, Xiao Xiao Xiao Xiao Ming Ming Ming Ming”. Among them, only According to the signatures that I am accustomed to, the others are signed in different ways. ❹ 6. When the cardholder consumes, the account should be signed with the agreed name and usual habits, and the merchants will provide the electronic information provided by the card issuer. The server, the list, or the server on the network, with the five digits of the cardholder's card number, the corresponding three digits, and then find the signature agreed by the cardholder on the credit card. If the cardholder is on the ticket Signature and its agreement The signature is the same, the merchant goes to compare it to the handwriting, otherwise the merchant may consider rejecting the transaction. For example, someone is stationed in the small _ card, but the _ signature is not the selected Li Xiaofei, even if the handwriting is similar, the merchant can still Refuse this-hand transaction, ❹ or the merchant can also ask for the (4) words to the needles, and then take the cream to obtain the signature agreed by the cardholder before trading. 7. The cardholder can also sign his own name in the signature. Block, the other spaces are marked with a fork, so the merchant will not do the conversion of the number, but only the system is still the same. Therefore, the cardholder can have greater convenience and risk. It is fast, only for high consumption, digital conversion, and then check its signature. For low consumption, accept any signature on the back of the credit card, and check the handwriting only according to the old system of 200928991. Thus, the merchant can have greater convenience. And risk. [Simple diagram description] [Main component symbol description]

99

Claims (1)

200928991 十、申請專利範圍·· 串簽名,來驗 種為預防信用卡被盜刷,而以簽名棚内的一 證持卡人的機制。此一機制包含: \個為發卡機構、發卡銀行所能接受的數字轉換機制 =可敎信时封上驗財,將聽為不同的幾位 數子,並叫舰後喊字為雜,來料料人 欄上選定簽名位置。 、<200928991 X. Application for patent scope·· String signature to test the mechanism of cardholders in the signature shed to prevent the credit card from being stolen. This mechanism includes: \ A digital conversion mechanism acceptable to the card issuer and the issuing bank. = You can seal the money when you can be trusted. It will be heard as a different number of digits, and the name will be called after the ship. The signature location is selected on the material person bar. , < 2·-種簽名的m卡人可依發卡機翻通知,在師用卡 簽名欄上,奴簽名㈣,簽上自己想使_簽名,並在簽名 攔上其他空出的位置,簽上其他簽名,以產生—串簽名,以掩 護持卡人想使_簽名。持卡人想制岐名可以是自己本 名也可以是任何名字。 3· -種身分驗證的方式:特約商店依發卡機構的指導,在持卡 人信用卡上找出所需的幾位數字,並依1中所提供的數字 轉換機制,以發卡機構提供的電子設備、列表或網路伺服器, 找出持卡人簽名所在的位置,並依這些位置從2巾的一串簽 名中,找出持卡人應使用的簽名,對照簽單上所使用的名字 與筆跡以驗料妓轉合_針人。 十一、圖式: 200928991 七、指定代表圖: (一) 本案指定代表圖為:第( )圖。 (二) 本代表圖之元件符號簡單說明:2·- kind of signature m card person can turn the notice according to the card issuing machine, on the teacher card signature column, the slave signature (four), sign the _ signature, and mark the other vacated positions on the signature, sign other Signature to generate a -string signature to cover the cardholder's desire to make a _ signature. The cardholder wants to make a name that can be his own name or any name. 3. The method of identity verification: the special store, according to the guidance of the card issuer, finds the required digits on the cardholder's credit card, and uses the digital conversion mechanism provided in 1 to provide the electronic equipment provided by the card issuer. , list or web server, find the location of the cardholder's signature, and find the signature that the cardholder should use from the signature of the 2 towels according to these locations, and compare the name and handwriting used on the ticket. Take the test 妓 turn _ pin people. XI. Schema: 200928991 VII. Designated representative map: (1) The representative representative of the case is: ( ). (2) A brief description of the symbol of the representative figure: 八、本案若有化學式時,請揭示最能顯示發明特徵的化學式: 2009289918. If there is a chemical formula in this case, please reveal the chemical formula that best shows the characteristics of the invention: 200928991 Qcdl· ’/η- (2006.01) ※申1 ^ ^PC 分類:(2〇06 〇υ ※中請曰期: 一、發明名稱:(/文/英文) 一個簡單的預防盜刷機制/ A simple mechanism to prevent the credit card being used by an illegal user 一、申請人:(共1人) 姓名或名稱:(中文/英文) 陳漢宗 Hann-Tzong Chern 代表人:(中文/英文) 住居所或營業所地址:(中文/英文) 台北市基隆路四段43號電子系 #43, Sec. 4, Keelung Rd. Taipei, Dept, of ET 國籍:(中華民國/ R.〇.c ) 三、發明人:(共1人) 姓名:(中文/英文) 陳漢宗 Hann-Tzong Chern 國籍:(中華民國/R.O.C.) 200928991 四、聲明事項: □主張專利法第二十二條第二項□第一款或□第二款規定之事實,其 事實發生曰期為:年月曰。 □申請前已向下列國家(地區)申請專利: 【格式請依:受理國家(地區)、申請日、申請案號順序註記】 [□有主張專利法第二十七條第一項國際優先權: □無主張專利法第二十七條第一項國際優先權: 主張專利法第二十九條第一項國内優先權: 【格式請依:申請日、申請案號順序註記】 主張專利法第三十條生物材料: □須寄存生物材料者: 國内生物材料【格式請依:寄存機構、日期、號碼順序註記】 國外生物材料【格式請依:寄存國家、機構、日期、號碼順序註記】 ❹ 口不須寄存生物材料者: 所屬技術領域中具有通常知識者易於獲得時,不須寄存。 2 200928991 九、發明說明: 【發明所屬之技術領域】 電子(加密/解密) 【先前技術】 晶片卡發明後,信用卡會依讀卡機的輸入來產生不同的輸出。 由於每一晶片卡對於相同的輸入會有自己獨特的輸出,讀卡 機可提供本身的輸入與晶卡片的輸出,由系統來判斷信用卡 〇 的真偽。晶片卡獨特的輸出是由一數位鑰匙來決定,此一系 統提供的鱗隱胁晶#之内,無法讀_複製,所以偽卡 的問題可望獲得解決。雖然如此,如果無法解決盜刷的問題, 銀仃及其客戶健會因為信用卡的敵及被竊而招致重大的 才貝失。目前防止盜刷的唯一機制是客戶在信用卡背面的簽 由於此簽名置於信用卡,拾獲或竊得卡片的人都可經 由學習來得到近似的簽名,遇上沒有經驗或不貞責任的售貨 ❹ M,w用者仍然可以過關。因此我們發明-個機制,讓盜刷 者無去知知持卡人制的簽名,但商細減可以由卡片來 判斷使用者設定的簽名,以此機制來防止絕大部份的盜刷情 形此-機制將不會對改變目前系統的運作與卡片的使用方 式’但將提供商家更多判斷是否盜刷的資訊,期望由於本發 月=提供的機制,使持卡人在遺失卡片後,能有更多的保障, 使知持卡人不會因為害怕遺失,而不敢攜帶某些信用卡上街。 【發明内容】 5 200928991 當我們收到新的信用卡,發卡銀行會要求我們立刻在卡片背 簽名日後’朗在特約商料㈣,商家會要求賬單上 、、彳卡片上略名有烟的筆跡,至於持卡人的簽名為 可,並不重要。理論上來說,如此之方式已可驗證消費者是否 :合法的卡片持有人。但在實務上,拾獲或竊得信用卡者, 二有-段時間去學習封上秘名,加上沒有經驗的售貨員 有時候,假的簽名仍然可以過關。再加上東方人怕事的個性 =時不敢也不願對簽名上的些微差異去窮根究底,經常必須 相持t人發現卡片的遺失後,才能阻止冒用者的行為。因 此’除了簽名之外,應該有一個客觀的機制去判斷消費者是否 ί合法的卡片持有人,只要相賬單上岐名,就可以很肯 疋的告#對方,這不是你與發卡銀行峡略名。為了達到 這個目的’我們將提出―財式,讓銀行從信时上面找出 =:它轉換為不同的數個數字,這些轉換後的數字將 通知4卡人知道,持卡人在收到卡片後,將為自己選定一 ^名=-簽名可以為自己本名或本名的同音異字,也可以 為任何持卡人能記住的名字,以此為與發卡銀行約定的簽名 ^依照通知上的數字,槪―簽名簽在姉應置上,其他 =上則隨意簽名,以掩護真正簽名的所在。拾獲或竊取卡 片者將無法從簽名攔中__卡人的簽名,只好時 有自己在簽名攔上的秘密,即使技親好有也無法冒用= 200928991 的信用卡 【實施方式J • 須建立—個數字轉換_,為了說明上的方 換 W料顧建场轉顧㈣:將 轉換為XXX的二伤I…直, 丁遲伹数子 使用對昭表齡 代表1至4的數字。這轉換可以是 ❹ 2 也可以是使用加密後留下三位數,再把它們 王轉為1至4的數字,或是任何其他方法。 =顧__卡卡號_五位數_述機制轉為三 位數子後,將此三域與侧卡—起寄給侧卡申請人。例如. 王小明可能收到的三位數為423。 3.收到Μ卡後,侧卡財人為自己選定—個名字以做為與發 卡銀行約定的簽名,此-名字可以為信用卡持有人容易記住但 別人猜不到的名字,例如中小學同學名字,小時鄰居的名字等 等。持卡人亦可為了方便,以自己的本名為選定的名字。 《收到信用卡後,持卡人依發卡機構的說明及通知中的三位數字, 以選好的名字簽在簽名欄的相對位置上,例如:如果王小明為自 己選的名字是李小非,而他收到的數字為423,則他將把李小非 這三字分別簽在信用卡背面簽名攔上第一攔的第四位、第二搁 的第二位及第三欄的第三位。再把簽名攔上的其他空格,簽上 其他名字,以迷惑日後意圖冒用者,例如:王小明的簽名搁被簽 7 200928991 ^的子可能為”陳林黃李,A小巾上,忠水非仁”。如此,盜刷者 知到的機率只有1/64,但被抓到的機率則為⑽顺。 果持卡人選疋的名字為本人名字,他將依發卡機構提供的三 位數,以平常習慣把本名簽入相對應的空格,其他空格則以本名 但不同的寫法簽名。例如:王小明的簽名欄可為,,王王王王, 7 i K明明明a月。其中,只有依據似填入的是本人習慣 的簽名,其他則是以不同的寫法簽入的。 ❹6.持卡人時,應㈣定的名字及平常的習慣簽帳,商家則通過 發卡機構提供的電子設備、列表或網路上的飼服器,以持卡人卡 號中的某五位數,取得相對應的三位數字,然後在信用卡上找出 持卡人約定的簽名。如果持卡人在簽單上的簽名與其約定的簽 名相同’商家再去比對其筆跡,否則商家可考慮拒絕此一筆交 ^。:有人持王小明的信用卡去消費,但其使用的簽名並不 疋其選疋的李小非,即使筆跡近似,商家仍可拒絕此—筆交易, ❹ 絲絲亦可請其魏紅發卡銀行,、_分驗證後取得持卡 人約定的簽名後再進行交易。 7.持卡人也可崎自己本人的名字簽在簽名攔上,其他的空格則 打上叉的符號,如此商家不會做數字哺換,而只會依舊制比對 其筆跡。如此,持卡人可以有較大的方便與風險。 &商家亦可取其快速,只對於高額的消費,做數字的轉換,再檢查 其簽名’對於低額的消費,則接受信用卡背面上任何簽名,只依 8 200928991 舊制檢查其筆跡。如此,商家可以有較大的方便與風險。 【圖式簡單說明】 【主要元件符號說明】 200928991 五、 中文發明摘要: 自k曰曰片卡發明後,偽卡的問題已逐漸獲得解決。然而由於特約 商店員工,並不一定有判斷簽名真偽的能力,信用卡遺失或被竊 後的盜刷問題仍有待解決。本發明系以一個轉換機制,把信用卡 持卡人的簽名隱身於簽名攔一串簽名中,如此,信用卡遺失後,非 法持有人將因不知持卡人的簽名,無法模擬而不敢隨便冒用。 ❹ 六、 英文發明摘要: Since the invention of SIM card of cellular phone, the problem of fake card can be solved gradually. However, the card can still be used by an illegal user when it is lost or stolen. Usually, it is not easy to judge a legal user from the signature since anyone can learn the signature from signed name of the credit card. Therefore, we invent a o process to embed the signature of the card holder in a signed character string at the credit card. Without showing the signature clearly, the credit card will be much safer than now. 3 200928991 十、申請專利範圍: -—種為預防信用卡被盜刷,而以簽名棚内的一串簽名,來驗 證持卡人的機制。此一機制包含: 1. 一個為發卡觸、發核行所_受㈣賴制:此一 機制可以敎信时卡#上幾位數字,將其轉為柯的幾位 數字’並以轉概的數字為依據,來料持卡人在其簽名 攔上選定簽名位置。 ❹ 2.1種簽名的方式:持卡人可依發卡機構的通知,在其信用卡 簽名攔上,選定簽名位置,簽上自己想使㈣簽名,並在簽名 . 攔上其他空出的位置,簽上其他簽名,以產生-串簽名,以掩 . 護持卡人想使㈣衫。持卡人想制秘名可以是自己本 名也可以是任何名字。 3.種身;7驗5麵方式:特約商店依發卡機構的指導,在持卡 人用卡上找出所需的幾位數字,並依1中所提供的數字 ❹ 、、制’以發卡機構提供的電子設備、列表或網路祠服器 找出持卡人簽名所在的位置,並依這些位置從2巾的-串簽 ,找出持卡人應使用的簽名,對照簽單上所使用的名字 與筆跡以驗證消f者是否為合法的持卡人。 十一、圖式:Qcdl· '/η- (2006.01) ※申1 ^ ^PC Classification: (2〇06 〇υ ※Please note: I. Invention name: (/text/English) A simple anti-theft mechanism / A simple The name of the applicant: (1 person in total) :(Chinese/English) Department of Electronics, No.43, Section 4, Keelung Road, Taipei #43, Sec. 4, Keelung Rd. Taipei, Dept, of ET Nationality: (Republic of China / R.〇.c) III. Inventor: A total of 1 person) Name: (Chinese / English) Han Hanzong Hann-Tzong Chern Nationality: (Republic of China / ROC) 200928991 IV. Declarative matters: □ Propose patent law Article 22, paragraph 2, paragraph 1 or □ second The facts of the stipulations are as follows: 年 年 □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ □ There is a claim for patent law second Article 17 The first international priority: □ No claim for patent law Article 27, first international priority: Advocate patent law Article 29, first domestic priority: [Format please: application date Note on the application case number] Claiming Article 30 Biological Materials: □ Those who need to deposit biological materials: Domestic biological materials [formats should be recorded according to the order of the depository, date and number] Foreign biological materials [format please : Note on the order of the country, organization, date, and number of the depositor. 者 The person who does not need to deposit biomaterials is not required to be registered when there is a general knowledge in the technical field. 2 200928991 IX. Invention: [Technical field to which the invention belongs 】 Electronic (encryption/decryption) [Prior Art] After the wafer card is invented, the credit card will generate different outputs according to the input of the card reader. Since each chip card has its own unique output for the same input, the card reader can Providing its own input and the output of the crystal card, the system determines the authenticity of the credit card. The unique output of the chip card is The digital key determines that the problem of the fake card is expected to be solved within the scale of the system, and the problem of the fake card is expected to be solved. However, if the problem of the stolen brush cannot be solved, the silver plaque and its customer The credit card's enemies are stolen and incur serious losses. The only mechanism to prevent theft of the card is that the customer's signature on the back of the credit card is placed on the credit card, and anyone who picks up or steals the card can learn. Obtain an approximate signature and encounter a voucher with no experience or responsibility. M, w users can still pass. Therefore, we invented a mechanism to allow the pirate to know the cardholder's signature, but the slogan can be used to determine the signature set by the user. This mechanism is used to prevent most of the piracy. This mechanism will not change the way the current system works and the card is used' but will provide more information on whether the business is stealing or not. It is expected that the cardholder will lose the card due to the mechanism provided by this month. Can have more protection, so that the cardholders will not dare to carry some credit cards to the streets because they are afraid of losing. [Summary of the Invention] 5 200928991 When we receive a new credit card, the issuing bank will ask us to immediately sign the back of the card, and then we will ask for a handwritten note on the bill and the card. As for the cardholder’s signature, it does not matter. In theory, this way has been able to verify whether the consumer: a legitimate card holder. But in practice, if you pick up or steal a credit card, you have to learn the secret name for a while, plus the inexperienced salesperson. Sometimes, the fake signature can still pass. Coupled with the personality of the Easterners who are afraid of things = when they dare not want to go to the bottom of the difference in the signature, often must be held together to find the loss of the card, in order to prevent the behavior of the fraudulent. Therefore, in addition to the signature, there should be an objective mechanism to judge whether the consumer is legal card holder. As long as the account is on the account name, you can be very willing to sue the other party, this is not your card issuer Abbreviated name. In order to achieve this goal, 'we will propose the fiscal form, let the bank find out from the letter =: it converts to a different number, these converted numbers will inform the 4 card people to know that the cardholder is receiving the card. After that, you will choose a name for yourself =-signature can be the homonym of your own name or your real name, or any name that the cardholder can remember, as the signature agreed with the issuing bank^ according to the number on the notice , 槪 ― signature sign in the 姊 should be placed, other = on the free signature, to cover the real signature. Those who pick up or steal cards will not be able to block the signature of the __ cardholder from the signature, but have the secret of their signature on the signature, even if the skill is good, they can not use the credit card of 200928991 [Implementation J • Must be established - A digital conversion _, in order to explain the square change W material Gu Jianchang turn (4): will be converted to XXX two injuries I ... straight, Ding Chi 伹 number using the number of the representative age of 1 to 4. This conversion can be ❹ 2 or a number that uses encryption to leave three digits, then turn them to 1 to 4, or any other method. = Gu __ Kaka number _ five digits _ After the mechanism is changed to three digits, the three domains and the side card are sent to the side card applicant. For example, Wang Xiaoming may receive a three-digit number of 423. 3. After receiving the Leica, the side card person chooses a name for himself as the signature agreed with the issuing bank. This name can be a name that the credit card holder can easily remember but cannot be guessed by others, such as primary and secondary schools. The name of the classmate, the name of the hour neighbor, and so on. Cardholders may also choose their own name for their convenience. After receiving the credit card, the cardholder signs the relative name of the signature column according to the three digits of the card issuer's instructions and notice. For example, if Wang Xiaoming chooses his name as Li Xiaofei, he accepts When the number is 423, he will sign the three characters of Li Xiaofei on the back of the credit card to block the fourth place of the first block, the second place of the second place and the third place of the third column. Then mark the other spaces on the signature and sign other names to confuse the future intention to use the person. For example: Wang Xiaoming’s signature was signed 7 200928991 ^ The child may be "Chen Lin Huang Li, A small towel, Zhongshui Non-ren." In this way, the chance of the thief is only 1/64, but the probability of being caught is (10). If the cardholder's name is the name of the person, he will use the three digits provided by the card issuer to check the name into the corresponding space. Other spaces are signed by the name but differently. For example: Wang Xiaoming's signature column can be, Wang Wang Wang, 7 i K Ming Mingming a month. Among them, only the signatures that seem to be filled in are the ones that I am used to, and others are signed in different ways. ❹ 6. When the cardholder is in charge, the account should be (4) set to the usual name and the usual habits, and the merchant will use the electronic device provided by the card issuing institution, the list or the feeding device on the network to use a five-digit number in the cardholder's card number. Obtain the corresponding three digits and then find the signature agreed by the cardholder on the credit card. If the cardholder's signature on the signing is the same as the one signed by the merchant, the merchant will go to compare it to the handwriting, otherwise the merchant may consider rejecting the credit. Some people use Wang Xiaoming's credit card to spend, but the signature used by him is not the Li Xiaofei who chooses it. Even if the handwriting is similar, the merchant can still refuse this transaction, and he can also ask Wei Wei to issue the bank, _ After the verification, the signature signed by the cardholder is obtained and then the transaction is performed. 7. The cardholder can also sign his own name on the signature block, and the other spaces are marked with a cross, so the merchant will not do the digital feed, but will only compare the handwriting. In this way, cardholders can have greater convenience and risk. & merchants can also take it quickly, only for high consumption, do digital conversion, and then check their signature. For low consumption, accept any signature on the back of the credit card, only check the handwriting according to the old system of 200928991. In this way, merchants can have greater convenience and risk. [Simple description of the diagram] [Explanation of main component symbols] 200928991 V. Abstract of Chinese invention: Since the invention of the k-chip, the problem of the pseudo-card has been gradually solved. However, due to the ability of the special store staff to judge the authenticity of the signature, the problem of stolen credit card lost or stolen remains to be resolved. The invention adopts a conversion mechanism to hide the signature of the credit card holder from the signature of the signature, so that after the credit card is lost, the illegal holder will not be able to simulate and not dare to take the risk because he does not know the signature of the card holder. use. ❹ 六, English Abstract: Since the invention of SIM card of cellular phone, the problem of fake card can be solved gradually. However, the card can still be used by an illegal user when it is lost or stolen. Usually, it is Not easy to judge a legal user from the signature since anyone can learn the signature from signed name of the credit card., we invent ao process to embed the signature of the card holder in a signed character string at the credit card. 3, the application for patents: - The type of patent application: - a mechanism for verifying the cardholder's mechanism by preventing a credit card from being stolen and using a signature in the signature booth. This mechanism includes: 1. One is for issuing a card, and the issuing is _ by (4): This mechanism can signal several digits on the card #, turn it into several digits of Ke' and transfer Based on the number, the incoming cardholder selects the signature location on his signature. ❹ 2.1 kinds of signatures: Cardholders can choose the signature location on their credit card signature block according to the notice of the card issuer, sign the signature they want to make (4), and sign the signature. Block other vacated positions and sign Other signatures to generate - string signatures to cover. The cardholder wants to make (four) shirts. The cardholder wants to make a secret name that can be his own name or any name. 3. Seeding; 7 test 5 ways: the special store according to the guidance of the card issuer, find the required number on the cardholder's card, and according to the number provided in 1 、, system 'to issue card The electronic device, list or network server provided by the organization finds the location where the cardholder's signature is located, and finds the signature that the cardholder should use from the 2-tap-string sign according to these positions, which is used on the check-up form. The name and handwriting to verify whether the consumer is a legitimate cardholder. XI. Schema:
TW96148158A 2007-12-17 2007-12-17 A simple mechanism to prevent the credit card being used by an illegal user TW200928991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96148158A TW200928991A (en) 2007-12-17 2007-12-17 A simple mechanism to prevent the credit card being used by an illegal user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96148158A TW200928991A (en) 2007-12-17 2007-12-17 A simple mechanism to prevent the credit card being used by an illegal user

Publications (1)

Publication Number Publication Date
TW200928991A true TW200928991A (en) 2009-07-01

Family

ID=44864320

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96148158A TW200928991A (en) 2007-12-17 2007-12-17 A simple mechanism to prevent the credit card being used by an illegal user

Country Status (1)

Country Link
TW (1) TW200928991A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI668586B (en) * 2014-05-30 2019-08-11 阿里巴巴集團服務有限公司 Data communication method and system, client and server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI668586B (en) * 2014-05-30 2019-08-11 阿里巴巴集團服務有限公司 Data communication method and system, client and server

Similar Documents

Publication Publication Date Title
US7347361B2 (en) System, method and program product for account transaction validation
JP5948498B2 (en) Method and system for securing user ID
US20010034717A1 (en) Fraud resistant credit card using encryption, encrypted cards on computing devices
US20110302089A1 (en) Electronic credit card with fraud protection
WO2008028215A1 (en) Visual code transaction verification
TW200915235A (en) Self-authenticating credit card system
CA2534987A1 (en) Systems and methods for facilitating transactions
US20110225045A1 (en) Paperless Coupon Transactions System
TWI353765B (en)
US6412690B1 (en) Credit card security method and credit card
TW200928991A (en) A simple mechanism to prevent the credit card being used by an illegal user
US7860745B2 (en) Credit card signature inspection system and method capable of enhancing security for transaction
CN107305660A (en) A kind of mobile phone financial trade method and mobile phone are double to put bank card
US20060092476A1 (en) Document with user authentication
JP2006293454A (en) Personal identification method and system
JP2001216395A (en) Authentication system using possessed paper money and application of the system
CN100397388C (en) Digital card online safety inspection system and method of safety inspection
JP2007305089A (en) Method for registering and collating id number
Chen et al. Design of Secure Enhanced Privacy Protection Electronic Hotel-card Based on QR Code
Kupetz Our cashless future
JP6145319B2 (en) Personal information control system
JP2004013363A (en) Identification system in card settlement
TWM289006U (en) Authentication device and reading device for authentication data thereof
Joshi Black Card Forensics
Iannacci et al. ACCESS DEVICE FRAUD and RELATED FINANCIAL