200941410 九、發明說明: 【發明所屬之技術領域】 本發明係提供一種「以電話號碼及識別碼做為金融 - 服務系統中防弊之方法(二)」,其是透過銀行開戶的帳 ; 戶擁有者向所屬銀行提供一組併列的「電話號碼及照 _ 片」、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 φ 電話號碼及眼虹膜」、或「電話號碼及語音」等資料, 並登錄儲存於該銀行內部的電腦資料庫内,使其做為銀 行與帳戶擁有者之間各項金融服務上的授權認證依 據,除能確保彼此各項金融交易上的更為安全外,更能 有效杜絕金錢被盜領、詐領或信用卡被盜刷等犯罪行為 發生。 【先前技術】 ® 基於安全因素的考量與要求下,許多政府的公部門 一 及軍事部門或私人企業的某些部門,均會對人員的進出 u又有門禁管制措施’其探用辨識的方式包括較低階的臉 部照片或影像的辨識,以及較高階的生物特徵辨識,例 如.视網膜、指紋、指靜脈、眼虹膜、語音等;因此, 則述各種辨識方式的軟、硬體技術與設備乃被成功地開 發問市’並實際有效地應用在各種場合上己有一段時 5 200941410 間。 再者’隨著電信通訊3G或4G時代的來臨,以及 光纖網路頻寬的增加,使得利用手機來傳輸個人影像或 照片或語音等資料亦己是非常普遍的現象,故本發明人 在實施先前申請第095143014號發明案之實際測試過 程中發現’對於某些殘障者要以手指按壓輸入「電話號 碼及識別碼」時會有不同程度的障礙與困難,而除此之 外’某些人對於自己所設定的識別碼亦會發生忘記或誤 記之情形,因此,若能改以r電話號碼及照片」、或「電 話號碼及動態影像」、或「電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜」、或「電話號碼及語音」等即可獲得克服 改善。 【發明内容】 本發明之主要目的在提供—種「以電話號碼及識別 碼做為金融服務系統中防弊之方法(二)」,係由金融開 戶之帳戶擁有者,自行提供一組併列「電話號碼及照 片J、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 「電話號碼及眼虹膜」、或「電話號碼及語音」等的專 屬授權認證資料,給其所有開立帳戶往來的金融單位, 6 200941410 參 ❹ 而該所有開立帳戶往來的金融單位在核對該帳戶擁有 者的相關身份證明資料後’即將該組併列「電話號鳴及 照片」、或「電話號碼及動態影像」、或「電話號碼及指 紋」、或「電話號碼及視網膜」、或「電話號碼及㈣脈」、 或「電話號碼及眼虹膜」、或「電話號鴨及語音」等的 專屬授權認證資料’給予登錄儲存在其金融單位的内部 電腦資料庫;當各金融單位受理帳戶擁有者進行各項金 融服務時’例如:臨櫃存取款或_、持金融卡至atm 存取款或轉帳匯款、網路銀行轉帳匯款等,除執行對原 有帳號、密碼、動態密碼卡等查核比對外,更同步執行 比對其與登錄儲存於該金融單位内部電腦資料庫中專 屬「電話號碼及照片」、或「電話號碼及動態影像」、或 「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等的授權認證資料是否相符合,使銀行能 同步確定該項或該次的交易服務,是否確為該帳戶擁有 者真正授權下所為之交易,進而可避免因身份資料遭 竊,或金融卡遣失及其密碼被竊知等,所導致金錢被盜 領或詐領等弊端情事的發生。 本發明之另一目的在提供一種「以電話號碼及識別 碼做為金融服務系統中防弊之方法(二)」,係由金融開 200941410 戶之帳戶擁有者,自行提供一組併列「電話號碼及照 片」、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 「電話號碼及眼虹膜」、或「電話號碼及語音」等的專 屬授權認證資料,給其所有開立帳戶往來的金融單位, 而該所有開立帳戶往來的金融單位在核對該帳戶擁有 者的相關身份證明資料後’即將該組併列「電話號碼及 照片」、或「電話號竭及動態影像」、或「電話號碼及指 紋」、或「電話號瑪及視網膜」、或「電話號碼及指靜脈」、 或「電話號碼及眼虹膜」、或「電話號碼及語音」等的 專屬授權認證資料,給予登錄儲存在其金融單位的内部 電腦資料庫當各金融單位受理帳戶擁有者持信用卡進 行刷卡或線上刷卡時,除執行對原有卡號查核比對外, 更同步執行比對其與登錄儲存於該金融單位內部電腦 資料庫中專屬「電話號碼及照片」、或「電話號瑪及動 態影像」、或「電話號碼及指紋」、或「電話號碼及视網 m話㈣及指靜脈」、或「電話料及眼虹膜」、 或「電話號碼及語音」等的授權認證資料是否相符合, 使銀行能同步確定該項或該次的刷卡交易,是否確為該 帳戶擁有者真正授權下所為之信用卡交易,進而可避免 园信用卡遣失、遭竊等,所導致被盗刷弊㈣事的發生。 200941410 【實施方式】 ’本發明是—_「以《言舌號瑪及識別 統中防弊之方法(二)」,其步驟包 開戶:、至金融單位填寫「存款相關業務申請書」辦理 ▲ b依法定「存款開戶總约定書」之規定,憑身份200941410 IX. Description of the Invention: [Technical Field of the Invention] The present invention provides a method for "preventing fraudulent use in a financial-service system by using a telephone number and an identification code (2)", which is an account opened by a bank; The owner provides a set of "phone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger" Intravenous, or φ phone number and eye iris, or "telephone number and voice", and stored in the bank's internal computer database, making it a financial service between the bank and the account owner. In addition to ensuring that each other's financial transactions are more secure, it is more effective in preventing criminal misappropriation, fraudulent or credit card theft. [Prior technology] ® Based on security considerations and requirements, many government departments, military departments, or certain departments of private enterprises have access control and access control measures. Including lower-level facial photo or image recognition, and higher-order biometric identification, such as retina, fingerprint, finger vein, iris, voice, etc.; therefore, the soft and hard technology of various identification methods And the equipment has been successfully developed to ask the market' and has been effectively applied in various occasions for some time between 5 200941410. Furthermore, with the advent of the 3G or 4G era of telecommunications, and the increase in the bandwidth of optical networks, the use of mobile phones to transmit personal images or photos or voices has become a very common phenomenon, so the inventors are implementing In the actual test process of the previous application No. 095143014, it was found that 'there are different degrees of obstacles and difficulties for some disabled people to enter the "telephone number and identification code" with a finger press, and other people Forgetting or mistaking the identification code set by yourself, therefore, if you can change the r phone number and photo", or "telephone number and motion picture", or "phone number and fingerprint", or "phone number" And the retina, or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" can be overcome to improve. SUMMARY OF THE INVENTION The main object of the present invention is to provide a "method of preventing fraud in a financial service system by using a telephone number and an identification code (2)", which is provided by a account holder of a financial account opening bank. Phone number and photo J, or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or The exclusive authorized certification materials such as "telephone number and voice" are given to all financial institutions that open accounts. 6 200941410 Participating and all financial institutions that open accounts are checking the relevant identity documents of the account holders. 'The group will be listed in the "Phone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and (four) pulse", or "telephone" "Special Authorized Certification Information for Numbers and Eyes Iris" or "Telephone Duck and Voice" is given to the account and stored in the interior of its financial unit. Brain database; when each financial unit accepts the account owner for various financial services, such as: deposit and withdrawal of funds or _, holding financial card to ATM deposit or transfer, transfer, online bank transfer, etc., except for execution Checking the original account number, password, dynamic password card, etc., and synchronizing the execution of the exclusive "phone number and photo", or "telephone number and motion picture" stored in the internal computer database of the financial unit, Whether the authorized certification materials such as "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" are compatible, Enabling the bank to determine whether the transaction or the transaction service of the transaction is indeed a transaction authorized by the account owner, thereby avoiding the theft of the identity data, or the loss of the financial card and the password being stolen. The occurrence of malpractices such as theft or fraudulentity of money. Another object of the present invention is to provide a "method of preventing fraud in a financial service system by using a telephone number and an identification code (2)", which is provided by the account holder of the financial opening 200941410 household, and provides a set of "phone numbers" by themselves. And photos, or "telephone numbers and motion pictures", or "telephone numbers and fingerprints", or "telephone numbers and retinas", or "telephone numbers and finger veins", or "telephone numbers and irises", or "telephones" The exclusive authorized certification materials such as number and voice are given to all the financial units in which the account is opened, and all the financial units that open the account are listed after the relevant identity certificate of the account owner. "Telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris" Or the exclusive authorized authentication materials such as "telephone number and voice", which are registered and stored in the internal computer database of their financial unit. When the account accepting account holder credit card is used for credit card or online credit card, in addition to performing the check on the original card number, the execution is more synchronous than the exclusive "phone number and photo" stored in the internal computer database of the financial institution. Or "telephone and motion picture", or "telephone number and fingerprint", or "telephone number and video m (4) and finger veins", or "telephone material and eye iris", or "telephone number and voice" Whether the authorized certification materials are in conformity, so that the bank can simultaneously determine whether the credit card transaction of the item or the time is the credit card transaction that the account owner actually authorizes, thereby avoiding the loss, theft, etc. of the credit card of the park. Stolen cheating (four) things happen. 200941410 [Embodiment] 'The present invention is - _ "Methods for preventing fraud in the tongue and the mark (2)", the steps of opening the account:, to the financial unit to fill out the "deposit-related business application" ▲ b According to the provisions of the "General Agreement on Deposit Account Opening", by identity
證及第二身份證明文件,並就簽名或蓋章擇-或合併留 存建擋於金融單位備查。 c開戶者自行提供—組併列的「電話號碼及照 片」或電話號碼及動態影像」、或「電話號瑪及指紋」、 或「電話號碼及視铜腊 ,Γ ^ 恍網膜J、或「電話號碼及指靜脈」、或 「電話號瑪及眼虹膜」、或「電話號褐及語音」等資料 給金融單位’以做為其專屬之授權認證資料。The certificate and the second identity document are filed or sealed for the purpose of signing or stamping - or the merger is kept in the financial unit for future reference. c. The account holder provides the "phone number and photo" or telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and copper wax, Γ ^ 恍 J J, or "telephone Information such as number and finger veins, or "phone number and eye iris", or "telephone number and voice" are given to the financial unit as its exclusive authorized certification material.
如第一圖所示 碼做為金融服務系 含: d、由金融單位依「受理開戶作業檢核表」審查後, 核准開戶並核發開戶帳薄及/或金Μ。 e、金融單位將聞戶去、 將開戶者二個人身分資料、帳戶名、As shown in the first figure, the code is used as the financial service system: d. After the financial unit has reviewed the “Acceptance Checklist for Account Opening”, it is approved to open an account and issue an account book and/or a bank account. e. The financial unit will go to the customer, the account holder’s identity information, account name,
金融卡號及密碼等資料,I 料·登錄儲存於其內部的電腦資料 庫內’並將該開戶者所接伥 叮把供專屬足「電話號碼及照片」、 或「電話號碼及動態畢彡倕 .Γ 〜fy像」、或「電話號碼及指紋」、或 「電話號碼及視網膜丨、命「兩上 ’膜J或電話號碼及指靜脈」、或「電 話號碼及眼虹膜」、或「雷# 肤J Α 電話號碼及語音」等授權認證 200941410 庫:另登錄儲存於其內部電腦所設的,,授權認證資料 二:前述各步驟中所述之「存款相關業務申請 二類=戶總約定書」及r受理開戶作業檢核表」 ,其在格式或内容中所規㈣諸多事 、::、條放,均係由各金融單位自行依據其所屬國家 U律來❹而成,不_家及錢 其所使用的名穰雖“ 纟稱雖會有些許不同’但相關法律所規範的 本質仍屬相同,先併予說明。 \步驟c中之「電話號碼」,係可為開戶者(即 帳:擁有者)家中或公司的固網電話號碼,或為個人行 號碼或是冠有國別碼及區域碼的固網電話號 碼’或是冠有國別碼的行動電話號碼;且該「照片」或 「動態影像」或「指紋」或「視網膜」或「指靜脈」或 「眼虹膜」或「語音」等識別用資料,係可由由開戶者 (P帳戶擁有者)在提供登錄儲存後,依循金融單位所規 範之流程或方式’逕自做隨時任意之修改或變更。 另外’步騾e中該金融單位内部電腦所設之”授權 還§登資料庫’’’係可變更設置於非屬該金融單位内部的 電腦系統所操控,而是屬於外界其他電腦系統中所建置 之·#部授權認證資料庫”,使能降低該金融單位電腦作 200941410 業系統的維護成本。 續如第二圖及第三圖所示,係本發明使用於親臨 銀行櫃檯辦理金融服務之流程;當帳戶擁有者2〇攜帶 開戶帳薄與簽章至銀行3〇臨櫃辦理存、取款或匯款手 〆 續時,先填寫金額於存款單或取款單或匯款單上,以及 二 其帳戶的帳號與密碼,接著再輸入其授權認證資料31 專屬之「電話料及照m話號瑪及動態影像」、 ► 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等【例如:1234567 (電話號瑪)+照片】 後,該銀行30内部的銀行電腦資訊處理中心32,除立 即執行既有核對帳戶戶名'帳號、密碼等資料與金額 外,並同時會對建置於該銀行30内的授權認證資料庫 33發出”要求比對”的指令,在有比對得出與登錄儲存於 > 該授權認證資料庫33內完全相符合之—組「電話號瑪 I照片」時’該授權認證資料庫33 gp會回覆給該銀行 • €腦資訊處理中心32 -個”認證符合,,的指令,且該銀 行電腦資訊處理中心32亦隨即向帳戶擁有者2〇發出存 取政或匯放成功的訊息,使該帳戶擁有者2〇完成其所 要求的存取款或匯款等手續,同時也表示該次的交易服 務,確實是該帳戶擁有者20真正授權下所完成的一次 200941410 金融交易 反之’若比對得ψ 付出與登錄儲存於該授權認證資 庫33內,無任何相符a & 科 、13的一組「電話號碼及照片時, 該授權認證資料33即舍 ^ Η會回覆給該銀行電腦資訊處理中 心32 —個”認證不符,,的 的指令,並藉由該銀行電腦資訊 處理中心32發出”重絲虹_、 重新輪入,,的訊息給帳戶擁有者20, 換言之’除非是真正的愤 恨户擁有者20自己,否則其他 鲁 任何人即使出具帳戶戶名、帳號及密碼等資料,將因在 »、、法獲知帳戶擁有者2G的「電話號瑪及照片」情況下, 而不能在臨樞的情形下來取得該帳戶擁有者2〇帳戶內 的任何金錢,因此,對於非由帳戶擁有者2〇真正授權 下的非法臨櫃取款行為將能完全杜絕。再者,前述銀行 〇現有内部金融電腦作業系統的軟、硬設備,在既有 營運下均已非常完備’其可能不願額外花費建置本發明 所需授權認證資料庫33的成本,因此,如第三圖所示, 只要銀行30a將其銀行電腦資訊處理中心32a的軟體程 式稍作修改’而將每次要求比對的指令,經由網路w 傳送至建置於外界另一電腦系統中的外部授權認證資 料庫40’仍可達成比對相符合或不相符合的認證功能, 因為該外部授權認證資料庫40係與許多銀行金融單位 相互連網,每一位在各金融銀行3〇a開戶後的帳戶擁有 12 200941410 者20,其所提供專屬「電話號碼及照片」之授權認證 資料31a’均經由各金融銀行30a直接透過網路w而登 錄儲存於該外部授權認證資料庫40內,故各銀行3〇 a 要導入本發明的技術程度極為簡單,除立即可實施外又 - 不增加營運成本。Information such as the financial card number and password, I material and login are stored in the internal computer database' and the account holder is selected for the exclusive "phone number and photo", or "telephone number and dynamics" Γ ~fy like", or "telephone number and fingerprint", or "telephone number and retina", "two on the membrane J or telephone number and finger vein", or "telephone number and eye iris", or "lei" #肤J ΑPhone number and voice" and other authorized certification 200941410 Library: Another login is stored in its internal computer, authorized certification data 2: the above-mentioned steps in the "deposit-related business application category 2 = household agreement The book and the acceptance of the account opening checklist, which are regulated in the format or content (4), many things, :::, are all made by the financial institutions themselves according to the U law of their country, not _ The name used by the family and the money is “although the nickname may be slightly different” but the nature of the relevant laws is still the same, first and foremost. \The “telephone number” in step c can be the account holder. (accounting: owner) home Or the company's fixed-line telephone number, or a personal line number or a fixed-line telephone number with a country code and area code' or a mobile phone number with a country code; and the "photo" or "motion image" Identification data such as "fingerprint" or "retina" or "finger vein" or "eye iris" or "speech" may be specified by the account holder (P account owner) after providing login and storage, in accordance with the financial unit The process or method is to be modified or changed at any time. In addition, the “authorization of the internal computer of the financial unit” is also set to be controlled by a computer system that is not within the financial unit, but belongs to other computer systems in the outside world. The establishment of the ##Authorization Certification Database enables the reduction of the maintenance cost of the financial unit computer for the 200941410 industry system. Continued as shown in the second and third figures, the present invention is used in the process of visiting a financial counter in the bank counter; when the account owner 2 carries the account book and the signature to the bank, the deposit is made, or the deposit is made. When the remittance is continued, fill in the amount on the deposit slip or the withdrawal slip or the remittance slip, and the account number and password of the account, and then enter the authorization information. 31 Exclusive "Phone material and photo m , or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", etc. [example: 1234567 ( After the phone number Ma) + photo], the Bank's internal bank computer information processing center 32, in addition to immediately executing the existing check account account name 'account, password and other information and gold extra, and will be built at the bank 30 The authorization authentication database 33 in the inside issues a "request comparison" command, which is completely matched with the login and stored in the authorization authentication database 33 - the group "phone number At the time of the film, the authorized certification database 33 gp will reply to the bank • € Brain Information Processing Center 32 - "certification conforms," and the bank computer information processing center 32 will immediately send the account owner 2 The successful access to the government or the remittance, so that the account owner 2 completes the required deposit or withdrawal or remittance procedures, and also indicates that the transaction service is indeed the account owner 20 truly authorized The completed 200941410 financial transaction is reversed. If the payment and registration are stored in the authorized certification database 33, there is no corresponding group of "phone numbers and photos of a & Section, 13". That is, the message will be replied to the bank computer information processing center 32 - "authentication inconsistency," and the message sent by the bank computer information processing center 32 "Heavy Silk _, re-arrival," The account owner 20, in other words 'unless it is the real resentful owner 20 himself, otherwise the other Lu will issue information such as account name, account number and password, etc., due to », The law knows the account owner 2G's "phone number and photo", but can't get any money in the account holder's 2〇 account in the case of the pivot, therefore, the real authorization is not for the account owner. The illegal illegal withdrawals will be completely eliminated. Furthermore, the aforementioned banks have existing software and computer operating systems with soft and hard devices that are already well-established under existing operations. They may not be willing to pay extra for the cost of building the authorization database 33 required for the present invention. As shown in the third figure, as long as the bank 30a slightly modifies the software program of its bank computer information processing center 32a', the instruction for each comparison request is transmitted via the network w to another computer system built in the outside world. The external authorization authentication database 40' can still achieve the matching or non-conforming authentication function, because the external authorization authentication database 40 is connected to many banking financial units, each of which is located in each financial bank. a account after opening an account has 12 200941410 20, and the authorized authentication data 31a' of the exclusive "phone number and photo" provided by the account bank is directly stored in the external authorized authentication database 40 via the network bank 30a. Therefore, each bank 3〇a is very simple to introduce the technology of the present invention, and can be implemented immediately without increasing the operating cost.
二 再如第四圖及第五圖所示,係本發明使用於ATM 機器50(俗稱自動樞員機)金融服務之流程;當帳戶擁有 φ 者20攜帶金融卡至ATM機器50,辦理存、取款或匿 款手續時,先將金融卡插入ATM機器50內,經輸入金 融卡密碼及金額後,該ATM機器50操作畫面上會出現 —可輸入包括「電話號碼及照片」、或「電話號碼及動 態影像」、或「電話號碼及指紋」、或「電話號碼及視網 膜」、或「電話號碼及指靜脈」、或「電話號碼及眼虹膜」、 或「電話號碼及語音」等資料的欄位51,帳戶擁有者 ® 20必須在該欄位51內輸入其專屬「電話號碼及照片」、 或「電話號碼及動態影像」、或「電話號碼及指紋」、或 「電話號碼及視網膜」、或「電話號碼及指靜脈」、或「電 話號碼及眼虹膜」、或「電話號碼及語音」等的授權認 證資料52,否則無法進行後續的交易程序,若已輸入 其中一組正確的「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號碼及指紋」、或「電話號碼及視 13 200941410 網膜」、或「電話號碼及指靜脈」、或「電話號瑪及眼虹 膜」、或「電話號碼及語音」等之授權認證資料52【例 如·· 1234567 (電話號碼)+照片】後,該aTm機器 ' 50所屬銀行60的銀行電腦資訊處理中心61,除立即執 j 行既有核對金融卡號及密碼資料與金額外,並同時會對 二 建置於該銀行60内的授權認證資料庫62發出,,要求比 對的指令,在有比對得出與登錄儲存於該授權認證資 _ 料庫62内,完全相符合之—組「電話號碼及照片」時, 該授權認證資料庫62即會回覆給銀行電腦資訊處理中 心61 —個”認證符合”的指令,且該銀行電腦資訊處理 中心61亦隨即發出,,同意存款或出鈔或轉帳,,成功的訊 息至ATM機器50,而使該持有金融卡的帳戶擁有者 2〇’可從該ATM機器50上完成其所需之存款或出鈔或 轉帳成功之交易手續,同時也表示該次在ATM機器5〇 Φ 上的交易服務,確實是該帳戶擁有20真正授權下所完 成的一次金融交易。 • 反之,若比對得出與登錄儲存於該授權認證資料 庫62內,無任何相符合的—組「電話號碼及照片」時, 該授權認證資料庫62即會回覆給該銀行電腦資訊處理 中心6〗一個,,認證不符,,的指令,並藉由該銀行電腦資 訊處理中心6!而使ATM機器5〇上的畫面出現,,重新輸 200941410 入” 「電話號碼及照片」的訊息給帳戶擁有者2〇;因 此’任何撿拾或偷竊所取得的金融卡,即使得知其密 瑪’亦會因不知其「電話號碼及照片」、或「電話號碼 . 及動態影像」、或「電話號碼及指紋」、或「電話號碼及 : I網膜」、或「電話號瑪及㈣脈」、或「電話號碼及眼 二 虹膜」、或「電話號碼及語音」等,而無法從ATM機器 50上來取款或轉帳竊得贓款,相對地,因不慎遣失或 • 遭竊金融卡的帳戶擁有者20,也不必再害怕帳戶內的 金錢遭盜領所導致的實質金錢損失,更不必急著打電話 向核發金融卡的銀行來通報掛失之手續,故可消除來自 偷竊他人金融卡及密碼的犯罪案件。 再者,如第四圖所示者,該ATM機器5()所屬銀 行60a導入本發明之方法時,其內部亦可免去建置授權 認證資料庫62的成本,而選擇每次將來自ATM機器 _ 50的「電話號碼及照片」、或「電話號碼及動態影像」、 — 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等專屬授權認證資料52,經銀行電腦資 訊處理中心01a送出”要求比對,,指令,再透過網路w傳 送至外界的外部授權認證資料庫40,仍可達成執行比 對是否相符合之認證功能》 15 200941410 又如第六圖及第七圖所示’係本發明使用於網路線 上轉帳隆款金融服務之流程;當帳戶擁有者20經由網 路W連結至所屬帳戶的網路銀行7〇後,在其顯示頁面 的主攔位71内,除應輸入”使用者名稱及動態密碼 (OTP)”之既有規定與金額外,必須再於另—增設的授權 認證攔位中,輸人其專屬「電話號碼及照片」、或「電 話號碼及動態影像」、或r電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜」、或「電話號碼及語音」等的授權認證資 料72【例如:U34567(電話號碼)+照片】,否則無法進 行後續的轉帳程序,若已輪入正確的「電話號碼及照片」 <授權認證資料72後,該網路銀行7〇的電腦資訊處理 中心73,除立即執行既有核對使用者名稱及動態密碼 (OTP)與轉帳金額外,並同時會對建置於内部系統的授 權認證資料庫74 |出,,要求比對’,的指令,在有比對得 出與登錄儲存於該授權認證資料庫74内完全相符合之 組「電話號碼及照片」時,該授權認證資料庫74即 會回覆給電腦資訊處理中心73 一個,,認證符合,,的指 令,且該電腦資訊處理中心73亦隨即發出,,線上轉帳成 功的訊息,並直接顯示在網路銀行7〇的頁面上,得供 帳戶擁有者20直接從其上網工具(例如電腦、PDA等) 200941410 的顯示屏幕上,而得知線上轉帳(付款)交易完成 表不該次在線上的交易服務,確實是該帳戶擁有者 -真正授權下所完成的一筆金融交易。擁有者 反之若比對得出與登錄儲存於該授權認ϋ資㈣ 74內無任何相符合的一組「電話號碼及照片」時, 該授權岭證資料庫74即會回覆給該電腦資訊處理中心 73 —個”認證不符,,的批_ 1孖的指7,並藉由該電腦資訊處理中心Second, as shown in the fourth and fifth figures, the present invention is used in the ATM service 50 (commonly known as the automatic pivot machine) financial service process; when the account has φ 20 carries the financial card to the ATM machine 50, for storage, In the process of withdrawal or withdrawal, the financial card is first inserted into the ATM machine 50. After entering the financial card password and the amount, the ATM machine 50 will appear on the operation screen - you can enter the "phone number and photo" or "phone number". And dynamic image, or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" At 51, Account Owner® 20 must enter its exclusive "Phone Number and Photo", or "Phone Number and Motion Picture", or "Phone Number and Fingerprint", or "Phone Number and Retina" in this field 51. Or authorization data 52 such as "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", otherwise the subsequent transaction procedure cannot be performed. Enter one of the correct "telephone numbers and photos", or "telephone numbers and motion pictures", or "telephone numbers and fingerprints", or "telephone numbers and video 13 200941410 omentum", or "telephone numbers and finger veins", Or the bank computer information processing of the bank 60 of the aTm machine '50, after the authorization information 52 such as "Phone number and eye iris" or "telephone number and voice" [for example, · 1234567 (phone number) + photo] Center 61, in addition to the immediate execution of the bank, both the financial card number and the password information and the gold extra, and at the same time will be issued to the authorized certification database 62 placed in the bank 60, requesting the comparison instructions, in comparison The authorized certification database 62 will be returned to the bank computer information processing center 61 when the "phone number and photo" is completely matched with the login and stored in the authorized authentication resource library 62. The certification complies with the instructions, and the bank computer information processing center 61 is also issued immediately, agreeing to deposit or withdraw or transfer money, and the successful message to the ATM machine 50, so that the financial holding The account holder 2〇' can complete the required deposit or banknote or transfer transaction from the ATM machine 50, and also indicates that the transaction service on the ATM machine 5〇Φ is indeed the account. Have a financial transaction completed under 20 real licenses. • Conversely, if the comparison is obtained and registered in the authorized authentication database 62, there is no matching group of “phone numbers and photos”, the authorized authentication database 62 will reply to the bank computer information processing. The center 6 〗 〖, the certification does not match, the instructions, and through the bank computer information processing center 6! and the ATM machine 5 的 screen appears, re-enter 200941410 into the "phone number and photo" message to The account holder is 2〇; therefore, any financial card obtained by picking up or stealing will not know its "phone number and photo", or "telephone number and motion picture" or "telephone" "Number and fingerprint", or "telephone number and: I network film", or "telephone number and (4) pulse", or "telephone number and eye II iris", or "telephone number and voice", etc., but not from ATM machine 50 Withdrawals or transfers have stolen money. In contrast, account holders 20 who have lost or stolen financial cards have no need to fear the loss of real money caused by theft of money in their accounts. Will rush to call the bank issued debit card to report the loss of the briefing procedures, it can eliminate crime from stealing someone else's debit card and password. Furthermore, as shown in the fourth figure, when the bank 60a to which the ATM machine 5() belongs introduces the method of the present invention, the cost of constructing the authorization authentication database 62 can be eliminated internally, and each time it is selected from the ATM. "Phone number and photo", or "telephone number and video", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number" And the exclusive authorized certification material 52 such as "eye iris" or "telephone number and voice", sent by the bank computer information processing center 01a "required comparison, instructions, and then transmitted to the external authorized authentication database 40 through the network w , can still achieve the certification function to achieve compliance comparison 15 200941410 As shown in the sixth and seventh diagrams, the process of using the invention for online financial transfer of financial services; when the account owner 20 After the network W is connected to the online bank 7 of the account, in the main block 71 of the display page, in addition to the "user name and dynamic password (OTP)", the existing rules and gold are added. It is necessary to enter the exclusive "phone number and photo", or "telephone number and motion picture", or r phone number and fingerprint", or "telephone number and retina", or Authorized authentication data 72 such as "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" [eg U34567 (telephone number) + photo], otherwise the subsequent transfer procedure cannot be performed. If the correct "telephone number and photo" <authorization of authentication data 72 has been rotated, the computer information processing center 73 of the online banking bank 7 will execute the existing check user name and dynamic password (OTP) and transfer immediately. The gold is additionally, and at the same time, the authorization authentication database built in the internal system, the instruction that requires the comparison, is completely consistent with the registration and storage in the authorized authentication database 74. In the group "phone number and photo", the authorized authentication database 74 will reply to the computer information processing center 73, the certification conforms, and the computer information processing Heart 73 is also sent out immediately, and the online transfer success message is displayed directly on the online banking page 7 page, so that the account owner 20 can directly access the display screen of the Internet access tool (such as computer, PDA, etc.) 200941410. It is true that the online transfer (payment) transaction completion form is not the online transaction service, and it is indeed the financial transaction completed by the account owner - the real authorization. If the owner has obtained a set of "phone numbers and photos" that are not in compliance with the registration of the authorized funds (4) 74, the authorized forest certificate database 74 will reply to the computer information processing. Center 73 - "certification does not match,, the batch _ 1 孖 finger 7, and by the computer information processing center
參 73而使網路銀行70肖頁面上’出現”重新輸入,,「電 ρ舌號碼及照片」的訊息給帳戶擁有者;因此,即便 再具有高度電腦專長的專家,雖在竊得他人帳戶資料 後’而想進行線上轉帳獲得贓款,仍會因無法得知其「電 話號碼及照片」'或「電話號碼及動態影像」、或「電話 號碼及指紋」、或「電話號碼及視網膜」、或「電話號碼 及指靜脈」、$「電話號碼及眼虹膜」'或「電話號碼及 語音」等的授權認證資料下無法得逞,更遑論能進行掩 飾犯行之多次轉帳伎倆矣。 再者,如第七圖所示者,該網路銀行7〇a所屬銀行 的電腦資訊處理中心73a,其內部亦可免去建置授權認 證資料庫74的成本,而選擇每次將來自電腦資訊處理 中心73a的「電話號碼及照片」、或「電話號碼及動態 影像」、或「電話號碼及指紋」、或「電話號碼及視網膜」、 17 200941410 或「電話號碼及指靜脈」、或「電話號碼及眼虹膜」、或 「電話號碼及語音」等專屬授權認證資料72a,經該電 腦資訊處理中心73a送出”要求比對”指令,再透過網路 ' W傳送至外界的外部授權認證資料庫40,仍可達成執 : 行比對是否相符合之認證功能 ;_ 如第八圖所示,係以本發明做為信用卡使用流程防 弊之方法’其步驟包含: φ a、填寫信用卡發卡銀行所提供之「信用卡申請 書」; b、 於該Γ信用卡申請書」上留存簽名的形式,並 提供身份證與第二身份證明文件及相關財力證明,以供 信Μ卡發卡銀行建擋備存; c、 申請信用卡者自行提供—組併列的「電話號瑪 及照片」、或「電話號碼及動態影像」、或「電話號碼及 ❹ #紋」、或「電話號碼及視網膜」、或「電話號碼及指靜 “ 脈J $電5舌號碼及眼虹膜」、或「電話號碼及語音」 等給信用卡發卡銀行,以做為其專屬之授權認證資料; '、由信用卡發卡銀行審查後,核發信用卡並郵寄 給信用卡持卡人; b信用卡發卡銀行將持卡人之個人身分資料及信用 卡卡號等資料,登錄儲存於其内部的電腦資料庫内,並 200941410 &該信用卡持卡人所提供專屬之「電話號碼及照片」、或 電話號碼及動態影像」、或「電話號碼及指紋」、或「電 :舌號碼及視網膜」、或「電話號碼及指靜脈」、或「電話 號碼及眼虹膜」、或「電話號碼及語音」等授權認證資料, 另登錄儲存於其内部電腦所設的”授權認證資料庫,,内。 - 其中,該步驟c中之「電話號碼」,係可為信用卡持 卡人家中或公司&固網電話號碼,或個人行動電話號 ❿ 碼,或是冠有國別碼及區域碼的固網電話號碼,或是冠 有國別碼的行動電話號瑪者;且該「照片」或「動態影 像J或「指紋」或「視網膜」或「指靜脈」或「眼虹膜」 或「語音」等識別用資料,係可由由開戶者(即帳戶擁有 者)在提供登錄儲存後,依循信用卡發卡銀行所規範之流 程或方式,而可主動進行做隨時任意之修改或變更者。 又,步驟e中該信用卡發卡銀行內部電腦所設之,, ❹ 授權涊證資料庫”’係可變更設置於非屬該信用卡發卡 .. 銀行内部的電腦系統所操控,而是屬於外界其他電腦系 統中所建置之”外部授權認證資料庫,,,使能降低該信用 卡發卡銀行電腦作業系統的維護成本。 請參閱第九圖所示,係本發明使用於信用卡的實施 例,當信用卡持卡者1〇至店家或網路交易對象i行刷 卡或線上刷卡時,店家人員先將信用卡於刷卡機上過卡 19 200941410 後,即會要求該信用卡持卡者10,必須再於該刷卡機 上按壓輸入其信用卡所相對應的「電話號碼及照片」、 或「電話號碼及動態影像」、或「電話號碼及指紋」、或 「電話號碼及視網膜」、或「電話號碼及指靜脈」、或「電 丄: 話號碼及眼虹膜」、或「電話號碼及語音」等之授權認 證資料3,假若,該信用卡持卡者10不願依店家人員 之指示按壓輸入時,店家人員可立刻回絕該信用卡持卡 • 者10當次的刷卡交易;同樣地,信用卡持卡者10於線 上刷卡時’其網路頁面上亦會有要求輸入其信用卡所相 對應的「電話號碼及照片」、或「電話號碼及動態影像」、 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等之授權認證資料3,假如信用卡持卡者 不願輸入該授權認證資料3時,便會被拒絕其線上 ® 刷卡手續·,上述之程序即可作為防止盜刷行為的第一道 防衛機制。 _ 因此’當信用卡持卡者10繼續依店家人員或線上 之指示,接著在刷卡機上按壓或網路頁面中輸入其「電 話號碼及照片」、或「電話號碼及動態影像」、或「電話 號碼及指紋」、或「電話號碼及視網膜」、或「電話號碼 及指靜脈」、或「電話號碼及眼虹膜」、或「電話號碼及 20 200941410 叩音」等I授權認證資料3後’信用卡發卡銀行9〇内 部的銀行電腦資訊處理中心91,除立即執行既有核對 持卡者之卡號資料與刷卡金額外,並同時會對建置於内 . 冑系統的授權認證資料庫92發出,,要求比對,,的指令, - 在有比對得出與登錄儲存於該授權認證資料庫92内完 全相符合之-組「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號锡及指紋」、或「電話號碼及視 • '網膜」、或「電話號碼及指靜脈」、或「電話號瑪及眼虹 膜」、或「電話號碼及語音」等時,該授權認證資料庫 92即會回覆給銀行電腦資訊處理中心91 —個,,認證符 合”的指令,且該銀行電腦資訊處理中心91亦隨即發出” 同意授權刷卡,’的訊息給店家或網路交易對纟】,即可 完成成功刷卡之手續;反之,除真正的信用卡持卡者 10本人可以輸入其自已的「電話號碼及照片」、或「電 Φ 話號碼及動態影像」、或「電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜J、或「電話號碼及語音」等資料外,其他 任何撿拾、偷竊或偽造所取得的信用卡,將因無法獲得 持卡者10本人的「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號碼及指紋」、_或「電話號瑪及視 網膜」、或「電話號碼及指靜脈、或「電話號碼及眼虹 200941410 膜」、或「電話號鳴及語音」等之授權認證資料3下, 而無法盜刷使用該不當取得的信用卡,相對地,因不慎 遣失或遭竊信用卡的信用 U口用卡持卡者丨〇,也不必再害怕 • 被盜刷所導致的實質金錢損失,更不必急著打電話向核 二 發信用卡的銀行來通報掛失之手續,故確實可完全消除 信用卡被盜刷的犯罪案件。 、 综上所陳,對於某些要以手指按壓輸入「電話號碼 ❹ 及識別碼」會有困難的殘障者而言,經由改以「電話號 碼及照片」、或「電話號碼及動態影像」、或「電話號瑪 及指紋」、或「電話號碼及視網膜」、或「電話號碼及指 靜脈」、或「電話號碼及眼虹膜」、或「電話號碼及語音 等方式後’即可完全獲得克服及改善。 【圖式簡單說明】 第一圖:係本發明之步騾方塊圖β ® 第二圖:係本發明使用於親臨銀行櫃楂辦理金融服 務的流程圖之一。 " 第三圖:係本發明使用於親臨銀行櫃檯辦理金融月| ' 務的流程圖之二。 第四圖:係本發明使用於ATM自動櫃員機之金融 服務流程圖之一。 第五圖:係本發明使用於ATM自動櫃員機之金融 服務流程圖之二。 22 200941410 第六圖:係本發明使用於網路線上轉帳匯款金融服 務之流程圖之一。 第七圖:係本發明使用於網路線上轉帳匯款金融服 務之流程圖之二。 第八圖:係本發明應用於信用卡使用流程之步驟方 塊圖。 第九圖:係本發明使用於信用卡流程之流程圖。Ref. 73 and re-enter the 'appears' on the online bank 70's page, and the message "electrical tongue number and photo" is given to the account owner; therefore, even an expert with a high degree of computer expertise is stealing someone else's account. After the information, and if you want to make an online transfer, you will still be unable to know the "telephone number and photo" or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina". Or the authorization information such as "telephone number and finger vein", ""phone number and eye iris" or "telephone number and voice" cannot be obtained, let alone the multiple transfer procedures that can cover up the crime. Furthermore, as shown in the seventh figure, the computer information processing center 73a of the bank of the online bank 7〇a can also eliminate the cost of establishing the authorization authentication database 74, and choose to come from the computer each time. "Phone number and photo", or "telephone number and video", or "telephone number and retina", or "telephone number and retina", 17 200941410 or "telephone number and finger vein", or " The exclusive authorized authentication data 72a such as the telephone number and the eye iris, or the "telephone number and voice" is sent out by the computer information processing center 73a to the "request comparison" command, and then transmitted to the outside external authorized authentication data through the network 'W The library 40 can still achieve the authentication function of whether the line comparison is consistent; _ as shown in the eighth figure, the method of using the invention as a credit card use process to prevent fraud] the steps include: φ a, filling out a credit card issuance The "Credit Card Application" provided by the bank; b. The signature form is retained on the credit card application form, and the identity card and the second identity document and related assets are provided. Proof of the use of the letter card issuing bank to keep in place; c. Apply for the credit card to provide the "phone number and photo", or "telephone number and motion picture", or "phone number and ❹ # """, or "telephone number and retina", or "telephone number and finger", "Ji-phone number and eye iris", or "telephone number and voice", etc., to the credit card issuing bank for exclusive use Authorized certification data; ', after review by credit card issuing bank, issue credit card and mail it to credit card holder; b Credit card issuing bank will store the card holder's personal identity information and credit card number and other information, log in to the internal computer database And 200941410 & the credit card holder's exclusive "telephone number and photo", or phone number and motion picture", or "telephone number and fingerprint", or "electricity: tongue number and retina", or " Authorized authentication data such as telephone number and finger vein, or "telephone number and eye iris", or "telephone number and voice" are also registered and stored in their internal computers. The "Authorization Certification Database", where - the "phone number" in step c can be the credit card holder's home or company & fixed line number, or personal mobile number number, or Is a fixed-line telephone number with a country code and an area code, or a mobile phone number with a country code; and the "photograph" or "motion image J or "fingerprint" or "retina" or "finger" Identification data such as “intravenous” or “eye iris” or “voice” may be initiated by the account holder (ie the account owner) after providing the login and storage, following the process or method specified by the credit card issuing bank. Any modification or change. In addition, in step e, the credit card issuing bank's internal computer is set up, and the “authorized certificate database” can be changed and set to be not issued by the credit card. The computer system inside the bank controls, but belongs to other computers outside the bank. The "external authorization certification database" established in the system enables the maintenance cost of the credit card issuing bank computer operating system to be reduced. Referring to the ninth figure, the embodiment of the present invention is applied to a credit card. When a credit card holder clicks to the store or the online transaction object i swipes or swips the card online, the store personnel first put the credit card on the credit card machine. After the card 19 200941410, the credit card holder 10 will be required to press the "phone number and photo", or "telephone number and motion picture" or "phone number" corresponding to the credit card of the credit card machine. And fingerprints, or "telephone number and retina", or "telephone number and finger vein", or "electricity: phone number and eye iris", or "telephone number and voice", etc., if When the credit card holder 10 is unwilling to press the input according to the instructions of the store staff, the store staff can immediately reject the credit card card holder 10 and then the credit card transaction; likewise, the credit card holder 10 when the card is swiped online The page will also require the entry of the "telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or " Authorized authentication data 3 such as telephone number and retina, or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", if the credit card holder is unwilling to enter the authorized certification data At 3 o'clock, it will be rejected for its online ® credit card procedure. The above procedure can be used as the first defense mechanism to prevent theft. _ Therefore 'When the credit card holder 10 continues to follow the instructions of the store staff or online, then press on the credit card machine or enter the "phone number and photo", or "telephone number and motion picture", or "telephone" on the web page. "Identification and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and 20 200941410 voice", etc. The Bank's internal bank computer information processing center 91, in addition to immediately executing the card number information and card swiping of the existing check card holder, will be issued at the same time. Requests for comparison, instructions, - in the case of comparisons, are stored in the authorized authentication database 92 - the group "phone number and photo", or "telephone number and motion picture", or " Phone number and fingerprints, or "telephone number and video", or "telephone number and finger vein", or "phone number and eye iris", or "telephone number and language" At the same time, the authorized certification database 92 will reply to the bank computer information processing center 91, the certification is in compliance with the ", and the bank computer information processing center 91 will immediately issue a "consent authorization to swipe," message To the store or online transaction, you can complete the successful card swiping process; otherwise, the real credit card holder 10 can enter their own "phone number and photo", or "electric Φ number and motion picture , or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris J, or "telephone number and voice", etc. The credit card obtained by stealing or falsifying will be unable to obtain the "telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number" of the card holder. Authorized Certification Data for Retina, or "Phone Number and Finger vein, or "Phone Number and Eyes 200941410 Membrane", or "Phone Number and Voice" 3 Under the circumstance, it is impossible to steal the credit card obtained by improper use. In contrast, the credit card holder who has accidentally lost or stolen the credit card has no need to be afraid of the actual money caused by the stolen brush. Loss, not to mention rushing to call the bank of the second-issued credit card to report the loss of the procedure, so it can completely eliminate the criminal case of credit card theft. In summary, for those who have difficulty pressing the "telephone number and identification code" with a finger, by changing to "telephone number and photo", or "telephone number and motion picture", Or "phone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" can be completely overcome And the improvement. [Simplified description of the drawings] The first figure is the step block diagram of the present invention. The second figure is one of the flow charts of the present invention for processing financial services in the bank counter. " : The invention is used in the personal counter to handle the financial month | 'The flow chart of the second. The fourth figure: one of the financial service flow charts of the invention used in the ATM automatic teller machine. The fifth figure: the invention is used in the present invention The financial service flow chart of the ATM ATM is the second. 22 200941410 The sixth figure is one of the flow charts of the invention for using the online online transfer money transfer financial service. Transfer money online to the network of the financial services to a flowchart of FIG eighth two: the step of using the credit card system is applied to the process of the present invention is the ninth block diagram showing FIG: The present invention uses a credit card to a flow chart of the process.
【主要元件符號說明】 卜店家或網路交易對象 3、31、3la、52、72、72a-授權認證資料 1〇-彳§用卡持卡者 20-帳戶擁有者 30、30a、60、60a-銀行 32、 32a、61、61a、73、73a、91-銀行電腦資訊處理中心 33、 62、74、92-授權認證資料庫 4〇_外部授權認證資料庫 50-ATM機器 51-欄位 71-主攔位 W-網路 70、70a-網路銀行 90-信用卡發卡銀行 23[Main component symbol description] Budian or online transaction object 3, 31, 3la, 52, 72, 72a - Authorized authentication information 1〇-彳§ Card holder 20-Account holder 30, 30a, 60, 60a - Banks 32, 32a, 61, 61a, 73, 73a, 91 - Bank Computer Information Processing Center 33, 62, 74, 92 - Authorized Certification Database 4〇 External Authorization Certification Database 50-ATM Machine 51 - Field 71 -Main block W-network 70, 70a-Internet bank 90-credit card issuing bank 23