TW200941410A - Method of using a telephone number and an identification code as fraud prevention in a financial service system - Google Patents

Method of using a telephone number and an identification code as fraud prevention in a financial service system Download PDF

Info

Publication number
TW200941410A
TW200941410A TW97110303A TW97110303A TW200941410A TW 200941410 A TW200941410 A TW 200941410A TW 97110303 A TW97110303 A TW 97110303A TW 97110303 A TW97110303 A TW 97110303A TW 200941410 A TW200941410 A TW 200941410A
Authority
TW
Taiwan
Prior art keywords
telephone number
phone number
credit card
financial
account
Prior art date
Application number
TW97110303A
Other languages
Chinese (zh)
Inventor
Chung-Yu Lin
Original Assignee
Chung-Yu Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung-Yu Lin filed Critical Chung-Yu Lin
Priority to TW97110303A priority Critical patent/TW200941410A/en
Publication of TW200941410A publication Critical patent/TW200941410A/en

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a "method of using a telephone number and an identification code as fraud prevention in a financial service system", which is a reinvention of Taiwan Patent Application No. 095143014. The present invention is characterized in that: a set of "a telephone number and an identification code" provided by an account owner for being registered and stored in an authorization verification database of a bank can further be stored as one of the following: "a telephone number and a picture", "a telephone number and a dynamic image", "a telephone number and a fingerprint", "a telephone number and a retina", "a telephone number and a finger vein", "a telephone number and an iris" and "a telephone number and an audio signal"; when the bank processes each financial service (including in-person money deposit/withdraw/wire transfer services, ATM money deposit/withdraw/wire transfer services via an ATM card, credit card services, or online credit card payment services) for the account owner, the bank not only checks an original account number, a password and a dynamic password card with a computer database of the bank, but also synchronously checks whether a telephone number and an identification code match with the exclusive authentication verification data (such as "a telephone number and a picture", "a telephone number and a dynamic image", "a telephone number and a fingerprint", "a telephone number and a retina", "a telephone number and a finger vein", "a telephone number and an iris" and "a telephone number and an audio signal") registered and stored in the authentication verification database of the bank, such that the bank can synchronously confirm whether the financial service of this time is authorized by the true account owner, so as to further prevent fraud transactions such as fraud withdraw or credit card fraud even when the account owner's identity is stolen, credit card is missing or password is stolen.

Description

200941410 九、發明說明: 【發明所屬之技術領域】 本發明係提供一種「以電話號碼及識別碼做為金融 - 服務系統中防弊之方法(二)」,其是透過銀行開戶的帳 ; 戶擁有者向所屬銀行提供一組併列的「電話號碼及照 _ 片」、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 φ 電話號碼及眼虹膜」、或「電話號碼及語音」等資料, 並登錄儲存於該銀行內部的電腦資料庫内,使其做為銀 行與帳戶擁有者之間各項金融服務上的授權認證依 據,除能確保彼此各項金融交易上的更為安全外,更能 有效杜絕金錢被盜領、詐領或信用卡被盜刷等犯罪行為 發生。 【先前技術】 ® 基於安全因素的考量與要求下,許多政府的公部門 一 及軍事部門或私人企業的某些部門,均會對人員的進出 u又有門禁管制措施’其探用辨識的方式包括較低階的臉 部照片或影像的辨識,以及較高階的生物特徵辨識,例 如.视網膜、指紋、指靜脈、眼虹膜、語音等;因此, 則述各種辨識方式的軟、硬體技術與設備乃被成功地開 發問市’並實際有效地應用在各種場合上己有一段時 5 200941410 間。 再者’隨著電信通訊3G或4G時代的來臨,以及 光纖網路頻寬的增加,使得利用手機來傳輸個人影像或 照片或語音等資料亦己是非常普遍的現象,故本發明人 在實施先前申請第095143014號發明案之實際測試過 程中發現’對於某些殘障者要以手指按壓輸入「電話號 碼及識別碼」時會有不同程度的障礙與困難,而除此之 外’某些人對於自己所設定的識別碼亦會發生忘記或誤 記之情形,因此,若能改以r電話號碼及照片」、或「電 話號碼及動態影像」、或「電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜」、或「電話號碼及語音」等即可獲得克服 改善。 【發明内容】 本發明之主要目的在提供—種「以電話號碼及識別 碼做為金融服務系統中防弊之方法(二)」,係由金融開 戶之帳戶擁有者,自行提供一組併列「電話號碼及照 片J、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 「電話號碼及眼虹膜」、或「電話號碼及語音」等的專 屬授權認證資料,給其所有開立帳戶往來的金融單位, 6 200941410 參 ❹ 而該所有開立帳戶往來的金融單位在核對該帳戶擁有 者的相關身份證明資料後’即將該組併列「電話號鳴及 照片」、或「電話號碼及動態影像」、或「電話號碼及指 紋」、或「電話號碼及視網膜」、或「電話號碼及㈣脈」、 或「電話號碼及眼虹膜」、或「電話號鴨及語音」等的 專屬授權認證資料’給予登錄儲存在其金融單位的内部 電腦資料庫;當各金融單位受理帳戶擁有者進行各項金 融服務時’例如:臨櫃存取款或_、持金融卡至atm 存取款或轉帳匯款、網路銀行轉帳匯款等,除執行對原 有帳號、密碼、動態密碼卡等查核比對外,更同步執行 比對其與登錄儲存於該金融單位内部電腦資料庫中專 屬「電話號碼及照片」、或「電話號碼及動態影像」、或 「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等的授權認證資料是否相符合,使銀行能 同步確定該項或該次的交易服務,是否確為該帳戶擁有 者真正授權下所為之交易,進而可避免因身份資料遭 竊,或金融卡遣失及其密碼被竊知等,所導致金錢被盜 領或詐領等弊端情事的發生。 本發明之另一目的在提供一種「以電話號碼及識別 碼做為金融服務系統中防弊之方法(二)」,係由金融開 200941410 戶之帳戶擁有者,自行提供一組併列「電話號碼及照 片」、或「電話號碼及動態影像」、或「電話號碼及指紋」、 或「電話號碼及視網膜」、或「電話號碼及指靜脈」、或 「電話號碼及眼虹膜」、或「電話號碼及語音」等的專 屬授權認證資料,給其所有開立帳戶往來的金融單位, 而該所有開立帳戶往來的金融單位在核對該帳戶擁有 者的相關身份證明資料後’即將該組併列「電話號碼及 照片」、或「電話號竭及動態影像」、或「電話號碼及指 紋」、或「電話號瑪及視網膜」、或「電話號碼及指靜脈」、 或「電話號碼及眼虹膜」、或「電話號碼及語音」等的 專屬授權認證資料,給予登錄儲存在其金融單位的内部 電腦資料庫當各金融單位受理帳戶擁有者持信用卡進 行刷卡或線上刷卡時,除執行對原有卡號查核比對外, 更同步執行比對其與登錄儲存於該金融單位內部電腦 資料庫中專屬「電話號碼及照片」、或「電話號瑪及動 態影像」、或「電話號碼及指紋」、或「電話號碼及视網 m話㈣及指靜脈」、或「電話料及眼虹膜」、 或「電話號碼及語音」等的授權認證資料是否相符合, 使銀行能同步確定該項或該次的刷卡交易,是否確為該 帳戶擁有者真正授權下所為之信用卡交易,進而可避免 园信用卡遣失、遭竊等,所導致被盗刷弊㈣事的發生。 200941410 【實施方式】 ’本發明是—_「以《言舌號瑪及識別 統中防弊之方法(二)」,其步驟包 開戶:、至金融單位填寫「存款相關業務申請書」辦理 ▲ b依法定「存款開戶總约定書」之規定,憑身份200941410 IX. Description of the Invention: [Technical Field of the Invention] The present invention provides a method for "preventing fraudulent use in a financial-service system by using a telephone number and an identification code (2)", which is an account opened by a bank; The owner provides a set of "phone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger" Intravenous, or φ phone number and eye iris, or "telephone number and voice", and stored in the bank's internal computer database, making it a financial service between the bank and the account owner. In addition to ensuring that each other's financial transactions are more secure, it is more effective in preventing criminal misappropriation, fraudulent or credit card theft. [Prior technology] ® Based on security considerations and requirements, many government departments, military departments, or certain departments of private enterprises have access control and access control measures. Including lower-level facial photo or image recognition, and higher-order biometric identification, such as retina, fingerprint, finger vein, iris, voice, etc.; therefore, the soft and hard technology of various identification methods And the equipment has been successfully developed to ask the market' and has been effectively applied in various occasions for some time between 5 200941410. Furthermore, with the advent of the 3G or 4G era of telecommunications, and the increase in the bandwidth of optical networks, the use of mobile phones to transmit personal images or photos or voices has become a very common phenomenon, so the inventors are implementing In the actual test process of the previous application No. 095143014, it was found that 'there are different degrees of obstacles and difficulties for some disabled people to enter the "telephone number and identification code" with a finger press, and other people Forgetting or mistaking the identification code set by yourself, therefore, if you can change the r phone number and photo", or "telephone number and motion picture", or "phone number and fingerprint", or "phone number" And the retina, or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" can be overcome to improve. SUMMARY OF THE INVENTION The main object of the present invention is to provide a "method of preventing fraud in a financial service system by using a telephone number and an identification code (2)", which is provided by a account holder of a financial account opening bank. Phone number and photo J, or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or The exclusive authorized certification materials such as "telephone number and voice" are given to all financial institutions that open accounts. 6 200941410 Participating and all financial institutions that open accounts are checking the relevant identity documents of the account holders. 'The group will be listed in the "Phone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and (four) pulse", or "telephone" "Special Authorized Certification Information for Numbers and Eyes Iris" or "Telephone Duck and Voice" is given to the account and stored in the interior of its financial unit. Brain database; when each financial unit accepts the account owner for various financial services, such as: deposit and withdrawal of funds or _, holding financial card to ATM deposit or transfer, transfer, online bank transfer, etc., except for execution Checking the original account number, password, dynamic password card, etc., and synchronizing the execution of the exclusive "phone number and photo", or "telephone number and motion picture" stored in the internal computer database of the financial unit, Whether the authorized certification materials such as "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" are compatible, Enabling the bank to determine whether the transaction or the transaction service of the transaction is indeed a transaction authorized by the account owner, thereby avoiding the theft of the identity data, or the loss of the financial card and the password being stolen. The occurrence of malpractices such as theft or fraudulentity of money. Another object of the present invention is to provide a "method of preventing fraud in a financial service system by using a telephone number and an identification code (2)", which is provided by the account holder of the financial opening 200941410 household, and provides a set of "phone numbers" by themselves. And photos, or "telephone numbers and motion pictures", or "telephone numbers and fingerprints", or "telephone numbers and retinas", or "telephone numbers and finger veins", or "telephone numbers and irises", or "telephones" The exclusive authorized certification materials such as number and voice are given to all the financial units in which the account is opened, and all the financial units that open the account are listed after the relevant identity certificate of the account owner. "Telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris" Or the exclusive authorized authentication materials such as "telephone number and voice", which are registered and stored in the internal computer database of their financial unit. When the account accepting account holder credit card is used for credit card or online credit card, in addition to performing the check on the original card number, the execution is more synchronous than the exclusive "phone number and photo" stored in the internal computer database of the financial institution. Or "telephone and motion picture", or "telephone number and fingerprint", or "telephone number and video m (4) and finger veins", or "telephone material and eye iris", or "telephone number and voice" Whether the authorized certification materials are in conformity, so that the bank can simultaneously determine whether the credit card transaction of the item or the time is the credit card transaction that the account owner actually authorizes, thereby avoiding the loss, theft, etc. of the credit card of the park. Stolen cheating (four) things happen. 200941410 [Embodiment] 'The present invention is - _ "Methods for preventing fraud in the tongue and the mark (2)", the steps of opening the account:, to the financial unit to fill out the "deposit-related business application" ▲ b According to the provisions of the "General Agreement on Deposit Account Opening", by identity

證及第二身份證明文件,並就簽名或蓋章擇-或合併留 存建擋於金融單位備查。 c開戶者自行提供—組併列的「電話號碼及照 片」或電話號碼及動態影像」、或「電話號瑪及指紋」、 或「電話號碼及視铜腊 ,Γ ^ 恍網膜J、或「電話號碼及指靜脈」、或 「電話號瑪及眼虹膜」、或「電話號褐及語音」等資料 給金融單位’以做為其專屬之授權認證資料。The certificate and the second identity document are filed or sealed for the purpose of signing or stamping - or the merger is kept in the financial unit for future reference. c. The account holder provides the "phone number and photo" or telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and copper wax, Γ ^ 恍 J J, or "telephone Information such as number and finger veins, or "phone number and eye iris", or "telephone number and voice" are given to the financial unit as its exclusive authorized certification material.

如第一圖所示 碼做為金融服務系 含: d、由金融單位依「受理開戶作業檢核表」審查後, 核准開戶並核發開戶帳薄及/或金Μ。 e、金融單位將聞戶去、 將開戶者二個人身分資料、帳戶名、As shown in the first figure, the code is used as the financial service system: d. After the financial unit has reviewed the “Acceptance Checklist for Account Opening”, it is approved to open an account and issue an account book and/or a bank account. e. The financial unit will go to the customer, the account holder’s identity information, account name,

金融卡號及密碼等資料,I 料·登錄儲存於其內部的電腦資料 庫內’並將該開戶者所接伥 叮把供專屬足「電話號碼及照片」、 或「電話號碼及動態畢彡倕 .Γ 〜fy像」、或「電話號碼及指紋」、或 「電話號碼及視網膜丨、命「兩上 ’膜J或電話號碼及指靜脈」、或「電 話號碼及眼虹膜」、或「雷# 肤J Α 電話號碼及語音」等授權認證 200941410 庫:另登錄儲存於其內部電腦所設的,,授權認證資料 二:前述各步驟中所述之「存款相關業務申請 二類=戶總約定書」及r受理開戶作業檢核表」 ,其在格式或内容中所規㈣諸多事 、::、條放,均係由各金融單位自行依據其所屬國家 U律來❹而成,不_家及錢 其所使用的名穰雖“ 纟稱雖會有些許不同’但相關法律所規範的 本質仍屬相同,先併予說明。 \步驟c中之「電話號碼」,係可為開戶者(即 帳:擁有者)家中或公司的固網電話號碼,或為個人行 號碼或是冠有國別碼及區域碼的固網電話號 碼’或是冠有國別碼的行動電話號碼;且該「照片」或 「動態影像」或「指紋」或「視網膜」或「指靜脈」或 「眼虹膜」或「語音」等識別用資料,係可由由開戶者 (P帳戶擁有者)在提供登錄儲存後,依循金融單位所規 範之流程或方式’逕自做隨時任意之修改或變更。 另外’步騾e中該金融單位内部電腦所設之”授權 還§登資料庫’’’係可變更設置於非屬該金融單位内部的 電腦系統所操控,而是屬於外界其他電腦系統中所建置 之·#部授權認證資料庫”,使能降低該金融單位電腦作 200941410 業系統的維護成本。 續如第二圖及第三圖所示,係本發明使用於親臨 銀行櫃檯辦理金融服務之流程;當帳戶擁有者2〇攜帶 開戶帳薄與簽章至銀行3〇臨櫃辦理存、取款或匯款手 〆 續時,先填寫金額於存款單或取款單或匯款單上,以及 二 其帳戶的帳號與密碼,接著再輸入其授權認證資料31 專屬之「電話料及照m話號瑪及動態影像」、 ► 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等【例如:1234567 (電話號瑪)+照片】 後,該銀行30内部的銀行電腦資訊處理中心32,除立 即執行既有核對帳戶戶名'帳號、密碼等資料與金額 外,並同時會對建置於該銀行30内的授權認證資料庫 33發出”要求比對”的指令,在有比對得出與登錄儲存於 > 該授權認證資料庫33內完全相符合之—組「電話號瑪 I照片」時’該授權認證資料庫33 gp會回覆給該銀行 • €腦資訊處理中心32 -個”認證符合,,的指令,且該銀 行電腦資訊處理中心32亦隨即向帳戶擁有者2〇發出存 取政或匯放成功的訊息,使該帳戶擁有者2〇完成其所 要求的存取款或匯款等手續,同時也表示該次的交易服 務,確實是該帳戶擁有者20真正授權下所完成的一次 200941410 金融交易 反之’若比對得ψ 付出與登錄儲存於該授權認證資 庫33內,無任何相符a & 科 、13的一組「電話號碼及照片時, 該授權認證資料33即舍 ^ Η會回覆給該銀行電腦資訊處理中 心32 —個”認證不符,,的 的指令,並藉由該銀行電腦資訊 處理中心32發出”重絲虹_、 重新輪入,,的訊息給帳戶擁有者20, 換言之’除非是真正的愤 恨户擁有者20自己,否則其他 鲁 任何人即使出具帳戶戶名、帳號及密碼等資料,將因在 »、、法獲知帳戶擁有者2G的「電話號瑪及照片」情況下, 而不能在臨樞的情形下來取得該帳戶擁有者2〇帳戶內 的任何金錢,因此,對於非由帳戶擁有者2〇真正授權 下的非法臨櫃取款行為將能完全杜絕。再者,前述銀行 〇現有内部金融電腦作業系統的軟、硬設備,在既有 營運下均已非常完備’其可能不願額外花費建置本發明 所需授權認證資料庫33的成本,因此,如第三圖所示, 只要銀行30a將其銀行電腦資訊處理中心32a的軟體程 式稍作修改’而將每次要求比對的指令,經由網路w 傳送至建置於外界另一電腦系統中的外部授權認證資 料庫40’仍可達成比對相符合或不相符合的認證功能, 因為該外部授權認證資料庫40係與許多銀行金融單位 相互連網,每一位在各金融銀行3〇a開戶後的帳戶擁有 12 200941410 者20,其所提供專屬「電話號碼及照片」之授權認證 資料31a’均經由各金融銀行30a直接透過網路w而登 錄儲存於該外部授權認證資料庫40內,故各銀行3〇 a 要導入本發明的技術程度極為簡單,除立即可實施外又 - 不增加營運成本。Information such as the financial card number and password, I material and login are stored in the internal computer database' and the account holder is selected for the exclusive "phone number and photo", or "telephone number and dynamics" Γ ~fy like", or "telephone number and fingerprint", or "telephone number and retina", "two on the membrane J or telephone number and finger vein", or "telephone number and eye iris", or "lei" #肤J ΑPhone number and voice" and other authorized certification 200941410 Library: Another login is stored in its internal computer, authorized certification data 2: the above-mentioned steps in the "deposit-related business application category 2 = household agreement The book and the acceptance of the account opening checklist, which are regulated in the format or content (4), many things, :::, are all made by the financial institutions themselves according to the U law of their country, not _ The name used by the family and the money is “although the nickname may be slightly different” but the nature of the relevant laws is still the same, first and foremost. \The “telephone number” in step c can be the account holder. (accounting: owner) home Or the company's fixed-line telephone number, or a personal line number or a fixed-line telephone number with a country code and area code' or a mobile phone number with a country code; and the "photo" or "motion image" Identification data such as "fingerprint" or "retina" or "finger vein" or "eye iris" or "speech" may be specified by the account holder (P account owner) after providing login and storage, in accordance with the financial unit The process or method is to be modified or changed at any time. In addition, the “authorization of the internal computer of the financial unit” is also set to be controlled by a computer system that is not within the financial unit, but belongs to other computer systems in the outside world. The establishment of the ##Authorization Certification Database enables the reduction of the maintenance cost of the financial unit computer for the 200941410 industry system. Continued as shown in the second and third figures, the present invention is used in the process of visiting a financial counter in the bank counter; when the account owner 2 carries the account book and the signature to the bank, the deposit is made, or the deposit is made. When the remittance is continued, fill in the amount on the deposit slip or the withdrawal slip or the remittance slip, and the account number and password of the account, and then enter the authorization information. 31 Exclusive "Phone material and photo m , or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", etc. [example: 1234567 ( After the phone number Ma) + photo], the Bank's internal bank computer information processing center 32, in addition to immediately executing the existing check account account name 'account, password and other information and gold extra, and will be built at the bank 30 The authorization authentication database 33 in the inside issues a "request comparison" command, which is completely matched with the login and stored in the authorization authentication database 33 - the group "phone number At the time of the film, the authorized certification database 33 gp will reply to the bank • € Brain Information Processing Center 32 - "certification conforms," and the bank computer information processing center 32 will immediately send the account owner 2 The successful access to the government or the remittance, so that the account owner 2 completes the required deposit or withdrawal or remittance procedures, and also indicates that the transaction service is indeed the account owner 20 truly authorized The completed 200941410 financial transaction is reversed. If the payment and registration are stored in the authorized certification database 33, there is no corresponding group of "phone numbers and photos of a & Section, 13". That is, the message will be replied to the bank computer information processing center 32 - "authentication inconsistency," and the message sent by the bank computer information processing center 32 "Heavy Silk _, re-arrival," The account owner 20, in other words 'unless it is the real resentful owner 20 himself, otherwise the other Lu will issue information such as account name, account number and password, etc., due to », The law knows the account owner 2G's "phone number and photo", but can't get any money in the account holder's 2〇 account in the case of the pivot, therefore, the real authorization is not for the account owner. The illegal illegal withdrawals will be completely eliminated. Furthermore, the aforementioned banks have existing software and computer operating systems with soft and hard devices that are already well-established under existing operations. They may not be willing to pay extra for the cost of building the authorization database 33 required for the present invention. As shown in the third figure, as long as the bank 30a slightly modifies the software program of its bank computer information processing center 32a', the instruction for each comparison request is transmitted via the network w to another computer system built in the outside world. The external authorization authentication database 40' can still achieve the matching or non-conforming authentication function, because the external authorization authentication database 40 is connected to many banking financial units, each of which is located in each financial bank. a account after opening an account has 12 200941410 20, and the authorized authentication data 31a' of the exclusive "phone number and photo" provided by the account bank is directly stored in the external authorized authentication database 40 via the network bank 30a. Therefore, each bank 3〇a is very simple to introduce the technology of the present invention, and can be implemented immediately without increasing the operating cost.

二 再如第四圖及第五圖所示,係本發明使用於ATM 機器50(俗稱自動樞員機)金融服務之流程;當帳戶擁有 φ 者20攜帶金融卡至ATM機器50,辦理存、取款或匿 款手續時,先將金融卡插入ATM機器50內,經輸入金 融卡密碼及金額後,該ATM機器50操作畫面上會出現 —可輸入包括「電話號碼及照片」、或「電話號碼及動 態影像」、或「電話號碼及指紋」、或「電話號碼及視網 膜」、或「電話號碼及指靜脈」、或「電話號碼及眼虹膜」、 或「電話號碼及語音」等資料的欄位51,帳戶擁有者 ® 20必須在該欄位51內輸入其專屬「電話號碼及照片」、 或「電話號碼及動態影像」、或「電話號碼及指紋」、或 「電話號碼及視網膜」、或「電話號碼及指靜脈」、或「電 話號碼及眼虹膜」、或「電話號碼及語音」等的授權認 證資料52,否則無法進行後續的交易程序,若已輸入 其中一組正確的「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號碼及指紋」、或「電話號碼及視 13 200941410 網膜」、或「電話號碼及指靜脈」、或「電話號瑪及眼虹 膜」、或「電話號碼及語音」等之授權認證資料52【例 如·· 1234567 (電話號碼)+照片】後,該aTm機器 ' 50所屬銀行60的銀行電腦資訊處理中心61,除立即執 j 行既有核對金融卡號及密碼資料與金額外,並同時會對 二 建置於該銀行60内的授權認證資料庫62發出,,要求比 對的指令,在有比對得出與登錄儲存於該授權認證資 _ 料庫62内,完全相符合之—組「電話號碼及照片」時, 該授權認證資料庫62即會回覆給銀行電腦資訊處理中 心61 —個”認證符合”的指令,且該銀行電腦資訊處理 中心61亦隨即發出,,同意存款或出鈔或轉帳,,成功的訊 息至ATM機器50,而使該持有金融卡的帳戶擁有者 2〇’可從該ATM機器50上完成其所需之存款或出鈔或 轉帳成功之交易手續,同時也表示該次在ATM機器5〇 Φ 上的交易服務,確實是該帳戶擁有20真正授權下所完 成的一次金融交易。 • 反之,若比對得出與登錄儲存於該授權認證資料 庫62內,無任何相符合的—組「電話號碼及照片」時, 該授權認證資料庫62即會回覆給該銀行電腦資訊處理 中心6〗一個,,認證不符,,的指令,並藉由該銀行電腦資 訊處理中心6!而使ATM機器5〇上的畫面出現,,重新輸 200941410 入” 「電話號碼及照片」的訊息給帳戶擁有者2〇;因 此’任何撿拾或偷竊所取得的金融卡,即使得知其密 瑪’亦會因不知其「電話號碼及照片」、或「電話號碼 . 及動態影像」、或「電話號碼及指紋」、或「電話號碼及 : I網膜」、或「電話號瑪及㈣脈」、或「電話號碼及眼 二 虹膜」、或「電話號碼及語音」等,而無法從ATM機器 50上來取款或轉帳竊得贓款,相對地,因不慎遣失或 • 遭竊金融卡的帳戶擁有者20,也不必再害怕帳戶內的 金錢遭盜領所導致的實質金錢損失,更不必急著打電話 向核發金融卡的銀行來通報掛失之手續,故可消除來自 偷竊他人金融卡及密碼的犯罪案件。 再者,如第四圖所示者,該ATM機器5()所屬銀 行60a導入本發明之方法時,其內部亦可免去建置授權 認證資料庫62的成本,而選擇每次將來自ATM機器 _ 50的「電話號碼及照片」、或「電話號碼及動態影像」、 — 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等專屬授權認證資料52,經銀行電腦資 訊處理中心01a送出”要求比對,,指令,再透過網路w傳 送至外界的外部授權認證資料庫40,仍可達成執行比 對是否相符合之認證功能》 15 200941410 又如第六圖及第七圖所示’係本發明使用於網路線 上轉帳隆款金融服務之流程;當帳戶擁有者20經由網 路W連結至所屬帳戶的網路銀行7〇後,在其顯示頁面 的主攔位71内,除應輸入”使用者名稱及動態密碼 (OTP)”之既有規定與金額外,必須再於另—增設的授權 認證攔位中,輸人其專屬「電話號碼及照片」、或「電 話號碼及動態影像」、或r電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜」、或「電話號碼及語音」等的授權認證資 料72【例如:U34567(電話號碼)+照片】,否則無法進 行後續的轉帳程序,若已輪入正確的「電話號碼及照片」 <授權認證資料72後,該網路銀行7〇的電腦資訊處理 中心73,除立即執行既有核對使用者名稱及動態密碼 (OTP)與轉帳金額外,並同時會對建置於内部系統的授 權認證資料庫74 |出,,要求比對’,的指令,在有比對得 出與登錄儲存於該授權認證資料庫74内完全相符合之 組「電話號碼及照片」時,該授權認證資料庫74即 會回覆給電腦資訊處理中心73 一個,,認證符合,,的指 令,且該電腦資訊處理中心73亦隨即發出,,線上轉帳成 功的訊息,並直接顯示在網路銀行7〇的頁面上,得供 帳戶擁有者20直接從其上網工具(例如電腦、PDA等) 200941410 的顯示屏幕上,而得知線上轉帳(付款)交易完成 表不該次在線上的交易服務,確實是該帳戶擁有者 -真正授權下所完成的一筆金融交易。擁有者 反之若比對得出與登錄儲存於該授權認ϋ資㈣ 74內無任何相符合的一組「電話號碼及照片」時, 該授權岭證資料庫74即會回覆給該電腦資訊處理中心 73 —個”認證不符,,的批_ 1孖的指7,並藉由該電腦資訊處理中心Second, as shown in the fourth and fifth figures, the present invention is used in the ATM service 50 (commonly known as the automatic pivot machine) financial service process; when the account has φ 20 carries the financial card to the ATM machine 50, for storage, In the process of withdrawal or withdrawal, the financial card is first inserted into the ATM machine 50. After entering the financial card password and the amount, the ATM machine 50 will appear on the operation screen - you can enter the "phone number and photo" or "phone number". And dynamic image, or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" At 51, Account Owner® 20 must enter its exclusive "Phone Number and Photo", or "Phone Number and Motion Picture", or "Phone Number and Fingerprint", or "Phone Number and Retina" in this field 51. Or authorization data 52 such as "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", otherwise the subsequent transaction procedure cannot be performed. Enter one of the correct "telephone numbers and photos", or "telephone numbers and motion pictures", or "telephone numbers and fingerprints", or "telephone numbers and video 13 200941410 omentum", or "telephone numbers and finger veins", Or the bank computer information processing of the bank 60 of the aTm machine '50, after the authorization information 52 such as "Phone number and eye iris" or "telephone number and voice" [for example, · 1234567 (phone number) + photo] Center 61, in addition to the immediate execution of the bank, both the financial card number and the password information and the gold extra, and at the same time will be issued to the authorized certification database 62 placed in the bank 60, requesting the comparison instructions, in comparison The authorized certification database 62 will be returned to the bank computer information processing center 61 when the "phone number and photo" is completely matched with the login and stored in the authorized authentication resource library 62. The certification complies with the instructions, and the bank computer information processing center 61 is also issued immediately, agreeing to deposit or withdraw or transfer money, and the successful message to the ATM machine 50, so that the financial holding The account holder 2〇' can complete the required deposit or banknote or transfer transaction from the ATM machine 50, and also indicates that the transaction service on the ATM machine 5〇Φ is indeed the account. Have a financial transaction completed under 20 real licenses. • Conversely, if the comparison is obtained and registered in the authorized authentication database 62, there is no matching group of “phone numbers and photos”, the authorized authentication database 62 will reply to the bank computer information processing. The center 6 〗 〖, the certification does not match, the instructions, and through the bank computer information processing center 6! and the ATM machine 5 的 screen appears, re-enter 200941410 into the "phone number and photo" message to The account holder is 2〇; therefore, any financial card obtained by picking up or stealing will not know its "phone number and photo", or "telephone number and motion picture" or "telephone" "Number and fingerprint", or "telephone number and: I network film", or "telephone number and (4) pulse", or "telephone number and eye II iris", or "telephone number and voice", etc., but not from ATM machine 50 Withdrawals or transfers have stolen money. In contrast, account holders 20 who have lost or stolen financial cards have no need to fear the loss of real money caused by theft of money in their accounts. Will rush to call the bank issued debit card to report the loss of the briefing procedures, it can eliminate crime from stealing someone else's debit card and password. Furthermore, as shown in the fourth figure, when the bank 60a to which the ATM machine 5() belongs introduces the method of the present invention, the cost of constructing the authorization authentication database 62 can be eliminated internally, and each time it is selected from the ATM. "Phone number and photo", or "telephone number and video", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number" And the exclusive authorized certification material 52 such as "eye iris" or "telephone number and voice", sent by the bank computer information processing center 01a "required comparison, instructions, and then transmitted to the external authorized authentication database 40 through the network w , can still achieve the certification function to achieve compliance comparison 15 200941410 As shown in the sixth and seventh diagrams, the process of using the invention for online financial transfer of financial services; when the account owner 20 After the network W is connected to the online bank 7 of the account, in the main block 71 of the display page, in addition to the "user name and dynamic password (OTP)", the existing rules and gold are added. It is necessary to enter the exclusive "phone number and photo", or "telephone number and motion picture", or r phone number and fingerprint", or "telephone number and retina", or Authorized authentication data 72 such as "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" [eg U34567 (telephone number) + photo], otherwise the subsequent transfer procedure cannot be performed. If the correct "telephone number and photo" <authorization of authentication data 72 has been rotated, the computer information processing center 73 of the online banking bank 7 will execute the existing check user name and dynamic password (OTP) and transfer immediately. The gold is additionally, and at the same time, the authorization authentication database built in the internal system, the instruction that requires the comparison, is completely consistent with the registration and storage in the authorized authentication database 74. In the group "phone number and photo", the authorized authentication database 74 will reply to the computer information processing center 73, the certification conforms, and the computer information processing Heart 73 is also sent out immediately, and the online transfer success message is displayed directly on the online banking page 7 page, so that the account owner 20 can directly access the display screen of the Internet access tool (such as computer, PDA, etc.) 200941410. It is true that the online transfer (payment) transaction completion form is not the online transaction service, and it is indeed the financial transaction completed by the account owner - the real authorization. If the owner has obtained a set of "phone numbers and photos" that are not in compliance with the registration of the authorized funds (4) 74, the authorized forest certificate database 74 will reply to the computer information processing. Center 73 - "certification does not match,, the batch _ 1 孖 finger 7, and by the computer information processing center

參 73而使網路銀行70肖頁面上’出現”重新輸入,,「電 ρ舌號碼及照片」的訊息給帳戶擁有者;因此,即便 再具有高度電腦專長的專家,雖在竊得他人帳戶資料 後’而想進行線上轉帳獲得贓款,仍會因無法得知其「電 話號碼及照片」'或「電話號碼及動態影像」、或「電話 號碼及指紋」、或「電話號碼及視網膜」、或「電話號碼 及指靜脈」、$「電話號碼及眼虹膜」'或「電話號碼及 語音」等的授權認證資料下無法得逞,更遑論能進行掩 飾犯行之多次轉帳伎倆矣。 再者,如第七圖所示者,該網路銀行7〇a所屬銀行 的電腦資訊處理中心73a,其內部亦可免去建置授權認 證資料庫74的成本,而選擇每次將來自電腦資訊處理 中心73a的「電話號碼及照片」、或「電話號碼及動態 影像」、或「電話號碼及指紋」、或「電話號碼及視網膜」、 17 200941410 或「電話號碼及指靜脈」、或「電話號碼及眼虹膜」、或 「電話號碼及語音」等專屬授權認證資料72a,經該電 腦資訊處理中心73a送出”要求比對”指令,再透過網路 ' W傳送至外界的外部授權認證資料庫40,仍可達成執 : 行比對是否相符合之認證功能 ;_ 如第八圖所示,係以本發明做為信用卡使用流程防 弊之方法’其步驟包含: φ a、填寫信用卡發卡銀行所提供之「信用卡申請 書」; b、 於該Γ信用卡申請書」上留存簽名的形式,並 提供身份證與第二身份證明文件及相關財力證明,以供 信Μ卡發卡銀行建擋備存; c、 申請信用卡者自行提供—組併列的「電話號瑪 及照片」、或「電話號碼及動態影像」、或「電話號碼及 ❹ #紋」、或「電話號碼及視網膜」、或「電話號碼及指靜 “ 脈J $電5舌號碼及眼虹膜」、或「電話號碼及語音」 等給信用卡發卡銀行,以做為其專屬之授權認證資料; '、由信用卡發卡銀行審查後,核發信用卡並郵寄 給信用卡持卡人; b信用卡發卡銀行將持卡人之個人身分資料及信用 卡卡號等資料,登錄儲存於其内部的電腦資料庫内,並 200941410 &該信用卡持卡人所提供專屬之「電話號碼及照片」、或 電話號碼及動態影像」、或「電話號碼及指紋」、或「電 :舌號碼及視網膜」、或「電話號碼及指靜脈」、或「電話 號碼及眼虹膜」、或「電話號碼及語音」等授權認證資料, 另登錄儲存於其内部電腦所設的”授權認證資料庫,,内。 - 其中,該步驟c中之「電話號碼」,係可為信用卡持 卡人家中或公司&固網電話號碼,或個人行動電話號 ❿ 碼,或是冠有國別碼及區域碼的固網電話號碼,或是冠 有國別碼的行動電話號瑪者;且該「照片」或「動態影 像J或「指紋」或「視網膜」或「指靜脈」或「眼虹膜」 或「語音」等識別用資料,係可由由開戶者(即帳戶擁有 者)在提供登錄儲存後,依循信用卡發卡銀行所規範之流 程或方式,而可主動進行做隨時任意之修改或變更者。 又,步驟e中該信用卡發卡銀行內部電腦所設之,, ❹ 授權涊證資料庫”’係可變更設置於非屬該信用卡發卡 .. 銀行内部的電腦系統所操控,而是屬於外界其他電腦系 統中所建置之”外部授權認證資料庫,,,使能降低該信用 卡發卡銀行電腦作業系統的維護成本。 請參閱第九圖所示,係本發明使用於信用卡的實施 例,當信用卡持卡者1〇至店家或網路交易對象i行刷 卡或線上刷卡時,店家人員先將信用卡於刷卡機上過卡 19 200941410 後,即會要求該信用卡持卡者10,必須再於該刷卡機 上按壓輸入其信用卡所相對應的「電話號碼及照片」、 或「電話號碼及動態影像」、或「電話號碼及指紋」、或 「電話號碼及視網膜」、或「電話號碼及指靜脈」、或「電 丄: 話號碼及眼虹膜」、或「電話號碼及語音」等之授權認 證資料3,假若,該信用卡持卡者10不願依店家人員 之指示按壓輸入時,店家人員可立刻回絕該信用卡持卡 • 者10當次的刷卡交易;同樣地,信用卡持卡者10於線 上刷卡時’其網路頁面上亦會有要求輸入其信用卡所相 對應的「電話號碼及照片」、或「電話號碼及動態影像」、 或「電話號碼及指紋」、或「電話號碼及視網膜」、或「電 話號碼及指靜脈」、或「電話號碼及眼虹膜」、或「電話 號碼及語音」等之授權認證資料3,假如信用卡持卡者 不願輸入該授權認證資料3時,便會被拒絕其線上 ® 刷卡手續·,上述之程序即可作為防止盜刷行為的第一道 防衛機制。 _ 因此’當信用卡持卡者10繼續依店家人員或線上 之指示,接著在刷卡機上按壓或網路頁面中輸入其「電 話號碼及照片」、或「電話號碼及動態影像」、或「電話 號碼及指紋」、或「電話號碼及視網膜」、或「電話號碼 及指靜脈」、或「電話號碼及眼虹膜」、或「電話號碼及 20 200941410 叩音」等I授權認證資料3後’信用卡發卡銀行9〇内 部的銀行電腦資訊處理中心91,除立即執行既有核對 持卡者之卡號資料與刷卡金額外,並同時會對建置於内 . 冑系統的授權認證資料庫92發出,,要求比對,,的指令, - 在有比對得出與登錄儲存於該授權認證資料庫92内完 全相符合之-組「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號锡及指紋」、或「電話號碼及視 • '網膜」、或「電話號碼及指靜脈」、或「電話號瑪及眼虹 膜」、或「電話號碼及語音」等時,該授權認證資料庫 92即會回覆給銀行電腦資訊處理中心91 —個,,認證符 合”的指令,且該銀行電腦資訊處理中心91亦隨即發出” 同意授權刷卡,’的訊息給店家或網路交易對纟】,即可 完成成功刷卡之手續;反之,除真正的信用卡持卡者 10本人可以輸入其自已的「電話號碼及照片」、或「電 Φ 話號碼及動態影像」、或「電話號碼及指紋」、或「電話 號碼及視網膜」、或「電話號碼及指靜脈」、或「電話號 碼及眼虹膜J、或「電話號碼及語音」等資料外,其他 任何撿拾、偷竊或偽造所取得的信用卡,將因無法獲得 持卡者10本人的「電話號碼及照片」、或「電話號碼及 動態影像」、或「電話號碼及指紋」、_或「電話號瑪及視 網膜」、或「電話號碼及指靜脈、或「電話號碼及眼虹 200941410 膜」、或「電話號鳴及語音」等之授權認證資料3下, 而無法盜刷使用該不當取得的信用卡,相對地,因不慎 遣失或遭竊信用卡的信用 U口用卡持卡者丨〇,也不必再害怕 • 被盜刷所導致的實質金錢損失,更不必急著打電話向核 二 發信用卡的銀行來通報掛失之手續,故確實可完全消除 信用卡被盜刷的犯罪案件。 、 综上所陳,對於某些要以手指按壓輸入「電話號碼 ❹ 及識別碼」會有困難的殘障者而言,經由改以「電話號 碼及照片」、或「電話號碼及動態影像」、或「電話號瑪 及指紋」、或「電話號碼及視網膜」、或「電話號碼及指 靜脈」、或「電話號碼及眼虹膜」、或「電話號碼及語音 等方式後’即可完全獲得克服及改善。 【圖式簡單說明】 第一圖:係本發明之步騾方塊圖β ® 第二圖:係本發明使用於親臨銀行櫃楂辦理金融服 務的流程圖之一。 " 第三圖:係本發明使用於親臨銀行櫃檯辦理金融月| ' 務的流程圖之二。 第四圖:係本發明使用於ATM自動櫃員機之金融 服務流程圖之一。 第五圖:係本發明使用於ATM自動櫃員機之金融 服務流程圖之二。 22 200941410 第六圖:係本發明使用於網路線上轉帳匯款金融服 務之流程圖之一。 第七圖:係本發明使用於網路線上轉帳匯款金融服 務之流程圖之二。 第八圖:係本發明應用於信用卡使用流程之步驟方 塊圖。 第九圖:係本發明使用於信用卡流程之流程圖。Ref. 73 and re-enter the 'appears' on the online bank 70's page, and the message "electrical tongue number and photo" is given to the account owner; therefore, even an expert with a high degree of computer expertise is stealing someone else's account. After the information, and if you want to make an online transfer, you will still be unable to know the "telephone number and photo" or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number and retina". Or the authorization information such as "telephone number and finger vein", ""phone number and eye iris" or "telephone number and voice" cannot be obtained, let alone the multiple transfer procedures that can cover up the crime. Furthermore, as shown in the seventh figure, the computer information processing center 73a of the bank of the online bank 7〇a can also eliminate the cost of establishing the authorization authentication database 74, and choose to come from the computer each time. "Phone number and photo", or "telephone number and video", or "telephone number and retina", or "telephone number and retina", 17 200941410 or "telephone number and finger vein", or " The exclusive authorized authentication data 72a such as the telephone number and the eye iris, or the "telephone number and voice" is sent out by the computer information processing center 73a to the "request comparison" command, and then transmitted to the outside external authorized authentication data through the network 'W The library 40 can still achieve the authentication function of whether the line comparison is consistent; _ as shown in the eighth figure, the method of using the invention as a credit card use process to prevent fraud] the steps include: φ a, filling out a credit card issuance The "Credit Card Application" provided by the bank; b. The signature form is retained on the credit card application form, and the identity card and the second identity document and related assets are provided. Proof of the use of the letter card issuing bank to keep in place; c. Apply for the credit card to provide the "phone number and photo", or "telephone number and motion picture", or "phone number and ❹ # """, or "telephone number and retina", or "telephone number and finger", "Ji-phone number and eye iris", or "telephone number and voice", etc., to the credit card issuing bank for exclusive use Authorized certification data; ', after review by credit card issuing bank, issue credit card and mail it to credit card holder; b Credit card issuing bank will store the card holder's personal identity information and credit card number and other information, log in to the internal computer database And 200941410 & the credit card holder's exclusive "telephone number and photo", or phone number and motion picture", or "telephone number and fingerprint", or "electricity: tongue number and retina", or " Authorized authentication data such as telephone number and finger vein, or "telephone number and eye iris", or "telephone number and voice" are also registered and stored in their internal computers. The "Authorization Certification Database", where - the "phone number" in step c can be the credit card holder's home or company & fixed line number, or personal mobile number number, or Is a fixed-line telephone number with a country code and an area code, or a mobile phone number with a country code; and the "photograph" or "motion image J or "fingerprint" or "retina" or "finger" Identification data such as “intravenous” or “eye iris” or “voice” may be initiated by the account holder (ie the account owner) after providing the login and storage, following the process or method specified by the credit card issuing bank. Any modification or change. In addition, in step e, the credit card issuing bank's internal computer is set up, and the “authorized certificate database” can be changed and set to be not issued by the credit card. The computer system inside the bank controls, but belongs to other computers outside the bank. The "external authorization certification database" established in the system enables the maintenance cost of the credit card issuing bank computer operating system to be reduced. Referring to the ninth figure, the embodiment of the present invention is applied to a credit card. When a credit card holder clicks to the store or the online transaction object i swipes or swips the card online, the store personnel first put the credit card on the credit card machine. After the card 19 200941410, the credit card holder 10 will be required to press the "phone number and photo", or "telephone number and motion picture" or "phone number" corresponding to the credit card of the credit card machine. And fingerprints, or "telephone number and retina", or "telephone number and finger vein", or "electricity: phone number and eye iris", or "telephone number and voice", etc., if When the credit card holder 10 is unwilling to press the input according to the instructions of the store staff, the store staff can immediately reject the credit card card holder 10 and then the credit card transaction; likewise, the credit card holder 10 when the card is swiped online The page will also require the entry of the "telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or " Authorized authentication data 3 such as telephone number and retina, or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice", if the credit card holder is unwilling to enter the authorized certification data At 3 o'clock, it will be rejected for its online ® credit card procedure. The above procedure can be used as the first defense mechanism to prevent theft. _ Therefore 'When the credit card holder 10 continues to follow the instructions of the store staff or online, then press on the credit card machine or enter the "phone number and photo", or "telephone number and motion picture", or "telephone" on the web page. "Identification and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and 20 200941410 voice", etc. The Bank's internal bank computer information processing center 91, in addition to immediately executing the card number information and card swiping of the existing check card holder, will be issued at the same time. Requests for comparison, instructions, - in the case of comparisons, are stored in the authorized authentication database 92 - the group "phone number and photo", or "telephone number and motion picture", or " Phone number and fingerprints, or "telephone number and video", or "telephone number and finger vein", or "phone number and eye iris", or "telephone number and language" At the same time, the authorized certification database 92 will reply to the bank computer information processing center 91, the certification is in compliance with the ", and the bank computer information processing center 91 will immediately issue a "consent authorization to swipe," message To the store or online transaction, you can complete the successful card swiping process; otherwise, the real credit card holder 10 can enter their own "phone number and photo", or "electric Φ number and motion picture , or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris J, or "telephone number and voice", etc. The credit card obtained by stealing or falsifying will be unable to obtain the "telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint", or "telephone number" of the card holder. Authorized Certification Data for Retina, or "Phone Number and Finger vein, or "Phone Number and Eyes 200941410 Membrane", or "Phone Number and Voice" 3 Under the circumstance, it is impossible to steal the credit card obtained by improper use. In contrast, the credit card holder who has accidentally lost or stolen the credit card has no need to be afraid of the actual money caused by the stolen brush. Loss, not to mention rushing to call the bank of the second-issued credit card to report the loss of the procedure, so it can completely eliminate the criminal case of credit card theft. In summary, for those who have difficulty pressing the "telephone number and identification code" with a finger, by changing to "telephone number and photo", or "telephone number and motion picture", Or "phone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" can be completely overcome And the improvement. [Simplified description of the drawings] The first figure is the step block diagram of the present invention. The second figure is one of the flow charts of the present invention for processing financial services in the bank counter. " : The invention is used in the personal counter to handle the financial month | 'The flow chart of the second. The fourth figure: one of the financial service flow charts of the invention used in the ATM automatic teller machine. The fifth figure: the invention is used in the present invention The financial service flow chart of the ATM ATM is the second. 22 200941410 The sixth figure is one of the flow charts of the invention for using the online online transfer money transfer financial service. Transfer money online to the network of the financial services to a flowchart of FIG eighth two: the step of using the credit card system is applied to the process of the present invention is the ninth block diagram showing FIG: The present invention uses a credit card to a flow chart of the process.

【主要元件符號說明】 卜店家或網路交易對象 3、31、3la、52、72、72a-授權認證資料 1〇-彳§用卡持卡者 20-帳戶擁有者 30、30a、60、60a-銀行 32、 32a、61、61a、73、73a、91-銀行電腦資訊處理中心 33、 62、74、92-授權認證資料庫 4〇_外部授權認證資料庫 50-ATM機器 51-欄位 71-主攔位 W-網路 70、70a-網路銀行 90-信用卡發卡銀行 23[Main component symbol description] Budian or online transaction object 3, 31, 3la, 52, 72, 72a - Authorized authentication information 1〇-彳§ Card holder 20-Account holder 30, 30a, 60, 60a - Banks 32, 32a, 61, 61a, 73, 73a, 91 - Bank Computer Information Processing Center 33, 62, 74, 92 - Authorized Certification Database 4〇 External Authorization Certification Database 50-ATM Machine 51 - Field 71 -Main block W-network 70, 70a-Internet bank 90-credit card issuing bank 23

Claims (1)

200941410 十、申請專利範圍: 1. -種「以電話料及識別碼做為金融服務系統中防弊之 方法(一)」,其步驟包含: a、至金融單位填寫「存款相關業務申請書」辦理 & 開戶; /· 依法定「存款開戶總約定書」之規定,憑身份 證及第一身份證明文件,並就簽名或蓋章擇一或合併留 存建擋於金融單位備查,· c、 開戶者自行提供一組併列的「電話號碼及識別 碼」給金融單位,以做為其專屬之授權認證資料; d、 由金融單位依「受理開戶作業檢核表」審查後, 核准開戶並核發開戶帳薄及/或金融卡;及 e、 金融單位將開戶者之個人身分資料、帳戶名、 金融卡號及密赐等資料’登錄儲存於其内部的電腦資料 • 帛内’並將該開戶者所提供專屬之「電話號碼及識別碼」 - &權&證資料’另登錄儲存於其內部電腦所設的”授權認 P登資料帛肖’其特徵在於:該併列@「電話號碼及識別 碼」’係為「電話號瑪及照片」、$為「電話號碼及動態 影像」或為「電話號碼及指紋」、或為「電話號碼及視 網膜J、或S「電話號碼及指靜脈」、或為「電話號碼及 眼虹膜」、或為「電話號碼及語音」等識別用資料。 24 200941410 2.如申請專利範圍第i項所述之「以電話號碼及識別碼做 為金融服務系統中防弊之方法(二)」,其中,步驟&所 述之「存款相關業務申請書」、步騾b所述之「存款開戶 總約定書」及其有關身份證明文件與簽章形式、以及步 ' 所述之「受理開戶作業檢核表」等書類或審核標準, - 其在格式或内容中所規定的諸多事項或合約條款,均係 由各金融單位自行依據其所屬國家之法律來制定而成。 ❹ 3.如申請專利_第1項所述之「以電話號瑪及識別碼做 為金融服務系統中防弊之方法(二)」,其中,該步騾c 中之「電話號碼」’係可為開戶者家中或公司的固網電話 號碼,或個人行動電話號瑪,或是冠有國別碼及區域碼 的固網電話號碼’或是冠有國別碼的行動電話號碼者。 4, 如申請專利範圍第!項所述之「以電話號碼及識別碼做 為金融服務系統中防弊之方$ (二)」,#中,該步騾e ❿ +所述之「照片」或「動態影像」$紋」或「視網 ” 膜」或「指靜脈」或「眼虹膜」或「語音」等識別用資 、 料,可由開戶者在提供登錄儲存後,依循金融單位所規 範之流程或方式自做隨時任意之修改或變更者。 5. 如申請專利範圍第i項所述之「以電話號碼及識別碼做 為金融服務系統中防弊之方法(二)」,其中,步騾e中 該開戶者所提供專屬之「電話號碼及照片」、或「電話號 25 200941410 碼及動態影像」、或「電話號碼及指紋」、或「電話號碼 及視網膜」、或「電話號碼及指靜脈」、或「電話號碼及 眼虹膜」、或「電話號碼及語音」等授權認證資料,更可 且錄儲存於非屬該金融單位內部電腦系統所操控之,,外 部授權認證資料庫,,中者。 6.-種「以電話號碼及識別碼做為金融服務系統中之信用 卡防弊的方法」,其步騾包含: &、填寫信用卡發卡銀行所提供之「信用卡申請 b、於該「信用卡申請書」上留存簽名的形式,並 _B供身份證與第二身份證明文件及相關財力證明,以供 信用卡發卡銀行建檔備存; 、 —組併列的「電話號碼 以做為其專屬之授權認 c、申請信用卡者自行提供200941410 X. Patent application scope: 1. - "Telephone material and identification code as a method for preventing fraud in financial service system (1)", the steps include: a. To the financial unit to fill out the "deposit-related business application" & Opening an account; /· According to the law, the "General Agreement for Deposit Account Opening" is stipulated by the ID card and the first identity document, and the signature or seal is selected or merged to keep the financial unit for future reference. c. Opening an account The self-provided set of "phone numbers and identification codes" will be provided to the financial unit as their exclusive authorized certification materials; d. After the financial unit has reviewed the "Accept Account Opening Checklist", it will approve the account opening and issue an account opening. Account book and/or financial card; and e. The financial unit will store the personal identification information, account name, financial card number and secret information of the account holder, and log in to the computer data stored in the computer. Provide exclusive "telephone number and identification code" - & rights & certifiable information 'Alternately stored in the internal computer set up" authorized recognition P Deng information ' 其 special It is: the "@ phone number and identification code" is "phone number and photo", "phone number and motion picture" or "phone number and fingerprint", or "phone number and retina J" Or S "Phone number and finger vein", or "Phone number and eye iris", or "Phone number and voice" identification data. 24 200941410 2. As described in item i of the patent application, "Telephone number and identification code as a method for preventing fraud in the financial service system (II)", in which the "deposit-related business application" described in the step & ", the general agreement of deposit account opening book" and its related identification documents and signature forms, as well as the "acceptance of account opening checklist" as described in the step, or the review criteria, - in the format Or many of the matters or contract terms specified in the content are formulated by the financial units themselves according to the laws of the countries in which they belong. ❹ 3. If you apply for a patent, as described in the first paragraph, "Telephone number and identification code as a method of preventing fraud in the financial service system (2)", wherein the "telephone number" in the step c is It can be the fixed-line telephone number of the account holder's home or company, or the personal mobile phone number, or the fixed-line telephone number with the country code and area code' or the mobile phone number with the country code. 4, such as the scope of patent application! As stated in the article, "Telephone number and identification code as the side of the financial services system ("two"", #,, the step 骡e ❿ + the "photo" or "motion image" $ pattern Or the identification resources such as "vision" membrane or "finger vein" or "eye iris" or "speech", which can be made by the account holder after providing the login and storage, according to the process or method regulated by the financial unit. Modifications or changes. 5. If the telephone number and identification code are used as methods for preventing fraud in the financial service system (II) as described in item i of the patent application scope, the exclusive "phone number" provided by the account holder in step e And photos, or "telephone number 25 200941410 code and video", or "telephone number and fingerprint", or "telephone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", Or authorized authentication materials such as "telephone number and voice" can be recorded and stored in a computer system that is not controlled by the financial unit, an external authorized authentication database, and the middle. 6.- "How to use the phone number and identification code as a method for preventing credit cards in the financial service system", the steps include: &, fill in the "credit card application b" provided by the credit card issuing bank, and apply for the "credit card" The form of the signature is kept on the book, and _B is provided for the identity card and the second identity document and the relevant financial certificate for the credit card issuing bank to keep the file for storage; and the "phone number for the exclusive authorization of the group" Recognize c, apply for credit card to provide 及識別瑪」給信用切卡銀行, 證資料; 心由信用卡發卡銀行審查後,核發信用卡;及 用+ §用切切行將持卡人之個人身分資料及信 监、號等資料’登錄儲存於其内部的電腦資料庫内, 並將該信用卡持卡人所 斤耘供專屬之「電話號碼及識別 碼」授權認證資料,另 培播# Α 力且錄儲存於其内部電腦所設的” 授權私'證資料庫,,內, 共特徵在於:該併列的「電話號 26 200941410 碼及識別碼」’係為「電話號碼及照片」、或為「電話號 碼及動態影像」、或為「電話號碼及指紋」、或為「電話 號碼及視網膜」、或為「電話號碼及指靜脈」、或為「電 話號碼及眼虹膜」、或為「電話號碼及語音」等識別用 / 資料。 • 7.如申請專利範圍第6項所述之方法,其中,該步驟&與 該步騾b所述「信用卡申請書」及其有關身份證明文件 • 與簽章形式,其在格式或内容中所規定的諸多事項或合 約條款,均係由各信用卡發卡銀行自行依據其所屬國家 之法律來制定而成。 8.如申請專利範圍第6項所述之方法,其中,該步驟c中 之「電話號碼」,係可為信用卡持卡人家中或公司的固網 電話號瑪,或個人行動電話„,或是冠有國別碼及區 域碼的固網電話號碼’或是冠有國別碼的行動電話號碼 9.如申請專利範圍“項所述之方法,其中,該步驟。中 所述之「照片」或「動態影像」豸「指紋」或「視網膜」 或「指靜脈」或「眼虹膜」或「語音」等識別用資料, 可由開戶者在提供登錄儲存後,依循金融單位所 流程或方式,逕自做隨時任意之修改或變更者。 10·如申請專利範圍第6項所述之方法,其中,該步驟4 27 200941410 該開戶者所提供專屬之「電話號碼及照片」、或「電話號 碼及動態影像」、或「電話號碼及指紋」、或「電話號碼 及視網膜」、或「電話號碼及指靜脈」、或「電話號碼及 眼虹膜」、或「電話號碼及語音」等授權認證資料,更可 ; 登錄儲存於非屬該金融單位内部電腦系統所操控之”外 部授權認證資料庫”中者。 mAnd the identification of the horse to the credit card bank, the card information; the heart is issued by the credit card issuing bank, the credit card is issued; and the use of + § to cut the card holder's personal identity information and letter, number and other information 'login stored in In the internal computer database, the credit card holder will be given a license for the exclusive "telephone number and identification code", and will be compiled and stored in the internal computer. The private 'certificate database', which is characterized by the fact that the "phone number 26 200941410 code and identification code" is "phone number and photo", or "phone number and motion picture" or "telephone" "Number and fingerprint", or "Phone number and retina", or "Phone number and finger vein", or "Phone number and eye iris", or "Phone number and voice" identification/data. 7. The method of claim 6, wherein the step & and the "credit card application" described in step b and its associated identification document and signature form are in format or content. Many of the matters or contract terms stipulated in the book are made by the credit card issuing banks themselves according to the laws of the countries in which they belong. 8. The method of claim 6, wherein the "telephone number" in the step c is a fixed-line telephone number of the credit card holder's home or the company, or a personal mobile phone „, or Is the fixed-line telephone number with the country code and the area code 'or the mobile phone number with the country code. 9. The method described in the patent application scope, wherein the step. The identification materials such as "photograph" or "motion image", "fingerprint" or "retina" or "finger vein" or "eye iris" or "speech" can be used by the account holder to provide financial information after login and storage. The procedures or methods of the unit may be modified or changed at any time. 10. The method of claim 6, wherein the step 4 27 200941410 provides the exclusive "telephone number and photo", or "telephone number and motion picture", or "telephone number and fingerprint" provided by the account holder. Authorized authentication materials such as "Phone number and retina", or "telephone number and finger vein", or "telephone number and eye iris", or "telephone number and voice" are also available; The "External Authorization Certification Database" controlled by the internal computer system of the unit. m 2828
TW97110303A 2008-03-21 2008-03-21 Method of using a telephone number and an identification code as fraud prevention in a financial service system TW200941410A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97110303A TW200941410A (en) 2008-03-21 2008-03-21 Method of using a telephone number and an identification code as fraud prevention in a financial service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97110303A TW200941410A (en) 2008-03-21 2008-03-21 Method of using a telephone number and an identification code as fraud prevention in a financial service system

Publications (1)

Publication Number Publication Date
TW200941410A true TW200941410A (en) 2009-10-01

Family

ID=44868303

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97110303A TW200941410A (en) 2008-03-21 2008-03-21 Method of using a telephone number and an identification code as fraud prevention in a financial service system

Country Status (1)

Country Link
TW (1) TW200941410A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9473490B2 (en) 2014-10-13 2016-10-18 Wells Fargo Bank, N.A. Bidirectional authentication
US10255429B2 (en) 2014-10-03 2019-04-09 Wells Fargo Bank, N.A. Setting an authorization level at enrollment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10255429B2 (en) 2014-10-03 2019-04-09 Wells Fargo Bank, N.A. Setting an authorization level at enrollment
US11423137B1 (en) 2014-10-03 2022-08-23 Wells Fargo Bank, N.A. Setting an authorization level at enrollment
US9473490B2 (en) 2014-10-13 2016-10-18 Wells Fargo Bank, N.A. Bidirectional authentication
US10791115B1 (en) 2014-10-13 2020-09-29 Wells Fargo Bank, N.A. Bidirectional authentication

Similar Documents

Publication Publication Date Title
US11157905B2 (en) Secure on device cardholder authentication using biometric data
KR101977131B1 (en) Customized financial management system using of a sub-certification
RU2595768C2 (en) Currency enumeration using identification information database
US20130124416A1 (en) Method and system for transferring funds over a voice call
US20100044430A1 (en) Automated Remittance Network
US20170278105A1 (en) Method and System for Secure Handling of Electronic Financial Transactions
CN103376896A (en) Method for electronic code drawing by eyes and electronic payment verification method
EP3186739B1 (en) Secure on device cardholder authentication using biometric data
US20110213706A1 (en) Systems and methods for transactions on the telecom web
US20190378120A1 (en) System and method for user identification and authentication
KR20150109323A (en) System and method for funds transfer processing
US20110029428A1 (en) Mobile Remittance Network
US20080082451A1 (en) Biometric Authorization of Electronic Payments
US20170018029A1 (en) Systems and methods for utilizing a money transfer network to facilitate lending
KR20150110456A (en) Real-time loan processing and loan fund
CN108428135A (en) Auth method
KR20220136963A (en) System and method for non-face-to-face identification kyc solution having excellent security
KR20170052126A (en) Method for Non-faced Multi-authenticating for Creating Financial Information
KR102154602B1 (en) Method for identity verification in face to face transactions
WO2023130862A1 (en) Digital asset management terminal device and digital asset management method
TW200941410A (en) Method of using a telephone number and an identification code as fraud prevention in a financial service system
JP2021077336A (en) Customer information management server and customer information management method
TWM603166U (en) Financial transaction device and system with non-contact authentication function
KR101604656B1 (en) System for consenting settlement and automacic transfer
KR20070109378A (en) Method for paperless electronic contract based on certified electronic document repository