^/3454 九、 發明說明: 【發明所屬之技術領域】 你a本^明係/歩及一種辨識身份之技術領域,尤指-種可 太Γ欠輸人之密碼皆不㈣,以防止密碼_錄及盜取而 巾田提昇安全性之身份_之方法及系統者。 L先前技術】 * ’ 一般習知之密碼式身份辨識系統’主要皆係利用 θ硪使用者輸人之特定密碼與該辨識系統内部預定之密碼 =相符來達到辨識身份之目的,所以當未重新設定辨識 …内。ρ之&碼a,使用者每—次輸人之密碼係皆是同一 組,,此該密碼便很容易被側錄而不具隱密性,而且一旦 =在碼m失或被盜取時’則該身份辨識系統便很容易被 人知入而影響其安全性。 【發明内容】 比,發明之主要目的在於提供一種可使每次輸入之密碼 目同以防止捃碼被側錄及盜取而大幅提昇安全性 身份辨識之方法及Μ者。 上述之身份辨識之方法,主要係供實行於一 :辨識f,其中該辨識方係供預設一運算公式及產生一運 藉由該運算元及運算公式與客戶方輪人之辨 的關係性,以供辨識該客戶方之身份。 、 定及:識系統’係包括一館存單元供預先設 入之式’一第一辨識單元係供辨識客戶方輪 心戠貝訊並產生-運算元’ 一第二辨識單元係供 173454 並藉由該運算元及運算 以供辨識該客戶方之身 曾此’該身份辨識方法及系統 π與該運算公式之_,而使客科轉特定之運 f需相對隨之改變而有所不同,進而以::欠輪入之辨識資^/3454 IX. Description of the invention: [Technical field of invention] You are a technical field of identification and identification, especially a password that can be too owed to lose (4) to prevent passwords. _ Recording and stealing the method and system of the identity of the towel. L Prior Art] * 'Generally known cryptographic identification system' mainly uses the specific password of θ硪 user input to match the internal password of the identification system to achieve identity identification, so when not reset Identify... inside. ρ之 & code a, the user's password for each input is the same group, the password is easy to be recorded and not hidden, and once = lost or stolen in code m 'The identity system is easily known and affects its security. SUMMARY OF THE INVENTION In contrast, the main object of the invention is to provide a method and a method for greatly improving security identification by making the password input each time to prevent the weight from being recorded and stolen. The method for identification of the above is mainly for implementing one: identification f, wherein the identification method is for presetting a calculation formula and generating a relationship between the operation element and the calculation formula and the customer square wheel person. For identification of the identity of the client. And the definition system: the system includes a library unit for pre-establishment type. A first identification unit is for identifying the customer's wheel and heart and generates an operation unit. A second identification unit is for 173454. The operation unit and the operation are used to identify the identity of the client and the system π and the calculation formula, so that the specific transfer of the customer to the service needs to be changed accordingly. And further to:: the identification of the under-involvement
,及盜取W幅提昇安全性之目的者。—碼被側 【實施方式】 法之二圖’係指出本發明所述身份辨識系統及方 於4::實施例,其中該身份辨識方法主要係供實朽 、 (1)及一辨谶方(2),其步驟如下: a )預先於辨識方(2 )中設定及儲存一運算公式(2 〇 0 )及一警示資訊(2 〇 1 ),該運算公式(2 〇 〇 )伯 為—具特定規律或規則之公式,例如數學之運算式等·,And stealing the W for the purpose of improving security. - Code Side [Embodiment] The second diagram of the method indicates the identification system of the present invention and the method of 4::, wherein the identification method is mainly for the real thing, (1) and a identification method. (2), the steps are as follows: a) Pre-set and store an operation formula (2 〇 0 ) and a warning information (2 〇 1 ) in the identification side (2), the operation formula (2 〇〇) is - a formula with a specific law or rule, such as a mathematical expression, etc.
b )該客戶方(1 )輸入一第一辨識資訊(i 〇 ),該 第一辨識資訊(1 〇)係可為一密碼資訊或為一生物特徵 寅訊(例如指紋、掌紋、臉孔、眼瞳、D N A · · ·等); c)該辦識方(2)在認可該第一辨識資訊(丄〇) 之狀態下產生一運算元.(2 2 0 ),該運算元(2 2 0 )係 可為數字、文字或符號等,而母一次所產生之運算元(2 2 0)係會依該第一辨識資訊(1 0)而有所不同,例如 當該第一辨識資訊(1Q)為一指紋時,則由於每一次之 指紋輸入的位置、力量的大小及接觸面積之不同,其所產 生的影像係皆不會相同,所以該運算元(2 2 0 )會因此 1273454 而不同; 孩各戶方(1 )輸入 α 乐二辨識資訊(1 1^ 該辨識方(2 ),該第二辨識資訊(2 )為該客戶)至 :該運算元(2 2 Q)代人該運算公式(2 () 結果; <建异 e)該辨财(2)判斷該第二辨識#訊( ,相同於該辨識方⑵將該運算元(2 2⑸代入言^ 异公式(2 0 〇)之運算結果;以及 乂運 、“f,/該辨識方⑵在判斷該第二辨識資訊 為真的狀態下即認可該客戶方(1 )。 在上述之d)步驟中時,當客戶方(2 或其它原因而非自主性的輪人該第二辨識資訊n返 則係可於該第二辨識資訊(11)後增加輸人—㈣干 t二\如此該辨識方⑵係仍可在判斷該第I辨i 丨“真,,的狀態下認可該客戶方(1),以確 身安全’同時亦可藉由該辨識方(2) 上、/ )的存在,而即刻通報救援,而 上述之警不貧訊(1 2)係可為一組數字。 /在該第—圖中係又指出該辨識方(2)係為—身份辨 其係包括有-儲存單元(2 Q )、—第—辨識單元 (2 1)、—顯示器' (22)、一第二辨識單 一女全辨識單元(2 4 ),其中: 單元(2 〇 ),係供預先設定及儲存該運算公式 (2 0 0)及警示資訊(2 0 1); 1273454 η Λ該第—辨識單元(2 1 ),係供辨識該第-辨識資訊(i 亚依據δ亥第-辨識貧訊(工〇 )而產生該運算元(2 2 0), 名”、、員示為(2 2 ),係供顯示該運算元(2 2 〇 ); 該第二辨識單元(2 3 ),係供辨識比對該客戶方(!) 輪入,第=辨識#訊(1 1)是否為該運算元(2 2 0) 代入"亥運汁么式(2 〇 〇 )之結果,如是則認可客戶方(1 ) 之身份; —忒女全辨識單元(2 4 ),係供辨識比對該客戶方(1 ) 輪入^警示資訊(1 2)是否符合該儲存單元(2 0)中 之警不貧訊(2 0 1 ),如是則即刻通報救援。 、,參閱第二圖所示係本發明之第二較佳實施例,其方 法主要係與該第-較佳實_大致相同,其差異處在ς該 第二較佳實施例之運算元(2 2 0)係由該辨識方(2) 隨機產生,因此客戶方(i )係無需輸入第—辨識資訊(工 〇 )’如此則該辨識方法便可供單獨使用,或應用於數 識程序中之第一道。 一而在該第二圖中係指出該辨識方(2)中之第_辨識 單凡(2 1 a )係供隨機產生該運算元(2 2 〇)。曰 由於本發明之身份辨識方法及系統主要係藉由 定之運算元(2 2 0 )與該運算公式(2 Q Q )之關係,' 以使客戶方(1)每次輸入之第二辨識資訊(i i㊆ 對隨之改變,所以每一次輸入之二辨識資訊(丄1 不會相同,因此可有效防止被側錄及盜用,而可大幅 1273454 身份辨識之安全性。 綜上所述,當知本發明具有產業上之利用性及進步 性,而且在同類產品中均未見有類似之產品或發表而具有 新穎性,故已符合發明專利之申請要件。 1273454 【W式簡單說明】 第圖,係本發明第一較佳實施例之系、統方塊圖。 第二圖’係本發明第二較佳實補之祕方塊圖。 【主要元件符號說明】b) the client (1) inputs a first identification information (i 〇), which may be a password information or a biometric message (eg fingerprint, palm print, face, Eyelids, DNA · · ·, etc.); c) The operator (2) generates an operand (2 2 0 ) in the state of approving the first identification information (丄〇), the operand (2 2 0) can be a number, a character or a symbol, etc., and the arithmetic element (2 2 0) generated by the mother once differs according to the first identification information (1 0), for example, when the first identification information ( 1Q) When a fingerprint is used, the image system produced by each fingerprint input will not be the same, so the operand (2 2 0 ) will be 1273454 instead. Different; child households (1) input α music identification information (1 1 ^ the identification party (2), the second identification information (2) for the customer) to: the operation element (2 2 Q) generation The operation formula (2 () result; < construction difference e) the wealth analysis (2) determines the second identification # message (, the same as the identification side (2) the operation (2 2 (5) Substitute the result of the different formula (2 0 〇); and the transfer, "f, / the identification party (2) recognizes the client (1) in the state that the second identification information is true. In the step d) above, when the client side (2 or other reasons than the autonomous wheeler, the second identification information n returns, the input information may be added after the second identification information (11) - (4) t二\ Thus the identification party (2) can still recognize the client (1) in the state of "I," in order to ensure the security, and also by the identification party (2) The presence of , / ), and immediately notify the rescue, and the above police are not poor news (1 2) can be a set of numbers. / In the first figure, it is pointed out that the identification party (2) is - identity The system includes a storage unit (2 Q ), a first identification unit (2 1), a display (22), and a second identification single female identification unit (2 4 ), wherein: the unit (2 〇 ) for pre-setting and storing the calculation formula (200) and warning information (2 0 1); 1273454 η Λ the first-identification unit (2 1 ) for identifying the first-identification Information (i Ya according to δ Haidi - identification of poor news (work) generated the operand (2 2 0), the name", the member is shown as (2 2), for the display of the operand (2 2 〇) The second identification unit (2 3 ) is for the identification ratio to the customer side (!), the first = identification # (1 1) is the operation element (2 2 0) substituting " The result of the formula (2 〇〇), if it is, the identity of the client (1) is recognized; the prostitute full identification unit (2 4) is for the identification of the customer (1) by means of the warning information (1) 2) Whether it is in compliance with the alarm in the storage unit (20) (2 0 1), if yes, immediately notify the rescue. Referring to the second embodiment, the second preferred embodiment of the present invention is mainly the same as the first preferred embodiment, and the difference is in the operating element of the second preferred embodiment ( 2 2 0) is randomly generated by the identification party (2), so the client (i) does not need to input the first identification information (work). Thus, the identification method can be used alone or applied to the digital program. The first of them. In the second figure, it is pointed out that the first _recognition (2 1 a ) in the identification side (2) is for randomly generating the operation element (2 2 〇).曰The identification method and system of the present invention mainly relies on the relationship between the operation unit (2 2 0 ) and the operation formula (2 QQ), so that the client side (1) inputs the second identification information each time ( i i seven pairs change accordingly, so every time you enter the second identification information (丄1 will not be the same, it can effectively prevent side-by-side and misappropriation, and can greatly increase the security of 1273454 identification. In summary, when you know The invention has industrial applicability and progress, and has no similar products or novelty in the same kind of products, so it has met the requirements of the invention patent. 1273454 [W-style simple description] The block diagram of the first preferred embodiment of the present invention. The second diagram is a block diagram of the second preferred embodiment of the present invention.
(1) 客戶方 (1 1 )第二辨識資訊 (2) 辨識方 (2 0 0 )運算公式 (2 1)第一辨識單元 (2 2 0)運算元 (2 4)安全辨識單元 (1 0)第一辨識資訊 (1 2)警示資訊 (20)儲存單元 (201)警示資訊 (2 2)顯示器 (2 3)苐二辨識單元 (2 1 a)第一辨識單元(1) Customer side (1 1 ) Second identification information (2) Identification side (2 0 0 ) Operation formula (2 1) First identification unit (2 2 0) Operation unit (2 4) Security identification unit (1 0 ) First identification information (1 2) Warning information (20) Storage unit (201) Warning information (2 2) Display (2 3) Second identification unit (2 1 a) First identification unit