1323597 九、發明說明: 【發明所屬之技術領域】 本發明有關雙卡系統,尤指一種用於通信終端(例 如行動電話)的雙卡組合之安全方法。 【先前技術】 一般來說,為提供網路用戶多樣化的服務,有許多 種電信網路已建立。由電信網路所供應之最廣為使用與 熟知的服務當然非行動電話服務莫屬,如手機。同時, 為了使電子裝置的功能提供更多服務,數種具有特殊電 路表面接觸卡已廣泛使用於電子裝置。舉例來說,用戶 識別模組(SIM)卡可放置於手提電話,SIM卡持有者得 以使用電話的功能。藉由變換SIM卡,一支電話可由多 個SIM卡持有者所使用,如同個人電話一般。再者,部 份電信網路提供其他有關金融業務操作與交易的服務。 因此,安全傳輸的重要性不容忽視。 眾所皆知,SIM卡最常使用於通訊裝置,用戶得以 使用個人帳號或特定無線電話網路。每一張SIM卡内建 有用於指定網路的組態資訊,亦有用來鑑別用戶身分的 資訊,如用戶的行動電話號碼。此外,其他外部1C卡也 能做多項應用,如付費,即所謂的”多功能卡”。同時, 整合SIM卡系統與通信終端配合使用,可產生與交易終 端和通信終端同時使用之雙卡系統,藉由非接觸交易卡 s 5 而有付費功能,該卡的尺寸可簡易且方便置於行動電話 中。毫無疑問地,用於通信終端之雙卡組合安全性是相 當重要的。再者,因信用卡和現金卡遭竊或偽造所產生 的問題日益嚴重,各方積極作為,欲減低上述之風險。 諸多解決辦法紛紛出籠,包括時間限制、限制提取、副 本加密以及持卡者身分認證,認證方式包羅萬象,從個 人識別碼(PIN)、指紋辨識到一次性密碼等。儘管有許 多防護資料外洩的方法,然而,不肖之徒總是能以高門 檻技術,排除萬難,想出破解之道。 具有行動電話與信用卡功能的多功能卡雖然在技術 上可行,但實際上卻很難實施,或無法揭露能遏止不當 使用的有效安全系統。因此,現今最亟需的是可用於通 信終端之雙卡組合的安全方法,藉由非接觸交易卡而有 付費功能,該卡尺寸可簡易且方便置於行動電話中,進 一步提供雙卡的交互安全性,以遏止不當使用。本發明 不僅改正了習知缺點也解決了上述問題。 【發明内容】 本段摘述本發明的某些特徵,其他特徵將敍述於後 續的段落。本發明藉由附加的申請專利範圍定義,其合 併於此段落作為參考。 有鑒於習知技藝受制於上述之問題,本發明的目的 1323597 ' 即為提出一種可用於通信終端之雙卡組合的安全方法, - 藉由具有付費功能的非接觸交易卡,其尺寸可簡易且方 便置於行動電話中,進一步提供雙卡的交互安全性,以 遏止不當使用,不僅改正了習知缺點也解決了上述問題。 為達上述目的,本發明之較廣義實施樣態為提供一 種用於通信終端之雙卡組合的安全方法,包含以下步驟: a)提供第一卡;b)結合第二卡和第一卡以構成雙卡組 • 合;c)將第一卡或第二卡初始化以啟用第一卡之第一 識別碼或第二卡之第二識別碼;d)檢查已初始化之第 一識別碼或第二識別碼,因此當該第一卡或該第二卡置 換為其他卡,或該第一識別碼或第二識別碼無效時,該 雙卡組合失效。 根據本發明之構想,雙卡組合可插入通信終端之 SIM插槽。 根據本發明之構想,通信終端包括行動電話及個人 • 數位助理。 根據本發明之構想,第一識別碼和第二識別碼分別 紀錄於第一卡之第一記憶體,以及第二卡之第二記憶體。 根據本發明之構想,第一記憶體和第二記憶體包含 快閃記憶體及電子抹除式可程式唯讀記憶體 (EEPROM)。 根據本發明之構想,第一卡是SIM卡。 根據本發明之構想,第一識別碼包括SIM的個人識 7 13235971323597 IX. Description of the Invention: [Technical Field] The present invention relates to a dual card system, and more particularly to a security method for a dual card combination for a communication terminal such as a mobile phone. [Prior Art] In general, a variety of telecommunication networks have been established to provide diverse services for network users. The most widely used and well-known services provided by telecommunications networks are of course non-mobile phone services, such as mobile phones. At the same time, in order to provide more services for the functions of the electronic device, several types of special circuit surface contact cards have been widely used in electronic devices. For example, a Subscriber Identity Module (SIM) card can be placed on a mobile phone, and the SIM card holder can use the phone. By changing the SIM card, a phone can be used by multiple SIM card holders, just like a personal phone. Furthermore, the telecommunications network provides other services related to financial business operations and transactions. Therefore, the importance of secure transmission cannot be ignored. As is well known, SIM cards are most commonly used in communication devices, allowing users to use personal accounts or specific wireless telephone networks. Each SIM card has built-in configuration information for specifying the network, as well as information for identifying the user's identity, such as the user's mobile phone number. In addition, other external 1C cards can also be used for multiple applications, such as payment, the so-called "multi-function card." At the same time, the integrated SIM card system is used in conjunction with the communication terminal to generate a dual card system for use with the transaction terminal and the communication terminal. The non-contact transaction card s 5 has a payment function, and the size of the card can be easily and conveniently placed. In the mobile phone. There is no doubt that the dual-card combination security for communication terminals is quite important. Moreover, the problems caused by the theft or forgery of credit cards and cash cards have become increasingly serious, and all parties are actively pursuing the above risks. Numerous solutions have emerged, including time limits, restricted extraction, copy encryption, and cardholder identity authentication. The authentication methods range from personal identification (PIN), fingerprint identification to one-time passwords. Although there are many methods for leaking protection data, the unscrupulous people can always use high-tech technology to eliminate all difficulties and come up with the solution. A versatile card with a mobile phone and credit card function, while technically feasible, is actually difficult to implement or does not expose an effective security system that can prevent inappropriate use. Therefore, what is most needed today is a secure method for a dual-card combination of communication terminals, which has a payment function by means of a contactless transaction card, which can be easily and conveniently placed in a mobile phone, further providing dual-card interaction. Safety to curb improper use. The present invention not only corrects the conventional disadvantages but also solves the above problems. SUMMARY OF THE INVENTION This section summarizes certain features of the present invention, and other features will be described in the subsequent paragraphs. The invention is defined by the scope of the appended claims, which is incorporated herein by reference. In view of the above-mentioned problems, the object 1323597' is a security method for a dual-card combination that can be used for a communication terminal, and the size is simple and convenient by using a contactless transaction card having a payment function. Conveniently placed in the mobile phone, further providing the interactive security of the dual card to curb improper use, not only correcting the conventional shortcomings but also solving the above problems. To achieve the above object, a broader embodiment of the present invention provides a security method for a dual card combination for a communication terminal, comprising the steps of: a) providing a first card; b) combining the second card with the first card Forming a dual card set; combining; c) initializing the first card or the second card to enable the first identification code of the first card or the second identification code of the second card; d) checking the initialized first identification code or the first Two identification codes, so when the first card or the second card is replaced with another card, or the first identification code or the second identification code is invalid, the dual card combination fails. According to the concept of the invention, the dual card combination can be inserted into the SIM slot of the communication terminal. In accordance with the teachings of the present invention, communication terminals include mobile phones and personal digital assistants. According to the concept of the present invention, the first identification code and the second identification code are respectively recorded in the first memory of the first card and the second memory of the second card. According to the concept of the present invention, the first memory and the second memory include a flash memory and an electronic erasable programmable read only memory (EEPROM). According to the concept of the invention, the first card is a SIM card. According to the concept of the invention, the first identification code comprises the personal knowledge of the SIM 7 1323597
別碼(PIN)、全球唯一識別碼(IMSI)及積體電路卡識別 碼(ICCID)。 根據本發明之構想,第二卡是交易卡. 根據本發明之構想,第二識別碼是交易卡之個人識 別碼(PIN)。 根據本發明之構想,步驟c)或d)以空中下載技術 (OTA)的方式達成。 根據本發明之構想,步驟d)以第二卡達成。PIN, Globally Unique Identifier (IMSI), and Integrated Circuit Card Identification (ICCID). According to the concept of the invention, the second card is a transaction card. According to the concept of the invention, the second identification code is a personal identification number (PIN) of the transaction card. According to the concept of the invention, step c) or d) is achieved by means of over-the-air (OTA) technology. According to the concept of the invention, step d) is achieved with a second card.
為達上述目的,本發明另一較廣義實施樣態為用於 通信終端之雙卡組合安全方法,包含以下步驟:a)提 供第一卡;b)結合第二卡與第一卡以構成雙卡組合;c) 將第一卡或第二卡初始化以啟用第一卡之第一識別碼或 第二卡之第二識別碼;d)檢查已初始化的第一識別碼 或第二識別碼;e)當第一卡遺失或被置換時,在服務 供應商的授權下,第一識別碼無效;f)以具有第三識別 碼之第三卡置換第一卡,以構成一新雙卡組合;g)啟用 第三識別碼;h)檢查第三識別碼。 根據本發明之構想,通信終端包含行動電話及個人 數位助理。 根據本發明之構想,第一卡和第三卡是SIM。 根據本發明之構想,第一識別碼和第三識別碼包括 SIM的個人識別碼(PIN)、全球唯一識別碼(IMSI)及積 體電路卡識別碼(ICCID)。In order to achieve the above object, another broad implementation of the present invention is a dual card combination security method for a communication terminal, comprising the steps of: a) providing a first card; b) combining the second card with the first card to form a double Card combination; c) initializing the first card or the second card to enable the first identification code of the first card or the second identification code of the second card; d) checking the initialized first identification code or the second identification code; e) when the first card is lost or replaced, the first identification code is invalid under the authorization of the service provider; f) the first card is replaced with the third card having the third identification code to form a new dual card combination ;g) enable the third identification code; h) check the third identification code. In accordance with the teachings of the present invention, a communication terminal includes a mobile telephone and a personal digital assistant. According to the concept of the invention, the first card and the third card are SIMs. According to the concept of the present invention, the first identification code and the third identification code include a personal identification number (PIN) of the SIM, a globally unique identification code (IMSI), and an integrated circuit card identification code (ICCID).
S 1323597 1 根據本發明之構想,第二卡是交易卡。 - 根據本發明之構想,第二識別碼是交易卡的個人識 別碼(PIN)。 根據本發明之構想,步驟c)、d)、e)、g)或h)以 空中下載技術(OTA)的方式達成。 為使本發明之上述目的、特徵和優點更淺顯易懂, 下文特舉較佳實施例,並配合所附圖示,作詳細說明如 • 下: 【實施方式】 體現本發明特徵與優點的一些實施例將在後段的說 明中詳細敘述。應理解的是本發明能夠在不同的態樣上 具有各種的變化,其皆不脫離本發明的範圍,且其中的 說明及圖式在本質上當作說明之用,而非用以限制本發 明。 請參照圖1與圖2。上述圖式為本發明之用於通信終 端之雙卡組合的安全方法之示意圖。如圖1與圖2所示, 本發明之安全方法包括以下步驟:a)提供第一卡11,如 步驟S21; b)結合第二卡12與第一卡11以構成雙卡組 合10,如步驟S22 ; c)將第一卡11或第二卡12初始 化以啟用第一卡11的第一識別碼ID1或第二卡12的第 二識別碼ID2,如步驟S23 ; d)檢查已初始化的第一識 9S 1323597 1 According to the concept of the invention, the second card is a transaction card. - According to the concept of the invention, the second identification code is a personal identification number (PIN) of the transaction card. According to the concept of the invention, step c), d), e), g) or h) is achieved by means of over-the-air (OTA) technology. The above described objects, features, and advantages of the present invention will become more apparent from the description of the preferred embodiments of the invention. The embodiment will be described in detail in the description of the latter paragraph. It is to be understood that the invention is not limited by the description of the invention. Please refer to FIG. 1 and FIG. 2 . The above diagram is a schematic diagram of a security method for a dual card combination for a communication terminal of the present invention. As shown in FIG. 1 and FIG. 2, the security method of the present invention comprises the steps of: a) providing a first card 11 as in step S21; b) combining the second card 12 with the first card 11 to form a dual card combination 10, such as Step S22; c) Initializing the first card 11 or the second card 12 to enable the first identification code ID1 of the first card 11 or the second identification code ID2 of the second card 12, as by step S23; d) checking the initialized First knowledge 9