TWI569162B - Identity identification system and its implementing method - Google Patents
Identity identification system and its implementing method Download PDFInfo
- Publication number
- TWI569162B TWI569162B TW103138765A TW103138765A TWI569162B TW I569162 B TWI569162 B TW I569162B TW 103138765 A TW103138765 A TW 103138765A TW 103138765 A TW103138765 A TW 103138765A TW I569162 B TWI569162 B TW I569162B
- Authority
- TW
- Taiwan
- Prior art keywords
- bar code
- key
- identification
- smart phone
- algorithm
- Prior art date
Links
Landscapes
- Telephonic Communication Services (AREA)
Description
本發明有關一種身份辨識系統及其實施方法,特別是指一種利用身份識別條碼及變動條碼作搭配,以提升身份辨識之安全性的身份辨識系統及其實施方法。 The invention relates to an identification system and an implementation method thereof, in particular to an identification system using an identification barcode and a variation barcode to improve the security of identity recognition and an implementation method thereof.
隨著資訊通訊技術的發展、以及智慧型手機技術的成熟,各種透過網路、通訊類型的線上交易已逐漸被消費者廣為應用,觀察現代多數人的消費習慣,包括以現金給付的交易行為、或是採用信用卡、金融卡、電子票券等;然而,使用現金的交易行為,通常伴隨著攜帶不便、遺失等風險,但即便是使用信用卡類型的塑膠貨幣進行消費,亦同時也產生了偽卡、盜刷等問題,也就是說業界一直以來,尚無法徹底解決消費時之交易安全風險的問題;再者,近年來由於智慧型手機的使用已高度的普及化,是以,利用智慧型手機做為進行支付方式之載具已儼然為勢在必行之趨勢,然而,其尚待解決的核心問題,亦是在提供進行交易的過程中,如何能達到方便和兼顧高度安全性的使用者身份辨識;目前,業界一直著眼在以近場通訊技術(Near Field Communication,NFC)的基礎上例如美國專利US 8360329號、US 8041338號、US 8577810號所揭,但因目前市場上主流的智慧型手機主要有三種作業系統,即IOS、Android及windows,因此,會有造成辨識機構端之辨識裝置(讀取器)讀取困難的問題,例如,到目前為止,尚未有一個NFC讀取器可同時讀取Apple Pay和Google wallet;再者,在支付方式轉換的初期,使用者之數量並不多,商家在初期如為滿足少量的消費者,即須要先投入額外成本另行購置NFC讀取器,而通常商家意願都不高,此一情況,即會造成惡性循環,亦即,客戶也會因裝設裝置有NFC讀取器商家不多,而不願申請手機錢包和行動支付。 With the development of information and communication technologies and the maturity of smart phone technology, various online transactions through the Internet and communication types have been widely used by consumers to observe the consumption habits of modern consumers, including cash-sending transactions. Or use credit cards, financial cards, e-tickets, etc.; however, the use of cash transactions, usually accompanied by the risk of inconvenience, loss, etc., but even the use of credit card type of plastic money for consumption, but also generated a pseudo Cards, stolen brushes and other issues, that is to say, the industry has not been able to completely solve the problem of transaction security risks during consumption; in addition, in recent years, the use of smart phones has become highly popular, and the use of smart As a vehicle for payment methods, mobile phones have become an imperative trend. However, the core issue that remains to be solved is how to achieve convenience and high security in the process of providing transactions. Identity identification; at present, the industry has been focusing on near field communication technology (Near Based on Field Communication, NFC, for example, US Pat. No. 8,360,329, US Pat. No. 8,041,338, and US Pat. No. 85,778,10, but because the mainstream smart phones on the market currently have three operating systems, namely IOS, Android, and Windows, therefore, There is a problem that the identification device (reader) of the identification mechanism is difficult to read. For example, so far, there is not yet an NFC reader that can simultaneously read Apple Pay and Google wallet; in addition, in the payment mode conversion In the initial stage, the number of users is not large. In the initial stage, if the merchants need to meet a small number of consumers, they need to invest in additional costs to purchase an NFC reader. Usually, the merchants are not willing to be high. This situation will result in The vicious circle, that is, the customer will not have many NFC readers due to the installation device, and is not willing to apply for mobile wallet and mobile payment.
承上問題,目前,最簡單的解決方案即是利用加密過的條碼作為身份辨識依據,商家端則可直接應用現有的線性CCD(Linear charge-coupled device)條碼讀取設備,對具有身份辨識的條碼進行讀取,此應用模式可不需要再花錢添購設備,經由直接讀取客戶手機所顯示的條碼,再進行驗證後,即可完成身份辨識,惟,若僅用此方法,仍會存在有條碼被偽造的風險,縱使條碼已經過加密,但因現有機制是將加、解密資料儲存在辨識系統裡,其即具有遭到駭入後破解的可能性。 Under the problem, at present, the simplest solution is to use the encrypted barcode as the identification basis, and the merchant can directly apply the existing linear CCD (Linear charge-coupled device) barcode reading device for identification. The barcode is read. This application mode does not need to spend money to purchase the device. After directly reading the barcode displayed by the customer's mobile phone, and then verifying, the identification can be completed. However, if only this method is used, the application still exists. There is a risk that the barcode will be forged, even if the barcode has been encrypted, but because the existing mechanism is to store the encryption and decryption data in the identification system, it has the possibility of being cracked after being broken.
有鑑於上述的問題,本發明之主要的目的即在於提 供一種安全性高、且操作方便的身份辨識系統及其實施方法,為達上述目的,本發明主要係利用一身份識別條碼、搭配可隨時間變化的一變動條碼,作為辨識使用者端之身份的辨識依據,且在預定的時間內(例如預設為1分鐘),所述的變動條碼就會因時間改變而產生變化,如此一來,當使用者端藉其智慧型手機產生的身份識別條碼在搭配變動條碼後所形成的辨識依據,在每個時間點都是唯一的一組,再者,當辨識機構端的伺服器裝置收到上述的辨識依據後,係採取相同的規則對所擷取的條碼進行驗證,驗證通過後即完成身份識別;另,當時間改變後,即便是經過驗證的辨識依據,依然會呈無效狀態,是以,可有效防止條碼被偽造的問題,再者,無論是使用者端的智慧型手機、亦或是辨識機構端的伺服器裝置,均不會存取上述的辨識依據,是以,更可高度防止例如因駭客入侵、側錄等情況而造成密碼遺失的問題。 In view of the above problems, the main object of the present invention is to provide For the above purpose, the present invention mainly utilizes an identification barcode and a changeable barcode that can change with time as the identity of the user. The identification basis, and within a predetermined time (for example, preset to 1 minute), the change bar code will change due to time change, so that when the user end uses the identity generated by his smart phone The identification basis formed by the bar code after matching the bar code is unique at each time point. Further, when the server device of the identification device receives the above identification basis, the same rule is adopted. The barcode is verified, and the identification is completed after the verification is passed. In addition, when the time is changed, even the verified identification basis is still invalid, so that the barcode can be effectively prevented from being forged. No matter whether it is the smart phone of the user end or the server device of the identification device, the above identification basis will not be accessed. Of preventing, for example due to hacking, skimming, etc. causing the problem of lost passwords.
為使 貴審查委員得以清楚了解本發明之系統組成、實施方法之流程及其實施後可達成的目的及功效,茲以下列說明搭配圖示進行說明,敬請參閱。 In order to enable your review committee to clearly understand the system composition of the present invention, the flow of the implementation method, and the goals and effects that can be achieved after implementation, the following descriptions are used together with the illustrations, please refer to it.
1‧‧‧身份辨識系統 1‧‧‧identification system
11‧‧‧使用者端 11‧‧‧User side
12‧‧‧交易端 12‧‧‧Transaction side
112‧‧‧智慧型手機 112‧‧‧Smart mobile phone
122‧‧‧條碼資料擷取裝置 122‧‧‧Barcode data acquisition device
113‧‧‧應用程式(APP) 113‧‧‧Application (APP)
114‧‧‧時間倒數計時區 114‧‧‧Time Countdown Area
13‧‧‧辨識機構端 13‧‧‧ Identification mechanism end
132‧‧‧伺服器裝置 132‧‧‧Server device
2‧‧‧網際網路 2‧‧‧Internet
B‧‧‧初始登錄 B‧‧‧Initial login
B11‧‧‧初始登錄請求 B11‧‧‧ initial login request
B12‧‧‧接受登錄請求 B12‧‧‧Accept login request
C01‧‧‧第一演算法 C01‧‧‧First algorithm
C02‧‧‧第二演算法 C02‧‧‧Second algorithm
C03‧‧‧第三演算法 C03‧‧‧ third algorithm
R‧‧‧身份辨識驗證 R‧‧‧identification verification
R11‧‧‧啟動驗證請求 R11‧‧‧Start verification request
R12‧‧‧條碼擷取 R12‧‧‧ barcode capture
R13‧‧‧接收條碼 R13‧‧‧Receive bar code
R14‧‧‧身份辨識驗證 R14‧‧‧identification verification
R15‧‧‧辨識結果訊息 R15‧‧‧ Identification result message
S1‧‧‧儲存主鑰匙(KEY) S1‧‧‧Storage Master Key (KEY)
IN01‧‧‧主鑰匙(KEY) IN01‧‧‧Master Key (KEY)
IN02‧‧‧虛擬鑰匙(KEY) IN02‧‧‧Virtual Key (KEY)
IN02’‧‧‧虛擬鑰匙(KEY) IN02’‧‧‧Virtual Key (KEY)
IN03‧‧‧驗證鑰匙(KEY) IN03‧‧‧Verification Key (KEY)
IN03’‧‧‧驗證鑰匙(KEY) IN03’‧‧‧Verification Key (KEY)
IN04‧‧‧變動條碼 IN04‧‧‧Change barcode
IN05‧‧‧身份識別條碼 IN05‧‧‧identification barcode
OUT01‧‧‧定區間變動條碼 OUT01‧‧‧Range Change Barcode
第1圖,本發明的系統組成示意圖。 Figure 1 is a schematic diagram showing the composition of the system of the present invention.
第2圖,本發明的實施流程示意圖。 Fig. 2 is a schematic view showing the flow of the implementation of the present invention.
請參閱「第1圖」,圖中所示為本發明的系統組成示意圖,如圖所示,本發明所稱的身份辨識系統1,主要係由一使用者端11的智慧型手機112、一交易端12的條碼資料擷取裝置122、以及一辨識機構端13的伺服器裝置132組成;其中,所述的智慧型手機112泛指一般智慧型電話,其具有一顯示幕,且智慧型手機的顯示幕,顯示應用程式(APP)113產生的條碼及資訊,並具有一時間倒數計時區114,其可例如為圖形顯示、數字顯示等態樣,可供顯示時間倒數狀態;又,所述的交易端12則泛指有提供產品消費交易或服務消費交易的單位,例如為實體商店,且其條碼資料擷取裝置122則可例如為POS機、可主動式擷取條碼資料的條碼讀取器、或可被動式輸入條碼資料的電子裝置;另,所述的辨識機構端13,則指一提供身份辨識的單位、或泛指結合身份辨識功用具有承作交易款項支付的金融單位,例如銀行、信用卡發卡機構、或可為提供第三方支付服務的業者,其伺服器裝置132則為由辨識機構端13可操作控制的伺服器,其主要是透過網際網路2與各合作的交易端12之條碼資料擷取裝置122呈資訊連結。 Please refer to FIG. 1 , which is a schematic diagram of the system composition of the present invention. As shown in the figure, the identity recognition system 1 of the present invention is mainly composed of a smart phone 112 of a user terminal 11 and a The bar code data capturing device 122 of the transaction terminal 12 and the server device 132 of the identification device terminal 13; wherein the smart phone 112 generally refers to a general smart phone, which has a display screen and a smart phone. The display screen displays the barcode and information generated by the application (APP) 113, and has a time countdown area 114, which can be, for example, a graphic display, a digital display, or the like, for displaying the time reciprocal state; The transaction terminal 12 generally refers to a unit that provides a product consumption transaction or a service consumption transaction, for example, a physical store, and the barcode data extraction device 122 can be, for example, a POS machine, and can actively read bar code data. Or an electronic device that can passively input bar code data; in addition, the identification mechanism terminal 13 refers to a unit that provides identity recognition, or refers to a combination of identity identification functions and has a transaction amount. The financial unit to be paid, such as a bank, a credit card issuer, or a provider that can provide a third party payment service, has a server device 132 that is operatively controlled by the identification mechanism terminal 13, mainly through the Internet 2 The barcode data extraction device 122 of the transaction terminal 12 of each cooperation is linked by information.
請參閱「第2圖」,圖中所示係為本發明所稱之身份辨識系統的實施方法,如圖所示,當一使用者端11(或稱使用者)欲使用身份辨識系統1作為交易支付工具的身份識別 時,其在初次使用時,需先進行初始登錄B的程序,此舉主要是讓使用者可利用自己隨身攜帶的智慧型手機112,先行與提供交易給付(含付款、撥款)服務的辨識機構端13之伺服器裝置132完成初次的登錄(註冊),以使伺服器裝置132能記載使用者端11的身份資訊,請再參閱圖中所示,初始登錄B之過程如以下所述:(1)使用者端11以其智慧型手機112安裝一應用程式(APP)113;(2)執行應用程式(APP)113,使其向辨識機構端13之伺服器裝置132,送出一初始登錄請求B11,此所述的登錄請求所包含的資訊簡稱為主鑰匙(KEY)IN01,其所包含的內容包括使用者端11的用戶識別資訊,例如本智慧型手機112的行動電話、使用者端11的身份證號碼,其必需具有符合單一不重複的特性,為求提高資訊安全等級,所述的應用程式(APP)113亦可併附產生一組符合單一不重複特性的ID碼,並與上述所稱的用戶識別資訊一同搭配以作為主鑰匙(KEY)(IN01),為確認使用者與行動電話註冊者同一人,伺服器裝置132係利用簡訊方式傳回一認證碼給智慧型手機的應用程式(APP)113,然後應用程式(APP)113再將主鑰匙(KEY)(IN01)及認證碼利用傳回辨識機構端13之伺服器裝置132;(3)辨識機構端13之伺服器裝置132在收到主鑰匙 (KEY)(IN01)後(即接受登錄請求B12)後,經一預置的第一演算法C01運算,產出一虛擬鑰匙(KEY)(IN02),並將其回傳至使用者端11的智慧型手機112的應用程式(APP)113,且同時,伺服器裝置132係會將收到的主鑰匙(KEY)(IN01)進行「儲存主鑰匙(KEY)(IN01)」S1的程序;(4)智慧型手機112的應用程式(APP)113收到虛擬鑰匙(KEY)(IN02)後,執行儲存B13。 Please refer to "Fig. 2", which is a method for implementing the identity recognition system of the present invention. As shown in the figure, when a user terminal 11 (or user) wants to use the identity recognition system 1 as Identification of transaction payment instruments At the time of initial use, it is necessary to first perform the procedure of initial login B. This is mainly to enable the user to use the smart phone 112 that he or she carries with him, and to first provide an identification mechanism for providing transaction payment (including payment, appropriation) services. The server device 132 of the terminal 13 completes the initial login (registration), so that the server device 132 can record the identity information of the user terminal 11, please refer to the figure, the process of initial login B is as follows: 1) The client 11 installs an application (APP) 113 with its smart phone 112; (2) executes an application (APP) 113 to send an initial login request to the server device 132 of the identification device 13 B11, the information included in the login request is referred to as a primary key (KEY) IN01, and the content included therein includes user identification information of the user terminal 11, such as the mobile phone of the smart phone 112, and the user terminal 11 ID card number, which must have a single non-repetitive feature, in order to improve the information security level, the application (APP) 113 can also be accompanied by a set of ID codes conforming to a single non-repetitive characteristic, and the above Alleged The user identification information is used together as the master key (KEY) (IN01). To confirm that the user and the mobile phone registrant are the same person, the server device 132 uses the short message to transmit an authentication code to the smart phone application (APP). 113, then the application (APP) 113 then passes the master key (KEY) (IN01) and the authentication code back to the server device 132 of the identification mechanism terminal 13; (3) the server device 132 of the identification mechanism terminal 13 receives To the main key After (KEY) (IN01) (that is, accepting the login request B12), a virtual key (KEY) (IN02) is generated by a preset first algorithm C01, and is transmitted back to the user terminal 11 The application (APP) 113 of the smart phone 112, and at the same time, the server device 132 performs the process of "storing the master key (KEY) (IN01)" S1 by the received master key (KEY) (IN01); (4) After the application (APP) 113 of the smartphone 112 receives the virtual key (KEY) (IN02), the storage B13 is executed.
小結以上所述,當使用者端11以智慧型手機112完成上述各步驟之操作後,即完成初始登錄B之作業,此時,於使用者端11的智慧型手機112之中,已儲存有未來交易時,可作身份識別之運算基礎的虛擬鑰匙(KEY)(IN02),而辨識機構端13之伺服器裝置132則儲存有智慧型手機之主鑰匙(KEY)(IN01)。 Summary In the above, when the user terminal 11 completes the above steps in the smart phone 112, the initial login B operation is completed. At this time, the smart phone 112 of the user terminal 11 has been stored. In the future transaction, the virtual key (KEY) (IN02), which is the basis of the identification operation, and the server device 132 of the identification mechanism 13 store the master key (KEY) (IN01) of the smart phone.
承上說明,請再接續參閱「第2圖」所示,如圖,當使用者端11欲開始應用本系統及方法進行身份辨識驗證R,使用者端11則可應用智慧型手機112執行應用程序(APP)113,使其啟動驗證請求R11,啟動後,其執行過程如下所述:(1)虛擬鑰匙(KEY)(IN02)經一第二演算法C02進行運算後,產生一驗證鑰匙(KEY)(IN03);(2)所述的驗證鑰匙(KEY)(IN03)係再經一第三演算 法C03運算後,產生一條碼形式的變動條碼(IN04),並顯示於智慧型手機112的畫面,其中所述的第三演算法C03之中,係至少包含有一個以時間改變為運算參數的演算程式,使變動條碼(IN04)可隨時間的變化而不斷的改變,承此,當變動條碼(IN04)產生後,時間倒時計時區114即開始產生倒數作動,並在預設的時間倒數結束時,重複再進行第三演算法C03,使驗證鑰匙(KEY)(IN03)重新經演算後,產生新的變動條碼(IN04);(3)產生一由用戶識別資訊轉換而成的身份識別條碼(IN05),並顯示於智慧型手機112的畫面;(4)一交易端12的條碼資料擷取裝置122,以主動式的方式,對智慧型手機112畫面上所顯示的身份識別條碼(IN05)、及變動條碼(IN04)進行條碼擷取R12,或可以被動方式於條碼資料擷取裝置122上輸入併附於條碼下方(或週邊)的數字資訊;承此,條碼資料擷取裝置122在取得身份識別條碼(IN05)、及變動條碼(IN04)後,即將其經由網際網路傳輸至一辨識機構端13之伺服器裝置132;(5)辨識機構13的伺服器裝置132在收到上述的身份識別條碼(IN05)及變動條碼(IN04)後,首先經對應身份識別條碼(IN05),尋回當初的儲存於伺服器裝置132的主鑰匙(KEY)(IN01),然後,由伺服器裝置132以所述的主鑰匙(KEY)(IN01)為基礎,以第一 演算法C01運算出虛擬鑰匙(KEY)(IN02’),接續再以虛擬鑰匙(KEY)(IN02’)為基礎,以第二演算法C02運算出驗證鑰匙(KEY)(IN03’);(6)承上,伺服器裝置132再以驗證鑰匙(KEY)(IN03’)為基礎,以第三演算法C03演算,得出一或多個定區間變動條碼(OUT01),由於此所述的定區間變動條碼(OUT01)之產生,係同樣利用第三演算法C03演算得出,是以,其運算過程中,亦同樣至少包含有一個以時間改變為運算參數的演算程式;再者,依使用者端11之智慧型手機112的身份識別條碼(IN05)、及變動條碼(IN04)被擷取後的時間起算,至伺服器裝置132將定區間變動條碼(OUT01)演算而出的時間之間,係會有產生時間差(雖然時間差極短),而為了避免時間差造成後續驗證比對的問題,所以有關所述之以時間改變為運算參數的演算程式,可以時間差為連續性進行運算,進而得出一個時間區間,例如,自身份識別條碼(IN05)、及變動條碼(IN04)被擷取後的時間起算,至伺服器裝置132將定區間變動條碼(OUT01)演算而出的時間之差值為三分鐘(實際上可能會更短或更長,不以此為限),則,有關以時間改變為運算參數的演算程式可以每一分鐘為一時間單位進行運算,且連續三分鐘,如此,則可得出一組定區間變動條碼(OUT01),如為三分鐘,則有前、中、後連續三分 鐘的三個定區間變動條碼;(7)伺服器裝置132進行身份辨識驗證R14,伺服器裝置132以定區間變動條碼(OUT01)為基礎,比對變動條碼(IN04);(8)伺服器裝置132將一辨識結果訊息R15回傳至交易端12的條碼資料擷取裝置122,承上,如身份辨識驗證R14的辨識結果訊息R15的結果為是(符合),交易即可進行,反之,則無法進行後續之交易動作。 For the description, please refer to the "Figure 2". As shown in the figure, when the user terminal 11 wants to start applying the system and method for identity verification R, the user terminal 11 can apply the smart phone 112 to execute the application. The program (APP) 113 causes the verification request R11 to be started. After the startup, the execution process is as follows: (1) The virtual key (KEY) (IN02) is operated by a second algorithm C02 to generate a verification key ( KEY) (IN03); (2) The verification key (KEY) (IN03) is followed by a third calculation After the C03 operation, a variable barcode (IN04) in the form of a code is generated and displayed on the screen of the smart phone 112, wherein the third algorithm C03 includes at least one time change to an operation parameter. The calculation program makes the change bar code (IN04) continuously change with time. According to this, when the change bar code (IN04) is generated, the time-reversed time zone 114 starts to generate the countdown action and ends at the preset time countdown. When the third algorithm C03 is repeated, the verification key (KEY) (IN03) is recalculated to generate a new change barcode (IN04); (3) an identification barcode converted from the user identification information is generated. (IN05) and displayed on the screen of the smart phone 112; (4) a bar code data capturing device 122 of the transaction terminal 12, in an active manner, the identification bar code displayed on the screen of the smart phone 112 (IN05) And the change bar code (IN04) performs barcode capture R12, or can passively input the digital information input on the barcode data capture device 122 and attached to the bottom (or periphery) of the barcode; thereby, the barcode data capture device 122 is Get identity After the barcode (IN05) and the change barcode (IN04), it is transmitted to the server device 132 of the identification mechanism terminal 13 via the Internet; (5) the server device 132 of the identification mechanism 13 receives the identity described above. After identifying the barcode (IN05) and the change barcode (IN04), the primary key (KEY) (IN01) stored in the server device 132 is first retrieved via the corresponding identification barcode (IN05), and then, by the server device 132. Based on the above-mentioned master key (KEY) (IN01), first The algorithm C01 calculates the virtual key (KEY) (IN02'), and then uses the virtual key (KEY) (IN02') to calculate the verification key (KEY) (IN03') with the second algorithm C02; (6) In the above, the server device 132 calculates the one or more fixed interval variation barcodes (OUT01) based on the verification key (KEY) (IN03') and the third algorithm C03. The generation of the interval variation bar code (OUT01) is also calculated by the third algorithm C03. Therefore, in the operation process, at least one calculation program with time change as the operation parameter is also included; The time after the identification bar code (IN05) and the change bar code (IN04) of the smart phone 112 of the client 11 are retrieved, until the time when the server device 132 calculates the fixed interval change bar code (OUT01) , there will be a time difference (although the time difference is extremely short), and in order to avoid the time difference caused by the subsequent verification comparison, the calculation program that changes the time to the operation parameter can calculate the time difference as continuity, and then Out of a time interval, for example, The time after the identification bar code (IN05) and the change bar code (IN04) are retrieved, the difference between the time when the server device 132 calculates the fixed interval change bar code (OUT01) is three minutes (actually it may be Shorter or longer, not limited to this, the calculation program that uses time to change the operation parameters can be operated for one time unit per minute, and for three consecutive minutes, so that a set of Interval change bar code (OUT01), if it is three minutes, there are three points in front, middle and back. The three fixed interval change bar codes of the clock; (7) the server device 132 performs the identity verification R14, and the server device 132 compares the bar code (OUT01) based on the fixed interval, and compares the bar code (IN04); (8) the server The device 132 sends a recognition result message R15 back to the barcode data extraction device 122 of the transaction terminal 12, and if the result of the identification result message R15 of the identity verification verification R14 is yes (conformity), the transaction can be performed, otherwise, Subsequent trading actions cannot be performed.
小結以上述可知,使用者端初始在利用其智慧型手機與辨識機構端的伺服器裝置完成例如登錄(註冊)後,伺服器裝置僅留存智慧型手機在初始登錄時的主鑰匙(KEY)資料,且此主鑰匙(KEY)資料是經過加密,已具有高度的安全性;又,於使用者端的智慧型手機,在身份辨識的應用程式未執行(即尚未啟動驗證請求的情況下),則僅保存有虛擬鑰匙(KEY),且此所述的虛擬鑰匙(KEY)亦經過演算法加密,同樣具有高度的安全性;是以,即便是伺服器裝置真的受入侵、或智慧型手機的資料被竊取,單獨伺服器所儲存的主鑰匙(KEY)資料或使用者端的虛擬鑰匙(KEY)資料之間,並無法有相關聯性產生;依此,僅有在正常的使用情況下,使用者以原初始登錄的智慧型手機,在執行身份辨識之應用程式後(啟動驗證請求),方可讓原本儲存的虛擬鑰匙(KEY)經演算後產生驗證鑰匙(KEY),且此驗證鑰匙(KEY)會再經運算後,以一次性資料的型態產生條碼(變動 條碼),並經交易端的條碼資料擷取裝置擷取後,傳送至伺服器裝置進行身份辨識的驗證;再者,伺服器裝置亦僅能在取得使用者端的驗證鑰匙(KEY)的情況下,才有辦法尋回當初使用者端初始登錄的主鑰匙(KEY),且亦必需在尋回此主鑰匙(KEY),才有可能繼續經演算後,得出可據以驗證的定區間變動條碼,並加以進行驗證;是以,根據本發明的系統組成及方法實施後,至少包含以下數項優點: Summary As can be seen from the above, after the user terminal initially completes, for example, login (registration) using the server device of the smart phone and the identification mechanism, the server device only retains the key (KEY) data of the smart phone at the initial login. And the key (KEY) data is encrypted and has a high degree of security; and, in the smart phone of the user end, if the identity recognition application is not executed (ie, the verification request has not been started), then only The virtual key (KEY) is saved, and the virtual key (KEY) described above is also encrypted by the algorithm, which is also highly secure; even if the server device is really invaded, or the data of the smart phone Stolen, there is no correlation between the key (KEY) data stored by a separate server or the virtual key (KEY) data of the user; accordingly, only under normal use, the user After the original initial login smart phone, after executing the identity recognition application (initiating the verification request), the original stored virtual key (KEY) can be calculated to generate a verification key (KEY). And the verification key (KEY) will be processed and the barcode will be generated in the form of one-time data. The barcode is transmitted to the server device for identification after being retrieved by the barcode data acquisition device on the transaction side; further, the server device can only obtain the verification key (KEY) of the user terminal. Only when there is a way to find the primary key (KEY) of the initial login of the user end, and it is necessary to find the key (KEY), it is possible to continue the calculation and obtain a fixed interval change barcode that can be verified. And verifying; that is, after the system composition and method according to the present invention is implemented, at least the following advantages are included:
(1)安全性高,即便是伺服器裝置被駭客入侵,資料遭竊取,駭客亦僅是取得單獨之主鑰匙(KEY)資料,實際上其並無任何意義,因為主鑰匙(KEY)資料後續演算的進行,必須有使用者端的驗證鑰匙(KEY)當基礎。 (1) The security is high. Even if the server device is invaded by the hacker and the data is stolen, the hacker only obtains the separate key (KEY) data. In fact, it does not make any sense because the master key (KEY) The follow-up calculation of the data must be based on the user's verification key (KEY).
(2)以使用者端之智慧型手機送出的變動條碼與伺服器裝置所產生的定區間變動條碼作為身份辨識驗證的依據,其有效時間極短,兩者均會依時間而不斷的改變,安全性,可有效防止例如資料被側錄、盜用的問題。 (2) The change bar code sent by the smart phone of the user end and the fixed range change bar code generated by the server device are used as the basis for identity verification, and the effective time is extremely short, and both will change continuously according to time. Security can effectively prevent problems such as data being recorded and stolen.
(3)使用者端在請求進行身份辨識時,僅需開啟應用程式(APP),無需任何網路環境或通訊即可達成,亦無須與伺服器裝置形成資訊連結。 (3) When requesting identity identification, the user only needs to open the application (APP), which can be achieved without any network environment or communication, and does not need to form an information link with the server device.
據上所述可知,本發明其據以實施後,確實可以達到提供一種安全性高、且操作方便的身份辨識系統及其實施方法之目的。 It can be seen from the above that after the implementation of the present invention, it is indeed possible to provide an identity recognition system with high security and convenient operation and an implementation method thereof.
唯,以上所述者,僅為本發明之較佳之實施例而已,並非用以限定本發明實施之範圍;任何熟習此技藝者,在不脫離本發明之精神與範圍下所作之均等變化與修飾,皆應涵蓋於本發明之專利範圍內。 The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention; any changes and modifications made by those skilled in the art without departing from the spirit and scope of the invention All should be covered by the patent of the present invention.
綜上所述,本發明之功效,係具有發明之「產業可利用性」、「新穎性」與「進步性」等專利要件;申請人爰依專利法之規定,向 鈞局提起發明專利之申請。 In summary, the effects of the present invention are patents such as "industry availability," "novelty," and "progressiveness" of the invention; the applicant filed an invention patent with the bureau in accordance with the provisions of the Patent Law. Application.
1‧‧‧身份辨識系統 1‧‧‧identification system
11‧‧‧使用者端 11‧‧‧User side
12‧‧‧交易端 12‧‧‧Transaction side
112‧‧‧智慧型手機 112‧‧‧Smart mobile phone
122‧‧‧條碼資料擷取裝置 122‧‧‧Barcode data acquisition device
114‧‧‧時間倒數計時區 114‧‧‧Time Countdown Area
13‧‧‧辨識機構端 13‧‧‧ Identification mechanism end
132‧‧‧伺服器裝置 132‧‧‧Server device
2‧‧‧網際網路 2‧‧‧Internet
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103138765A TWI569162B (en) | 2014-11-07 | 2014-11-07 | Identity identification system and its implementing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW103138765A TWI569162B (en) | 2014-11-07 | 2014-11-07 | Identity identification system and its implementing method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201617949A TW201617949A (en) | 2016-05-16 |
TWI569162B true TWI569162B (en) | 2017-02-01 |
Family
ID=56508994
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW103138765A TWI569162B (en) | 2014-11-07 | 2014-11-07 | Identity identification system and its implementing method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI569162B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI670618B (en) * | 2017-05-26 | 2019-09-01 | 台新國際商業銀行股份有限公司 | Login system implemented along with a mobile device without password and method thereof |
US10645450B2 (en) | 2018-04-09 | 2020-05-05 | Wistron Corporation | System and method for proof of play |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783039A (en) * | 2009-12-29 | 2010-07-21 | 广州广电运通金融电子股份有限公司 | Method and terminal for controlling security of financial transactions |
US20130090059A1 (en) * | 2011-10-10 | 2013-04-11 | Intercede Limited | Identity verification |
TW201349825A (en) * | 2012-05-17 | 2013-12-01 | Gamania Digital Entertainment Co Ltd | Identity verification method and system using QR code |
TW201349143A (en) * | 2012-02-21 | 2013-12-01 | Global Blue Holdings Ab | Transaction processing system and method |
-
2014
- 2014-11-07 TW TW103138765A patent/TWI569162B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783039A (en) * | 2009-12-29 | 2010-07-21 | 广州广电运通金融电子股份有限公司 | Method and terminal for controlling security of financial transactions |
US20130090059A1 (en) * | 2011-10-10 | 2013-04-11 | Intercede Limited | Identity verification |
TW201349143A (en) * | 2012-02-21 | 2013-12-01 | Global Blue Holdings Ab | Transaction processing system and method |
TW201349825A (en) * | 2012-05-17 | 2013-12-01 | Gamania Digital Entertainment Co Ltd | Identity verification method and system using QR code |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI670618B (en) * | 2017-05-26 | 2019-09-01 | 台新國際商業銀行股份有限公司 | Login system implemented along with a mobile device without password and method thereof |
US10645450B2 (en) | 2018-04-09 | 2020-05-05 | Wistron Corporation | System and method for proof of play |
Also Published As
Publication number | Publication date |
---|---|
TW201617949A (en) | 2016-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10902423B2 (en) | Method and apparatus for streamlined digital wallet transactions | |
KR101236957B1 (en) | System for paying credit card using mobile otp security of mobile phone and method therefor | |
US20160005038A1 (en) | Enhanced user authentication platform | |
US20170076277A1 (en) | Virtual payment cards issued by banks for mobile and wearable devices | |
US20130282588A1 (en) | Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System | |
JP6498192B2 (en) | How to secure the online transaction verification step | |
US10902409B2 (en) | Method and system for card payment approval using mobile terminal of mobile card holder | |
GB2478712A (en) | Authorisation system | |
US20180032996A1 (en) | Data sharing with card issuer via wallet app in payment-enabled mobile device | |
KR102597502B1 (en) | Systems and methods with reduced device processing time | |
US20160092876A1 (en) | On-device shared cardholder verification | |
US20180330367A1 (en) | Mobile payment system and process | |
US20230222482A1 (en) | Device account activation | |
CN112753042A (en) | System, method and computer program product for providing an identity storage browser | |
TWI569162B (en) | Identity identification system and its implementing method | |
US11823200B2 (en) | Smart physical payment cards | |
US10417636B2 (en) | Payment vehicle with encrypted image | |
US9542679B2 (en) | Implementation method for an identification system using dynamic barcode | |
TWI579724B (en) | A method for identity identification system using changed barcodes | |
JP3198589U (en) | A system that uses a variable barcode for identification | |
KR101190745B1 (en) | System for paying credit card using internet otp security of mobile phone and method therefor | |
TWM508713U (en) | Identification system | |
JP2020504376A (en) | Secure payment method and system | |
US20240232858A1 (en) | Authentication using non-fungible token as proof of account ownership | |
TWM508058U (en) | System using variable barcode for identity recognition |