WO2004059904A1 - System and method for securely access about the mesh network data - Google Patents

System and method for securely access about the mesh network data Download PDF

Info

Publication number
WO2004059904A1
WO2004059904A1 PCT/CN2003/001165 CN0301165W WO2004059904A1 WO 2004059904 A1 WO2004059904 A1 WO 2004059904A1 CN 0301165 W CN0301165 W CN 0301165W WO 2004059904 A1 WO2004059904 A1 WO 2004059904A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
data
network
explicit
accounts
Prior art date
Application number
PCT/CN2003/001165
Other languages
French (fr)
Chinese (zh)
Inventor
Jianqing Wei
Kesi Wei
Original Assignee
Jianqing Wei
Kesi Wei
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jianqing Wei, Kesi Wei filed Critical Jianqing Wei
Priority to AU2003292878A priority Critical patent/AU2003292878A1/en
Publication of WO2004059904A1 publication Critical patent/WO2004059904A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Definitions

  • the invention relates to a data processing method for secure access of computer network data.
  • This kind of system called “mesh screen” (MESH SYSTEM), establishes a secure structure for reliable access to network data, so that anyone can enjoy the global safe electronics in the place covered by the communication network. data service.
  • This screen system specifically involves a series of extremely important data processing methods in the field of network security.
  • the technical problem to be solved by the present invention is to overcome the shortcomings of the prior art and provide a truly secure network data access system and method.
  • the invention is invented according to the "sieve theory" proposed by the inventors.
  • the theory of sieve eyes believes that: the known network account system is equivalent to a sieve for sieving sand, the account is equivalent to a sieve in a certain position, the data is equivalent to the sand in the sieve, and the password is equivalent to the one blocked on the sieve Put the lock. If someone wants to leak the sand out of a sieve, they must get a matching key to snore the sieve. The sand can be leaked in the sieve at any time and moved to another sieve above the sieve to make the sieve empty. Others can't take a grain of sand even if they have the key. The other screen is not external and can only be controlled by myself.
  • the technical solution of the present invention includes two parts: a system and a method.
  • the system aspect includes account network database system, communication network system, and communication terminal, forming a network data screening system.
  • the system structure characteristic of the present invention is reflected in the database structure. Mainly manifested in: one pair two empty three.
  • One pair is a double account, two empty is an empty account, and three internals are internal accounts and internal correspondence.
  • a customer has two or more associated accounts, one of which is a one-to-one correspondence between a public explicit account and another hidden implicit account.
  • the corresponding relationship between the explicit account and the implicit account is stored in the database system, only the customer and the computer system know it, and it is not transmitted in the external network.
  • Explicit accounts are usually empty accounts, and implicit accounts are data accounts that store data. Explicit and implicit accounts contact visitors through two channels.
  • the data processing method includes the following steps: 1.
  • the visitor uses the account and password of the explicit account to send a data request to the explicit account through the communication terminal, and generates a conditional and timed request record in the waiting queue of the explicit account.
  • Step 1 and Step 2 are no particular order.
  • the explicit account After receiving the data from both parties, the explicit account performs pairing and comparison, and the two match, and executes the output request; the two conditions do not match, wait, and if it exceeds the immediate time limit, it is automatically canceled, and the two accounts are restored.
  • the open explicit account and the hidden implicit account respectively contact the customer through two unrelated channels;
  • the hidden account is set to receive only the instruction of the communication terminal set by the owner or the instruction of any terminal.
  • the invention is not an alternative security solution, but a superimposed security solution. All existing information security technology solutions, including firewalls, encryption, authentication, anti-virus, and digital signatures are intact, which is equivalent to a walnut wrapped with a thick layer of security shell. The shell is still the shell. The key is that the walnut Ren took it away and drew it in his palm.
  • the invention Makes the data intact. Because the account is empty, nothing can be stolen.
  • Figure 1 is a schematic diagram of the existing network data access technology
  • FIG. 2 is a schematic diagram of the screen-type network data secure access technology
  • the main steps are:
  • the database adds a data table corresponding to the shading account.
  • This account is an open account on the Internet.
  • the password is blank, and a blank password is defined as a deadlock. Only when it needs to be opened, the second channel terminal is used to pass the password. Only then can the user account be opened with the passed password. High degree of safety required The content can be empty, and the content is transmitted through the hidden account.
  • a secure bank account payment system based on the "sieve" theory. Customers must open a pair of screen accounts when registering: a traditional basic account (such as current passbook, a pass, etc.), a hidden account; a bank card payment account (such as various Credit cards, payment cards, debit cards, debit cards, etc.) are open and explicit accounts. You can also register an account that is already in use as a pair of corresponding accounts, or open a corresponding new empty account for the current bank card. At the same time, a correspondence between the two accounts is known only to the customer and the computer system. All collections and payments are performed through a single payment account. The payment account is empty when there is no receipt or payment.
  • a customer uses a bank card to use a communication terminal and requests the payment account for payment through the first channel (including computer, P0S, ATM, mobile phone, text message, fixed phone, PDA, E-mail, etc.)
  • the payer requests the basic account payment through the second pass «(including computer, P0S, ATM, mobile phone, text message, fixed phone, PDA, E-mai l, etc.).
  • the basic account pays the payment to the payment account according to the corresponding relationship built into the account system.
  • the payment account generates a waiting queue with a fixed amount of timing in the opposite direction.
  • the first channel is not related to the sequence of the second channel.
  • the customer uses the payment card to withdraw money at the ATM.
  • the current method step is inserting the card, the second is the secret, and the third is the withdrawal. If the card or secret is stolen, the iron surface of the iron surface machine is selfless, and only recognizes the card secret and does not recognize the person, and the payment is correct. If the present invention is used, because the account is empty, no withdrawal can be made under any circumstances except my instructions.
  • the specific operation is: Send a short message to the basic account with your mobile phone: xxx # xxxxxxxxffixxxffia.
  • the account number is: xxx, (the user name and account number conversion system can be used, and your own communication number can be used as the account number for easy operation).
  • Password XXXXXXXX; After receiving the text message from the hidden account, the funds will be transferred to the payment account immediately. At this time, if the amount is equal, and the waiting time is reached, the withdrawal can be successful. If it expires, the payment will be returned immediately. At the same time, a short message about the success of the transaction is returned.
  • overdraft credit cards only the corresponding basic account is empty. Under its basic account, you can link various financial assets of yourself and your family to increase the creditworthiness of your credit card. Credit card users can also be generated from non-overdraft card users who have used a certain amount of time and a certain accumulated amount. At the same time, the payment card transaction records can be permanently stored as personal credit information for the customer's life.
  • the amount in the account as the payment condition and the payment amount may not be equal. As long as it is moderately larger than the payment amount, it can also be accepted.
  • This system is especially convenient for telephone booking services, and quite issued an electronic check.
  • the telephone booking service including hotels, air tickets, bus tickets, boat tickets, movie tickets and other tickets
  • the process is:
  • the bank's network receipt receipt system is actually a mail server, which is the billing system for financial transactions between banks and customers. Its features are: Equipped with sieve lock; one household with two boxes, one empty and one real, following account for life; various communication terminals with personal (including computer, P0S, ATM, mobile phone, short message, fixed phone, PDA, fax, etc.) There is a fixed connection; the content can be classified; generally it can be divided into financial things, citizen things, personal things, business transactions, advertising, etc.
  • the bank network receipt box system includes a bank bill reconciliation system.
  • the receipt box will automatically notify the unit through the set communication system.
  • the unit goes to the receipt box to retrieve the bill, either automatically or manually.
  • Real-time automatic accounting can be basically realized, saving customers' time and costs.
  • the bank's online receipt receipt system includes an effective advertising scoring system.
  • Mailboxes on the Internet want to avoid advertising is not easy.
  • an advertising scoring system it detects the time when an advertising message is opened on the current page, rewards points, and encourages customers to watch advertisements.
  • the points can be used to offset the network expenses, which is a three-pronged thing.
  • Embodiment 6 Sieve-type Bank Network Safe Deposit Box System
  • the bank has a natural advantage in establishing a network electronic safe deposit box.
  • the storage box is divided into two boxes, light and dark.
  • the clear box is empty, the dark box is real, the clear box is outside, the dark box is inside, and the two boxes correspond, but I know it.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method based on the mesh theory for securely accessing the mesh network data. The mesh theory is: ‘empty’ can not be stolen. Consequently, the invention may get 100% security in the theory. The invention adopts the mechanism of one ‘double’, two ‘empty’ and three ‘inner’ in the data structure; and sets up double accounts in which one is surface and the other is hidden. The account’s relation is in the system, the surface account is empty and the hidden account is true. The data request is transmitted to the empty account through the first channel and the true account is indicated to transmit the data through the second channel. The data is automatically transmitted from the empty account to the true account in the system. According to the condition, the empty account automatically allow the performing request. Even if the two account are both stolen, the data will not be stolen. This invention can be used in securely browsing of the sensitively important data of the network, in the payment system and in the receipt or keeping system of the bank and in the electronic authorization lock of the important location. It can be carry out without change the software and the hardware system. The invention has high security, simply structure, lower cost, easily performing and easily be understood by the people.

Description

筛眼式网络数据安全存取系统与方法  Sieve-type network data security access system and method
所属技术领域 Technical field
本发明涉及一种计算机网络数据安全存取的数据处理方法。 这种被称之为 "筛眼" 的系统 (MESH SYSTEM), 建立了一种网络数据可靠存取的安全构架, 使任何人都能 在通讯网络覆盖的地方,享受到全球化的安全的电子数据服务。此筛眼系统具体涉及到 一系列极其重要的网络安全领域的数据处理方法。  The invention relates to a data processing method for secure access of computer network data. This kind of system called "mesh screen" (MESH SYSTEM), establishes a secure structure for reliable access to network data, so that anyone can enjoy the global safe electronics in the place covered by the communication network. data service. This screen system specifically involves a series of extremely important data processing methods in the field of network security.
技术背景 technical background
在网络世界中,客户是靠帐户和密码安全管理着自己的个人世界。在虚拟的电子网 络安全领域, 目前仍沿用了 a实世界中实物安全存取方法,就是给存放实物房间的门加 把锁。 安全的关键就是这把锁。 锁在物在, 锁开物失。  In the online world, customers rely on their accounts and passwords to securely manage their personal world. In the field of virtual electronic network security, the physical secure access method in the real world is still used, which is to lock the door of the physical room. The key to security is this lock. Locked in, lost in lock.
不管门上配几把锁、几片钥匙, 也不管给这几片钥匙如何加密, 以及不管将钥匙以 如何诡秘的方式传送给合法开门人, 只要非法开门人盗得钥匙, 解了密, 开了门, 物品 自然被盗走。端对端 SSL协议也好, 三方 SET协议也好, 都离不开帐户、密码、 公钥、 私钥之类的东西。 即便是使用目前效果最好的 IPsec (由于美国安全法规的限制, 它只 能在北美地区使用),在美国,近两年平均每年大约有 70万美国人的信用卡被盗用, 造 成的损失在 10亿美元以上。 中国的银行到底损失多少, 考虑到自己的信用, 都不敢公 布张扬, 只能冷暖自知。  No matter how many locks and keys are on the door, no matter how the keys are encrypted, and no matter how secretive the keys are transmitted to the legal opener, as long as the illegal opener steals the key, unlocks the key, unlocks After the door, the items were stolen naturally. Either the end-to-end SSL protocol or the three-party SET protocol is inseparable from things like accounts, passwords, public keys, and private keys. Even if the most effective IPsec is currently used (because of US security regulations, it can only be used in North America), in the United States, about 700,000 Americans ’credit cards have been stolen on average every year in the past two years, causing losses of 10 More than 100 million US dollars. Considering how much Chinese banks have lost, considering their own credit, they dare not publish publicity.
众所周知, 加密和解密始终处于一种此消彼长、循环往复的过程中。现有安全理论 认为, 从根本上说, 没有破不了的密, 没有解不了的锁, 自然也就没有失不了的盗。 因 为它终归把帐户的安全命脉系于帐户号和帐户密码之上。 网络只认帐、密不认人, 客户 稍有不慎, 一失具失。其不足之处是它只能管网上的, 却管不了网下的, 把着眼点放在 丁锁上, 而非放在物上, 放在了手段上, 而非放在目的上。  As we all know, encryption and decryption are always in a process of cyclical changes. Existing security theory holds that, fundamentally, there is no secret that cannot be broken, no lock that cannot be unlocked, and naturally no burglary that cannot be lost. Because it ultimately tied the account's security lifeline to the account number and account password. The network only recognizes accounts and does not recognize people, customers are slightly inadvertent, and they are completely lost. The disadvantage is that it can only control the Internet, but it cannot control the Internet. It focuses on Ding Suo, not on things, on means, not on purpose.
发明内容 Summary of the Invention
本发明所要解决的技术问题是克服现有技术存在的缺点,提供了一种真正安全的网 络数据存取系统和方法。  The technical problem to be solved by the present invention is to overcome the shortcomings of the prior art and provide a truly secure network data access system and method.
确 认 本 本发明和现有技术的一个根本区别是:从理论上说,现有技术认为所有的网络安全 手段从根本上说都是不安全的,都是可以破解的; 而本发明从理论上说, 在网络上的目 的物是可以不被盗走的, 是可以保证绝对安全的。 原因就一个字: 空。 Confirm this A fundamental difference between the present invention and the prior art is: theoretically, the prior art believes that all network security means are fundamentally insecure and can be cracked; while the present invention theoretically, The objects on the network can not be stolen and can be absolutely secure. The reason is just one word: empty.
本来无一物, 何处惹尘埃。 网络世界的一个根本特点是虚拟, 来无踪, 去无影, 因 而可以空。  There was nothing, and where did it cause dust. One of the fundamental characteristics of the network world is virtuality, which has no trace and no shadow, so it can be empty.
本发明是根据发明人提出的 "筛眼理论"而发明的。筛眼理论认为: 公知的网络帐 户系统相当于筛沙子的筛网,帐户相当于处在某一位置的筛眼,数据相当于在筛眼里的 沙子, 密码相当于堵在筛眼上的一把锁。他人如果想把某个筛眼里的沙子漏走, 就必须 得到匹配的钥匙,把筛眼打幵。在筛眼里随时都可漏走沙子全部移到本筛网之上的另一 筛网上去, 使本筛网清空, 他人即使有钥匙也拿不走一粒沙子。而另一筛网不对外, 只 有本人可以支配。相当于将沙子握在了自己的手中, 只有本人松了手, 沙子才会顺着固 定的通道流到下面固定的筛眼里。而上筛眼的锁打开后, 沙子具体流到哪个下筛眼, 也 只有本人知道。 这个过程对其他人来说是个黑箱。 如果本人忘了上下筛眼的对应关系, 则此眼作废, 那就只能另开一个眼了。  The invention is invented according to the "sieve theory" proposed by the inventors. The theory of sieve eyes believes that: the known network account system is equivalent to a sieve for sieving sand, the account is equivalent to a sieve in a certain position, the data is equivalent to the sand in the sieve, and the password is equivalent to the one blocked on the sieve Put the lock. If someone wants to leak the sand out of a sieve, they must get a matching key to snore the sieve. The sand can be leaked in the sieve at any time and moved to another sieve above the sieve to make the sieve empty. Others can't take a grain of sand even if they have the key. The other screen is not external and can only be controlled by myself. It is equivalent to holding the sand in one's own hand. Only when I release my hand, the sand will flow along the fixed channel to the fixed sieve below. After the lock of the upper sieve is opened, only the lower sieve to which the sand flows is only known to me. This process is a black box for others. If I have forgotten the corresponding relationship between the upper and lower sieve, then this eye becomes invalid, and then only another eye can be opened.
本发明的技术方案包括系统和方法两部分。  The technical solution of the present invention includes two parts: a system and a method.
系统方面包括帐户网络数据库系统、通讯网络系统、通讯终端, 构成一个网络数据 筛眼系统。  The system aspect includes account network database system, communication network system, and communication terminal, forming a network data screening system.
本发明的系统结构特征体现在数据库结构上。 主要表现在: 一双二空三内。  The system structure characteristic of the present invention is reflected in the database structure. Mainly manifested in: one pair two empty three.
一双就是双帐户, 二空就是空帐户, 三内就是内部帐户和内部对应关系。  One pair is a double account, two empty is an empty account, and three internals are internal accounts and internal correspondence.
在帐户网络数据库中,一个客户开有两个或两个以上属于自己的关联帐户,其中一 个公开的显性帐户和另一个隐蔽的隐性帐户存在着一对一的对应关系。显性帐户与隐性 帐户的对应关系保存在数据库系统内部,只有客户本人和计算机系统知道,且不在外部 网络中传送。显性帐户平时为空帐户, 隐性帐户为存储数据的数据帐户。显性帐户和隐 性帐户分别通过两个通道与访问者联系。  In the account network database, a customer has two or more associated accounts, one of which is a one-to-one correspondence between a public explicit account and another hidden implicit account. The corresponding relationship between the explicit account and the implicit account is stored in the database system, only the customer and the computer system know it, and it is not transmitted in the external network. Explicit accounts are usually empty accounts, and implicit accounts are data accounts that store data. Explicit and implicit accounts contact visitors through two channels.
数据的处理方法包括下列步骤: 1、访问者用显性帐户的帐号和密码,通过通讯终端向显性帐户发送一个数据请求, 在显性帐户的等待队列里产生一个有条件的定时的请求记录。 The data processing method includes the following steps: 1. The visitor uses the account and password of the explicit account to send a data request to the explicit account through the communication terminal, and generates a conditional and timed request record in the waiting queue of the explicit account.
2、 同时, 帐户所有者用隐性帐户的帐号和密码, 通过通讯终端向隐性帐户也发送 一个数据请求, 来应答隐性帐户的数据请求。隐性帐户依照请求要求, 将请求数据通过 内部固定通道传送给属于帐户本人的另一对应的公幵的显性帐户,等待与请求匹配。步 骤 1和步骤 2顺序先后无妨。  2. At the same time, the account owner uses the account number and password of the hidden account to send a data request to the hidden account through the communication terminal to respond to the data request of the hidden account. The hidden account transmits the requested data through the internal fixed channel to the corresponding explicit account of the public fund that belongs to the account in accordance with the request, and waits to match the request. Step 1 and Step 2 are no particular order.
3、 显性帐户接收到双方的数据后, 进行配对比较, 两者相符, 执行输出请求; 两 者条件不相符, 等待, 若超过即定时限, 则自动取消, 两帐户恢复原状。  3. After receiving the data from both parties, the explicit account performs pairing and comparison, and the two match, and executes the output request; the two conditions do not match, wait, and if it exceeds the immediate time limit, it is automatically canceled, and the two accounts are restored.
其程序规则定义: ' Its rules of procedure define: '
1、 公开的显性帐户和隐蔽的隐性帐户分别通过两个互不关联的通道与客户联系;1. The open explicit account and the hidden implicit account respectively contact the customer through two unrelated channels;
2、 所有的数据进出必须通过公开的显性帐户进行; 2. All data in and out must be performed through open and explicit accounts;
3、 不公开的隐性帐户唯一的数据通道连接公开的显性帐户;  3. The only data channel of the unlisted hidden account is connected to the open explicit account;
4、隐性帐户设定为只接收所有者设定的通讯终端的指令或者接受任意终端的指令。 本发明不是一个替代安全方案,而是一个叠加安全方案。现有的一切信息安全技术 方案, 包括防火墙、 加密、认证、 防毒、 数字签名都原封不动, 相当于包了很厚一层安 全壳的核桃, 壳还是那壳, 关键是本发明把那核桃的仁拿走了, 攥在了自己的手心里。  4. The hidden account is set to receive only the instruction of the communication terminal set by the owner or the instruction of any terminal. The invention is not an alternative security solution, but a superimposed security solution. All existing information security technology solutions, including firewalls, encryption, authentication, anti-virus, and digital signatures are intact, which is equivalent to a walnut wrapped with a thick layer of security shell. The shell is still the shell. The key is that the walnut Ren took it away and drew it in his palm.
在用于公开交易的显性帐户密码盗失的情况下, 效果比较:  In the case of the theft of an explicit account password used for public trading, the effects are compared:
现有技术: 使帐户的数据盗失。  Prior art: Theft of data from accounts.
本发明: 使数据完好无损。 因为帐户是空的, 无物可盜。  The invention: Makes the data intact. Because the account is empty, nothing can be stolen.
退一步说,位于内部网络的隐性帐户的帐号和密码盜失了,数据只能流失另外一个 自己的帐户上,若此时另一帐户无人合法请求数据,数据又会自动返回自己的隐性帐户 上。而此时为了更高的安全性,可将隐性帐户的帐号,定义到自己的个人的通讯终端上, 如随身的手机、及其他随身通讯设备或家里的固定电话等,对其他终端的指令概不接受。  Take a step back and say that the account and password of the hidden account located on the internal network is stolen, and the data can only be lost on the other own account. If no one legally requests data from the other account, the data will automatically return to its own Sex account. At this time, for higher security, you can define the account number of the hidden account to your own personal communication terminal, such as a mobile phone, and other portable communication equipment or a fixed phone at home. Not accepted.
即使有物可盗,也要符合两个条件: 一是在很短的一定时间内; 二是进来的数据与 要求的数据相符。 再退一步,显性帐户和隐性帐户的帐号和密码都盗失了,除非自己开口告之偷盗者 的对应关系, 本人不开口, 任何人盗不走任何东西。 Even if something is stolen, two conditions must be met: one is within a short period of time; the other is that the incoming data is consistent with the required data. Take a step back, the account and password of the explicit account and the implicit account are stolen, unless you tell the corresponding relationship of the thief yourself, I do not speak, no one steals anything.
本发明的优点在于:  The advantages of the present invention are:
安全性高: 在理论上可达 100%的安全。  High security: theoretically 100% safe.
结构简单: 只增加个明暗的对应关系和帐户规则。  Simple structure: Only add a light-dark correspondence and account rules.
使用方便: 由于解决了安全性这个后顾之忧,在通讯网络覆盖范围内, 可随时随地 进行数据传输。  Easy to use: As the worry of security is solved, data can be transmitted anytime, anywhere within the coverage of the communication network.
成本低: 几乎不需要增加任何成本。  Low cost: There is almost no need to add any cost.
易实施:可以夸张的说,只要是对原系统十分熟悉的程序员,在半天即可实施完毕。 易理解: 任何人都可以萬解带着空钱包外出, 是不怕被偷的,把钱包放到银行的保 险柜里是安全的。  Easy to implement: It can be exaggerated to say that as long as it is a programmer who is very familiar with the original system, it can be implemented in half a day. Easy to understand: Anyone can go out with an empty wallet without fear of being stolen. It is safe to put the wallet in the bank's safe.
市场广: 由于易被大众理解, 客户愿意使用, 所以市场广。  Wide market: Because it is easy to be understood by the public and customers are willing to use it, the market is wide.
跗图说明 跗 Illustration
图 1是现有网络数据存取技术示意图  Figure 1 is a schematic diagram of the existing network data access technology
图 2是筛眼式网络数据安全存取技术示意图  Figure 2 is a schematic diagram of the screen-type network data secure access technology
具体实施方式  detailed description
实施的主要步骤为:  The main steps are:
1、 首先, 保持计算机网络原有软硬件系统不变。  1. First, keep the original software and hardware system of the computer network unchanged.
2、 在以上基础上, 数据库增加一个明暗帐户对应数据表。  2. On the basis of the above, the database adds a data table corresponding to the shading account.
3、 给现有帐户开一个对应隐性的空户。  3. Open a corresponding hidden account for an existing account.
4、 将现有帐户的数据转到隐性帐户上, 本户为公开在网的空户。  4. Transfer the data of the existing account to the hidden account. This account is an open account on the Internet.
5、 给明暗两帐户定义规则。  5. Define rules for light and dark accounts.
实施例 1 筛眼锁、 筛眼密码  Example 1 Sieve Lock and Sieve Code
对于重要的网络帐户, 密码为空, 空密码定义为死锁。只有在需要打开时, 才使用 第二通道终端, 将密码传过去。此时才可用传去的密码打开用户帐号。安全程度要求高 的 ΐ舌, 内容也可为空, 通过隐性帐户将内容传送过来。 For important network accounts, the password is blank, and a blank password is defined as a deadlock. Only when it needs to be opened, the second channel terminal is used to pass the password. Only then can the user account be opened with the passed password. High degree of safety required The content can be empty, and the content is transmitted through the hidden account.
实施例 2 筛眼网页  Example 2 sieve webpage
对于重要切极其敏感的网页, 使用筛眼锁, 网页置空。 由于访问敏感的网页的人通 常都非常少,所以给每个访问者单独设个浏览室,将需阅读的网页由隐性帐户一页一页 传过来。 退出即全部销毁, 并关闭浏览室。  For important and extremely sensitive web pages, use the sieve lock and leave the web page blank. Because there are usually very few people who visit sensitive webpages, a separate browsing room is set up for each visitor, and the webpages to be read are transmitted from the hidden account page by page. All will be destroyed upon exit, and the browsing room will be closed.
实施例 3 网上签字、 网上授权  Example 3 Online signature and online authorization
由于网上政务、 网上商务、网上办公的广泛实行, 很多业务流程需要相当一级的负 责人签字才可通行。  Due to the widespread implementation of online government affairs, online commerce, and online office, many business processes require the signature of a person in charge at a level to pass.
例如: 网上报销费用, 手续都办好了, 只需负责人签字了, 而其又在外地, 此时, 负责人只需用手机给系统的隐性帐户发个短信,字就签了。资金就从单位帐户上转到了 个人帐户上。  For example: The online reimbursement expenses and procedures have been completed, as long as the person in charge signs it, and it is in a foreign country. At this time, the person in charge only needs to send a text message to the hidden account of the system with the mobile phone, and the word is signed. Funds are transferred from the organizational account to the personal account.
实施例 4 筛眼式银行支付系统  Example 4 sieve bank payment system
一种基于 "筛眼 "理论的安全银行帐户支付系统。客户在注册时必须开立一对筛眼 帐户: 一个传统基本帐户 (如活期存折、 一本通等), 为隐蔽的隐性帐户; 一个用于各 种网络交易银行卡支付帐户 (如各种信用卡、 支付卡、 贷记卡、 借记卡等), 为公开的 显性帐户。也可将已正在使用的帐户注册成一对对应帐户,或为现用银行卡开一个对应 新空户。 同时, 在这两个帐户之间建立一种只有客户本人和电脑系统知道的对应关系。 所有的收付业务都通过唯一的支付帐户进行。支付帐户在平时不发生收付时为空。当客 户用银行卡使用通讯终端, 通过第一通道(包括电脑、 P0S、 ATM, 手机、 短信、 固话、 PDA, E- mail等), 请求支付帐户进行支付时, 支付帐户内产生一个定时定额的等待队 列, 此时付款人通过第二通 « (包括电脑、 P0S、 ATM, 手机、短信、 固话、 PDA、 E-mai l 等)请求基本帐户付款。基本帐户根据帐户系统内置的对应关系,将款付到支付帐户上。 支付帐户产生一个反方向的定时定额的等待队列,在设定的等待时间内两队列金额相匹 配, 支付帐户执行付款; 不匹配, 定时退帐给基本帐户。第一通道与第二通道先后顺序 无关。 例如: 客户凭支付卡在 ATM上取款, 现在的方法步骤一是插卡, 二是输密, 三是提 款。如若卡、密盗失, 铁面机器铁面无私, 只认卡密不认人, 照付不误。若使用本发明, 因为帐户是空的, 除了本人指令, 任何情况下都无法取到款。具体操作是: 用手机给基 本帐户发个短信息: xxx#xxxxxxxxffixxxffia。其中帐号: xxx, (可使用户名帐号转换系 统, 还可将自己的通讯号码作为帐号, 以方便操作)密码: XXXXXXXX; 金额: XXXX; 等 恃时间: XX秒。 隐蔽帐号接收到短信后, 即刻将资金转入支付帐号, 此时刷卡, 若金 额相等, 且在等待时间之内, 既可取款成功。若超时, 立即将款退回。 同时返回交易成 功与否的短信息。 A secure bank account payment system based on the "sieve" theory. Customers must open a pair of screen accounts when registering: a traditional basic account (such as current passbook, a pass, etc.), a hidden account; a bank card payment account (such as various Credit cards, payment cards, debit cards, debit cards, etc.) are open and explicit accounts. You can also register an account that is already in use as a pair of corresponding accounts, or open a corresponding new empty account for the current bank card. At the same time, a correspondence between the two accounts is known only to the customer and the computer system. All collections and payments are performed through a single payment account. The payment account is empty when there is no receipt or payment. When a customer uses a bank card to use a communication terminal and requests the payment account for payment through the first channel (including computer, P0S, ATM, mobile phone, text message, fixed phone, PDA, E-mail, etc.), a fixed amount is generated in the payment account. Waiting queue at this time, the payer requests the basic account payment through the second pass «(including computer, P0S, ATM, mobile phone, text message, fixed phone, PDA, E-mai l, etc.). The basic account pays the payment to the payment account according to the corresponding relationship built into the account system. The payment account generates a waiting queue with a fixed amount of timing in the opposite direction. Within the set waiting time, the two queue amounts match, and the payment account executes the payment; if they do not match, the account is regularly refunded to the basic account. The first channel is not related to the sequence of the second channel. For example: The customer uses the payment card to withdraw money at the ATM. The current method step is inserting the card, the second is the secret, and the third is the withdrawal. If the card or secret is stolen, the iron surface of the iron surface machine is selfless, and only recognizes the card secret and does not recognize the person, and the payment is correct. If the present invention is used, because the account is empty, no withdrawal can be made under any circumstances except my instructions. The specific operation is: Send a short message to the basic account with your mobile phone: xxx # xxxxxxxxffixxxffia. Among them, the account number is: xxx, (the user name and account number conversion system can be used, and your own communication number can be used as the account number for easy operation). Password: XXXXXXXX; After receiving the text message from the hidden account, the funds will be transferred to the payment account immediately. At this time, if the amount is equal, and the waiting time is reached, the withdrawal can be successful. If it expires, the payment will be returned immediately. At the same time, a short message about the success of the transaction is returned.
对于可透支的信用卡,只是其对应的基本帐户亦为空而已。在其基本帐户下可挂接 自己和家人的各种金融资产, 以增加信用卡的信用度。信用卡用户还可从使用了一定时 间和一定累计额度的非透支卡用户中产生。同时支付卡交易记录可永久保存,作为跟随 客户终身的个人信用征信资料。  For overdraft credit cards, only the corresponding basic account is empty. Under its basic account, you can link various financial assets of yourself and your family to increase the creditworthiness of your credit card. Credit card users can also be generated from non-overdraft card users who have used a certain amount of time and a certain accumulated amount. At the same time, the payment card transaction records can be permanently stored as personal credit information for the customer's life.
P0S支付、 网上支付亦同理。  The same applies to P0S payment and online payment.
在与银行签约商家的固定 P0S机上刷卡,为了方便顾客,作为支付条件的帐内金额 与支付额也可以不相等, 只要适度大于支付额, 亦可受理, 剩余金额即时退回。  Swipe the card on the fixed P0S machine with the contracted merchant. For the convenience of the customer, the amount in the account as the payment condition and the payment amount may not be equal. As long as it is moderately larger than the payment amount, it can also be accepted.
由于安全性问题得到了根本解决, 无须 STK卡, 任何手机都可成为手机 P0S , 任何 小商户都可以"刷卡"(即手工输入卡号等信息),任何两个个人之间都可用手机对手机 实行实时转帐。 P0S得到了极大普及, 实现了随时随地的手机对手机的银行交易支付。 真正实现了 "随身的银行"。 有了无处不在的交易环境, 银行的发展空间不可限量。  As the security problem has been fundamentally resolved, no STK card is required, any mobile phone can become a mobile phone P0S, and any small merchant can "swipe" (ie manually enter the card number and other information), and any two individuals can use the mobile phone to implement the mobile phone. Real-time transfers. POS has gained tremendous popularity, enabling mobile-to-mobile bank transaction payments anytime, anywhere. Really realized "the bank on the go". With the ubiquitous trading environment, the development space of banks is unlimited.
此系统尤其可方便的应用于电话预定业务, 相当签发了一张电子支票。  This system is especially convenient for telephone booking services, and quite issued an electronic check.
例如电话定票业务 (包括宾馆、 机票、 车票、 船票、 电影票等各种门票), 其流程 是:  For example, the telephone booking service (including hotels, air tickets, bus tickets, boat tickets, movie tickets and other tickets), the process is:
1、 拨通购票电话, 告之本人支付帐号、支付密码(筛眼密码, 为一次性支付密码, 可随意指定)、 身份证号码。  1. Dial the ticket purchase phone, and inform me of the payment account number, payment password (screen password, one-time payment password, can be specified at will), ID number.
2、 发短信息: 帐号、 密码、 金额、 支付帐户密码给基本帐户。 3、 收到定票成功短消息。 到时直接就可凭身份证拿到定票。 甚至可以直接拿身份 证当票使用。 如若身份证带条形码或是 IC卡式身份证, 就更方便了。 2. Send SMS: account, password, amount, payment account password to basic account. 3. Receive the short message of booking success. At that time, you can get the reservation directly with your ID card. You can even use your ID card as a ticket. It is more convenient if the ID card has a barcode or IC card ID.
综上所述, 筛眼式银行支付系统的帐户安全由以下五点保证- In summary, the account security of the sieve-type bank payment system is guaranteed by the following five points −
1、 空。 1. Empty.
2、 变码。  2. Transcoding.
3、 本人授权。  3. I authorize it.
4、 时间。  4. Time.
5、 金额。  5. Amount.
操作也并不复杂, 只是增加个简洁、迅速、廉价的手机短信。这种增加的操作相对 于帐户中的资金安全来讲,是微不足道的。还可增加客户万事皆在掌握之中的稳操胜券 的感觉。  The operation is not complicated, just add a simple, fast and cheap mobile phone text message. This increased operation is trivial compared to the security of funds in the account. It also adds to the customer ’s sense of stability in everything he has.
实施例 5 筛眼式银行网络回单箱系统  Example 5 Sieve-type Bank Network Receipt Box System
银行网络回单箱系统,其实就是邮件服务器,就是银行与客户的金融往来帐单记帐 系统。 其特点是: 配有筛眼锁; 一户二箱, 一空一实, 终身跟随帐户; 与个人的各种通 讯终端 (包括电脑、 P0S、 ATM, 手机、 短信、 固话、 PDA、 传真等) 有固定的联系; 内 容可分类; 一般可分为金融事物、 公民事物、 个人事物、 商务往来、 广告等。  The bank's network receipt receipt system is actually a mail server, which is the billing system for financial transactions between banks and customers. Its features are: Equipped with sieve lock; one household with two boxes, one empty and one real, following account for life; various communication terminals with personal (including computer, P0S, ATM, mobile phone, short message, fixed phone, PDA, fax, etc.) There is a fixed connection; the content can be classified; generally it can be divided into financial things, citizen things, personal things, business transactions, advertising, etc.
银行网络回单箱系统含有银行帐单记帐对帐系统。  The bank network receipt box system includes a bank bill reconciliation system.
例:某单位银行帐户记了几笔帐,这几笔帐的记帐单即刻送到了该单位的银行网络 回单箱, 回单箱会自动通过设定的通讯系统通知该单位。 该单位到回单箱取回记帐单, 自动记帐或手工记帐。 可基本实现实时自动记帐, 节约客户的时间和成本。  Example: Several accounts were recorded in the bank account of a certain unit, and the bills for these accounts were immediately sent to the unit's bank network receipt box. The receipt box will automatically notify the unit through the set communication system. The unit goes to the receipt box to retrieve the bill, either automatically or manually. Real-time automatic accounting can be basically realized, saving customers' time and costs.
银行网络回单箱系统含有有效广告记分系统。  The bank's online receipt receipt system includes an effective advertising scoring system.
网络上的邮箱想避免广告是件不太容易的事。通过设立广告记分系统,侦测广告信 件在当前页打开的时间, 奖励记分, 鼓励客户看广告。其积分可冲抵网络费用, 是一件 一举三得的事情。  Mailboxes on the Internet want to avoid advertising is not easy. By setting up an advertising scoring system, it detects the time when an advertising message is opened on the current page, rewards points, and encourages customers to watch advertisements. The points can be used to offset the network expenses, which is a three-pronged thing.
实施例 6 筛眼式银行网络保管箱系统 随着计算机越来越深入到我们的生活,人们的贵重电子文档越来越多,急需绝对安 全可靠的网络电子保管箱保管。 而银行建立网络电子保管箱具有着天然的优势。 Embodiment 6 Sieve-type Bank Network Safe Deposit Box System As computers get deeper into our lives, more and more valuable electronic documents are needed, and there is an urgent need for absolute safe and secure network electronic safe deposit boxes. The bank has a natural advantage in establishing a network electronic safe deposit box.
运用筛眼理论,保管箱分设明暗两箱。明箱为空,暗箱为实, 明箱在外, 暗箱在内, 两箱对应, 唯我自知。  Using the sieve theory, the storage box is divided into two boxes, light and dark. The clear box is empty, the dark box is real, the clear box is outside, the dark box is inside, and the two boxes correspond, but I know it.
可长久保存客户帐户收支记录, 逐渐形成客户信用档案。  It can keep the customer account income and expenditure records for a long time, and gradually form customer credit files.
实施例 7 授权式网络金库锁系统  Example 7 Authorized Network Vault Lock System
是筛眼系统的一个特例。是上网和下网都只有一个筛眼的系统。运用于重要场所的 门锁, 如银行的金库、 仓库、 家庭等。  Is a special case of the sieve system. It is a system with only one screen for both Internet and offline. Door locks used in important places, such as bank vaults, warehouses, homes, etc.

Claims

权利 要求 Rights request
1、 一种安全存取网络数据的系统和方法, 包括帐户网络数据库系统、 通讯网络系 统、 通讯终端, 构成一个完整的网络筛眼锁系统; 其特征是:  1. A system and method for securely accessing network data, including an account network database system, a communication network system, and a communication terminal, forming a complete network screen lock system; its characteristics are:
(a) 所述的帐户网络数据库中, 一个客户注册有两个或两个以上属于自己的关联 帐户: 一个公开的显性帐户和另外一个及一个以上不公开的隐性帐户;  (a) In the account network database described above, a customer has registered two or more associated accounts: one publicly explicit account and one or more privately held implicit accounts;
(b ) 公开的显性帐户平时为空帐户, 不公开的隐性帐户为存储数据的实帐户; (b) Public explicit accounts are usually empty accounts, and hidden private accounts are real accounts that store data;
(c ) 显性帐户与隐性帐户存在着一对一或者一对多的对应关系, 此关系保存在网 络数据库系统内部, 只有客户本人和计算机系统知道, 且不在外部网络中传送。 (c) There is a one-to-one or one-to-many correspondence between the explicit account and the implicit account. This relationship is stored inside the network database system. Only the customer and the computer system know it, and it is not transmitted in the external network.
2、 根据权利要求 1所述的系统, 其程序规则特征在于:  2. The system according to claim 1, wherein the program rules are characterized by:
(a)公幵的显性帐户和隐蔽的隐性帐户分别通过两个互不关联的通道与客户联系; (a) The public explicit account and the hidden implicit account respectively contact the customer through two unrelated channels;
(b )所有的数据进出必须通过公开的显性帐户进行; (b) All data in and out must be made through open and explicit accounts;
( c ) 不公开的隐性帐户唯一的数据出入口连接公开的显性帐户;  (c) the only data entry and exit of the unlisted hidden account is connected to the open explicit account;
(d) 隐性帐户设定为只接收帐户所有者设定的通讯终端的指令或者接受任意通讯 终端的指令。  (d) The hidden account is set to receive only the instructions from the communication terminal set by the account owner or from any arbitrary communication terminal.
3、 一种安全存取网络数据的方法, 其特征还在于, 包括下列步骤:  3. A method for securely accessing network data, further comprising the following steps:
(a)访问者通过第一通道向显性帐户发送一个请求数据 1 ;  (a) The visitor sends a request data 1 to the explicit account through the first channel;
(b )帐户所有者通过第二通道向隐性帐户发送一个不包含显性帐户的帐号、密码, 只和通过第一通道请求数据有关的请求数据 2;  (b) the account owner sends an implicit account number and password that does not contain an explicit account to the implicit account through the second channel, and only the request data 2 related to the request data through the first channel;
(c ) 数据库内部进行如下处理: 隐性帐户将应答数据通过内部唯一固定的通道传 送给对应的显性帐户;显性帐户先后接收应答数据与请求数据,双方都在一定时间内等 待匹配; 两个数据匹配后,显性帐户执行请求;如若不匹配,请求数据失败,撤消请求, 退回应答; 通知访问者和帐户所有者; 两帐户恢复原状。  (c) The internal processing of the database is as follows: The implicit account transmits the response data to the corresponding explicit account through the only internal fixed channel; the explicit account receives the response data and the request data, and both parties wait for a match within a certain period of time; two After the data matches, the explicit account executes the request; if the data does not match, the request data fails, the request is cancelled, and the response is returned; the visitor and the account owner are notified; the two accounts are restored.
4、 根据权利要求 1或 2或 3所述的系统和方法, 制成网络筛眼锁, 其特征包括- 必须通过第二通道传送帐户密码,用此密码才能开启网络帐户门户; 否则, 则是一把打 不开的死锁。 4. The system and method according to claim 1 or 2 or 3, to make a network screen lock, which comprises-the account password must be transmitted through the second channel, and the password can be used to open the network account portal; otherwise, it is A deadlock that cannot be opened.
5、 根据权利要求 1或 2或 3所述的系统, 制成筛眼锁网页, 其特征包括: 在网页 内动态的为每个访问者设置相互隔离的、空白的访问空间, 由对应的实际网页空间, 通 过第二通道传送网页至访问空间以供浏览。 5. The system according to claim 1 or 2 or 3, to create a sieve lock webpage, comprising: dynamically setting each visitor's isolated, blank access space within the webpage by a corresponding actual Web space, sending a web page to the access space for browsing through the second channel.
6、 根据权利要求 1或 2或 3所述的系统, 制成筛眼银行卡, 其特征包括: 银行卡 帐户内资金为空。  6. The system according to claim 1 or 2 or 3, which is made into a sieve bank card, which comprises: the bank card account is empty of funds.
7、 根据权利要求 7所述筛眼银行卡, 其特征包括: 含有户名与帐号转换系统或易 记的别名与帐号转换系统  7. The sieve bank card according to claim 7, further comprising: a system for converting an account name and account number or an easy-to-remember alias and account number conversion system
8、 根据权利要求 1或 2或 3所述的系统, 制成手机 P0S, 其特征包括: 手机为销 售点无线金融终端, 收付双方用手机进行实时转帐支付。  8. The system according to claim 1 or 2 or 3, which is made into a mobile phone POS, which comprises: the mobile phone is a point of sale wireless financial terminal, and the receiving and paying parties use the mobile phone to perform real-time transfer payment.
' 9、 根据权利要求 1或 2或 3所述的系统, 制成安全网络电子邮箱系统, 构成银行 网络电子回单箱系统, 其特征包括: 邮箱为空; 终身跟随帐户; 与客户的各种通讯终 端有固定的联系; 内容可分类, 专门包含一个广告类。  9. The system according to claim 1 or 2 or 3, which is made into a secure network electronic mailbox system, which constitutes a bank network electronic receipt box system, which includes: the mailbox is empty; a lifetime follow account; and a variety of customers The communication terminal has a fixed connection; the content can be classified and contains an advertising class.
10、根据权利要求 9所述电子邮箱, 其特征包括: 包含根据侦测广告信件在当前页 打开的时间而记分的有效广告记分系统  10. The e-mail box according to claim 9, further comprising: an effective advertisement scoring system comprising a score based on a detection time when an advertisement letter is opened on the current page.
11、 根据权利要求 9所述电子邮箱, 其特征包括: 包含银行帐单记帐对帐系统。 11. The electronic mailbox according to claim 9, further comprising: a bank bill reconciliation system.
12、根据权利要求 1或 2或 3所述的系统, 制成安全网络电子保管箱, 构成网络金 融保管箱, 其特征包括: 用于保管客户重要的金融帐户交易记录, 建立个人征信系统; 以及其他的重要的影、 音、 图、 文电子文档。 12. The system according to claim 1 or 2 or 3, which is made into a secure network electronic safe deposit box and constitutes a network financial safe deposit box, which comprises: for maintaining a customer's important financial account transaction records and establishing a personal credit system; As well as other important video, audio, graphics, and electronic documents.
PCT/CN2003/001165 2002-12-31 2003-12-30 System and method for securely access about the mesh network data WO2004059904A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003292878A AU2003292878A1 (en) 2002-12-31 2003-12-30 System and method for securely access about the mesh network data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN02159981.5 2002-12-31
CN 02159981 CN1455340A (en) 2002-12-31 2002-12-31 System and method of safety access of mesh network data

Publications (1)

Publication Number Publication Date
WO2004059904A1 true WO2004059904A1 (en) 2004-07-15

Family

ID=29257545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2003/001165 WO2004059904A1 (en) 2002-12-31 2003-12-30 System and method for securely access about the mesh network data

Country Status (3)

Country Link
CN (1) CN1455340A (en)
AU (1) AU2003292878A1 (en)
WO (1) WO2004059904A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464336C (en) * 2005-06-14 2009-02-25 华为技术有限公司 Method for controlling system account right
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731726B (en) * 2005-08-09 2011-04-20 刘津立 Safety infrastructure and value-added project composed by mobile phone association server

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183186A (en) * 1995-05-08 1998-05-27 图象数据公司 Positive identification system and method
CN1297636A (en) * 1998-03-17 2001-05-30 桑纳拉斯麦脱信托有限公司 Procedure and system for reliable and safe identification of contracting party
JP2002157160A (en) * 2000-07-20 2002-05-31 Ge Medical Technology Services Inc Creation and transmission of safe report on data
US20020147925A1 (en) * 2001-04-04 2002-10-10 International Business Machines Corporation Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1183186A (en) * 1995-05-08 1998-05-27 图象数据公司 Positive identification system and method
CN1297636A (en) * 1998-03-17 2001-05-30 桑纳拉斯麦脱信托有限公司 Procedure and system for reliable and safe identification of contracting party
JP2002157160A (en) * 2000-07-20 2002-05-31 Ge Medical Technology Services Inc Creation and transmission of safe report on data
US20020147925A1 (en) * 2001-04-04 2002-10-10 International Business Machines Corporation Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464336C (en) * 2005-06-14 2009-02-25 华为技术有限公司 Method for controlling system account right
CN103455737A (en) * 2012-05-28 2013-12-18 百度在线网络技术(北京)有限公司 User information protection method and device

Also Published As

Publication number Publication date
AU2003292878A1 (en) 2004-07-22
CN1455340A (en) 2003-11-12

Similar Documents

Publication Publication Date Title
US10255588B2 (en) System and method for a private and secure financial transaction system using an ATM
US8285648B2 (en) System and method for verifying a user's identity in electronic transactions
JP5043442B2 (en) Bank computer account system with lock
CN101388095A (en) Method and apparatus for performing delegated transactions
US20130026232A1 (en) Methods and systems for preventing card payment fraud and receiving payments using codes and mobile devices
US20020042781A1 (en) Universal and interoperable system and method utilizing a universal cardholder authentication field (UCAF) for authentication data collection and validation
KR20090000792A (en) System and method for confirming real name in non-facing and program recording medium
JP4371084B2 (en) ATM usage limit setting method, ATM usage limit setting device, and ATM usage limit setting program
WO2008037116A1 (en) Method and system for encrypting transfer that the transfer code adding the user-defined arithmetic equal to the bank password
WO2004059904A1 (en) System and method for securely access about the mesh network data
KR100788828B1 (en) A housekeeping book service via network
US20060041504A1 (en) Method, system and program product for deterring credit fraud
TW201104600A (en) A secure capital transaction method and system using mobile device
KR101041122B1 (en) System and Method for Managing Mortgage and Program Recording Medium
KR100791268B1 (en) Method for Processing Payment by Using Mobile Terminal and Recording Medium
KR100873352B1 (en) System and Method for Processing Online Account Fund Transfer and Program Recording Medium
KR100854342B1 (en) System and Method for Customer Authentication by Using Photo Image of Certificate of Residence and Program Recording Medium
TW200823807A (en) Anti-fraudulent method for financial service system using telephone number and identification code
JP2002083245A (en) Method and device for executing automated transaction
JP2002133101A (en) Automatic charge payment system
KR20090044939A (en) System and method for managing mortgage, server and program recording medium
Saranya et al. Iteration and Challeges in Mobile Banking
KR100862736B1 (en) Method for Processing Payment by Using Cable Phone and Recording Medium
Bezbarua et al. Cyber Crime–with special reference to banking industry of Assam
Kurylowicz The Origin and Outlook for the Development of Electronic Banking in Poland at the Beginning of the 21st Century

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP