4§Q8|| 8812R347 五、發明說明(1) 本發明係有關一種供辨^蚀田b:\pantl\8872-2 身份的卡(或代碼)為持卡2識使用信用卡或任何藉以證明 用前需先取得一鍮起碼,法,尤指一種於信用卡使 比對一次後予以銷毁,以、涊證單位之電腦比對,並於 識方法。 到防止偽造、複製或冒用之辨 按;由於信用卡的大 的便利性,但隨之而來的 複:帶相當 後否認等的犯罪、爭議伴重、複製冒用甚至持卡者事 銀行)造成不少的損失7松丄部也令持卡者及發卡單位( -年因偽造信用卡所損失:二僅台灣地區 使發卡單位不勝負#,實待有達新台幣約十億元, 而隨著科技的進步, 有別於當場刷卡之特殊購J =及郵購曰漸蓬勃,此種 得袼外重I ’以避免如上使用J用卡d::辨識就顯 或冒^本人事後否認等造成產生因複製、偽造 信用卡(身份本證發明=::;之:=提::,供辨識使用 使用前先取得一鑰匙 、,主要係由持卡者於 偽造:防複製、防Ϊ:或: = 以達到防 前述之辨識方法,係由持卡者 f電;經由通信網路進入認證單位之電顯示之專 疋之密碼取得鑰匙碼。 後再以本人設 前述之辨識方法,該鑰匙碼 卡者進入取输起碼時,當輸…核;=之I::; d 6 0 849 -—^^,^1233474§Q8 || 8812R347 V. Description of the invention (1) The present invention relates to a card (or code) used to identify ^ b = \ pantl \ 8872-2 identity for the card holder. 2 Use a credit card or any other proof You must first obtain at least one method, especially a method of destroying the credit card after a comparison, and comparing it with the computer of the certification unit, and knowing the method. To prevent counterfeiting, copying or fraudulent use; due to the great convenience of credit cards, but the ensuing resumption: crimes such as denial after a considerable amount of denial, controversy, copying and fraudulent use, and even the cardholder's bank) It caused a lot of losses. 7 The Songbei Ministry also caused cardholders and card issuers to lose money due to counterfeit credit cards: Two Taiwan regions made the card issuers unsuccessful #, but it will be about NT $ 1 billion. With the advancement of science and technology, it is different from the special purchase on the spot. J = and mail order are becoming more and more vigorous. This kind of success is important I 'to avoid the use of the J card as described above. Copying and forgery of credit card (identity certificate invention = :: ;; of: = mention ::, for identification use, obtain a key before use, mainly by cardholders in counterfeiting: anti-copying, anti-scratching: or: = In order to prevent the aforementioned identification method, the cardholder f will be used to obtain the key code through the communication network to enter the special password displayed on the electrical display of the certification unit. Then I will set up the aforementioned identification method, the key code card. When a person enters at least one of the losers, when the loser ... nuclear; = of I ::; d 6 0 849 --- ^^, ^ 123347
五、發明說明(2) 機亂熬:產生,f由該電腦以持卡者設定之加密協 定加密後,係留於電腦内。 ,下嘗”又疋之加密協 前述之辨織方法’係於^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ 電子商務時,㈤時送出卡號二::卞購物郵購或進行 單位之電腦必對。 加密後之鑰匙碼,以供認證 前述之辨織方法,你士 μ 起瑪-次後,印d t卡者使用(即電腦比對)鑰 受理任何鑰匙螞,直至梏+ 娜驭黾腦即不再 。 羯 直至持卡者再以密碼進入取新的鑰匙碼 發明if要特點及其新㈣,將,配合以下所附圖 式實施例之靜細說明而更趨明瞭,如圖所示下所附圖 '第一圖係本發明取鑰匙碼之流程圖。 \ ΐ二圖係本發明使用於語音郵購之流程圖。 第三圖係本發明之另一取鑰匙碼實施例流程圖。 本發明之鑰匙碼取得方法,主要 單位提出申請,其步綠如下: 矛无由待卡者向認證 1、 持卡者向發卡銀行或發卡單位,提出 卡(或代碼)受保·(即需加上鎗匙瑪 方可使用),同時提供取鍮匙碼的本人專屬話= 電話)號碼(可記錄如家中、公司等多隻電話)”。專 2、 由認證單位郵寄密封之密碼予 , ;:乾’否則於-定時間内由電腦自動銷毀,認證= 卡號及取餘匙瑪之電話號_,以&密碼等建立在其設置之 電腦内部’並建立取鑰匙碼之設備,此設備 - 一·—----- ^ ^ w即為一電腦電V. Description of the invention (2) Machine chaos: Generated, f is encrypted by the computer with an encryption protocol set by the card holder, and is left in the computer. "The next method" of the Encryption Association's previous identification method is based on ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ when shopping e-mail or ordering computer must Yes. The encrypted key code is used to authenticate the aforementioned identification method. After you μ μ-times, the person who printed the dt card uses the key (that is, the computer compares) to accept any key ants, until + Nayu 黾 brain That is no longer. 羯 Until the cardholder enters the password with a new key code to invent the features and new features of the if, it will become clearer with the detailed description of the embodiment of the drawings below, as shown in the figure. The first picture below is a flowchart of obtaining a key code according to the present invention. \ Ϊ́ The second diagram is a flowchart of using a voice mail order according to the present invention. The third picture is a flowchart of another embodiment of obtaining a key code according to the present invention. In the method for obtaining the key code of the present invention, the main unit submits an application, and the steps are as follows: The cardholder is authenticated to the cardholder 1. The cardholder submits the card (or code) to the card issuer or the card issuer for protection. Plus gun key can only be used), and provide my own key to get the key code Words = phone) number (can record such as a home, such as more than just a telephone company). " Special 2, by the certification unit mail the sealed password,;: dry 'otherwise it will be automatically destroyed by the computer within a fixed time, authentication = card number and the phone number of the remaining key _, with the & password, etc. established in its settings Inside the computer 'and set up a device to retrieve the key code. This device-a · ------ ^ ^ w is a computer
Λ60849 年 月 修正 曰 ____案號 88123347 五、發明說明(3) 話整合系統(CTI,Computer Telephone Integration), 且提供一代表性電話號碼,以供進入電腦。 3、 該認證單位係可為發卡單位(發卡銀行),或與 發卡單位電腦連線之獨立單位。 4、 認證單位之電腦將不會接受兩個相同的卡號登錄 ,亦不會接受同一支專屬電話被設定於兩張不同的卡。 5、 持卡者於完成上述之程序後,即可以其登記之專 屬電話,經由通信網路進入認證單位的電腦取得鑰匙碼, 其流程如圖一所示係為: 再 A、 持卡者以設定之專屬電話撥代表號進入電腦, 輸入密碼。 碼 B、 電腦將以持卡者以專屬電話的來電顯示電話號 對照於卡號,再以卡號比對密碼,若為無誤方 程序。 第一次接通時,電腦將要求持卡者設定加密協定 1 1 ,若取得之鑰匙碼為20,則使用信用卡時, 入之鑰匙碼需為31,此加密數字為永久保留 密碼可任意更改’因而第一次進入電腦設定好加 用新Ϊ i:ί ί按2 ’將密碼更改’下一次進入系統即得 ,如圖所示,於輸入密碼後按1,即可取得鑰匙 碼0 =、由上述之程序可得知,鑰匙碼之取得極為簡單方 i孪ί代表號為8位數,密碼為4位數,其總計按1 3個 姶入宓可取得。2.鱼鍵的隨、遇撥號,且設定不必 碟,JL實崖只需老2僻鍵即^[^得鍮匙碼 ΗΛ60849 Amendment ____ Case No. 88123347 V. Description of the Invention (3) Computer Telephone Integration (CTI), and provide a representative telephone number for entering the computer. 3. The certification unit can be a card issuer (issuing bank) or an independent unit connected to the computer of the card issuer. 4. The computer of the certification unit will not accept two logins with the same card number, nor will the same dedicated phone be set on two different cards. 5. After completing the above-mentioned procedures, the cardholder can obtain the key code from the registered phone through the communication network and enter the computer of the certification unit. The flow is shown in Figure 1. A. The cardholder uses Set the dedicated phone number to enter the computer and enter the password. Code B. The computer will display the phone number of the caller of the dedicated phone by the card holder. Compare the card number with the card number, and then compare the password with the card number. When connected for the first time, the computer will ask the cardholder to set the encryption protocol 1 1. If the key code obtained is 20, the key code entered when using a credit card must be 31. This encrypted number is a permanent reserved password and can be arbitrarily changed. 'So enter the computer for the first time to set up and use the new Ϊ i: ί ί Press 2' Change the password 'The next time you enter the system, as shown in the figure, after entering the password, press 1, you can get the key code 0 = From the above procedure, it can be known that the key code is very simple to obtain. The representative number is 8 digits and the password is 4 digits. The total number can be obtained by entering 13 keys. 2.Following and dialing of the fish key, and the setting does not require a disk. JL Real Cliff only needs the old 2 remote keys, ie ^ [^ 得 鍮 KEY 码 Η
4 60 84 9 號;88ΐ9$/|γ 曰 修正 五、發明說明(4) 則據以判:^ ::電腦隨機產生之亂數,無法以機率或法 、: 比對—次後’不論對錯即立即銷毀。 協定若亡#巧心、記可重新再取一個新的,但密碼及加密 =記,得向認證單位重新申請。 、該鑰匙碼於取得後,應用如下: 加4之Γ二鱗:;:r者將卡予商家時,同時告知 ^ ^. 供商豕輪入經由收單銀行及發卡銀行至 «單位之電腦比對,於無誤後方可受理。 、石sB:m電子商務時’持卡者將卡號與加密後之鑰 廷碼一起經由商家及發卡單位輸人至認證單位,商家之電 腦亦-起連線’即可立即確定是否為持卡者本人,若使用 於電子銀行時’則商家即代表電子銀行。 C、使用於郵購時,由於目前之郵購方式得填資料再 簽名傳真等,常讓購買者(持卡者)覺得麻煩,應用本發 明’可如圖二所示,由持卡者以電話撥進一個電腦語音系 統,同時以按鍵送出卡號及加密後之鑰匙碼,藉由按鍵輸 入郵購之商品代號,此電腦語音系統之電腦與認證單位之 電腦連線’經比對無誤後方完成交易,且持卡者無法於事 後否認。 1 1、本發明於使用上亦可附加安全及方便性之措施 ,如圖三所示,其中: A、安全性: a、鍮匙碼亦可經由無線數據傳輸至行動電話或呼叫 器,炎可自行設定。 4 80 84^ 88123347 年 曰 修正 五、發明說明(5) b、鑰匙碼取出而未使用前可設定時間,由電腦自動 銷毀,亦可進入電腦主動銷毁。 C、加密可設定更複雜,如+、一、x 、+。 d、 若成功進入系統(即密碼無誤),則系統會先報 進入的次數當序號,以讓持卡者檢驗是否曾被他人侵入, 序號可由0至9循環。 e、 每次輸入密碼後,不論成功與否,都會經由持卡 者設定之通信工具(電話或呼叫器)立即通知持卡者,以 警覺有他人侵入。 B、方便性: a、 取鑰匙碼時,亦可不以設定之專屬電話取得,只 需輸入*字鍵,再按專屬的電話號碼,再按密碼即可,亦 可輸入#字鍵,再按卡號再按密碼即可。 b、 鍮匙碼加密亦可不設定,或不設定永久性。 c、 鑰匙碼亦可設定用之不毁,以供多次使用,直至 主動進入銷毁,或取新鑰匙碼。 d、 可設定一個金額以下,不需鑰匙碼。 e、 密碼三次錯誤方與關閉。 f 、可變更專屬之電話號碼。 g、 可一次(進入系統)取多個鑰匙瑪,依序使用。 h、 以專屬電話取鍮匙碼時,亦可設定不必輪入密碼 ,在這種狀態下,持卡者撥進代表號後,若三秒鐘内不輸 入密碼,則系統即會告知鑰匙碼。 1 2、取鍮匙碼亦可於網路上輸入卡號及密碼取得。No. 4 60 84 9; 88ΐ9 $ / | γ Amendment V. Invention Description (4) According to the rule: ^ :: random number generated randomly by the computer, cannot be compared with the probability or method: comparison-after the 'no matter Defects are destroyed immediately. Agreement Ruo # # 心心 、 记 can take a new one, but the password and encryption = remember, you must reapply to the certification unit. After the key code is obtained, it should be applied as follows: Add 4 of Γ two scales:;: When the r will give the card to the merchant, also inform ^ ^. The supplier 豕 turns into the computer of the unit through the acquiring bank and card issuing bank The comparison will not be accepted until it is correct. 、 Shi sB: m In e-commerce, the 'cardholder enters the card number and the encrypted key code together with the merchant and the card issuer to the certification unit, and the merchant's computer is also connected' to immediately determine whether it is a card holder The person himself, if used in e-banking, then the merchant represents e-banking. C. When used in mail order, because the current mail order method has to fill in the information and then sign the fax, it often makes the purchaser (cardholder) feel troublesome. The application of the present invention can be shown in Figure 2 and dialed by phone Enter a computer voice system, and simultaneously send out the card number and encrypted key code with the keys, and enter the mail order product code by pressing the keys. The computer of this computer voice system and the computer of the certification unit are connected. The transaction is completed without error, and Cardholders cannot deny it after the fact. 1 1. The present invention can also add security and convenience measures to the use, as shown in Figure III, where: A. Security: a. The key code can also be transmitted to a mobile phone or pager via wireless data. Can be set by yourself. 4 80 84 ^ 88123347 Revision V. Description of the invention (5) b. The time can be set before the key code is taken out, and it can be automatically destroyed by the computer, or it can be actively destroyed by entering the computer. C, encryption can be set more complex, such as +, one, x, +. d. If the system is successfully entered (that is, the password is correct), the system will first report the number of entries as the serial number to allow the cardholder to check whether it has been intruded by others. The serial number can be cycled from 0 to 9. e. After entering the password each time, whether successful or not, the cardholder will be notified immediately via the communication tool (phone or pager) set by the cardholder to alert others of intrusion. B. Convenience: a. When you get the key code, you can also get it without using the set dedicated phone. Just enter the * key, then press the dedicated phone number, and then press the password. You can also enter the # key, and then press Card number and then press the password. b. The key code encryption may not be set or permanent. c. The key code can also be set to be non-destructible for multiple uses until it is actively entered for destruction or a new key code is obtained. d. Can set less than one amount, no key code required. e. The password is wrong three times and closed. f. The exclusive phone number can be changed. g. Multiple keys can be taken at one time (into the system) and used sequentially. h. When using a dedicated phone to retrieve the key code, you can also set it to not need to rotate the password. In this state, after the cardholder dials the representative number, if the password is not entered within three seconds, the system will notify the key code. . 1 2. The key code can also be obtained by entering the card number and password on the network.