[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

TW460849B - A method to identify the cardholder of a credit card (identification card) - Google Patents

A method to identify the cardholder of a credit card (identification card) Download PDF

Info

Publication number
TW460849B
TW460849B TW88123347A TW88123347A TW460849B TW 460849 B TW460849 B TW 460849B TW 88123347 A TW88123347 A TW 88123347A TW 88123347 A TW88123347 A TW 88123347A TW 460849 B TW460849 B TW 460849B
Authority
TW
Taiwan
Prior art keywords
card
key code
computer
key
cardholder
Prior art date
Application number
TW88123347A
Other languages
Chinese (zh)
Inventor
Kuo-Shen Liu
Original Assignee
Liu Kuo Shen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu Kuo Shen filed Critical Liu Kuo Shen
Priority to TW88123347A priority Critical patent/TW460849B/en
Application granted granted Critical
Publication of TW460849B publication Critical patent/TW460849B/en

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This invention introduces a method to identify the cardholder of a credit card (identification card). After the cardholder uses a reserved phone capable of indicating the incoming calls to log in the computers of the identification organizations through communication network, the random number can be generated by the computer with password provided and then be used as a key code. The computer encrypts the key code and then save it. When the cardholder uses a credit card for shopping, mail order, and E-commerce, the card number and the encrypted key code are sent to the computers of the identification organizations for comparison. The deal is completed only when the numbers are consistent. The key code is deleted right after the comparison is made no matter what the result is. The credit card becomes invalid when the key code of the card does not exist in the computers. Therefore, it serves the purpose of preventing the credit card being duplicated, counterfeited, misused by other people or avoiding the situation that the cardholder disclaims the deals, which cause the loss of rights and interests.

Description

4§Q8|| 8812R347 五、發明說明(1) 本發明係有關一種供辨^蚀田b:\pantl\8872-2 身份的卡(或代碼)為持卡2識使用信用卡或任何藉以證明 用前需先取得一鍮起碼,法,尤指一種於信用卡使 比對一次後予以銷毁,以、涊證單位之電腦比對,並於 識方法。 到防止偽造、複製或冒用之辨 按;由於信用卡的大 的便利性,但隨之而來的 複:帶相當 後否認等的犯罪、爭議伴重、複製冒用甚至持卡者事 銀行)造成不少的損失7松丄部也令持卡者及發卡單位( -年因偽造信用卡所損失:二僅台灣地區 使發卡單位不勝負#,實待有達新台幣約十億元, 而隨著科技的進步, 有別於當場刷卡之特殊購J =及郵購曰漸蓬勃,此種 得袼外重I ’以避免如上使用J用卡d::辨識就顯 或冒^本人事後否認等造成產生因複製、偽造 信用卡(身份本證發明=::;之:=提::,供辨識使用 使用前先取得一鑰匙 、,主要係由持卡者於 偽造:防複製、防Ϊ:或: = 以達到防 前述之辨識方法,係由持卡者 f電;經由通信網路進入認證單位之電顯示之專 疋之密碼取得鑰匙碼。 後再以本人設 前述之辨識方法,該鑰匙碼 卡者進入取输起碼時,當輸…核;=之I::; d 6 0 849 -—^^,^1233474§Q8 || 8812R347 V. Description of the invention (1) The present invention relates to a card (or code) used to identify ^ b = \ pantl \ 8872-2 identity for the card holder. 2 Use a credit card or any other proof You must first obtain at least one method, especially a method of destroying the credit card after a comparison, and comparing it with the computer of the certification unit, and knowing the method. To prevent counterfeiting, copying or fraudulent use; due to the great convenience of credit cards, but the ensuing resumption: crimes such as denial after a considerable amount of denial, controversy, copying and fraudulent use, and even the cardholder's bank) It caused a lot of losses. 7 The Songbei Ministry also caused cardholders and card issuers to lose money due to counterfeit credit cards: Two Taiwan regions made the card issuers unsuccessful #, but it will be about NT $ 1 billion. With the advancement of science and technology, it is different from the special purchase on the spot. J = and mail order are becoming more and more vigorous. This kind of success is important I 'to avoid the use of the J card as described above. Copying and forgery of credit card (identity certificate invention = :: ;; of: = mention ::, for identification use, obtain a key before use, mainly by cardholders in counterfeiting: anti-copying, anti-scratching: or: = In order to prevent the aforementioned identification method, the cardholder f will be used to obtain the key code through the communication network to enter the special password displayed on the electrical display of the certification unit. Then I will set up the aforementioned identification method, the key code card. When a person enters at least one of the losers, when the loser ... nuclear; = of I ::; d 6 0 849 --- ^^, ^ 123347

五、發明說明(2) 機亂熬:產生,f由該電腦以持卡者設定之加密協 定加密後,係留於電腦内。 ,下嘗”又疋之加密協 前述之辨織方法’係於^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ 電子商務時,㈤時送出卡號二::卞購物郵購或進行 單位之電腦必對。 加密後之鑰匙碼,以供認證 前述之辨織方法,你士 μ 起瑪-次後,印d t卡者使用(即電腦比對)鑰 受理任何鑰匙螞,直至梏+ 娜驭黾腦即不再 。 羯 直至持卡者再以密碼進入取新的鑰匙碼 發明if要特點及其新㈣,將,配合以下所附圖 式實施例之靜細說明而更趨明瞭,如圖所示下所附圖 '第一圖係本發明取鑰匙碼之流程圖。 \ ΐ二圖係本發明使用於語音郵購之流程圖。 第三圖係本發明之另一取鑰匙碼實施例流程圖。 本發明之鑰匙碼取得方法,主要 單位提出申請,其步綠如下: 矛无由待卡者向認證 1、 持卡者向發卡銀行或發卡單位,提出 卡(或代碼)受保·(即需加上鎗匙瑪 方可使用),同時提供取鍮匙碼的本人專屬話= 電話)號碼(可記錄如家中、公司等多隻電話)”。專 2、 由認證單位郵寄密封之密碼予 , ;:乾’否則於-定時間内由電腦自動銷毀,認證= 卡號及取餘匙瑪之電話號_,以&密碼等建立在其設置之 電腦内部’並建立取鑰匙碼之設備,此設備 - 一·—----- ^ ^ w即為一電腦電V. Description of the invention (2) Machine chaos: Generated, f is encrypted by the computer with an encryption protocol set by the card holder, and is left in the computer. "The next method" of the Encryption Association's previous identification method is based on ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ when shopping e-mail or ordering computer must Yes. The encrypted key code is used to authenticate the aforementioned identification method. After you μ μ-times, the person who printed the dt card uses the key (that is, the computer compares) to accept any key ants, until + Nayu 黾 brain That is no longer. 羯 Until the cardholder enters the password with a new key code to invent the features and new features of the if, it will become clearer with the detailed description of the embodiment of the drawings below, as shown in the figure. The first picture below is a flowchart of obtaining a key code according to the present invention. \ Ϊ́ The second diagram is a flowchart of using a voice mail order according to the present invention. The third picture is a flowchart of another embodiment of obtaining a key code according to the present invention. In the method for obtaining the key code of the present invention, the main unit submits an application, and the steps are as follows: The cardholder is authenticated to the cardholder 1. The cardholder submits the card (or code) to the card issuer or the card issuer for protection. Plus gun key can only be used), and provide my own key to get the key code Words = phone) number (can record such as a home, such as more than just a telephone company). " Special 2, by the certification unit mail the sealed password,;: dry 'otherwise it will be automatically destroyed by the computer within a fixed time, authentication = card number and the phone number of the remaining key _, with the & password, etc. established in its settings Inside the computer 'and set up a device to retrieve the key code. This device-a · ------ ^ ^ w is a computer

Λ60849 年 月 修正 曰 ____案號 88123347 五、發明說明(3) 話整合系統(CTI,Computer Telephone Integration), 且提供一代表性電話號碼,以供進入電腦。 3、 該認證單位係可為發卡單位(發卡銀行),或與 發卡單位電腦連線之獨立單位。 4、 認證單位之電腦將不會接受兩個相同的卡號登錄 ,亦不會接受同一支專屬電話被設定於兩張不同的卡。 5、 持卡者於完成上述之程序後,即可以其登記之專 屬電話,經由通信網路進入認證單位的電腦取得鑰匙碼, 其流程如圖一所示係為: 再 A、 持卡者以設定之專屬電話撥代表號進入電腦, 輸入密碼。 碼 B、 電腦將以持卡者以專屬電話的來電顯示電話號 對照於卡號,再以卡號比對密碼,若為無誤方 程序。 第一次接通時,電腦將要求持卡者設定加密協定 1 1 ,若取得之鑰匙碼為20,則使用信用卡時, 入之鑰匙碼需為31,此加密數字為永久保留 密碼可任意更改’因而第一次進入電腦設定好加 用新Ϊ i:ί ί按2 ’將密碼更改’下一次進入系統即得 ,如圖所示,於輸入密碼後按1,即可取得鑰匙 碼0 =、由上述之程序可得知,鑰匙碼之取得極為簡單方 i孪ί代表號為8位數,密碼為4位數,其總計按1 3個 姶入宓可取得。2.鱼鍵的隨、遇撥號,且設定不必 碟,JL實崖只需老2僻鍵即^[^得鍮匙碼 ΗΛ60849 Amendment ____ Case No. 88123347 V. Description of the Invention (3) Computer Telephone Integration (CTI), and provide a representative telephone number for entering the computer. 3. The certification unit can be a card issuer (issuing bank) or an independent unit connected to the computer of the card issuer. 4. The computer of the certification unit will not accept two logins with the same card number, nor will the same dedicated phone be set on two different cards. 5. After completing the above-mentioned procedures, the cardholder can obtain the key code from the registered phone through the communication network and enter the computer of the certification unit. The flow is shown in Figure 1. A. The cardholder uses Set the dedicated phone number to enter the computer and enter the password. Code B. The computer will display the phone number of the caller of the dedicated phone by the card holder. Compare the card number with the card number, and then compare the password with the card number. When connected for the first time, the computer will ask the cardholder to set the encryption protocol 1 1. If the key code obtained is 20, the key code entered when using a credit card must be 31. This encrypted number is a permanent reserved password and can be arbitrarily changed. 'So enter the computer for the first time to set up and use the new Ϊ i: ί ί Press 2' Change the password 'The next time you enter the system, as shown in the figure, after entering the password, press 1, you can get the key code 0 = From the above procedure, it can be known that the key code is very simple to obtain. The representative number is 8 digits and the password is 4 digits. The total number can be obtained by entering 13 keys. 2.Following and dialing of the fish key, and the setting does not require a disk. JL Real Cliff only needs the old 2 remote keys, ie ^ [^ 得 鍮 KEY 码 Η

4 60 84 9 號;88ΐ9$/|γ 曰 修正 五、發明說明(4) 則據以判:^ ::電腦隨機產生之亂數,無法以機率或法 、: 比對—次後’不論對錯即立即銷毀。 協定若亡#巧心、記可重新再取一個新的,但密碼及加密 =記,得向認證單位重新申請。 、該鑰匙碼於取得後,應用如下: 加4之Γ二鱗:;:r者將卡予商家時,同時告知 ^ ^. 供商豕輪入經由收單銀行及發卡銀行至 «單位之電腦比對,於無誤後方可受理。 、石sB:m電子商務時’持卡者將卡號與加密後之鑰 廷碼一起經由商家及發卡單位輸人至認證單位,商家之電 腦亦-起連線’即可立即確定是否為持卡者本人,若使用 於電子銀行時’則商家即代表電子銀行。 C、使用於郵購時,由於目前之郵購方式得填資料再 簽名傳真等,常讓購買者(持卡者)覺得麻煩,應用本發 明’可如圖二所示,由持卡者以電話撥進一個電腦語音系 統,同時以按鍵送出卡號及加密後之鑰匙碼,藉由按鍵輸 入郵購之商品代號,此電腦語音系統之電腦與認證單位之 電腦連線’經比對無誤後方完成交易,且持卡者無法於事 後否認。 1 1、本發明於使用上亦可附加安全及方便性之措施 ,如圖三所示,其中: A、安全性: a、鍮匙碼亦可經由無線數據傳輸至行動電話或呼叫 器,炎可自行設定。 4 80 84^ 88123347 年 曰 修正 五、發明說明(5) b、鑰匙碼取出而未使用前可設定時間,由電腦自動 銷毀,亦可進入電腦主動銷毁。 C、加密可設定更複雜,如+、一、x 、+。 d、 若成功進入系統(即密碼無誤),則系統會先報 進入的次數當序號,以讓持卡者檢驗是否曾被他人侵入, 序號可由0至9循環。 e、 每次輸入密碼後,不論成功與否,都會經由持卡 者設定之通信工具(電話或呼叫器)立即通知持卡者,以 警覺有他人侵入。 B、方便性: a、 取鑰匙碼時,亦可不以設定之專屬電話取得,只 需輸入*字鍵,再按專屬的電話號碼,再按密碼即可,亦 可輸入#字鍵,再按卡號再按密碼即可。 b、 鍮匙碼加密亦可不設定,或不設定永久性。 c、 鑰匙碼亦可設定用之不毁,以供多次使用,直至 主動進入銷毁,或取新鑰匙碼。 d、 可設定一個金額以下,不需鑰匙碼。 e、 密碼三次錯誤方與關閉。 f 、可變更專屬之電話號碼。 g、 可一次(進入系統)取多個鑰匙瑪,依序使用。 h、 以專屬電話取鍮匙碼時,亦可設定不必輪入密碼 ,在這種狀態下,持卡者撥進代表號後,若三秒鐘内不輸 入密碼,則系統即會告知鑰匙碼。 1 2、取鍮匙碼亦可於網路上輸入卡號及密碼取得。No. 4 60 84 9; 88ΐ9 $ / | γ Amendment V. Invention Description (4) According to the rule: ^ :: random number generated randomly by the computer, cannot be compared with the probability or method: comparison-after the 'no matter Defects are destroyed immediately. Agreement Ruo # # 心心 、 记 can take a new one, but the password and encryption = remember, you must reapply to the certification unit. After the key code is obtained, it should be applied as follows: Add 4 of Γ two scales:;: When the r will give the card to the merchant, also inform ^ ^. The supplier 豕 turns into the computer of the unit through the acquiring bank and card issuing bank The comparison will not be accepted until it is correct. 、 Shi sB: m In e-commerce, the 'cardholder enters the card number and the encrypted key code together with the merchant and the card issuer to the certification unit, and the merchant's computer is also connected' to immediately determine whether it is a card holder The person himself, if used in e-banking, then the merchant represents e-banking. C. When used in mail order, because the current mail order method has to fill in the information and then sign the fax, it often makes the purchaser (cardholder) feel troublesome. The application of the present invention can be shown in Figure 2 and dialed by phone Enter a computer voice system, and simultaneously send out the card number and encrypted key code with the keys, and enter the mail order product code by pressing the keys. The computer of this computer voice system and the computer of the certification unit are connected. The transaction is completed without error, and Cardholders cannot deny it after the fact. 1 1. The present invention can also add security and convenience measures to the use, as shown in Figure III, where: A. Security: a. The key code can also be transmitted to a mobile phone or pager via wireless data. Can be set by yourself. 4 80 84 ^ 88123347 Revision V. Description of the invention (5) b. The time can be set before the key code is taken out, and it can be automatically destroyed by the computer, or it can be actively destroyed by entering the computer. C, encryption can be set more complex, such as +, one, x, +. d. If the system is successfully entered (that is, the password is correct), the system will first report the number of entries as the serial number to allow the cardholder to check whether it has been intruded by others. The serial number can be cycled from 0 to 9. e. After entering the password each time, whether successful or not, the cardholder will be notified immediately via the communication tool (phone or pager) set by the cardholder to alert others of intrusion. B. Convenience: a. When you get the key code, you can also get it without using the set dedicated phone. Just enter the * key, then press the dedicated phone number, and then press the password. You can also enter the # key, and then press Card number and then press the password. b. The key code encryption may not be set or permanent. c. The key code can also be set to be non-destructible for multiple uses until it is actively entered for destruction or a new key code is obtained. d. Can set less than one amount, no key code required. e. The password is wrong three times and closed. f. The exclusive phone number can be changed. g. Multiple keys can be taken at one time (into the system) and used sequentially. h. When using a dedicated phone to retrieve the key code, you can also set it to not need to rotate the password. In this state, after the cardholder dials the representative number, if the password is not entered within three seconds, the system will notify the key code. . 1 2. The key code can also be obtained by entering the card number and password on the network.

Claims (1)

0 84 --2 六、申請專利範圍 1、一 原申請者) 人用卡後否 由持卡 信網路進入 一蝓匙碼, 碼’並以持 腦内,同時 持卡者 加密後之該 以確認持卡 該認證 不論對錯即 全失效。 2、 如 餘起碼於取 毁’或設定 3、 如 鑰匙碼係可 卡者再取得 4、 如 卡者亦可以 起喝。 5、 如 輪起碼之加 ―年 a 修正 JM23347 種供辨識使用信用卡(身份證明卡λ ’以防止其卡被複製、偽造:蓄= 涊等情事,此方法包含以下内容❶目用或本 者以具有來電顯示所設定之專屬 :證單位之電腦,並輸入自行設】;密 =由4證單位之電腦以隨機 所設定之加密協定予以加密後 由電腦將該鑰匙碼告知持卡纟;胃存於電 或郵購時,同時送出卡號及 者=身=; 單位供認證單位之電腦比對, ::二之ί Ϊ鑰匙碼於使用比對-次後, 自動㈣’备電腦内無鑰^時,該卡即完 申請專利範圍第1項所述該 出未使用前,可由持卡者自二〜 、 ° ^ ^^Α埒卞者自订進入電腦予以銷 於一疋時間内自動鏑毀〇 圍第1項所述之方法,在其中,該 新碼或主動進入留以供多次使用,直至持 圍第1項所述之方法,在其中,持 非設疋專屬之電 3輸入特定之字鍵,以取得鑰 利範圍第1項所述之方法,在其中,該 種運算方式或設定為可更 \UK tfUUUNUKMXlAltiWH __ ^__丨 ,„, _ $ 9頁 / -.0 84 --2 6. Scope of patent application 1. An original applicant) Whether the card holder will enter a key code, code 'in the brain, and the card holder encrypts it after using the card. To confirm that the card is invalid, whether it is right or wrong. 2. If the remaining number is at least to be destroyed ’or set 3. If the key code is acceptable, you can get it again 4. If the card number is available, you can also drink. 5. If it is at least ―year a, modify the JM23347 credit card for identification (identification card λ ') to prevent the card from being copied or forged: deposit = 涊, etc. This method includes the following contents: With the exclusive setting of caller ID: the computer of the certificate unit, and enter it by yourself]; secret = the computer of the 4 certificate unit is encrypted by the randomly set encryption protocol and the computer will inform the card holder of the key code; At the time of telecom or mail order, the card number and body = body =; are sent at the same time. The unit is used for computer comparison of the certification unit. :: 二 之 ί Ϊ Key code is automatically used after the comparison-time, there is no key in the computer. The card is ready for application before the patent application, as described in item 1 of the patent scope. Before the card is unused, the card holder can customize it into the computer and sell it automatically within a period of time. The method described in item 1, in which the new code or active entry is reserved for multiple uses, until the method described in item 1 is held, in which a non-exclusive electric 3 is entered into a specific word Key for key interest range The method of claim 1, in which the kind of operation mode is set to be more or \ UK tfUUUNUKMXlAltiWH __ ^ __ Shu, "_ $ 9 / -. IS0849 _ 案號88123347_年月日 修正_ 六、申請專利範圍 改性,或予以取消。 6、 如申請專利範圍第1項所述之方法,在其中,該 鑰匙碼係可經由無線數據傳輸以顯示於行動電話或呼叫器 〇 7、 如申請專利範圍第1項所述之方法,可一次(進 入系統)取多個鑰匙碼,依序使用。 8、 如申請專利範圍第1項所述之方法,在其中,該 鑰匙碼係可運用於以語音郵購或語音下單交易,經由電腦 立即判斷加密後之鑰匙碼是否無誤而當場完成交易。 9、 如申諳專利範圍第1項所述之方法,持卡者若以 專屬電話去取鑰匙碼,可設定為不需輸入密碼,使持卡者 於撥進代表號後,於三秒内不輪入密碼,則系統即會告知 錄匙碼°IS0849 _ Case No. 88123347_ Year Month Date Amendment _ 6. The scope of patent application is modified or cancelled. 6. The method described in item 1 of the scope of patent application, wherein the key code can be displayed on a mobile phone or pager via wireless data transmission. 7. The method described in item 1 of the scope of patent application, can be Take multiple key codes at one time (enter the system) and use them sequentially. 8. The method described in item 1 of the scope of patent application, in which the key code can be used for voice mail order or voice order transactions, and the computer immediately determines whether the encrypted key code is correct and completes the transaction on the spot. 9. According to the method described in item 1 of the scope of the patent application, if the cardholder obtains the key code through a dedicated phone, it can be set without entering a password, so that the cardholder can dial the representative number within three seconds. If the password is not rotated, the system will inform the recording key code ° 第10頁Page 10
TW88123347A 1999-12-30 1999-12-30 A method to identify the cardholder of a credit card (identification card) TW460849B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW88123347A TW460849B (en) 1999-12-30 1999-12-30 A method to identify the cardholder of a credit card (identification card)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW88123347A TW460849B (en) 1999-12-30 1999-12-30 A method to identify the cardholder of a credit card (identification card)

Publications (1)

Publication Number Publication Date
TW460849B true TW460849B (en) 2001-10-21

Family

ID=21643646

Family Applications (1)

Application Number Title Priority Date Filing Date
TW88123347A TW460849B (en) 1999-12-30 1999-12-30 A method to identify the cardholder of a credit card (identification card)

Country Status (1)

Country Link
TW (1) TW460849B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549592B2 (en) 2005-07-12 2013-10-01 International Business Machines Corporation Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8549592B2 (en) 2005-07-12 2013-10-01 International Business Machines Corporation Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform

Similar Documents

Publication Publication Date Title
RU2414001C2 (en) Method and apparatus for checking authenticity or rights using one-time transaction codes
US8060918B2 (en) Method and system for verifying identity
US7003501B2 (en) Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US7571461B2 (en) Personal website for electronic commerce on a smart Java card with multiple security check points
US8315948B2 (en) Method and device for generating a single-use financial account number
US7844550B2 (en) Method and device for generating a single-use financial account number
US6012144A (en) Transaction security method and apparatus
TW200624B (en) A universal authentication device for use over telephone lines
US5193114A (en) Consumer oriented smart card system and authentication techniques
US5864667A (en) Method for safe communications
CA2140803C (en) Method of authenticating a terminal in a transaction execution system
US7577616B2 (en) Method and apparatus of secure authentication and electronic payment through mobile communication tool
US20060190412A1 (en) Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
EP2339550A1 (en) One-Time password credit/debit card
US20070291995A1 (en) System, Method, and Apparatus for Preventing Identity Fraud Associated With Payment and Identity Cards
US6990586B1 (en) Secure data transmission from unsecured input environments
JPH11511882A (en) Tokenless identification system for authorization of electronic transactions and transmissions
RU2323530C2 (en) Method for registration and activation of pki functions
JPS6256043A (en) Electronic transaction system
US8172137B1 (en) Authentication with no physical identification document
JP2006048390A (en) Method and system for authenticating two-dimensional code user
WO2000062214A1 (en) Credit card security technique
TW460849B (en) A method to identify the cardholder of a credit card (identification card)
JP3925613B2 (en) Personal authentication system and personal authentication method
US20240135359A1 (en) Payment card, authentication method and use for a remote payment

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees