WO2006033161A1 - 入出金システム - Google Patents
入出金システム Download PDFInfo
- Publication number
- WO2006033161A1 WO2006033161A1 PCT/JP2004/013966 JP2004013966W WO2006033161A1 WO 2006033161 A1 WO2006033161 A1 WO 2006033161A1 JP 2004013966 W JP2004013966 W JP 2004013966W WO 2006033161 A1 WO2006033161 A1 WO 2006033161A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- chip
- host computer
- atm
- password
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
Definitions
- the present invention relates to a deposit / withdrawal system in a magnetic and Z or IC card system using biometrics authentication.
- the deposit / withdrawal referred to in the present invention includes operations such as balance inquiry, remittance, etc. performed and obtained by ATM.
- fingerprint data is recorded on an IC card or a magnetic card and then stored in an ATM or a store.
- the fingerprint data recorded on the card using a fingerprint reader is compared with the fingerprint data recorded on the host computer.
- fingerprint data of multiple fingers is recorded on an IC card, and the fingerprint is used properly depending on the service, the authentication level is changed using multiple fingerprints, and the sensor area is divided into one sensor.
- a method of extracting and using a plurality of divided fingerprint data is also disclosed.
- Patent Document 1 Japanese Patent Laid-Open No. 05-006481
- Patent Document 2 JP 2004-102460 A
- Patent Document 3 US Patent US2002 / 0163421
- Patent Document 4 US Application 20040151353
- Patent Documents 1 to 14 proposed for solving the problems of the current system have the following problems.
- Patent Document 1 a method for safely managing a personal identification number by biometrics authentication (voiceprint authentication) by utilizing an existing magnetic card system that does not introduce a new system.
- the existing magnetic card system can be used, since the data is managed on the system side, it is necessary to set up a database for biometric authentication on the host computer. Therefore, since it is necessary to change the host computer and ATM system, there are problems that the introduction cost becomes high and switching cannot be performed unless the system is stopped.
- voiceprint data is stored on an ATM terminal or host computer, privacy issues will arise if it cannot be managed properly to prevent personal information from leaking.
- Patent Document 2 since the key position is variable in the input means and only the position data of the pressed key is sent to the host computer, the key ⁇ S ⁇ U is randomly changed. Even if the data is picked up on the network, it is safe, but the key layout data must be stored in the host computer (server)! Therefore, it is expensive to update the host computer, and when changing the system, Since it is necessary to stop the host computer, there is a risk of causing the same problems related to the host computer as during interbank system integration.
- Patent Document 3 discloses a technology for recording fingerprint data on an ATM card (IC card or large-capacity magnetic card) to upgrade the current magnetic stripe. Yes. However, since only fingerprint data is stored on the card, the current magnetic card with the card number recorded cannot be used, and the fingerprint data is registered in the host computer instead of the current 4-digit password. Since it is necessary to update the host computer database itself, it is necessary to purchase a new host computer.
- Patent Document 4 in fingerprint authentication used for inquiries such as ATM, a plurality of fingers are recorded on an IC card or the like, and each finger has a different function. A possible technique is disclosed. In addition, even for a single fingerprint, the fingerprint data can be divided by dividing the sensor itself into multiple pieces, so that the number of authentication combinations can be increased. However, in this case as well, it is necessary to save the fingerprint data for inquiry on the host computer. In other words, a host computer using an existing magnetic card cannot be used, but at least the database must be renewed, and a new host computer must be purchased.
- the first invention of the present application provides a host computer as a personal information data storage means, an ATM as a cash deposit / withdrawal means, a biometric sensor and a magnetic as a data carrier means.
- a deposit / withdrawal system including a composite card equipped with a stripe and an IC chip
- a password and biometric information are recorded on the IC chip
- a transmission / reception device with a host computer is recorded on the ATM
- a magnetic stripe reader and IC chip reader / writer are provided.
- the biometric data detected by the biometric sensor is compared with the biometric data pre-registered in the IC chip.
- the second invention of the present application includes a host computer as a personal information data storage means, an ATM as a cash deposit / withdrawal means, a magnetic stripe and an IC chip as a noometric sensor and a data carrier means.
- a deposit / withdrawal system including a composite card equipped with a personal identification number and biometrics information are recorded in the IC chip, and the ATM includes a personal identification number generator, a transmission / reception device with a host computer, and a personal identification number.
- a display device, a personal identification number input device, a magnetic stripe reader, and an IC chip reader / writer are provided, and biometric data detected by the biometric sensor and pre-registered in the IC chip, If these data are matched, the PIN code display device
- the latest PIN is entered and recorded on the IC chip, and after the PIN is inquired by the host computer, ATM operations such as deposit and withdrawal operations are enabled, and after the deposit and withdrawal operations are completed.
- the personal identification number is updated by the personal identification number creating device, the updated personal identification number is written in the IC chip by the reader / writer, and the updated personal identification number is transmitted to the host computer via the transmission / reception device.
- the third invention of the present application relates to a host computer as personal information data storage means, ATM as cash deposit / withdrawal means, a magnetic stripe and IC chip as a nanometric sensor and data carrier means.
- a deposit / withdrawal system comprising a composite card equipped with a personal identification number and biometrics information
- the ATM chip records a personal identification number, a transmission / reception device with a host computer, a personal identification number.
- a display device, a password input device, a magnetic stripe reader, and an IC chip reader / writer are provided, and biometric data detected by the biometric sensor and the previous
- the PIN code that is pre-registered in the IC chip and collated with the metric data, and if these data match, the ATM power is also recorded in the IC chip to the host computer.
- the ATM is enabled to perform ATM operations such as deposit and withdrawal operations after the host computer inquires the PIN, and the PIN number is updated and updated by the PIN code generator after the deposit and withdrawal operations are completed.
- the personal identification number is written into the IC chip by the reader / writer, and the updated personal identification number is transmitted to the host computer via the transmission / reception device.
- the fourth invention of the present application is a composite card equipped with a host computer as personal information data storage means, ATM as cash deposit / withdrawal means, a nanometric sensor and an IC chip as data carrier means.
- a card number, a personal identification number, and biometric information are recorded in the IC chip
- the ATM includes a transmission / reception device with a host computer and an IC chip reader / writer.
- the biometric data detected by the biometric sensor is collated with the biometric data registered in advance in the IC chip.
- the card number and password recorded on the IC chip are automatically sent to the host It was as ATM of operation becomes possible such as the operation of the deposit and withdrawal after the inquiry of personal identification numbers by computer.
- the fifth invention of the present application is a composite in which a host computer as personal information data storage means, ATM as cash deposit / withdrawal means, a nanometric sensor and an IC chip as data carrier means are mounted.
- a deposit / withdrawal system comprising a card
- the IC chip Card number, PIN number, and biometrics information are recorded in the ATM.
- the ATM includes a PIN number creating device, a transmission / reception device with a host computer, a PIN number display device, a PIN number input device, and an IC chip reader / writer.
- the biometric data detected by the biometric sensor is compared with biometric data pre-registered in the IC chip, and when these data match, the PIN display device displays the IC chip.
- the latest security code recorded on the card is input, and the entered security code and card number are sent to the sending / receiving device host computer to check the security code. Make it possible to operate ATMs such as money operations, and complete deposit and withdrawal operations.
- the personal identification number is updated by the personal identification number generation device later, the updated personal identification number is written to the IC chip by the reader / writer, and the updated personal identification number is transmitted to the host computer via the transmission / reception device. .
- the sixth invention of the present application is a composite equipped with a host computer as personal information data storage means, ATM as cash deposit / withdrawal means, a nanometric sensor and an IC chip as data carrier means.
- a deposit / withdrawal system equipped with a card, a card number, a password and biometrics information are recorded on the IC chip, and a password generating device, a transmission / reception device with a host computer, a password are stored in the ATM.
- a number display device, PIN code input device, and IC chip reader / writer are provided, and the biometric data detected by the biometric sensor is compared with biometric data pre-registered in the IC chip.
- the card number and personal identification number recorded on the IC chip are automatically sent to the host computer so that ATM operations such as deposit and withdrawal operations can be performed after the personal computer inquires about the personal identification number. After the operation is completed, the personal identification number is updated by the personal identification number creating device, the updated personal identification number is written to the IC chip by the reader / writer, and the updated personal identification number is further transmitted to the host computer via the transmission / reception device. I sent it.
- a conventional ATM for a magnetic card can be used as it is, and can be used as an ATM having a biometrics authentication function.
- the password is automatically transmitted as long as the biometric authentication is received, and the password is updated each time ATM is used. Even if the computer receives an attack, the password is not fixed, so it will not be repeatedly spoofed.
- passwords including alphabets, katakana, and special characters in addition to passwords that only consist of numbers can be used as passwords, the number of combinations that can be used increases, and even if there is a mischief by others, the error rate is high. Therefore, a psychological suppression effect can be expected.
- a non-contact IC chip can be used as the IC chip in consideration of convenience and durability. This improves the usability by protecting the data in the IC chip even in harsh environments where the composite card gets wet with water, or the card body gets dirty with rainwater or sludge.
- biometric authentication fingerprint, retina, iris (iris), facial appearance, blood vessel shape, palm shape, auricle, voice print, signature, keystroke, gene information DNA is a single authentication or a combination of multiple The identity was confirmed by modal authentication. For example, in the case of a bank card, a troublesome person is required to have a PIN reissued, and a stamp is required. For biometrics authentication, it is necessary to carry a seal to carry out a secure and reliable identification. Since there is no such thing, the adoption of a biometrics authentication system will lead to a reduction in bank counter operations.
- biometrics authentication data for multiple people is registered in one IC chip. I did it. As a result, even when multiple users such as corporate cards are assumed, it is possible to use any registered user by setting up multiple users, which improves operational efficiency.
- biometrics authentication data for multiple people a large amount of memory is required, so if there is a link between some IC chip and biometrics authentication data, the storage location is encrypted. You can save the data in a data storage location other than the IC chip after checking the data.
- the personal identification number management system of the present invention is a system using a magnetic card based on online authentication. Security and convenience are provided by adding a PIN code recording and reading function using iometric authentication.
- the ATM automatically transmits the password. Therefore, there is no need for the user to input the password, and there is no possibility of an input error. There is no need to memorize and write down the password, and it is possible to save the input. From the host computer's perspective, ATM power is sent in the same way as before, so there is no need to change the system and no extra costs are incurred.
- the user while inheriting the host computer system constructed with the conventional magnetic card, the user can obtain the password by the authentication by the biometric sensor mounted on the composite card. Can be displayed on the screen. You can authenticate the host computer by entering this PIN into the ATM using a numeric keypad. Since an action to confirm and enter the personal identification number is entered, the human interface can be used to give a psychological sense of security that everything is not left to the machine.
- the password is automatically updated after the password is automatically transmitted and the password is inquired by the host computer. Even if there is an attack on the host computer from other than ATM, the security level is improved because it can prevent repeated spoofing.
- the card number is stored in the IC chip, the data integrity is superior to that of the magnetic stripe, and the card user is only authenticated by the nanometrics. This eliminates the need to enter a password, thus preventing input errors, eliminating the need to memorize and write down passwords, and saving input. From the host computer's perspective, the PIN is sent from the ATM, so there is no change to the system.
- the card number is stored in the IC chip, the data integrity is superior to that of the magnetic stripe, and the user can obtain the password by using biometrics authentication. Since it can be displayed on the screen and the data can be transmitted after confirming by entering the personal identification number, there is a psychological sense of security through the combined use of the human interface.
- the card number is stored in the IC chip, the data integrity is superior to that of the magnetic stripe, and in addition to the effect of the invention of claim 4, the personal identification number Is automatically sent and the PIN is automatically updated after the inquiry of the host computer is completed.
- This automatic update function improves the security level by preventing repeated spoofing even if an attack to a host computer other than ATM is possible.
- the IC chip by using the IC chip as a non-contact IC chip, there is no terminal exposed to the outside like a contact type chip, so the durability as an IC card is improved. In addition, it will be stronger against unauthorized access by external force.
- the invention of claim 9 by adopting an IC chip having a memory capacity capable of storing biometrics authentication data, various biometrics authentications can be used alone or in combination. It can be handled even under level or environmental restrictions.
- a single card is used by a plurality of users, for example, in the case of a corporate card or the like, a plurality of people to be used are limited and all of them are used.
- biometrics data individually on an IC chip, any registrant can be certified alone. If only one person can register biometric data to be linked to a card, each person must go to the ATM every time he / she wants to use the card at an ATM, and multiple cards (one for each) Issuing biometric data) makes card management and issuance cost burdens difficult.
- biometrics data for multiple people is stored in a single composite card, multiple people can share a single card safely, improving work efficiency.
- biometrics data that is subject to privacy protection is stored on an IC chip of a composite card that is carried by an individual user rather than being stored on a host computer, and the biometrics authentication is also established. Otherwise, the PIN code recorded on the IC chip cannot be taken out of the card, and the biometric data does not come out of the card at all because the nanometric sensor itself is integrated with the IC card. It can be operated with peace of mind from the point of information protection. Further, since the above-mentioned noometric data is stored in a composite card carried by the user, it is not necessary to provide a new customer database to the ATM terminal, so the maintainability is excellent.
- biometric authentication is performed using a biometric sensor integrated with an IC card
- the host computer's online system does not need to be changed, although there are some changes to the ATM terminal. If you switch only ATM while operating, you can easily change the system, and if you use not only numbers but also alphabets for personal inquiries, the combination of passwords will increase and the effect of suppressing impersonation crime will be great.
- FIG. 1 Conceptual diagram of deposit / withdrawal system in Example 1 using fingerprint authentication
- FIG. 1 and FIG. 2 for Example 1 of the present invention
- FIGS. 3 and 4 for Example 2
- FIG. 5 and FIG. 6 for Example 3
- FIG. 7 for Example 4
- FIG. 8 shows Example 5 in FIG. 9 and FIG. 10
- Example 6 shows in FIG. 11 and FIG.
- the composite card 7 includes a fingerprint sensor 18 mounted on a plastic body, a magnetic stripe 8 and an IC chip 9, and an IC card antenna 10 connected to the IC chip 9. .
- a card number is recorded on the magnetic stripe 8, and the internal memory of the IC chip 9 has an authentication key code 11, a personal identification number 12, biometrics data 13, and a spare memory area 14.
- the user inserts the composite card 7 into a predetermined place of the ATM device. Then, in the case of a contact IC card, the biometric sensor 18 is driven by the input terminal of the contact IC card coming into contact with the power supply terminal on the ATM device side, and in the case of a non-contact IC card, the ATM device side The biometrics sensor 18 is driven by entering the operating frequency region of the high-frequency oscillator provided in FIG. Then, when the finger specified according to the guidance is applied to the sensor, fingerprint data 1 is read from the reading device, and the fingerprint that is preliminarily stored in the IC chip 9 is stored. Matched with data 13.
- the biometric sensor 18 of the composite card authenticates the fingerprint data of the person
- the password is stored in the IC chip 9 and sent to the host computer 5 via the ATM device 4.
- the host computer 5 compares the PIN number 12 sent to the PIN number stored in the customer database 6, and if it is verified that it is correct V ⁇ PIN number, the ATM job ( Allow processing (such as deposits and withdrawals).
- the personal identification number 12 is not sent to the host computer 5 except for the user. Therefore, it is not necessary to change the PIN 12 in the normal case, but if the physical structure of the IC chip 9 can be rewritten, it can be changed to the IC chip 9 and the database 6 of the host computer at the request of the user. It is possible to change the stored PIN 12. Also, the biometrics (fingerprint) data 13 can be updated as necessary as long as the physical structure of the IC chip 9 can be rewritten, and some protection may be applied.
- the IC chip module 9 stores an authentication key code 11, a personal identification number 12, and fingerprint data 13.
- an authentication key code 11 that is difficult to tamper with, such as a hierarchical authentication key code that generates an irreversible key.
- the hierarchical structure authentication key code is uniquely determined electronic data used for mutual authentication between the IC chip and the reader / writer.
- Master Module Power A derived hierarchical authentication key code that cannot be changed is ported from the master module to the IC chip module irreversibly by inter-module transfer, and the IC chip module has the same hierarchical authentication key code. It means something that can only communicate with the card reader / writer module!
- the radio wave emitted from the reader antenna 16 adjacent to the card slot 15 is received by the card antenna 10, and the carrier radio wave is rectified inside the IC chip 9.
- the drive power is supplied to the IC chip 9 by being rectified by the circuit, the IC chip 9 starts to operate, and the circuit inside the chip is shut down. Is reset, and response data is sent to the IC card reader / writer 17. Thereafter, the IC chip 9 and the module of the IC card reader / writer 17 mutually authenticate using the authentication key code 11.
- the user is required to place a finger on the fingerprint sensor 18 mounted on the composite card 7 in order to receive biometrics authentication, and the fingerprint of the finger is authenticated as the user's own. Then, the password 12 stored in the IC chip module 9 is displayed on the ATM display screen 21 as the password 23 read from the IC chip 9.
- the ATM user receives the inquiry from the host computer 5 by inputting the same number as the password displayed on the screen also using the numeric keypad input unit 19.
- the host computer 5 retrieves the corresponding personal identification number from the customer data base 6 and matches it with the personal identification number sent from the ATM card. Give instructions to accept user jobs (such as deposits and withdrawals).
- the password 12 read from the IC chip 9 it may be possible to change the font size so that, for example, a large font can be selected for the elderly.
- the password displayed on this screen is automatically updated during the operation, and when a predetermined operation is completed and a force is sent, the password 12 written on the IC chip 9 becomes a new password. Because it is updated, even if the security code is seen by someone else during the operation, the same security code can not be used next time, so you can operate the ATM with confidence.
- FIG. 4 is a flowchart for fingerprint authentication according to the present invention. The operation starts when the user touches the ATM screen (start).
- the magnetic head starts reading the magnetic data from the magnetic stripe 8 of the composite card 7 (reading data from the magnetic card).
- the controller 20 sends the card number to the host computer 5 via the communication network 25 (communication with the host computer is started).
- the host computer 5 searches the customer database 6 for the corresponding card number.
- the host computer 20 After retrieving the customer file, the host computer 20 displays an instruction to input a password from the ATM control unit 20 via the communication network 25 on the screen 24 (a password from the host). Number input guidance).
- the ATM user looks at the password guidance screen read from the IC chip and displays it on the same screen (password input guidance from the host). Enter your PIN from.
- the password entered from the numeric keypad input unit 19 is transmitted to the host computer 5 by the ATM control unit 20 via the communication network 25, and verified with the password stored in the customer database 6 (host Computer verification).
- the ATM terminal performs the following processing.
- fingerprints are used for biometrics authentication.
- retinas irises, facial features, blood vessel shapes, palms, etc.
- Multi-modal authentication can be considered, either single authentication or combination of multiple forms, ear pines, voiceprints, signatures, keystrokes, genetic information DNA, and authentication security by combining with public key authentication infrastructure PKI, elliptic function, etc. It is possible to strengthen this.
- the display screen of the password read from the IC chip module and the password (number not displayed) input from the numeric key input unit are displayed on the same screen. If so, separate screens may be used.
- a means for guiding the input of a personal identification number guidance by voice just by displaying a screen may be used.
- voice guidance it may be possible to give voice guidance to the number assigned to the key when touching the touch panel screen or keyboard. At that time, if the force is strong, use a combination of voice and beep sound, etc. so that the difference in finger pressure is recognized. It is convenient because you can enter the desired number without fail.
- FIG. 5 illustrates a third embodiment of the present invention.
- the composite card 7 includes a fingerprint sensor 18 mounted on a plastic body, a magnetic stripe 8, an IC chip 9, and an IC card antenna 10 connected to the IC chip 9.
- a card number is recorded in the magnetic stripe 8, and an authentication key code 11, a password number 12, biometrics data 13, and a spare memory area 14 are stored in the internal memory of the IC chip.
- the fingerprint data 1 is read from the fingerprint sensor 18 and pre-loaded onto the IC chip 9.
- the stored fingerprint data 13 is verified.
- the fingerprint data of the person Is stored in the IC chip 9 and the password 12 is sent to the host computer 5 via the ATM device 4.
- the host computer 5 compares the PIN number 12 sent to the PIN number stored in the customer database 6, and if it is verified that the PIN number is correct, the ATM job (payment / withdrawal) Etc.)
- the ATM terminal 4 When the job processing by the ATM terminal 4 is completed according to the instruction from the host computer 5, the ATM terminal 4 performs the following processing.
- the ATM ends the operation and returns to the initial screen.
- the personal identification number 12 registered in the IC chip 9 is automatically updated, so that it is safe even if a hacker accesses the host computer 5 by any chance.
- the fingerprint data 1 is read by the reading device power, and the IC chip 9 is collated with the fingerprint data 13 pre-saved at 9.
- the IC chip 9 authenticates the user's fingerprint data, it is stored in the IC chip 9 and The certificate number 12 is sent to the host computer 5 via the ATM device 4.
- the host computer 5 compares the PIN number 12 sent to the PIN number stored in the customer database 6 and if it is verified that it is the correct PIN number, the ATM job (payment / withdrawal etc.) ) Permit processing.
- the personal identification number 12 is not sent to the host computer 5 except for the person. Therefore, it is not necessary to change the personal identification number 12 in the normal case.
- the IC chip 9 can be rewritten, the IC chip 9 and the host computer database 6 can be requested at the request of the user. It is possible to change the password 12 stored in the memory.
- the metric data (fingerprint) data 13 can be rewritten in terms of the physical structure of the IC chip 9, it can be updated as needed, and some protection may be applied. It is done.
- the IC chip module 9 stores an authentication key code 11, a password number 12, fingerprint data 13, and a card number 26.
- the authentication key code 11 it is preferable to use a non-reversible key generation that is irreversible key generation, such as a hierarchical structure authentication key code.
- the hierarchical structure authentication key code is uniquely determined electronic data used for mutual authentication between the IC chip and the reader / writer.
- Master Module Power A derived hierarchical authentication key code that cannot be changed is ported from the master module to the IC chip module irreversibly by inter-module transfer, and the IC chip module has the same hierarchical authentication key code. It means something that can only communicate with the card reader / writer module!
- the radio wave emitted from the reader antenna 16 adjacent to the card slot 15 is received by the card antenna 10, and the carrier radio wave is rectified inside the IC chip 9.
- the drive power is supplied to the IC chip 9 by being rectified by the circuit, and the IC chip 9 starts to operate, and an initial reset is applied to the circuit inside the chip, to the IC card reader / writer 17.
- Send response data After that, the IC chip 9 and the IC card reader / writer 17 module use the authentication key code 11. Authenticate each other.
- the user is required to place the guided fingertip on the fingerprint sensor 18 to receive biometrics authentication, and when the fingerprint of the finger is authenticated, the IC
- the card number 26 stored in the chip module 9 is read out and sent from the ATM to the host computer 5 and the password inquiry command is sent from the host computer to the ATM, the password read from the IC chip 9 is read. Numbers 2 and 3 are displayed on the ATM display screen 21.
- the ATM user receives the inquiry from the host computer 5 by inputting the same number as the password displayed on the screen also using the numeric keypad input unit 19.
- the host computer 5 retrieves the corresponding personal identification number from the customer data base 6 and matches it with the personal identification number sent from the ATM card. Give instructions to accept user jobs (such as deposits and withdrawals).
- the password 12 read from the IC chip 9 it may be possible to change the font size so that, for example, a large font can be selected for the elderly.
- the password displayed on this screen is automatically updated during the operation, and when a predetermined operation is completed and a force is sent, the password 12 written on the IC chip 9 becomes a new password. Because it is updated, even if the security code is seen by someone else during the operation, the same security code can not be used next time, so you can operate the ATM with confidence.
- FIG. 10 is a flowchart for fingerprint authentication according to the present invention. The operation starts when the user touches the ATM screen (start).
- the IC chip is authenticated and reading of the card number 26 stored in the IC chip 9 is started (IC card power Data reading), the card number is sent by the ATM controller 20 to the host computer 5 via the communication network 25 (communication with the host computer is started).
- the host computer 5 searches the customer database 6 for the corresponding card number.
- the host computer 20 After searching the customer file, the host computer 20 displays an instruction to input a password to the user on the screen 24 from the ATM control unit 20 via the communication network 25 (a password from the host). Number input guidance).
- the ATM user looks at the password guide screen read from the IC chip while viewing the same screen (password input guidance from the host). Enter your PIN from.
- the personal identification number input from the numeric keypad input unit 19 is transmitted to the host computer 5 by the ATM control unit 20 via the communication network 25 and is collated with the personal identification number stored in the customer database 6 (host Computer verification).
- job processing such as deposit / withdrawal in ATM is executed (execution of processing).
- the ATM terminal performs the following processing.
- the display screen of the security code read from the IC chip module and the security code input from the numeric key input unit are displayed on the same screen. If so, separate screens may be used.
- a means for guiding the input of a personal identification number it is also possible to use voice guidance just by displaying the screen.
- voice guidance it may be possible to give voice guidance to the number assigned to the key when touching the touch panel screen or keyboard. At that time, if the force is strong, use a combination of voice and beep sound, etc. so that the difference in finger pressure is recognized. It is convenient because you can enter the desired number without fail.
- FIG. 11 illustrates a sixth embodiment of the present invention.
- the composite card 7 includes a fingerprint sensor 18 mounted on a plastic body, a magnetic stripe 8, an IC chip 9, and an IC card antenna 10 connected to the IC chip 9.
- the internal memory of the IC chip has an authentication key code 11, a password number 12, biometrics data 13, and a card number 26.
- the fingerprint data 1 is read from the fingerprint sensor 18 and pre-loaded onto the IC chip 9.
- the stored fingerprint data 13 is verified.
- the personal identification number 12 is sent to the host computer 5 via the ATM device 4.
- the host computer 5 compares the PIN number 12 sent to the PIN number stored in the customer database 6, and if it is verified that the PIN number is correct, the ATM job (payment / withdrawal) Etc.)
- the ATM terminal 4 When the job processing by the ATM terminal 4 is completed according to the instruction from the host computer 5, the ATM terminal 4 performs the following processing. 1. Generate a new PIN
- the ATM ends the operation and returns to the initial screen.
- the personal identification number 12 registered in the IC chip 9 is automatically updated, so that it is safe even if a hacker accesses the host computer 5 by any chance.
- the personal identification number 12 is automatically transmitted, it is not displayed on the ATM screen! /, So even if the ATM screen is displayed, the personal identification number is not known.
- fingerprints are used for biometric authentication.
- the biometrics authentication can use the retina, iris (iris), facial appearance, blood vessel shape, palm, etc.
- Multi-modal authentication can be considered, either single authentication or combination of multiple forms, ear pines, voiceprints, signatures, keystrokes, genetic information DNA, and authentication security by combining with public key authentication infrastructure PKI, elliptic function, etc. It is possible to strengthen this.
- Card numbers, metric data, passwords, etc. written to the IC chip are encrypted in plaintext, for example, RSA encryption based on the prime factorization problem or discrete logarithm problem as a public key encryption algorithm.
- the DSAZECDSA encryption, etc. may be used, and it is also possible to use a public key authentication infrastructure PKI that uses electronic signatures.
- the security code can be used for the purpose of improving the convenience of the user. It is also conceivable to provide a screen or voice guidance for the password entered by keystroke or character selection on the input screen. In particular, in the case of voice guidance, there is both a function that guides one character at a time when each character is input and a function that guides all the digits before sending after completing the input, and repeatedly guides at the request of the input person It is preferable. This is convenient because even visually impaired people can input characters while checking whether they are correct one by one.
- the IC chip reader / writer may be connected to the PC and the personal identification number recorded on the composite card may be used. Possible power Even in an environment where the composite card cannot be accessed, a password that can be used in combination with a reliable external authentication such as a mobile phone number, fixed phone number (caller ID display function) or electronic certificate is renewed. If you register it in the host computer first, you can access it from other than ATM, such as a mobile phone or the Internet, without using a composite card PIN.
- the cellular phone is equipped with a biometric sensor and an IC chip as a data carrier means, and the IC chip is configured to record a card number, a password, and biometric information, and the cellular phone is placed at a predetermined location of the ATM.
- the IC chip is configured to record a card number, a password, and biometric information, and the cellular phone is placed at a predetermined location of the ATM.
- each password is assigned a memory space of 4 bytes. This is not 4 bytes representing 4 characters. Breaking it down into bits, 4 bytes can be thought of as 4 times 8 bits, or 32 bits of data. If you represent a password of 4 bytes in 32 bits, you can theoretically have 4,294,967,296 combinations, and you can combine more than 420,000 times the current 4-digit password (10,000). Become.
- This 32-bit binary code can be recorded as binary data on the IC chip as it is. In this case, it is difficult to manually input 32-bit data such as a keyboard.
- the password when the password is proposed on the screen, it is a copy that is generally used by a word processor or the like for the screen controller of the ATM terminal. Copy the security code data that has been provided with the & paste function and read the IC chip power.
- a word processor or the like for the screen controller of the ATM terminal.
- a user number is stored in pairs with fingerprint data, and a switch is provided on the card, for example, when used. It can be selected, or it can be a method of saving personally identifiable data such as user number and name paired with fingerprint data and selecting it from an input means such as an ATM numeric keypad when using it, or other than fingerprints
- Biometrics authentication retina, iris (iris), facial appearance, blood vessel shape, palmar shape, auricle, voice print, signature, keystroke, genetic information DNA has any single authentication or multi-modal authentication combined ) May be applied for personal identification.
- the card number is also read out from the IC chip power and sent to the host computer from the ATM transceiver.
- the ATM can receive a PIN number inquiry command from the host computer, send the PIN number after biometrics authentication with the IC chip, and increase the load on the host computer!
- the IC chip may first perform biometrics authentication, verify the identity, and communicate with the host host to send the card number and PIN simultaneously or separately.
- the embodiment of the present invention is based on the online, and the password is also stored on the IC chip for the online authentication. Separately, it is also possible to store an offline password on the same IC chip.
- a biometric sensor is mounted on a composite card, it is safe because it can be used offline.
- offline save the transaction data on an IC chip and use it at an ATM that can be online at a later date. After logging in to the host computer using the online PIN, the offline transaction data is stored. It is possible to collate with offline transaction data sent to the host computer separately from the offline terminal.
- the ATM can be operated by entering a personal identification number.
- the PIN code may be read from the IC card after it has been authenticated by the PIN number, etc., or the host computer power data will be received by using the authentication function of a security communication terminal such as a mobile phone. It is exempted from taking.
- the IC chip 9 mounted on the composite card 7 uses a contact-type module, the IC chip 9 is energized with only half of the card 7 mounted on the IC card reader / writer inserted into the IC card reader / writer. It is conceivable that the biometric sensor is operated while the IC chip 9 is energized by arranging the biometric sensor in the remaining half of the area.
- the ATM usable by inserting the composite card into the ATM with the power turned on by installing the power in the composite card and receiving authentication in the composite card before inserting the card into the ATM. . In this case, it is possible to set a valid time for biometric authentication using an IC chip, and for example, if the composite card 7 is not inserted into the ATM within 10 seconds, the authentication becomes invalid.
- the composite card 7 is placed on the antenna 16 with the fingerprint sensor 18 (biometric sensor) facing up. It is possible to receive biometrics authentication by placing the finger on the fingerprint sensor 18 while the fingerprint sensor 18 is enabled by supplying power from the antenna 16 to the IC chip 9. If the card 7 has a built-in power supply, or if power is supplied from the outside while touching the fingerprint sensor 18 integrated with the composite card 7, the IC chip 9 can be held with the composite card 7 in hand. It is also possible to receive biometrics authentication by, and then insert the card into the ATM and receive the prescribed ATM service. Also, in this case, some selection means such as a small mechanical switch or touch switch or touch panel liquid crystal screen is mounted on the composite card 7 so that ATM functions can be selected on the composite card. You can also think about doing it.
- the force using the IC chip 9 driven by electricity is not limited to electricity.
- an optically driven IC chip may be used.
- the communication between the IC card reader / writer 17 and the composite chip uses light. It is possible to use an optical sensor in place of the card, and when the power is built into the composite card 7 or when external power is supplied while holding the card, the fingerprint integrated with the card While the sensor 13 is in contact with the IC card reader / writer 1 7 from the compound card 7 to the light receiving element of the IC card, the IC card sends light to establish communication, so the compound card 7 is held in the hand.
- a switch means such as a touch panel liquid crystal screen is mounted on the composite card 7 so that ATM function selection can be performed on the composite card 7.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/013966 WO2006033161A1 (ja) | 2004-09-24 | 2004-09-24 | 入出金システム |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/013966 WO2006033161A1 (ja) | 2004-09-24 | 2004-09-24 | 入出金システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006033161A1 true WO2006033161A1 (ja) | 2006-03-30 |
Family
ID=36089928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/013966 WO2006033161A1 (ja) | 2004-09-24 | 2004-09-24 | 入出金システム |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2006033161A1 (ja) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000215172A (ja) * | 1999-01-20 | 2000-08-04 | Nec Corp | 個人認証システム |
JP2001222661A (ja) * | 2000-02-08 | 2001-08-17 | Oki Software Kk | 自動取引装置 |
JP2001273498A (ja) * | 2000-03-24 | 2001-10-05 | Matsushita Electric Ind Co Ltd | バイオメトリックに基づく本人認証装置、本人認証システム、本人認証用カード及び本人認証方法 |
JP2002281028A (ja) * | 2001-01-12 | 2002-09-27 | Nippon Telegr & Teleph Corp <Ntt> | 認証システムおよび方法、記録媒体、プログラム |
-
2004
- 2004-09-24 WO PCT/JP2004/013966 patent/WO2006033161A1/ja active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000215172A (ja) * | 1999-01-20 | 2000-08-04 | Nec Corp | 個人認証システム |
JP2001222661A (ja) * | 2000-02-08 | 2001-08-17 | Oki Software Kk | 自動取引装置 |
JP2001273498A (ja) * | 2000-03-24 | 2001-10-05 | Matsushita Electric Ind Co Ltd | バイオメトリックに基づく本人認証装置、本人認証システム、本人認証用カード及び本人認証方法 |
JP2002281028A (ja) * | 2001-01-12 | 2002-09-27 | Nippon Telegr & Teleph Corp <Ntt> | 認証システムおよび方法、記録媒体、プログラム |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4462863B2 (ja) | 本人認証装置、生体特徴情報更新方法およびプログラム | |
US8458484B2 (en) | Password generator | |
JP4187451B2 (ja) | 個人認証用デバイスと携帯端末装置 | |
US20030115490A1 (en) | Secure network and networked devices using biometrics | |
KR100805280B1 (ko) | 생체인증대응 자동거래장치 | |
US20080028230A1 (en) | Biometric authentication proximity card | |
JP2016535357A (ja) | 身元照合装置および方法 | |
JP2001236324A (ja) | バイオメトリクス情報による個人認証機能を有する携帯電子装置 | |
JP2003517658A (ja) | 携帯型電子的課金/認証デバイスとその方法 | |
JP2007011804A (ja) | 生体認証方法及び生体認証システム | |
EP2766848A1 (en) | Id authentication | |
KR100788768B1 (ko) | 현금 자동예금지불시스템 및 현금자동거래장치 | |
KR20110002968A (ko) | 생체 인증을 이용한 금융 거래 서비스 제공 방법 및 시스템과 그를 위한 휴대용 저장 장치 | |
JP4834785B2 (ja) | 現金自動預払システム及び装置 | |
JP2003346098A (ja) | 個人認証システム、個人認証方法及び個人認証用端末装置 | |
JP2007164423A (ja) | 個人認証システム及び個人認証方法 | |
JP2002269052A (ja) | 携帯端末認証システム、携帯端末認証方法ならびに携帯端末認証プログラムおよび該プログラムを記憶したコンピュータ読み取り可能な記録媒体 | |
JP5075675B2 (ja) | 生体認証システムおよび生体認証装置 | |
KR20110002967A (ko) | 생체 인증을 이용한 실명 인증 서비스 제공 방법 및 시스템과 그를 위한 휴대용 저장 장치 | |
US20210133725A1 (en) | Systems methods and devices for increasing security when using smartcards | |
WO2006033161A1 (ja) | 入出金システム | |
JP2006092444A (ja) | 入出金システム | |
JP2003067687A (ja) | 電子認証システムとそのカード | |
WO2006022019A1 (ja) | 入出金システム | |
JP2002288623A (ja) | Icカードシステム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 04788125 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |