CN101373526A - Security card with stored biometric data and method of using same - Google Patents
Security card with stored biometric data and method of using same Download PDFInfo
- Publication number
- CN101373526A CN101373526A CNA2007101430806A CN200710143080A CN101373526A CN 101373526 A CN101373526 A CN 101373526A CN A2007101430806 A CNA2007101430806 A CN A2007101430806A CN 200710143080 A CN200710143080 A CN 200710143080A CN 101373526 A CN101373526 A CN 101373526A
- Authority
- CN
- China
- Prior art keywords
- card
- holder
- identity
- confirm
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 34
- 230000015654 memory Effects 0.000 claims abstract description 15
- 230000008676 import Effects 0.000 claims description 8
- 230000036541 health Effects 0.000 claims description 5
- 230000005764 inhibitory process Effects 0.000 claims description 4
- 238000010200 validation analysis Methods 0.000 claims description 4
- 230000005055 memory storage Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 21
- 210000003811 finger Anatomy 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000004080 punching Methods 0.000 description 6
- 239000011521 glass Substances 0.000 description 4
- 210000005224 forefinger Anatomy 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000000151 deposition Methods 0.000 description 2
- 230000008570 general process Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 241001203089 Trogium pulsatorium Species 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000013502 data validation Methods 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
Images
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
The invention provides a security card with stored biometric data and method of use thereof, disclosing that the security card includes personal biometric data to identify or confirm the individual, the biometric data of the cardholder is stored in the memory of the security card assigned to the cardholder, when the security card is used, the cardholder enters the biometric data, which is then compared with the biometric data stored in the security card, and if the entered biometric data matches the biometric data stored in the security card, the identity of the cardholder can be confirmed. The security card also includes a transparent input area that identifies the cardholder on a verification machine.
Description
Technical field
The present invention discloses the method for a kind of relevant I.D. and safety card holder identity validation, is meant the safety card and the using method thereof that there are the unique biological attribute data of holder individual especially.
Background technology
Credit card extensively uses in the whole world, makes consumer behavior and service all convenient more, and allowing the user do shopping does not need to carry cash.
Yet the credit card deathwatch case of deceiving emerges in an endless stream, and develops into the subject matter that financial institution faced of credit cardholder and hair fastener gradually.If credit card is lost, the burglar only need forge holder's signature, and since cardholder signature just at the back side of credit card, therefore quite easily by counterfeit,, cause the consumption bill of holder's palpus burden without its permission so the burglar can use credit card easily, and in the part case, be the consumption responsibility of shouldering stolen credit card by financial institution, yet these two kinds of examples are all started because of in the careless mistake of holder or hair fastener financial institution.
With reference to Figure 1A, Figure 1A is the front schematic view of general credit card in the prior art.
Figure 1A as shown, the front of general credit card 100 comprises the trade mark 110 of the financial institution that sends credit card 100,130 reliefs of holder name 120 and account number are in credit card 100 really good lower portion.
With reference to Figure 1B, Figure 1B is the schematic rear view of general credit card in the prior art.
The back side of general credit card 100 comprises a magnetic stripe 140, and financial institution just was stored in account information wherein before a credit card 100 is given the client in advance; Another weakness of general credit card 100 is that the burglar can read or duplicate the data that are stored in the magnetic stripe 140.
Comprise also that at the back side of general credit card 100 signature strip 150 allows the holder sign signature 160, as mentioned above, general credit card 100 provides the burglar example of a cardholder signature 160, allows the burglar can practise the imitation signature, and sign the spitting image of after just can obscure the cashier, make it accept this card.
With reference to figure 1C and Fig. 1 D, Fig. 1 C is a calcspar of confirming credit card in the prior art with general networking, and Fig. 1 D is the general process flow diagram that uses credit card in the prior art.
In step 185, machine for punching the card 171 is printed off a bill of signing, and as step 186 user sign signing on the bill, then the cashier will sign that client on the bill signs and the signature of back of credit cards compares in the step 187.
Another shortcoming of general credit card is that data are stored in Core server, and this just as having opened a sect, can crack the hacker to enter and steal data in the server for the hacker.
Summary of the invention
The present invention proposes a kind of safety card and using method thereof that has biological attribute data, and to solve the holder very with after the credit card loss, personal information is by problems such as other people steal.
For reaching above-mentioned purpose, the present invention proposes a kind of safety card and using method thereof that has biological attribute data.
Biological attribute data comprises fingerprint, iris or eyes, palmmprint, face mask, DNA data or above combination for instance.
Before sending safety card, ard issuers obtains the template of user's biological information earlier, and with information storage in the internal memory of safety card, when card safe in utilization, the biological attribute data that is stored in the card will compare with the biological attribute data that the user is provided, for example, if biological attribute data is the fingerprint of right hand forefinger, then the user is placed on right hand forefinger on the verifier, verifier can carry out the data contrast, utilizes the method, even safety card is lost or is stolen, because other people biological attribute data and holder's biological attribute data do not conform to, so nobody can use this safety card.
In an embodiment of the present invention, safety card is a credit card, and the holder gives the cashier with safety card and operates transaction when concluding the business, and then scans the feature of the privileged site of tool uniqueness on holder's health, and its people's biological attribute data is provided; The cashier will utilize scanning, swipe the card or mode such as plug-in card is put into a calculating punch or a verifier again in the safety card, this device read biological attribute data or scanning holder's biological attribute data from safety card after is compared two data, if the data that are stored in the safety card conform to the data that the holder provides, then confirm holder's identity.
In the another embodiment of the present invention, safety card is an identity identification card, the holder inserts identification card in the verifier and biological attribute data is provided, fingerprint for example is provided, allow verifier contrast be stored in the biological attribute data that biological attribute data in the identification card and holder are provided, if two identical then verifiers of data are confirmed this holder's identity.
Compared with prior art, the present invention has the following advantages:
The present invention proposes a kind of safety card and using method thereof that has biological attribute data, is not have data through network delivery, and data validation is to be carried out at local side by verifier, can reduce identity or cardholder data is stolen.
Another advantage of the present invention is to have only holder oneself to know will provide for which kind of biological attribute data, and since the biological characteristic that can import more and more after the variation, safety coefficient also increases thereupon, allows the burglar not know even which kind of biological attribute data this uses.
Description of drawings
Figure 1A is the front schematic view of general credit card in the prior art;
Figure 1B is the schematic rear view of general credit card in the prior art;
1C figure is a calcspar of using general networking checking credit card in the prior art;
1D figure is the general process flow diagram that uses credit card in the prior art;
Fig. 2 A is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 B~2D is the synoptic diagram of safety card back side embodiment among the present invention;
Fig. 2 E~2F is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 G~2H is the process flow diagram of a kind of implementation method of card safe in utilization among the present invention;
Fig. 2 I~2J is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 K is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 3 is the process flow diagram of a kind of implementation method of credit card safe in utilization among the present invention.
The primary clustering symbol description is as follows:
100 credits card, 110 trade marks
120 holder name, 130 account numbers
140 magnetic stripes, 150 signature strip
160 signatures, 170 network validation credits card
171 machine for punching the card, 172 telephone wires
173 Core servers, 200 safety cards
210 trade marks, 220 holder name
230 account numbers, 240 internal memories
250 magnetic stripes, 260 signature zones
270 signatures, 290,291 transparent input areas
Embodiment
With reference to figure 2A, Fig. 2 A is according to the synoptic diagram in the front of safety card shown in the embodiment of the invention.
Shown in Fig. 2 A, safety card 200 of the present invention comprises a trade mark 210 or the title of safety card publisher, the trade mark diagram can be the title or the Business Name of financial institution for instance, the front 200 of safety card also comprises holder name 220 and account number 230 or user's numbering, internal memory 240 is attached or is embedded in the safety card 200, when the user wants card 200 safe in utilization, the user provides biological information (biometric information) specific sample or example, owing to have same biological characteristic (biometrics) without any two people, therefore biological information can be used for the single user of identification, biological information is stored in the internal memory 240 of safety card 200, in the time of card safe in utilization 200, the holder provides or imports their biological attribute data, this input meeting compares with the biological attribute data that is stored in the internal memory 240, if both are identical, then can confirm holder's identity.
With reference to figure 2B, Fig. 2 B is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
As Fig. 2 B, the back side of safety card 200 comprises 250 and signature zones of a magnetic stripe (magnetic strip) (signature area) 260, information is stored in magnetic stripe 250, when safety card in use, this information can be read, and signature zone 260 allows the user to sign their signature 270.
Holder's information comprises account number information, account number, Personal Identification Number (personalidentification number), employee number, safe class, rank (rank), financial institution's identification, card number, hair fastener identified in units, Business Name or these combination.
With reference to figure 2C, Fig. 2 C is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
In the embodiment in another zone of not signing, for the signature of avoiding the holder is seen to increase security, in the present embodiment, when card safe in utilization, holder's Autograph Session compares with the signed data that is stored in the safety card internal memory, and this program relies on the cashier to compare reliable that signature comes.
In the embodiment in another zone of not signing, can be used for when not needing signature just can card safe in utilization the time, therefore biological characteristic is with more complicated and more impossible duplicating, and compares the biological information that biological attribute data and user provide in the safety card internal memory more perfect security can be provided.
With reference to figure 2D, Fig. 2 D is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
In 2D figure illustrated embodiment, magnetic stripe does not all exist with the signature zone, in this embodiment, usually the information meeting and the biological attribute data that are placed on magnetic stripe are placed in the internal memory of safety card together, because if biological attribute data can't be confirmed, this information can't be read so, and this measure further increases the security of information.Otherwise the data in the magnetic stripe of leaving in does not need holder's input just can pass through machine for punching the card (card swipe machine) to read.
With reference to figure 2E, Fig. 2 E is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
In another embodiment of the present invention, the front of safety card 200 has comprised trade mark 210, holder name 220 and has deposited the internal memory 240 of holder's biological attribute data that safety card 200 does not show holder's account number and identification number in this embodiment.
With reference to figure 2F, Fig. 2 F is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
Among the embodiment shown in Fig. 2 F, holder name and account number are not presented on the safety card 200, and this measure can further increase security, and nobody can learn whom this safety card belongs to except the holder.
With reference to figure 2G, Fig. 2 G is the process flow diagram of safety card using method in the embodiment of the invention.
Shown in Fig. 2 G, the method 280 of card safe in utilization has comprised that inserting safety snaps into verifier in step 281, their biological characteristic input is provided step 282 holder afterwards, at input of step 283 verifier comparison biological characteristic and the biological attribute data that leaves in the safety card, if data fit, to confirm holder's identity as step 184 verifier, in case holder's identity is identified, described in step 285, account number information will be sent to the account and confirm center (account confirmationcenter), the account confirms the center will judge whether the enough amount of money is arranged among the account, and confirm message to verifier one of step 286 affirmation center passback, then step 287 holder will get a receipt.
In this embodiment, holder's account information can not be sent out before holder's identity identification is identified, this measure provides more generally in user's identity before signature is identified, and account information just is sent to the higher security of classic method of central server.
With reference to figure 2H, Fig. 2 H is the process flow diagram of the safety card using method of drawing according to the embodiment of the invention.
Shown in Fig. 2 H, the method 280 of card safe in utilization has comprised that inserting safety snaps into verifier in the step 281, the holder provides its personal biology characteristics input in step 282 afterwards, and in step 283, utilize verifier comparison biological characteristic to import and the biological attribute data that leaves in the safety card, if data fit, to confirm holder's identity as step 184 verifier, seeing through network without any information in this embodiment transmits, proving program only carries out via verifier at local side, the method provides the security of holder's the best, because can be stored on network or server, so data of cardholder can't be stolen or usurp without any data of cardholder.
With reference to figure 2I, Fig. 2 I is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
Shown in 2I figure in the present embodiment, safety card 200 has comprised trade mark 210, internal memory 240 and a transparent input area 290 of importing their biological attribute data for the user, for instance, after safety card is inserted into verifier, the holder pushes finger at transparent input area 290, the verifier scanning fingerprint and with leave on the safety card 200 internal memory 240 stored finger print datas in and do contrast.
In this embodiment, because finger can directly not touch verifier, therefore fingerprint can not be transferred (transferred), for instance, if the surface of verifier is a glass and the user pushes their fingerprint scans on glass, stay residual fingerprint on glass possibly, though difficulty still still might be from the copy of obtaining fingerprint on glass for the burglar, yet in the present embodiment, the holder with their fingerprint by being pressed on the transparent input area 290, this zone is between finger and test and levy in the middle of the machine surface, even it also is to stay transparent input area 290 but not on the verifier that fingerprint is transferred, transparent input area 290 can be removed the vestige of fingerprint easily by the cleaning of being erased.
With reference to figure 2J, Fig. 2 J is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
In the embodiments of the invention, safety card 200 comprises a plurality of transparent input areas, among the embodiment shown in Fig. 2 J, safety card 200 comprises the first transparent input area 290 and the second transparent input area 291, allow two biological attribute datas to import with the time, owing to need a plurality of independently biological characteristic inputs, therefore security also increases, in other embodiments of the invention, safety card comprises a plurality of transparent input areas, and safety card comprises four transparent input areas for instance, input between four fingers of palm are examined at the same time, or eight transparent input areas, then four of both hands fingers all can be at the same time between input.
With reference to figure 2K, Fig. 2 K is the positive legend of the safety card of drawing according to the embodiment of the invention.
In this embodiment, no any information on the safety card 200, safety card 200 includes only an internal memory 240 of depositing holder's biological attribute data, present embodiment provides the highest security, holder's signature, name, account number can not be presented on the card, if card is lost, the burglar can not learn whom this card belongs to yet, therefore this card is otiose to the burglar, above the trade mark of card issuer or company can not be indicated in yet in addition, therefore the no one can know how this uses this card, and therefore except the holder, how or where the no one knows will use this safety card.
In an embodiment of the present invention, Personal Identification Number or password leave in the internal memory of safety card, and the holder inputs identification number with biological attribute data or password is finished the affirmation flow process.
With reference to figure 3, Fig. 3 comes identification holder's process flow diagram for card safe in utilization in the embodiment of the invention.
In the embodiment of a plurality of biological characteristic inputs of needs of the present invention, for instance, fingerprint and iris can be scanned and contrast with the biological attribute data that leaves in the card.
In another embodiment of the present invention, biological attribute data is input in regular turn, for instance, first is input right hand forefinger, import the left hand middle finger again, import hand thumb again, in this embodiment, the order of input has increased the complexity that will usurp safety card, and having only the holder to know will according to what kind of order input.
In an embodiment of the present invention, safety card can be in conjunction with credit card, identification card, driving license, gate inhibition's card, employee's card, passport, health care card, Automatic Teller Machine card, bank card, debit card (debit card), transportation card (transit card), public transportation card, resident identification card (national identification card) or member card.
As mentioned above, the invention provides the safety card of additional holder's biological attribute data, when card safe in utilization, the holder will provide the biological attribute data input, and this input meeting compares with the data that leave safety card in, if coincide, can confirm holder's identity, and so have only the holder safe in utilizationly to block, even card is stolen, the burglar also can't use, and what kind of biological characteristic input has only the holder to know in addition needs.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.
Claims (20)
1. a safety card that is used to confirm holder's identity is characterized in that, comprising:
One internal memory is used to store biological attribute data, and the uniqueness of described biological attribute data is for can differentiate described holder.
2. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that, also comprise a transparent input area, can on a verifier, differentiate described holder.
3. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that, also comprise a plurality of transparent input areas, can on a verifier, differentiate described holder.
4. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that, also comprise a magnetic stripe, be used to store described holder's information.
5. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that, also comprise a signature zone, be used to sign a cardholder signature.
6. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that described smart card comprises a credit card, an identity identification card, driving license, gate inhibition's card, employee's card, passport, health care card, Automatic Teller Machine card, bank card, debit card, transportation card, public transportation card, resident identification card or member card.
7. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that described biological attribute data comprises fingerprint, iris or eyes, palmmprint, face mask, DNA data or described above combination.
8. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that, the described holder's of described memory storage information.
9. be used to confirm the safety card of holder's identity according to claim 1, it is characterized in that described cardholder information comprises account information, account number, Personal Identification Number, employee number, safe class, rank, financial institution's identification, card number, hair fastener identified in units, Business Name or described above combination.
10. a method of utilizing safety card to confirm holder's identity is characterized in that, comprises the following steps:
One holder receives the biological attribute data input; And
The biological attribute data of input is compared with the biological attribute data that is stored in the described safety card, to confirm described holder's identity.
11., it is characterized in that also be included in described safety card is issued before the described holder, the biological attribute data with described holder is stored in the described safety card earlier as utilizing as described in the claim 10 safety card to confirm the method for holder's identity.
12. as described in claim 10, utilize safety card to confirm the method for holder's identity, it is characterized in that described smart card comprises a credit card, an identity identification card, driving license, gate inhibition's card, employee's card, passport, health care card, Automatic Teller Machine card, bank card, debit card, transportation card, public transportation card, resident identification card or member card.
13. as described in claim 10, utilize safety card to confirm the method for holder's identity, it is characterized in that described biological attribute data comprises fingerprint, iris or eyes, palmmprint, face mask, DNA data or described above combination.
14., it is characterized in that as utilizing as described in the claim 10 safety card to confirm the method for holder's identity, transmit account information to a financial institution after also being included in described holder and identity validation, enough pay the consumption expenditure to confirm account's balance or credit line.
15. a method of utilizing safety card to confirm holder's identity is characterized in that, comprises the following steps:
One holder's biological attribute data is stored in the safety card;
Read the biological attribute data of importing by described holder; And
The biological attribute data of input is compared with the biological attribute data that is stored in the described safety card, to confirm described holder's identity.
16. the method for utilizing safety card to confirm holder's identity as claimed in claim 15 is characterized in that, also is included in to read before the biological attribute data that described holder imports, and earlier described safety card is inserted in the verifier.
17. as described in claim 16, utilize safety card to confirm the method for holder's identity, it is characterized in that described verifier reads the described biological attribute data of input, and itself and the biological attribute data that is stored in the described safety card are compared.
18. as described in claim 15, utilize safety card to confirm the method for holder's identity, it is characterized in that described smart card comprises a credit card, an identity identification card, driving license, gate inhibition's card, employee's card, passport, health care card, Automatic Teller Machine card, bank card, debit card, transportation card, public transportation card, resident identification card or member card.
19. as described in claim 15, utilize safety card to confirm the method for holder's identity, it is characterized in that described biological attribute data comprises fingerprint, iris or eyes, palmmprint, face mask, DNA data or described above-mentioned combination.
20., it is characterized in that as utilizing as described in the claim 15 safety card to confirm the method for holder's identity, transmit account information to a financial institution after also being included in described holder's identity validation, enough pay the consumption expenditure to confirm account's balance or credit line.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101430806A CN101373526A (en) | 2007-08-23 | 2007-08-23 | Security card with stored biometric data and method of using same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101430806A CN101373526A (en) | 2007-08-23 | 2007-08-23 | Security card with stored biometric data and method of using same |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101373526A true CN101373526A (en) | 2009-02-25 |
Family
ID=40447680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101430806A Pending CN101373526A (en) | 2007-08-23 | 2007-08-23 | Security card with stored biometric data and method of using same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101373526A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102567860A (en) * | 2012-02-13 | 2012-07-11 | 黄启迪 | Member function system based on identity card recognition function |
CN103150553A (en) * | 2013-02-06 | 2013-06-12 | 北京中科虹霸科技有限公司 | Mobile terminal and method for realizing multi-mode identity characteristic recognition |
CN103400180A (en) * | 2013-04-02 | 2013-11-20 | 谢济鸿 | Iris authenticated bank card |
CN104462926A (en) * | 2014-12-23 | 2015-03-25 | 大唐微电子技术有限公司 | Intelligent card identity recognition method and system |
CN107316360A (en) * | 2017-06-22 | 2017-11-03 | 成都智慧家信息技术有限公司 | Intelligent access control system for security protection |
CN108701383A (en) * | 2016-03-03 | 2018-10-23 | 维普公司 | Attack resistance bio-identification authorization device |
-
2007
- 2007-08-23 CN CNA2007101430806A patent/CN101373526A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102567860A (en) * | 2012-02-13 | 2012-07-11 | 黄启迪 | Member function system based on identity card recognition function |
CN103150553A (en) * | 2013-02-06 | 2013-06-12 | 北京中科虹霸科技有限公司 | Mobile terminal and method for realizing multi-mode identity characteristic recognition |
CN103400180A (en) * | 2013-04-02 | 2013-11-20 | 谢济鸿 | Iris authenticated bank card |
CN104462926A (en) * | 2014-12-23 | 2015-03-25 | 大唐微电子技术有限公司 | Intelligent card identity recognition method and system |
CN108701383A (en) * | 2016-03-03 | 2018-10-23 | 维普公司 | Attack resistance bio-identification authorization device |
CN107316360A (en) * | 2017-06-22 | 2017-11-03 | 成都智慧家信息技术有限公司 | Intelligent access control system for security protection |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6871784B2 (en) | Security in mag-stripe card transactions | |
US20020163421A1 (en) | Personal fingerprint authentication method of bank card and credit card | |
US8050992B2 (en) | Secure card with stored biometric data and method for using the secure card | |
NZ522686A (en) | Secure biometric identification | |
KR20070038451A (en) | Electronic transaction verification system | |
US20060174134A1 (en) | Secure steganographic biometric identification | |
CN101373526A (en) | Security card with stored biometric data and method of using same | |
Al Imran et al. | OTP based cardless transction using ATM | |
JP4890774B2 (en) | Financial transaction system | |
JP4671838B2 (en) | Automatic cash transaction equipment | |
JP4500760B2 (en) | IC card authentication system | |
JP4834785B2 (en) | Automatic cash deposit system and apparatus | |
KR20080010549A (en) | Unmanned loan processing unit | |
US11651182B2 (en) | Cards and documents | |
JP4117335B2 (en) | IC card authentication system | |
JPH11312247A (en) | Handwriting person identifying method and electronic pen authenticating device | |
JP2006099313A (en) | Transaction system | |
JP5243926B2 (en) | Authentication system | |
JP5191353B2 (en) | Personal information acquisition device | |
JP2008004104A (en) | IC card authentication system | |
KR20000012471A (en) | 1:1 pocket book for cogniting a finger mark by electronic system, method for cogniting the same and instrument for supplying cash using the same | |
JPH04310180A (en) | Transaction processing system for banking online system | |
AU2001255978B2 (en) | Secure biometric identification | |
KR20010088732A (en) | Non-credit card system | |
JP2009086795A (en) | IC card issuance method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090225 |