Many passwords early warning type internal memory lock bank card
(1): technical field: the bank card that the invention belongs to a kind of software and hardware encryption and monitor portion trading activity.
(2): background technology: bank card generally all is magnetic card, utilizes the magnetic stripe information-recording exactly.Its secret means are passwords, and magnetic stripe is as auxiliary secret means.The design that it also has bad password input number of times to successively decrease.Aspect the bank foreground, safety precaution mainly relies on I.D. and bank clerk identification.Card number does not have secrecy provision, and just the transaction of printing has the encryption asterisk with bar.
The applicant thinks that bank card has the improved place of being worth in the following areas by analysis:
1: according to negotiator's trading activity and purpose rather than according to whether meeting trading rules bank card business dealing is divided into two classes, i.e. normal and unusual transaction, existing bank card business dealing can not distinguished this two kinds of situations.
2: existing bank card business dealing All Activity action must be carried out in Unionpay's terminal.
3: a lot of units require number of the account is provided, and this can cause holder's full detail to be grasped by it.
4: when the holder handles foreground modification password business, do not have other restriction, only need I.D..
5: card number is that expressly all professional card numbers have only one.
6: magnetic strip information has been put down in writing holder's privacy information, particularly ID (identity number) card No..
7: password is fixed, and original password has only six, is only limited to arabic numeral.
(3): summary of the invention and principle:
Technical scheme: the present invention realizes by following measure; it is to change the control cmi code with numeral or combination of numbers to be converted to technical foundation; the built-in storage card of bank card and internal memory; take multiple input mode; the partial data lab setting is entered bank; the different trading function module of multiple synthetic electronic cipher division of labor control is set, restriction chain transaction, monitoring or the digital system chip carrier of the unusual or arm's length transaction behavior of part by oneself.
Technical characterstic: the present invention has a plurality of passwords, the password that needs the holder to remember is few, the present invention can the control section trading activity, its manufacturing process is than magnetic card complexity, cost also exceeds magnetic card, on the whole, the present invention surpasses magnetic card aspect security, and the operation easier aspect will exceed magnetic card.
Numeral or combination of numbers change the conversion of control cmi code
Numeral 0 to 9 is this bit code, set its several hand over words, redaction rule is that all hand over words and this bit code all can not be identical, numeral is designated as digital transcoding table with its transcoding corresponding tables, Chinese is carried out several position digital codings, i.e. Zhong Wen this bit code, and numeral and letter also distribute this bit code, Chinese and numerical coding corresponding tables are designated as one's own department or unit code table, each numeral of numerical coding of Chinese can be this bit code of numeral and digital conversion sign indicating number, their transformation rule combination is exactly Chinese transcoding table, the composite sequence of one's own department or unit code table and Chinese transcoding table is at random, conversion is exactly to utilize addition subtraction multiplication and division and such as substring, mod, left, the programming language of the function of right and so on and other suitable conversion provides the numerical coding of one's own department or unit code table by Chinese transcoding table transcoding rule changes the process of combination of numbers, the digital transcoding that provides among the present invention is reflected code and every strange sign indicating number, reflected code is exactly that former numerical value adds 8, the result surpasses 10, just subtract 10, be exactly second odd number after former numerical value adds former numerical value every strange sign indicating number, and the result surpasses 10, just subtract 10, Chinese figure is encoded to four bit codes.
Definition and the composition rule of synthetic electronic cipher
The original password of synthetic electronic cipher is provided jointly by two sides at least, and password is made up of four parts at least, and the original password that the user provides should not have direct record at database, the memory of original password that the user provides is not difficult, and other passwords provide the original password that medium provides should too simple electronic data, originally sentence the password ABCDEF explanation that the user provides, they all are Chinese, and the conversion cost bit code gathers and gets surplus MOD (A*B*C*D*E*F after multiplying each other, 81)=and N (N value 0 to 80), A, C, E, F just is transformed into corresponding transcoding combination, is designated as A1, C1, E1 etc., here how many A1, C1, E1 etc. get and determine according to need, with A1, C1 is respectively divided by 81, B, and D is transformed into corresponding transcoding combination with the remainder after its computing respectively, be designated as B1, D1,, again with A1, B1, C1, D1, E1, F1 etc. are designated as four bit code M (A) respectively, M (B) etc., if four bit codes of M (A) are ABCD here, MOD (A*B*C*D), 81)=N, just carry out corresponding transcoding combination conversion, 0 is 17,1 to be 19 during calculating, with the result divided by 13, remainder adds 1 value and is start, just carries out substring (cut, start, 4), obtain after four bit codes divided by 13, remainder adds 1 and is start1, just carries out substring (mother, start1, length),, suggestion is 4 multiple.Then the result is gathered and store into Chinese and get final product, cut here, mother is the original password field that the bank card storage card provides, and length represents the figure place that intercepts, and mod and substring are functions.The present invention is except user cipher must be finished when opening card, and other password can be finished initial work by holder oneself.
The rule that the rarely used word input is followed:
The holder arrives first the website and downloads relevant rarely used word, then rarely used word is replaced the word that certain is of little use, must remember coding and phonetic, when sales counter is operated, as long as tell the other side just passable, if open card, also can require the personnel of the bank download that helps, like this, as long as there is this word the website, that's all, still, this function preferably wants the Unionpay website to support.
(2) hardware introduction:
The present invention is built-in with storage card and internal memory.There is back side password at the back side, and password paper is arranged besides, and introduce respectively below: storage card is exactly similar mobile phone EMS memory card, and it has golden finger, and golden finger is to place card border, can connect the usb data line, utilizes PC to finish Net silver and other operations.RAM (random access memory) card has three files, 1:library is library archive, it has two files, be that FourNumber is one's own department or unit code table, Assemblage Chinese transcoding table, file Pass, in a plurality of password databases are arranged, password database refers to follow the numeral of user cipher combination rule, Chinese and monogram and their the six bit digital table of comparisons that sorts, it is fit to write number input (being exactly to write six bit digital at password paper) and keyboard input, why having a plurality ofly, is that the individual data storehouse is too big, and speed is influential when reading, can only connect one of them, this is a kind of fascination effect.
2:Pass is password, it has following sub-folder, back back side password, the address address pin, the password of ATM automatic teller machine and string sign indicating number, the password of sitebank Net silver and string sign indicating number, finger finger-print cipher, the name namekey, RestrictAddtional limitation function password, person ID (identity number) card No. password, phone telephone cipher, each sub-folder has two data files, be cut intercepting character, the original field of mother password, the data group number of these two files is to count correspondence with corresponding cipher code set, back side password has four groups for example, and then they also are four groups.3; The Notebook notepad, it has 2 file code record coin face prefix sign indicating numbers, notebook transaction record.
Back side password is 4 groups 13 1 or 0 combination, scrapes overlayer off, utilizes the self-service initial work of finishing of Unionpay's terminal.
Password paper is little scraps of paper, and Unionpay's terminal has corresponding socket, during insertion, there is one of encrypted message to face down, socket of the present invention has overhanging baffle plate, when plug-in card or insertion password paper, generally has the stop of certain hour near socket, at this moment, overhanging baffle plate blocks, and prevents from divulging a secret, and password paper can not withdraw after using, but carried out shredded paper by the built-in shredder of machine through the regular hour, in case password is revealed.Password paper can supply to write two kinds of initial passwords and enchashment meeting volume, the number of the account of transferring accounts and the amount of money numerical value of transferring accounts, and initial password one is the line password.Its below is to write several passwords, as long as write 6 bit digital.
Internal memory stores finger print information temporarily, and internal memory is computer memory just.
(3): software engineering
The password input rule of password paper and the input rule of keyboard correspondence.
The principle of line password and usage have six categories like the strigula of " female " divinatory symbol on the password paper, just it is 3 rather than cloudy line in the Eight Diagrams, strigula from left to right is designated as one, two, three, be designated as A from top to bottom, B, C, one two three do not connect and are designated as 0, one or two connect and to be designated as 1, two three and to connect and be designated as 2, and " one " left side ABC vertically connects expression string sign indicating number, ABC is 000 o'clock, just below write numeral.
String sign indicating number and password generate symbol and information encryption symbol general designation user cipher.First is the information encryption symbol, and the 2nd to the 6th can generate the string sign indicating number at random and generate symbol, can only have one, other all be that password generates symbol.Password paper has the connection pattern, and the holder does the routine thing without thinking and just can.During storage, the sign indicating number of will going here and there generates the symbol back and adds the # differentiation, and the line password is not supported the keyboard input.
Writing several passwords is six arabic numeral of input, it is the password code, corresponding user cipher, and the password rule is as broad as long with the line password, this user cipher can be Chinese, the Chinese of user cipher must have corresponding four bit codes and Chinese table of comparisons record, otherwise can make mistakes, when selecting to write several passwords input, corresponding user cipher will be searched by system, and loading system as a result carried out computing, and password database has a variety of, and the holder can select to download or own modification.The Chinese of user cipher carries out computing according to the relevant rule of Chinese four bit codes.
The software rules of back side password and address pin
Back side password as binary data, converts decimal data to after scanning into automatic teller machine then, just converts 0000 to 8191 four bit codes to, carries out the password create-rule and gets final product.
In the relatively more deep long numerical information again of human memory, there is its superiority the address, the principle of address pin is similar to back side password, the 1st step: import a familiar address, if be teller's hands-operation, then searching this bit code of Chinese earlier, is that this searching will be connected bank card on computers.Input then has one and confirms the page after the input, automatic teller machine converts this bit code to Chinese, make things convenient for the holder to confirm, allow four to six Chinese of input, carry out the password create-rule and get final product, the storage result is designated as LMNO, the 2nd step: when using Net silver, use software to convert, the bank card number Input Software, software identifies the personal information part of card number, partly is 16 introductions with personal information here, this 16 bit digital is divided into 4 groups, deduct L, M, N, four bit codes of O correspondence, obtain four groups of four new bit codes, Here it is holder's network bank business based card number is during transaction, computer is at first identified number of the account, then, the L of the network bank business based card number of input and server storage, M, N, the O addition, the result conforms to card number, is confirmed by hand by the holder.Back side password has two principles, and the character setting will be grown, and the 2nd, the content of database stores is not too long, if we directly store 1 and 0, need 52 bytes, and the design of this card has only 8 bytes.And address pin must select own impression to be difficult for more deeply forgetting.
Password, automatic teller machine and the Net silver software rules of string sign indicating number and fingerprint:
Their cut respectively has 5 group of 16 bit digital data, and mother respectively has 5 group of 20 bit digital data, carries out the password create-rule behind the input password and gets final product, and the length value is 8 when just intercepting the mother data.
The use of string sign indicating number, generating the string sign indicating number that symbol generates by string sign indicating number is exactly the card number tail number, and the holder informs that other people and bank aspect grasp all is the card number of not being with string yard, the just number in bank card front, be not responsible for depositing in the card number of string sign indicating number, other process of exchanges all will be finished with the card number of string sign indicating number.
Encrypting fingerprint:
The 1st step: begin to intercept the binary message of gathering fingerprint, the binary message of finger print information is intercepted into 13 one group, last group is that how many positions how many positions are exactly, and these information are converted to the decimal system four bit codes just by group.The 2nd step: password is carried out password with string sign indicating number generation symbol generate, the 3rd step: password and string sign indicating number are generated after the symbol four bit code additions divided by 23, remainder adds as several, which position just to begin to intercept four bit codes of fingerprint from, only intercept five groups, the 4th step, the 3rd step result is subtracted the 2nd step result, storage Chinese gets final product, and other fields of fingerprint are constant, and proving program is made as addition and gets final product.
Finger-print cipher is local password, its information only is stored in the bank card, after fingerprint authentication is finished, system namely begins to carry out the user cipher checking, if fingerprint authentication does not pass through, then the user cipher checking can not carried out, that is to say, the fingerprint authentication mistake can not be serviced the device record, in order to prevent that deleting data does not verify, so server has boolean's data, when the holder sets checking, the customer side will enforces authentication, fingerprint authentication can't by the time, can select to revise " checking fingerprint " option, import user cipher and at least a address pin then, be modified as and do not verify fingerprint, if aforesaid operations can't finish, can only the starting fund transfer service.
The software rules that name is encrypted:
Name is encrypted and is utilized cardholder information encryption symbol to finish, just user cipher is first, the 1st step: when opening card, sales counter input holder's name, above-mentioned information is recorded in server, the 2nd step: this bit code of searching name, the 3rd step: this bit code of name is all added cardholder information encrypt symbol, the 4th step: the result in the 3rd step is carried out the password create-rule as input, just its cut and mother respectively have 4 groups of data, name has only three words, then just need not for the 4th group, namekey is stored in the 5th step of server: this bit code of name is deducted namekey, be stored in bank card, referred to herein as name code, during the Net silver checking, the program design name code adds namekey, when our debarkation net goes to bank, system accounting is calculated name, if name is not right, just can judge accordingly and might meet with fishing website, that is to say that name authentication and the ID (identity number) card No. checking introduced thereafter be prior to password authentification, before in program design, this two steps card page being put, and the automatic teller machine checking is carried out on the backstage, it is that the user cipher of user's input and ID (identity number) card No. and the holder name of storage are carried out computing, checks whether the result conforms to the ID (identity number) card No. password with namekey, if the holder has good memory, with name code and ID (identity number) card No. code deletion, then safer.
The encryption rule of ID (identity number) card No. with get close to sign indicating number
The encryption rule of ID (identity number) card No. is encrypted the same with name, just, ID (identity number) card No. has 18, the 7 8th deletion wherein, remaining 16 be divided into 4 groups just passable, what bank card stored is the ID (identity number) card No. code, and the automatic teller machine checking of this function is carried out on the backstage, does not allow the holder to use the ID (identity number) card No. authentication function.Only allow Net silver identity verification card number.Thus, we can find, different letter or digital, the ID (identity number) card No. that they converse may be consistent, they get close to sign indicating number each other, get close to sign indicating number and just are, even the other side knows your ID (identity number) card No., perhaps utilize ID (identity number) card No. to convert and query software, also can't judge the true and false of password.
The software rules of limitation function password:
Enabling the limitation function password also can carry out in Unionpay's terminal.As long as four corresponding bit codes of Input Address Chinese, but the such administration in province counties and townships had better not occur and distinguish character, the highest 20, during the change limitation function, must submit this address to, its program design and address pin the same finally also has only 4 Chinese passwords, just pass into silence can be not influential to holder's regular job for this password, cannot make change to limitation function more exactly.
1: it is exactly to forbid transferring accounts that restriction is transferred accounts.
2: the regional provincial administrative area of restriction transaction, the two digits numbering is established in provincial administrative area, only allows to select 4 zones, after the restriction, can only be in the transaction of the zone of appointment.Can be on the bank foreground or Unionpay's terminal compacting character code, not necessarily require once compacting to finish.
3: cancellation is transferred accounts and is verified or require to transfer accounts checking.
4: cancellation or interpolation total transaction amount in January, at the maximum two digits of bank card compacting, represent 1000 to 99000 exactly.
Limitation function is a kind of network service, the cancellation of the above-mentioned four kinds of services of server controls with enable.
Telephone cipher: first group of 4 byte of back side password one minute, the last character abandons need not form three group of four bit code, after LMN addition among the LMNO in the address pin, carry out the password create-rule, telephone number has only 11, therefore the front adds 0 and forms 12, telephone number is subtracted telephone cipher, the result is stamped on the bank card, allow 3 numbers at most, handle the foreground when professional, the holder dials the handler of bank or designated telephone, caller ID is imported computer compare correctly and just can open related pages.The early warning principle is: when the holder informs other people password, inform wrong getting final product with the 1st, when the holder imports to write several passwords, system can detect first password value of five identical other 9 passwords behind this password, check that just database has or not the namekey record of coupling, and then passwords verified that the result is correct, enters abnormal patterns, this pattern front page layout is just the same, but it has set turnover, and connects 110 alarm stations under this pattern, when importing with the line password, it is correct with string sign indicating number that computer detects password, but when ID (identity number) card No. password or namekey mistake, just enter abnormal patterns, existing bank card be suitable for abnormal patterns be to utilize substring (password, 2,5), password is exactly password, it has a restrictive condition, after abnormal patterns occurring, normal mode can not re-use, and must hold I.D. and handle relevant formality to bank and just can normally use.If holder's malice is used abnormal patterns, may be forbidden.
The password update principle, after entering the modification password page, the original password that other passwords provide medium to provide is provided, the password of holder's memory is not revised in this modification, the holder can be regular modification anti-steal ability to strengthen, still, this card is revised file directly, otherwise this card just has no idea normally to have used.
The internal memory lock function, after the situation of process of exchange generation fund change, just the data field value of fund changes, transaction just triggers the fingerprint authentication request again, when the holder carries out the bank card business operation, system can be reduced into finger print information to holder's finger-print cipher and send to internal memory, like this, when the holder need conclude the business again, only need fingerprint authentication to get final product, just with internal memory in the finger print information that stores compare, bank card takes out, and finger print information disappears immediately, if the holder does not arrange finger-print cipher, so, anyone can use this card.The situation that this function class needs password to wake up like dormancy is that it works as the password use to fingerprint, and it is with fund change design trigger, and other operating process that do not have fund to change can be not influenced.
The software rules of anti-fishing website: utilize the uniqueness of domain name to finish, in storage card, the network address of storage Web bank, when the network address of landing as the holder does not have these TLDs, just start hook procedure, when landing Net silver, computer is all made prompting at every turn, require the holder to click the built-in Net silver homepage that bank card provides, do not click the link Net silver network address that some business websites provide easily.Its ultimate principle is that the roughly form of network address is
Http:// www.abc.com/index.asp, that is to say whether in address field, searching the built-in network address of character between double slashes and the monocline thick stick and bank card has the option of coupling fully.The checking of transferring accounts: when transferring accounts operation, system can generate an identifying code, and sends to server, must this identifying code be sent to the side of changing over to by the side of producing, the side of changing over to can't submit effective identifying code or identifying code submittal error to three times through the regular hour, and this transaction meeting is cancelled.
Transaction record and Currency Type, coin face code record: be exactly each transaction record, system can send to bank card automatically, and the Currency Type of enchashment, behind the information via Unionpay client scan of coin face code (China is the prefix sign indicating number), also can send to automatically on the bank card, these information can be in transaction back removing next time, and these information also can be preserved the regular hour in order to inquiry by terminal computer.
Legacy is inherited and funds movement service: lose password or fingerprint authentication and make mistakes again and again, when handling password replacement business to the bank foreground, must submit address pin or limitation function password to, when the three all forgets, function of reset is disabled, can only utilize fund to shift, after losing to credit card issuer application password with I.D. earlier, just can the selection fund shift on automatic teller machine, input changes number of the account or card number over to, and system will verify the ID (identity number) card No. of number of the account or card number correspondence, it is holder's ID (identity number) card No., transfer accounts and will successfully carry out, after the transaction, bank card is canceled immediately.It also is the same that legacy is inherited operation, just can carry out after just holder's life state is necessary for death, the ID (identity number) card No. of the number of the account that changes over to or card number correspondence must be the ID (identity number) card No. of holder's appointment, and this service just indicates transaction and transfers accounts, and is irrelevant with concrete succession distribution.
4 description of drawings: do not have.
5: embodiment: synthetic electronic cipher example
Input cut two group fields are 2598,5934,9856,1392,9253.9503.0064.4209,
Mother two group fields are 5210,4512,0369,4,736 4859,5593,2563,4502
Table look-up earlier, if " Shenzhen City, Guangdong Province " this bit code is respectively 1692,4836,5100,9624,5681,7762 just " Guangdong " of encrypting below, 1692*4836*5100*9624*5681*7762/81 then, remainder is 0, tabling look-up 2, is 3333, tables look-up 1, then 1692 " extensively " are 9470,9470/81, and remainder is 74,74 is 3312 to look into 4836 to become 4 and 8 reflected code be 2 and 6,3 constant, 6 be 5 to be exactly 2635 every strange sign indicating number, just " east ", wide by 9470 again, the remainder of 9*4*7*17/81 is 72, table look-up be 3233.970 reflected code be 758,4 be 1 every strange sign indicating number, be exactly 7158/13, remainder is 8, and adding 1 is 9, first group of intercepting cut, be 9856 from the 9th intercepting, 9856 divided by 13, and remainder is 2, are 1045 for first group from the 3rd intercepting mother, so far, calculating " extensively " calculated result is 1045
Subordinate list 1: digital transcoding table
This bit code (1) |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
Every strange sign indicating number (2) |
3 |
6 |
7 |
0 |
1 |
4 |
5 |
8 |
9 |
2 |
Reflected code (3) |
8 |
9 |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
Subordinate list 2: 1 bit code of Chinese transcoding table (N is sequence, can change), 2 every strange sign indicating number, 3 reflected codes
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
61 |
3131 |
62 |
3132 |
63 |
3133 |
64 |
3211 |
65 |
3212 |
66 |
3213 |
67 |
3221 |
68 |
3222 |
69 |
3223 |
70 |
3231 |
71 |
3132 |
72 |
3233 |
73 |
3311 |
74 |
3312 |
75 |
3313 |
76 |
3321 |
77 |
3322 |
78 |
3323 |
Subordinate list 3: cardholder information is encrypted get close to yard (each row is all got close to sign indicating number each other) of symbol
|
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
|
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
|
U |
V |
W |
X |
Y |
Z |
|
|
|
|
The reference of storage card file field