[go: up one dir, main page]

CN103295053A - Multi-code early-warning type memory lock bank card - Google Patents

Multi-code early-warning type memory lock bank card Download PDF

Info

Publication number
CN103295053A
CN103295053A CN201210062770XA CN201210062770A CN103295053A CN 103295053 A CN103295053 A CN 103295053A CN 201210062770X A CN201210062770X A CN 201210062770XA CN 201210062770 A CN201210062770 A CN 201210062770A CN 103295053 A CN103295053 A CN 103295053A
Authority
CN
China
Prior art keywords
password
card
code
require
holder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210062770XA
Other languages
Chinese (zh)
Other versions
CN103295053B (en
Inventor
汪风珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bai Jian Mei
Che Xiguang
Chi Yankun
He Lei
Li Deqing
Li Huijun
Lin Yansong
Liu Jianwei
Lu Tingyu
Lv Zhaoyun
Sun Xuewu
Wang Wenbin
Wu Zhifeng
Xia Xianping
Xiao Dandan
Xu Cunmin
Yao Chunlian
Zhang Jie
Zhao Yan
Zhuang Yanwei
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410096920.8A priority Critical patent/CN103838994B/en
Priority to CN201210062770.XA priority patent/CN103295053B/en
Publication of CN103295053A publication Critical patent/CN103295053A/en
Application granted granted Critical
Publication of CN103295053B publication Critical patent/CN103295053B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A multi-code early-warning type memory lock bank card is a digital system technologically based on a Chinese four-digit code and a compound electronic code. A memory card is internally arranged in the bank card. Code verification combination is conducted on the band card, a server, a person and fingerprints through the fingerprints and common sense memory (address) of the person. The multi-code early-warning type memory lock bank card supports a USB, namely, an internet bank. Under an abnormal condition, the multi-code early-warning type memory lock bank card can be locked automatically or give an alarm. A mixed code is supported, a Chinese code can be stored in a database, and the transaction total amount can be limited. The multi-code early-warning type memory lock bank card provides the services such as asset transformation and heritage inheritance which do not exist in an existing bank card.

Description

Many passwords early warning type internal memory lock bank card
(1): technical field: the bank card that the invention belongs to a kind of software and hardware encryption and monitor portion trading activity.
(2): background technology: bank card generally all is magnetic card, utilizes the magnetic stripe information-recording exactly.Its secret means are passwords, and magnetic stripe is as auxiliary secret means.The design that it also has bad password input number of times to successively decrease.Aspect the bank foreground, safety precaution mainly relies on I.D. and bank clerk identification.Card number does not have secrecy provision, and just the transaction of printing has the encryption asterisk with bar.
The applicant thinks that bank card has the improved place of being worth in the following areas by analysis:
1: according to negotiator's trading activity and purpose rather than according to whether meeting trading rules bank card business dealing is divided into two classes, i.e. normal and unusual transaction, existing bank card business dealing can not distinguished this two kinds of situations.
2: existing bank card business dealing All Activity action must be carried out in Unionpay's terminal.
3: a lot of units require number of the account is provided, and this can cause holder's full detail to be grasped by it.
4: when the holder handles foreground modification password business, do not have other restriction, only need I.D..
5: card number is that expressly all professional card numbers have only one.
6: magnetic strip information has been put down in writing holder's privacy information, particularly ID (identity number) card No..
7: password is fixed, and original password has only six, is only limited to arabic numeral.
(3): summary of the invention and principle:
Technical scheme: the present invention realizes by following measure; it is to change the control cmi code with numeral or combination of numbers to be converted to technical foundation; the built-in storage card of bank card and internal memory; take multiple input mode; the partial data lab setting is entered bank; the different trading function module of multiple synthetic electronic cipher division of labor control is set, restriction chain transaction, monitoring or the digital system chip carrier of the unusual or arm's length transaction behavior of part by oneself.
Technical characterstic: the present invention has a plurality of passwords, the password that needs the holder to remember is few, the present invention can the control section trading activity, its manufacturing process is than magnetic card complexity, cost also exceeds magnetic card, on the whole, the present invention surpasses magnetic card aspect security, and the operation easier aspect will exceed magnetic card.
Numeral or combination of numbers change the conversion of control cmi code
Numeral 0 to 9 is this bit code, set its several hand over words, redaction rule is that all hand over words and this bit code all can not be identical, numeral is designated as digital transcoding table with its transcoding corresponding tables, Chinese is carried out several position digital codings, i.e. Zhong Wen this bit code, and numeral and letter also distribute this bit code, Chinese and numerical coding corresponding tables are designated as one's own department or unit code table, each numeral of numerical coding of Chinese can be this bit code of numeral and digital conversion sign indicating number, their transformation rule combination is exactly Chinese transcoding table, the composite sequence of one's own department or unit code table and Chinese transcoding table is at random, conversion is exactly to utilize addition subtraction multiplication and division and such as substring, mod, left, the programming language of the function of right and so on and other suitable conversion provides the numerical coding of one's own department or unit code table by Chinese transcoding table transcoding rule changes the process of combination of numbers, the digital transcoding that provides among the present invention is reflected code and every strange sign indicating number, reflected code is exactly that former numerical value adds 8, the result surpasses 10, just subtract 10, be exactly second odd number after former numerical value adds former numerical value every strange sign indicating number, and the result surpasses 10, just subtract 10, Chinese figure is encoded to four bit codes.
Definition and the composition rule of synthetic electronic cipher
The original password of synthetic electronic cipher is provided jointly by two sides at least, and password is made up of four parts at least, and the original password that the user provides should not have direct record at database, the memory of original password that the user provides is not difficult, and other passwords provide the original password that medium provides should too simple electronic data, originally sentence the password ABCDEF explanation that the user provides, they all are Chinese, and the conversion cost bit code gathers and gets surplus MOD (A*B*C*D*E*F after multiplying each other, 81)=and N (N value 0 to 80), A, C, E, F just is transformed into corresponding transcoding combination, is designated as A1, C1, E1 etc., here how many A1, C1, E1 etc. get and determine according to need, with A1, C1 is respectively divided by 81, B, and D is transformed into corresponding transcoding combination with the remainder after its computing respectively, be designated as B1, D1,, again with A1, B1, C1, D1, E1, F1 etc. are designated as four bit code M (A) respectively, M (B) etc., if four bit codes of M (A) are ABCD here, MOD (A*B*C*D), 81)=N, just carry out corresponding transcoding combination conversion, 0 is 17,1 to be 19 during calculating, with the result divided by 13, remainder adds 1 value and is start, just carries out substring (cut, start, 4), obtain after four bit codes divided by 13, remainder adds 1 and is start1, just carries out substring (mother, start1, length),, suggestion is 4 multiple.Then the result is gathered and store into Chinese and get final product, cut here, mother is the original password field that the bank card storage card provides, and length represents the figure place that intercepts, and mod and substring are functions.The present invention is except user cipher must be finished when opening card, and other password can be finished initial work by holder oneself.
The rule that the rarely used word input is followed:
The holder arrives first the website and downloads relevant rarely used word, then rarely used word is replaced the word that certain is of little use, must remember coding and phonetic, when sales counter is operated, as long as tell the other side just passable, if open card, also can require the personnel of the bank download that helps, like this, as long as there is this word the website, that's all, still, this function preferably wants the Unionpay website to support.
(2) hardware introduction:
The present invention is built-in with storage card and internal memory.There is back side password at the back side, and password paper is arranged besides, and introduce respectively below: storage card is exactly similar mobile phone EMS memory card, and it has golden finger, and golden finger is to place card border, can connect the usb data line, utilizes PC to finish Net silver and other operations.RAM (random access memory) card has three files, 1:library is library archive, it has two files, be that FourNumber is one's own department or unit code table, Assemblage Chinese transcoding table, file Pass, in a plurality of password databases are arranged, password database refers to follow the numeral of user cipher combination rule, Chinese and monogram and their the six bit digital table of comparisons that sorts, it is fit to write number input (being exactly to write six bit digital at password paper) and keyboard input, why having a plurality ofly, is that the individual data storehouse is too big, and speed is influential when reading, can only connect one of them, this is a kind of fascination effect.
2:Pass is password, it has following sub-folder, back back side password, the address address pin, the password of ATM automatic teller machine and string sign indicating number, the password of sitebank Net silver and string sign indicating number, finger finger-print cipher, the name namekey, RestrictAddtional limitation function password, person ID (identity number) card No. password, phone telephone cipher, each sub-folder has two data files, be cut intercepting character, the original field of mother password, the data group number of these two files is to count correspondence with corresponding cipher code set, back side password has four groups for example, and then they also are four groups.3; The Notebook notepad, it has 2 file code record coin face prefix sign indicating numbers, notebook transaction record.
Back side password is 4 groups 13 1 or 0 combination, scrapes overlayer off, utilizes the self-service initial work of finishing of Unionpay's terminal.
Password paper is little scraps of paper, and Unionpay's terminal has corresponding socket, during insertion, there is one of encrypted message to face down, socket of the present invention has overhanging baffle plate, when plug-in card or insertion password paper, generally has the stop of certain hour near socket, at this moment, overhanging baffle plate blocks, and prevents from divulging a secret, and password paper can not withdraw after using, but carried out shredded paper by the built-in shredder of machine through the regular hour, in case password is revealed.Password paper can supply to write two kinds of initial passwords and enchashment meeting volume, the number of the account of transferring accounts and the amount of money numerical value of transferring accounts, and initial password one is the line password.Its below is to write several passwords, as long as write 6 bit digital.
Internal memory stores finger print information temporarily, and internal memory is computer memory just.
(3): software engineering
The password input rule of password paper and the input rule of keyboard correspondence.
The principle of line password and usage have six categories like the strigula of " female " divinatory symbol on the password paper, just it is 3 rather than cloudy line in the Eight Diagrams, strigula from left to right is designated as one, two, three, be designated as A from top to bottom, B, C, one two three do not connect and are designated as 0, one or two connect and to be designated as 1, two three and to connect and be designated as 2, and " one " left side ABC vertically connects expression string sign indicating number, ABC is 000 o'clock, just below write numeral.
String sign indicating number and password generate symbol and information encryption symbol general designation user cipher.First is the information encryption symbol, and the 2nd to the 6th can generate the string sign indicating number at random and generate symbol, can only have one, other all be that password generates symbol.Password paper has the connection pattern, and the holder does the routine thing without thinking and just can.During storage, the sign indicating number of will going here and there generates the symbol back and adds the # differentiation, and the line password is not supported the keyboard input.
Writing several passwords is six arabic numeral of input, it is the password code, corresponding user cipher, and the password rule is as broad as long with the line password, this user cipher can be Chinese, the Chinese of user cipher must have corresponding four bit codes and Chinese table of comparisons record, otherwise can make mistakes, when selecting to write several passwords input, corresponding user cipher will be searched by system, and loading system as a result carried out computing, and password database has a variety of, and the holder can select to download or own modification.The Chinese of user cipher carries out computing according to the relevant rule of Chinese four bit codes.
The software rules of back side password and address pin
Back side password as binary data, converts decimal data to after scanning into automatic teller machine then, just converts 0000 to 8191 four bit codes to, carries out the password create-rule and gets final product.
In the relatively more deep long numerical information again of human memory, there is its superiority the address, the principle of address pin is similar to back side password, the 1st step: import a familiar address, if be teller's hands-operation, then searching this bit code of Chinese earlier, is that this searching will be connected bank card on computers.Input then has one and confirms the page after the input, automatic teller machine converts this bit code to Chinese, make things convenient for the holder to confirm, allow four to six Chinese of input, carry out the password create-rule and get final product, the storage result is designated as LMNO, the 2nd step: when using Net silver, use software to convert, the bank card number Input Software, software identifies the personal information part of card number, partly is 16 introductions with personal information here, this 16 bit digital is divided into 4 groups, deduct L, M, N, four bit codes of O correspondence, obtain four groups of four new bit codes, Here it is holder's network bank business based card number is during transaction, computer is at first identified number of the account, then, the L of the network bank business based card number of input and server storage, M, N, the O addition, the result conforms to card number, is confirmed by hand by the holder.Back side password has two principles, and the character setting will be grown, and the 2nd, the content of database stores is not too long, if we directly store 1 and 0, need 52 bytes, and the design of this card has only 8 bytes.And address pin must select own impression to be difficult for more deeply forgetting.
Password, automatic teller machine and the Net silver software rules of string sign indicating number and fingerprint:
Their cut respectively has 5 group of 16 bit digital data, and mother respectively has 5 group of 20 bit digital data, carries out the password create-rule behind the input password and gets final product, and the length value is 8 when just intercepting the mother data.
The use of string sign indicating number, generating the string sign indicating number that symbol generates by string sign indicating number is exactly the card number tail number, and the holder informs that other people and bank aspect grasp all is the card number of not being with string yard, the just number in bank card front, be not responsible for depositing in the card number of string sign indicating number, other process of exchanges all will be finished with the card number of string sign indicating number.
Encrypting fingerprint:
The 1st step: begin to intercept the binary message of gathering fingerprint, the binary message of finger print information is intercepted into 13 one group, last group is that how many positions how many positions are exactly, and these information are converted to the decimal system four bit codes just by group.The 2nd step: password is carried out password with string sign indicating number generation symbol generate, the 3rd step: password and string sign indicating number are generated after the symbol four bit code additions divided by 23, remainder adds as several, which position just to begin to intercept four bit codes of fingerprint from, only intercept five groups, the 4th step, the 3rd step result is subtracted the 2nd step result, storage Chinese gets final product, and other fields of fingerprint are constant, and proving program is made as addition and gets final product.
Finger-print cipher is local password, its information only is stored in the bank card, after fingerprint authentication is finished, system namely begins to carry out the user cipher checking, if fingerprint authentication does not pass through, then the user cipher checking can not carried out, that is to say, the fingerprint authentication mistake can not be serviced the device record, in order to prevent that deleting data does not verify, so server has boolean's data, when the holder sets checking, the customer side will enforces authentication, fingerprint authentication can't by the time, can select to revise " checking fingerprint " option, import user cipher and at least a address pin then, be modified as and do not verify fingerprint, if aforesaid operations can't finish, can only the starting fund transfer service.
The software rules that name is encrypted:
Name is encrypted and is utilized cardholder information encryption symbol to finish, just user cipher is first, the 1st step: when opening card, sales counter input holder's name, above-mentioned information is recorded in server, the 2nd step: this bit code of searching name, the 3rd step: this bit code of name is all added cardholder information encrypt symbol, the 4th step: the result in the 3rd step is carried out the password create-rule as input, just its cut and mother respectively have 4 groups of data, name has only three words, then just need not for the 4th group, namekey is stored in the 5th step of server: this bit code of name is deducted namekey, be stored in bank card, referred to herein as name code, during the Net silver checking, the program design name code adds namekey, when our debarkation net goes to bank, system accounting is calculated name, if name is not right, just can judge accordingly and might meet with fishing website, that is to say that name authentication and the ID (identity number) card No. checking introduced thereafter be prior to password authentification, before in program design, this two steps card page being put, and the automatic teller machine checking is carried out on the backstage, it is that the user cipher of user's input and ID (identity number) card No. and the holder name of storage are carried out computing, checks whether the result conforms to the ID (identity number) card No. password with namekey, if the holder has good memory, with name code and ID (identity number) card No. code deletion, then safer.
The encryption rule of ID (identity number) card No. with get close to sign indicating number
The encryption rule of ID (identity number) card No. is encrypted the same with name, just, ID (identity number) card No. has 18, the 7 8th deletion wherein, remaining 16 be divided into 4 groups just passable, what bank card stored is the ID (identity number) card No. code, and the automatic teller machine checking of this function is carried out on the backstage, does not allow the holder to use the ID (identity number) card No. authentication function.Only allow Net silver identity verification card number.Thus, we can find, different letter or digital, the ID (identity number) card No. that they converse may be consistent, they get close to sign indicating number each other, get close to sign indicating number and just are, even the other side knows your ID (identity number) card No., perhaps utilize ID (identity number) card No. to convert and query software, also can't judge the true and false of password.
The software rules of limitation function password:
Enabling the limitation function password also can carry out in Unionpay's terminal.As long as four corresponding bit codes of Input Address Chinese, but the such administration in province counties and townships had better not occur and distinguish character, the highest 20, during the change limitation function, must submit this address to, its program design and address pin the same finally also has only 4 Chinese passwords, just pass into silence can be not influential to holder's regular job for this password, cannot make change to limitation function more exactly.
1: it is exactly to forbid transferring accounts that restriction is transferred accounts.
2: the regional provincial administrative area of restriction transaction, the two digits numbering is established in provincial administrative area, only allows to select 4 zones, after the restriction, can only be in the transaction of the zone of appointment.Can be on the bank foreground or Unionpay's terminal compacting character code, not necessarily require once compacting to finish.
3: cancellation is transferred accounts and is verified or require to transfer accounts checking.
4: cancellation or interpolation total transaction amount in January, at the maximum two digits of bank card compacting, represent 1000 to 99000 exactly.
Limitation function is a kind of network service, the cancellation of the above-mentioned four kinds of services of server controls with enable.
Telephone cipher: first group of 4 byte of back side password one minute, the last character abandons need not form three group of four bit code, after LMN addition among the LMNO in the address pin, carry out the password create-rule, telephone number has only 11, therefore the front adds 0 and forms 12, telephone number is subtracted telephone cipher, the result is stamped on the bank card, allow 3 numbers at most, handle the foreground when professional, the holder dials the handler of bank or designated telephone, caller ID is imported computer compare correctly and just can open related pages.The early warning principle is: when the holder informs other people password, inform wrong getting final product with the 1st, when the holder imports to write several passwords, system can detect first password value of five identical other 9 passwords behind this password, check that just database has or not the namekey record of coupling, and then passwords verified that the result is correct, enters abnormal patterns, this pattern front page layout is just the same, but it has set turnover, and connects 110 alarm stations under this pattern, when importing with the line password, it is correct with string sign indicating number that computer detects password, but when ID (identity number) card No. password or namekey mistake, just enter abnormal patterns, existing bank card be suitable for abnormal patterns be to utilize substring (password, 2,5), password is exactly password, it has a restrictive condition, after abnormal patterns occurring, normal mode can not re-use, and must hold I.D. and handle relevant formality to bank and just can normally use.If holder's malice is used abnormal patterns, may be forbidden.
The password update principle, after entering the modification password page, the original password that other passwords provide medium to provide is provided, the password of holder's memory is not revised in this modification, the holder can be regular modification anti-steal ability to strengthen, still, this card is revised file directly, otherwise this card just has no idea normally to have used.
The internal memory lock function, after the situation of process of exchange generation fund change, just the data field value of fund changes, transaction just triggers the fingerprint authentication request again, when the holder carries out the bank card business operation, system can be reduced into finger print information to holder's finger-print cipher and send to internal memory, like this, when the holder need conclude the business again, only need fingerprint authentication to get final product, just with internal memory in the finger print information that stores compare, bank card takes out, and finger print information disappears immediately, if the holder does not arrange finger-print cipher, so, anyone can use this card.The situation that this function class needs password to wake up like dormancy is that it works as the password use to fingerprint, and it is with fund change design trigger, and other operating process that do not have fund to change can be not influenced.
The software rules of anti-fishing website: utilize the uniqueness of domain name to finish, in storage card, the network address of storage Web bank, when the network address of landing as the holder does not have these TLDs, just start hook procedure, when landing Net silver, computer is all made prompting at every turn, require the holder to click the built-in Net silver homepage that bank card provides, do not click the link Net silver network address that some business websites provide easily.Its ultimate principle is that the roughly form of network address is Http:// www.abc.com/index.asp, that is to say whether in address field, searching the built-in network address of character between double slashes and the monocline thick stick and bank card has the option of coupling fully.The checking of transferring accounts: when transferring accounts operation, system can generate an identifying code, and sends to server, must this identifying code be sent to the side of changing over to by the side of producing, the side of changing over to can't submit effective identifying code or identifying code submittal error to three times through the regular hour, and this transaction meeting is cancelled.
Transaction record and Currency Type, coin face code record: be exactly each transaction record, system can send to bank card automatically, and the Currency Type of enchashment, behind the information via Unionpay client scan of coin face code (China is the prefix sign indicating number), also can send to automatically on the bank card, these information can be in transaction back removing next time, and these information also can be preserved the regular hour in order to inquiry by terminal computer.
Legacy is inherited and funds movement service: lose password or fingerprint authentication and make mistakes again and again, when handling password replacement business to the bank foreground, must submit address pin or limitation function password to, when the three all forgets, function of reset is disabled, can only utilize fund to shift, after losing to credit card issuer application password with I.D. earlier, just can the selection fund shift on automatic teller machine, input changes number of the account or card number over to, and system will verify the ID (identity number) card No. of number of the account or card number correspondence, it is holder's ID (identity number) card No., transfer accounts and will successfully carry out, after the transaction, bank card is canceled immediately.It also is the same that legacy is inherited operation, just can carry out after just holder's life state is necessary for death, the ID (identity number) card No. of the number of the account that changes over to or card number correspondence must be the ID (identity number) card No. of holder's appointment, and this service just indicates transaction and transfers accounts, and is irrelevant with concrete succession distribution.
4 description of drawings: do not have.
5: embodiment: synthetic electronic cipher example
Input cut two group fields are 2598,5934,9856,1392,9253.9503.0064.4209,
Mother two group fields are 5210,4512,0369,4,736 4859,5593,2563,4502
Table look-up earlier, if " Shenzhen City, Guangdong Province " this bit code is respectively 1692,4836,5100,9624,5681,7762 just " Guangdong " of encrypting below, 1692*4836*5100*9624*5681*7762/81 then, remainder is 0, tabling look-up 2, is 3333, tables look-up 1, then 1692 " extensively " are 9470,9470/81, and remainder is 74,74 is 3312 to look into 4836 to become 4 and 8 reflected code be 2 and 6,3 constant, 6 be 5 to be exactly 2635 every strange sign indicating number, just " east ", wide by 9470 again, the remainder of 9*4*7*17/81 is 72, table look-up be 3233.970 reflected code be 758,4 be 1 every strange sign indicating number, be exactly 7158/13, remainder is 8, and adding 1 is 9, first group of intercepting cut, be 9856 from the 9th intercepting, 9856 divided by 13, and remainder is 2, are 1045 for first group from the 3rd intercepting mother, so far, calculating " extensively " calculated result is 1045
Subordinate list 1: digital transcoding table
This bit code (1) 0 1 2 3 4 5 6 7 8 9
Every strange sign indicating number (2) 3 6 7 0 1 4 5 8 9 2
Reflected code (3) 8 9 0 1 2 3 4 5 6 7
Subordinate list 2: 1 bit code of Chinese transcoding table (N is sequence, can change), 2 every strange sign indicating number, 3 reflected codes
N Transcoding N Transcoding N Transcoding N Transcoding N Transcoding N Transcoding
61 3131 62 3132 63 3133 64 3211 65 3212 66 3213
67 3221 68 3222 69 3223 70 3231 71 3132 72 3233
73 3311 74 3312 75 3313 76 3321 77 3322 78 3323
79 3331 80 3332 0 3333
Subordinate list 3: cardholder information is encrypted get close to yard (each row is all got close to sign indicating number each other) of symbol
0 1 2 3 4 5 6 7 8 9
A B C D E F G H I J
K L M N O P Q R S T
U V W X Y Z
The reference of storage card file field
Figure BSA00000683107800061

Claims (15)

1. a software and hardware is encrypted the bank card with the monitor portion trading activity; it is characterized in that: it is to change the control cmi code with numeral or combination of numbers to be converted to technical foundation; the built-in storage card of bank card and internal memory; take multiple input mode; the partial data lab setting is entered bank; the different trading function module of multiple synthetic electronic cipher division of labor control is set, restriction chain transaction, monitoring or the digital system chip carrier of the unusual or arm's length transaction behavior of part by oneself.
2. according to claim 1 the variation with numeral or combination of numbers controlled the cmi code conversion, it is characterized in that: numeral 0 to 9 is this bit code, set its several hand over words, redaction rule is that all hand over words and this bit code all can not be identical, numeral is designated as digital transcoding table with its transcoding corresponding tables, Chinese is carried out several position digital codings, i.e. Zhong Wen this bit code, and numeral and letter also distribute this bit code, Chinese and numerical coding corresponding tables are designated as one's own department or unit code table, each numeral of numerical coding of Chinese can be this bit code of numeral and digital conversion sign indicating number, their transformation rule combination is exactly Chinese transcoding table, the composite sequence of one's own department or unit code table and Chinese transcoding table is at random, conversion is exactly to utilize addition subtraction multiplication and division and such as substring, mod, left, the programming language of the function of right and so on and other suitable conversion provides the numerical coding of one's own department or unit code table by Chinese transcoding table transcoding rule changes the process of combination of numbers, the digital transcoding that provides among the present invention is reflected code and every strange sign indicating number, reflected code is exactly that former numerical value adds 8, the result surpasses 10, just subtract 10, be exactly second odd number after former numerical value adds former numerical value every strange sign indicating number, the result surpasses 10, just subtract 10, Chinese figure is encoded to four bit codes.
3. according to claim 1ly take multiple input mode, its multiple input mode feature is: suitable computing machine reads the mode of data, it is respectively password paper scanning input, comprise line and write number, writing number is to write six bit digital, search user cipher and the input of password database correspondence, bus connection method is six categories to be arranged like the strigula of " female " divinatory symbol on the password paper, just it is 3 rather than cloudy line in the Eight Diagrams, letter converts the input of certain standard symbol to, be exactly that strigula from left to right is designated as one, two, three, be designated as A from top to bottom, B, C, one two three do not connect and are designated as 0, one or two connections are designated as 1, two three connection and are designated as 2, the different different letters of combination representative, " one " left side ABC vertically connects expression string sign indicating number, ABC is 000 o'clock, just below write numeral, after the scanning input, the medium of stored data must provide certain measure that clears data, the method that the design provides is shredded paper, but the back side password that bank card provides can not remove, utilize USB to connect input, the USB connecting line supports that computer reads and writes data and internet banking operation, and Unionpay's terminal keyboard input Chinese can adopt corresponding numerical coding input.
4. according to claim 1 with require 3 described the partial data lab setting to be advanced bank card, its database feature is: these databases can directly or indirectly determine generative process and the proof procedure of password, the generative process of password and proof procedure must rely on these databases, and these data of database fields can be made amendment under the prerequisite of data fit programming rule or selected voluntarily by the user.So just support the direct input of rarely used word, the present invention refers to one's own department or unit code table, Chinese transcoding table and password database, and password database refers to follow the numeral of user cipher combination rule, Chinese and monogram and their the six bit digital ordering table of comparisons, it is fit to write number input and keyboard input.
5. according to the described different trading function module of multiple synthetic electronic cipher division of labor control that arranges of claim 1 and claim 2, it is characterized in that: the original password of synthetic electronic cipher is provided jointly by two sides at least, and password is made up of four parts at least, the original password that the user provides should not have direct record at database, the memory of original password that the user provides is not difficult, and other passwords provide the original password that medium provides should too simple electronic data, the password ABCDEF explanation that example provides with the user, they all are Chinese, the conversion cost bit code gathers and gets surplus MOD (A*B*C*D*E*F, 81)=N (N value 0 to 80) after multiplying each other, A, C, E, F just are transformed into corresponding transcoding combination, be designated as A1, C1, E1 etc., A1 here, C1, how many E1 etc. get and determine that according to need with A1, C1 is respectively divided by 81, B, D is transformed into corresponding transcoding combination with the remainder after its computing respectively, is designated as B1, D1, again with A1, B1, C1, D1, E1, F1 etc. are designated as four bit code M (A), M (B) etc. respectively, if four bit codes of M (A) are ABCD here, MOD (A*B*C*D), 81)=N, just carry out corresponding transcoding combination conversion, 0 is 17 during calculating, 1 is 19, and divided by 13, remainder adds 1 value and is start with the result, just carry out substring (cut, start, 4), obtain after four bit codes divided by 13, remainder adds 1 and is start1, just carry out substring (mother, start1, length),, suggestion is 4 multiple.Then the result is gathered and store into Chinese and get final product, cut here, mother is the original password field that the bank card storage card provides, length represents the figure place that intercepts, mod and substring are functions, specifically are to utilize fingerprint, deep memory, name, telephone number, ID (identity number) card No., bank cards etc. arrange the holder, and to remember difficulty little or do not need the password remembered, that will manually import still has only user cipher at every turn, and wherein telephone cipher is third-party authentication; Address pin control Net silver card number and limitation function password and telephone cipher; Finger-print cipher control user cipher; Name, ID (identity number) card No., string sign indicating number shares user cipher with password, their branch with close the formation abnormal patterns; String sign indicating number control card number, and the back side cipher control remote copy bank card that bank card carries, the present invention is except user cipher must be finished when opening card, and other password can be finished initial work by holder oneself.
6. according to claim 1, require 2 and require 5 described finger-print ciphers, it is characterized in that: added string sign indicating number and the password in the user cipher in the generative process of finger-print cipher and generated symbol, checking will be imported user cipher earlier, after having only the finger-print cipher checking to pass through, just can carry out the user cipher checking, finger-print cipher is local password, allow authentication error and can not reduce wrong input number of times, whether carry out the finger-print cipher checking by server controls.
7. according to claim 1, require 2 and require 5 and require 14 described deep memories, it is characterized in that: that the holder is easy to remember or go deep into the long information of brain, utilization of the present invention be the address, address pin generates the back and produces related with card number, and then obtain network bank business based card number, number verification and Net silver checking by its control all are artificial affirmations, the limitation function password also is the password of address control, and its limits or enables following function, transfers accounts, the checking of transferring accounts, transaction zone and total transaction amount in January, the latter two concrete parameters are stamped on the bank card, and the limitation function password can not change parameter.
8. according to claim 1, require 2 and require 5, require 11 described namekeys and ID (identity number) card No. password, it is characterized in that: these two is all by the 1st control of user cipher, handle in the digital and alphabetical transfer process, thereby may cause the correct and checking result of name mistake of ID (identity number) card No., program design this bit code of name or ID (identity number) card No. subtract namekey or ID (identity number) card No. password, obtain name code and ID (identity number) card No. code, it was to show name and ID (identity number) card No. by name code and ID (identity number) card No. code difference encrypted code when Web bank verified, judged the true and false of website by the holder, this checking is verified prior to user cipher, and in automatic teller machine when checking, only carry out on the backstage, 5 correct and the 1st incorrect abnormal patterns that just enter behind the user cipher, this pattern can be concluded the business, but can limit dealing money, can also report to the police.
9. according to claim 1, require 2 and require 5 described back side passwords, it is characterized in that: cover 1 on the bank card or 0 data, get final product after scraping off, back side password can only prevent the remote copy bank card, and its data are long, but very short these characteristics of database data.
10. according to claim 1, require 2, require 5, require 7, require 9 described telephone ciphers, it is characterized in that: the password that the partial information addition of the partial information of first group in back side password and address pin is obtained, it produces related with telephone number, when the holder handles bank's foreground business, by dialing the phone that bank provides, bank clerk is imported computer with caller ID, has only through its professional page after verifying and just can open, the result that telephone number subtracts telephone cipher is stamped on the bank card, can have three numbers to select.
11. according to claim 1, require 2, require 3, require 4, require 5, require 6, require 8 described user ciphers, it is characterized in that: it is made up of three parts, the 1st is cardholder information encryption symbol, bear and report to the police and enter abnormal patterns, the 2nd to the 6th is exactly that the string sign indicating number generates symbol and generates symbol with password, has the string sign indicating number of a position stochastic distribution to generate and accords with, the string sign indicating number that is generated the symbol generation by the string sign indicating number is exactly the card number tail number, what the holder informed that other people and bank aspect grasp all is the card number of not being with the string sign indicating number, is not responsible for depositing in the card number of string sign indicating number, and other process of exchanges all will be finished with the card number of string sign indicating number, other four all is that password generates symbol, user cipher is topmost secrecy provision, and requiring 4 password database and requiring 3 line scanning input and write number scanning input all is to offer user cipher specially, and it can only be numeral and letter that line scanning is imported.
12. according to claim 1 with require 5 described synthetic electronic ciphers to revise, after it is characterized in that entering the modification password page, the original password that other passwords provide medium to provide is provided, the password of holder's memory is not revised in this modification, and the modification that the holder can be regular is to strengthen the anti-ability of stealing.
13. the part abnormal conditions of transaction according to claim 1 are carried out suitable processing, it is characterized in that: early warning is handled, when the holder imports to write several passwords, system can detect first password value of five identical other 9 passwords behind this password, check that just database has or not the namekey record of coupling, and then passwords verified, the result is correct, enter abnormal patterns, this pattern front page layout is just the same, but, it has set turnover, and connection 110 alarm stations under this pattern, when importing with the line password, it is correct with the string sign indicating number that computer detects password, but when ID (identity number) card No. password or namekey mistake, just enter abnormal patterns, existing bank card be suitable for abnormal patterns be to utilize substring (password, 2,5), password is exactly password, just detect behind the password 5 whether consistent, and, in case enter abnormal patterns, can not be transformed into normal mode, it is exactly that the holder can't start the measure of replacement password when professional that fund shifts, this service can only be given to holder's oneself other numbers of the account or card number, legacy inherit be exactly the ID (identity number) card No. inherited of the legacy of the dead back of holder bank card record everyone can not need password will block interior fund with certain formality to change this ID (identity number) card No. corresponding account number or card number over to.
14. the part normal condition of transaction according to claim 1 is carried out suitable processing, the part normal condition of transaction is carried out suitable processing and be it is characterized in that: 1: anti-fishing website, it utilizes the uniqueness of domain name to finish, just require the holder to land from the built-in domain name of bank card, when the holder does not land from built-in domain name, detect Http:// www.abc.com/ between the double slashes of address and the monocline thick stick whether complete matched record is arranged like this, there is not record, remind the holder:, 2: the service of coin face code record and transaction record service during enchashment, 3: the checking of transferring accounts, after this service is enabled, transfer accounts and the side of producing the identifying code that system generates to be sent to the side of changing over to, transfer accounts after being proved to be successful and just can finish, the side of changing over to still can't provide identifying code or identifying code to submit three mistakes to through the regular hour, the transaction cancellation.
15. according to claim 1, require 6 described restriction chain transactions, it is characterized in that: after the situation of process of exchange generation fund change, just the data field value of fund changes, transaction just triggers the fingerprint authentication request again, when the holder carried out the bank card business operation, system can be reduced into finger print information to holder's finger-print cipher and send to internal memory, like this, when the holder need conclude the business again, only need fingerprint authentication to get final product, just with internal memory in the finger print information that stores compare, bank card takes out, finger print information disappears immediately, if the holder does not arrange finger-print cipher, so, anyone can use this card.
CN201210062770.XA 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card Expired - Fee Related CN103295053B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410096920.8A CN103838994B (en) 2012-02-29 2012-02-29 Computer memory is locked
CN201210062770.XA CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210062770.XA CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201410094751.4A Division CN103810596A (en) 2012-02-29 2012-02-29 Identification of reserved verification information
CN201410096920.8A Division CN103838994B (en) 2012-02-29 2012-02-29 Computer memory is locked

Publications (2)

Publication Number Publication Date
CN103295053A true CN103295053A (en) 2013-09-11
CN103295053B CN103295053B (en) 2017-04-12

Family

ID=49095878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210062770.XA Expired - Fee Related CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card

Country Status (1)

Country Link
CN (1) CN103295053B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955999A (en) * 2014-04-22 2014-07-30 汪风珍 Bank card payment system with alarm function
CN103971094A (en) * 2014-04-27 2014-08-06 汪风珍 Biological code lock
CN104318474A (en) * 2014-10-19 2015-01-28 汪风珍 Bank card payment system having early warning function
CN110018952A (en) * 2018-01-10 2019-07-16 武汉斗鱼网络科技有限公司 A kind of test method, storage medium, equipment and the system of JS code

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957933A (en) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 Bank card with input and output functions
CN102194287A (en) * 2010-03-04 2011-09-21 成都普兰斯纳科技有限公司 Fingerprint cash register system
CN102324044A (en) * 2011-09-09 2012-01-18 上海合合信息科技发展有限公司 Card information acquisition method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194287A (en) * 2010-03-04 2011-09-21 成都普兰斯纳科技有限公司 Fingerprint cash register system
CN101957933A (en) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 Bank card with input and output functions
CN102324044A (en) * 2011-09-09 2012-01-18 上海合合信息科技发展有限公司 Card information acquisition method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955999A (en) * 2014-04-22 2014-07-30 汪风珍 Bank card payment system with alarm function
CN103971094A (en) * 2014-04-27 2014-08-06 汪风珍 Biological code lock
CN104318474A (en) * 2014-10-19 2015-01-28 汪风珍 Bank card payment system having early warning function
CN110018952A (en) * 2018-01-10 2019-07-16 武汉斗鱼网络科技有限公司 A kind of test method, storage medium, equipment and the system of JS code
CN110018952B (en) * 2018-01-10 2022-12-27 武汉斗鱼网络科技有限公司 JS code testing method, JS code storage medium, JS code testing equipment and JS code testing system

Also Published As

Publication number Publication date
CN103295053B (en) 2017-04-12

Similar Documents

Publication Publication Date Title
CN108989357B (en) User authorization and data sharing access control method based on block chain
US20230214792A1 (en) Computer implemented systems and methods
CN103714626A (en) Multi-password pre-warning type bank card capable of being controlled by different card
DE69900169T2 (en) CREDIT CARD SYSTEM AND PROCEDURE
CN101496024B (en) Net settlement assisting device
CN100465977C (en) Information management system
CN109727123A (en) User's collage-credit data construction method, device and computer readable storage medium
CN104636338B (en) A kind of data cleansing storage method for the monitoring of value-added tax negative and positive ticket
CN101127111A (en) Internet bank U disc KEY ciphering, authentication device and method
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN102881079A (en) Trampled multi-password early-warning type different card controllable bank card
CN111931219B (en) Data storage method and device and data query method and device
US20170330290A1 (en) Apparatus and method for validating transactional data
CN113139876A (en) Risk model training method and device, computer equipment and readable storage medium
CN109272311A (en) A kind of across chain flogic system based on digital wallet
CN103295053A (en) Multi-code early-warning type memory lock bank card
CN101833732A (en) Internet trading system and method for internet trading by using paper certificate
CN104636341B (en) A kind of data cleansing storage method for the several monitoring of value-added tax No.1
CN101859350A (en) Fingerprint password management method and off-line fingerprint password manager
Khedekar et al. Protection to Personal Data Using Decentralizing Privacy of Blockchain.
CN201689428U (en) Offline fingerprint password manager
KR20200124121A (en) The Method to conveniently and safely authenticate the transfer of My Data
CN107918869A (en) One kind is transferred accounts control method, device and terminal
CN102663473A (en) Method for realizing chip operating system (COS) safety mechanism of intelligent card
CN1159038A (en) Secure money transfer techniques using smart cards

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190929

Address after: 242599 Baimohu Formation No. 15, Zhongqiao Village, Changqiao Township, Jingxian County, Xuancheng City, Anhui Province

Co-patentee after: Che Xiguang

Patentee after: Bai Jian Mei

Co-patentee after: Wang Wenbin

Co-patentee after: Wu Zhifeng

Co-patentee after: Chi Yankun

Co-patentee after: Xia Xianping

Co-patentee after: Xiao Dandan

Co-patentee after: Xu Cunmin

Co-patentee after: Yao Chunlian

Co-patentee after: Zhang Jie

Co-patentee after: Zhao Yan

Co-patentee after: Zhuang Yanwei

Co-patentee after: He Lei

Co-patentee after: Li Deqing

Co-patentee after: Li Huijun

Co-patentee after: Lin Yansong

Co-patentee after: Liu Jianwei

Co-patentee after: Lu Tingyu

Co-patentee after: Lv Zhaoyun

Co-patentee after: Sun Xuewu

Address before: Cha Beijiao town Shunde District Guangdong province 528311 Chung mansion two Lane Street No. five

Patentee before: Wang Feng Zhen

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

Termination date: 20200229