[go: up one dir, main page]

CN103295053B - Multi-code early-warning type memory lock bank card - Google Patents

Multi-code early-warning type memory lock bank card Download PDF

Info

Publication number
CN103295053B
CN103295053B CN201210062770.XA CN201210062770A CN103295053B CN 103295053 B CN103295053 B CN 103295053B CN 201210062770 A CN201210062770 A CN 201210062770A CN 103295053 B CN103295053 B CN 103295053B
Authority
CN
China
Prior art keywords
password
code
card
bank card
bank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210062770.XA
Other languages
Chinese (zh)
Other versions
CN103295053A (en
Inventor
汪风珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bai Jian Mei
Che Xiguang
Chi Yankun
He Lei
Li Deqing
Li Huijun
Lin Yansong
Liu Jianwei
Lu Tingyu
Lv Zhaoyun
Sun Xuewu
Wang Wenbin
Wu Zhifeng
Xia Xianping
Xiao Dandan
Xu Cunmin
Yao Chunlian
Zhang Jie
Zhao Yan
Zhuang Yanwei
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210062770.XA priority Critical patent/CN103295053B/en
Priority to CN201410096920.8A priority patent/CN103838994B/en
Publication of CN103295053A publication Critical patent/CN103295053A/en
Application granted granted Critical
Publication of CN103295053B publication Critical patent/CN103295053B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A multi-code early-warning type memory lock bank card is a digital system technologically based on a Chinese four-digit code and a compound electronic code. A memory card is internally arranged in the bank card. Code verification combination is conducted on the band card, a server, a person and fingerprints through the fingerprints and common sense memory (address) of the person. The multi-code early-warning type memory lock bank card supports a USB, namely, an internet bank. Under an abnormal condition, the multi-code early-warning type memory lock bank card can be locked automatically or give an alarm. A mixed code is supported, a Chinese code can be stored in a database, and the transaction total amount can be limited. The multi-code early-warning type memory lock bank card provides the services such as asset transformation and heritage inheritance which do not exist in an existing bank card.

Description

Many password early warning type internal memories lock bank card
(1):Technical field:The invention belongs to the bank card of a kind of software and hardware encryption and monitor portion trading activity.
(2):Background technology:Bank card is typically all magnetic card, is exactly using magnetic stripe information-recording.Its secrecy means are close Code, magnetic stripe is used as auxiliary secrecy means.It also has the design that bad password input number of times successively decreases.In terms of bank foreground, safety Strick precaution relies primarily on identity card and bank clerk identification.Card number does not have secrecy provision, the transaction slip for simply printing have plus Close asterisk.
Applicant is by analysis, it is believed that bank card has in the following areas to be worth where improvement:
1:According to the trading activity of negotiator bank card business dealing is divided with purpose rather than according to whether trading rules are met Into two classes, i.e., normally with abnormal transaction, existing bank card business dealing will not distinguish both situations.
2:The action of existing bank card business dealing All Activity must be carried out in Unionpay's terminal.
3:Many units require to provide account, and this can cause the full detail of holder to be grasped by it.
4:When holder handles foreground Modify password business, without others restriction, it is only necessary to identity card.
5:Card number is plaintext, all of business card number only one of which.
6:Magnetic strip information describes the privacy information of holder, particularly ID (identity number) card No..
7:Password is fixed, and original password only has six, is only limited to Arabic numerals.
(3):The content of the invention and principle:
Technical scheme:The present invention realizes that it is with numeral or digital combination and variation control Chinese generation by following measures Code is converted to technical foundation, the built-in storage card of bank card and internal memory, takes multiple input modes, and partial data lab setting is entered into silver OK, the different trading function modules of the multiple synthesis electronic cipher division of labor control of setting, limit chain transaction, monitor or voluntarily process Part exception or the digital system chip carrier of arm's length dealing behavior.
Technical characterstic:The present invention has multiple passwords, and the password for needing holder to remember is few, and the present invention can be controlled Part trading activity, its manufacturing process is more complicated than magnetic card, and cost also exceeds magnetic card, and on the whole, the present invention is in safety side Face surpasses magnetic card, and operation difficulty aspect will exceed magnetic card.
Numeral or digital combination and variation control cmi code conversion
Numeral 0 to 9 is this bit code, sets its several hand over words, redaction rule be all hand over words and this bit code all Can not be identical, numeral token corresponding with its transcoding is digital transcoding table, and Chinese is carried out several position digital codings, i.e., Chinese one's own department or unit Yard, and digital and letter also distributes this bit code, and Chinese is corresponding with digital coding to be marked as one's own department or unit code table, the digital coding of Chinese Each bit digital can be digital this bit code sum word hand over word, and their transformational rule combination is exactly Chinese transcoding table, this The composite sequence of bit code table and Chinese transcoding table is random, and conversion is exactly to utilize addition subtraction multiplication and division and such as substring, mod, The function of left, right etc and the programming language of other suitable conversions pass through Chinese the digital coding of one's own department or unit code table Transcoding table provide transcoding rule be changed numeral combination process, the present invention in provide digital transcoding be cyclic code and every Strange code, cyclic code is exactly that former numerical value adds 8, as a result more than 10, just subtracts 10, every strange code be exactly former numerical value add after former numerical value second Individual odd number, as a result more than 10, just subtracts 10, and Chinese figure is encoded to four bit codes.
The definition of synthesis electronic cipher and composition rule
The original password of synthesis electronic cipher is at least provided jointly by two sides, and password is at least made up of four parts, Yong Huti For original password should not have directly record in data base, the original password memory that user provides is not difficult, and other passwords are carried For medium provide original password should not too simple electronic data, originally sentence user offer password ABCDEF explanation, they All be Chinese, conversion cost bit code, collect multiplication after remainder MOD (A*B*C*D*E*F, 81)=N (N values 0 to 80), A, C, E, F shifts to the combination of corresponding transcoding, is designated as A1, C1, E1 etc., here A1, and C1, E1 etc. take and how much determine according to need, by A1, C1 It is respectively divided by 81, B, D and respectively corresponding transcoding combination is transformed into the remainder after its computing, is designated as B1, D1, then by A1, B1, C1, D1, E1, F1 etc. are designated as respectively four bit codes M (A), M (B) etc., if here four bit codes of M (A) are ABCD, MOD (A*B*C* D), 81)=N, is carried out corresponding transcoding Combination conversion, and 0 is 19 for 17,1 during calculating, and by result divided by 13, remainder adds 1 value to be Start, (cut, start, 4), obtain divided by 13 after four bit codes, and it is start1 that remainder adds 1, just to be carried out substring Substring (mother, start1, length) is performed, it is proposed that for 4 multiple.Then result is collected and stores into Chinese i.e. Can, cut here, mother are the original password fields that bank card storage card is provided, and length represents the digit of intercepting, mod All it is function with substring.In addition to user cipher has to be completed when card is opened, other passwords can be by for the present invention Holder oneself completes initial work.
The rule that rarely used word input is followed:
Holder arrives first website and downloads relevant rarely used word, then rarely used word is replaced certain word being of little use, and must remember Must encode and phonetic, when sales counter is operated, as long as telling that other side just can be with if open card, it is also possible to require bank personnel Help is downloaded, so, as long as there is this word website, it is possible to, but, this function is desirable to Unionpay website and supports.
(2) hardware introduction:
The present invention is built-in with storage card and internal memory.There is back side password at the back side, besides there is password paper, introduces separately below: Storage card is exactly similar mobile phone EMS memory card, and it has golden finger, and golden finger is placed in card border, can connect USB data line, is utilized PC completes Net silver and other are operated.RAM (random access memory) card has three files, and 1:Library is library archive, and it has two files, i.e., FourNumber is one's own department or unit code table, and Assemblage Chinese transcoding tables, file Pass inside has multiple password databases, password Data base refers to the numeral for following user cipher combination rule, and Chinese and monogram are compareed with their six bit digitals sequence Table, it is adapted to write number input (being exactly that six bit digitals are write on password paper) and input through keyboard, why there is multiple, is single number Too big according to storehouse, speed has an impact during reading, can only connect one of those, and this is a kind of fascination effect.
2:Pass is password, and it has following sub-folder, back back sides password, address address pins, ATM automatic teller machines Password and string code, the password of sitebank Net silvers and string code, finger finger-print ciphers, name namekeys, RestrictAddtional limitation function passwords, person ID (identity number) card No. passwords, phone telephone ciphers, each subfile Folder has two data files, i.e. cut intercepts character, the original field of mother passwords, the data set number of both of these documents be with Corresponding cipher code set number is corresponding, and citing back side password has four groups, then they are also four groups.3;Notebook notepads, it There are 2 file code to record coin face prefix code, notebook transaction records.
Back side password is the combination of 4 groups 13 1 or 0, scrapes coating off, and using Unionpay's terminal is self-service initial chemical industry is completed Make.
Password paper is a little scraps of paper, and Unionpay's terminal has corresponding socket, and during insertion, have encrypted message one faces down, this When the socket of invention has overhanging baffle plate, plug-in card or insertion password paper, the stop of certain hour is typically had near socket, this When, overhanging baffle plate is blocked, and prevents from divulging a secret, and will not be withdrawn after password paper use, but is passed through by the built-in shredder of machine Regular hour carries out shredded paper, in case password is revealed.Password paper two kinds of initial passwords available for writing and enchashment meeting volume, account of transferring accounts Number and transfer amounts numerical value, initial password one is line password.It is below to write several passwords, as long as 6 bit digitals of write.
Internal memory stores finger print information, internal memory i.e. computer memory temporarily.
(3):Software engineering
The Password Input rule of password paper and the corresponding input rule of keyboard.
The principle and usage of line password, the strigulas for having six groups of similar " female " hexagrams on password paper, simply it be 3 and not It is cloudy line in the Eight Diagrams, strigula is from left to right designated as one, two, three, A, B, C is designated as from top to bottom, one two three is not connected to be designated as 0,1 companies Connect be designated as 1,23 connection be designated as 2, " one " left side ABC vertically connect expression string code, ABC be 000 when, just lower section write number Word.
String code and password generate symbol and information encryption symbol is referred to as user cipher.First is information encryption symbol, and the 2nd arrives 6th can at random generate string code and generate symbol, can only there is one, and others are all that password generates symbol.Password paper has connection pattern, Holder does the routine thing without thinking can.During storage, string code is generated into symbol and is distinguished followed by #, line password does not support input through keyboard.
It is six Arabic numerals of input to write several passwords, and it is cipher code, correspond to user cipher, and password is regular and connects Line password is not different, and this user cipher can be Chinese, and the Chinese of user cipher must have corresponding four bit code with Chinese Control table record, otherwise can malfunction, and when several Password Inputs are write in selection, system will search corresponding user cipher, and result Loading system carries out computing, and password database has many kinds, and holder can select to download or oneself modification.In user cipher Text carries out computing according to the relevant rule of Chinese four bit code.
The software rules of back side password and address pin
Back side password is scanned into after automatic teller machine, as binary data, is then converted into decimal data, that is, is changed Into 0000 to 8,191 four bit codes, password create-rule is performed.
The mankind's remembers in more deep and long digital information, and there are its superiority, the principle of address pin in address It is similar to back side password, the 1st step:One familiar address of input, if it is teller's hands- operation, then first search one's own department or unit of Chinese Code, simply this lookup will on computers connect bank card.Then it is input into, a confirmation page, cabinet is had after input This bit code is converted into Chinese by member's machine, facilitates holder to confirm, it is allowed to be input into four to six Chinese, is performed password create-rule and is Can, storage result is designated as LMNO, the 2nd step:During using Net silver, converted using software, it is soft bank card number Input Software Part identifies the personal information part of card number, here with personal information part as 16 introductions, this 16 bit digital is divided into 4 groups, L is deducted, corresponding four bit code of M, N, O obtains four groups of four new bit codes, here it is the network bank business card number of holder, during transaction, Computer recognizes first account, then, the L that the network bank business card number of input is stored with server, M, N, O is added, as a result with card Number it is consistent, is confirmed by hand by holder.Back side password has two principles, and character is arranged will be grown, and two is the content of data base's storage It is not too long, if we directly store 1 and 0,52 bytes are needed, and the design of this card only has 8 bytes.And address pin is certain Oneself impression is selected to be difficult what is forgotten more deeply.
The automatic teller machine and Net silver software rules of password, string code and fingerprint:
Their cut respectively has 5 group of 16 digit digital data, and mother respectively has 5 group of 20 digit digital data, holds after input password Row password create-rule, length values are 8 when simply intercepting mother data.
The use of string code, the string code for generating symbol generation by string code is exactly card number tail number, and holder informs other people and bank side What face was grasped is all the card number without string code, that is, the positive number of bank card is responsible for being stored in without the card number of string code, other Process of exchange will be completed with the card number of string code.
Encrypting fingerprint:
1st step:Start the binary information for intercepting collection fingerprint, the binary information of finger print information is intercepted into into 13 one Group, last group is how many positions are exactly how many positions, and these information are converted into decimal scale namely four bit code by group.2nd step:Will Password generates symbol execution password and generates with string code, the 3rd step:Divided by 23 after password and string code generation four bit codes of symbol are added, remainder Add as several, just start to intercept four bit codes of fingerprint from which position, only intercept five groups, the 3rd step result is subtracted the 2nd step knot by the 4th step Really, Chinese is stored, and other fields of fingerprint are constant, proving program is set to be added.
Finger-print cipher is local password, and its information is only stored in bank card, after the completion of fingerprint authentication, system start into Row user cipher is verified, if fingerprint authentication is not over then user cipher checking will not be carried out, that is to say, that fingerprint authentication Mistake will not being serviced device record, in order to prevent delete data do not verify that, so server has a Boolean data, holder sets When verifying surely, customer side will force checking, when fingerprint authentication cannot pass through, can select to change " checking fingerprint " option, so User cipher and at least one address pin are input into afterwards, are modified as not verifying fingerprint, if aforesaid operations cannot be completed, Zhi Nengqi Dynamic funds movement service.
The software rules of name encryption:
Name encryption is completed using cardholder information encryption symbol, that is, user cipher first, the 1st step:When opening card, cabinet Platform is input into the name of holder, and above- mentioned information is recorded in server, the 2nd step:Search this bit code of name, the 3rd step:By name sheet Bit code all adds cardholder information encryption symbol, the 4th step:Using the result of the 3rd step as input perform password create-rule, simply it Cut and mother respectively have 4 groups of data, and name only has three words, then the 4th group by namekey just without being stored in server the 5 steps:This bit code of name is deducted into namekey, bank card, referred to herein as name code is stored in, when Net silver is verified, program Design name code adds namekey, and when we log in Web bank, system accounting calculates name, if name is not right, just Can judge accordingly to be possible to meet with fishing website, that is to say, that name authentication and the ID (identity number) card No. checking introduced thereafter Prior to password authentification, this two steps card page is put in programming before, and automatic teller machine checking is carried out on backstage, and it is use The user cipher of family input carries out computing with the ID (identity number) card No. and holder name of storage, checks result with namekey and body Whether part card number password is consistent, if holder has good memory, by name code and ID (identity number) card No. code deletion, then more Safety.
The encryption rule of ID (identity number) card No. with get close to code
The encryption rule of ID (identity number) card No. and name encryption, simply, ID (identity number) card No. has 18, and the therein 7th the 8th Position is deleted, and being divided into 4 groups remaining 16 just can be with, bank card storage for ID (identity number) card No. code, the cabinet of this function Member's machine checking is carried out on backstage, does not allow holder to use ID (identity number) card No. authentication function.Net silver is only allowed to verify identification card number Code.Thus, we are, it can be seen that different alphabetical or numeral, the ID (identity number) card No. that they converse be probably it is consistent, they Code is got close to each other, code is got close to and is that, even if other side knows your ID (identity number) card No., or convert and look into using ID (identity number) card No. Software is ask, the true and false of password cannot be also judged.
The software rules of limitation function password:
Enabling limitation function password can also be carried out in Unionpay's terminal.Simply enter corresponding four bit code of address Chinese i.e. Can, but had better not there is administrative differentiation character as counties and townships of province, highest 20, during change limitation function, it is necessary to submit this to , its programming also only has 4 Chinese passwords such as address pin, finally, simply this password quilt for individual address Forgetting will not have an impact to holder's regular job, exactly cannot make change to limitation function again.
1:It is exactly to forbid transferring accounts that restriction is transferred accounts.
2:The provincial administrative area in transaction area is limited, provincial administrative area sets two digits numbering, only allows to select 4 regions, After restriction, can only conclude the business in specified region.Can be in bank foreground or Unionpay's terminal compacting character code, it is not required that once press System is finished.
3:Cancellation is transferred accounts and verifies or require checking of transferring accounts.
4:Cancel or add January total transaction amount, most two digits are suppressed on bank card, exactly represent that 1000 arrive 99000。
Limitation function is a kind of network service, the cancellation of the above-mentioned four kinds of services of server controls with enable.
Telephone cipher:First group 4 of back side password, one point of byte, the last character is abandoned without three group of four bit code of composition, and After LMN in LMNO in address pin is added, password create-rule is performed, telephone number only has 11, therefore above Jia 0 Composition 12, by telephone number telephone cipher is subtracted, and is as a result stamped on bank card, at most allows 3 numbers, handles front desk service When, holder dials bank Jing and does people or designated telephone, and caller ID input computer is carried out contrasting correctly can just open correlation The page.Early warning principle is:When holder informs other people passwords, by the 1st mistake is informed, holder is writing several Password Inputs When, system can be detected to first password value of other 9 passwords of five identicals after the password, that is, check data Storehouse whether there is the namekey record of matching, then passwords is verified again, as a result correctly, into abnormal patterns, this Plant pattern front page layout just the same, but, it sets and connect under turnover, and this pattern 110 alarm stations, with line During Password Input, computer detection to password is correct with string code, but when ID (identity number) card No. password or namekey mistake, is put into Abnormal patterns, the applicable abnormal patterns of existing bank card are that (password, 2,5), password is just using substring It is password, it has a restrictive condition, after there are abnormal patterns, normal mode can not be reused, it is necessary to hold identity card to bank Handling the formality of correlation just can normally use.If holder's malice uses abnormal patterns, may be disabled.
Password update principle, into after the Modify password page, changes other passwords and provides the original password that medium is provided, this Kind modification do not change holder memory password, holder can with regular modification to strengthen Anti-theft ability, but, this Card can not directly change file, and otherwise, this card just has no idea normally to use.
Internal memory lock function, process of exchange occurs after the situation that fund changes, that is, the data field value of fund changes, then Secondary transaction just triggering fingerprint authentication request, when holder carries out bank card business operation, system can be the finger-print cipher of holder It is reduced into finger print information and is sent to internal memory, so, when holder needs to conclude the business again, it is only necessary to fingerprint authentication, that is, Compare with the finger print information stored in internal memory, bank card takes out, and finger print information disappears immediately, if holder is not provided with Finger-print cipher, then, anyone can be using this card.The similar dormancy of this function needs the situation that password wakes up, simply it Fingerprint when password is used, it be with fund variant design trigger, and other do not have fund change operating process will not receive Affect.
The software rules of anti-fishing website:Completed using the uniqueness of domain name, in storage card, store the net of Web bank Location, when the network address that holder logs in does not have these TLDs, just starts hook procedure, when logging in Net silver every time, computer All make prompting, it is desirable to which holder clicks on the built-in Net silver homepage that bank card is provided, and should not easily click on some business websites and carry For link Net silver network address.Its ultimate principle is that the substantially form of network address ishttp://www.abc.com/index.asp, That is, in address field, whether the character searched between double slashes and monocline thick stick has completely with the built-in network address of bank card The option of matching.Transfer accounts checking:When carrying out transfer operation, system can generate an identifying code, and be sent to server, it is necessary to by This identifying code is sent to the side of proceeding to by the side of producing, and the side of proceeding to cannot submit effective identifying code or identifying code to through the regular hour Submittal error three times, this transaction can be cancelled.
Transaction record and currency type, coin face code record:It is exactly each transaction record, system can be automatically transmitted to bank Card, and the currency type of enchashment, the information of coin face code (China is prefix code) also can send automatically after Unionpay's client scan To on bank card, these information can be removed after conclude the business next time, and these information also can preserve the regular hour by terminal computer In case inquiry.
Inheritance and funds movement service:Lost password or fingerprint authentication malfunction again and again, handle close to bank foreground When code resets business, it is necessary to submit address pin or limitation function password to, when three forgets, function of reset is disabled, can only Shifted using fund, first with identity card to after the loss of credit card issuer application password, so that it may fund transfer, input are selected on automatic teller machine Account or card number are proceeded to, system will be verified to account or the corresponding ID (identity number) card No. of card number, be the identity card of holder Number, transferring accounts successfully to be carried out, and after transaction, bank card is canceled immediately.Inheritance operation is also the same, is simply held The life state of card people is necessary for after death just to carry out, and the corresponding ID (identity number) card No. of account or card number for proceeding to must be held The ID (identity number) card No. that card people specifies, this service simply indicates that transaction is transferred accounts, unrelated with specific succession distribution.
4 description of the drawings:Nothing.
5:Specific embodiment:Synthesis electronic cipher example
Input cut two group fields are 2598,5934,9856,1392,9253.9503.0064.4209,
The group fields of Mother two are 5210,4512,0369,4,736 4859,5593,2563,4502
First table look-up, if " Shenzhen City, Guangdong Province " one's own department or unit code is respectively 1692, under 4836,5100,9624,5681,7762 Simply " Guangdong " of face encryption, then 1692*4836*5100*9624*5681*7762/81, remainder is 0, tables look-up 2, is 3333, is looked into Table 1, then 1692 it is " wide " be 9470,9470/81, remainder be 74,74 for 3312 look into 4836 be changed into 4 and 8 cyclic code be 2 and 6,3 Constant, 6 for 5 is exactly 2635 every strange code, that is, " east ", then the remainder of 9470 wide, 9*4*7*17/81 is 72, table look-up Cyclic code for 3233.970 is 1 every strange code for 758,4, is exactly 7158/13, and remainder is 8, and it is 9 plus 1, intercepts cut first Group, intercepts as 9856,9856 divided by 13 from the 9th, and remainder is 2, and it is 1045 that first group of mother is intercepted from the 3rd, so far, meter The result after " wide " computing is calculated for 1045
Subordinate list 1:Digital transcoding table
This bit code (1) 0 1 2 3 4 5 6 7 8 9
Every strange code (2) 3 6 7 0 1 4 5 8 9 2
Cyclic code (3) 8 9 0 1 2 3 4 5 6 7
Subordinate list 2:1 bit code of Chinese transcoding table (N be sequence, variable), 2 every strange code, 3 cyclic codes
N Transcoding N Transcoding N Transcoding N Transcoding N Transcoding N Transcoding
61 3131 62 3132 63 3133 64 3211 65 3212 66 3213
67 3221 68 3222 69 3223 70 3231 71 3132 72 3233
73 3311 74 3312 75 3313 76 3321 77 3322 78 3323
79 3331 80 3332 0 3333
Subordinate list 3:What cardholder information encryption was accorded with gets close to code (all getting close to code each other per string)
0 1 2 3 4 5 6 7 8 9
A B C D E F G H I J
K L M N O P Q R S T
U V W X Y Z
Storage card file field is referred to

Claims (13)

1. it is a kind of to possess software and hardware encryption and the bank card of monitor portion trading activity, it is characterized in that:Software and hardware is encrypted and monitoring The bank card of part trading activity is to be converted to technical foundation with numeral or digital combination and variation control cmi code, in bank card Storage card or RAM (random access memory) card are put, multiple input modes are taken, partial data table is arranged into bank card, it is close that various synthesis electronics are set The different trading function module of code division industry control system, limits chain transaction, voluntarily monitoring or process part exception or arm's length dealing row For digital system chip carrier,
Described digital or digital combination and variation control cmi code conversion is, with numeral 0 to 9 as this bit code, to set this bit code Several hand over words, redaction rule is that all hand over words all can not be identical with this bit code, and corresponding with its transcoding table of numeral is to count Word transcoding table, utilizes several position digital codings, i.e., this Chinese bit code, and numeral and letter also to distribute this bit code Chinese, in Text table corresponding with digital coding is one's own department or unit code table, and each bit digital of digital coding of Chinese can be digital this bit code or numeral The transformational rule combination of hand over word, the digital coding of Chinese and digital hand over word is exactly Chinese transcoding table, one's own department or unit code table and Chinese The composite sequence of transcoding table be it is random, conversion be exactly utilize addition subtraction multiplication and division and substring, mod, left, right function with And the programming language of other suitable conversions is entered the digital coding of one's own department or unit code table by the transcoding rule that Chinese transcoding table is provided Row changes the process of numeral combination, and the digital transcoding provided in digital transcoding table is cyclic code and every strange code, and cyclic code is exactly original Numerical value adds 8, as a result more than 10, just subtracts 10, is exactly that former numerical value adds second odd number after former numerical value every strange code, as a result exceedes 10, just subtracting 10, Chinese figure is encoded to four bit codes,
Described arranging in partial data table into bank card refers to that tables of data can directly or indirectly determine the generating process of password With proof procedure, the generating process of password has to rely on these tables of data with proof procedure, and, the data word of these data bases Section is modified by user on the premise of data fit programming rule or is voluntarily selected, and tables of data supports the direct defeated of rarely used word Enter, tables of data refers to one's own department or unit code table, Chinese transcoding table and code data table, code data table is referred to and follows user cipher combination rule Digital, the Chinese and monogram of rule and their six bit digitals sequence synopsis, code data table is adapted to write number input and key Disk is input into.
2. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, described various inputs Mode is characterized in that:It is included on password paper line to be input into and write number input and USB is connected input, it is the write on password paper to write number Six bit digitals, search the corresponding user cipher of password database and are input into, and bus connection method is that have on password paper six groups similar " female " The strigula of hexagram, simply it is 3 rather than cloudy line in the Eight Diagrams, and letter is converted into certain standard symbol input, is exactly strigula from a left side One, two, three are designated as to the right side, A, B, C is designated as from top to bottom, one two three are not connected to be designated as 0,1 connections to be designated as 1,23 connection notes For 2, different combinations represent different letters, and " one " left side ABC vertically connects expression string code, when ABC is 000, just under Side's write numeral, after scanning password paper input password, shredded paper is carried out to password paper, and the back side password that bank card is provided can not be clear Remove, be input into using USB connections, USB connecting lines support computer read-write data and internet banking operation, Unionpay's terminal keyboard input Chinese can adopt corresponding digital coding to be input into.
3. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, described setting is various The different trading function module of synthesis electronic cipher division of labor control, is characterized in that:The original password data of synthesis electronic cipher are extremely Lack and provided jointly by two sides, password is at least made up of four parts, the original password that user provides directly is not recorded in data base, The original password memory that user provides is not difficult, and other passwords provide the original password data of medium offer can not be too simple, The password ABCDEF that user provides, ABCDEF are Chinese, and conversion cost bit code collects after multiplication using remainder function MOD (A* B*C*D*E*F, 81)=N, A, C, E, F shift to the combination of corresponding transcoding, are designated as A1, C1, E1, F1, here A1, C1, E1, F1 take and how much determine according to need, and by A1, C1 is respectively divided by 81, and B, D are transformed into correspondence with the remainder after its computing respectively Transcoding combination, be designated as B1, D1, then A1, B1, C1, D1, E1, F1 are designated as respectively four bit codes M (A), M (B), M (C), M (D), M (E), M (F), four bit codes of M (A) are ABCD, MOD (A*B*C*D), 81)=N, are carried out corresponding transcoding Combination conversion, 0 is 19 for 17,1 during calculating, and by result divided by 13, remainder adds 1 value for start, execution substring (cut, start, 4), obtain after four bit codes divided by 13, and remainder adds 1 for start1, perform substring (mother, Start1, length), then result is collected and stores into Chinese, cut, mother are that bank card storage card is provided Original password field, length represents the digit of intercepting, and mod and substring is function, specifically using fingerprint, depth Engrave recall, name, telephone number, ID (identity number) card No., bank card arranges that holder's memory difficulty is little or the password that need not remember, What is be manually entered every time still only has user cipher, and wherein telephone cipher is third-party authentication;Address pin controls card of the online bank Number with limitation function password and telephone cipher;Finger-print cipher controls user cipher;Name, ID (identity number) card No., string code and password are common With user cipher, they point form abnormal patterns with conjunction;String code control card number, and the back side cipher control that bank card is carried is remote Journey replicates bank card, and in addition to user cipher has to be completed when card is opened, other passwords are completed initially by holder oneself Chemical industry is made.
4. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:Fingerprint The string code added in the generating process of password in user cipher generates symbol with password, and checking will first be input into user cipher, only After finger-print cipher is verified, can just carry out user cipher checking, finger-print cipher is local password, it is allowed to authentication error without Reduce mistake input number of times, if carry out finger-print cipher and verify by server controls.
5. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:Address What password was utilized is address, i.e., holder is easy to long data message remembering or going deep into brain, with card after address pin generation Number produce association, and then obtain network bank business card number, the number verification being controlled by it and Net silver checking be all manual confirmation, Limitation function password be also address control password, it limit or enable following functions, transfer accounts, checking of transferring accounts, transaction area and January total transaction amount, the latter two design parameters are stamped on bank card, and limitation function password can not change parameter.
6. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:Name is close Code and ID (identity number) card No. password are all, by the 1st control of user cipher, to be processed in numeral and alphabetical transformation process, from And it is likely to result in that ID (identity number) card No. is correct and the result of name mistake, programming this bit code of name or ID (identity number) card No. subtract Namekey or ID (identity number) card No. password, obtain name code and ID (identity number) card No. code, and it is by surname when Web bank verifies Name code and ID (identity number) card No. code difference encrypted code show name and ID (identity number) card No., and by holder the true and false of website is judged, Namekey is verified prior to user cipher checking with ID (identity number) card No. password authentification, and automatic teller machine is only carried out when verifying on backstage, After user cipher 5 it is correct and the 1st it is incorrect be put into abnormal patterns, abnormal patterns can conclude the business, but can limit Dealing money, moreover it is possible to report to the police.
7. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:The back side is close Code is 1 or 0 data being covered on bank card, after scraping off.
8. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:By the back side The partial information that first group of password is added the password for obtaining with the partial information of address pin, and back side password and telephone number are produced Association, when holder handles bank's front desk service, by the phone for dialing bank's offer, bank clerk is defeated by caller ID Enter computer, its business page could be opened only after checking, telephone number subtracts the result of telephone cipher and is stamped in bank card On, there are three telephone numbers to select.
9. software and hardware encryption according to claim 1 and the bank card of monitor portion trading activity, is characterized in that:User Password is made up of three parts, and the 1st is cardholder information encryption symbol, undertakes warning and enters abnormal patterns, the 2nd to the 6th Code of exactly going here and there generates symbol and generates symbol with password, and the string code for having a position random distribution generates symbol, generates what symbol was generated by string code String code is exactly card number tail number, and holder informs that what other people were grasped with bank aspect is all the card number without string code, without string code Card number is responsible for being stored in, and other process of exchanges will be completed with the card number of string code, and other four is all that password generates symbol.
10. software and hardware according to claim 1 encrypts the synthesis electronics described in the bank card with monitor portion trading activity Password is changed, and it is characterized in that entering after the Modify password page, is changed other passwords and is provided the original password that medium is provided, this to repair Change the password for not changing holder's memory, the regular modification of holder is strengthening Anti-theft ability.
The bank card of 11. software and hardwares according to claim 1 encryptions and monitor portion trading activity, described transaction Part abnormal conditions are suitably processed, and be it is characterized in that:Early warning is processed, and, to write during several Password Inputs, system can be right for holder First password value of other 9 passwords of five identicals is detected after the password, that is, checks data base whether there is matching Namekey record, then passwords are verified again, as a result correctly, into abnormal patterns, this pattern foreground The page is just the same, and abnormal patterns set and connect under turnover, abnormal patterns 110 alarm stations, during with line Password Input, Computer detection is correct with string code to password, but when ID (identity number) card No. password or namekey mistake, is put into abnormal patterns, existing The applicable abnormal patterns of some bank cards be using substring (password, 2,5), password is exactly password, Exactly detect after password 5 it is whether consistent, and, once into abnormal patterns, it is impossible to be transformed into normal mode, fund transfer It is exactly that holder cannot start measure when resetting cryptographic service, funds movement service can only be given to other accounts of holder oneself Number or card number, inheritance be exactly the inheritance that the dead rear bank card of holder is recorded ID (identity number) card No. everyone can be with Certain formality does not need password that fund in card is proceeded to into the corresponding account of the ID (identity number) card No. or card number.
The bank card of 12. software and hardwares according to claim 1 encryptions and monitor portion trading activity, described transaction Part normal condition is suitably processed, and the part normal condition of transaction carries out suitable process and it is characterized in that:1 :Anti- fishing Website, anti-fishing website is completed using the uniqueness of domain name, that is, requires that holder logs in from the built-in domain name of bank card, is held Card people do not have from built-in domain name log in when, detection address whether have completely matching record, without record, remind holder, 2: The service of coin face code record and transaction record service during enchashment, 3:Transfer accounts checking, after the service for checking credentials of transferring accounts is enabled, transfer accounts necessary The identifying code that system is generated is sent to the side of proceeding to by the side of producing, and is transferred accounts after being proved to be successful and just can complete, and the side of proceeding to is through certain Time identifying code or identifying code cannot be still provided submit to three mistakes, transaction to cancel.
13. software and hardware encryptions according to claim 1 and the bank card of monitor portion trading activity, described restriction is continuous Transaction, is characterized in that:Process of exchange occurs after the situation that fund changes, that is, the data field value of fund changes, and hands over again Easily just triggering fingerprint authentication request, when holder carries out bank card business operation, system can reduce the finger-print cipher of holder Be sent to internal memory into finger print information, so, when holder needs to conclude the business again, it is only necessary to fingerprint authentication, that is, with it is interior The finger print information for depositing middle storage is compared, and bank card takes out, and finger print information disappears immediately, and it is close that holder is not provided with fingerprint Code, anyone can be using this card.
CN201210062770.XA 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card Expired - Fee Related CN103295053B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210062770.XA CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card
CN201410096920.8A CN103838994B (en) 2012-02-29 2012-02-29 Computer memory is locked

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210062770.XA CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201410094751.4A Division CN103810596A (en) 2012-02-29 2012-02-29 Identification of reserved verification information
CN201410096920.8A Division CN103838994B (en) 2012-02-29 2012-02-29 Computer memory is locked

Publications (2)

Publication Number Publication Date
CN103295053A CN103295053A (en) 2013-09-11
CN103295053B true CN103295053B (en) 2017-04-12

Family

ID=49095878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210062770.XA Expired - Fee Related CN103295053B (en) 2012-02-29 2012-02-29 Multi-code early-warning type memory lock bank card

Country Status (1)

Country Link
CN (1) CN103295053B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955999A (en) * 2014-04-22 2014-07-30 汪风珍 Bank card payment system with alarm function
CN103971094A (en) * 2014-04-27 2014-08-06 汪风珍 Biological code lock
CN104318474A (en) * 2014-10-19 2015-01-28 汪风珍 Bank card payment system having early warning function
CN110018952B (en) * 2018-01-10 2022-12-27 武汉斗鱼网络科技有限公司 JS code testing method, JS code storage medium, JS code testing equipment and JS code testing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957933A (en) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 Bank card with input and output functions
CN102194287A (en) * 2010-03-04 2011-09-21 成都普兰斯纳科技有限公司 Fingerprint cash register system
CN102324044A (en) * 2011-09-09 2012-01-18 上海合合信息科技发展有限公司 Card information acquisition method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102194287A (en) * 2010-03-04 2011-09-21 成都普兰斯纳科技有限公司 Fingerprint cash register system
CN101957933A (en) * 2010-09-30 2011-01-26 钱袋网(北京)信息技术有限公司 Bank card with input and output functions
CN102324044A (en) * 2011-09-09 2012-01-18 上海合合信息科技发展有限公司 Card information acquisition method and system

Also Published As

Publication number Publication date
CN103295053A (en) 2013-09-11

Similar Documents

Publication Publication Date Title
US20230214792A1 (en) Computer implemented systems and methods
CN103714626B (en) Many password early warning types can different card control bank card
CN102638447B (en) Method and device for system login based on autonomously generated password of user
Chaum Security without identification: Transaction systems to make big brother obsolete
US4924514A (en) Personal identification number processing using control vectors
US5193114A (en) Consumer oriented smart card system and authentication techniques
CN104268742A (en) Official seal fake detection method and device based on network digital certificate and network lookup
JPS645783B2 (en)
CN108154351A (en) The electrical integrated seal of object and affairs examination & approval implementation method, system, platform, medium
KR100788768B1 (en) System for automatic teller machine and automatic cash transaction device
CN103295053B (en) Multi-code early-warning type memory lock bank card
US6954740B2 (en) Action verification system using central verification authority
US20170103395A1 (en) Authentication systems and methods using human readable media
Haga et al. Blockchain-based autonomous notarization system using national eid card
KR20200124121A (en) The Method to conveniently and safely authenticate the transfer of My Data
US9779256B2 (en) Iamnotanumber© card system: an image-based technique for the creation and deployment of numberless card systems
CN1197248A (en) Numeral signature method
EP0354771B1 (en) Personal identification number processing using control vectors
US8140433B2 (en) Method for making secure transactions carried out with cards provided with an owner identification number
CN111553791A (en) Digital cash object currency, method, system, device and storage medium for generating same
JP2008027177A (en) Split information processing apparatus, program and method
CN100407217C (en) Anti-faking and authentication method for bill using identifying code
CN201017377Y (en) System for monitoring remittance draft with electronic label
US20240127242A1 (en) Methods and systems for processing customer-initiated payment transactions
Chaum Numbers can be a better form of cash than paper

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190929

Address after: 242599 Baimohu Formation No. 15, Zhongqiao Village, Changqiao Township, Jingxian County, Xuancheng City, Anhui Province

Co-patentee after: Che Xiguang

Patentee after: Bai Jian Mei

Co-patentee after: Wang Wenbin

Co-patentee after: Wu Zhifeng

Co-patentee after: Chi Yankun

Co-patentee after: Xia Xianping

Co-patentee after: Xiao Dandan

Co-patentee after: Xu Cunmin

Co-patentee after: Yao Chunlian

Co-patentee after: Zhang Jie

Co-patentee after: Zhao Yan

Co-patentee after: Zhuang Yanwei

Co-patentee after: He Lei

Co-patentee after: Li Deqing

Co-patentee after: Li Huijun

Co-patentee after: Lin Yansong

Co-patentee after: Liu Jianwei

Co-patentee after: Lu Tingyu

Co-patentee after: Lv Zhaoyun

Co-patentee after: Sun Xuewu

Address before: Cha Beijiao town Shunde District Guangdong province 528311 Chung mansion two Lane Street No. five

Patentee before: Wang Feng Zhen

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170412

Termination date: 20200229

CF01 Termination of patent right due to non-payment of annual fee