Many password early warning type internal memories lock bank card
(1):Technical field:The invention belongs to the bank card of a kind of software and hardware encryption and monitor portion trading activity.
(2):Background technology:Bank card is typically all magnetic card, is exactly using magnetic stripe information-recording.Its secrecy means are close
Code, magnetic stripe is used as auxiliary secrecy means.It also has the design that bad password input number of times successively decreases.In terms of bank foreground, safety
Strick precaution relies primarily on identity card and bank clerk identification.Card number does not have secrecy provision, the transaction slip for simply printing have plus
Close asterisk.
Applicant is by analysis, it is believed that bank card has in the following areas to be worth where improvement:
1:According to the trading activity of negotiator bank card business dealing is divided with purpose rather than according to whether trading rules are met
Into two classes, i.e., normally with abnormal transaction, existing bank card business dealing will not distinguish both situations.
2:The action of existing bank card business dealing All Activity must be carried out in Unionpay's terminal.
3:Many units require to provide account, and this can cause the full detail of holder to be grasped by it.
4:When holder handles foreground Modify password business, without others restriction, it is only necessary to identity card.
5:Card number is plaintext, all of business card number only one of which.
6:Magnetic strip information describes the privacy information of holder, particularly ID (identity number) card No..
7:Password is fixed, and original password only has six, is only limited to Arabic numerals.
(3):The content of the invention and principle:
Technical scheme:The present invention realizes that it is with numeral or digital combination and variation control Chinese generation by following measures
Code is converted to technical foundation, the built-in storage card of bank card and internal memory, takes multiple input modes, and partial data lab setting is entered into silver
OK, the different trading function modules of the multiple synthesis electronic cipher division of labor control of setting, limit chain transaction, monitor or voluntarily process
Part exception or the digital system chip carrier of arm's length dealing behavior.
Technical characterstic:The present invention has multiple passwords, and the password for needing holder to remember is few, and the present invention can be controlled
Part trading activity, its manufacturing process is more complicated than magnetic card, and cost also exceeds magnetic card, and on the whole, the present invention is in safety side
Face surpasses magnetic card, and operation difficulty aspect will exceed magnetic card.
Numeral or digital combination and variation control cmi code conversion
Numeral 0 to 9 is this bit code, sets its several hand over words, redaction rule be all hand over words and this bit code all
Can not be identical, numeral token corresponding with its transcoding is digital transcoding table, and Chinese is carried out several position digital codings, i.e., Chinese one's own department or unit
Yard, and digital and letter also distributes this bit code, and Chinese is corresponding with digital coding to be marked as one's own department or unit code table, the digital coding of Chinese
Each bit digital can be digital this bit code sum word hand over word, and their transformational rule combination is exactly Chinese transcoding table, this
The composite sequence of bit code table and Chinese transcoding table is random, and conversion is exactly to utilize addition subtraction multiplication and division and such as substring, mod,
The function of left, right etc and the programming language of other suitable conversions pass through Chinese the digital coding of one's own department or unit code table
Transcoding table provide transcoding rule be changed numeral combination process, the present invention in provide digital transcoding be cyclic code and every
Strange code, cyclic code is exactly that former numerical value adds 8, as a result more than 10, just subtracts 10, every strange code be exactly former numerical value add after former numerical value second
Individual odd number, as a result more than 10, just subtracts 10, and Chinese figure is encoded to four bit codes.
The definition of synthesis electronic cipher and composition rule
The original password of synthesis electronic cipher is at least provided jointly by two sides, and password is at least made up of four parts, Yong Huti
For original password should not have directly record in data base, the original password memory that user provides is not difficult, and other passwords are carried
For medium provide original password should not too simple electronic data, originally sentence user offer password ABCDEF explanation, they
All be Chinese, conversion cost bit code, collect multiplication after remainder MOD (A*B*C*D*E*F, 81)=N (N values 0 to 80), A, C, E,
F shifts to the combination of corresponding transcoding, is designated as A1, C1, E1 etc., here A1, and C1, E1 etc. take and how much determine according to need, by A1, C1
It is respectively divided by 81, B, D and respectively corresponding transcoding combination is transformed into the remainder after its computing, is designated as B1, D1, then by A1, B1,
C1, D1, E1, F1 etc. are designated as respectively four bit codes M (A), M (B) etc., if here four bit codes of M (A) are ABCD, MOD (A*B*C*
D), 81)=N, is carried out corresponding transcoding Combination conversion, and 0 is 19 for 17,1 during calculating, and by result divided by 13, remainder adds 1 value to be
Start, (cut, start, 4), obtain divided by 13 after four bit codes, and it is start1 that remainder adds 1, just to be carried out substring
Substring (mother, start1, length) is performed, it is proposed that for 4 multiple.Then result is collected and stores into Chinese i.e.
Can, cut here, mother are the original password fields that bank card storage card is provided, and length represents the digit of intercepting, mod
All it is function with substring.In addition to user cipher has to be completed when card is opened, other passwords can be by for the present invention
Holder oneself completes initial work.
The rule that rarely used word input is followed:
Holder arrives first website and downloads relevant rarely used word, then rarely used word is replaced certain word being of little use, and must remember
Must encode and phonetic, when sales counter is operated, as long as telling that other side just can be with if open card, it is also possible to require bank personnel
Help is downloaded, so, as long as there is this word website, it is possible to, but, this function is desirable to Unionpay website and supports.
(2) hardware introduction:
The present invention is built-in with storage card and internal memory.There is back side password at the back side, besides there is password paper, introduces separately below:
Storage card is exactly similar mobile phone EMS memory card, and it has golden finger, and golden finger is placed in card border, can connect USB data line, is utilized
PC completes Net silver and other are operated.RAM (random access memory) card has three files, and 1:Library is library archive, and it has two files, i.e.,
FourNumber is one's own department or unit code table, and Assemblage Chinese transcoding tables, file Pass inside has multiple password databases, password
Data base refers to the numeral for following user cipher combination rule, and Chinese and monogram are compareed with their six bit digitals sequence
Table, it is adapted to write number input (being exactly that six bit digitals are write on password paper) and input through keyboard, why there is multiple, is single number
Too big according to storehouse, speed has an impact during reading, can only connect one of those, and this is a kind of fascination effect.
2:Pass is password, and it has following sub-folder, back back sides password, address address pins, ATM automatic teller machines
Password and string code, the password of sitebank Net silvers and string code, finger finger-print ciphers, name namekeys,
RestrictAddtional limitation function passwords, person ID (identity number) card No. passwords, phone telephone ciphers, each subfile
Folder has two data files, i.e. cut intercepts character, the original field of mother passwords, the data set number of both of these documents be with
Corresponding cipher code set number is corresponding, and citing back side password has four groups, then they are also four groups.3;Notebook notepads, it
There are 2 file code to record coin face prefix code, notebook transaction records.
Back side password is the combination of 4 groups 13 1 or 0, scrapes coating off, and using Unionpay's terminal is self-service initial chemical industry is completed
Make.
Password paper is a little scraps of paper, and Unionpay's terminal has corresponding socket, and during insertion, have encrypted message one faces down, this
When the socket of invention has overhanging baffle plate, plug-in card or insertion password paper, the stop of certain hour is typically had near socket, this
When, overhanging baffle plate is blocked, and prevents from divulging a secret, and will not be withdrawn after password paper use, but is passed through by the built-in shredder of machine
Regular hour carries out shredded paper, in case password is revealed.Password paper two kinds of initial passwords available for writing and enchashment meeting volume, account of transferring accounts
Number and transfer amounts numerical value, initial password one is line password.It is below to write several passwords, as long as 6 bit digitals of write.
Internal memory stores finger print information, internal memory i.e. computer memory temporarily.
(3):Software engineering
The Password Input rule of password paper and the corresponding input rule of keyboard.
The principle and usage of line password, the strigulas for having six groups of similar " female " hexagrams on password paper, simply it be 3 and not
It is cloudy line in the Eight Diagrams, strigula is from left to right designated as one, two, three, A, B, C is designated as from top to bottom, one two three is not connected to be designated as 0,1 companies
Connect be designated as 1,23 connection be designated as 2, " one " left side ABC vertically connect expression string code, ABC be 000 when, just lower section write number
Word.
String code and password generate symbol and information encryption symbol is referred to as user cipher.First is information encryption symbol, and the 2nd arrives
6th can at random generate string code and generate symbol, can only there is one, and others are all that password generates symbol.Password paper has connection pattern,
Holder does the routine thing without thinking can.During storage, string code is generated into symbol and is distinguished followed by #, line password does not support input through keyboard.
It is six Arabic numerals of input to write several passwords, and it is cipher code, correspond to user cipher, and password is regular and connects
Line password is not different, and this user cipher can be Chinese, and the Chinese of user cipher must have corresponding four bit code with Chinese
Control table record, otherwise can malfunction, and when several Password Inputs are write in selection, system will search corresponding user cipher, and result
Loading system carries out computing, and password database has many kinds, and holder can select to download or oneself modification.In user cipher
Text carries out computing according to the relevant rule of Chinese four bit code.
The software rules of back side password and address pin
Back side password is scanned into after automatic teller machine, as binary data, is then converted into decimal data, that is, is changed
Into 0000 to 8,191 four bit codes, password create-rule is performed.
The mankind's remembers in more deep and long digital information, and there are its superiority, the principle of address pin in address
It is similar to back side password, the 1st step:One familiar address of input, if it is teller's hands- operation, then first search one's own department or unit of Chinese
Code, simply this lookup will on computers connect bank card.Then it is input into, a confirmation page, cabinet is had after input
This bit code is converted into Chinese by member's machine, facilitates holder to confirm, it is allowed to be input into four to six Chinese, is performed password create-rule and is
Can, storage result is designated as LMNO, the 2nd step:During using Net silver, converted using software, it is soft bank card number Input Software
Part identifies the personal information part of card number, here with personal information part as 16 introductions, this 16 bit digital is divided into 4 groups,
L is deducted, corresponding four bit code of M, N, O obtains four groups of four new bit codes, here it is the network bank business card number of holder, during transaction,
Computer recognizes first account, then, the L that the network bank business card number of input is stored with server, M, N, O is added, as a result with card
Number it is consistent, is confirmed by hand by holder.Back side password has two principles, and character is arranged will be grown, and two is the content of data base's storage
It is not too long, if we directly store 1 and 0,52 bytes are needed, and the design of this card only has 8 bytes.And address pin is certain
Oneself impression is selected to be difficult what is forgotten more deeply.
The automatic teller machine and Net silver software rules of password, string code and fingerprint:
Their cut respectively has 5 group of 16 digit digital data, and mother respectively has 5 group of 20 digit digital data, holds after input password
Row password create-rule, length values are 8 when simply intercepting mother data.
The use of string code, the string code for generating symbol generation by string code is exactly card number tail number, and holder informs other people and bank side
What face was grasped is all the card number without string code, that is, the positive number of bank card is responsible for being stored in without the card number of string code, other
Process of exchange will be completed with the card number of string code.
Encrypting fingerprint:
1st step:Start the binary information for intercepting collection fingerprint, the binary information of finger print information is intercepted into into 13 one
Group, last group is how many positions are exactly how many positions, and these information are converted into decimal scale namely four bit code by group.2nd step:Will
Password generates symbol execution password and generates with string code, the 3rd step:Divided by 23 after password and string code generation four bit codes of symbol are added, remainder
Add as several, just start to intercept four bit codes of fingerprint from which position, only intercept five groups, the 3rd step result is subtracted the 2nd step knot by the 4th step
Really, Chinese is stored, and other fields of fingerprint are constant, proving program is set to be added.
Finger-print cipher is local password, and its information is only stored in bank card, after the completion of fingerprint authentication, system start into
Row user cipher is verified, if fingerprint authentication is not over then user cipher checking will not be carried out, that is to say, that fingerprint authentication
Mistake will not being serviced device record, in order to prevent delete data do not verify that, so server has a Boolean data, holder sets
When verifying surely, customer side will force checking, when fingerprint authentication cannot pass through, can select to change " checking fingerprint " option, so
User cipher and at least one address pin are input into afterwards, are modified as not verifying fingerprint, if aforesaid operations cannot be completed, Zhi Nengqi
Dynamic funds movement service.
The software rules of name encryption:
Name encryption is completed using cardholder information encryption symbol, that is, user cipher first, the 1st step:When opening card, cabinet
Platform is input into the name of holder, and above- mentioned information is recorded in server, the 2nd step:Search this bit code of name, the 3rd step:By name sheet
Bit code all adds cardholder information encryption symbol, the 4th step:Using the result of the 3rd step as input perform password create-rule, simply it
Cut and mother respectively have 4 groups of data, and name only has three words, then the 4th group by namekey just without being stored in server the
5 steps:This bit code of name is deducted into namekey, bank card, referred to herein as name code is stored in, when Net silver is verified, program
Design name code adds namekey, and when we log in Web bank, system accounting calculates name, if name is not right, just
Can judge accordingly to be possible to meet with fishing website, that is to say, that name authentication and the ID (identity number) card No. checking introduced thereafter
Prior to password authentification, this two steps card page is put in programming before, and automatic teller machine checking is carried out on backstage, and it is use
The user cipher of family input carries out computing with the ID (identity number) card No. and holder name of storage, checks result with namekey and body
Whether part card number password is consistent, if holder has good memory, by name code and ID (identity number) card No. code deletion, then more
Safety.
The encryption rule of ID (identity number) card No. with get close to code
The encryption rule of ID (identity number) card No. and name encryption, simply, ID (identity number) card No. has 18, and the therein 7th the 8th
Position is deleted, and being divided into 4 groups remaining 16 just can be with, bank card storage for ID (identity number) card No. code, the cabinet of this function
Member's machine checking is carried out on backstage, does not allow holder to use ID (identity number) card No. authentication function.Net silver is only allowed to verify identification card number
Code.Thus, we are, it can be seen that different alphabetical or numeral, the ID (identity number) card No. that they converse be probably it is consistent, they
Code is got close to each other, code is got close to and is that, even if other side knows your ID (identity number) card No., or convert and look into using ID (identity number) card No.
Software is ask, the true and false of password cannot be also judged.
The software rules of limitation function password:
Enabling limitation function password can also be carried out in Unionpay's terminal.Simply enter corresponding four bit code of address Chinese i.e.
Can, but had better not there is administrative differentiation character as counties and townships of province, highest 20, during change limitation function, it is necessary to submit this to
, its programming also only has 4 Chinese passwords such as address pin, finally, simply this password quilt for individual address
Forgetting will not have an impact to holder's regular job, exactly cannot make change to limitation function again.
1:It is exactly to forbid transferring accounts that restriction is transferred accounts.
2:The provincial administrative area in transaction area is limited, provincial administrative area sets two digits numbering, only allows to select 4 regions,
After restriction, can only conclude the business in specified region.Can be in bank foreground or Unionpay's terminal compacting character code, it is not required that once press
System is finished.
3:Cancellation is transferred accounts and verifies or require checking of transferring accounts.
4:Cancel or add January total transaction amount, most two digits are suppressed on bank card, exactly represent that 1000 arrive
99000。
Limitation function is a kind of network service, the cancellation of the above-mentioned four kinds of services of server controls with enable.
Telephone cipher:First group 4 of back side password, one point of byte, the last character is abandoned without three group of four bit code of composition, and
After LMN in LMNO in address pin is added, password create-rule is performed, telephone number only has 11, therefore above Jia 0
Composition 12, by telephone number telephone cipher is subtracted, and is as a result stamped on bank card, at most allows 3 numbers, handles front desk service
When, holder dials bank Jing and does people or designated telephone, and caller ID input computer is carried out contrasting correctly can just open correlation
The page.Early warning principle is:When holder informs other people passwords, by the 1st mistake is informed, holder is writing several Password Inputs
When, system can be detected to first password value of other 9 passwords of five identicals after the password, that is, check data
Storehouse whether there is the namekey record of matching, then passwords is verified again, as a result correctly, into abnormal patterns, this
Plant pattern front page layout just the same, but, it sets and connect under turnover, and this pattern 110 alarm stations, with line
During Password Input, computer detection to password is correct with string code, but when ID (identity number) card No. password or namekey mistake, is put into
Abnormal patterns, the applicable abnormal patterns of existing bank card are that (password, 2,5), password is just using substring
It is password, it has a restrictive condition, after there are abnormal patterns, normal mode can not be reused, it is necessary to hold identity card to bank
Handling the formality of correlation just can normally use.If holder's malice uses abnormal patterns, may be disabled.
Password update principle, into after the Modify password page, changes other passwords and provides the original password that medium is provided, this
Kind modification do not change holder memory password, holder can with regular modification to strengthen Anti-theft ability, but, this
Card can not directly change file, and otherwise, this card just has no idea normally to use.
Internal memory lock function, process of exchange occurs after the situation that fund changes, that is, the data field value of fund changes, then
Secondary transaction just triggering fingerprint authentication request, when holder carries out bank card business operation, system can be the finger-print cipher of holder
It is reduced into finger print information and is sent to internal memory, so, when holder needs to conclude the business again, it is only necessary to fingerprint authentication, that is,
Compare with the finger print information stored in internal memory, bank card takes out, and finger print information disappears immediately, if holder is not provided with
Finger-print cipher, then, anyone can be using this card.The similar dormancy of this function needs the situation that password wakes up, simply it
Fingerprint when password is used, it be with fund variant design trigger, and other do not have fund change operating process will not receive
Affect.
The software rules of anti-fishing website:Completed using the uniqueness of domain name, in storage card, store the net of Web bank
Location, when the network address that holder logs in does not have these TLDs, just starts hook procedure, when logging in Net silver every time, computer
All make prompting, it is desirable to which holder clicks on the built-in Net silver homepage that bank card is provided, and should not easily click on some business websites and carry
For link Net silver network address.Its ultimate principle is that the substantially form of network address ishttp://www.abc.com/index.asp,
That is, in address field, whether the character searched between double slashes and monocline thick stick has completely with the built-in network address of bank card
The option of matching.Transfer accounts checking:When carrying out transfer operation, system can generate an identifying code, and be sent to server, it is necessary to by
This identifying code is sent to the side of proceeding to by the side of producing, and the side of proceeding to cannot submit effective identifying code or identifying code to through the regular hour
Submittal error three times, this transaction can be cancelled.
Transaction record and currency type, coin face code record:It is exactly each transaction record, system can be automatically transmitted to bank
Card, and the currency type of enchashment, the information of coin face code (China is prefix code) also can send automatically after Unionpay's client scan
To on bank card, these information can be removed after conclude the business next time, and these information also can preserve the regular hour by terminal computer
In case inquiry.
Inheritance and funds movement service:Lost password or fingerprint authentication malfunction again and again, handle close to bank foreground
When code resets business, it is necessary to submit address pin or limitation function password to, when three forgets, function of reset is disabled, can only
Shifted using fund, first with identity card to after the loss of credit card issuer application password, so that it may fund transfer, input are selected on automatic teller machine
Account or card number are proceeded to, system will be verified to account or the corresponding ID (identity number) card No. of card number, be the identity card of holder
Number, transferring accounts successfully to be carried out, and after transaction, bank card is canceled immediately.Inheritance operation is also the same, is simply held
The life state of card people is necessary for after death just to carry out, and the corresponding ID (identity number) card No. of account or card number for proceeding to must be held
The ID (identity number) card No. that card people specifies, this service simply indicates that transaction is transferred accounts, unrelated with specific succession distribution.
4 description of the drawings:Nothing.
5:Specific embodiment:Synthesis electronic cipher example
Input cut two group fields are 2598,5934,9856,1392,9253.9503.0064.4209,
The group fields of Mother two are 5210,4512,0369,4,736 4859,5593,2563,4502
First table look-up, if " Shenzhen City, Guangdong Province " one's own department or unit code is respectively 1692, under 4836,5100,9624,5681,7762
Simply " Guangdong " of face encryption, then 1692*4836*5100*9624*5681*7762/81, remainder is 0, tables look-up 2, is 3333, is looked into
Table 1, then 1692 it is " wide " be 9470,9470/81, remainder be 74,74 for 3312 look into 4836 be changed into 4 and 8 cyclic code be 2 and 6,3
Constant, 6 for 5 is exactly 2635 every strange code, that is, " east ", then the remainder of 9470 wide, 9*4*7*17/81 is 72, table look-up
Cyclic code for 3233.970 is 1 every strange code for 758,4, is exactly 7158/13, and remainder is 8, and it is 9 plus 1, intercepts cut first
Group, intercepts as 9856,9856 divided by 13 from the 9th, and remainder is 2, and it is 1045 that first group of mother is intercepted from the 3rd, so far, meter
The result after " wide " computing is calculated for 1045
Subordinate list 1:Digital transcoding table
This bit code (1) |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
Every strange code (2) |
3 |
6 |
7 |
0 |
1 |
4 |
5 |
8 |
9 |
2 |
Cyclic code (3) |
8 |
9 |
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
Subordinate list 2:1 bit code of Chinese transcoding table (N be sequence, variable), 2 every strange code, 3 cyclic codes
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
N |
Transcoding |
61 |
3131 |
62 |
3132 |
63 |
3133 |
64 |
3211 |
65 |
3212 |
66 |
3213 |
67 |
3221 |
68 |
3222 |
69 |
3223 |
70 |
3231 |
71 |
3132 |
72 |
3233 |
73 |
3311 |
74 |
3312 |
75 |
3313 |
76 |
3321 |
77 |
3322 |
78 |
3323 |
Subordinate list 3:What cardholder information encryption was accorded with gets close to code (all getting close to code each other per string)
|
0 |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
|
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
|
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
|
U |
V |
W |
X |
Y |
Z |
|
|
|
|
Storage card file field is referred to