[go: up one dir, main page]

CN103632297B - Initialization for bank card - Google Patents

Initialization for bank card Download PDF

Info

Publication number
CN103632297B
CN103632297B CN201310585475.7A CN201310585475A CN103632297B CN 103632297 B CN103632297 B CN 103632297B CN 201310585475 A CN201310585475 A CN 201310585475A CN 103632297 B CN103632297 B CN 103632297B
Authority
CN
China
Prior art keywords
card
bank
data
holder
stealthy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310585475.7A
Other languages
Chinese (zh)
Other versions
CN103632297A (en
Inventor
汪风珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Chuangwei New Material Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310585475.7A priority Critical patent/CN103632297B/en
Priority claimed from CN201310174989.3A external-priority patent/CN103714626B/en
Publication of CN103632297A publication Critical patent/CN103632297A/en
Application granted granted Critical
Publication of CN103632297B publication Critical patent/CN103632297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A card activating process for a bank card capable of automatically finishing initialization is performed by two steps of firstly finishing partial card activating operation on a bank counter or self-help card activating equipment, and then finishing the rest initialization work by a card holder at a teller machine and the like so that the bank card can be normally used. The process is mainly used for performing right control on a bank and a worker of the bank, and the data provided by the card activating bank are not enough to copy the bank card.

Description

A kind of initial method of bank card
One: art: the invention belongs to the software and hardware technology of bank card..
Two: background technology: current bank card is opened card and only needed to the business hall of Kai Ka bank or set by self-service card of opening Can normally use for completing out card, this card mode of opening has technical leak, if open card bank management be not good at or related work Harhor evil intentions as personnel or bank computer has virus or suffers that hacker's control or hard disk are illegally backed up, just deposit In the potential risk of the legitimate rights and interests invading holder, and holder has been difficult to counter-measure.
Three: goal of the invention: by sales counter complete initialized bank card also need to complete on the self-service equipments such as automatic teller machine After becoming initialization, bank card just can normally use.
Four: technical scheme: the present invention is a kind of initial method of bank card, need two steps to complete to initialize bank card Can normally use.
1st step: first in sales counter or self-service opening, partially-initialized is completed on card apparatus;
2nd step: after completing initialization again on the self-service equipments such as automatic teller machine, bank card just can normally use, it is possible to use The self-service equipments such as inter-bank automatic teller machine complete to initialize, and initialize three class data, this three classes data is independent, can select wherein One or several, they can be but not limited to following data, is respectively:
1: the 1 class data, hides and is documented on bank card, utilizes certain means to destroy hidden layer by holder, by cabinet Member's machine etc. reads and completes to initialize;
2: the 2 class data, Primary Stage Data is grasped by Kai Ka bank, but write associated data can not get out of the way card bank note Record, but holder will arrive sales counter transacting business, this kind of data must result be mated, and holder just can commence business;
3: the 3 class data, the data that holder does not grasp, this kind of data is read-write data;
This three classes data only needs to the initialization that holder manually completes the 1st class data, and the 2nd class, and the 3rd class data is by being System is synchronous to be automatically performed.
1: first introduce the related hardware technology of this technology below:
1.: back side code data, several groups of the covering of the coverings such as the utilization paint film of similar scratch-open lottery tickets are had in bank card Data, example is 6 groups, and they are exactly the initial data of back side password;
1: back side password:
Back side password is exactly to pass through, for initial data, one kind that encryption obtains using the character string being printed on bank's card backside Password,
1.: back side password initial data is just to be pre-printed and the number through covering treatment during card manufacture According to;
2.: the printing process of this password does not need card manufacturing firm to store specific data, and it is by computer control The character string of the random certain length generating, or the Quick Response Code that computer is capable of identify that, bar code etc.;
3.: back side password initial data is typically complex it is ensured that ordinary people has a look substantially cannot remember;
4.: only so setting overleaf, is to prevent the people stealing a glance at from synchronously seeing card number and this password,
5.: back side password can only on automatic teller machine etc. can not bank counter complete initialize, and, it initialized Initialize stealthy card number in the lump in journey and ID (identity number) card No. substitute code,
Constitute example: example of the present invention is the random digit of 6 groups 15 0 to 9, after producing, can seal using paint film etc. The method deposited carries out coverage data, and it is a kind of password that cannot change initial data, and holder opens card in bank and completes Afterwards it is impossible to complete to initialize in sales counter, but use front for the first time, holder must scrape paint film off, completes just on automatic teller machine After beginningization, bank card could normally use, in initialization procedure, the same with user cipher it is impossible to intact employing, here Enumerate be still cut a code, using function substring (expression, start, length) intercept character string, only Length value adopts other data to determine or specifies, and is set to 5 here, and the value of start is obtained by other data or specifies, this In provided by the read-only binary data of that 6 groups of user cipher, this 6 groups of binary data are converted into 10 binary data, by result (it is recommended here that 11 to 13 is proper, consider to print length and combining of cutting code, this number is bigger, cuts code divided by a number Number of combinations more, but nor print oversize), remainder adds 1 and is exactly the value of start, is achieved in that between 6 group 0 to 99999 Back side password, then convert them into 0 arrive such 62 binary data of q0t, we can according to the max value of start with Length value determines the string length of back side password, if the max value of start is 11, that is, intercepts from the 11st, intercepts 5, so string length is exactly 15, such as substring (697851033650278,7,5) is it is simply that incite somebody to action 697851033650278 interceptings, from the beginning of the 7th, intercept 5, that is, intercept 697851 (03365) 0278, result is exactly bracket In 03365, be related in the present invention cut a code be all this principle, it can be seen, back side password to this step is that do not have Have the right that user voluntarily changes, without user's memory, were it not for that 6 groups of data of corresponding user cipher, then be by Back side password initial data is respectively divided by a number (it is recommended here that 11 to 13 is proper), takes the remainder and Jia 1 as a section code function The value of parameter start of substring carries out cutting code, and other principles are the same, and back side password initial data can also use Bar code, the symbol that the computer such as Quick Response Code is capable of identify that, due to the stealthy card number of automatic teller machine, back side password and ID (identity number) card No. Substitute code initial work once to carry out, so introducing in the lump here, when holder's insertion does not have initialized bank card, System may require that holder's input password, if Password Input mistake three times, back side password scraped off again, and system can be locked Card, this pintle hook lock can not unlock, and can only change card, if holder does not scrape the coverings such as paint film off, system can be pointed out first to scrape off Paint film plug-in card again, if holder inputs correct password, system accounting calculates the terminal synthesis password of corresponding back side password, After transmitting data to server, server returns the ID (identity number) card No. of this card, and ID (identity number) card No. on the terminal device can not See, it is a kind of back-end data, terminal calculates corresponding ID (identity number) card No. according to return value and substitutes code, in bank card write only Read data, server by utilizing Automatic Program calculates stealthy card number and stores, programming stealth card number and ID (identity number) card No. are Synchronous return terminal, is not to return twice, and the stealthy card number of terminal record is read-write data, calls, service when conveniently concluding the business later Device end is consistent with the stealthy card number of terminal just to complete process of exchange, and everything is all that system completes, and what holder was done is exactly Scrape paint film off, back side password does not all have any encryption effect for holding anyone of bank card, but, it can increase Unionpay's server end and the password cracking difficulty at bank end, are not without use,
2: stealthy card number:
1.: stealthy card number is exactly not have banker's record, a kind of dynamic electron data of only server and bank card record;
2.: adopt certain technological means to ensure data uniqueness by automatic teller machine or Web bank's program etc.;
3.: holder changes after can inputting password, modification result is automatically controlled by automatic teller machine etc.;
4.: this data is a kind of clear data not having and encrypting, and its server end is complete one with the data of bank card Cause;
5.: automatic teller machine and pos machine must read stealthy card number, and the stealthy card number recorded with server is verified;
6.: when Web bank and Mobile banking log in, do not have user name login frame to supply holder to select it is only necessary to input is close Code, computer or mobile phone can send by backstage the stealthy card number reading or mobile phone account bank number as user name, and system returns Bank's card number value, holder can decide whether to meet with fishing website accordingly;
7.: the stealthy card number of a bank card or Mobile banking's account all differ;
8.: stealthy card number is set not in bank counter, the account data of Mobile banking is that card manufactures process setting 's;
9.: Mobile banking is united two into one using ic card and phonecard, can be using the stealthy card number of identical method design.
After opening card, holder passes through to log in corresponding terminal, completes to initialize, and system can distribute a card number write Bank card dynamic data, here it is stealthy card number, stealthy card number will ensure uniqueness, a kind of method be exactly using trade date with Ordinal number during day trade transaction namely using application count national day trade transaction secondary ordinal number can it is also possible to Uniqueness is determined using the method such as transaction area or automatic teller machine numbering, in No. 08 benefit card of in December, 2011, she is the same day to applicant Open card for 8191st, mend card business applicant, stealthy card number can be just 2011120800008191.After write information, system Caching can be removed that is to say, that stealthy card number is that do not have banker's record, holder outwards announces, and bank operations are all cards Number, and automatic teller machine and computer, pos machine then must read stealthy card number, when Web bank or Mobile banking log in, does not have user name Login frame supplies holder to select it is only necessary to input password, and computer can be made the stealthy card number reading or mobile phone account by backstage Send for user name, system returns card number value, holder can decide whether to meet with fishing website accordingly, and holder can be in cabinet Member's machine, computer is voluntarily changed stealthy card number, and system-computed goes out newly stealthy card number and re-writes, but stealthy card number does not set Meter query function, because holder requires no knowledge about the number of stealthy card number, by its design it is recognised that a bank The stealthy card number of two of card differs, because a card, we synchronous can not possibly carry out automatic teller machine within the same time, or In computer two kinds transaction, in the present invention, Mobile banking uses ic card, stealthy card number can using similar method design and Use, except for the difference that, bank card first can check card number, and Mobile banking checks that card number is not very convenient, and mobile phone account is in advance It is set among Quick Response Code etc., it is similar with the design of stealthy card number, is numbering and the day that it is using card maker The ordinal number of phase and product completes uniqueness.
3: ID (identity number) card No. replacement code:
ID (identity number) card No. substitutes the identity that code is exactly that a kind of bank counter operator judge that the personnel of requests transaction provide Whether card number is consistent, and internet trading system judges a kind of encryption data of the bank card true and false:
1.: when the ID (identity number) card No. that clerk submits to is not inconsistent, can lead to can not calculate correct ID (identity number) card No. replacement Code;
2.: the ID (identity number) card No. that system identification goes out bank card record substitutes code when not being inconsistent, this bank card can be treated as pseudo- card Process;
3.: when Mobile banking and internet bank trade, ID (identity number) card No. substitutes code and will not be sent to other side website, holder Correct bank card is provided to occur during pseudo- card information it was demonstrated that having met with fishing website, other side website does not provide correct identity Card number leads to result of calculation to malfunction;
4.: the initialization that ID (identity number) card No. substitutes code can only be completed by holder is self-service on Web bank etc., teller Synchronously complete during machine initialization back side password, do not need holder to know the inside story or operation bidirectional,
ID (identity number) card No. is documented in has potential safety hazard on bank card, and others is easy to read using card reader, some People likes making password using the birthday, and others' forged identity card etc., the present invention devises ID (identity number) card No. and substitutes code, and it is adopted With Programming Principle, ID (identity number) card No. is encrypted, from unlike password, it is a kind of matching result it is not necessary to ensure only One property, server end storage is ID (identity number) card No., and the ID (identity number) card No. that is only of bank card storage substitutes code, bank's server All do not store ID (identity number) card No. and substitute code, sales counter examines holder's identity true and false, is to provide identity card by holder, by being Statistics calculates matching, and system examines the bank card true and false, then be to return ID (identity number) card No. by server, the identity being calculated by terminal Whether the ID (identity number) card No. replacement code that card number replacement code is recorded with bank card is consistent and judges the bank card true and false,
Generate ID (identity number) card No. replace example code: it be three numerals of ID (identity number) card No. one group be divided into 6 groups, every group three Numeral, divided by a number 11, it is several that remainder adds 1 to every three numerals, just from which position starts to intercept corresponding 6 groups of back side passwords Original character string, intercepts five, after being converted into 62 binary data, recycles ID (identity number) card No. divided by transcoding table, permutations of code control The total number of tabulation, it is several that remainder adds 1, and this number is exactly corresponding tables of data link variable, and program is connected to accordingly accordingly Tables of data, rearranges order by after 6 groups of digital transcodings, does not simply use character to replace code technique, but identification card number Results added after the numeral of code and transcoding, result >=62, just store corresponding numeral or letter, thus we are permissible Know although ID (identity number) card No. is consistent, but the ID (identity number) card No. in three kinds of storage mediums in the present invention substitutes code is all Differ, this read-only data is simply stored on bank card, will not be sent to server, system accounting calculate the two either with or without Corresponding relation, if server calculates the two mismatch, equally can refuse to conclude the business, during sales counter operation, due to ID (identity number) card No. It is not documented on bank card, the bank card that holder submits to equally has a calculating proof procedure, design system does not show The ID (identity number) card No. of holder substitutes code, is merely given as the conclusion whether result mate and is supplied to bank clerk, identity card Number substitute code can also using additive method synthesis, Basic Design main points be exactly submit ID (identity number) card No. to after it is possible to by being System obtains ID (identity number) card No. and substitutes code.

Claims (3)

1. a kind of initial method of bank card, is characterized in that:
1st step: holder is first in sales counter or self-service open the partially-initialized completing bank card on card apparatus;
2nd step: holder completes the initial work of following 3 class data on automatic teller machine or other self-service equipments;
Wherein, following 3 class data are initialized in the 2nd step:
1): the 1st class data, hide and be documented on bank card, cover layer is destroyed by holder, read and completed by automatic teller machine initial Change, described 1st class data is that bank's card backside utilizes several groups of data that paint film covers;
2): the 2nd class data is that ID (identity number) card No. substitutes code, and Primary Stage Data grasped by Kai Ka bank, write associated data can not be by Banker's record, holder will arrive sales counter transacting business, and this kind of data must result be mated, and holder just can commence business;
3): the 3rd class data refers to stealthy card number or Mobile banking's account, the data that holder does not grasp, this kind of data is readable Write data;
This 3 class data only needs to the initialization that holder manually completes the 1st class data, and the 2nd class, the 3rd class data are by system It is automatically performed.
2., according to the initial method of the bank card described in claim 1, it is silver that described ID (identity number) card No. substitutes code initialization Row sales counter operator judge whether the ID (identity number) card No. that the personnel of requests transaction provide is consistent, and internet trading system judges bank A kind of encryption data of ID (identity number) card No. of the card true and false, ID (identity number) card No. substitutes code and is stored in bank card, and ID (identity number) card No. stores In server:
1.: during over-the-counter trading, when the ID (identity number) card No. of clerk's submission is not inconsistent, can lead to can not calculate correct identity card Number substitutes code;
2.: system identification goes out the ID (identity number) card No. replacement code of bank card record and the ID (identity number) card No. calculating substitutes code and is not inconsistent When, this bank card can be treated as pseudo- card and process;
3.: when Mobile banking and internet bank trade;Business site sends ID (identity number) card No. to mobile phone or computer, mobile phone or electricity Brain program substitutes, using the ID (identity number) card No. that the ID (identity number) card No. that business site provides calculates, the identity that code is recorded with bank card When card number replacement code is not inconsistent, bank card can be worked as pseudo- card and process, when holder provides correct bank card appearance puppet card information, Proof has met with fishing website, and business site does not provide correct ID (identity number) card No. to lead to result of calculation to malfunction.
3. according to the initial method of the bank card described in claim 1, described the 3rd class data, it is characterized in that: the 3rd class Data refers to stealthy card number or Mobile banking's account,
1.: stealthy card number is exactly not have banker's record, a kind of dynamic electron data of only server and bank card record;
2.: stealthy card number data uniqueness is ensured by automatic teller machine or Web bank's program;
3.: stealthy card number can be changed after holder's input password, but inquiry is not provided, modification result is automatic by automatic teller machine Control;
4.: stealthy card number is a kind of clear data not having and encrypting, and its server end is completely the same with the data of bank card 's;
5.: automatic teller machine and pos machine must read stealthy card number, and the stealthy card number recorded with server is verified;
6.: when Web bank and Mobile banking log in, do not have user name login frame to supply holder to select it is only necessary to input password, Computer or mobile phone can send by backstage the stealthy card number reading or Mobile banking's account as user name, and system returns bank Card number value, holder can decide whether to meet with fishing website accordingly;
7.: the stealthy card number of a bank card or Mobile banking's account all differ;
8.: stealthy card number is set not in bank counter, the account data of Mobile banking is that card manufactures process setting;
9.: Mobile banking is united two into one using ic card and phonecard, stealthy card number is designed using handset program.
CN201310585475.7A 2013-05-01 2013-05-01 Initialization for bank card Active CN103632297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310585475.7A CN103632297B (en) 2013-05-01 2013-05-01 Initialization for bank card

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310174989.3A CN103714626B (en) 2013-05-01 2013-05-01 Many password early warning types can different card control bank card
CN201310585475.7A CN103632297B (en) 2013-05-01 2013-05-01 Initialization for bank card

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201310174989.3A Division CN103714626B (en) 2013-05-01 2013-05-01 Many password early warning types can different card control bank card

Publications (2)

Publication Number Publication Date
CN103632297A CN103632297A (en) 2014-03-12
CN103632297B true CN103632297B (en) 2017-01-18

Family

ID=50213316

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310585475.7A Active CN103632297B (en) 2013-05-01 2013-05-01 Initialization for bank card

Country Status (1)

Country Link
CN (1) CN103632297B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161006B8 (en) * 2015-04-06 2022-07-08 杨艺 Digital encryption algorithm
CN106648743B (en) * 2016-10-19 2021-03-02 广州视源电子科技股份有限公司 Terminal initialization method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8245916B2 (en) * 1998-04-17 2012-08-21 Diebold, Incorporated Card activated cash dispensing automated banking machine system and method
CN102779382A (en) * 2012-06-27 2012-11-14 深圳市威码数据设备有限公司 Self-service issuing device for social security financial IC (integrated circuit) card and data processing method thereof
CN202677528U (en) * 2012-05-31 2013-01-16 浙江金大科技有限公司 Portable self-service card issuing terminal
CN102881079A (en) * 2012-08-28 2013-01-16 汪风珍 Trampled multi-password early-warning type different card controllable bank card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8245916B2 (en) * 1998-04-17 2012-08-21 Diebold, Incorporated Card activated cash dispensing automated banking machine system and method
CN202677528U (en) * 2012-05-31 2013-01-16 浙江金大科技有限公司 Portable self-service card issuing terminal
CN102779382A (en) * 2012-06-27 2012-11-14 深圳市威码数据设备有限公司 Self-service issuing device for social security financial IC (integrated circuit) card and data processing method thereof
CN102881079A (en) * 2012-08-28 2013-01-16 汪风珍 Trampled multi-password early-warning type different card controllable bank card

Also Published As

Publication number Publication date
CN103632297A (en) 2014-03-12

Similar Documents

Publication Publication Date Title
DE112019001531B4 (en) Method of manufacturing an authenticated packaged product and system for verifying the authenticity of a packaged product
CN103714626B (en) Many password early warning types can different card control bank card
DE602004012996T2 (en) METHOD AND DEVICE FOR AUTHENTICATING USERS AND WEBSITES
DE112005003281B4 (en) Electronic signature security system
DE69624501T2 (en) PERSONAL ACCESS MANAGEMENT SYSTEM
DE69019037T2 (en) Multi-level security device and procedure with personal key.
DE69534757T2 (en) System and method for secure storage and distribution of data using digital signatures
EP2949094B1 (en) Method for authenticating a user with respect to a machine
EP2713345B1 (en) Method and system for the secure input of identifying data for authenticating a transaction performed by means of a self-service terminal
CN108062466A (en) The system and method for the anti-tamper anti-counterfeiting of ID card information in the Internet, applications
CN102112993A (en) Method and means for digital authentication of valuable goods
DE102007011309B4 (en) Method for authenticated transmission of a personalized data record or program to a hardware security module, in particular a franking machine
CN110929290A (en) Private key threshold backup, loss reporting and recovery system and method based on alliance chain
CN102298756A (en) Method for ensuring security of computer lottery trade information
DE102011116489A1 (en) A mobile terminal, transaction terminal and method for performing a transaction at a transaction terminal by means of a mobile terminal
DE102008028701B4 (en) Method and system for generating a derived electronic identity from a main electronic identity
CN101877636A (en) Equation password encryption method
DE112020004797T5 (en) MANAGING PHYSICAL OBJECTS USING CRYPTO ANCHORS
DE19716111A1 (en) Procedure for mutual authentication of two units
WO2013060789A1 (en) Device for handling paper money and/or coins and method for initializing and operating such a device
CN103632297B (en) Initialization for bank card
DE10353853A1 (en) Authorization of a transaction
EP2512090B1 (en) Method for authenticating a subscriber
EP3219133A1 (en) Authentication method, authentication system and authentication devices for authenticating an object
CN102789563A (en) Protecting system for information safety of website background program and protecting method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20181115

Address after: 401346 No. 88 Fucheng Road, Jieshi Town, Banan District, Chongqing

Patentee after: Chongqing days Spring Technology Co., Ltd.

Address before: 427226 the 9 groups of Jing Long Qiao village, Cili County, Hunan Province

Patentee before: Wang Fengzhen

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200420

Address after: 401320 No. 249 Yunan Avenue, Banan District, Chongqing, 8-29

Patentee after: Chongqing Boshi Intellectual Property Service Co., Ltd.

Address before: 401346 No. 88 Fucheng Road, Jieshi Town, Banan District, Chongqing

Patentee before: Chongqing days Spring Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201207

Address after: 313000 Fang Qiaotou, Zhili village, Zhili Town, Wuxing District, Huzhou, Zhejiang

Patentee after: Zhejiang Chuangwei New Material Co., Ltd

Address before: 401320 No. 249 Yunan Avenue, Banan District, Chongqing, 8-29

Patentee before: Chongqing Boshi Intellectual Property Service Co.,Ltd.