TW440800B - Credit card system and method - Google Patents
Credit card system and method Download PDFInfo
- Publication number
- TW440800B TW440800B TW088104706A TW88104706A TW440800B TW 440800 B TW440800 B TW 440800B TW 088104706 A TW088104706 A TW 088104706A TW 88104706 A TW88104706 A TW 88104706A TW 440800 B TW440800 B TW 440800B
- Authority
- TW
- Taiwan
- Prior art keywords
- credit card
- card number
- numbers
- limited use
- credit
- Prior art date
Links
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
"44 〇8 0 0 -----------------—--- 五、發明說明(1) 發明背景 1.發明領域 本發明是關於信用卡系統及方法,牲2ll a 付别疋關於一種可 減低信用卡號碼誤用的可能性的信用卡条姑n 1尔既及方法。 2.相關技藝 零售電子商務的發展日趨緩慢,雖狹p 1 热已知此類$易的 需求性。關於零售電子商務的擴展,最 取人的~個障礙在於 潛在可能的詐欺行為。此潛在可能的炸I s ρ A , L 疋^用卡公司和 金融機構的最主要考量,同時也是顧客以 啊各从及貨品和服務的 供應商的主要顧慮。 前者關於詐欺的考量因素是因為金融地姐 玉峨機構必須承換詐 欺行為的起始成本。此外,信用卡公司e 丄 匕丹~有效率的作 用卡系統,對於面對面的交易已可運作良姑 ^ ^ 氏好’亦即,*" 出示信用卡”的交易中,信用卡實質地出示到交 ^ 前,且交易者可取得信用卡號碼’在接受此产用者的面 簽名且大多數狀況下還可比對相片。 卡削比對 須付費。然 別的個人考 後者關於詐欺的考量是因為顧客最终必 而,對於信用卡的詐欺使用’消費者有些特 量,因為有時當信用卡號碼被第二者盜用時 明顯。因為可能信用卡還在消費者的手中。 發生時,消費者必須對信用卡提供者證明的 盜用。" 44 〇8 0 0 -------------- V. Description of the invention (1) Background of the invention 1. Field of the invention The present invention relates to a credit card system and method. 2 2ll a Pay no attention to a credit card method that can reduce the possibility of misuse of credit card numbers. 2. Related Skills The development of retail e-commerce is slowing down, although the demand for this kind of $ e is known. Regarding the expansion of retail e-commerce, the most attractive obstacle is the potential fraud. This potential explosion is the most important consideration for card companies and financial institutions, and it is also a major concern for customers and suppliers of goods and services. The former's consideration of fraud is because the financial elder sister Yu'e Institution must bear the initial cost of fraud. In addition, the credit card company e 丄 丹 有 ~ an efficient card system, which can be used for face-to-face transactions ^ ^ "Good", that is, in the "* " show credit card" transaction, the credit card is actually presented to the payment ^ Before, and the trader can obtain the credit card number 'is accepted by the user ’s signature and in most cases can also be compared with the photo. Card cut comparison must pay. However, other individuals test the latter's consideration of fraud because the customer must ultimately However, the use of 'credit card' for consumers of credit cards is somewhat special because it is sometimes obvious when a credit card number is misappropriated by a second party. Because the credit card may still be in the hands of the consumer. When this happens, the consumer must prove to the credit card provider Misappropriation.
相 j t IPhase j t I
還有另一考量是信用卡的超額收費 當高額度信用卡的使用者而言’存在了 440800Another consideration is the overcharging of credit cards. For users of high-value credit cards, ’440800
五、發明說明(2) 詐欺發生時,可能需要較長的時間才會被發現。一 _,擷取(skimnung广的特別的詐欺形式尤其難以種,為 畲信用卡持有人將卡片提供他人進行交易時,相:疋 由卡片上以電子形式或實質形式被複製,I 貝訊 片上。這可能關於旅遊者的一個特別問題,特,,一卡 旅遊期間,盜用的假信用卡可能出現在他處,J較長: 間才被發現。 對於信用卡的 細的姓名,主卡編 訊,以便查驗;這 此方法本身有其安 這些資訊來盜用信 此種盜用方式不僅 任何能夠非合法地 式的主要問題是信 用行為還是可以進 romised numbers ) 不誠實的員工就可 員工將信用卡的號 的。 遠知使用’信用卡的持有人必須提供詳 號,到期日和住址,以及許多其他的資 些資訊的儲存和更新是昂貴但必須的。 全上的風險,因為每個人都知道可使用 用卡持有人的帳號,取得貨物或服務。 限於合法地被告知這些資訊的人,甚至 取得這些資訊的人也可以做到。此種方 用卡可忐還在合法持有人的手中,但盜 行此通常稱為"泄露號碼(c 〇 m P _ '詐欺。事實上這樣的詐欺只需要一個 以達成,例如,商店,飯店或餐廳,的 碼紀錄下來。這和偷竊信用卡是不同 目前對於信用卡詐欺的解 遺失時’或精心製作驗證系統 j而引發k用卡公司的詢問β許 丨的查訊電話時,都亳不懷疑信 決措施僅能藉由當信用卡報丨 ’藉由卡片使用模式的改變 多使用者在接到信用卡公司j 用卡的使用狀況已呈異常,|5. Description of the invention (2) When fraud occurs, it may take a long time to be discovered. I_, extraction (skimnung Guang's special form of fraud is particularly difficult to plant. When credit card holders provide cards to others for transactions, they are: copied from the card in electronic or physical form. This may be a special problem for tourists. In particular, during a card tour, the stolen fake credit card may appear elsewhere, and J is longer: it was only discovered. For the name of the credit card, the main card newsletter, In order to check; this method has its own information to misappropriate the letter. This type of theft is not only any major issue that can be illegally performed, but also credit behavior or romised numbers.) Dishonest employees can use credit card numbers. . It is well known that holders who use a 'credit card' must provide their details, expiration date and address, as well as the storage and updating of many other information is expensive but necessary. All risks, because everyone knows that they can use the card holder's account number to get goods or services. It is restricted to those who are legally informed of this information, even those who have obtained it. Such a party card may still be in the hands of a legitimate holder, but the theft is often referred to as a "leak number" (comm P_ 'fraud. In fact, only one such fraud is needed to achieve, for example, a store , Restaurant or restaurant, the code is recorded. This is different from the theft of credit cards when the current solution to the loss of credit card fraud 'or elaborate verification system j, which caused the inquiries of the card company to inquire β Xu 丨 inquiries, There is no doubt that the decisive measure can only be used when the credit card reports 丨 'by changing the card usage mode. Many users have received abnormal use of the card by the credit card company, |
44 08 0 0 五、發明說明i 3) 一 一〜-一'------ 或由驗證服務的組織眼中看來已不尋常。 因此,有許多開發技術致力於克服信用卡詐欺 問題,包括信用卡的一般使用以及特別關於遠端使用44 08 0 0 V. Description of the invention i 3) One one ~~ one '------ Or it seems unusual by the organization of the verification service. As a result, there are many technologies developed to overcome credit card fraud, including the general use of credit cards and specifically about remote use
題。 V「CTJ 這些技術之一是提供智慧型的信用卡,這種卡勺人 嵌入式的電子電路,可儲存資訊或執行計算。4常 可藉由使用某些加密系統對信用卡安全系統性產生 t 關於此種智慧型的信用卡的一個典型的例子描述於宙 利編號5, 3 1 7, 636 (Vizcaino)。 、六國專 另一個技術是安全電子交易(SET)協定,代表了 居領導地位的電腦公司以及信用卡工 豕 於信用卡詳細資料的電子傳輸,#別是經“際 輸。此協定提供了-用來對信用卡詳細資料的加密 = 於電子交易的參與者的驗證。 及關 另一個特別關於網際網路的方法描述於美國 5,715,314(Payne等人)。美國專利編號5,7i5,3i4中蝙^ 了使兩-個進接訊息,纟中包含了產品序號以及 路 密碼鑰站的進接訊息驗證碼。購買者的電腦送出一個^ (payment)訊息到一個付款電腦,指示了某一特定的何机 品。付款電腦的程式設計為接收此付款訊息’產生一 接訊息,並將之傳送到一個銷售(merchant)電腦。因 接讯息連繋了某項產品以及某個特定的銷售電腦 ^ 440B00 五、發明說明(4) 不適用於電話/郵購的訂單工、 有些特別的電子交易w及其他傳統的信用卡交易3 Fr^e ,以及"First ,例如” Cyber ash”,"Check 的系統都有一些已知的問題〃可惜的是,這些已被建議 都=有人試著破解。此種形;盲先,任何可靠的加密形式 的前例,不免令人擔憂任付,^有取得政府的極機密資訊 一問題是某些加密系統最二密系統的可靠性。再者,另 全的需要,並非容易取得的王的形式,由於政府及其他安 系統在網際網路上的應用是兔限制電子交易系統以及安全 3目古相洛古niii〜多大用處的。雖然電子商務 A被4忍為疋具有相田问風險的領诚 AL ^ ^ 領域,然而實際上並不然。 IL· ?還有多種万法已祐垃pn 此外逬 α 士 $铍採用使"出示卡片"的交易更 具吸引力3例如 利公報編號平6-282556描述了一 種箪次信用卡服務供青少年的信用卡持有者使用。 此種系統的信用卡只能使用—次’其中亦記錄了多種資 訊,例如 .,、w w ΊΤ,从/入 机' 用額度,這些資讯與原仏用卡上的相同,且紀錄於question. V "CTJ One of these technologies is to provide smart credit cards. This kind of card is embedded with electronic circuits that can store information or perform calculations. 4 Often, the security of a credit card can be systematically generated by using certain encryption systems. About A typical example of this type of smart credit card is described in Zeuli number 5, 3 1 7, 636 (Vizcaino). Another technology of the six countries is the Secure Electronic Transaction (SET) agreement, which represents the leading computer The company and the credit card industry are engaged in the electronic transmission of credit card details. This agreement provides-encryption of credit card details = verification of participants in electronic transactions. And another method specifically related to the Internet is described in US 5,715,314 (Payne et al.). U.S. Patent Nos. 5,7i5 and 3i4 ^ make two-to-one access message, which contains the product serial number and access code verification code of the password key station. The purchaser's computer sends a ^ (payment) message to a payment computer, indicating a particular item. The payment computer is programmed to receive this payment message 'to generate a message and send it to a merchant computer. Because the message is connected to a certain product and a specific sales computer ^ 440B00 V. Description of the invention (4) Not applicable to telephone / mail order orderers, some special electronic transactions, and other traditional credit card transactions 3 Fr ^ e , As well as "First", such as "Cyber ash", "Check's system have some known problems. Unfortunately, these have been suggested = someone tried to crack. This form; blindly, the precedent of any reliable form of encryption can inevitably cause people to worry about paying for it. ^ Obtaining extremely confidential information from the government. One problem is the reliability of the most dense system of some encryption systems. Moreover, another need is not the easy-to-obtain form of the king, because the application of government and other security systems on the Internet is to limit the use of electronic trading systems and security by the three-dimensional ancient phase Luogu niii ~ how useful. Although e-commerce A has been tolerated as the leading AL ^ ^ field with the risk of Aida, it is actually not the case. There are many other ways that IL has been used. In addition, the use of 铍 α and $ beryllium has made the transaction of "show card" more attractive. For credit card holders. Credit cards of this kind of system can only be used—times ’which also records a variety of information, such as .., w w ΊΤ, slave / entry 'credits. These information are the same as those on the original credit card and are recorded in
竺戸' …、v m叫卜上的相同,且紀錄於—資料 元件,並顯示在此信用卡的表面上。此種單次信用卡包含 相同的會員編號’使用期限’發卡公司編號,以及與現存 的信用卡相同的資料’如單次使用信用卡的使用期限不能 超過信用卡的使用期限’可用的信用額度亦同。此種單次 俨用卡使用了一些與傳統信用卡相同的方法。然而,此系 2亦需要將使用許可的資訊紀錄在信用卡上,此資訊只允 許此信用卡使用一次’或者使之在超過信用額度時無法再 。—特別的卡片終端機裝·置檢查由卡上取得的資訊的 使用D H w &,特定的個人資訊,使用條件,以及一認可的信 杳訊與原信用丰L k . _ — _ , _ ^ ^ ..Zhu Zhu '…, v m are the same on Bu, and are recorded in the —data element, and displayed on the surface of this credit card. This single-time credit card contains the same membership number 'use period' card issuer number and the same information as the existing credit card 'if the single use credit card's use period cannot exceed the credit card's use period' the same credit limit is available. This single-use card uses some of the same methods as traditional credit cards. However, this department 2 also needs to record the usage permission information on the credit card. This information only allows this credit card to be used once 'or makes it impossible to use it when it exceeds the credit limit. —Special card terminal equipment installation check the use of information obtained from the card DH w & specific personal information, conditions of use, and an approved letter and original credit Lk. _ — _, _ ^ ^ ..
\PA*B〇6〇ptl1 第8頁 五、發明說明(5) 正確性並且當卡片已不允許使用時’將使用許可的資訊傳 輸到信用卡發卡公司。使用許可的資訊是以卡片上的打孔 方式來記錄。此系統具有一的明顯的缺點’例如’卡片終 端機必須修改以便加入額外的功能(如’打孔,偵測打 孔,通知額外的資訊等)°而且’此種系統提供了極小的 額外安全性程度,以致詐欺仍可能發生’例如可能藉著將 卡片上的孔蓋住或取代信用卡上的使用許可資訊。再者, 如果採用此種系統的話,可能需要修改所有的信用卡終端 機裝備。 專利編號5, 627, 355和5, 478, 994(Rahman等)描述了另 一種形式的系統’使用了多種用戶識別代碼,加入信用卡 號碼中並顯示於一電子顯示器°美國專利編號5, 627, 355 i 描述了 一種具有記憶元件的信用卡,其中包含以預訂順序 排列的一組密碼。這些密碼與主機控制電腦的記憶體上所; 紀錄的另一列密碼相同。並且,信用卡上包括一個第一固 定欄位’其上包含一帳號(例如’" 444 222 3331·)。運作 , 時’每次使用信用卡時,信用卡的記憶元件裝置由序列中丨 提供一獨特的密碼。此驗證方式為比較帳號和信用卡裝置丨 每次使用所提供的密碼與主機電腦上所紀錄的帳號和序列| 中的下一號碼。交易結束後主機電腦將該密碼設為無效。 此種系統的缺點是需要一電源,顯示器,記憶裝置,聲音丨 產生器,且須重新利用有限序列的用戶識別代碼。此種系: 統不易適用於現有的信用卡交易,因為缺乏提供卡號的檢丨\ PA * B〇6〇ptl1 Page 8 V. Description of the invention (5) Correctness and when the card is not allowed to be used ', the information about the use permission is transmitted to the credit card issuer. The permission information is recorded by punching on the card. This system has a significant disadvantage 'e.g.' the card terminal must be modified to add additional features (such as' punch, detect punch, notify additional information, etc. ') and' this system provides minimal additional security Sexuality, so that fraud can still occur ', for example, by covering the hole on the card or replacing the license information on the credit card. Furthermore, if such a system is adopted, all credit card terminal equipment may need to be modified. Patent numbers 5, 627, 355 and 5, 478, 994 (Rahman et al.) Describe another form of system 'using multiple user identification codes, added to a credit card number and displayed on an electronic display ° US patent number 5, 627, 355 i describes a credit card with a memory element that contains a set of codes arranged in a pre-ordered order. These passwords are the same as those stored on the host's control computer's memory; another row of passwords is recorded. Also, the credit card includes a first fixed field, which contains an account number (e.g., " 444 222 3331 ·). Every time a credit card is used, the memory device of the credit card provides a unique password in the sequence. This verification method is to compare the account number with the credit card device every time the password provided is used against the next number in the account number and sequence recorded on the host computer. The host computer disables the password after the transaction. The disadvantage of this system is that it requires a power source, display, memory device, sound generator, and it must reuse a limited sequence of user identification codes. This system: It is not easy to apply to existing credit card transactions, because there is no check to provide card numbers.
I 查和(checksum)能力以及無法由標準的卡片讀取機讀取。 丨I checksum capability and cannot be read by standard card readers.丨
A:\PA-B060.ptd 第9頁 4 d 〇3 0 〇 一一___________________ 五、發明說明(6) 而且,若卡片遺失或被偷竊’難以避免他人盜用’除非已 由真正持有人已申報遺失。亦可參考美國專利編號5, 606, 614(Brady 等)° 其他方法亦嘗試將基金只允許個人使用’但亦有限 制。例如,美國專利編號5, 3 50, 90 6 (Brody等)以及5, 3 2 6, 9 6 0 (Tannenbaum等)描述了由ATM (自動提款機)對一個帳戶 發出暫時的用戶識別代碼,僅供一次使用或有限時間的有 限額度使用。這些專利描述了對於一 A T Μ網路的一個現金 轉帳系統和方法。在此系統中,一個主要帳戶擁有者(贊 助者)設定—個子帳戶,一個非用戶可藉由出示屬於子帳 丨 户的一固定限度的卡片並輸入一對應的密碼來使用此子帳 戶° —旦固定的額度限制到達,此卡便不能再使用。相關 於贊助帳戶的資訊包含於固定限度的卡片之磁條上。所有 這些系統的問題是有許多競爭的技術,因此有多種不相容 的格式’對於貿易商和消費者都是一種障礙。同樣地,這 $系統許多都需要修改目前已使用的技術,這將會需要相 ^大的投資,並且限制了系統的採用。 發明之 目的及概要 Ζ於信用卡交易的安全性問題已有許多建議的解決方| °然而’沒有一種允許使用現存的信用卡及現存的信用: —t- Ζ八和終端設備。理想上而言,對目前的發明者來說,丨 m2. >Jl hu 二 累最好能獲得信用卡的功能,但實際上不顯露出信: BJ -J?· j# 、說碼。可惜的是,惟一能保證主信用卡號碼不被盜丨 用的方、土 a u & ! 壬疋永不將主信用卡號碼經由任何路徑傳輸出去,丨A: \ PA-B060.ptd Page 9 4 d 〇3 0 〇 一一 ___________________ V. Description of the Invention (6) Moreover, if the card is lost or stolen, it is 'difficult to prevent misappropriation by others' unless it has been taken by the real holder Declaration is missing. See also U.S. Patent No. 5,606, 614 (Brady, etc.) ° Other methods have also tried to limit the fund to personal use ’but also limited. For example, U.S. Patent Nos. 5, 3 50, 90 6 (Brody, etc.) and 5, 3 2 6, 9 6 0 (Tannenbaum, etc.) describe the provision of a temporary user identification code to an account by an ATM (Automated Teller Machine), Only for one use or for a limited time. These patents describe a cash transfer system and method for an ATM network. In this system, a main account owner (sponsor) sets a sub-account. A non-user can use this sub-account by presenting a fixed limit card belonging to the sub-account and entering a corresponding password. — — Once the fixed limit is reached, the card can no longer be used. Information about sponsored accounts is contained on the magnetic stripe of fixed-limit cards. The problem with all these systems is that there are many competing technologies and therefore multiple incompatible formats' are an obstacle for traders and consumers. Similarly, many of these systems need to modify the currently used technology, which will require considerable investment and limit the system's adoption. Purpose and Summary of the Invention There have been many proposed solutions to the security issues of credit card transactions | ° However, there is no one that allows the use of existing credit cards and existing credits: t-z-Bahe terminal equipment. Ideally, for the current inventor, m2. ≫ Jl hu Erlei is best to get the function of a credit card, but the letter is not actually revealed: BJ -J? · J #, say code. Unfortunately, the only party that can guarantee that the main credit card number is not stolen 丨 a u &! Ren Ye never transmits the main credit card number through any path, 丨
第10頁 五、發明說明(7) 一--------- 如電話,郵件’網際網路’甚至在交易過程中列印出主 , 用卡號,如目前使用的方式。 依據範例的實施例,藉由提供一更安全的使用現存作 用卡的方式’特別是提供在遠端信用卡交易中使用現存^ 信用卡的一種改進方式,本發明可改進現存的信用卡系。 本發明進一步地達成提供一種使用現存信用卡更為安全的 方式,且不須對現存的信用卡系統做任何主要的修改。本 發明更進一步地達成提供一個改進的信用卡系統,更具使 用者親和性’且提供消費者對系統安全性更大的信心。 再者,在某一實施例中’本發明亦提供了一個改進的 i 信用卡系統,將不需要使用昂貴且容易出錯的加密系統。 本發明亦達成了提供一能讓使用者獲得信用卡的功能但永 不須顯露主信用卡編號之改進的信用卡系統° 再者,本發明亦達成盡可能地克服”擷取”及”泄露號 碼"詐欺的意外事件。 本發明的這些及其他目的可由一第一範例實施例達Page 10 V. Description of the invention (7) A --------- For example, telephone, mail ‘Internet’, or even print out the main card in the transaction process, using the card number, such as the current method. According to an exemplary embodiment, the present invention can improve an existing credit card system by providing a more secure way of using an existing usage card ', and particularly by providing an improved way of using an existing ^ credit card in a remote credit card transaction. The invention further achieves to provide a more secure way to use existing credit cards without any major modifications to existing credit card systems. The invention further achieves to provide an improved credit card system that is more user-friendly and provides consumers with greater confidence in the security of the system. Furthermore, in one embodiment, the present invention also provides an improved i-credit card system, which does not require the use of an expensive and error-prone encryption system. The present invention also provides an improved credit card system that allows users to obtain credit card functions without ever revealing the main credit card number. Furthermore, the present invention also achieves to overcome "retrieval" and "leakage numbers" as much as possible Accidents of fraud. These and other objects of the invention are achieved by a first exemplary embodiment.
成,其中關於信用卡的技術包括: I 維持一信用卡的號碼的集合’共用同樣的格式;由信I 用卡號碼的集合中指定直少一個信用卡號碼為一主仏用卡 :號碼,由信用卡號碼的集合中指定至少一個信用卡號碼為|: 一有限使用的信用卡號瑪,此號瑪在一使用觸發 i use-triggered)的條件之後就會變為無效;以及將主仏用丨 :卡號碼與有限使用的信用卡號碼結合,然而保證無法根據丨 ;有限使用的信用卡號碼而得知主信用卡號禍。 |The credit card technology includes: I maintain a set of credit card numbers' share the same format; the letter I uses a set of card numbers to specify at least one credit card number as a primary card number: number, from the credit card number Specify at least one credit card number in the set of |: a limited-use credit card number, which will become invalid after the condition triggering i use-triggered); Limited use of credit card numbers, however, it is guaranteed that the main credit card number cannot be learned from the limited use of credit card numbers. |
- ______——-------------- ·— — ·-·---------— ------------,____ __________. -———— ------- — 五、發明說明(8) 此技術進一步地包括了:接收有限使用的信用卡已使 用於信用卡交易的通報;根據此通報決定是否一個有限使 用的事件已發生,若是的話,產生一使無效的命令;以 及’若一有限使用的事件已發生的話,依據伴隨著使用觸 發條件而產生的使無效的命令,將此有限使用的信用卡變 為無效。在一實施例中’有限使用的事件的發生是指該有 限使用的信用卡已只使用了一次。在另一實施例中,有限 使用的事件的發生是指當有限使用的信用卡的累積的花費 已超出規定的金錢量,超出規定的使用頻率,以及/或是 使用頻率,個別交易量以及總交易量的組合。 在本發明的一實施例中,額外的有限*使用的信用卡號 碼是在信用卡持有人一使用超過一預設的有限使用的信用| 卡號碼的數量時自動配置的。優點是主信用卡持有人不須 在每次需要時再作要求。 :-______——-------------- · ——-·-· ---------— ------------, ____ __________. -———— ------- — V. Description of the invention (8) This technology further includes: receiving a notification that a limited-use credit card has been used for credit card transactions; determining whether a limited-use event is based on this notification Has occurred, and if so, generates an invalidation order; and 'if a limited use event has occurred, the limited use credit card is made invalid according to the invalidation order accompanying the use trigger condition. In one embodiment, the occurrence of a limited use event means that the limited use credit card has been used only once. In another embodiment, the occurrence of a limited use event occurs when the cumulative spending of a limited use credit card has exceeded a prescribed amount of money, exceeded a prescribed use frequency, and / or used frequency, individual transaction volume, and total transactions. A combination of quantities. In one embodiment of the present invention, the additional limited * used credit card number is automatically configured when a credit card holder uses more than a preset number of limited use credit | card numbers. The advantage is that the main credit card holder does not need to make a request every time. :
在另一實施例令,提供了 一個依據主信用卡號碼和有 限使用的信用卡號碼之一而用來執行信用卡交易的技術’ IIn another embodiment, a technique is provided for performing a credit card transaction based on one of a main credit card number and a restricted credit card number 'I
其中有限使用的信用卡號碼是依攄主信用卡號碼而隨機選 擇的’但有限使用的信用卡號碼包括了與主信用卡號碼相 同的格式,且與主信用卡號碼相關。此技術包括:依據主 信用卡號碼或有限使用的信用卡號碼產生一交易訊息而進 入交易;接收交易訊息並處理此交易。處理交易的步驟包 括:授權或拒絕此交易;當有限使用的信用卡用來執行交 易後決定是壬你右限使用的信用卡號碼變為無效’若是貝1JThe limited use credit card number is randomly selected according to the main credit card number, but the limited use credit card number includes the same format as the main credit card number and is related to the main credit card number. This technology includes: entering a transaction based on a main credit card number or a limited-use credit card number to enter a transaction; receiving the transaction message and processing the transaction. The steps for processing a transaction include: authorizing or rejecting the transaction; when a limited-use credit card is used to execute the transaction, it is determined that the credit card number used by your right-hand card will become invalid.
_________________________ 五'發明說明t9) 信用卡號碼變為無效的步驟是依據關於此有限使用的信用 卡號碼的有限使用的事件是否已發生,若是的話,則產生 一使無效的命令;並依據此命令將此有限使用的信用卡號 碼變為無效。 前述的技術的一個優點是信用卡持有人可獲得信用卡 的功能但卻永不需要在交易的過程中顯露出主信用卡的號 碼。更特別地,根據本發明的一較佳實施例,在有限使用 的信用卡號碼和主信用卡號碼之間沒有數學的關聯性。這 是由於此號碼是由在不同的顧客需求時,由一組可用的有 限使用的信用卡號碼中隨機選出的。因此實際上不可能預 丨 測哪一個顧客在任一時間會尋找號碼,或是會如何配置這 些號碼a : 再者,此技術可使用一有限使用的信用卡號碼,且" 泄露號碼"信用卡詐欺的可能性也可能消除,或者至少大 丨 大地減低。除此之外,在此信用卡技術的一實施例中,配 置了一預設的信用額度等等。不論商家是否遵守規則(例 : 如,藉著超額收費或提供額外貨物品的詐欺方式),對於 | 信用卡持有人而言的整體風險直接相關於預設的信用額度 限制,因此可以最小化。 , 圖例之簡要說明 : 關於本發明前述的,及其他的目的,特性和優點可經 | 由閱讀下列的圖例及詳細說明而更加了解: 第一圖顯示了一個實施本發明的範例系統; | 第二圖以高階的形式,顯示了第一圖中所示的中央處_________________________ V. Description of the invention t9) The step of invalidating the credit card number is based on whether a limited use event of the limited use credit card number has occurred, and if so, an invalidation order is generated; The credit card number used is invalid. One of the advantages of the aforementioned technology is that credit card holders can obtain credit card functionality but never need to reveal the number of the primary credit card during the transaction. More particularly, according to a preferred embodiment of the present invention, there is no mathematical correlation between a credit card number that is limited to use and the main credit card number. This is because this number is randomly selected from a set of available limited-use credit card numbers when different customers demand it. Therefore, it is actually impossible to predict which customers will look for numbers at any time, or how these numbers will be configured a: Furthermore, this technology can use a limited number of credit card numbers, and " leaked numbers " credit card fraud The possibility may be eliminated, or at least greatly reduced. In addition, in one embodiment of the credit card technology, a preset credit limit and the like are configured. Regardless of whether the merchant complies with the rules (for example, by fraudulent means of overcharging or providing additional goods), the overall risk for the | credit card holder is directly related to the preset credit limit and can therefore be minimized. Brief description of the legend: The foregoing and other objects, features and advantages of the present invention can be understood by reading the following legends and detailed descriptions: The first figure shows an example system for implementing the present invention; The second picture shows the center of the first picture in higher order
A:\PA-B060.ptd 第13頁 __4_4P8_° 0_____________________________________ 五、發明說明c 10) 理站的運作: 第三圖為一流程圖,說明了用來配置信用卡號碼的一 個範例程序; 第四圖為一流程圖,說明了用來限定一個信用卡號碼 使用的一個範例程序;A: \ PA-B060.ptd Page 13 __4_4P8_ ° 0_____________________________________ V. Description of the invention c 10) Operation of the management station: The third diagram is a flowchart illustrating an example procedure for configuring a credit card number; the fourth diagram Is a flowchart illustrating an example procedure for limiting the use of a credit card number;
第五圖為一流程圖,說明了用來分配信用卡號碼的一 個範例程序: I 第六圖為一流程圖,說明了用來電子式地使用信用卡 號碼一個範例程序; 第七圖為一流程圖,說明了用來處理交易的一個範例 程序; i 第八圖為一流程圖,說明了用來處理交易的另一個範 | 例程序: 丨 第九圖為一流程圖,說明了用來使用信用卡號碼為 P I N號碼的一個範例程序; 圖例之詳細說明 在此說明書中,”信用卡”這個名詞是指信用卡,(包 1The fifth diagram is a flowchart illustrating an example procedure for assigning a credit card number: I The sixth diagram is a flowchart illustrating an example procedure for using a credit card number electronically; the seventh diagram is a flowchart , Illustrates a sample program for processing transactions; i Figure 8 is a flowchart illustrating another example of processing transactions | Example program: 丨 Figure 9 is a flowchart illustrating the use of credit cards The number is a sample program of PIN number; detailed description of the legend In this manual, the term "credit card" refers to credit card, (package 1
I 括MasterCard,Visa > Diners Club等等)以及簽帳卡(例 丨 如,American Express,.以及一些百貨公司的卡),還有 丨I include MasterCard, Visa > Diners Club, etc.) and debit cards (for example, American Express,. And some department store cards), and 丨
借貸卡,例如可用在AT Μ以及許多其他地方的卡,或是與 一個特定帳戶結合的卡,以及混合種類的卡(例如,延期 I * iDebit cards, such as those that can be used at AT and many other places, or cards that are combined with a specific account, and mixed types of cards (for example, deferred I * i
付款的American Express,具有Visa標諸的銀行借貸 IAmerican Express for payment, bank lending with Visa I
卡)。此外,所謂”主信用卡號碼”以及”主信用卡"是指信 Icard). In addition, the so-called "primary credit card number" and "primary credit card" refer to letter I
I 用卡號碼和信用卡,如同通常所知的字面上的意義,是由 丨I use a card number and credit card, as commonly known literally, by 丨
\:\PA-B060.pid 第14頁\: \ PA-B060.pid Page 14
* 44 〇B o Q 五、發明說明(11) 信用卡提供者所配置給顧客,用在他或她個人的帳戶。應 了解的是,在本說明書中的涵義,一個帳戶可能有多個主 信用卡。例如一個公司可能提供信用卡給了多個員工,基 本上雖然只有一個顧客帳戶,但每個員工都擁有一張主信 用卡。這些主信用卡的每一張都具有一個獨特的主信用卡 號碼,而這一組主信用卡都連結到同一個帳戶。相同地, 在家庭中多個成員可能都擁有一張主信用卡,而這些主信 用卡都由同一個顧客帳戶來付款。 名詞〃有限使用"信用卡號碼用在至少兩個實施例中, 在一實施例中表示此種信用卡只能使用一次,在另一實施 例中此種信用卡能使用多次,只要累積的花費不超過一規 定的臨界值,例如,一個單一的總記帳額,在一有限期間 的總記帳額,或是單次交易的總記帳額等等。一個共同的 特性是此限制基於一個使用觸發條件,而不只是使用期 限。 1.系統特徵概要 要實現本發明至少有兩種不同的方法。以發明概要來 說,一種是對遠端交易額外信用卡號碼的配置,而第二種 則是提供對遠端及出示信用卡的交易中,皆可有效地任意 處置的信用卡;兩者都可用於單次使用模式和多次使用模 式的特徵之下,並且能受保護以免於泄露號碼的詐欺或擷 ;取的最壞影響。 . ; 在此項發明的改良中,控制與不道德的商品及服務供 ;應商進行真正的交易並加以保護是有可能的。* 44 〇B o Q 5. Description of the invention (11) The credit card provider allocates to the customer and uses it in his or her personal account. It should be understood that what is meant in this manual may have multiple primary credit cards for one account. For example, a company may provide credit cards to multiple employees. Although there is basically only one customer account, each employee has a primary credit card. Each of these master credit cards has a unique master credit card number, and the set of master credit cards are all linked to the same account. Similarly, multiple members of the family may have a master credit card, and these master credit cards are all paid by the same customer account. The term 〃limited use " credit card number is used in at least two embodiments. In one embodiment, this type of credit card can only be used once. In another embodiment, this type of credit card can be used multiple times. Exceeds a specified threshold, for example, a single total billing amount, a total billing amount for a limited period, or a single transaction billing amount, etc. A common feature is that this limit is based on a usage trigger, not just a lifetime. 1. System Feature Summary There are at least two different ways to implement the invention. In summary of the invention, one is the configuration of additional credit card numbers for remote transactions, while the second is to provide credit cards that can be effectively disposed of in both remote and presenting credit card transactions; both can be used for single Under the characteristics of the second use mode and the multiple use mode, and can be protected from the fraud or retrieval of the leaked number; In the improvement of this invention, it is possible to control and protect the supply of unethical goods and services;
Λ:\ΡΛ-Β060.ρΜ 第15頁Λ: \ ΡΛ-Β060.ρΜ Page 15
* d4〇BOO 五、發明說明(12) 基本上 首先是 面;然 地被實 商如何 /或服 關 信闱卡 這 得主信 遠端交 的多次 次使用 多次使 也 有在任 詳細討 用卡交 首 用的額 使用在 卡號碼 緊要的 中,舉 關於作業 後是技術 行,如何 掌握這項 務提供者 於這項發 系統的内 項發明的 用卡持有 易之額外 使用信用 的額外信 用的額外 可以想像 何信用卡 論。還有 易安全性 先處理當 外信用卡 一個單次 沒有洩漏 。各種其 例來說, 些與這項發明有關& I ,關的事項尚需加以考慮。 及功此方面的特徽,姑· αι β 竹微特別是影響顧客的方 方面的特徵,換白 、勺°舌說就是此項發明如何 地板供給顧客;最後是商品及服務的供應 發明以及信用卡的處理機,即金融機構及 明之作 容中討 一個基 人能被 的單次 卡號碼 用卡; 信用卡 在某些 公司開 許多其 的情況 主信用 號碼的 的交易 給第三 他的特 交易的 業及功能方面的特徵將首先在標準 論。 f特徵是提供在信用卡系統中,使 提供一項或多項以下的情形:丨)對 使用信用卡號碼;2 )對遠端交易 ;3)對遠端及出示信用卡交易之單 以及4)對遠端及出示信用卡交易之 情況下,信 戶的人。這 他的特徵可 下加以提供。 卡持有人擁有配置給 情況。一般認為既然 用卡可以 項較後的 以在以上 中,當號碼 者時,號碼 徵可加在單 金額可以予 提供給那些沒 特徵將在底下 大幅改善了信 其作為單次使 這個號碼只能 作用及主信用 手中便是無關 已被失去 在任何人 次使用的信用卡號碼 以限制 如此一來主信 \PA-B060.ptd 第16頁 五、發明說明(13) 用卡持有人便擁有單次使用信用卡號碼相對於不同金額的 多重性=例如’當執行遠端交易時’主信用卡持有人可以 使用信用卡額度稍大於或等於交易金額的信用卡號碼。這 樣將可減少或防止不道德交易者使用信用卡號碼來增加預 訂的商品或服務數量,或是增加雙方所同意之交易金額。 第二個有關於此發明的實施例是提供主信用卡持有人 對遠端交易額外的信用卡號碼,而這個號碼就如同前面發 明的例子,對每個交易都具有額度限制;或是使得當一連 事交易的加總超過某一額度限制時,這個信用卡號碼將會 被取消、失效、或其他方面失去作用。同樣地’多次使用i 俨用卡號碼也可受限於某額度’例如’在五次的使用額度 内每個交易不超過$100,而且加總的信用額度不超過 1 $400。同樣地,時間的限制也可以加入信用卡號碼中,使 i 得若使用頻率高於(或低於)某一給定臨界值時’例如超過i 一週一次,卡號將失去作用。對單次使用之信用卡號或是丨 多次使用之信用卡號上置入額度限制將被認為是幾乎沒有I 限制的;而且有許多技藝用來在其他方面使信用卡號的使; 用受到限制,不論是依據時間、數量、使用頻率、地理區 域、或是使用目的(諸如網際網路交易的限制等等),或是| 這些分別判斷標準的組合β —第三個可用此項發明實行的應用是實質上提供額外的i 單次使用信用卡,其中每一個都有唯一的額外信用卡號 i 碼。此種額外的單次使用信用卡隨後即可用在遠端父易’丨 藉由對每個交易使用額外信用卡號碼;以及對11出示信用* d4〇BOO V. Description of the invention (12) Basically the first is face-to-face; however, how is it used by the real merchant and / or the service letter card? The first used amount is used in the card number is critical. For example, after the operation is a technical bank, how to master the extra credit of the use of the credit of the service provider's internal invention of the card in this issuing system. The extra one can imagine Ho credit card theory. There is also easy security to deal with the current credit card first one time without leaking. In various cases, these matters related to this invention & I need to be considered. And the special emblem of this aspect, Gu α α β bamboo micro, especially the characteristics that affect customers in all aspects, changing the white and spoon is the invention of how this floor is provided to customers; finally, the invention of the supply of goods and services and credit cards Processors, that is, financial institutions and Ming Zhisong to discuss the use of a single card number can be used by a base person; credit card in some companies to open many cases of the main credit number of transactions to the third of his special transactions The characteristics of industry and function will first be in standard theory. The f feature is provided in the credit card system so that one or more of the following situations are provided: 丨) for the use of credit card numbers; 2) for remote transactions; 3) for remote and presentation of credit card transactions and 4) for remote And in the case of a credit card transaction, someone who trusts. These other characteristics are provided below. The card holder owns the allocation to the situation. It is generally believed that since the card can be used later in the above, when the number is numbered, the number can be added to the single amount can be provided to those who have no characteristics will be greatly improved under the letter. As a single time, this number can only be used. The role and the main credit card are irrelevant. The credit card number that has been lost to any person is used to restrict the main letter. PA-B060.ptd Page 16 V. Description of the invention (13) The card holder has a single The multiplicity of using a credit card number relative to different amounts = For example, 'when performing a remote transaction', the primary credit card holder can use a credit card number with a credit card amount slightly greater than or equal to the transaction amount. This will reduce or prevent unscrupulous traders from using credit card numbers to increase the number of pre-ordered goods or services, or to increase the transaction amount agreed by both parties. The second embodiment of this invention is to provide the main credit card holder with an additional credit card number for remote transactions, and this number is like the previous invention example, with a limit on each transaction; or When the sum of transactions exceeds a certain limit, the credit card number will be cancelled, expired, or otherwise invalidated. Similarly, 'multi-use i' card number can also be limited to a certain amount ', for example,' each transaction does not exceed $ 100 within five usage limits, and the total credit limit does not exceed 1 $ 400. Similarly, the time limit can also be added to the credit card number, so that if the frequency of use is higher (or lower) than a given threshold value, for example, more than once a week, the card number will lose its effect. Limits on single-use credit card numbers or multiple-use credit card numbers will be considered to have almost no I limit; and there are many techniques used to make use of credit card numbers in other ways; restrictions on use, Whether it is based on time, quantity, frequency of use, geographical area, or purpose of use (such as restrictions on Internet transactions, etc.), or | a combination of these separate criteria β-the third application that can be implemented with this invention Is essentially offering additional i single use credit cards, each of which has a unique additional credit card number i code. This additional single-use credit card can then be used at the remote parent ’s by using an additional credit card number for each transaction; and presenting credit to 11
五、發明說明(14) 卡n交易中,每張卡在正常情形下會被"刷卡"。此種可任 意處置的信用卡可像一般信用卡一樣地製造,或是來自於 相對便宜的原料,例如硬紙板或薄塑膠,使得有關的資訊 能寫入成可讀的形式(例如磁性),如同已經存在於公共運 輸工具之通行證的許多形式及其他相似的情形。再一次, 對於信用卡號碼之大量相同的用途可被提出。例如可任意 處置的信用卡可受到地理上的、使用用途的、數量的、使 用頻率的、乃至於到期曰等等的額度限制。同樣地,這些 技藝將顯現出這個概念的許多變異。 實行此發明的的另一方法是提供主信用卡持有人多次 丨 使用的額外信用卡,其中額外信用卡提供了任意的限制1 如使用觸發條件以在隨後達成想要的情形。 | 理想地說,不論這項發明如何地被實行,主信用卡持 有人將會被提供不是具有多重性的單次使用額外信用卡號 碼,就是多次使用之額外信用卡號碼,或者是單次使用及 多次使用信用卡的混合。 ; 不論是單次使用之信用卡號碼或是單次使用之額外信 | 用卡都會被認為是有可能消去或降低信用卡號碼詐欺的風 ; 險。更有甚者,藉由將信用額度傳入特別的信用卡號碼,; 或是額外的信用卡號碼,亦或是單次使用之額外信用卡;V. Description of the Invention (14) In card n transactions, each card will be " swipe " under normal circumstances. This disposable credit card can be manufactured like a normal credit card, or it can be derived from relatively cheap materials, such as cardboard or thin plastic, so that the relevant information can be written in a readable form (such as magnetic), as if There are many forms of passes for public transport and other similar situations. Again, a large number of identical uses for credit card numbers can be proposed. For example, credit cards that can be disposed of arbitrarily can be restricted by geographical, usage, quantity, frequency of use, and even expiration date. As such, these techniques will reveal many variations on this concept. Another way to implement this invention is to provide additional credit cards used by the primary credit card holder multiple times, where the additional credit cards provide arbitrary restrictions1 such as using a trigger condition to achieve the desired situation later. | Ideally, no matter how the invention is implemented, the primary credit card holder will be provided with either a multiple single-use extra credit card number, a multiple-use extra credit card number, or a single-use and Multiple use of credit card mix. Whether it is a single-use credit card number or a single-use extra credit card; using a card will be considered as a risk of eliminating or reducing credit card fraud; What's more, by passing a credit line to a special credit card number, or an additional credit card number, or an additional credit card for a single use;
I 對任何遠端交易之可能的詐欺更加限制是可能達成的;而 丨 使用可任意處置的單次使用信用卡,也可能消去或減少被 丨 操取的風險。 藉著多次使用之額外信用卡號碼以及多次使用之額外 |I It is possible to achieve more restrictions on the possible fraud of any remote transaction; and 丨 the use of disposable single-use credit cards may also eliminate or reduce the risk of being manipulated. With extra credit card numbers and extra credits |
A:\PA-B060.ptd 第18頁 f 4AOBO0 所提出的 這是因為 好於擁有 別的信用 疋說他們 的使用者 外信用卡 額外的多 本發明藉 用卡號碼 而解決了 易者。 問題會因 在某些環 對遠端交 額度;而 能控制誤 觸發條件 號碼的情 次使用信 著在獲得 ,例如在 問題。更 ——. 五、發明說明(15) 信用卡,以上 能完全消除。 卡使用者會偏 是使用某—特 的風險,也就 生在某些不同 制,使用於額 則也可適用於 實際上, 實際洩漏主信 信用卡號碼, 不需要交給交 此發明的另一實施例, 的人’能購貝可任意處置的 於總共所購買的信用卡數額 端交易兩者的情形,唯一的 到時’必須由金融機構或信 明顯的作法是藉由自動櫃員 之下,現行的信用卡交易系 有人也還擁有信用卡的便利 作為另~種選擇,以上 丨際就是借貸卡;因為存款已 :況下,此論點的”信用卡”, 用卡,及是否有信用額度, 為使用者的偏好而不一定 境之下’舉例來說,信用 易之額外信用卡號碼’總 且願意承擔泄露號碼詐欺 用的嚴重性。這特別是發 ,如同以上建議的伴隨限 形。大體來說,相同的原 用卡。 信用卡功能之同時’從不 遠端交易中絕不用給予主 有甚者,主信用卡本身從 是面對那些並未持有主信用卡 信用卡,所購買的信用額度等 °這可用在出示信用卡以及遠 附帶條件是當信用額度未被達 用卡供應商將退款歸還。一個 機(ATM)取得退款。在此方法 統仍可被使用,而且信用卡持 性。 所討論的卡在效果上來說,實 由顧客的帳戶所提出。在這情 不論是單次使用卡或是多次使 都將立即登入帳户的借貸。對A: \ PA-B060.ptd Page 18 f 4AOBO0 This is because it is better than owning other credits, say their users, extra credit cards, extra credit card numbers and so on. The problem will be caused by the transaction of the far-end quota in some environments; the use of false triggering condition numbers can be controlled, such as in the problem. More ——. V. Description of the invention (15) Credit card, the above can be completely eliminated. The card user may use a particular risk, which is born in some different systems. The amount used may also be applicable to the actual disclosure of the credit card number of the main letter, which does not need to be handed over to another invention. In the embodiment, the person 'can purchase both of the total amount of credit card purchase transactions that can be arbitrarily disposed of, and the only time to do so' must be cleared by a financial institution or a letter. Some people also have the convenience of a credit card as an alternative. The above is a debit card; because the deposit has already been made: in this case, the "credit card" of this argument, the use of the card, and whether there is a credit limit for the user The preferences are not necessarily 'for example, the additional credit card numbers of CreditEase' are always willing to bear the severity of fraudulent use of leaked numbers. This is particularly the case, as with the concomitant constraints suggested above. Roughly the same original card. At the same time of the credit card function, 'there is no need to give the master anything in remote transactions, the master credit card itself is always facing those who do not hold the master credit card credit card, purchased credit limit, etc. This can be used to show the credit card and far The condition is that when the credit limit is not reached, the card supplier will refund the refund. A machine (ATM) gets a refund. In this method the system can still be used and the credit card is held. In effect, the card in question is actually presented by the customer's account. In this case, whether it is a single use of the card or multiple uses, it will immediately log in to the account to borrow. Correct
440800 ·— ——-— 五、發明說明(16) 這些環境下 而不管使用 同它是信用 戶的另一借 2.示範作法 所發行的信 及處理交易 卡—樣,雖 t。 用卡,較合 的買賣方有 然在顧客的 宜的作法是 沒有交易數 銀行中將被 單次使用, 量額度;如 當成是對帳 2.1 作法概要 執行方面,可透過在一般用途的數位電腦上 執仃源於弘胳了璜或可使用媒體的程式或程 ,此種媒體包含但不限於磁性儲存媒體(例如 軟碟機1碟機料),光學可讀㈣“ϋζ 機、數位影音弁雄拖雄、 碟 輪)。用央“ 士碟機等)’以及載波(例如網際網路上的傳 Λ a仃本發明之實用的程式,程式蝎及程式碼κ ,,可由有技巧的電腦程式設明 描述來引出。 吓貧;赞明的 —第圖顯不了實行此一有限使用的信用卡系統之系 :範概要。士統1〇〇包含了中央處理站102,根據示範的實 丨列,可在h用卡的供應商處作業。一般來說,站102接 :^及^理遠端產生的信用卡交易。信用卡交易可來自販賣 :協疋的形式,例如,透過刷卡機1 〇 6刷卡。另一情況 | 信用卡交易要求來自任何的遠端電子設備(例如個人; 丨電腦)104<^這些遠端設備可透過任一種形態的網路與中央 丨處理站102相接,包含公共或專有網路,或其中的組合。 !彳如個人電腦1〇4透過網際網路ns與中央處理站1〇2相440800 · —— ——-— V. Description of the invention (16) Under these circumstances, regardless of the use, it is another borrow that is a credit account. 2. Demonstration method Issued letter and transaction card-like, although t. With the card, it ’s better for the buyer and seller to use the customer ’s appropriate method. There is no transaction number. The bank will be used for a single time to measure the amount. If it is used as a reconciliation 2.1, the general implementation of the method can be done through a general-purpose digital computer. Supervisor is derived from programs or programs that have been developed or useable media. Such media includes, but is not limited to, magnetic storage media (such as a floppy disk drive and a 1-disk drive). It is optically readable. Xiong Diaoxiong, disc wheel). Use a central "disc player, etc." 'and carrier (such as transmission on the Internet. The practical program, program scorpion and program code κ of the present invention can be used by skilled computer programs Set descriptions to elicit. Fear of poverty; praise-the first picture shows the system that implements this limited-use credit card system: Fan summary. Shitong 100 includes the central processing station 102, according to the demonstration, Can work at the supplier of the card. Generally speaking, the station 102 receives: ^ and ^ remotely generated credit card transactions. Credit card transactions can come from the form of sales: co-operation, for example, by swiping the card through the card machine 106 . Another feeling Condition | Credit card transactions require from any remote electronic device (such as personal; computer) 104 < ^ These remote devices can be connected to the central processing station 102 through any type of network, including public or private networks , Or a combination thereof. For example, a personal computer 104 is connected to the central processing station 102 via the Internet ns.
,» Λ 08 Q Ο____ ___ 五、發明說明(17) 連。實際上,有一個到更多個的販賣電腦(沒有顯示出來) 從遠端電子設備104接收信用卡交易,且隨後將這些要求 送到中央處理站102。中央處理站102也可以連接其他種類 的遠端設備,例如無線設備(如行動電話)1 40,透過使用 傳送/接收天線1 3 8的無線電通訊。 中央處理站102本身可包括了中央處理單元120,以網 路I/O單元118作為與遠端單元的界面.中央處理單元120 存取信用卡號碼1 24的資料庫,及其選用來作為有限使用 的子集合126(稱為”可使用的等級”)。並且,中央處理單 元120亦存取中央資料庫122,稱為"條件μ資料庫。這個資 料庫是個一般用途的資料庫’其儲存關於顧客的帳戶的資 訊’諸如應用到每個顧客各種不同的條件。更進一步,資 料庫1 2 2可儲存某顧客的固定主信用卡號碼以及任何公開 賣出之相關受到限制的信用卡之間的映射關係,例如使用 某種連結串列的機制。資料庫1 22及1 24被分開顯示只是舉 出由中央處理站丨負責維持的資訊種類;這些資料庫所 的資訊可由—般資料庫藉由資料處理的技藝以能夠被 2 了解的形式加以混合。例如’每一個有限使用的信用 =存在能夠識別出主帳戶的攔位,以及根據;途 下各種不同的條件。 〜 可或ΐ0用可部實行信用卡交易請求的許 彖考。另一古對^用歷史資訊及其他約定形式之資訊的 Γ沒有顯示於二這項功能可指派給個別的清算處理設備 i:\PA-B060.ptd 1ΊΗ 第21頁 五、發明說明(18) &最後’中央處理站包括傳送受限制信用卡號碼給顧客 的能力。在第一個實施例中,一個本地的信用卡分配器 128可用來產生多數的有限使用卡132及/或主信用卡134 以分發給顧客。在第二個實施例中,有限使用信用卡號碼 可用印表機130印在表136上’然後以郵件寄送給顧客。印 出的表136可包含了蓋住號碼的原料,直到被顧客撕離, 藉此以指示那些號碼被使用過而不再有效了。這張數字的 清單可包括在每月或定期寄給顧客的報告書中。在第三個 實施例中’這些有限使用的數字可由顧客的個人電腦1〇4 電子下載’其被儲存在個人電腦1 〇4的本地記憶體1 42以供 隨後使用。在這個例子中’信用卡號碼可被加密(隨後加 以詳細討論)。這些數字也可透過適當的界面下載至使用 者的智慧卡而非個人電腦1 0 4。在第四種實施例中,單次 使用信用卡號碼可下載至無線設備1 40 (例如可攜式電 話),透過無線通訊設備。在第五種實施例中,自動櫃員 機ATM 1 0 8 可用來配發有限使用卡1 1 0。這些技藝將準備 好正確地判斷被使用的號碼/信用卡之傳送。當然這些實 施例在一起也是可使用的。 實現真實的配置以及對有限使用之信用卡號碼使之無 效的邏輯,較適合由執行預存程式於中央處理單元丨20的 :微電腦構成。任何通用或特殊用的電腦都可滿足。在替代 丨的實施例中,實現真實配置以及對有限使用之信用卡號蝎 丨使之無效之邏輯可構成離散的邏輯單位,或是一些離散邏 ;輯單位的組合,以及由電腦實行的控制。, »Λ 08 Q Ο ____ ___ 5. Description of the invention (17) Even. In fact, there are one to more vending computers (not shown) that receive credit card transactions from the remote electronic device 104 and then send these requests to the central processing station 102. The central processing station 102 may also be connected to other kinds of remote equipment, such as a wireless device (such as a mobile phone) 1 40, by using a transmitting / receiving antenna 1 3 8 for radio communication. The central processing station 102 itself may include a central processing unit 120, and a network I / O unit 118 as an interface with a remote unit. The central processing unit 120 accesses a database of credit card numbers 1 24 and its selection for limited use A subset of 126 (called "usable levels"). In addition, the central processing unit 120 also accesses the central database 122, which is called " conditional µ database. This database is a general-purpose database 'which stores information about customers' accounts, such as various conditions applied to each customer. Furthermore, the database 1 2 2 can store the mapping relationship between a customer's fixed master credit card number and any related restricted credit cards that are publicly sold, such as using some kind of linking mechanism. Databases 1 22 and 1 24 are displayed separately, just to list the types of information maintained by the central processing station; the information in these databases can be mixed by the general database through the technology of data processing in a form that can be understood by 2 . For example, 'Every limited use of credit = there are stalls that can identify the main account, and according to various conditions on the way. ~ Can be used to execute credit card transaction requests. Another ancient pair of historical information and other agreed forms of information Γ is not shown in the second. This function can be assigned to individual clearing processing equipment i: \ PA-B060.ptd 1ΊΗ page 21 V. Description of the invention (18) & Finally 'Central Processing Station includes the ability to transmit restricted credit card numbers to customers. In the first embodiment, a local credit card dispenser 128 may be used to generate a majority of the limited use cards 132 and / or the primary credit card 134 for distribution to customers. In the second embodiment, a limited use credit card number may be printed on the form 136 'by the printer 130' and then mailed to the customer. The printed form 136 may contain the material covering the number until it is torn off by the customer, thereby indicating that those numbers have been used and are no longer valid. This list of numbers can be included in monthly or periodic reports to customers. In the third embodiment, 'these limited-use numbers can be downloaded electronically from the customer's personal computer 104', which is stored in the local memory 1 42 of the personal computer 104 for subsequent use. In this example, the credit card number can be encrypted (discussed in detail later). These numbers can also be downloaded to the user's smart card via a suitable interface instead of a personal computer 104. In a fourth embodiment, a single use credit card number can be downloaded to a wireless device 1 40 (e.g., a portable telephone) via a wireless communication device. In a fifth embodiment, an ATM 1 0 8 can be used to issue a limited use card 1 1 0. These techniques will be ready to correctly determine the transfer of the used number / credit card. Of course, these embodiments are applicable together. The logic of realizing real configuration and invalidating credit card numbers with limited use is more suitable for microcomputers that execute pre-stored programs in the central processing unit. Any general purpose or special purpose computer will do. In the alternative embodiment, the logic for realizing the configuration and invalidating the credit card number scorpion with limited use may constitute discrete logical units, or a combination of discrete logical units, and control implemented by a computer.
第22頁 A:\PA-B060.ptd δλο^00 - — ---- --------~ --- — ' '~' —~ ^ -- ---— --------_·_ 五、發明說明(19) 第二圖顯示了由中央處理站102或其相似體之實行功 能的高階描述。此程序開始於步驟2 〇 2 ’配置一到多個的 有限使用之號碼給顧客。這些號碼最終由可利用的有限使 用號碼之表126,或是—些之前由表126中的數字組成之副 表所選出。同時,雖然第二圖沒有顯示,主帳戶號碼已在 較前的時間點合宜地指定給顧客了 °條件資料庠1 22可構 成將主信用卡號碼與有限使用信用卡號碼結合的機制。因 為有限使用卡是從有限使用卡號之表1 2 6中所任意選出, 將沒有可識別的關聯來允許某人從有限使用之號碼中來得 到主信用卡號碼。 于 然 或是事 ,則額 程 行的有 定有限 假使卡 度的卡 會失去 資料庫 作用的 报自然 查卡在 步驟是 便此過程 件觸發對 外的有限 序進入步 限使用卡 使用號碼 是單次使 ,那只有 作用。這 1 2 2之中 指令來實 地,有其 完成交易 由系統特 進入步驟204,這裡決定是否有來自顧客 額外之有限使用卡或卡號的要求。如果a 使用卡或卡號將被分配給顧客β 疋 驟206,在此中央處理站決定使用, 月U面發· 的交易是否要發生。此步驟之後跟隨μ 是否失去作用的判斷(步驟2〇8)。例如# ^ 用卡’它將會失去作用。假使卡是圍& 在最近的交易超過某些預定的臨界額^赛 些臨界額度可儲存在卡本身,或是在 3使卡失去作用的實際步騾是由產生"利 行的,如同第二圖的步驟2丨〇所表示去 他的步驟可用來處理信用卡交易,、。 之前是否失去作用或是失效。這歧額^抬 定的,*热*= k D 一胡外纪 Ο Ο __—一 _ '^----------------------------- : 五、發明說明(20) 所 —旦某個號碼失去作用,這個號碼便不能被盜用3 以,在網際網路(或其他的傳送方式)上竊取這些號瑪的風 險有效地消失。在這項發明的另一個實施例中’這些失去 作用的數字可恢復作用,假如自第一次有效使用發生之 有足夠長的時間的話。假設有足夠大的有限使用之信用卡 號碼作為選擇1在需要重覆所有號碼之前,有可能要等f 一段很長的時間。在這點上,某人不法地截取多年則的一 用卡號碼,竟意欲在合法使用者之前來作盜用是非常不 能的。 當有限使用卡或有限使用卡號失去作用之後’額外的( 有限使用卡可使其有作用。如同下知的詳細討論用卡 :號碼真正的恢復作用包含了許多中間的處理過程。例如’ 從表1 26的信用卡號碼首先配置在”已分配”的數字區威’ 然後是”發行但無效”的數字區域’最後是,'發行且有效”的 數字區域。第二圖是這個程序的高階描述,且包含這個典 型的實施例,由資料庫得到信用卡號碼而隨後使其立即作 用的更基本情形。 2.2 信用卡號碼的配罟 信用卡供應商所必須做的第一件事,是製成額外信用 卡號碼的序列清單,不論它們是為單次使用或是多次使 、 ;用,以及分配額外的信用卡號碼給主信用卡當作附加的信 j 用卡號碼,來選擇代替主信用卡號碼使用。此種清單可由 任意適當的套裝軟體加以產生,如以下會詳細討論的示範 :例。既然分配給主信用卡持有人的號碼與主信用卡號;碼沒Page 22 A: \ PA-B060.ptd δλο ^ 00-— ---- -------- ~ --- — '' ~ '— ~ ^------ ---- ----_ · _ V. Description of the invention (19) The second figure shows a high-level description of the functions performed by the central processing station 102 or the like. This process begins at step 02 'with one or more limited use numbers assigned to the customer. These numbers are ultimately selected from a list of available limited use numbers 126, or from a sub-list of numbers previously included in table 126. At the same time, although the second figure is not shown, the main account number has been appropriately assigned to the customer at an earlier point in time. Conditions Information 1 22 can constitute a mechanism that combines the main credit card number with the limited use credit card number. Because the limited use card is arbitrarily selected from the list of limited use card numbers, there will be no identifiable association to allow someone to obtain the main credit card number from the limited use number. As a matter of course, if there is a fixed limit in the forehead line, the card will lose the function of the database, and the card will be checked naturally. In the step, this process will trigger the external limited sequence entry. That makes it work. These 1 2 2 instructions come to the ground, and the system completes the transaction. The system proceeds to step 204, where it is determined whether there is an additional limited use card or card number request from the customer. If a using card or card number will be assigned to the customer β 206, here the central processing station decides whether to use, whether or not a transaction issued by the U will occur. This step is followed by a judgment as to whether μ has no effect (step 208). For example # ^ 用 卡 ’It will not work. If the card has been around & in recent transactions exceeding certain predetermined thresholds ^ some thresholds can be stored in the card itself, or the actual steps that render the card ineffective at 3 are generated by " benefit, as in the first The two steps shown in step 2 丨 〇 can be used to process credit card transactions. Whether it has not worked or failed before. This difference is ^ fixed, * Hot * = k D Yihu Waiji 〇 〇 __— 一 _ '^ ------------------------ -----: 5. Description of Invention (20)-Once a number fails, the number cannot be stolen. 3, the risk of stealing these numbers on the Internet (or other transmission methods) is effective Ground disappears. In another embodiment of this invention ' these lost numbers can be restored if provided for a sufficiently long time since the first effective use. Assume that there is a sufficiently large number of limited-use credit card numbers as option 1. It may be necessary to wait for a long period of time before repeating all numbers. In this regard, it is extremely impossible for someone to illegally intercept a multi-year card number that is intended to be used before a legitimate user. When a limited-use card or limited-use card number loses its effect, 'extra (limited-use card can make it useful. As discussed in detail below with the card: the true recovery of the number includes many intermediate processes. For example,' from the table 1 26 credit card numbers are first placed in the "allocated" digital area, then the "issued but invalid" number area, and finally, the "issued and valid" number area. The second figure is a high-level description of this program, And including this typical embodiment, a more basic situation where the credit card number is obtained from the database and then made available immediately. 2.2 Credit Card Number Allocation The first thing a credit card provider must do is to create an additional credit card number Sequence lists, whether they are for a single use or multiple uses, use, and assigning an additional credit card number to the main credit card as an additional letter. Use the card number to choose to use instead of the main credit card number. This list can be used by Generate any appropriate software package, as shown in the following examples: Example. Since assigned to the main credit card Holder's number and main credit card number;
4a〇BO° 五,發明說明f21) 有關聯,就不可能由額外的信用卡號碼來得到主信用卡號 碼。 就效果而論,信用卡號碼的隨機性是來自於顧客要求 號碼所形成的序列。更進一步說,即使知道某位特定的主 信用卡持有人所使用的額外信用卡號碼,預測此位主信用 卡持有人下一群所被配置的號碼是不可能的,因為在最真 實的情況下存取額外信用卡號碼是隨機的。即便是信用卡 供應商循序地配置號碼,也沒有可能預測信用卡持有人循 序所取得的數字,既然這些數字是根據序列的優點來加以 配置,如此配置的隨機性可防止任何的預測。 如同上述,由中央電腦所產生的信用卡號碼本身不須 是=數字。車交適當的說法是’雖然這些數字是有效的信 用:號:’具備須遵守工業規格的數值内 = 需求系統及網路不需任何的(或最小的)修 是,它們必須與所有其他舊有的:二:-個額外的限制 效的生命週期中的單次使用 Χ \·以及所有在有 商業可用系統的實際…些限制是要產生 的程序所滿足。 了犯不成被獨立產生隨機號瑪 為達成這些配置的需求,發 的信用卡等級,來配置某些號碼的所有可使用 此處可稱為”可使用等級"。這可以 '早-人使用系統, 列(例如通常是4到6個數字的序列, 用存在的標頭序 用來傳送至適當的交易處理器的路: :\PA-B060.prd 第25 f ρ〇8〇ϋ ------------- ~---.__^ ___ 五、發明說明(22) ' ' ---------- 標頭序列的剩餘號碼。沒有配置的號碼包含了發卡者存在 的信用卡帳戶,以及對新帳戶持有人足夠的剩餘容量,以 及對現存顧客號碼的變更。在交易中傳送的關於卡之詳細 内容及其他關於卡的特定資訊的額外的非浮凸部分,會隨 不同的卡,不同,以增加信用卡交易的安全性及隱密性。 雖然每個單次使用的號碼在有效的生命週期期間是唯 一的1傳f信用卡號碼及詳細交易情形到適當的處理器所 需的資訊是維持在確係有限使用號鴿能夠適當的處理。然 而,有限使用號碼不需要包括主信用卡帳戶號碼或是帳戶 號碼的編碼版本。實際上當沒有唯/的帳戶持有人識別碼 被包含在有限使用信用卡號碼時,隱密性與安全性會提 昇ύ …,〜双的衔笪,即母個蜀限使用號碼必須適當 算檢查和以及每次使用時相關的到期曰必須有效。 因,用有效的信用卡格式之限制’用來產生唯一的有 使用號碼之序列表的隨機配置程序可包括從一群數字的 配’其中不疋整個數字就β都公的幡白練诚《燧叙必。 同樣地’在卡經過驗證及付款的處理之前所驗證的資 訊’例如到期日及檢查和的數字必須要有效。這項資訊會 隨有限使用號碼的不同而變動,但必須確保號碼通過由銷 售商終端機所完成的檢查,即每個有限使用號碼必須適當 地計算檢查和以及每次使用時相關的到期須右 限 此 之組 分配’其中不是整個數字就是部分的帳戶號碼是變動的。 外’ 14項配置可包含全部或部分帳戶號碼與額外的資訊 組合’例如非浮凸的額外數字,到期日及其他用來識別 卡的資訊,並且在交易期間由銷售商傳給卡處理機。 從一完全地分配使用為有限使用號碼的可用有效信用4a〇BO ° Fifth, invention description f21) is related, it is impossible to obtain the main credit card number from an additional credit card number. As far as the effect is concerned, the randomness of the credit card number comes from the sequence formed by the customer requesting the number. Furthermore, even if the number of additional credit cards used by a particular primary credit card holder is known, it is not possible to predict the next group of configured numbers for this primary credit card holder, because in the most realistic case, Picking up additional credit card numbers is random. Even if the credit card supplier configures the numbers sequentially, it is not possible to predict the numbers obtained by the credit card holders in sequence. Since these numbers are configured according to the advantages of the sequence, the randomness of such a configuration can prevent any prediction. As mentioned above, the credit card number generated by the central computer need not itself be a number. The proper statement of Che Jiao is 'although these numbers are valid credit: No .:' within the values that must comply with industrial specifications = required systems and networks do not require any (or minimal) repairs, they must be compatible with all other old Some: two: a single use in the life cycle of an additional limiting effect X \ · and all practical in commercially available systems ... these limitations are met by the program to be generated. In order to achieve the requirements of these configurations, a random number can be independently generated. In order to achieve the requirements of these configurations, a credit card level is issued to configure all the numbers that can be used here. This can be referred to as "usable level". This can be used early by people. , Column (for example, usually a sequence of 4 to 6 digits, using the existing header order to pass to the appropriate transaction processor:: \ PA-B060.prd 25f ρ〇80〇ϋ --- ---------- ~ ---.__ ^ ___ V. Description of the invention (22) '' ---------- The remaining number of the header sequence. The number that is not configured includes The credit card account that the card issuer has, with sufficient remaining capacity for the new account holder, and changes to existing customer numbers. Additional non-embossed details of the card and other card-specific information transmitted during the transaction Partly, it will vary with different cards to increase the security and confidentiality of credit card transactions. Although each single-use number is unique during the valid life cycle, a credit card number and detailed transaction situation are appropriate The information required by the processor is maintained at a truly limited use number It can be handled appropriately. However, the limited use number does not need to include the main credit card account number or an encoded version of the account number. In fact, when no / only account holder ID is included in the limited use credit card number, the privacy and Security will improve…, ~ Double title, that is, the number of the parent and child must be properly checked and the relevant expiration date must be valid for each use. Because of the limitation of using a valid credit card format 'for The only random configuration procedure for generating a unique sequence list with numbers can include the matching of a group of digits, where “the entire number is not equal to β,” Bai Liancheng, “Syllable. Similarly,” the card is verified and paid. The information verified before processing, such as the expiry date and the number of checksums, must be valid. This information varies with the limited use of the number, but it must be ensured that the number passes the check completed by the seller's terminal, that is, every time A limited use number must be properly calculated for the checksum and the expiration associated with each use must be limited to the group assignment 'where not The whole number is part of the account number is subject to change. Outside '14 configurations can include all or part of the account number and additional information 'such as non-embossed extra numbers, expiration dates and other information used to identify the card, and Passed by the seller to the card processor during the transaction. Available credit from a fully allocated use as a limited use number available
及Λ的00 ____ ----— ---------------—— ________——^^ 五、發明說明(23) ^— /借貸/記帳卡的序列碼的表所作循序隨機齡置^保了 指定給有限使用號碼的標準是符合的;即沒有兩广限使 用號碼是〆樣的,沒有一個有限使用號碼等於已,子在的帳 戶號碼,以及沒有新發行的協定卡號等於之前發盯的有限 使用卡3為了在帳戶號碼和有限使用卡以及對相同帳戶的 有限使用號瑪之間達到真正的計算獨立性,隨機-置程序 需要得到真玉隨機的種子值。此種真正的隨機性^由具有 良好定義性質,例如白色雜訊產生器的實體隨機系統得 丨 到。一個將類比訊號轉變成數位訊號的轉換器由真正的隨丨 機實體系統接收一個類比信號,以用來確保真正的隨機配 置。 其 配置程 的有效 的或既 被配置 以 明,配 序,其 戶持有 獨單次 號碼可 單次使 每個單 他的方法可造成與較低運算效率同樣的結果。例如 序町以給一已知的發卡者隨機地選出在全部範圍内 的信用卡號碼;然後,如果它已經使用於有限使用 有的卡號,或是如果相同的號碼在一給定的時框内 的話,放棄此號碼。 上稃序產生一連串可用的單次使用號碼。再次說 置稃序可由真正隨機(或理想上虛擬隨機)的映射程 中單次使用號碼是隨機地選出而且指派給選定的帳 人(不是既存的信用/借貸卡持有人,便是新 使用帳戶或銀打:二的持有人)。額外的使 配置給個別立場的購買纟。隨後每使用 用號瑪在下次配置『由可使用序列中=派= 次使用號瑪的唯置。另-個實行對特定帳::And Λ's 00 ____ ----—— ---------------—— ________—— ^^ V. Description of the Invention (23) ^ — / Debit / Credit Card Serial Number The sequential randomization of the table guarantees that the standard assigned to the limited use number is consistent; that is, no two-wide use number is the same, no limited use number is equal to the existing account number, and there are no new issues. The agreement card number is equal to the previously used limited use card. 3 In order to achieve true computational independence between the account number and the limited use card and the limited use number for the same account, the random-placement program needs to obtain the true jade random seed value. This true randomness ^ is obtained by a solid random system with well-defined properties, such as a white noise generator. A converter that converts an analog signal into a digital signal receives an analog signal from a true random physical system to ensure a truly random configuration. The configuration process is effective or both configured to clarify, order, and the user holds a unique single number can make each single method a single time can cause the same results with lower computing efficiency. For example, Ichicho randomly selects a credit card number in a full range for a known card issuer; then, if it has been used for a limited number of card numbers, or if the same number is within a given time frame To discard this number. The above sequence produces a series of available single-use numbers. Once again, the setup sequence can be selected randomly from a truly random (or ideally pseudo-random) single-use number and assigned to a selected accountant (not an existing credit / debit card holder, or a new one) Account or silver fight: holder of two). The extra make configuration for individual stand purchases. Each subsequent use of the mark is used in the next configuration "from the available sequence = pie = the only use of the mark is set. Another-a specific account ::
A:\PA*B060.ptd * 4^°8°0 五、發明說明(24) ~~~~ ' ~~--- 有^直接配置的替代機制是配置到唯一儲存位置的單次使 ^號馬序列〜由特定儲存位置的序列隨後可直接配置給既 定的帳f 這也准許對新客戶信用卡之快速配置,而不會 有因對每個新客戶需實行新的配置程序所產生的延誤。 此配置,程序會產生其他一連串的單次使用號碼,此11 配置的區域及其相關的識別攔位用來決定一旦帳戶被使 用=處置~那個帳戶需為交易負責。配置程序可以在需 要單次使用號瑪之前的一個重要時刻發生。—旦配置之 後’它們便不能再加入任何有效帳戶的序列,直到再次被 使用者所需要。 第三圖是說明配置信用卡號碼的示範程序的流程圖。丨 中央處理單元(CPU)產生信用卡號碼的資料庫(步驟3 0 2 ), 和選出一個主信用卡號碼(步驟304)。在步驟306中,CPU 檢查以確定主信用卡號碼與其他信用卡號碼不同。CPU選 出額外信用卡號碼以配置給主信用卡號碼(步驟308 )。CPU 可用以上所討論的任何技巧來選出額外信用卡號碼°在步 驟310,CPU檢查以確定額外信用卡號碼與其他信用卡號碼 不同。額外信用卡號碼寸使用於’例如’單次使用信用 卡。 丨 當顧客需要單次使用信用卡時,CPU會發行額外的信 用卡號碼給顧客。除非這些單次使用號碼是直接發行到 i 顧客手中(例如由自動櫃員機(ATM)),它們不能直接加進 i 由中央電腦系統所掌握的有效帳戶號瑪的序列中。這些號 碼是加入',已發行的"’但並非"有效的"號碼序列(步驟A: \ PA * B060.ptd * 4 ^ ° 8 ° 0 V. Description of the invention (24) ~~~~ '~~ --- There is an alternative mechanism of ^ direct configuration which is a single deployment to the only storage location ^ No. horse sequence ~ The sequence from a specific storage location can then be directly assigned to a given account f. This also allows for rapid allocation of new customers' credit cards without delays caused by the need to implement a new allocation procedure for each new customer . In this configuration, the program will generate a series of other single-use numbers. This 11-configured area and its related identification stop are used to determine once the account is used = disposal-which account is responsible for the transaction. The configuration process can occur at an important moment before a single use of the number mark is required. -Once deployed, they cannot add any more valid account sequences until needed again by the user. The third figure is a flowchart illustrating an exemplary procedure for configuring a credit card number.丨 The central processing unit (CPU) generates a database of credit card numbers (step 302), and selects a primary credit card number (step 304). In step 306, the CPU checks to determine that the main credit card number is different from other credit card numbers. The CPU selects an additional credit card number to assign to the primary credit card number (step 308). The CPU can use any of the techniques discussed above to select an additional credit card number. In step 310, the CPU checks to determine that the additional credit card number is different from other credit card numbers. Extra credit card numbers are used for 'for example' single-use credit cards.丨 When a customer needs to use a single credit card, the CPU will issue an additional credit card number to the customer. Unless these single-use numbers are issued directly to the customer i (for example, by an automated teller machine (ATM)), they cannot be added directly to the sequence of valid account numbers held by the central computer system. These numbers are added to ', already issued "' but not " valid " number sequence (step
A:\PA-B060.ptci 第28頁 44〇S〇° 五,發明說明(25) 3 1 2 )。一次所發行的單次使用號碼之數目是依攄 使用卡片的比率以及直到使用前用爽儲在 ' 設備的容量而定。CPU可以接供鈞二人使用號碼之 M ^ .2 了以美供顧客足夠的單次使用號碼 來滿足其早:人使用購買的需要長ϋ,例如兩年。每個單丈 使用號碼可被〇交易n戈數額的特定 性質不會超過加在顧客帳戶的限制之上(諸 '非二: 用餘額)= 扪 一 ^ 一系列的單次使用號碼發行了,在處理系統確認 任何發行號碼之前,使用者有以電話確認領收的選擇權 (步#驟314)。一旦已被確認(或假定)領收,並非每個發行 的單次使用號碼會加到”已發行且有效"的序列中(步驟 | 316)。為了防止處理系統握住過度的有效單次使用號碼’丨 在任何時候宣告有效的單次使用號碼之數目應對帳戶作限 制以免號碼的浪費(即被顧客所存取但從未完成交易的號丨 碼),以及允許在不同交易之間所造成的,顧客所存取的i -單A使用號碼之序列和其到達處理中心之序列的差異,所I 產生的時間延誤D在任何時候有效的單次使用號碼的最大| 的數目=決定於信用卡發卡者,但可能是偏向於5到1〇的丨 區間。右任何在配置區域外的嘗試使用,其下個單次使用 :號碼可當作驗證交易的額外識別數字。在此情況下,只有: i部份的數字需要使用者提供,以防止詐欺的交易者能夠存^ 丨取到多個未使用的單次使用號碼。只要單次使用號碼在使 用中(步驟3 18)被使無效(步驟32〇) ’來自顧客的"發行但 :無效"的序列的額外號碼會被配置於”發行且有效”的序’ |A: \ PA-B060.ptci p. 28 44 ° 5 °, description of invention (25) 3 1 2). The number of single-use numbers issued at one time depends on the card usage rate and the capacity of the device stored in the device until use. The CPU can pick up M ^ .2 for the use of the number by the two people. In order to meet the needs of the customer, the single-use number is sufficient for the United States: it takes a long time for people to purchase, such as two years. The specific nature of each single-use number can be 0. The specific nature of the amount will not exceed the limit imposed on the customer account (Zhu Fei 2: Use balance) = 扪 一 ^ A series of single-use numbers were issued, Before the processing system confirms any issue numbers, the user has the option to confirm receipt by telephone (step # 314). Once the receipt has been confirmed (or assumed), not every single use number issued will be added to the "issued and valid" sequence (step | 316). To prevent the processing system from holding excessive valid single shots Use number '丨 Declaration of the number of valid single use numbers at any time should limit the account to avoid wasting the number (that is, the number accessed by the customer but the transaction has never been completed), and allow transactions between different transactions. As a result, the difference between the sequence of the i-single A number used by the customer and its sequence of reaching the processing center, the time delay generated by I, the maximum number of single-use numbers that are valid at any time | Credit card issuer, but may be biased in the 5 to 10 range. Right of any attempt to use outside the configured area, its next single use: the number can be used as an additional identification number to verify the transaction. In this case, Only: The numbers in part i need to be provided by the user, in order to prevent fraudulent traders from depositing ^ 丨 multiple unused single-use numbers. As long as the single-use number is in use Step 318) is disabled (step 32〇) 'from a customer " issued but: Invalid " additional sequence of numbers will be arranged at the "Print and effective" Ordered' |
五、發明說明(26) 直到下一群單次使用號i 以確保單次使用號碼的繼續供應 瑪所允許的最大值(步驟322)。 在與真正供應額外信用卡號碼的關係上,這不會對信| 用卡供應商造成任何的困難。例如,標準主信用卡有到^ 五位或更多的數字,第一位是用來識別信用^供應商1如i5. Description of the invention (26) Until the next group of single-use numbers i to ensure that the single-use numbers continue to be supplied to the maximum value allowed by Ma (step 322). This does not cause any difficulties for credit card providers in relation to the actual supply of additional credit card numbers. For example, standard master credit cards have ^ five or more digits, the first digit is used to identify the credit ^ supplier 1 such as i
American Express ’VISA,Mastercard,等等。對主要的 銀行來說,三位數字是用來識別發卡銀行。在典型的六位丨 數字之主信用卡號碼的最後一位是檢查和的,用來確^此 號碼是有效的。這便留下了可到十一位或更多位的數字, 以作為帳戶識別號碼及到期曰之用。在某些實例中,到期 曰可以不用交換送回;雖然某些信用卡供應商需要額外的i 信用卡號碼或額外的資訊作交換。例如,某些信用卡供應| 商在卡上印出額外的號碼,這些號碼在卡上不是浮凸的,i 並不構成主信用卡號碼的一部份。這些額外印出而非浮凸 的信用卡號碼玎用來識別在非出示信用卡的交易中提出信 用卡的人是否真的擁有這張卡’不論交易的訂單是以書信 或電話達成的。有許多的設備,數字,資訊的片段等,由ί :信用卡發卡者或其處理者用來清除特定交易的信用卡。根I 據另一個實施例’當以本發明為依據發行額外信用卡號 碼,此種額外的信用卡號碼可包含編碼,將能識別在遠端 交易中使用額外信用卡號碼的人是否是號碼被送至的人,丨 :或者在可任意處置的信用卡例子中,是否是可任意處置信 :用卡被送至的人。 i 丨 對這些額外信用卡號碼較適合的一例是’它們可被限丨American Express ‘VISA, Mastercard, etc. For major banks, the three digits are used to identify the issuing bank. In a typical six-digit number, the last digit of the main credit card number is checked and used to verify that the number is valid. This leaves numbers up to eleven digits for account identification numbers and expiration dates. In some instances, expiration dates can be returned without an exchange; although some credit card providers require additional i credit card numbers or additional information for exchange. For example, some credit card providers | print extra numbers on the card. These numbers are not embossed on the card, and i does not form part of the main credit card number. These extra printed rather than embossed credit card numbers are used to identify whether the person who presented the credit card in a non-credit card transaction actually owns the card ', regardless of whether the transaction order was reached by letter or phone. There are many devices, numbers, pieces of information, etc. that are used by credit card issuers or their processors to clear credit cards for specific transactions. According to another embodiment, 'When issuing an additional credit card number in accordance with the present invention, such additional credit card number may include a code, which will be able to identify whether the person using the additional credit card number in the remote transaction was sent to Person, or: In the example of an arbitrary credit card, is it an arbitrary letter: the person to whom the card was sent. i 丨 An example of a better fit for these additional credit card numbers is ‘They can be restricted 丨
^ 4^°8 0 ° _____一· ~ ___ * --____________ 發明說明(27) ~ 一~~~~ — '~~ ; 制成對信用卡號碼而言是正確的形式,具有有效的檢查 和,數學上在相同時間内跟其他號碼或主信用卡號碼無 關。在某種程度的情況下,對單次使用號碼,到期日是真 玉無關的。所以使用到期日的月份碼加上,比如說十一個 ,數字,就會有12 X l〇n,即1.2 χ 1〇12,也就是一兆個可 能的唯一碼讓仏用卡供應商使用。這可以讓兩億個帳戶持 丨有人,十年内的每個月作五十次交易,在任何編碼重新使 用或是新的標頭編碼被引入。當了解到有另外丨〇4個標頭 號碼可讓信用卡供應商使用,就可以體認到既存的主信用 卡號碼足供本發明運用現有的處理信用卡交易的基礎設施 :而只需最小的修改所具備的優勢。對信用卡供應商而言所 丨必需的是儲存針對主信用卡號碼所產生的數字。 i i 舉例來說,假設一張VISA卡有將近21,〇〇〇家發卡銀 行。此十六位數有一位是” 4”及其後面五位數碼用來表示 卡的發卡者。最後一位是用來驗證號碼是否有效的檢查 和。結果有21,〇〇〇 X 1〇9 x 1 2 (252兆)唯一號碼以及相 | 關的到期月份。這編碼的數字足供現行的每年將近七十億 | 的交易率作36, 000年的交易處理。 : 當已存的信用卡格式允許足夠大量的可用卡號時,號丨 丨碼最終需要循環再配置。正如可使用號碼的等級利用時間丨 '減少了大小,額外的或循環的號碼應該加回此等級,以確 丨保配置裎序實行在足夠大的等級以雉持隨機的配置。再循i 丨環之前的時間長度依賴於發卡商可·用的唯 ^片編碼的所 ;有數字以及使用有限使用號碼的交易數目。此種再循環使^ 4 ^ ° 8 0 ° _____ 一 · ~ ___ * --____________ Description of the invention (27) ~ 一 ~~~~ — '~~; Made in the correct form for credit card numbers, with effective inspection and , Mathematically has nothing to do with other numbers or main credit card numbers at the same time. In some cases, the expiration date is irrelevant for single-use numbers. So if you use the month code of the expiration date, for example, eleven, the number will have 12 X l0n, which is 1.2 x 1012, which is a trillion possible unique codes for the card supplier. use. This could allow 200 million account holders to have someone make 50 transactions per month for ten years, re-use any code, or introduce a new header code. When you learn that there are additional 04 header numbers that can be used by credit card providers, you can realize that the existing primary credit card number is sufficient for the present invention to use the existing infrastructure for processing credit card transactions: and only requires minimal modification Has the advantage. It is necessary for the credit card provider to store the numbers generated for the main credit card number. i i For example, suppose a VISA card has nearly 21,000 issuing banks. One of the sixteen digits is "4" and the following five digits are used to indicate the card issuer. The last digit is a checksum used to verify that the number is valid. The result is a 21,000 x 10.9 x 1 2 (252 trillion) unique number and the associated expiration month. This coded number is sufficient for the current annual transaction rate of nearly 7 billion | for 36,000 years of transaction processing. : When the stored credit card format allows a sufficient number of available card numbers, the numbers 丨 丨 eventually need to be reconfigured. Just as the level of available numbers uses time to reduce the size, extra or recurring numbers should be added back to this level to ensure that the configuration order is implemented at a level large enough to support random configurations. The length of time before re-circulation depends on all the codecs available to the card issuer; all digits and the number of transactions using a limited use number. This recycling makes
A:\PA-B060.ptd 第31頁A: \ PA-B060.ptd Page 31
/1 A 五、發明說明(98 ) ^ s …— ______________________________- 環使Z發生在當號碼無法再使用和不再能退款。一旦再循 前發〜.自動作欺偵測機制會正常地作用於,需要藉從之 之堂=ϋ有限使用號碼序列中移除號碼來變更為無效的卡 之嘗试再使用。 2, 3 里卡號碼的/ 1 A V. Description of the Invention (98) ^ s… — ______________________________- The ring makes Z happen when the number can no longer be used and no refund can be made. Once re-issued ~. The automatic fraud detection mechanism will work normally, you need to try to reuse the card by removing the number from it's limited use number sequence to change to an invalid card. 2, 3 Rica number
Ir ^觸發條件之後的限制是在有限使用卡號上,即交 信用)供=制,交易數量的限制等等,是它們相對於固有 這些^ ,ν /記帳卡所具有額外延伸性及安全性的中心5 儲;r y·丄Α不同的方式被輸入及控制。例如,這些限制可 噔2用卡發卡者所掌握的資料庫,且用來檢查在驗 4期間父易是否落在這些限制之中β 圖。c第ΡΠ四本圖^是說/限制信用卡號碼使用的示範程序的流程 及配f 一你已4置k用卡號碼給主信用卡號碼(步驟402 ),以 條件於得二^給此信用卡號碼(步驟404 ) ° CPU然後儲存此 事二:資料庫(步驟406卜這些限制可以由發卡者以 方式指定或根據卡持有人的要求輸入。這路限 === 吏用號碼中’當號碼發行給使W者 以^卡之限制。一旦號碼發行出[這些限制可 士:用者與卡發卡者之間的通訊使得這些改變是可口頭 發:,傳遞(步驟408 )。當此卡用在交易(步驟 口m:細内容是處理軟體與限制相比較,而交易 ”有在付合這些限制才能獲得驗證(步驟412)。 另一方面,限制也可以加密而成為交易期間傳送的號 部份。 加以解 全性, 有限使 際網路 求。在 的付款 限制的 在實行 二次付 此計畫 售商, 用來實 商。當 安排銷 可當作 額,但 號碼的 由信用卡 供使用者 式的知識 的適當部 ,金融交 用卡號碼 選擇。例如,信用卡 單一交易。或者另一 畫’其中 一個銷售 欺的安全 年内有用 ’其中信 碼限制給 次使用時 ’其中信 的銷售商 在 A Ο 8 C w 五、發明說明(29) 碼格式之一 易詳細内容 供較少的安 更改由更改 正如網 有增加的需 行許多方面 安排之交易 號碼可使用 說,只有十 安排交易。 給單一的銷 用卡號碼可 特定的銷售 用者能事先 k用卡號碼 定的交易金 2 · 4信用卡 隨後限制可 碼。這會提 既然加密格 用號碼格式 商務的發展 有限使用信 分期付款計 款有效,對 提供對抗詐 而且只在一 行借貸計畫 有限使用號 售商或第一 禮物代用卷 可用於任何 分發 處理器藉傳 更多控制, 可能會用來 份所選出的 易的很大一 上的限制可 號碼可限制 方面,比如 信用卡號碼 商十二個月 性,因為它 。或者同樣 用卡號碼是 特定的銷售 決定。或者 用卡號碼限 送的交 但確提 詐欺地 限制。 邹份也 用來實 在預先 "is用卡 是譬如 的預先 是鎖定 地,信 限制給 商,使 最後, 制在特 下一個要考慮的事情是這些額外的信用卡號碼及/或 額外的信用卡如何地分發至信用卡持有人手中。提供此額 外的信用卡號碼及/或額外的信用卡的其中一個方法是實 體地以某方式將其交給主信用卡持有人的手中’不論是代 收,限時快遞,郵寄或一般能蓋住供應品標頭傳遞的其他 方式。报明顯地’金融機構希望能夠儘可能有效率地提供 A:\FA-B060.ptd 第33頁 五、發明說明(30) ' --— 額外的信用卡號碼或額外的信用卡到使用者 了上,而此額 外的信用卡號碼及/或信用卡落入弟三者的風險最小。雖 然偷竊是不能被防止的,例如竊取使用者手上的作用卡, 最重要的是確保這些可隨意處置的信用卡及/或^用卡號 碼可傳遞給使用者,其被第三者在號碼或可隨意^置的^ 用卡產生到實體地交到使用者手令期間獲得的$ ^性最。 小 〇 可以想像信用卡供應商有許多的方法發行額外的信用 卡號碼及/或信用卡給使用者。其中最簡單的—個方式是 以要求來郵寄它們。對信用卡供應商而言另—個方式是^ 收到帳户的付款或帳戶的借貸表之後,才提供足夠的額外 信用卡號碼及/或信用卡來取代從前一次借貸表所使用。 尤其是,假使借貸表沒有引用主信用卡號碼或某些碼的數 字’便可犯要對額外信用卡號碼或信用卡的有效性作額外 的檢查。某些形式的收據系統可被使用。在某些方面有效 的偷竊將會減少。 第五圖是說明分配信用卡號碼的示範程序的流程圖。 信用卡發卡者配置主信用卡號碼給主信用卡號碼持有人 (步驟5 〇 2 )。然後信用卡發卡者配置有限使用號碼給主信 用卡號碼(步驟504)。對事先準備的卡來說,信用卡發卡 者能夠決定是否每張卡或要印出(或結合其他方法,例如 浮凸)一個或多個號碼(步驟506)。發卡者能使用單張卡分 配多個號碼(步驟508)或使用多張卡分配多個號碼(步驟 512) °The restrictions after the Ir ^ trigger conditions are on the limited use of card numbers, that is, the credit) supply system, the limit on the number of transactions, etc., which are compared to the inherent extension of these ^, ν / debit cards, which have additional security and safety. Center 5 stores; ry · 丄 Α is input and controlled in different ways. For example, these restrictions can be stored in a database held by the card issuer, and used to check whether the parent is within these restrictions during the test. The fourth picture of the first and second pictures ^ is the flow of the demonstration program that says / restricts the use of credit card numbers and the configuration f-you have set the card number to the main credit card number (step 402), and give the credit card number as a condition ^ (Step 404) ° The CPU then stores the second thing: the database (step 406) These restrictions can be specified by the card issuer in a manner or entered according to the requirements of the card holder. This limit === the official number is used as the number Issuance to card holders is subject to card restrictions. Once the number is issued [these restrictions are notable: communication between the user and the card issuer makes these changes palatable hair :, pass (step 408). When this card is used in Transaction (step M: The details are compared with the processing software and restrictions, and the transaction "has to be verified only if these restrictions are met (step 412). On the other hand, the restrictions can also be encrypted to become part of the number transmitted during the transaction To solve the problem, the Internet is required to be limited. The current payment restrictions are implemented in the second payment plan for the seller, which is used for real business. When the sales are arranged, it can be used as the amount, but the number is provided by the credit card for the user. Knowledge The appropriate department, financial transaction card number selection. For example, a single credit card transaction. Or another painting 'One of the sales year is useful in a safe year' Where the letter code is restricted to the secondary use 'Where the letter's seller is at A 0 8 C w V. Description of the invention One of the (29) code format is easy to change in detail for less security changes. The number of transactions that can be arranged in many aspects can be used as the net has increased, and only ten arrangements of transactions are available. For a single sale The card number can be specified. The sales user can use the card number to determine the transaction amount in advance. The credit card will then be restricted from being coded. This will mention that since the development of the encrypted number format business is limited, the use of letter installment payment is effective and it is effective to provide countermeasures. Fraudulent and limited-use loan programs in only one line. The retailer or the first gift proxy volume can be used for any distribution processor to borrow more control. May be used to limit the number of selected majors. Restrictions, such as the twelve-month nature of credit card number merchants, because of it. Or the use of card numbers is also specific Sale decision. Or use the card number to limit delivery but do mention fraudulent restrictions. Zou Fen is also used to pre-empty " is the use of the card is such as the pre-locked place, the letter is restricted to the merchant, so that in the end, the system is under One thing to consider is how these additional credit card numbers and / or additional credit cards are distributed to credit card holders. One way to provide this additional credit card number and / or additional credit card is to physically It is in the hands of the main credit card holder 'whether it is collection, time-limited courier, mail or other means that can generally cover the delivery of the supply header. It is obvious that the financial institution wants to provide A as efficiently as possible: \ FA-B060.ptd Page 33 V. Description of the Invention (30) '--- An additional credit card number or additional credit card has been added to the user, and this additional credit card number and / or credit card falls into the third brother's The risk is minimal. Although theft cannot be prevented, such as stealing an active card from a user, the most important thing is to ensure that these disposable credit card and / or card numbers can be passed to the user, and they can be passed to the number or ^ ^ Which can be set arbitrarily is generated by using the card to obtain the physical property of the user's warrant. It is conceivable that credit card providers have many ways to issue additional credit card numbers and / or credit cards to users. One of the easiest ways is to mail them on request. Another way for credit card providers is to provide sufficient extra credit card numbers and / or credit cards to replace the previous debit form after receiving payment or debit form from the account. In particular, an extra check on the validity of an additional credit card number or credit card can be made if the debit form does not reference the number of the primary credit card number or certain codes. Some forms of receipt systems can be used. Effective theft will be reduced in some ways. The fifth figure is a flowchart illustrating an exemplary procedure for assigning credit card numbers. The credit card issuer assigns the primary credit card number to the primary credit card number holder (step 502). The credit card issuer then assigns the limited use number to the main credit card number (step 504). For cards prepared in advance, the credit card issuer can decide whether to print (or combine other methods, such as embossing) one or more numbers per card (step 506). The issuer can use a single card to assign multiple numbers (step 508) or use multiple cards to assign multiple numbers (step 512) °
A:\PA-B〇6〇-Ptd 第34頁 44〇8〇° -------------—A: \ PA-B〇60-Ptd Page 34 44〇80 ° --------------
五、發明說明(31) 在以上任何一種情況,使 追蹤是重要的。假使信用卡只 但可移除的覆蓋物來蓋住卡的 例如,不透明但可移除的覆蓋 使得卡在使用前可被移除。將 號已被存取或使用。 2對哪些號碼被使用保持 — 個號碼,則可用不透明 _或多個部份(步驟l〇b 物可以装, 意住卡的數字部份, 復蓋物移除的動作表示了卡 或者另一種選擇,不透明但 諸如,|已使用”的訊息。不透明的覆…以消去 種可被刮掉的層次,在使用之f ^ :的覆盍物可以是一 掉的層次相似於常使用;後被刮掉。此可被刮 .七二β A /±笊用於復盖卷卷號碼之類的表層。或者 t用卡可置於自各戶獨立的容器中,類似 於到,刀的分發器(步鄉516)。持有者可從第—個小隔間 移除早次使用卡,然後將使用過的卡放到第二個隔間。 如果此卡有多個號碼’持有人將使用可以蓋住卡的一 個或多個部份的裝置來追蹤這些號碼(步驟510)。此類裝 置也夠蓋住號碼直到它們被使用D如同以上所討論的,此 裝置可包含許多不透明的層次,必須要在每一個號碼被使 用之前移除。或者另一種選擇,當卡發行時每個號碼可被 :看見’而且每個號碼對應到一個面板,當覆蓋不透明物時 就會取消此號碼已被使用的訊息。在每次使用之後,相對 丨應的覆蓋物被移除或括去,來表示號瑪已被使用。 以上兩個結合在卡上的解決'例子,作用為提醒使用者 j哪個號碼已被使用。號碼有效性的條件檢查是實施在負責 丨驗證卡片交易的處理軟體上。 jV. INTRODUCTION TO THE INVENTION (31) In any of the above cases, tracking is important. Suppose a credit card only has a removable cover to cover the card. For example, an opaque but removable cover allows the card to be removed before use. The number has been accessed or used. 2 pairs of which numbers are used to hold-a number, you can use opaque_ or multiple parts (step 10b can be loaded, care about the digital part of the card, the action of removing the cover indicates the card or another option , Opaque but such as, | used "message. Opaque overlay ... to remove the kind of layer that can be scraped off. In the use of f ^: the overlay can be a level similar to that used often; This can be scratched. Seventy-two β A / ± 笊 is used to cover the surface of the roll number or the like. Or the t-card can be placed in a separate container from each household, similar to the knife dispenser (step Township 516). The holder can remove the used card from the first compartment, and then put the used card in the second compartment. If the card has multiple numbers, the holder can use it. Devices that cover one or more parts of the card to track these numbers (step 510). Such devices are also sufficient to cover the numbers until they are used. D As discussed above, this device can contain many opaque layers and must To be removed before each number is used. Or another Select, when the card is issued, each number can be seen: and each number corresponds to a panel. When covering opaque objects, the message that this number has been used will be canceled. After each use, the corresponding overlay The object is removed or enclosed to indicate that the number has been used. The above two examples of the solution combined with the card are used to remind the user which number has been used. The condition check of the number validity is implemented in charge丨 Verify the card transaction processing software. J
A:\PA-B060.ptd 第35頁 0〇 五、發明說明(32) 額外信用卡號碼和/或卡片可血 t 與借貸書一起送出(步 驟5 1 8 )。額外信用卡唬碼直到借眢蚩σ οη Ν , μ ^ , _ 貧書已付款後才能作用 (步驟520)。卡片發卡者也需要付教彼 ,咕々土 丁秋伴隨著主信用卡號碼 或其他的識別15。或者,例如包含不是與發行信用卡公司 直接接觸,就是獨立發行之密碼的額外的安全檢查來 增進電子設備的被使用。 ° 分配額外信用卡號碼和/或額外信用卡給使用者的更 進一步方法是使用ATM機器(步驟522 )。只需要極少的改良 ATM機器就能提供額外的信用卡號碼。同樣地,也只需相 對極少的變動,ATM機器便能夠提供額外的信用卡。 信用卡/單次使用號碼可直接發行到能夠儲存這些號 :碼的電子設備。這便可應用到行動電話以及傳呼設備,在 |其上資訊可由既存之直接互相連結的系統及電腦或經由連 到網際網路或特定主電腦的電傳系統傳送。在此種情形 ’ 下,需要某種機制來保護傳送中的號碼以防止非授權的存 i-i取。對全域使用的應用來說,這種機制必須不受輸出的限 丨制。此外,此種保護不應受到”暴力法則"解碼技巧的影 丨響。這樣的系統將在底下關於單次使用信用卡的儲存中討 口 | j —個提供額外信用卡號碼的替代方法是使用電腦程 |式。很明顯地,當電腦程式快速處珪時信用卡供應商擁有: 足夠的安全性是必須的,不管是透過電傳網路或疋郵政系 !統’非授權的存取將不能獲得。 2‘ 5 用卡蜜^的電子使用A: \ PA-B060.ptd Page 35 0〇 5. Description of the invention (32) Additional credit card numbers and / or cards can be sent together with the loan book (step 5 1 8). The extra credit card bluffs will not work until the borrowed 眢 蚩 σ οη Ν, μ ^, _ has been paid (step 520). The card issuer also needs to teach him, Guru Ding Qiu accompanied by the main credit card number or other identification15. Or, for example, additional security checks involving passwords that are either in direct contact with the issuing credit card company or independently issued to promote the use of electronic devices. ° A further method of assigning additional credit card numbers and / or additional credit cards to the user is to use an ATM machine (step 522). Only a few modified ATM machines are needed to provide additional credit card numbers. Similarly, ATM machines can provide additional credit cards with relatively few changes. Credit card / single use numbers can be issued directly to electronic devices that can store these numbers: codes. This can be applied to mobile phones and paging equipment, where information can be transmitted by pre-existing systems and computers that are directly connected to each other or via a telex system connected to the Internet or a specific host computer. In this case, some mechanism is needed to protect the numbers in transit to prevent unauthorized access. For global applications, this mechanism must not be restricted by the output. In addition, this protection should not be affected by the "law of violence" decoding technique. Such a system would argue in the storage of single-use credit cards below | j — an alternative way to provide additional credit card numbers is to use a computer It is obvious that when the computer program is quickly processed, the credit card provider has: Adequate security is necessary, whether through the telex network or the postal system! Unauthorized access will not be obtained . 2 '5 Use of Carmine ^ for electronic use
4Λ〇8〇° 五、發明說明(33) 型 1 電 視 或 以 有 線 電 纜 電 腦 J 掌 上 型 電 腦 ϊ 個 限 使 用 的 號 碼 時 ) 任 何 屬 的 網 際 網 路 存 取 裝 , 器 裝 置 j 或 任 何 形 式 具 話 J 附 屬 的 軟 體 能 執 行 1 、 1 ; 由 密 碼 控 制 對 軟 統 能 用 來 驗 證 使 用 者 2 )直到使用者要求之 信用/借貸/簽帳卡號碼的 不同的加密形式儲存。— 每一筆 使用者 施。 使用者 用者要 訂定的 —需求 卡。 裝軟體 卡號碼 細資料 /借貸/ 交易記 檢查過 可用的 求時, 限制時 到信用 電子裝置如任何 結的網際網 貝占身小秘書 執行與電腦 專屬的具有 附屬的微處 下功能的部 的存取,或 否具有有效 前,用來儲 安全儲存體 個額外的安 形式加密。 和使用日期 簽帳卡公司 錄的數位簽 去用過的有 前所述的有效信用 3)儲存交易詳 在不一致時與信用 可能包含了 4)方便 和交易之設 5 )通報 6 )當使 目小於事先 體自動發出 發出更多的 7)在套 形式的電腦(桌上 路存取裝置,膝上型 等等)儲存和取得有 相同功能的裝置或專 按鍵和螢幕的微處理 理器控制電路的電 份或全部: 其他安全性啟動系 的存取權" 存所發出有限使用的 。這些號碼可以多種 全步驟是將號碼以如 的安全儲存體,用來 所存的記錄核對。此 名。 限使用的信用卡號碼 有限使用信用卡的號碼。 或當可用的有限使用信用卡的數 ’藉由一事先同意的路徑’由軟 卡發卡組織或授權的代理商要求 和信用卡發卡組織或授權的代理商之間4Λ〇8〇 ° 5. Description of the invention (33) Type 1 TV or computer with wired cable J Palm-size computer (limited use number) Any internet access device, device j or any form with words J attached software can execute 1, 1; password control can be used to authenticate the user 2) different encrypted forms of credit / debit / debit card numbers stored up to the user's request. — Every user. The user wants to set-the demand card. Installed software card number details / debits / transactions Checked the available time limit, limited time to the credit electronic device such as any Internet connection to account for the mini-secretary to perform the task with the computer ’s exclusive mini-office function An additional secure form of encryption is used to store the secure storage before access, or whether it is valid. The digital signature recorded by the company with the date of use of the debit card is used to have the valid credits mentioned above. 3) The stored transaction details may be inconsistent with the credit. 4) Convenience and transaction settings. 5) Notification. 6) Automatically send out less than the body in advance 7) Store and retrieve the microprocessor-controlled circuit of the device with the same function or dedicated button and screen in a set of computers (desktop access devices, laptops, etc.) Electronic or all: Access to other security boot systems " Limited use issued by the depository. These numbers can be used in a variety of steps. The numbers are stored in a secure storage such as for verification of stored records. This name. Restricted Credit Card Numbers Restricted credit card numbers. Or when the number of limited-use credit cards available ‘via a prior consent path’ is requested by the soft card issuer or authorized agent and the credit card issuer or authorized agent
,以08〇〇 五、發明說明(34) 安全的通訊’用來下載額外的有限使用號碼,此安全的通 訊可刺用任何適合此目的之4用的加密形式。 8 )在信用卡發卡組織或授權的代理商和套裝軟體之間 安全的通訊’用來傳輸關於信用卡交易的資訊,帳戶的餘 額’以及其他由使用者或發卡者所要求的資訊。此安全的 通訊可利用任何適合此目的之可用的加密形式。 9)自動或人工地將信用卡資訊傳輸到銷售商。此軟體 能整合網際網路軟體,當其在一連結到網際網路或類似的 電子網路的裝置上執行時,並且在銷售商亦允許時,能允 許交易細節的自動傳輸。為確保與任何形式的銷售商軟體 能相容’使用者有選項可對由軟體所顯示的一有限使用的 號碼拖拉到網頁上的適當位置,或人工地輸入此號碼。在 經由電話使用的裝置時,此號碼可由使用者以語音輸入或 產生適當的音調以自動地傳輸此號碼到銷售商。 10)使用數位簽名的驗證以驗證信用卡交易的雙方 即,銷售商和持卡人)。 邳 11)使用數位簽名的驗證以驗證通訊中傳輸財務資气 額外的有限使用信用卡號碼的雙方(亦即,發卡者和持卡或 12)使用所儲存的使用者與發卡者所持的有限使 :的序列作為動態密碼以驗證通訊中傳輸財務二碼 丨有限使用信用卡號碼的雙方(亦即,發卡上4^外的 對於”不出示卡片"的交易’建議顧客應使用一 丨置以儲存所發出的單次使用號碼。此類裝置可能包 5 I 孕匕In 2008, the description of the invention (34) secure communication ’is used to download additional limited use numbers. This secure communication can be used in any form of encryption suitable for this purpose. 8) A secure communication between the credit card issuer or authorized agent and the software package 'is used to transmit information about credit card transactions, account balances, and other information requested by the user or card issuer. This secure communication can utilize any available form of encryption suitable for this purpose. 9) Automatically or manually transmit credit card information to the seller. This software integrates Internet software that, when run on a device connected to the Internet or a similar electronic network, and allows the automatic transmission of transaction details, if the seller also allows it. To ensure compatibility with any form of vendor software, the user has the option to drag a limited-use number displayed by the software to the appropriate location on the webpage, or enter the number manually. When using a device over the phone, the number can be entered by the user by voice or an appropriate tone can be generated to automatically transmit the number to the seller. 10) Use digital signature verification to verify both parties of the credit card transaction (ie, seller and cardholder).邳 11) Use digital signature verification to verify that the financial parties transmitting additional financial resources in the communication have an additional limited use of credit card numbers (ie, the issuer and the card holder or 12) using the stored users and the limited holdings of the issuer: The sequence is used as a dynamic password to verify the transmission of the financial two-digit code in the communication. Both parties with limited use of the credit card number (that is, the 4 ”on the card issued for the" transactions that do not show the card "suggest that customers should use one to store Single-use number issued. Such devices may include 5 I
440800 五'發明說明(35) -- 圍由行動電話,呼叫器,專屬單一使用的儲存裝置, 套裝軟體,可在多種平台上執行,如傳統的桌上型腦一 以電視來存取網際網路的裝置(如WebTV)或可攜 梅’ 裝置。 约汁算 在這些裝置上使用來儲存和取得這些號碼的軟 特定的特性,且對所有的平台/裝置均相同。 〃、有 為了安金的緣故,必須有密碼保護對軟體的存取, 由另一能作使用者身分驗證的安全系統來保護。可能以^ 個不同的密碼來提供對某些個人的有限存取,例如,以特 定事先配置的應用限制或最大交易值來限定某一家庭成員 對單次使用號碼的存取。 單次使用號碼最好以採用一個或多個加密系統之安全 的形式儲存。建議採用一雙重系統’使用標準協定(如, DES或RSA加密)以及如上所描述為信用卡設計的特定系 統0 暴力法("Brute force”)解密包括了使用多台快速電 腦以及特定的决算法來測試大量數目的可能加密"餘起"。 查看結果是否以預期的格式出現便可決定是否成功,例如 若是加密的文件時,可用是否為可理解的英文來判斷。若 加密後的版本與未加密的版本為相同的格式(雖然包含不 同的資訊),則暴力解密法無法成功。對於文字此方法在 計算上是不可行的,但對於信用卡是可能的。 解決方法是將一個信用卡號碼的每一部份分割,使用 一私有的密碼將之加密’維持每一部分的數字組合。所得 |440800 Five 'Invention Description (35)-Surrounded by mobile phones, pagers, exclusive single-use storage devices, software packages, which can be executed on multiple platforms, such as traditional desktop brains-TV to access the Internet Device (such as WebTV) or portable plum 'device. The software-specific features used on these devices to store and retrieve these numbers are the same for all platforms / devices.有 Yes For the sake of Anjin, there must be a password to protect the access to the software, which is protected by another security system that can authenticate the user. Limited access to certain individuals may be provided with ^ different passwords, for example, to restrict a family member's access to a single-use number with a specific pre-configured application limit or maximum transaction value. The single use number is preferably stored in a secure form using one or more encryption systems. A dual system is recommended 'using standard protocols (such as DES or RSA encryption) and specific systems designed for credit cards as described above. &Quot; Brute force' decryption involves the use of multiple fast computers and specific algorithms Let ’s test a large number of possible encryptions " 余 起 ". Checking whether the result appears in the expected format can determine whether it is successful. For example, if it is an encrypted file, it can be judged by understandable English. If the encrypted version In the same format as the unencrypted version (although it contains different information), brute force decryption cannot succeed. This method is computationally infeasible for text, but it is possible for credit cards. The solution is to use a credit card number Each part is divided and encrypted with a private password to 'maintain the digital combination of each part. The resulting |
A:\PA-B060.pld 第39 1 a^o800 五、發明說明(36) ~~~ —~〜一'—— 的結果應為安全加密的,但不能為另一現存的信用卡 號。這可以藉由限制加密系統將信用卡號碼用 _ 、 /""J λ ·5π^· 銀行的標頭序列(通常是4到6個數字)轉換為一目前未使 的序列。由於此資訊對所有來自同一發卡者的信用卡為= 數’此資訊應將之隨機化(而非加密)以避免由—二 . 〜i 1饤的解 Φ方法破解。因為一旦號碼的其他部分經由程式解密後’ 就可加上適當的標頭。然後除了檢查和(最後一個數字^以 外的其他數字以可維持相同數目的數字的任何私有綠匙加 密系統加密後產生代表〇到9的數目的結果。使用期限和任 何其他的數字亦經過相同的方式加密,代表原有的結構, 亦即月份加密後仍位於1到1 2,年份加密後代表的數目仍 在未來的二年内’以確保為一有效的使用期限日期。在這 些步驟之後’以一般的方式為此加密的信用卡號碼計算出 檢查和。然後此結果為一有效信用卡號碼,具有有效的檢 查和’並且保證不屬於任何現存的信用/借貸卡帳戶的擁 ;有者。 丨 例如’對一具有6個數字標頭和有效檢查和的卡片, 例如 ’ π 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 使用期限 1 2 / 9 9 ",將 1 2 3 4 5 6隨機指定到目前未使用的標頭序列,例如, 0 9 0 2 3 4 (此僅為說明用,並不必然表示此為一未使用的標 頭序列),接著,將789012345加密為另一9個數字的數 目,例如,209476391。12/99加密為一有效的日期格 i式,確保卡片尚未到期,例如,3/00 *之後重新計算此號 | ^ 碼的檢查和以產生一有效的信用卡號碼,此例中檢查和為A: \ PA-B060.pld No. 39 1 a ^ o800 V. Description of the invention (36) ~~~ — ~~ 一 '—— The result should be secure and encrypted, but not another existing credit card number. This can be done by restricting the encryption system to the credit card number using the _, / " " J λ · 5π ^ · bank header sequence (usually 4 to 6 digits) to a currently unused sequence. Since this information is = for all credit cards from the same issuer, this information should be randomized (not encrypted) to avoid being cracked by -II. ~ I 1 饤 solution Φ method. Because once the rest of the number is decrypted programmatically, you can add the appropriate headers. Then the numbers other than the checksum (the last number ^) are encrypted with any private green key encryption system that can maintain the same number of numbers to produce a number representing 0 to 9. The lifetime and any other numbers are also subjected to the same The method of encryption represents the original structure, that is, the month is still located at 1 to 12 after the month is encrypted, and the number of the year after encryption is still in the next two years' to ensure a valid date of use. After these steps' to ' The general way is to calculate the checksum for this encrypted credit card number. Then the result is a valid credit card number with a valid checksum 'and guaranteed not to be owned by any existing credit / debit card account; there are. For a card with a 6-digit header and a valid checksum, for example, 'π 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 Lifetime 1 2/9 9 ", 1 2 3 4 5 6 Randomly assign a currently unused header sequence, for example, 0 9 0 2 3 4 (this is for illustration only, and does not necessarily mean that this is an unused header sequence), and then, 78901234 5 is encrypted to another 9-digit number, for example, 209476391. 12/99 is encrypted to a valid date format i to ensure that the card has not expired, for example, recalculate this number after 3/00 * | ^ code check And to generate a valid credit card number, in this case the checksum is
d4Q800 五、發明說明(37) 4,結果為 0902 3420 9476 3 9 1 4 使用期限 3/00。 為解密此數字以使用或由銀行傳輸後,將加密的數目 換上表示發卡者的適當標頭序列。其他的數目經由使用私 有密碼以及重新計算檢查和加以解密。 既然標頭數目是一未使用的序列且私有密碼為私有 的,則暴力解密法應無法破解以此種方式加密的原始號 碼’因為無法確定是否已找出正確的結果。與標準的加密 系統組合後,可獲得一種能安全地在不安全的系統中儲存 和傳輸信用卡號碼的方法。 一旦適當的密碼輸入軟體t,下一個可用的單次使用 號碼可解密並顯示,允許客戶使用作任何形式的交易,藉 著報出信用卡號碼或經由直接軟體傳輸到銷售商。一旦使 用後,此單次使用的號碼便由儲存的序列中消去。存取日 期,所存取的號碼以及任何額外的交易細節以一安全的形 式儲存並以數位簽名以便在有爭議的交易狀況下作驗證。 .每次存取一個單次使用的號碼必須輸入密碼,以避免當顧 客將其軟體或裝置於啟動狀態遺留時會有未經授權的存 I取。 第六圖為一流程圖,說明了電子式地使用信用卡號碼i |的—個範例程序。此軟體可自動地啟動或經由某一整合於 網際網路瀏覽器上的圖示來啟動(步驟602)。此軟體可提 丨 供一種以圖形表示的簡單介面,利用熟悉的信用卡以及/ 或者ATM的圖形。此軟體可用java程式碼或嵌入於£/(;; + +應 用或相等的裡式語言中的java核心來撰寫。d4Q800 V. Description of the invention (37) 4 The result is 0902 3420 9476 3 9 1 4 The service life is 3/00. To decrypt this number for use or transmission by the bank, replace the encrypted number with the appropriate header sequence representing the card issuer. The other numbers are checked and decrypted through the use of private passwords and recalculations. Since the number of headers is an unused sequence and the private password is private, brute force decryption should not be able to crack the original number encrypted in this way 'because it cannot be determined whether the correct result has been found. When combined with a standard encryption system, a way to securely store and transfer credit card numbers in unsecured systems is available. Once the appropriate password is entered into the software t, the next available single-use number can be decrypted and displayed, allowing customers to use it for any form of transaction, either by reporting the credit card number or transmitting it to the seller via direct software. Once used, this single-use number is eliminated from the stored sequence. The date of access, the number accessed and any additional transaction details are stored in a secure form and digitally signed for verification in case of disputed transactions. Each time you access a single-use number, you must enter a password to avoid unauthorized access when customers leave their software or devices in the activated state. The sixth figure is a flowchart illustrating an example program for electronically using a credit card number i |. This software can be launched automatically or via an icon integrated into the Internet browser (step 602). This software provides a simple graphical representation of the interface using familiar credit card and / or ATM graphics. This software can be written in java code or a java core embedded in a £ / (;; + + application or equivalent Chinese language).
440S00 五、發明說明(38) =動後使用者輪入—密碼以存取主晝面’其中包含一 (+挪盤,以允許使用者經由按鍵或滑鼠輸入一P I N號碼 若凌@04)。後者可防止由追蹤按鍵來盜取密碼的企圖。 輪入密碼錯誤的次數達某一數目時,將永久地停用 /並重寫掉(0¥61*訂11:6)剩下的加密號碼。再輸入一 (的P IN後,使用者可選擇—新的包含或不含額外限制 彻《如,最大交易值)的有限使用號碼(步驟60 6 ) ^然後一 /的有限使用號碼便會顯示在圖形介面上。軟體可提供 儲存在電腦硬碟中加密的信用卡號碼的安全存取(步驟 08)。廷些號碼可用在網際網路或電話/郵件交易上(步驟 61〇)。這些號碼必須能直接新增到一個網頁上(步驟 6 1 2 )’或由螢幕列印/拷貝出再以其他方式使用(步驟 614) ^有限使用的號碼可被拷貝,列印,經由剪貼板(或 相專之物)貼上,或拖拉(dragged-and-dropped)到一網頁 上。一個號碼顯示的時間長度以及程式如何結束是可供使 用者設定的。使用者亦可記錄註解以提供關於如何使用此 號竭的進一步的資訊。對於自動化的交易,理想上軟體應 能攔截並回應由銷售商伺服器傳出的信號,在潘】覽器中^ 動整合的函式》 一旦取得號碼後,由加密號碼的序列中將之刪除(步 驟616)。日期,號碼,目前的URL(若是在網上使用時)以 及任何的使用者註解會分別以不同的的形式加密儲存,方 ί便使用者查核與複閱(audit/review)(步帮Mg)。使用者 |僅能複閱,無法修改這些資訊。440S00 V. Description of the invention (38) = User turns in after the move—password to access the main day's surface, which contains one (+ move the disk to allow the user to enter a PIN number Ruo Ling @ 04 via a button or mouse) . The latter prevents attempts to steal passwords by tracking keystrokes. When the number of password rotation errors reaches a certain number, the remaining encrypted numbers will be permanently disabled / rewritten (0 ¥ 61 * Order 11: 6). After entering one (P IN, the user can choose-a new limited use number with or without additional restrictions such as the maximum transaction value) (step 60 6) ^ Then the one / one limited use number will be displayed On the graphical interface. The software provides secure access to encrypted credit card numbers stored on your computer's hard drive (step 08). These numbers can be used on the Internet or phone / mail transactions (step 61). These numbers must be able to be added directly to a web page (step 6 1 2) 'or printed / copied from the screen and used in other ways (step 614) ^ Limited use numbers can be copied, printed, and passed through the clipboard (Or equivalent) to paste, or drag-and-dropped onto a web page. The length of time a number is displayed and how the program ends can be set by the user. Users can also record notes to provide further information on how to use this number. For automated transactions, ideally the software should be able to intercept and respond to signals sent by the seller's server. In the browser, you can use the integrated function. Once the number is obtained, it will be deleted from the encrypted number sequence. (Step 616). Date, number, current URL (if used online), and any user comments will be encrypted and stored in different forms, so that users can check and review (audit / review) (step help Mg) . Users | This information can only be reviewed and cannot be modified.
A:\PA-B060.ptd 第42頁 !五、發明說明(39)A: \ PA-B060.ptd Page 42! V. Description of Invention (39)
I 另外還應該具備方便由額外的磁碟片或使用高安全性 :的協定經由網際網路下載額外的號碼的設施(步驟620 )。 丨後者可由另一個程式來執行。 此程式應包括一個最大程度的透通安全特性,亦即, 不會影響一般的使用者,但可防止程式被重新安裝或拷貝 :到另一台機器上。意思是加密的有限使用號碼不是應被存 於執行檔中,就是與機器特有的資訊的加密拷貝存於相同 的檔案中(步驟622)。此可確保這些號碼只能由最初安裝 j此軟體的機器來存取。資料檔案也應存為隱藏的系統檔。 有些使用者可此希望有與電子錢包相同的功能,可由 ;一台電腦移除並由另一台重新安裝,例如,當由辦公室傳丨 丨送一個,錢包到家用機器時。此傳送過程埃保每次只有一 個版本的程式在執行,且在整合使用過的號碼序列時不會丨 有問題。可以採用適當的安全機制以辨識有效的使用者。丨 有限使用號碼的加密應包含兩階段。第一階段,使用: ;只會更改卡號中自由數字的演算法來加密。標頭序列(亦 即’ b 1 η號碼)不加以更改或改為一未使用的b i η號碼,並 重新計算檢查和。此可避免任何形式的暴力解密法,因為 丨無法辨別是否選擇了正確的演算法,由於每個號碼由開始 |到結尾看起來都是一有效的信用卡號碼^接著使用標準的: i加密方法(如RSA或DES)將每一號碼加密。依據程式中的解 丨密方法,然後重新計算檢查和,得到最後的號碼並加入適 丨當的b i η號碼。 此軟體可以加密的形式裝載於一容量丨.44Mb的軟式磁I There should also be facilities for downloading additional numbers via the Internet from an extra diskette or using a high security protocol: (step 620). The latter can be executed by another program. This program should include a maximum degree of transparent security features, that is, it will not affect the general user, but can prevent the program from being reinstalled or copied: to another machine. This means that the encrypted limited use number should either be stored in the execution file or be stored in the same file as the encrypted copy of the machine-specific information (step 622). This ensures that these numbers can only be accessed by the machine where the software was originally installed. The data file should also be saved as a hidden system file. Some users may wish to have the same functions as the electronic wallet, which can be removed by one computer and reinstalled by another, for example, when sending one from the office and sending the wallet to a home machine. During this transmission process, EPO only runs one version of the program at a time, and there is no problem in integrating the used number sequences. Appropriate security mechanisms can be used to identify effective users.丨 Encryption of limited use numbers should consist of two phases. In the first stage, use:; Only the algorithm of the free digits in the card number is changed for encryption. The header sequence (i.e., 'b 1 η number') is not changed or changed to an unused b i η number, and the checksum is recalculated. This can avoid any form of brute force decryption, because it is impossible to tell whether the correct algorithm is selected, because each number looks like a valid credit card number from the beginning | to the end ^ then use the standard: i encryption method ( (Such as RSA or DES) encrypt each number. According to the solution method in the program, the checksum is recalculated to get the final number and add the appropriate b i η number. This software can be loaded in encrypted form with a capacity of .44Mb of soft magnetic
A:\PA-B060ptd 第43頁A: \ PA-B060ptd Page 43
4408 C 五、發明說明(40) 碟片(或任何其他電腦可讀取的媒介)或由一網站下傳。有 限使用的號碼可由程式發出或獨立地發出。安裝時可要求 輸入一個獨立發貨的密碼。安裝過程允許有限次數的重新 安裝程式,超過後就會將重要的資料消去°明確的可安裝 次數可以很容易地經由軟體修改。一旦安裝於主機電腦上 後,程式會將關於機器組態的内部資訊加密’以防止將程 式拷貝到其他的機器上。第一次安裝時,使用者可選擇自 己的密碼。這可用來控制對程式以及影響用於有限使用號 碼的一階段加密形式的存取。 當號碼被存取時,對剩餘有限使用號碼的量的一個圖 示指示器提供了是否需要額外的號碼的先期警示(early warning)。軟體也可提供之前存取過號碼,日期’相關的 URL(若是由谬j覽器所啟動),以及註解的日諸、’提供帳戶 消費的摘要’協助由磁片或網際網路獲得額外的號碼,對 共用卡組態額外的密碼/使用者的能力;以及/或者存取到 發卡單位的網站的快速連結。 2. 6卡片交易的處理程库4408 C V. Description of the invention (40) The disc (or any other computer-readable medium) may be downloaded from a website. Restricted numbers can be issued programmatically or independently. You may be asked to enter a separately shipped password during installation. The installation process allows a limited number of reinstalls of the program, after which important data will be erased. The clear number of installables can be easily modified by software. Once installed on the host computer, the program will encrypt internal information about the machine configuration ’to prevent copying the program to other machines. When installing for the first time, users can choose their own password. This can be used to control access to programs and forms of one-stage encryption that affect limited use numbers. When the number is accessed, a pictorial indicator of the amount of the remaining limited use number provides an early warning of whether additional numbers are needed. The software can also provide the previously accessed number, the date 'related URL (if activated by the browser), and the annotations of Japan, and' provide a summary of account consumption 'to assist in obtaining additional information from magnetic disks or the Internet. Number, ability to configure additional passwords / users for the shared card; and / or quick links to the card issuer's website. 2. 6 card transaction processing library
A:\FA-B060.ptd 第44頁 可以想像在銷售商對額外信用卡號碼和額外信用卡的 處理方式應是與現存的信用卡處理方式相同的,包括由信 用卡公司或授權的第三者取得有效的信用卡號。以幾乎相 同的方式’額外信用卡號碼可對應於顧客帳戶,而由帳戶 扣款。銷售商對於額外信用卡的交易退款方式也是與一般 的相同。對銷售商而言特別的優點是因為他們永遠不會實 際地取得主信用卡的號碼或在多數情形下,取得主信用 440 五、發明說明(41) 卡’所以他們對於主信用卡持有人的安全性不須負責。可 預見的是當使用額外信用卡時,可能最好不要人為地留下 標5己’因此標記可能會被電子式地取走。同樣地,處理他 們的方式也與前述處理信用卡的方式相同。 處理有限使用卡的系統執行包括下列部份或全部的功 能: 1) 查證有限使用的信用卡是否為有效的= 2) 查證交易是否屬於指定號碼的限制範圍内。 3) 當有限使用的信用卡連結到另一帳號時,查證交易 是否屬於指定帳號的限制範圍内。 4) 授權銷售商查證指定號碼和相連的帳號是否為有效 且屬於限制範圍内。 5) 當查證時發現有限使用的信用卡已被變為無效時, 只有在交易是由已獲得前一交易授權的同一銷售商產生 時,允許之後的交易仍由同一有限使用的信用卡記帳。 6) 發現號碼或相連的帳號無效或超過限制時拒絕授 權。 7) 若發現無效的號碼或嘗試再使用一已無效的有限使 用號碼時,啟動詐欺偵測機制。 8) 在一指定的交易時’若發現已達或超過使用限制, 則將有限使用號碼設為無效’無法再作進~步的授權或付 款。 9) 維護已無效的有限使用號碼的序列,以便處理期限 内的退貨或物品有瑕癌*時的退款。A: \ FA-B060.ptd Page 44 It can be imagined that the seller's handling of additional credit card numbers and additional credit cards should be handled in the same way as existing credit cards, including those obtained by a credit card company or an authorized third party. credit card number. In almost the same way, an extra credit card number can correspond to a customer account, and the account is charged. The seller's refund method for extra credit card transactions is the same as usual. The special advantage for sellers is that because they will never actually obtain the number of the main credit card or, in most cases, the main credit 440. V. INTRODUCTION (41) Card 'so they are safe for the main credit card holder Sex is not responsible. It is foreseeable that when using an additional credit card, it may be best not to leave the tag 5 'artificially so the tag may be removed electronically. Similarly, they are handled in the same way as the credit cards described above. The implementation of the system for processing limited-use cards includes some or all of the following functions: 1) Checking whether the credit cards with limited use are valid = 2) Checking whether the transactions fall within the limits of the specified number. 3) When a limited-use credit card is linked to another account, verify that the transaction falls within the limits of the designated account. 4) Authorized sellers check whether the specified number and the connected account are valid and within the limits. 5) When the verification finds that the limited-use credit card has become invalid, only when the transaction is generated by the same seller who has obtained the authorization of the previous transaction, subsequent transactions are still allowed to be charged by the same limited-use credit card. 6) Deny authorization when the number or connected account is found to be invalid or exceeds the limit. 7) If an invalid number is found or an attempt is made to use an invalid limited number again, a fraud detection mechanism is activated. 8) At the time of a designated transaction, if the usage limit is reached or exceeded, the limited use number is set to invalid. No further authorization or payment can be made. 9) Maintain a sequence of invalidated limited use numbers for processing returns or refunds in the event of defective items *.
A:\PA-B060.ptd 第45頁 440tA: \ PA-B060.ptd Page 45 440t
五、發明說明(42) 的日誌’並連結到相連的 限使用及其他卡的交易記 1 〇 )記錄有限使用號碼和交易 帳戶。 11)以郵件或電子郵件傳輪有 錄給使用者。 12) 對於已認可的交易,發動付款給銷售商。 13) 發動退款對申請退款的持卡人。 i H)對記帳的付款開發票給帳戶所有人,或安排由另一丨 丨帳戶轉帳。5. The log of the invention description (42) 'and linked to the connected limited use and other card transactions 10) Record the limited use number and transaction account. 11) Record by mail or email to the user. 12) For approved transactions, initiate a payment to the seller. 13) Initiate a refund to the cardholder requesting a refund. i H) Invoice the billed payment to the account owner or arrange for a transfer from another account.
! I ; 許多關於有限使用卡的裎序所代表的功能已由票據交: 換系統所提供。這些現存的功能包括:加入新的信用/借 丨 資卡號碼到處理的資料庫;允許這些卡號經由顧客到發卡 者的一通確認的電話而啟動;對一信用卡號授與一信用額; :度限制;以及使一信用卡號碼變為無效不能再使用,標記丨 i任何進一步的使用為詐欺。此種重疊表示了此單一使用本 i發明的部分商業價值,因其最小化了所需的改變。 丨 ; 一旦一個有限使用號碼輪入了票據交換系統,即可用 : i 一般的方式來處理,例如,確保未被報遺失且其再資料庫 中代表了一個有效的號碼。若交易在顧客的信用額度及交 1 |易限制範圍内,或在有限使用的限制範圍内,則可授權。 | 對處理軟體必須做一些特定的修改,以實現單次使用 ;信用卡的特性。例如,有效的有限使用號碼必須儲存於有 效帳號及其他關於單次使用號碼的資訊的資料庫中°此包 :含足夠的資訊以辨識所發出的卡的顧客以及對於此卡的任 何額外限制,關於交易值或可使用的銷售商的目錄°! I; Many of the functions represented by the sequence of limited-use cards have been provided by the ticket exchange: exchange system. These existing functions include: adding new credit / debit card numbers to the processing database; allowing these card numbers to be activated via a confirmed call from the customer to the issuer; granting a credit amount to a credit card number; Restrictions; and invalidating a credit card number and making it unusable, marking any further use as fraud. This overlap represents part of the commercial value of this single use of the invention as it minimizes the required changes.丨; Once a limited-use number has been rolled into the clearing-house system, it can be handled in the usual way: i. For example, to ensure that it has not been reported missing and that its repositories represent a valid number. Transactions can be authorized if they are within the customer's credit limit and transaction limit, or within the limits of limited use. | Some special modifications must be made to the processing software to achieve single-use; credit card features. For example, a valid limited use number must be stored in a database of valid account numbers and other information about single use numbers. This package: contains enough information to identify the customer of the card issued and any additional restrictions on this card, Directory of Dealers or Available Sellers °
A:\PA-B060,ptd 第46頁 44 0& 五、發明說明(43) 一旦授權過之後’有限使用號碼會被設為無效以核保 不能再用此號碼做進一步的授權/記帳。為允許對先前的 要求授權有一段時間的延遲’例如以鄭講方式’信用/借 貸卡號碼可能在訂貨時已授權’但只在貨品送達時才記 帳,必須能允許同一銷售商延遲結算的處理° 一旦達到對有限使用信用卡所預設的交易數限制時, 中央卡月處理軟體便將此卡變為無效。由於可能產生於 授權和銷 序與授權 處理事先 使用的卡 一同使用 易細節傳 有限使用 作,伴隨 的傳統信 每當 有效的有 會被改變 帳戶結束 式處理。 售商要 的程序 授權所 號。事 。此時 輸到結 的信用 了對發 用卡交 信用額 限使用 ,配置 或宣告 求結算之間的時間延遲,連結無效化的程 可改進安全性。連結無效化與結算可方便 增加的風險成本,例如,多次使用一有限 先授權可與如前所述和授權相關的無效化 —交易在由銷售商接受前不算授權,當交 算的處理器時會執行無效化的程序。對一 卡當未獲得任何授權時,系統仍如常運 卡者/銷售商較高的風險,如同一未授權 易一般。 度士顧::戶的有效性改變時,所有目前 Π戈目ΐ辨識出並且相連的信用額度 的交易或目前的传田 ..用額度會降低。若顧客 失效,所有的單攻蚀^ 人使用號碼都以相同的方A: \ PA-B060, ptd Page 46 44 0 & V. Description of the Invention (43) Once authorized, the ‘Limited Use Number’ will be invalidated for verification purposes. This number cannot be used for further authorization / accounting. In order to allow a delay in the authorization of the previous request, for example, in a mode of "the credit / debit card number may be authorized at the time of ordering", but only when the goods are delivered, the same seller must be allowed to delay settlement processing ° Once the preset transaction limit for a limited-use credit card is reached, the card processing software will invalidate the card. As it may result from the authorization and sales process and authorization to process the card used in advance together with the easy to use details and limited use, the accompanying traditional letter will be changed whenever the account is valid. Authorization number required by the vendor. Thing. At this point, the credits that are lost to the settlement limit the use of the credit limit for issuing cards, the time delay between the allocation or announcement of settlement, and the process of invalidating the connection can improve security. Linking invalidation and settlement can easily increase the cost of risk, for example, using a limited first authorization multiple times can be related to the invalidation of the authorization as described above—the transaction is not considered an authorization until it is accepted by the seller, and it is treated as a settlement The program will be invalidated during the program. When no authorization is obtained for a card, the system still has a higher risk as a normal card owner / seller, like the same unauthorized transaction. Du Shi Gu: When the validity of the household changes, all current transactions and current credit line transactions that are identified and connected by 戈 Ge Muΐ will be reduced. If the customer fails, all single attack ^ people use the numbers in the same way
§使用一有限使用號J 丨中 已配置給同一顧客的下i 錯存有效帳號的資料庫§ Use a limited use number J 丨 in the database that has been allocated to the same customer and misplaced a valid account
個可用的單次使用號碼便4 0 440800 五、發明說明(44) 田 交易δ己帳到—有限使用的號碼上時,交易細節和 顧客帳戶的細節一起儲存以供查核,並且此交易值加入顧 客帳戶的帳單中。 儲存父易細節的軟體和列印的敘述可*被修改以同時用 在顧客的傳統帳戶明細和有限使用號碼的交易明細報告。 ^ ,有限使用號碼的處理矸以數種不同方式整合到現存的 乐統中。授權和結算裎序可在單一週期完成或分成不同 的授權和$算程序如同現存的信用卡系統一般。 在一 的’獨立的有限使用信用/借貸/簽帳卡處理 ^ ^中Η ^則述的功能可以不須限定在任何能合併所需 招=^庫和通訊功能的適合電腦上"此種系統應能提供與 存信用/借貸/簽帳卡交易在同一時間基準的交易授權。' 方法2 Si能必須整合到現存的系統,,可採用數種 幹的用/产督變最小化。可能必須在接收銷售商所傳 H Λ 卡號碼時的處理程序中增加—些步驟。Each available single-use number is 4 0 440800 V. Description of the invention (44) When the field transaction δ has been posted to a limited-use number, the transaction details and customer account details are stored together for review, and the value of this transaction is added Customer account bill. The software that stores the details of the parent and the printed narrative can be modified * to be used in both the customer's traditional account details and the transaction details report of the limited use number. ^ The treatment of limited use numbers is integrated into existing music systems in several different ways. Authorization and settlement procedures can be completed in a single cycle or divided into different authorization and calculation procedures just like existing credit card systems. The functions of the 'independent limited use credit / debit / debit card processing' in ^ ^ ^ may not be limited to any suitable computer that can incorporate the required methods and library and communication functions. The system should be able to provide transaction authorization based on the same time as credit / debit / debit card transactions. '' Method 2 Si energy must be integrated into existing systems, and several dry use / production changes can be minimized. Some steps may have to be added to the processing procedure when receiving the H Λ card number from the seller.
裡序程圖,說明τ用來處理交易的-個範例 斤在步驟702中,—個軟體系統由銷 J 細節。軟體系統決定是否此號瑪為一 收父易二 -傳統的卡號(步驟704 )。若號瑪為一傳 的虎碼或- 加改變地通過到處理系統,且可由現存的统〜不 的授權。銷售商退款的程負:傳統的卡號 系統可檢查有限使用改變(步驟7〇8)。 710)。—使的號碼對應的限制(步驟 710)。右唬碼對於指定 U’騍 又勿 为双的活,此交易被拒Here is a sequence diagram illustrating an example of how τ is used to process transactions. In step 702, a software system is detailed by J. The software system decides whether this number is received as a traditional card number (step 704). Ruoma is a pass-through tiger code or-changed to pass to the processing system, and can be authorized by the existing system. The seller's refund process is negative: the traditional card number system can check for limited use changes (step 708). 710). -The restriction corresponding to the number (step 710). Right-bluffing code is not valid for designated U ’骒, this transaction is rejected
:\PA-B060.ptd 44 08 0 ο 五'發明說明(45) 絕(步驟7 1 2 )。否則,資料庫尋找的程序決定相連的主帳 戶號碼’傳輸此號碼回處理系統(步驟7 1 4 )。此處可允許 所有現存的詐欺偵測,授權和完成統計程序,不須改變 (步驟716)。主帳戶號碼由有限使用號碼取代時,就需要 —些額外的步驟了(步驟71 8 )。若在交易過程中以達到使 有限使用號碼無效的標準,則有限使用號碼被設為無效, 不能再做其他的交易除了退款以外5 —個額外的有限使用 號碼可自動地發出,若需要繼續補充單次使用號碼的話。 然後交易的細節和主帳戶號碼傳輸並加入資料庫,以便 對交易細節作追蹤並記入使用者的帳目。這些功能不須在 授權前執行,可在之後完成(步驟720)。 以前述的系統,軟體負責以有限使用號碼取代主帳戶 號碼’亦可針對有限使用號碼處理額外的特性《這些特性 | 包括交易值的限制,銷售型態的限制,以及地理位置的限 i :制。若交易超過了有限使用卡的限制,則拒絕授權,且主 I 信用卡不須傳出作進一步的處理。當交易在有限使用卡的 丨: \ PA-B060.ptd 44 08 0 ο Five 'invention description (45) must not (step 7 1 2). Otherwise, the database search procedure determines the connected master account number 'to transmit this number back to the processing system (step 7 1 4). All existing fraud detection, authorization, and statistical procedures can be allowed here without change (step 716). When the master account number is replaced by a limited use number, some additional steps are required (step 71 8). If the standard of invalidating the limited use number is reached during the transaction, the limited use number is set to invalid, and no other transactions can be made. In addition to the refund, 5 additional limited use numbers can be issued automatically, if necessary, continue. If we supplement single use number. The transaction details and the master account number are then transmitted and added to the database to track the transaction details and record them in the user's account. These functions need not be performed before authorization, but can be completed later (step 720). With the aforementioned system, the software is responsible for replacing the main account number with a limited-use number. It can also handle additional features for the limited-use number. These features | include restrictions on transaction value, restrictions on sales patterns, and restrictions on geographic locations. . If the transaction exceeds the limit of the limited use card, the authorization is refused, and the main I credit card does not need to be sent out for further processing. When trading on a limited use card 丨
I ;限制範圍内時,交易的細節與主帳戶號碼一同傳出作傳統 I :的有效驗證。以此方法,對主帳戶的限制(例如,可用的 餘額’使用期限)也會對每一有限使用交易作檢查。 j 特別的詐欺偵測亦可併入此軟體中。例如,當第一次 丨谓測到某一已無效的有限使用號碼被使用時,可對此交易 作一旗標,表示可能是盜用,並採取適當的措施。由單一 丨銷售商或一組銷售商重複嘗試授權一無效的號碼時也可能 是詐欺,並導致啟動適當的詐欺處理措施。I; within the limits, the details of the transaction are transmitted with the main account number for traditional I: valid verification. In this way, restrictions on the master account (for example, available balance 'lifetime) are also checked for each limited use transaction. j Special fraud detection can also be incorporated into this software. For example, when it is detected for the first time that an invalid limited-use number is being used, a flag may be flagged for the transaction, indicating that it may be misappropriation and appropriate measures taken. Repeated attempts by a single seller or a group of sellers to authorize an invalid number can also be fraud and lead to the initiation of appropriate fraud measures.
440800 五、發明說明(46) 前述的系統僅需要對現存的系統作最小的修改,但處 理的時間可能變為傳統交易的兩倍,因為雙重的授權程 序,一次是在有限使用號碼的驗證和交易的步驟,一次是 在標準系統中。若能夠對有限使用號碼和主信用卡號碼使 用單一序列,將有限使用卡如同主信用卡一般地處理則較 佳。 第八圖為一流程圖,說明了用來處理交易的另一個範 例程序。在步驟8〇2中,一個軟體系統由銷售商接收交易 的細節。軟體系統存取包含額外資訊的資料庫以辨識相連 ' | 丨的帳戶’結算的方法和關於有限使用卡的使用限制。結 果’有限使用號碼可連結到一現存的帳戶,以目前使用可丨 將多個傳統帳戶連結(如發給同一家公司的多張卡)的方式 (步驟804)。在授權過程中,相連的帳戶不須辨識,只要 每個有限使用的帳戶在相連的帳戶改變時(可用餘額,帳 戶有效性)亦加以修改即可。系統可拒絕授權(步驟806 )或 不須辨識相連的帳戶而授權交易(步驟808)。 為結算和記帳的目的(步驟8丨2 ),必須辨識相連的帳 戶(步驟810)但不須在授權過程完成。現存的軟體應修改 以連結到可為有限使用卡號執行如前述特別任務的新程 |式。(步驟814,816和818)。這些功能不需要在授權發出丨 I前執行’可在之後完成。 ί i 此系統需對現存的處理軟體系統作較多的修改,但提i i供與現存的交易相同時間基準的授權時間,因為只需一次 授權的步驟。其他的動作,例如在主帳户改變時更改有限440800 V. Description of the invention (46) The aforementioned system only needs to make minimal modifications to the existing system, but the processing time may become twice that of traditional transactions because of the dual authorization process, once the verification and The steps of the transaction, once in the standard system. If a single sequence can be used for the limited use number and the main credit card number, it is better to treat the limited use card like a main credit card. Figure 8 is a flowchart illustrating another exemplary procedure for processing transactions. In step 802, a software system receives details of the transaction from the seller. The software system accesses a database containing additional information to identify the method of settlement of the linked '| 丨 account' and the restrictions on the use of the limited use card. As a result, the limited use number can be linked to an existing account, and in the current use, multiple traditional accounts (such as multiple cards issued to the same company) can be linked (step 804). During the authorization process, the linked accounts need not be identified, as long as each limited-use account is modified when the linked account changes (available balance, account validity). The system may deny authorization (step 806) or authorize the transaction without identifying the connected account (step 808). For settlement and billing purposes (step 8 丨 2), the connected account must be identified (step 810) but need not be completed during the authorization process. Existing software should be modified to link to new procedures that can perform special tasks as previously described for limited use card numbers. (Steps 814, 816, and 818). These functions do not need to be executed before the authorization is issued, and can be completed later. ί i This system requires more modifications to the existing processing software system, but provides i i with the same authorization time as the existing transaction, as only one authorization step is required. Other actions, such as limited changes when the master account changes
44 08 0 0 五、發明說明(47) 使用卡上的限 本發明並 在結構與細節 明主要是用在 的主帳戶的草 如,可想像一 帳戶的人使用 丨信用卡可用在 ;後,可將卡片 丨完的金額轉回 卡的人沒有信 制’可在授權過 不僅限於到目前 上有多種變化。 使用者接收一個 次使用信用卡的 個ATM機器(或類 ,以購買可拋棄 出示卡片的或遠 再插入ATM機器 購買者的帳戶。 用卡的帳戶,仍 用卡,經過一段時間交易清除後可退款,退款可能以現金 的方式或轉入購買者在另一金融機構的帳戶。同樣地,讀 者應了解ATM機器不是重點’拋棄式信用卡或單次使用信 |用卡可以如同購買其他貨物或服務的一般形式購買,例如 程以外完成即,離線)。 為止所插逑的實施例,可能 】如 目前為止所描述的發 已具有由信用卡提供者發出 系統。但並不必然如此。例 似的裝置)可供沒有信用卡 式的信用卡,然後此拋棄式 端的交易t。當此卡已用過 過一段時間後,將尚未用 同樣地,若購買拋棄式信用 可由ATM機器購買拋棄式信 ί直接面對面的交易或郵購。 丨44 08 0 0 V. Description of the invention (47) Limitations on the use of the invention The structure and details of the main account are mainly used in the main account. It can be imagined that the person using an account can use credit cards; later, you can The person who transfers the completed amount of the card back to the card does not have a letter system. The authorization may not be limited to many changes until now. The user receives one ATM machine (or similar) that uses the credit card one time to purchase the card that can be discarded or inserted into the ATM machine's account. The account with the card still uses the card and can be refunded after the transaction is cleared for a period of time. Payment, the refund may be in cash or transferred to the purchaser's account at another financial institution. Similarly, readers should understand that ATM machines are not the focus of 'disposable credit cards or single-use letters | cards can be used to purchase other goods or Services are generally purchased in the form of, for example, off-line, off-line). In the embodiments inserted so far, it is possible that the issue as described so far already has an issue system by a credit card provider. This is not necessarily the case. An example device) is available for credit card-less credit cards, and then this disposable transaction t. When this card has been used for a period of time, it will not be used. Similarly, if you buy disposable credit, you can buy disposable credit by ATM machine. Direct face-to-face transaction or mail order.丨
I 同樣地,雖然前面所述建議可購買單次使用的信用 丨卡,但沒有理由不能是具有一集合信用額度限制的多次使 用信用卡。再者,這些卡可能不是信用卡’而只是供單次 i使用或多次使用的信用卡號碼。可想像的是,為了運作的| 效率,這些號碼較可能以抛棄式用卡或早次使用h用卡i j的方式發出。因此,對於不想處理k用卡的人,或是信用 ί程度使他們不被允許擁有信用卡的人,也可能擁有信用卡I 了。這對於信用卡的提供者亦有相當的好處。I Similarly, although the aforementioned recommendations suggest that single-use credit cards can be purchased, there is no reason why they cannot be multiple-use credit cards with a set credit limit. Furthermore, these cards may not be credit cards' but only credit card numbers for single or multiple use. It is conceivable that for operational efficiency, these numbers are more likely to be issued in the form of disposable cards or early use of i cards. Therefore, for people who do not want to deal with k-cards, or people whose credit is such that they are not allowed to own credit cards, they may also own credit cards. This also has considerable benefits for credit card providers.
Α:\PA-B060.ptd 第51頁 44 Ob 五、發明說明(48) '' '----一 _ " 2. 號碼使用 备持卡人和發卡者之間的通訊需要其中某一方或雙方丨 作驗也%’由每一方所擁有的有限使用卡號的序列可用來i 作為一種辨識的形式。以動態密碼的方式,可將一個有限| 使用號碼的全部或部分用來作為辨識的方法而不需任何其 他額外的安全系統。由於此辨識在傳統的交易系統中不需; 處理L可使用一個有限使用號碼的全部或部分。 第九圖為一流程圖,說明了用來使用信用卡號碼為 PIN號碼的一個範例程序。在步驟9〇2中,發卡者產生一個| 包含可用信用卡號碼的資料庫。發卡者選出一個主信用卡| 號碼(步驟9 0 4 ),並將之發給主信用卡的持有人(步驟 906 )。接著發卡者配置額外的信用卡號碼給主信用卡號碼 (步驟9 08 ),並將之發給主信用卡的持有人(步驟91〇)。當 主信用卡的持有人需要或想要存取帳戶的資訊時(步驟 i 9 1 2 ),主信用卡持有人可使用這些額外的信用卡號碼作為| 一PIN號碼(步驟914)。 ; I | 可見的是,在本發明的系統和任何其他使用PIN或其 他號碼(不論是否在交易之間為常數或一變數)的系統之 間,對於驗證一個交易有基本上的差異。在本系統令,在 交易過程傳送的詳細數值的格式與現存的信用卡號碼相同 但不包含唯一的帳戶碼。如此可使得信用/借貸/簽帳卡交 易的安全性和隱私性達到最大。在此處理系統中首先查 證有限使用號碼的有效性,然後藉由檢查所儲存與此有限 使用號碼相關的資訊辨識出相連的帳戶號碼。經由傳輸一Α: \ PA-B060.ptd Page 51 44 Ob V. Description of the invention (48) '' '---- 一 _ " 2. Communication between the card holder and the card issuer requires one of the parties Or both parties can also test the sequence of the limited use card number owned by each party, which can be used as a form of identification. With a dynamic password, all or part of a limited number can be used as a method of identification without any additional security system. Since this identification is not required in traditional trading systems; processing L may use all or part of a limited use number. Figure 9 is a flowchart illustrating an example procedure for using a credit card number as a PIN number. In step 902, the card issuer generates a library containing available credit card numbers. The issuer selects a primary credit card number (step 904) and issues it to the holder of the primary credit card (step 906). The card issuer then allocates an additional credit card number to the primary credit card number (step 9 08) and issues it to the holder of the primary credit card (step 91). When the holder of the primary credit card needs or wants to access the account information (step i 9 1 2), the primary credit card holder can use these additional credit card numbers as a PIN number (step 914). I | It can be seen that there is a fundamental difference between verifying a transaction between the system of the present invention and any other system that uses a PIN or other number (whether or not it is constant or variable between transactions). In this system, the format of the detailed value transmitted during the transaction is the same as the existing credit card number but does not contain a unique account code. This maximizes the security and privacy of credit / debit / debit card transactions. In this processing system, the validity of the limited use number is first checked, and then the linked account number is identified by checking the stored information related to this limited use number. Via transmission one
A:\PA-B060.ptdA: \ PA-B060.ptd
44 08 五、發明說明(49) 額外的PIN或除了帳戶號碼以外的其他額外號碼,或其他 的唯一辨識碼,具有較低階的安全性與隱私性。在任何形 式的PIN辨識碼(如Rahman所描述)首先辨識出相連的帳 號’接著查驗此PIN號碼。因此許多持卡人可共用相同的 PIN ’事實上在多數狀況下,由於PIN的長度較短,許多使 用者會有相同的PIN但不同的帳戶號碼。對我們的系統, 每一有限使用的號碼在使用時必須是唯一的,且能夠准一 地決定相連的帳號。 雖然本發明已以一較佳實施例詳述於前,但這些範例 Z二Ϊ,為限制。不但本發明的系統可加以修改以用在其 技術®片系統;也可修改用在其他的電腦網路或編號 以下列本發明的範圍不限於所描述的實施例,而是 以下列的申請專利範圍來定義。44 08 V. Description of the invention (49) The extra PIN or extra number besides the account number, or other unique identification code, has a lower level of security and privacy. In any form of PIN identification code (as described by Rahman), the connected account number is first identified 'and then the PIN number is checked. So many cardholders can share the same PIN. In fact, in most cases, because of the short PIN length, many users will have the same PIN but different account numbers. For our system, each limited-used number must be unique in use and be able to determine the connected account exactly. Although the present invention has been described in detail with a preferred embodiment, these examples are limited. Not only the system of the present invention can be modified to be used in its technology® film system; it can also be modified to be used in other computer networks or numbered. The scope of the present invention is not limited to the described embodiments, but the following patent applications To define.
Claims (1)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IES980458 | 1998-06-15 | ||
US9250098P | 1998-07-13 | 1998-07-13 | |
US9817598P | 1998-08-26 | 1998-08-26 | |
US9961498P | 1998-09-09 | 1998-09-09 | |
US09/235,836 US6636833B1 (en) | 1998-03-25 | 1999-01-22 | Credit card system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
TW440800B true TW440800B (en) | 2001-06-16 |
Family
ID=27517566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW088104706A TW440800B (en) | 1998-06-15 | 1999-06-25 | Credit card system and method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW440800B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI402774B (en) * | 2005-09-21 | 2013-07-21 | Oki Electric Ind Co Ltd | Automatic trading device and automatic trading system |
-
1999
- 1999-06-25 TW TW088104706A patent/TW440800B/en not_active IP Right Cessation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI402774B (en) * | 2005-09-21 | 2013-07-21 | Oki Electric Ind Co Ltd | Automatic trading device and automatic trading system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1029311B1 (en) | Credit card system and method | |
EP1153375B1 (en) | Credit card system and method | |
EP1265200A1 (en) | Credit card system and method | |
TW440800B (en) | Credit card system and method | |
JP2003507824A (en) | Guarantee system for performing electronic commerce and method used therefor | |
AU753159B2 (en) | Credit card system and method | |
CZ20003230A3 (en) | System and procedure used for credit cards | |
MXPA00009309A (en) | Credit card system and method | |
ZA200106639B (en) | Credit card system and method. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent | ||
MK4A | Expiration of patent term of an invention patent |