WO2002041207A1 - Systeme securise de commerce electronique - Google Patents
Systeme securise de commerce electronique Download PDFInfo
- Publication number
- WO2002041207A1 WO2002041207A1 PCT/JP2001/009023 JP0109023W WO0241207A1 WO 2002041207 A1 WO2002041207 A1 WO 2002041207A1 JP 0109023 W JP0109023 W JP 0109023W WO 0241207 A1 WO0241207 A1 WO 0241207A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- medium
- card
- information
- cash
- identification number
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims description 13
- 230000002265 prevention Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000000034 method Methods 0.000 description 8
- 238000012795 verification Methods 0.000 description 6
- 238000012546 transfer Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000001186 cumulative effect Effects 0.000 description 2
- 239000000725 suspension Substances 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000004049 embossing Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000004579 marble Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/347—Passive cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/127—Card verification in which both online and offline card verification can take place
Definitions
- the present invention relates to a security method for commerce, particularly in personal commerce using a credit card, a cache card, a computer network, or the like, and forgery of a medium such as a credit card in a computer network. It relates to a method for minimizing the damage caused by theft of ID numbers.
- the credit card cash card displays information such as the number and name of an individual ID by embossing, and the magnetic stripe stores the same information.
- the credit card cash card checks the signature on the back of the credit card against the signature on the product purchase slip, or in the case of a cash card, use your personal identification number. Is input to the information terminal and verified by the host computer.
- An object of the present invention is to solve such a conventional problem, and it is impossible to perform an illegal act even if an ID number or a password is grasped.
- An object of the present invention is to provide an e-commerce security system that cannot be used. Disclosure of the invention
- a medium unique to the medium is attached to a medium other than cash, such as a credit card or a cash card, which can be traded, and a medium unique identification number based on the pattern is provided. And the information stored in the magnetic data of the medium is compared to determine the authenticity of the medium.
- the invention according to claim 2 of the electronic commerce security system according to the present invention is a medium that can be used for commercial transactions other than cash, such as a credit card and a cash card, and that reads a unique pattern of the medium. Judgment of the authenticity of the card by comparing the information terminal device provided with the reading means and the recording information reading means for reading the recording information such as the magnetic data of the medium with the medium unique identification information and the recording information transferred from the information terminal device Determining means for performing the determination.
- the invention according to claim 3 of the electronic commerce security system according to the present invention is the invention according to claim 2, wherein the information terminal device is provided with a data input unit capable of inputting a personal identification number, and the determination unit is unique to the medium. Identification information, records It is characterized in that the authenticity of the password and the identity verification are determined based on the information and the password, and an updated password valid for the next and subsequent transactions is transmitted to the information terminal device when the transaction is completed.
- the invention according to claim 4 of the electronic commerce security system according to the present invention is the invention according to claim 3, wherein the password is transmitted from the determination means to the card user every time one commercial transaction is completed.
- the invention described in claim 5 of the electronic commerce crime prevention system according to the present invention is characterized in that the updated personal identification number valid for the next and subsequent commercial transactions is public. It is characterized in that the card user is notified of the update by transmitting it to the portable terminal possessed by the card holder via a line.
- the invention according to claim 6 of the electronic commerce security system according to the present invention relates to a system for performing settlement using a medium other than cash, such as a credit card or a cash card, capable of conducting a commercial transaction, which is related to the medium via a network or the like.
- Judgment means for receiving data such as an ID number and a password valid only for a predetermined number of commercial transactions to determine whether or not the commercial transaction has been completed, and performing the desired settlement processing when the commercial transaction has been completed, and
- a means is provided for notifying the card user of the update of the personal identification number by transmitting the updated personal identification number valid for commercial transactions to the cardholder's terminal or mobile terminal via a public line or the like.
- the invention according to claim 7 of the electronic commerce security system according to the present invention is characterized in that, in the invention according to any one of claims 3 to 6, the information terminal device performs encrypted communication when transmitting and receiving various information.
- the personal identification number or an encoded number is used as a key for encrypted communication.
- the invention according to claim 8 of the electronic commerce security system according to the present invention is a non-cash-enabled medium such as a credit card or a cash card. Recording means for recording the number of uses of the medium, and the authenticity of the medium is determined based on the number of uses.
- the invention according to claim 9 of the electronic commerce security system according to the present invention is a recording system for recording the number of times of use of the medium in a non-cash medium such as a credit card, a cash card, etc. in a cumulative and non-subtractable manner. Means is provided, and the authenticity of the medium is determined by performing a rewriting operation by subtracting the number of uses.
- FIG. 1 is a diagram showing an example of a card used in a security system for electronic commerce according to the present invention.
- FIG. 2 is a diagram showing a schematic configuration of an electronic commerce security system according to the present invention.
- FIG. 3 is a diagram showing an example of a data table included in the determination means in the electronic commerce security system according to the present invention.
- FIG. 4 is a diagram showing one embodiment of the configuration of the electronic commerce security system according to the present invention.
- FIG. 5 is a flowchart showing the operation of the electronic commerce security system according to the present invention.
- FIG. 6 is a diagram showing another embodiment of the configuration of the electronic commerce security system according to the present invention.
- FIG. 7 is a diagram showing another embodiment of the configuration of the electronic commerce security system according to the present invention.
- fraudulent acts using cards and the like include physical acts such as counterfeiting cards, and non-physical acts such as illegally acquiring (frauding) ID numbers and PINs.
- a unique identification number is determined in advance.
- a magnetic stripe is provided on the back surface of the card 1, and the magnetic stripe stores stored information such as the ID number of the card.
- the card 1 is inserted from the entrance 2a to the information terminal device 2 (unique identification information reading means and recorded information reading means), and the information terminal device 2 Reads the pattern of the card and transmits it to the host computer 4 via the network 3 such as a telephone line or a dedicated line together with the magnetic data information stored in the magnetic stripe of the force.
- the unique identification number based on the card pattern is compared with the magnetic data information to judge whether the card is a counterfeit card by a computer or other judging means to determine the success or failure of the commercial transaction.
- FIG. 3 is a diagram showing a table of data collation data stored in the host computer 4. As shown in FIG. 3, one-to-one correspondence with recorded information (ID numbers, etc.) such as magnetic data is shown. The card unique identification number corresponding to the ID is stored, the card unique identification number is determined from the card pattern transferred from the information terminal device, and when the unique identification number and the magnetic data information such as the ID number match, Only allow commercial transactions.
- ID numbers such as magnetic data
- the card itself can be provided with information (pattern) corresponding to a unique number and the authenticity of the card can be determined together with the magnetic data information stored in the magnetic stripe. Fraudulent acts such as unauthorized acquisition of information and transfer of various information to counterfeit information be able to.
- the data pattern of the force is transferred from the information terminal device 2 to the host computer 4 and the unique identification number of the card is determined by the host computer 4. 2 has a pattern reading device and a unique identification number judgment function, transfers the unique identification number and the information stored in the magnetic disk to the host computer 4, and transfers the information to the host computer 4. It may be configured to determine the authenticity of the password.
- FIG. 4 is a diagram showing the configuration of an electronic commerce security system according to the present invention.
- 2 is an information terminal device for reading patterns and magnetic data which are unique identification numbers of force
- 5 is for centrally managing an identity verification function.
- 6 is a host computer of a financial company (card issuing company)
- 7 is a display device that is attached to an information terminal device and displays information
- 8 is a keyboard and other devices. It is a data input device (data input means).
- the security system for e-commerce is described below with reference to Figs.
- the card user obtains a password that can be used only once from a card company or the like (step S1), and sends a password 1 to the information terminal device 2 when using the card. It is inserted (step S2), and the password is input from the data input device 8 (step S3). Then, from the information terminal device 2, the unique identification information (pattern) of the card 1, the recording information such as the ID number stored in the magnetic data of the card 1, and the password A are transmitted via the network. Transferred to the host computer overnight 5 and the host computer In step 5, referring to the table as shown in FIG. 3, it is determined whether or not the force unique identification number matches the magnetic data storage information (step S4).
- step S4 If it is determined that the password is genuine (YES in step S4), it is determined whether or not the entered passwords match (step 5), and the commercial transaction is permitted only when the passwords match (step S6). ) Then, data B such as the purchase amount information and payment method for performing settlement by force are transferred from the information terminal device 2 to the host computer 6 of the financial company via the host computer 5 (step S 7), a commercial transaction is executed.
- a new password (updated password) valid at the next business transaction is returned to the information terminal device 2 via the network from the update notification means of the host computer 5 that centrally controls the personal identification function (step S8). ), The password is displayed on the display device 7 (step S9).
- the card user memorizes or keeps a record of the updated personal identification number and uses it for the next commercial transaction.
- the PIN stored in the host convenience store 5 is also rewritten to prepare for the next commercial transaction.
- the card unique identification information does not match the magnetic data, or if the PIN does not match (NO in S4 or S5), the card has been forged or the identity of the card user cannot be verified. Judgment is made, the commercial transaction is rejected, and a message to that effect is displayed on the display device 7 attached to the information terminal device 2 (step S10).
- the host computer which centrally manages the identity verification function from the host company 6 of the financial company.
- the night is transferred on evening 5, and the available flags (see Fig. 3) are changed by the judgment means in the host computer overnight 5.
- the personal identification number is updated for each commercial transaction. It may be changed every time.
- a part for storing the security code to be updated on the card is provided, and the information terminal device is provided with a function to update the security code.
- the updated security code stored in the password and data input are entered. The identification of the force holder may be performed by comparing the password with the password input from the device.
- the updated security code and the fixed security code are used to store the updated security code on the card.
- the fixed security code is entered by the user to confirm the identity when using the card.
- the security can be further improved by using a double password in such a manner.
- the authenticity of the card itself is determined by the unique identification information based on the force pattern and the magnetic storage information, and is effective for one or a predetermined number of commercial transactions.
- the host computer which centrally controls the personal identification function, notifies the card holder of a personal identification number, and performs personal identification by comparing the personal identification number entered during commercial transactions with the stored personal identification number. Secure electronic commerce can be realized.
- the communication between the information terminal device 2 and the host computers 4 and 5 and the communication between the host computers 4 and 5 and the host computer 6 of the financial company are to improve security.
- Perform encrypted communication In this case, a common key cryptosystem is used, and the personal identification number of the card is used as the common key.
- the common key cryptosystem usually, information intended only for encrypted communication is used as a common key.
- the password is changed every time a commercial transaction is made. Keys are changed frequently, and cryptographic communication is extremely secure, enabling more reliable e-commerce. If the password cannot be used directly as the common key, for example, when the data length of the password and the common key are different, What is encoded according to a predetermined rule may be used as a common key.
- variable password method is used for electronic settlement
- it is widely used for cryptographic communication for transmitting and receiving important data after inputting the variable password, such as data transmission with personal authentication. Applicable.
- FIG. 6 is a diagram showing another configuration of the electronic commerce security system according to the present invention.
- the updated personal identification number is displayed on the display device 7 installed in the store or the like, so that the personal identification number can be visually recognized by anyone other than the force holder.
- the security was not perfect, as shown in Fig. 6, the updated PIN was transferred to the mobile terminal 9 owned by the force holder on a network such as a public network By transmitting the data as voice or electronic data via 0, the security can be further improved. Note that only the method of transmitting the updated personal identification number is different, and the other processes are the same as those in the above-described embodiment, and thus description thereof will be omitted.
- FIG. 7 is a diagram showing another configuration of the electronic commerce security system according to the present invention.
- personal commerce has often been conducted via the Internet, especially due to the spread of convenience stores and the establishment of the Internet infrastructure. This will be described with reference to FIG.
- 5 is a host computer for centrally managing the identity verification function
- 6 is a host computer of a financial company (card issuing company)
- 10 is a network such as a public line or the Internet
- 11 is a product or service. etc
- Reference numerals 1 and 2 denote terminal devices of purchasers of goods and services.
- the credit card is required to settle the personal information such as his / her address and the price to the service provider.
- the personal identification number used only is transferred to the terminal device of the service provider via the network 10.
- the service provider transfers the commercial transaction data to the host computer 5 using the terminal device 11 or the information terminal device 2 (not shown), and the host computer 5 determines whether or not the passwords match by the determination means. And decide whether or not to establish a commercial transaction.
- the host computer 5 performs a predetermined settlement process, and further updates the password used for the next and subsequent business transactions via the public line or the like to the terminal device 12 or the like of the purchaser. Alternatively, it is transmitted to the portable terminal 9 owned by the purchaser. As a result, even when conducting business transactions without physically using the card itself, the PIN for card use is updated for each prescribed transaction, and the updated PIN is only available to the cardholder. Because it can be grasped, it is possible to conduct secure transactions.
- the present invention is not limited to commercial transactions using cards, but also to commercial transactions using no cards, for example, electronic transactions during a computer, etc., in which an ID number, a personal identification number, etc. are illegally used by others. It also works effectively to prevent illegal activities.
- data that is magnetically recorded on a cash card or credit card is rewritable and may be forged.
- card-specific information is stored in a non-rewritable memory (ROM) in advance, but information that needs to be changed when using the card is rewritable. May be forged because it is stored in a functional memory (RAM).
- RAM functional memory
- a recording means such as a non-rewritable memory is installed in the C card in advance, and the number of times of use of the IC card is cumulatively recorded therein. The number of uses is added to the IC card according to the use.
- the usage count read by the IC card reader is input to the host computer via the network, and if it does not match the usage count recorded on the host computer, it is determined to be a counterfeit card and matches. If so, the card is judged to be a true card. Since the number of times of use changes every moment with the use of the card, even if a fake card is created by reading the data from an authentic IC card Even if the IC card was subsequently used, the data on the number of times of use was rewritten and the information on the authentic IC card was changed, so the card was used afterwards. It can be determined that the missing IC code is counterfeit.
- non-rewritable memory there are various types of non-rewritable memory that can be incorporated into the IC at the manufacturing stage. For example, a method of cumulative writing to the write area of a memory that can be written only once Alternatively, an optical system such as a read-up-once CDR may be used.
- the number of uses in the IC card may be recorded not only for each use but also for every predetermined number of uses, for example, every 10 times.
- the first aspect of the present invention it is not possible to create two or more identical cards, thereby preventing forgery of a card or the like, and preventing the storage data stored in the card from being physically forged. Since the authenticity of the password is determined by collating with the unique identification number of the card, it is possible to prevent the transaction by the counterfeit password and to perform the business transaction safely.
- the authenticity of the card and the identity verification can be confirmed by using the personal identification number and the unique identification information of the password, which are changed for each commercial transaction, and the memory information stored in the card. It is possible to conduct business transactions even more safely.
- variable update PIN is transmitted to the mobile terminal or the like of the card holder via the public line, only the card user can know the PIN notified of the update. Business transactions can be carried out even more securely.
- an ID number such as a credit card and a valid PIN are transmitted only for a predetermined number of commercial transactions, the commercial transaction is permitted only when the PIN coincides with a predetermined PIN, and the next Since the updated security code valid for subsequent commercial transactions was transmitted to the cardholder's terminal or mobile terminal via a public line, etc., the security code was not leaked to a third party and secure business transactions were conducted. be able to.
- the information terminal device when the information terminal device transmits and receives various types of information, the information terminal device performs cryptographic communication and uses the personal identification number or a code obtained by encoding the personal identification number as a key for symbol communication. It can carry out extremely high-reliability electronic commerce.
- a recording means for recording the number of times the medium has been used is provided on a non-cash medium such as a credit card or a cash card that can be used for business transactions, and the authenticity of the medium is determined based on the number of uses. Therefore, it is possible to prevent transactions with counterfeit cards by making use of the characteristics of the ever-changing number of times of use, and to conduct business transactions safely.
- a recording means for recording the number of times of use, cumulatively and non-subtractably, is provided on a medium other than cash that can be traded, and the rewriting operation is performed by subtracting the number of uses to judge the authenticity of the medium.
Landscapes
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Credit Cards Or The Like (AREA)
Abstract
L"invention porte sur un système sécurisé de commerce électronique, selon lequel un support tel qu"une carte de crédit ou une carte de paiement, permettant des transactions commerciales autres que des paiements comptant, est marquée d"un motif spécifique. Pour juger de l"authenticité du support on compare un numéro d"identification à des informations figurant dans la mémoire du support; il est donc impossible d"utiliser frauduleusement la carte en cas de vol, même si elle est contrefaite.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000-348340 | 2000-11-15 | ||
JP2000348340A JP2004005001A (ja) | 2000-11-15 | 2000-11-15 | 電子商取引の防犯システム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002041207A1 true WO2002041207A1 (fr) | 2002-05-23 |
Family
ID=18821943
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2001/009023 WO2002041207A1 (fr) | 2000-11-15 | 2001-10-15 | Systeme securise de commerce electronique |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2004005001A (fr) |
WO (1) | WO2002041207A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11275869B2 (en) * | 2017-12-29 | 2022-03-15 | Feitian Technologies Co., Ltd. | Credit card and operating method therefor |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1908028A1 (fr) * | 2005-07-27 | 2008-04-09 | Ingenia Technology Limited | Verification d'authenticite |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS58117538U (ja) * | 1982-02-04 | 1983-08-11 | オムロン株式会社 | 取引処理装置における使用者確認装置 |
JPS60196873A (ja) * | 1984-03-19 | 1985-10-05 | Omron Tateisi Electronics Co | Icカ−ドの不正使用防止装置 |
JPS6129595A (ja) * | 1984-07-20 | 1986-02-10 | 株式会社日立製作所 | メモリ・カ−ドによる身分証明方式 |
US4804825A (en) * | 1986-06-17 | 1989-02-14 | Casio Computer Co., Ltd. | I C card system |
JPH10105614A (ja) * | 1996-10-02 | 1998-04-24 | Dainippon Printing Co Ltd | クレジットカードを利用したオンラインショッピングシステム |
JPH11120397A (ja) * | 1997-10-21 | 1999-04-30 | Ntt Power And Building Facilities Inc | セキュリティシステムおよびその制御方法 |
JPH11195072A (ja) * | 1997-10-17 | 1999-07-21 | Dainippon Printing Co Ltd | 決済システム及び決済用暗唱情報が記録された媒体 |
JPH11250012A (ja) * | 1998-03-04 | 1999-09-17 | Hitachi Ltd | 情報システムにおける不正利用防止方法 |
JP2000057305A (ja) * | 1998-08-07 | 2000-02-25 | Dainippon Printing Co Ltd | Icカード及びパスワード変更方法 |
-
2000
- 2000-11-15 JP JP2000348340A patent/JP2004005001A/ja active Pending
-
2001
- 2001-10-15 WO PCT/JP2001/009023 patent/WO2002041207A1/fr active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS58117538U (ja) * | 1982-02-04 | 1983-08-11 | オムロン株式会社 | 取引処理装置における使用者確認装置 |
JPS60196873A (ja) * | 1984-03-19 | 1985-10-05 | Omron Tateisi Electronics Co | Icカ−ドの不正使用防止装置 |
JPS6129595A (ja) * | 1984-07-20 | 1986-02-10 | 株式会社日立製作所 | メモリ・カ−ドによる身分証明方式 |
US4804825A (en) * | 1986-06-17 | 1989-02-14 | Casio Computer Co., Ltd. | I C card system |
JPH10105614A (ja) * | 1996-10-02 | 1998-04-24 | Dainippon Printing Co Ltd | クレジットカードを利用したオンラインショッピングシステム |
JPH11195072A (ja) * | 1997-10-17 | 1999-07-21 | Dainippon Printing Co Ltd | 決済システム及び決済用暗唱情報が記録された媒体 |
JPH11120397A (ja) * | 1997-10-21 | 1999-04-30 | Ntt Power And Building Facilities Inc | セキュリティシステムおよびその制御方法 |
JPH11250012A (ja) * | 1998-03-04 | 1999-09-17 | Hitachi Ltd | 情報システムにおける不正利用防止方法 |
JP2000057305A (ja) * | 1998-08-07 | 2000-02-25 | Dainippon Printing Co Ltd | Icカード及びパスワード変更方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11275869B2 (en) * | 2017-12-29 | 2022-03-15 | Feitian Technologies Co., Ltd. | Credit card and operating method therefor |
Also Published As
Publication number | Publication date |
---|---|
JP2004005001A (ja) | 2004-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6360101B2 (ja) | Ic識別カードを使用した支払いシステムおよび方法 | |
US8315948B2 (en) | Method and device for generating a single-use financial account number | |
US7844550B2 (en) | Method and device for generating a single-use financial account number | |
US6983882B2 (en) | Personal biometric authentication and authorization device | |
US20010034717A1 (en) | Fraud resistant credit card using encryption, encrypted cards on computing devices | |
US20070198410A1 (en) | Credit fraud prevention systems and methods | |
US20070241180A1 (en) | Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor | |
US20010032192A1 (en) | Method and apparatus for improved financial instrument processing | |
US20030191945A1 (en) | System and method for secure credit and debit card transactions | |
CN101512957A (zh) | 使用网络的交易认证 | |
KR20010025234A (ko) | 지문정보를 이용한 카드거래 인증방법 및 그 시스템 | |
US20140156535A1 (en) | System and method for requesting and processing pin data using a digit subset for subsequent pin authentication | |
CN101048794A (zh) | 使用动态授权码授权交易的方法和系统 | |
US20050091152A1 (en) | Method and System for Approving Card Transactions | |
JP2005521961A (ja) | クレジットカードおよびデビットカードの安全な取引のためのシステムと方法 | |
US20020095580A1 (en) | Secure transactions using cryptographic processes | |
JP2007513395A (ja) | クレジットカード詐欺を防止するためのセキュリティー方法及び装置 | |
US20020073315A1 (en) | Placing a cryptogram on the magnetic stripe of a personal transaction card | |
WO2002041207A1 (fr) | Systeme securise de commerce electronique | |
JP3874491B2 (ja) | プリペイドicカードシステムおよびプリペイドicカード | |
JP2002190005A (ja) | 多機能icカード | |
KR20030021054A (ko) | 지문정보를 이용한 금융거래방법 및 그 시스템 | |
JP2007065727A (ja) | Icカード利用システム | |
Agrawal et al. | Debit/ATM card security based on chaos function and QR code | |
KR20050019399A (ko) | 음성정보를 이용한 금융거래방법 및 그 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): IN JP KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
122 | Ep: pct application non-entry in european phase |