[go: up one dir, main page]

WO2002041207A1 - Systeme securise de commerce electronique - Google Patents

Systeme securise de commerce electronique Download PDF

Info

Publication number
WO2002041207A1
WO2002041207A1 PCT/JP2001/009023 JP0109023W WO0241207A1 WO 2002041207 A1 WO2002041207 A1 WO 2002041207A1 JP 0109023 W JP0109023 W JP 0109023W WO 0241207 A1 WO0241207 A1 WO 0241207A1
Authority
WO
WIPO (PCT)
Prior art keywords
medium
card
information
cash
identification number
Prior art date
Application number
PCT/JP2001/009023
Other languages
English (en)
Japanese (ja)
Inventor
Toru Miura
Original Assignee
Toru Miura
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toru Miura filed Critical Toru Miura
Publication of WO2002041207A1 publication Critical patent/WO2002041207A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/347Passive cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/127Card verification in which both online and offline card verification can take place

Definitions

  • the present invention relates to a security method for commerce, particularly in personal commerce using a credit card, a cache card, a computer network, or the like, and forgery of a medium such as a credit card in a computer network. It relates to a method for minimizing the damage caused by theft of ID numbers.
  • the credit card cash card displays information such as the number and name of an individual ID by embossing, and the magnetic stripe stores the same information.
  • the credit card cash card checks the signature on the back of the credit card against the signature on the product purchase slip, or in the case of a cash card, use your personal identification number. Is input to the information terminal and verified by the host computer.
  • An object of the present invention is to solve such a conventional problem, and it is impossible to perform an illegal act even if an ID number or a password is grasped.
  • An object of the present invention is to provide an e-commerce security system that cannot be used. Disclosure of the invention
  • a medium unique to the medium is attached to a medium other than cash, such as a credit card or a cash card, which can be traded, and a medium unique identification number based on the pattern is provided. And the information stored in the magnetic data of the medium is compared to determine the authenticity of the medium.
  • the invention according to claim 2 of the electronic commerce security system according to the present invention is a medium that can be used for commercial transactions other than cash, such as a credit card and a cash card, and that reads a unique pattern of the medium. Judgment of the authenticity of the card by comparing the information terminal device provided with the reading means and the recording information reading means for reading the recording information such as the magnetic data of the medium with the medium unique identification information and the recording information transferred from the information terminal device Determining means for performing the determination.
  • the invention according to claim 3 of the electronic commerce security system according to the present invention is the invention according to claim 2, wherein the information terminal device is provided with a data input unit capable of inputting a personal identification number, and the determination unit is unique to the medium. Identification information, records It is characterized in that the authenticity of the password and the identity verification are determined based on the information and the password, and an updated password valid for the next and subsequent transactions is transmitted to the information terminal device when the transaction is completed.
  • the invention according to claim 4 of the electronic commerce security system according to the present invention is the invention according to claim 3, wherein the password is transmitted from the determination means to the card user every time one commercial transaction is completed.
  • the invention described in claim 5 of the electronic commerce crime prevention system according to the present invention is characterized in that the updated personal identification number valid for the next and subsequent commercial transactions is public. It is characterized in that the card user is notified of the update by transmitting it to the portable terminal possessed by the card holder via a line.
  • the invention according to claim 6 of the electronic commerce security system according to the present invention relates to a system for performing settlement using a medium other than cash, such as a credit card or a cash card, capable of conducting a commercial transaction, which is related to the medium via a network or the like.
  • Judgment means for receiving data such as an ID number and a password valid only for a predetermined number of commercial transactions to determine whether or not the commercial transaction has been completed, and performing the desired settlement processing when the commercial transaction has been completed, and
  • a means is provided for notifying the card user of the update of the personal identification number by transmitting the updated personal identification number valid for commercial transactions to the cardholder's terminal or mobile terminal via a public line or the like.
  • the invention according to claim 7 of the electronic commerce security system according to the present invention is characterized in that, in the invention according to any one of claims 3 to 6, the information terminal device performs encrypted communication when transmitting and receiving various information.
  • the personal identification number or an encoded number is used as a key for encrypted communication.
  • the invention according to claim 8 of the electronic commerce security system according to the present invention is a non-cash-enabled medium such as a credit card or a cash card. Recording means for recording the number of uses of the medium, and the authenticity of the medium is determined based on the number of uses.
  • the invention according to claim 9 of the electronic commerce security system according to the present invention is a recording system for recording the number of times of use of the medium in a non-cash medium such as a credit card, a cash card, etc. in a cumulative and non-subtractable manner. Means is provided, and the authenticity of the medium is determined by performing a rewriting operation by subtracting the number of uses.
  • FIG. 1 is a diagram showing an example of a card used in a security system for electronic commerce according to the present invention.
  • FIG. 2 is a diagram showing a schematic configuration of an electronic commerce security system according to the present invention.
  • FIG. 3 is a diagram showing an example of a data table included in the determination means in the electronic commerce security system according to the present invention.
  • FIG. 4 is a diagram showing one embodiment of the configuration of the electronic commerce security system according to the present invention.
  • FIG. 5 is a flowchart showing the operation of the electronic commerce security system according to the present invention.
  • FIG. 6 is a diagram showing another embodiment of the configuration of the electronic commerce security system according to the present invention.
  • FIG. 7 is a diagram showing another embodiment of the configuration of the electronic commerce security system according to the present invention.
  • fraudulent acts using cards and the like include physical acts such as counterfeiting cards, and non-physical acts such as illegally acquiring (frauding) ID numbers and PINs.
  • a unique identification number is determined in advance.
  • a magnetic stripe is provided on the back surface of the card 1, and the magnetic stripe stores stored information such as the ID number of the card.
  • the card 1 is inserted from the entrance 2a to the information terminal device 2 (unique identification information reading means and recorded information reading means), and the information terminal device 2 Reads the pattern of the card and transmits it to the host computer 4 via the network 3 such as a telephone line or a dedicated line together with the magnetic data information stored in the magnetic stripe of the force.
  • the unique identification number based on the card pattern is compared with the magnetic data information to judge whether the card is a counterfeit card by a computer or other judging means to determine the success or failure of the commercial transaction.
  • FIG. 3 is a diagram showing a table of data collation data stored in the host computer 4. As shown in FIG. 3, one-to-one correspondence with recorded information (ID numbers, etc.) such as magnetic data is shown. The card unique identification number corresponding to the ID is stored, the card unique identification number is determined from the card pattern transferred from the information terminal device, and when the unique identification number and the magnetic data information such as the ID number match, Only allow commercial transactions.
  • ID numbers such as magnetic data
  • the card itself can be provided with information (pattern) corresponding to a unique number and the authenticity of the card can be determined together with the magnetic data information stored in the magnetic stripe. Fraudulent acts such as unauthorized acquisition of information and transfer of various information to counterfeit information be able to.
  • the data pattern of the force is transferred from the information terminal device 2 to the host computer 4 and the unique identification number of the card is determined by the host computer 4. 2 has a pattern reading device and a unique identification number judgment function, transfers the unique identification number and the information stored in the magnetic disk to the host computer 4, and transfers the information to the host computer 4. It may be configured to determine the authenticity of the password.
  • FIG. 4 is a diagram showing the configuration of an electronic commerce security system according to the present invention.
  • 2 is an information terminal device for reading patterns and magnetic data which are unique identification numbers of force
  • 5 is for centrally managing an identity verification function.
  • 6 is a host computer of a financial company (card issuing company)
  • 7 is a display device that is attached to an information terminal device and displays information
  • 8 is a keyboard and other devices. It is a data input device (data input means).
  • the security system for e-commerce is described below with reference to Figs.
  • the card user obtains a password that can be used only once from a card company or the like (step S1), and sends a password 1 to the information terminal device 2 when using the card. It is inserted (step S2), and the password is input from the data input device 8 (step S3). Then, from the information terminal device 2, the unique identification information (pattern) of the card 1, the recording information such as the ID number stored in the magnetic data of the card 1, and the password A are transmitted via the network. Transferred to the host computer overnight 5 and the host computer In step 5, referring to the table as shown in FIG. 3, it is determined whether or not the force unique identification number matches the magnetic data storage information (step S4).
  • step S4 If it is determined that the password is genuine (YES in step S4), it is determined whether or not the entered passwords match (step 5), and the commercial transaction is permitted only when the passwords match (step S6). ) Then, data B such as the purchase amount information and payment method for performing settlement by force are transferred from the information terminal device 2 to the host computer 6 of the financial company via the host computer 5 (step S 7), a commercial transaction is executed.
  • a new password (updated password) valid at the next business transaction is returned to the information terminal device 2 via the network from the update notification means of the host computer 5 that centrally controls the personal identification function (step S8). ), The password is displayed on the display device 7 (step S9).
  • the card user memorizes or keeps a record of the updated personal identification number and uses it for the next commercial transaction.
  • the PIN stored in the host convenience store 5 is also rewritten to prepare for the next commercial transaction.
  • the card unique identification information does not match the magnetic data, or if the PIN does not match (NO in S4 or S5), the card has been forged or the identity of the card user cannot be verified. Judgment is made, the commercial transaction is rejected, and a message to that effect is displayed on the display device 7 attached to the information terminal device 2 (step S10).
  • the host computer which centrally manages the identity verification function from the host company 6 of the financial company.
  • the night is transferred on evening 5, and the available flags (see Fig. 3) are changed by the judgment means in the host computer overnight 5.
  • the personal identification number is updated for each commercial transaction. It may be changed every time.
  • a part for storing the security code to be updated on the card is provided, and the information terminal device is provided with a function to update the security code.
  • the updated security code stored in the password and data input are entered. The identification of the force holder may be performed by comparing the password with the password input from the device.
  • the updated security code and the fixed security code are used to store the updated security code on the card.
  • the fixed security code is entered by the user to confirm the identity when using the card.
  • the security can be further improved by using a double password in such a manner.
  • the authenticity of the card itself is determined by the unique identification information based on the force pattern and the magnetic storage information, and is effective for one or a predetermined number of commercial transactions.
  • the host computer which centrally controls the personal identification function, notifies the card holder of a personal identification number, and performs personal identification by comparing the personal identification number entered during commercial transactions with the stored personal identification number. Secure electronic commerce can be realized.
  • the communication between the information terminal device 2 and the host computers 4 and 5 and the communication between the host computers 4 and 5 and the host computer 6 of the financial company are to improve security.
  • Perform encrypted communication In this case, a common key cryptosystem is used, and the personal identification number of the card is used as the common key.
  • the common key cryptosystem usually, information intended only for encrypted communication is used as a common key.
  • the password is changed every time a commercial transaction is made. Keys are changed frequently, and cryptographic communication is extremely secure, enabling more reliable e-commerce. If the password cannot be used directly as the common key, for example, when the data length of the password and the common key are different, What is encoded according to a predetermined rule may be used as a common key.
  • variable password method is used for electronic settlement
  • it is widely used for cryptographic communication for transmitting and receiving important data after inputting the variable password, such as data transmission with personal authentication. Applicable.
  • FIG. 6 is a diagram showing another configuration of the electronic commerce security system according to the present invention.
  • the updated personal identification number is displayed on the display device 7 installed in the store or the like, so that the personal identification number can be visually recognized by anyone other than the force holder.
  • the security was not perfect, as shown in Fig. 6, the updated PIN was transferred to the mobile terminal 9 owned by the force holder on a network such as a public network By transmitting the data as voice or electronic data via 0, the security can be further improved. Note that only the method of transmitting the updated personal identification number is different, and the other processes are the same as those in the above-described embodiment, and thus description thereof will be omitted.
  • FIG. 7 is a diagram showing another configuration of the electronic commerce security system according to the present invention.
  • personal commerce has often been conducted via the Internet, especially due to the spread of convenience stores and the establishment of the Internet infrastructure. This will be described with reference to FIG.
  • 5 is a host computer for centrally managing the identity verification function
  • 6 is a host computer of a financial company (card issuing company)
  • 10 is a network such as a public line or the Internet
  • 11 is a product or service. etc
  • Reference numerals 1 and 2 denote terminal devices of purchasers of goods and services.
  • the credit card is required to settle the personal information such as his / her address and the price to the service provider.
  • the personal identification number used only is transferred to the terminal device of the service provider via the network 10.
  • the service provider transfers the commercial transaction data to the host computer 5 using the terminal device 11 or the information terminal device 2 (not shown), and the host computer 5 determines whether or not the passwords match by the determination means. And decide whether or not to establish a commercial transaction.
  • the host computer 5 performs a predetermined settlement process, and further updates the password used for the next and subsequent business transactions via the public line or the like to the terminal device 12 or the like of the purchaser. Alternatively, it is transmitted to the portable terminal 9 owned by the purchaser. As a result, even when conducting business transactions without physically using the card itself, the PIN for card use is updated for each prescribed transaction, and the updated PIN is only available to the cardholder. Because it can be grasped, it is possible to conduct secure transactions.
  • the present invention is not limited to commercial transactions using cards, but also to commercial transactions using no cards, for example, electronic transactions during a computer, etc., in which an ID number, a personal identification number, etc. are illegally used by others. It also works effectively to prevent illegal activities.
  • data that is magnetically recorded on a cash card or credit card is rewritable and may be forged.
  • card-specific information is stored in a non-rewritable memory (ROM) in advance, but information that needs to be changed when using the card is rewritable. May be forged because it is stored in a functional memory (RAM).
  • RAM functional memory
  • a recording means such as a non-rewritable memory is installed in the C card in advance, and the number of times of use of the IC card is cumulatively recorded therein. The number of uses is added to the IC card according to the use.
  • the usage count read by the IC card reader is input to the host computer via the network, and if it does not match the usage count recorded on the host computer, it is determined to be a counterfeit card and matches. If so, the card is judged to be a true card. Since the number of times of use changes every moment with the use of the card, even if a fake card is created by reading the data from an authentic IC card Even if the IC card was subsequently used, the data on the number of times of use was rewritten and the information on the authentic IC card was changed, so the card was used afterwards. It can be determined that the missing IC code is counterfeit.
  • non-rewritable memory there are various types of non-rewritable memory that can be incorporated into the IC at the manufacturing stage. For example, a method of cumulative writing to the write area of a memory that can be written only once Alternatively, an optical system such as a read-up-once CDR may be used.
  • the number of uses in the IC card may be recorded not only for each use but also for every predetermined number of uses, for example, every 10 times.
  • the first aspect of the present invention it is not possible to create two or more identical cards, thereby preventing forgery of a card or the like, and preventing the storage data stored in the card from being physically forged. Since the authenticity of the password is determined by collating with the unique identification number of the card, it is possible to prevent the transaction by the counterfeit password and to perform the business transaction safely.
  • the authenticity of the card and the identity verification can be confirmed by using the personal identification number and the unique identification information of the password, which are changed for each commercial transaction, and the memory information stored in the card. It is possible to conduct business transactions even more safely.
  • variable update PIN is transmitted to the mobile terminal or the like of the card holder via the public line, only the card user can know the PIN notified of the update. Business transactions can be carried out even more securely.
  • an ID number such as a credit card and a valid PIN are transmitted only for a predetermined number of commercial transactions, the commercial transaction is permitted only when the PIN coincides with a predetermined PIN, and the next Since the updated security code valid for subsequent commercial transactions was transmitted to the cardholder's terminal or mobile terminal via a public line, etc., the security code was not leaked to a third party and secure business transactions were conducted. be able to.
  • the information terminal device when the information terminal device transmits and receives various types of information, the information terminal device performs cryptographic communication and uses the personal identification number or a code obtained by encoding the personal identification number as a key for symbol communication. It can carry out extremely high-reliability electronic commerce.
  • a recording means for recording the number of times the medium has been used is provided on a non-cash medium such as a credit card or a cash card that can be used for business transactions, and the authenticity of the medium is determined based on the number of uses. Therefore, it is possible to prevent transactions with counterfeit cards by making use of the characteristics of the ever-changing number of times of use, and to conduct business transactions safely.
  • a recording means for recording the number of times of use, cumulatively and non-subtractably, is provided on a medium other than cash that can be traded, and the rewriting operation is performed by subtracting the number of uses to judge the authenticity of the medium.

Landscapes

  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

L"invention porte sur un système sécurisé de commerce électronique, selon lequel un support tel qu"une carte de crédit ou une carte de paiement, permettant des transactions commerciales autres que des paiements comptant, est marquée d"un motif spécifique. Pour juger de l"authenticité du support on compare un numéro d"identification à des informations figurant dans la mémoire du support; il est donc impossible d"utiliser frauduleusement la carte en cas de vol, même si elle est contrefaite.
PCT/JP2001/009023 2000-11-15 2001-10-15 Systeme securise de commerce electronique WO2002041207A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2000-348340 2000-11-15
JP2000348340A JP2004005001A (ja) 2000-11-15 2000-11-15 電子商取引の防犯システム

Publications (1)

Publication Number Publication Date
WO2002041207A1 true WO2002041207A1 (fr) 2002-05-23

Family

ID=18821943

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/009023 WO2002041207A1 (fr) 2000-11-15 2001-10-15 Systeme securise de commerce electronique

Country Status (2)

Country Link
JP (1) JP2004005001A (fr)
WO (1) WO2002041207A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11275869B2 (en) * 2017-12-29 2022-03-15 Feitian Technologies Co., Ltd. Credit card and operating method therefor

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1908028A1 (fr) * 2005-07-27 2008-04-09 Ingenia Technology Limited Verification d'authenticite

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58117538U (ja) * 1982-02-04 1983-08-11 オムロン株式会社 取引処理装置における使用者確認装置
JPS60196873A (ja) * 1984-03-19 1985-10-05 Omron Tateisi Electronics Co Icカ−ドの不正使用防止装置
JPS6129595A (ja) * 1984-07-20 1986-02-10 株式会社日立製作所 メモリ・カ−ドによる身分証明方式
US4804825A (en) * 1986-06-17 1989-02-14 Casio Computer Co., Ltd. I C card system
JPH10105614A (ja) * 1996-10-02 1998-04-24 Dainippon Printing Co Ltd クレジットカードを利用したオンラインショッピングシステム
JPH11120397A (ja) * 1997-10-21 1999-04-30 Ntt Power And Building Facilities Inc セキュリティシステムおよびその制御方法
JPH11195072A (ja) * 1997-10-17 1999-07-21 Dainippon Printing Co Ltd 決済システム及び決済用暗唱情報が記録された媒体
JPH11250012A (ja) * 1998-03-04 1999-09-17 Hitachi Ltd 情報システムにおける不正利用防止方法
JP2000057305A (ja) * 1998-08-07 2000-02-25 Dainippon Printing Co Ltd Icカード及びパスワード変更方法

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58117538U (ja) * 1982-02-04 1983-08-11 オムロン株式会社 取引処理装置における使用者確認装置
JPS60196873A (ja) * 1984-03-19 1985-10-05 Omron Tateisi Electronics Co Icカ−ドの不正使用防止装置
JPS6129595A (ja) * 1984-07-20 1986-02-10 株式会社日立製作所 メモリ・カ−ドによる身分証明方式
US4804825A (en) * 1986-06-17 1989-02-14 Casio Computer Co., Ltd. I C card system
JPH10105614A (ja) * 1996-10-02 1998-04-24 Dainippon Printing Co Ltd クレジットカードを利用したオンラインショッピングシステム
JPH11195072A (ja) * 1997-10-17 1999-07-21 Dainippon Printing Co Ltd 決済システム及び決済用暗唱情報が記録された媒体
JPH11120397A (ja) * 1997-10-21 1999-04-30 Ntt Power And Building Facilities Inc セキュリティシステムおよびその制御方法
JPH11250012A (ja) * 1998-03-04 1999-09-17 Hitachi Ltd 情報システムにおける不正利用防止方法
JP2000057305A (ja) * 1998-08-07 2000-02-25 Dainippon Printing Co Ltd Icカード及びパスワード変更方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11275869B2 (en) * 2017-12-29 2022-03-15 Feitian Technologies Co., Ltd. Credit card and operating method therefor

Also Published As

Publication number Publication date
JP2004005001A (ja) 2004-01-08

Similar Documents

Publication Publication Date Title
JP6360101B2 (ja) Ic識別カードを使用した支払いシステムおよび方法
US8315948B2 (en) Method and device for generating a single-use financial account number
US7844550B2 (en) Method and device for generating a single-use financial account number
US6983882B2 (en) Personal biometric authentication and authorization device
US20010034717A1 (en) Fraud resistant credit card using encryption, encrypted cards on computing devices
US20070198410A1 (en) Credit fraud prevention systems and methods
US20070241180A1 (en) Method of settling signatureless payment of bank card sales slip in mobile terminal, and system therefor
US20010032192A1 (en) Method and apparatus for improved financial instrument processing
US20030191945A1 (en) System and method for secure credit and debit card transactions
CN101512957A (zh) 使用网络的交易认证
KR20010025234A (ko) 지문정보를 이용한 카드거래 인증방법 및 그 시스템
US20140156535A1 (en) System and method for requesting and processing pin data using a digit subset for subsequent pin authentication
CN101048794A (zh) 使用动态授权码授权交易的方法和系统
US20050091152A1 (en) Method and System for Approving Card Transactions
JP2005521961A (ja) クレジットカードおよびデビットカードの安全な取引のためのシステムと方法
US20020095580A1 (en) Secure transactions using cryptographic processes
JP2007513395A (ja) クレジットカード詐欺を防止するためのセキュリティー方法及び装置
US20020073315A1 (en) Placing a cryptogram on the magnetic stripe of a personal transaction card
WO2002041207A1 (fr) Systeme securise de commerce electronique
JP3874491B2 (ja) プリペイドicカードシステムおよびプリペイドicカード
JP2002190005A (ja) 多機能icカード
KR20030021054A (ko) 지문정보를 이용한 금융거래방법 및 그 시스템
JP2007065727A (ja) Icカード利用システム
Agrawal et al. Debit/ATM card security based on chaos function and QR code
KR20050019399A (ko) 음성정보를 이용한 금융거래방법 및 그 시스템

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): IN JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

122 Ep: pct application non-entry in european phase