Background technology
Credit card extensively uses in the whole world, makes consumer behavior and service all convenient more, and allowing the user do shopping does not need to carry cash.
Yet the credit card deathwatch case of deceiving emerges in an endless stream, and develops into the subject matter that financial institution faced of credit cardholder and hair fastener gradually.If credit card is lost, the burglar only need forge holder's signature, and since cardholder signature just at the back side of credit card, therefore quite easily by counterfeit,, cause the consumption bill of holder's palpus burden without its permission so the burglar can use credit card easily, and in the part case, be the consumption responsibility of shouldering stolen credit card by financial institution, yet these two kinds of examples are all started because of in the careless mistake of holder or hair fastener financial institution.
With reference to Figure 1A, Figure 1A is the front schematic view of general credit card in the prior art.
Figure 1A as shown, the front ofgeneral credit card 100 comprises thetrade mark 110 of the financial institution that sends credit card 100,130 reliefs ofholder name 120 and account number are incredit card 100 really good lower portion.
With reference to Figure 1B, Figure 1B is the schematic rear view of general credit card in the prior art.
The back side ofgeneral credit card 100 comprises amagnetic stripe 140, and financial institution just was stored in account information wherein before acredit card 100 is given the client in advance; Another weakness ofgeneral credit card 100 is that the burglar can read or duplicate the data that are stored in themagnetic stripe 140.
Comprise also that at the back side ofgeneral credit card 100signature strip 150 allows theholder sign signature 160, as mentioned above,general credit card 100 provides the burglar example of acardholder signature 160, allows the burglar can practise the imitation signature, and sign the spitting image of after just can obscure the cashier, make it accept this card.
With reference to figure 1C and Fig. 1 D, Fig. 1 C is a calcspar of confirming credit card in the prior art with general networking, and Fig. 1 D is the general process flow diagram that uses credit card in the prior art.
General method 180 and thesystem 170 that uses credit card, comprise that the client swipes the card credit card to the cashier in thestep 181 with machine for punching thecard 171, machine for punching thecard 171 reads the account data that is stored in the safety card magnetic stripe, and instep 182, utilizetelephone wire 172 account data to be sent to aCore server 173 with an accounts database,step 183 is described for another example for thisCore server 173, whether in this account have enough amount can offset the expense amount of money, and send one and confirm to be notified to machine for punching thecard 171 instep 184 if confirming.
Instep 185, machine for punching thecard 171 is printed off a bill of signing, and asstep 186 user sign signing on the bill, then the cashier will sign that client on the bill signs and the signature of back of credit cards compares in thestep 187.
Another shortcoming of general credit card is that data are stored in Core server, and this just as having opened a sect, can crack the hacker to enter and steal data in the server for the hacker.
Summary of the invention
The present invention proposes a kind of safety card and using method thereof that has biological attribute data, and to solve the holder very with after the credit card loss, personal information is by problems such as other people steal.
For reaching above-mentioned purpose, the present invention proposes a kind of safety card and using method thereof that has biological attribute data.
Biological attribute data comprises fingerprint, iris or eyes, palmmprint, face mask, DNA data or above combination for instance.
Before sending safety card, ard issuers obtains the template of user's biological information earlier, and with information storage in the internal memory of safety card, when card safe in utilization, the biological attribute data that is stored in the card will compare with the biological attribute data that the user is provided, for example, if biological attribute data is the fingerprint of right hand forefinger, then the user is placed on right hand forefinger on the verifier, verifier can carry out the data contrast, utilizes the method, even safety card is lost or is stolen, because other people biological attribute data and holder's biological attribute data do not conform to, so nobody can use this safety card.
In an embodiment of the present invention, safety card is a credit card, and the holder gives the cashier with safety card and operates transaction when concluding the business, and then scans the feature of the privileged site of tool uniqueness on holder's health, and its people's biological attribute data is provided; The cashier will utilize scanning, swipe the card or mode such as plug-in card is put into a calculating punch or a verifier again in the safety card, this device read biological attribute data or scanning holder's biological attribute data from safety card after is compared two data, if the data that are stored in the safety card conform to the data that the holder provides, then confirm holder's identity.
In the another embodiment of the present invention, safety card is an identity identification card, the holder inserts identification card in the verifier and biological attribute data is provided, fingerprint for example is provided, allow verifier contrast be stored in the biological attribute data that biological attribute data in the identification card and holder are provided, if two identical then verifiers of data are confirmed this holder's identity.
Compared with prior art, the present invention has the following advantages:
The present invention proposes a kind of safety card and using method thereof that has biological attribute data, is not have data through network delivery, and data validation is to be carried out at local side by verifier, can reduce identity or cardholder data is stolen.
Another advantage of the present invention is to have only holder oneself to know will provide for which kind of biological attribute data, and since the biological characteristic that can import more and more after the variation, safety coefficient also increases thereupon, allows the burglar not know even which kind of biological attribute data this uses.
Description of drawings
Figure 1A is the front schematic view of general credit card in the prior art;
Figure 1B is the schematic rear view of general credit card in the prior art;
1C figure is a calcspar of using general networking checking credit card in the prior art;
1D figure is the general process flow diagram that uses credit card in the prior art;
Fig. 2 A is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 B~2D is the synoptic diagram of safety card back side embodiment among the present invention;
Fig. 2 E~2F is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 G~2H is the process flow diagram of a kind of implementation method of card safe in utilization among the present invention;
Fig. 2 I~2J is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 2 K is the synoptic diagram of safety card front embodiment among the present invention;
Fig. 3 is the process flow diagram of a kind of implementation method of credit card safe in utilization among the present invention.
The primary clustering symbol description is as follows:
100 credits card, 110 trade marks
120 holder name, 130 account numbers
140 magnetic stripes, 150 signature strip
160 signatures, 170 network validation credits card
171 machine for punching the card, 172 telephone wires
173 Core servers, 200 safety cards
210 trade marks, 220 holder name
230 account numbers, 240 internal memories
250 magnetic stripes, 260 signature zones
270 signatures, 290,291 transparent input areas
Embodiment
With reference to figure 2A, Fig. 2 A is according to the synoptic diagram in the front of safety card shown in the embodiment of the invention.
Shown in Fig. 2 A,safety card 200 of the present invention comprises atrade mark 210 or the title of safety card publisher, the trade mark diagram can be the title or the Business Name of financial institution for instance, thefront 200 of safety card also comprisesholder name 220 andaccount number 230 or user's numbering,internal memory 240 is attached or is embedded in thesafety card 200, when the user wantscard 200 safe in utilization, the user provides biological information (biometric information) specific sample or example, owing to have same biological characteristic (biometrics) without any two people, therefore biological information can be used for the single user of identification, biological information is stored in theinternal memory 240 ofsafety card 200, in the time of card safe inutilization 200, the holder provides or imports their biological attribute data, this input meeting compares with the biological attribute data that is stored in theinternal memory 240, if both are identical, then can confirm holder's identity.
With reference to figure 2B, Fig. 2 B is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
As Fig. 2 B, the back side ofsafety card 200 comprises 250 and signature zones of a magnetic stripe (magnetic strip) (signature area) 260, information is stored inmagnetic stripe 250, when safety card in use, this information can be read, andsignature zone 260 allows the user to sign theirsignature 270.
Holder's information comprises account number information, account number, Personal Identification Number (personalidentification number), employee number, safe class, rank (rank), financial institution's identification, card number, hair fastener identified in units, Business Name or these combination.
With reference to figure 2C, Fig. 2 C is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
In the embodiment in another zone of not signing, for the signature of avoiding the holder is seen to increase security, in the present embodiment, when card safe in utilization, holder's Autograph Session compares with the signed data that is stored in the safety card internal memory, and this program relies on the cashier to compare reliable that signature comes.
In the embodiment in another zone of not signing, can be used for when not needing signature just can card safe in utilization the time, therefore biological characteristic is with more complicated and more impossible duplicating, and compares the biological information that biological attribute data and user provide in the safety card internal memory more perfect security can be provided.
With reference to figure 2D, Fig. 2 D is the synoptic diagram according to the back side of safety card shown in the embodiment of the invention.
In 2D figure illustrated embodiment, magnetic stripe does not all exist with the signature zone, in this embodiment, usually the information meeting and the biological attribute data that are placed on magnetic stripe are placed in the internal memory of safety card together, because if biological attribute data can't be confirmed, this information can't be read so, and this measure further increases the security of information.Otherwise the data in the magnetic stripe of leaving in does not need holder's input just can pass through machine for punching the card (card swipe machine) to read.
With reference to figure 2E, Fig. 2 E is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
In another embodiment of the present invention, the front ofsafety card 200 has comprisedtrade mark 210,holder name 220 and has deposited theinternal memory 240 of holder's biological attribute data thatsafety card 200 does not show holder's account number and identification number in this embodiment.
With reference to figure 2F, Fig. 2 F is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
Among the embodiment shown in Fig. 2 F, holder name and account number are not presented on thesafety card 200, and this measure can further increase security, and nobody can learn whom this safety card belongs to except the holder.
With reference to figure 2G, Fig. 2 G is the process flow diagram of safety card using method in the embodiment of the invention.
Shown in Fig. 2 G, themethod 280 of card safe in utilization has comprised that inserting safety snaps into verifier instep 281, their biological characteristic input is providedstep 282 holder afterwards, at input ofstep 283 verifier comparison biological characteristic and the biological attribute data that leaves in the safety card, if data fit, to confirm holder's identity asstep 184 verifier, in case holder's identity is identified, described in step 285, account number information will be sent to the account and confirm center (account confirmationcenter), the account confirms the center will judge whether the enough amount of money is arranged among the account, and confirm message to verifier one of step 286 affirmation center passback, then step 287 holder will get a receipt.
In this embodiment, holder's account information can not be sent out before holder's identity identification is identified, this measure provides more generally in user's identity before signature is identified, and account information just is sent to the higher security of classic method of central server.
With reference to figure 2H, Fig. 2 H is the process flow diagram of the safety card using method of drawing according to the embodiment of the invention.
Shown in Fig. 2 H, themethod 280 of card safe in utilization has comprised that inserting safety snaps into verifier in thestep 281, the holder provides its personal biology characteristics input instep 282 afterwards, and instep 283, utilize verifier comparison biological characteristic to import and the biological attribute data that leaves in the safety card, if data fit, to confirm holder's identity asstep 184 verifier, seeing through network without any information in this embodiment transmits, proving program only carries out via verifier at local side, the method provides the security of holder's the best, because can be stored on network or server, so data of cardholder can't be stolen or usurp without any data of cardholder.
With reference to figure 2I, Fig. 2 I is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
Shown in 2I figure in the present embodiment,safety card 200 has comprisedtrade mark 210,internal memory 240 and atransparent input area 290 of importing their biological attribute data for the user, for instance, after safety card is inserted into verifier, the holder pushes finger attransparent input area 290, the verifier scanning fingerprint and with leave on thesafety card 200internal memory 240 stored finger print datas in and do contrast.
In this embodiment, because finger can directly not touch verifier, therefore fingerprint can not be transferred (transferred), for instance, if the surface of verifier is a glass and the user pushes their fingerprint scans on glass, stay residual fingerprint on glass possibly, though difficulty still still might be from the copy of obtaining fingerprint on glass for the burglar, yet in the present embodiment, the holder with their fingerprint by being pressed on thetransparent input area 290, this zone is between finger and test and levy in the middle of the machine surface, even it also is to staytransparent input area 290 but not on the verifier that fingerprint is transferred,transparent input area 290 can be removed the vestige of fingerprint easily by the cleaning of being erased.
With reference to figure 2J, Fig. 2 J is the synoptic diagram according to the front of safety card shown in the embodiment of the invention.
In the embodiments of the invention,safety card 200 comprises a plurality of transparent input areas, among the embodiment shown in Fig. 2 J,safety card 200 comprises the firsttransparent input area 290 and the secondtransparent input area 291, allow two biological attribute datas to import with the time, owing to need a plurality of independently biological characteristic inputs, therefore security also increases, in other embodiments of the invention, safety card comprises a plurality of transparent input areas, and safety card comprises four transparent input areas for instance, input between four fingers of palm are examined at the same time, or eight transparent input areas, then four of both hands fingers all can be at the same time between input.
With reference to figure 2K, Fig. 2 K is the positive legend of the safety card of drawing according to the embodiment of the invention.
In this embodiment, no any information on thesafety card 200,safety card 200 includes only aninternal memory 240 of depositing holder's biological attribute data, present embodiment provides the highest security, holder's signature, name, account number can not be presented on the card, if card is lost, the burglar can not learn whom this card belongs to yet, therefore this card is otiose to the burglar, above the trade mark of card issuer or company can not be indicated in yet in addition, therefore the no one can know how this uses this card, and therefore except the holder, how or where the no one knows will use this safety card.
In an embodiment of the present invention, Personal Identification Number or password leave in the internal memory of safety card, and the holder inputs identification number with biological attribute data or password is finished the affirmation flow process.
With reference to figure 3, Fig. 3 comes identification holder's process flow diagram for card safe in utilization in the embodiment of the invention.
Method 300 is deposited the holder bystep 310 biological information begins to safety card, then carry outstep 320, when card uses, to import biological attribute data by the holder, the biological attribute data ofstep 330 input will be opposed with the biological attribute data of depositing instep 310 and recently be confirmed the holder, if data fit holder's identification, holder's identity can be identified.
In the embodiment of a plurality of biological characteristic inputs of needs of the present invention, for instance, fingerprint and iris can be scanned and contrast with the biological attribute data that leaves in the card.
In another embodiment of the present invention, biological attribute data is input in regular turn, for instance, first is input right hand forefinger, import the left hand middle finger again, import hand thumb again, in this embodiment, the order of input has increased the complexity that will usurp safety card, and having only the holder to know will according to what kind of order input.
In an embodiment of the present invention, safety card can be in conjunction with credit card, identification card, driving license, gate inhibition's card, employee's card, passport, health care card, Automatic Teller Machine card, bank card, debit card (debit card), transportation card (transit card), public transportation card, resident identification card (national identification card) or member card.
As mentioned above, the invention provides the safety card of additional holder's biological attribute data, when card safe in utilization, the holder will provide the biological attribute data input, and this input meeting compares with the data that leave safety card in, if coincide, can confirm holder's identity, and so have only the holder safe in utilizationly to block, even card is stolen, the burglar also can't use, and what kind of biological characteristic input has only the holder to know in addition needs.
More than disclosed only be several specific embodiment of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.