TW201040870A - Financial transaction verification method - Google Patents

Financial transaction verification method Download PDF

Info

Publication number
TW201040870A
TW201040870A TW98115332A TW98115332A TW201040870A TW 201040870 A TW201040870 A TW 201040870A TW 98115332 A TW98115332 A TW 98115332A TW 98115332 A TW98115332 A TW 98115332A TW 201040870 A TW201040870 A TW 201040870A
Authority
TW
Taiwan
Prior art keywords
transaction
unit
password
identification
data
Prior art date
Application number
TW98115332A
Other languages
Chinese (zh)
Inventor
jun-da Li
Original Assignee
jun-da Li
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by jun-da Li filed Critical jun-da Li
Priority to TW98115332A priority Critical patent/TW201040870A/en
Publication of TW201040870A publication Critical patent/TW201040870A/en

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This invention relates to a financial transaction verification method, in which an identification code, a first balance information, and a first identification information stored in a storage unit are provided for a transaction unit to read, which along with a inputted password are then transmitted to a sever for verifying the transaction. The server will perform an operation to generate a second identification information according to the identification code and the first balance information. The sever will verify the first identification information based on the second identification calculated by the server itself and the received password so as to confirm whether the amount of money deposit in the value storage unit, the first identification information, and the password are correct or not. If the verification succeeds, the server will send a verification-succeeded message to the transaction unit so as to continue the transaction; if the verification fails, the server will send a verification-failed message to the transaction unit so as to end the transaction. By means of the above transaction verification, it is capable of preventing the value-storage unit from being falsely used or illegally duplicated.

Description

201040870 六、發明說明: 【發明所屬之技術領域】 本發明係有關於一種驗證方法,特別是指一種金融交易驗證方法 【先前技術】201040870 VI. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a verification method, and more particularly to a financial transaction verification method. [Prior Art]

目前市面上轉興_費方式為儲值卡在交易镇巾代表使用 客戶身份,以進行消費,例如:統一超商7—ELEVEN所推出之iCASH卡,其 具有-積體電路晶片(ICC,Integrated Circuit chip),iCASH藉由其積體 電=晶片以電子形式儲存㈣金額,以提供的輕便性,使民眾不需為了到 店家中消費而擴帶現金出Η,因而避免遭受貧小的偷竊。此外,透過一交 易終端機依據消費金額而扣除在錯值卡中所儲存之貨幣金額,所以店家不 需針對使用儲值卡消費之民眾提供找零,而提高結帳的效率,且因儲值卡 不需找零’所喊贿值卡之民料必細_可能會有大量硬幣在身 上,所以儲值卡對於絲或民眾皆提供了鎌上的便利性。 然而,一. 蚀田▲ ‘般雛卡之_只確值卡本身,而未確認個儲值卡之 張Μ枯七如此儲值卡並未有安全的認證_,因此任何人都可以使用同一 遺民撤一筆錢,且其他人在拾得 得遺失之μΓϊ 需糾崎認證,如此即使民眾重新取 上的儲值卡伽,離卡情麵可能6被拾得之人祕,因此目前市面 的铸值卡僅利用於小額現金儲值與付款,例如:ic綱卡。 較佳3^發_針對上綱躺如—種金贼肖觀綠,可提供 解決上述_。 ,収避免遺失後喪失現金,以 【發明内容】 201040870 本發明之另一目的在於提供一種金融交易驗證方法,其利用第一識別 資料與第二識別資料驗證,以簡化驗證步驟。 本發明之另—目的在於提供一種金融交易驗證方法,其利用交易完成 之交易單元更新儲值單元,以避免儲值單元被複製使用。 本發明係提供一種金融交易驗證方法,其步驟包含輸入對應儲值單元 之一密碼至該交易單元,以確認儲值單元;讀取一儲值單元所儲存之一辨 識碼、一第一餘額資料、一第一識別資料至一交易單元;傳送該辨識碼、 該第一餘額資料、該第一識別資料與該密碼至一伺服器;驅使該伺服器依 據該辨識碼_第—餘額資料進行運算,以產生-第二識別資料;以及驅 使該伺服11依制第二朗資料與騎碼驗賴第-識別資料,當驗證成 功時,該舰轉送—驗證成功訊息錢交^單元,以繼續交^,當驗證 失敗時’該伺服ϋ傳送-驗證失敗訊息至該交易單元,以結束交易,如此 避免儲值單元被複製使用,且可敎雜後驗卡被胃用。此外,本發明 於該伺服⑽送-驗證成功訊息至該交易單元進行交易之步驟後,本發明 之步驟更包含依據交易更新該第—餘額資料為—第二餘額資料;驅使該饲 服器依據該辨識碼、該第二餘額資料與該密碼進行運算以產生—第二識 =進=恤驗_—識_、該第二識_與該第^ 二;以產生—第四識別貢料;驅使該飼服器傳送該辨識碼、 額貝料、該第四識別資料與該密媽至該交易單元;以及驅使該交 易早兀寫人麵識碼、該第二餘額龍、該細識別 值單元,以細值單搞儲存娜,使辑元與恤㈣=儲 【實施方式】 請參閱第一圖,其本發明之交易率统恭 本發明之交咖包含至少如圖所示’ 30,本實施例伽-難單元1Q ^㈣單 與-伺服器 明並不紐魏。使__鮮元_較^2= 201040870 • 經由一網路40連接至伺服器30,其中儲值單元10係儲存辨識碼、第一餘 額資料與第一識別資料,儲值單元1Q可為一晶片卡或一無線射頻辨識曰片' (Radio Frequency Identification chip,RF-ID chip),交易單元 2〇 為 對應儲值單元10之一交易終端機,因此當儲值單元1〇為晶片卡時,交易 單元20為一晶片卡終端機,當儲值單元1〇為無線射頻辨識晶片時,交易 單兀20為一無線射頻辨識終端機;網路4〇可為一網際網路,或—内部網 路例如:虛擬專用網路(Virtual private Network,VPN)等等。告民孓 使用儲值單元10連接至交易單元2〇時,交易單元2〇即會依據儲值^元⑺ 傳輸對應之資料至伺服器30,以進行交易驗證。 ο 請參閱第二圖,其本發明之交易驗證之_實施例之流程圖。如圖所示, 本發明之金融交易驗證方法之步驟係包含: μ 步驟S100:連接一儲值單元1〇至該交易單元2〇; 步驟S110:輸入儲值單元1〇之一密碼至該交易單元,· 步驟S120:讀取該儲值單元10所儲存之一辨識碼、一第一餘額 一第一識別資料至一交易單元2〇 ; 貝’ 步驟S130:傳送該辨識碼、該第一餘額資料、該第一識別 至-伺服器30; 、、”λ在碼 ❾ 步驟S140··驅使该伺服器30依據該辨識瑪與該第—細資料進 算,以產生一第二識別資料;以及 迷 識別;S15〇:驅使該伺服器3〇依據該第二識別資料驗與該密碼證該第 於步驟刪中,使用者將儲值單元10連接至交易單元2〇,盆中 為對應儲值单兀1G之1易終端機,儲值單元1()可為晶片At present, the market is revitalized _ fee method is the stored value card in the transaction of the town towel representative to use the customer identity for consumption, for example: unified super 7-ELEVEN launched iCASH card, which has - integrated circuit chip (ICC, Integrated Circuit chip), iCASH uses electronic memory to store (4) the amount of money, so as to provide the portability, so that people do not need to expand their cash in order to spend at the store, thus avoiding theft. In addition, through a transaction terminal, the amount of money stored in the wrong value card is deducted according to the amount of consumption, so the store does not need to provide zero for the people who use the stored value card to improve the efficiency of checkout, and because of the stored value The card does not need to change the name of the person who shouted the bribe value card must be fine _ there may be a large number of coins on the body, so the stored value card provides convenience for the silk or the public. However, one. Eclipse ▲ 'The plucked card _ only confirms the card itself, and does not confirm the value of the stored value card. The stored value card does not have a safe certification _, so anyone can use the same survivor Withdrawal of a sum of money, and other people are missing the wrong Γϊ need to correct the identification, so even if the people re-take the stored value of the card, the card may be picked up by the secret, so the current cast value card only Used for small cash stocks and payments, such as: ic card. It is better to provide 3^ hair _ for the upper class lying like a kind of golden thief Xiao Guan Green, which can provide the above solution. [Announcement] 201040870 Another object of the present invention is to provide a financial transaction verification method that utilizes first identification data and second identification data verification to simplify the verification step. Another object of the present invention is to provide a financial transaction verification method that updates a stored value unit using a transaction unit that has completed the transaction to prevent the stored value unit from being copied. The present invention provides a financial transaction verification method, the method comprising the steps of: inputting a password of a corresponding stored value unit to the transaction unit to confirm the stored value unit; reading an identification code stored in a stored value unit, and a first balance data a first identification data to a transaction unit; transmitting the identification code, the first balance data, the first identification data and the password to a server; driving the server to perform operations according to the identification code_first balance data To generate - the second identification data; and to drive the servo 11 to rely on the second lang data and the riding code verification first-identification data, when the verification is successful, the ship transfers - the verification success message money delivery unit, to continue to pay ^, when the verification fails, the servo sends a verification-verification message to the transaction unit to end the transaction, thus avoiding the stored value unit being copied and used, and the noisy poster card is used by the stomach. In addition, after the step of the servo (10) sending-verifying success message to the transaction unit for performing the transaction, the method of the present invention further comprises updating the first balance data according to the transaction as the second balance data; driving the feeding device according to the basis The identification code, the second balance data and the password are operated to generate a second knowledge=input=shirt verification_-------, the second knowledge_ and the second; to generate a fourth identification tribute; Driving the feeding device to transmit the identification code, the amount of the billiard material, the fourth identification material and the secret mother to the transaction unit; and driving the transaction to write the face recognition code, the second balance dragon, the fine identification value Unit, the storage of the value of the fine value, so that the collection of yuan and shirt (four) = storage [embodiment] Please refer to the first figure, the transaction rate of the present invention, the present invention contains at least as shown in the figure '30, In this embodiment, the gamma-hard unit 1Q^(4) single and the -server are not new. __Fresh_ _^2=201040870 • Connected to the server 30 via a network 40, wherein the stored value unit 10 stores the identification code, the first balance data and the first identification data, and the stored value unit 1Q can be one a chip card or a radio frequency identification chip (RF-ID chip), the transaction unit 2 is a transaction terminal of the corresponding stored value unit 10, so when the stored value unit 1 is a wafer card, The transaction unit 20 is a chip card terminal. When the stored value unit 1 is a radio frequency identification chip, the transaction unit 20 is a radio frequency identification terminal; the network 4 can be an internet network, or an intranet. Roads such as: Virtual Private Network (VPN) and so on. When the stored value unit 10 is used to connect to the transaction unit 2, the transaction unit 2 transmits the corresponding data to the server 30 according to the stored value (7) for transaction verification. ο. Referring to the second figure, a flowchart of an embodiment of the transaction verification of the present invention. As shown in the figure, the steps of the financial transaction verification method of the present invention include: μ step S100: connecting a stored value unit 1 to the transaction unit 2〇; step S110: inputting a password of the stored value unit 1 to the transaction Unit, step S120: reading one of the identification codes stored in the stored value unit 10, a first balance, a first identification data, and a transaction unit 2〇; step S130: transmitting the identification code, the first balance Data, the first identification to - server 30; , , λ in the code step S140 · driving the server 30 to calculate according to the identification horse and the first data to generate a second identification data; </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> </ RTI> Single 兀 1G 1 easy terminal, stored value unit 1 () can be a chip

^頻辨識晶片,因此當儲值單元1G為晶片卡時,交易單元2q為—W 卡、,、端機,當儲齡兀10為無線射頻辨識晶片時,交 射頻辨識終端機;於步驟S110中,交易單元2 為…、線 入對應之-密碼,其中該密物=力==儲Γ元10之使用者輪 單元20自儲值單元1〇讀取出辨識碼、第^餘扁額碼=步驟㈣中,交易 $餘領貧料與第一識別資料,以 5 201040870 識碼:併與密碼傳送至細3G,其中該第—識別細該辨 龍、該密碼與—運算參數的互斥或運算結果,而該運 =數為對應該辨識碼之-隨機紐,且第—識別f料χι=Η (加⑼碰 esp柳,其中H (.)為雜湊函數,Taglm為儲值單元ι〇之辨識碼, μ!為第-餘額資料,SK為運算參數,pw為密碼;於步驟襲中,該舰 ^ 30將該辨識碼與該第—餘㈣料Mi並加人該運算參數SK進行互斥或運 异’以產生該第二識別資料’其中該伺服器30係於該儲值單元10發行後 :存對應之4辨識碼TagIDi、§彡第-餘額資料Mi與該密碼PW,且該儲值 單元10每-人連接敍易單元2〇時,該交易單元2〇與該伺服器加會自動 對應產生該運算參數,以分別冑入該第一識別資料^與該第二識別資料χ2 中’且第二識別資料X2=H (TagIDi0MieSK),其中η (·)為雜凑函數, TagIDi為儲值單元之辨識碼,Mi為第一餘額資料,SK為運算參數,㊉ 為互斥或運算子。 承接上述,於步驟S150中,該伺服器30會依據步驟S14〇中所得之互 斥或運异結果以及對應儲值單元之密碼進行驗證,亦即該祠服器藉由該 第一識別資料以及該密碼驗證該第一識別資料’本實施例之驗證方式為判 斷該第二識別資料X2是否等於該第一識別資料XI互斥或㊉密碼pw,當驗 證成功,亦即判斷該第二識別資料X2等於該第一識別資料XI互斥或㊉密 碼PW時’該伺服器30傳送一驗證成功訊息至該交易單元,以繼續交易, 當驗證失敗,亦即判斷該第二識別資料X2不等於該第一識別資料XI互斥 或㊉密碼PW時,該伺服器30傳送一驗證失敗訊息至該交易單元,以結束 交易,其中本實施例更提供三次重新驗證機會’超過三次驗證失敗即鎖卡。 如此藉由上述之交易驗證,以避免儲值單元10於遺失後被冒用,以及避免 儲值單元10被盜用。 此外,如第三圖所示,在第一次執行步驟S110前,本發明更包含: 步驟S102:輸入一使用者身分資料至該交易單元20 ;以及 步驟S104:驅使該交易單元20依據該使用者身分資料向該伺服器30註 冊該儲值單元10。 201040870 於步驟S102中’由該儲值單元1〇之使用者輸入對應之使用者資料至 交易單元20,例如:身分證號碼、住址、連絡電話等等;於步驟中, 該交易單元20係向該伺服器30註冊,使對應該儲值單&amp; 1〇之該辨識碼 TagIDi可對照至該儲值單元之使用者,因此該伺服器更可針對使用者使用 該儲值單元之情況判斷使用者是否有不當使用之情況。 請參閱第四圖’其為本發明之交易之一實施例的流程圖。, 當該舰ϋ於轉S15G中傳送-驗成魏息交易 二 時,本發明之絲步驟係包含: 〇 額資料 步驟S200:依據交易更新該交易單元2〇之該第_餘額資料為一第二餘 料; ' 步驟S210:驅使該伺服器30依據該辨識碼、該第二餘頬資料與該密碼 進行運算,以產生一第三識別資料; 厂 步驟S220:驅使該伺服器30依據該第一識別資料、該第二識別資料與 該第三識別資料進行運算,以產生一第四識別資料; s _厂、 步驟S230:驅使該伺服器30傳送該辨識碼、該第二餘韻資料、咳 識別資料與該密碼至該交易單元20 ;以及 貝;:'^四 ❹ 步驟S240:驅使該交易單元20寫入該辨識碼、該第二餘額資料與該第 四識別資料至該儲值單元1〇。 、' 一以 於步驟S200中,該交易單元20依據交易内容更新該儲值單元1〇所儲 存之該第一餘額資料Mi為該第二餘額資料Mi,’且同時傳送該第 1餘額資 料Mi,至該伺服器30,以更新該伺服器3〇之該第一餘額資料叽為該第二 餘額資料Mi,,當該交易為—肖費交易時,該第二餘額f料⑽,1 :該第 一餘額資料Mi,也就是說消費時,交易單元2〇扣除該儲值二」 第一餘額資料Mi所記錄之金額,而更新為該第二餘額資料⑽,,告該交易 為一加值交易時,該第二餘額資料姐,大於該第一餘額資料姒說 加值時,交易單元20增加該儲值單元10巾的該第一餘額資料⑽所^二 第二餘_ΜΓ ;,於步驟測中,服器難據 忒辨减碼TagHh與該第二餘額資料Mi,並加入該運算參數邻進行互斥或 7 201040870 運算,而產生該第三識別資料X3,盆中兮 料XI與該第二識別資料X2中的該運算來數同於該第1別資 (TagIDi㊉Mi,㊉SK),其中η ()為鮮祕τ弟二識別貧料私Η 辨識碼,料,SK鱗=,之 承接上述,於步驟S220中,該伺服琴3〇 : ^ 鼻子。 識別資料Χ2與第三識別資料進行互斥運二朗資料X1、第二 ^ 卜一兄逆异U產生第四識別資MY/f 第:別:料㈣㊉職;於步驟微&quot;’祠服器3〇傳送辨識: ag Μ、第一餘額貢料Ml與第四識別資料χ4至交易單元2〇,供易二 元20於步驟湖中寫入辨識碼恥刖、第二餘額資錢,與第四識= 料X4至儲值單元10中;於步驟湖中,交易單元2〇依據所接收二 碼TagIDi、第二餘額資料犯,與第四識別資料以寫入儲值單元ι〇,最後 •’’°束交易。如此母次父易結束後,儲值單元1〇所儲存之餘額與識別資料會 一再更新,以避免不肖使用者複製儲值單元1〇而重複使用,且因註冊儲值 單元10時,已記錄對應之使用者身分資料,所以可用於追查出不肖使用者。 請參閱第五圖,其為本發明之交易之另一實施例的流程圖。其中第四 圖與第五圖之不同在於第五圖之步驟S25〇後更包含步驟S260與步驟 S270。本發明之交易包含: 步驟S200:依據交易更新該交易單元2〇之該第一餘額資料為一第二餘 額資料; 步驟S210:驅使該伺服器30依據該辨識碼、該第二餘額資料與該密碼 進行運算,以產生一第三識別資料; 步驟S220:驅使該伺服器30依據該第一識別資料、該第二識別資料與 該第三識別資料進行運算,以產生一第四識別資料; 步驟S230:驅使該伺服器30傳送該辨識碼、該第二餘額資料、該第四 識別資料與該密碼至該交易單元2〇 ; 步驟S240:驅使該交易單元20寫入該辨識瑀、該第二餘額資料、該第 四識別資料與該密碼至該儲值單元10 ; 步驟S250:詢問是否選擇更新該密碼; 201040870 步驟S260:更新該密碼為一新密碼並結束交易;以及 步驟S270:結束交易。The frequency identification chip is used, so when the stored value unit 1G is a wafer card, the transaction unit 2q is a -W card, and the terminal device, when the storage age 10 is a radio frequency identification chip, the radio frequency identification terminal is connected; in step S110 In the transaction unit 2 is ..., the corresponding-password is entered, wherein the secret volume = force == the user wheel unit 20 of the storage unit 10 reads the identification code and the second flat code from the stored value unit 1 = In step (4), the transaction $ surplus and the first identification data, with 5 201040870 identification code: and the password is transmitted to the fine 3G, wherein the first-recognition details the mutual exclusion of the dragon, the password and the operation parameter Or the operation result, and the operation=number is the corresponding random number of the identification code, and the first-identification f material χι=Η (plus (9) touches esp, where H (.) is a hash function, and Taglm is a stored value unit辨识The identification code, μ! is the first-balance data, SK is the operation parameter, and pw is the password; in the step attack, the ship ^ 30 adds the identification code to the first-fourth (four) material Mi and adds the operation parameter SK Performing mutual exclusion or differentihood 'to generate the second identification data', wherein the server 30 is attached to the stored value unit 10: 4 identification code TagIDi, § 彡 first-balance data Mi and the password PW, and the stored value unit 10 is connected to the server unit 2〇, the transaction unit 2〇 automatically corresponds to the server plus Calculating parameters to respectively input the first identification data ^ and the second identification data χ 2 ' and the second identification data X2 = H (TagIDi0MieSK), wherein η (·) is a hash function, and TagIDi is a stored value unit Identification code, Mi is the first balance data, SK is the operation parameter, and ten is the mutual exclusion or operation. According to the above, in step S150, the server 30 according to the mutually exclusive or different results obtained in step S14〇 and Corresponding to the password of the stored value unit, that is, the server verifies the first identification data by using the first identification data and the password. The verification mode of the embodiment determines whether the second identification data X2 is equal to the first An identification data XI mutual exclusion or ten password pw, when the verification is successful, that is, when the second identification data X2 is equal to the first identification data XI exclusive or ten password PW, the server 30 transmits a verification success message to the Trading unit to continue trading When the verification fails, that is, when the second identification data X2 is not equal to the first identification data XI exclusive or ten password PW, the server 30 transmits a verification failure message to the transaction unit to end the transaction, wherein the transaction The embodiment further provides three re-verification opportunities. 'More than three verification failures are the lock cards. Thus, the above transaction verification is performed to prevent the stored value unit 10 from being fraudulent after being lost, and the stored value unit 10 is prevented from being stolen. As shown in the third figure, before the step S110 is performed for the first time, the present invention further includes: Step S102: inputting a user identity data to the transaction unit 20; and step S104: driving the transaction unit 20 according to the user identity data. The stored value unit 10 is registered with the server 30. 201040870 In step S102, the user data of the stored value unit 1 is input to the transaction unit 20, for example, an identity card number, an address, a contact telephone, etc.; in the step, the transaction unit 20 is directed to The server 30 registers, so that the identification code TagIDi corresponding to the stored value list & 1 can be compared to the user of the stored value unit, so the server can be judged to be used for the user to use the stored value unit. Whether the person has improper use. Please refer to the fourth figure, which is a flow chart of one embodiment of the transaction of the present invention. When the ship is transferred to the S15G to transmit the Weiwei transaction 2, the silk step of the present invention comprises: a margin data step S200: updating the first balance data of the transaction unit 2 according to the transaction is a Step S210: driving the server 30 to operate according to the identification code and the second ember data and the password to generate a third identification data; the factory step S220: driving the server 30 according to the first An identification data, the second identification data and the third identification data are calculated to generate a fourth identification data; s _ factory, step S230: driving the server 30 to transmit the identification code, the second afterglow data, cough Identifying the data and the password to the transaction unit 20; and the shell;: '^四❹ Step S240: Driving the transaction unit 20 to write the identification code, the second balance data and the fourth identification data to the stored value unit 1 Hey. In the step S200, the transaction unit 20 updates the first balance data Mi stored in the stored value unit 1 to the second balance data Mi according to the transaction content, and simultaneously transmits the first balance data Mi. To the server 30, to update the first balance data of the server 3 as the second balance data Mi, when the transaction is - the Xiaofei transaction, the second balance f (10), 1 : The first balance data Mi, that is to say, at the time of consumption, the transaction unit 2 deducts the amount recorded by the stored value 2" first balance data Mi, and updates to the second balance data (10), and the transaction is a plus In the value transaction, when the second balance data sister is greater than the first balance data, the transaction unit 20 increases the first balance data (10) of the stored value unit 10, and the second balance _ΜΓ; In the step measurement, the server is difficult to identify the subtraction code TagHh and the second balance data Mi, and join the operation parameter to perform mutual exclusion or 7 201040870 operation, and generate the third identification data X3, the potted material XI The operation in the second identification data X2 is the same as the first one. (TagIDi㊉Mi, ㊉SK), where [eta] () is the brother of two fresh secret identification τ Η-lean private identification code, material, SK = scales, the continuation of the above, in step S220, the servo piano 3〇: ^ nose. Identification data Χ 2 and the third identification data are mutually exclusive. Second tang data X1, second ^ 卜 兄 逆 U U 产生 产生 产生 产生 产生 产生 产生 产生 产生 : : : : : : : : : : : : : : : : : : : : : : : : : : : The device 3 transmits the identification: ag Μ, the first balance tribute M1 and the fourth identification data χ4 to the transaction unit 2〇, for the easy binary 20 to write the identification code shame and the second balance money in the step lake, and The fourth knowledge = material X4 to the stored value unit 10; in the step lake, the transaction unit 2 犯 commits according to the received second code TagIDi, the second balance data, and the fourth identification data to write the stored value unit ι〇, and finally • ''° bundle transaction. After the parent and the parent are easy to end, the balance and identification data stored in the stored value unit 1〇 are updated again and again to avoid the use of the stored value unit 1不 and the repeated use, and since the registered value unit 10 is registered, the record is recorded. Corresponding user identity data, so it can be used to identify unscrupulous users. Please refer to the fifth figure, which is a flow chart of another embodiment of the transaction of the present invention. The fourth figure is different from the fifth figure in that step S25 of the fifth figure further includes step S260 and step S270. The transaction of the present invention includes: Step S200: updating the first balance data of the transaction unit 2 to a second balance data according to the transaction; Step S210: driving the server 30 to use the identification code, the second balance data, and the The password is operated to generate a third identification data; Step S220: driving the server 30 to perform operation according to the first identification data, the second identification data and the third identification data to generate a fourth identification data; S230: driving the server 30 to transmit the identification code, the second balance data, the fourth identification data and the password to the transaction unit 2〇; Step S240: driving the transaction unit 20 to write the identification file, the second The balance data, the fourth identification data and the password to the stored value unit 10; Step S250: Ask whether to choose to update the password; 201040870 Step S260: Update the password to a new password and end the transaction; and Step S270: End the transaction.

其中步驟S200至步驟S240不再贅述,於步驟㈣中,交易單元2〇 可在結束交易前,更進-步詢_值料1Q之使用者是否修㈣ 選 擇為是時,執行步驟S26G ’當選擇為否時,執行步驟獅;於田咖 中,更包含: VStep S200 to step S240 are not described again. In step (4), the transaction unit 2 can further check whether the user of the value 1Q is repaired (4) when the transaction is completed, and step S26G is performed. If you choose No, perform the step lion; in Yutian, include: V

步驟S262:輸入該新密碼至該交易單元2〇;以及 步驟S264:驅使鼓料元2G傳賴新密敬3 密碼為該新密碼。 X 〇 ❹ 於步驟S262中,其中該新密碼幻6〇位元加密編碼;於步驟_中, 交易單元20係傳送新密碼至伺服器3〇,供伺服器3〇記錄新 下次交易認證。 本發明之交易除了依據交易直接更_值單元10之第—餘額資料為第 二餘額貧料之外,更可直接更新伺服器3〇之第一餘額資料為第二餘額資 料,如第六圖所示之步驟S300,另外,更可包含詢問是否選擇更新密碼之 步驟,如第七_示之步驟S35G至步驟s編,由於第賴與第六圖之差異 以及^五®與第七圖之差題在於麵测為依據料更新該错值翠元⑺ 之該第-餘額資料為-第二餘額資料,步驟·為依據交易更新該词服器 30之該第-餘額資料為—第二餘姆料,其餘步驟相同,因此不再贊述: 綜上所述,本發明金融交易驗證方法,主要係藉由交易單元將儲值單 兀之辨識碼、第-餘補·第—識师㈣及對紅密碼傳送至飼服 器’舰器依據本身儲存之辨識碼與第—餘額資料並加入—運算參數進行 運算,以求得第二識職料,且碰驗據第二識別簡驗證第Z 料,以判斷儲值單元之真偽或確認是否被冒用。 *雖然本發明已以較佳實施例揭露如上,然其並非用以限定本發明,任 何熟習此技藝者,在不脫離本剌之精神和範關,當可作些許之更動與 潤飾’因此本發明之保護範圍當視後附之帽專利範圍所狀者為準。。 9 201040870 【圖式簡單說明】 第一圖為本發明之一實施例之方塊圖; 第二圖本發明之交易驗證之一實施例之流程圖; 第三圖本發明之交易驗證之另一實施例之流程圖; 第四圖為本發明之交易之一實施例的流程圖; 第五圖為本發明之交易之另一實施例的流程圖; 第六圖為本發明之交易之另一實施例的流程圖;以及 第七圖為本發明之交易之另一實施例的流程圖。 【主要元件符號說明】 10 儲值單元 20 交易單元 30 伺服器 40 網路 10Step S262: input the new password to the transaction unit 2; and step S264: drive the drum element 2G to pass the new password 3 as the new password. X 〇 于 in step S262, wherein the new cipher is encrypted and encoded; in step _, the transaction unit 20 transmits a new password to the server 3〇 for the server 3 to record the new next transaction authentication. The transaction of the present invention can directly update the first balance data of the server 3 as the second balance data, in addition to the second balance balance data according to the first balance data of the transaction direct_value unit 10, as shown in the sixth figure. Step S300 is shown, and further includes a step of asking whether to select an update password, such as step S35G to step s of the seventh step, because of the difference between the first and sixth figures, and the fifth and seventh pictures. The difference is that the first-balance data of the wrong value Cuiyuan (7) is the second balance data according to the material test, and the step--updates the first-balance data of the word processor 30 according to the transaction--the second balance In other words, the rest of the steps are the same, so it is no longer praised: In summary, the financial transaction verification method of the present invention mainly uses the transaction unit to store the stored value list identification code, the first-to-replenishment, the first-discovery teacher (four) And the red password is transmitted to the feeding device's ship according to the stored identification code and the first balance data and the operation parameter is calculated to obtain the second knowledge, and the second identification is verified. Z material to determine the authenticity or confirmation of the stored value unit Whether it is fraudulent. The present invention has been disclosed in the above preferred embodiments, and is not intended to limit the present invention. Any person skilled in the art can make some modifications and refinements without departing from the spirit and scope of the present invention. The scope of protection shall be subject to the patent scope of the attached cap. . 9 201040870 [Brief Description of the Drawings] The first drawing is a block diagram of an embodiment of the present invention; the second drawing is a flow chart of one embodiment of the transaction verification of the present invention; The fourth diagram is a flow chart of one embodiment of the transaction of the present invention; the fifth diagram is a flow chart of another embodiment of the transaction of the present invention; and the sixth figure is another implementation of the transaction of the present invention. A flowchart of an example; and a seventh diagram is a flow chart of another embodiment of the transaction of the present invention. [Main component symbol description] 10 Stored value unit 20 Transaction unit 30 Server 40 Network 10

Claims (1)

201040870 七、申請專利範圍: 1. 一種金融交易驗證方法,其步驟包含: 輸入對應一儲值單元之一密碼至該交易單元,以確認該儲值單元; 讀取該儲值單元所儲存之一辨識碼、一第一餘額資料與一第一識別資 料至一交易單元; 傳送該辨識碼、該第一餘額資料、該第一識別資料與該密碼至一伺服 器; 驅使該伺服器依據該辨識碼與該第一餘額資料進行運算,以產生一第 二識別資料;以及 〇 驅使該伺服器依據該第二識別資料與該密碼驗證該第一識別資料,當 驗證成功時’該伺服器傳送一驗證成功訊息至該交易單元,以繼續交 易,當驗證失敗時,該伺服器傳送一驗證失敗訊息至該交易單元,以 結束交易。 2. 如申請專利範圍第1項所述之金融交易驗證方法,其中於輸入一密碼至 該交易單元之步驟前,更包含: 連接該儲值單元至該交易單元。 3. 如申β月專利範圍第1項所述之金融交易驗證方法,其中該第一識別資料 麟職碼、—餘«料、該《與-運算參㈣互斥或運算結果。 4. 如申β月專利範圍第3項所述之金融交易驗證方法,其中該運算參數為對 應該辨識碼之一隨機亂數。 5. 如申明專利範圍第3項所述之金融交易驗證方法,其中於驅使該伺服器 、該帛__餘觀料與減碼進行運算之步驟 中’係將該觸碼與該第—餘額資料並加人—運算參數進行互斥或運 算,以產生該第二識別資料。 6. 如申叫專利範圍第5項所述之金融交易驗證方法,其中該運算參數為對 應該辨識碼之一隨機亂數。 7. 如申明專利範圍第!項所述之金融交易驗證方法,其中於驅使該伺服器 依據該第—綱貝料與該密碼驗證該第—識別資料之步驟中,係驗證該 201040870 8. 第二識前料是料於鄉—識«料互核該密碼。 如申請專利賴第1項所述之金融交易驗證方法 -驗證成功訊息至該交易單元進行交㈣驟後,=觸服秦 依據父易更_第-餘額f料為—第二餘額資料· 辨識碼、該第二餘補料與該 產生一第三識別資料: 丈升Λ Τ帛—嶋L冑簡觸三識別資 料進订運算,以產生一第四識別資料; 該第四識別資料與該 驅使該伺服器傳送該辨識碼、該第二餘額資料、 密碼至該交易單元;以及 驅使該交料元寫人該職碼、_二餘崎料、鮮四識別資料與 該密碼至該儲值單元。 9. 如申請專利範圍第8項所述之金融交易驗證方法,其中當該交易為一消 費交易時,該第二餘額資料小於該第一餘額資料。 10. 如申請專利範圍第8項所述之金融交易驗證方法,其中當該交易為一加 值交易時’該第二餘額資料大於該第一餘額資料。 11. 如申凊專利範圍第8項所述之金融交易驗證方法,其中於驅使該伺服器 依據該辨識碼與該第二餘額資料進行運算之步驟中,係依據該辨識碼與 該第二餘額資料並加入一運算參數進行互斥或運算,而產生該第三識別 資料。 12. 如申請專利範圍第11項所述之金融交易驗證方法,其中該運算參數為 對應該辨識碼之一隨機亂數。 13. 如申請專利範圍第8項所述之金融交易驗證方法,其中於驅使該交易單 元寫入該辨識碼、該第二餘額資料、該第四識別資料與該密碼至該儲值 單元之步驟後,更包含步驟: 經由該交易單元詢問是否選擇更新該密碼,當選擇為是時,更新該密 碼為一新密碼,再結束交易’當選擇為否時,隨即結束交易。 14. 如申請專利範圍第8頊所述之金融交易驗證方法,其中於更新該密碼為 201040870 —新密碼之步驟中’其步驟包含: 輸入該新进碼至該交易單元.以及 驅使14傳_新密碼至該舰^,以更新該密碼為該新密碼。 15. 如申請專利範圍第14項所述之金融交級證方法,其中該新密碼為16〇 位元加密編碼。 16. 如申清專利!巳圍第1項所述之金融交易驗證方法,其中該密碼為16〇位 元加密編碼。 17. 如申凊專利範圍第1項所述之金融交易驗證方法,其中於第一次輸入該 密碼至該交易單元之步驟前,更包含: 〇 輸入對應斯諸值單元之一使用者身分資料至該交易單元;以及 驅使該3d單TL依據該制者身分資料向該舰雜職離單元。 18. 如申明專利範圍第1項所述之金融交易驗證方法,其中該儲值單元為一 晶片卡。 19. 如申吻專利範圍第i項所述之金融交易驗證方法,其中該儲值單元為一 ',,、線射頻辨識晶片(Radio Frequency Identification chip,RFID chip)〇201040870 VII. Patent application scope: 1. A financial transaction verification method, the steps comprising: inputting a password corresponding to a stored value unit to the transaction unit to confirm the stored value unit; reading one of the stored value units The identification code, a first balance data and a first identification data to a transaction unit; transmitting the identification code, the first balance data, the first identification data and the password to a server; driving the server according to the identification The code is operated with the first balance data to generate a second identification data; and the server is driven to verify the first identification data according to the second identification data and the password, and when the verification is successful, the server transmits a The success message is verified to the transaction unit to continue the transaction. When the verification fails, the server transmits a verification failure message to the transaction unit to end the transaction. 2. The financial transaction verification method according to claim 1, wherein before the step of inputting a password to the transaction unit, the method further comprises: connecting the stored value unit to the transaction unit. 3. The method for verifying financial transactions as described in item 1 of the patent scope of the beta, wherein the first identification data is a suffix or a suffix or a result of the operation. 4. The financial transaction verification method as described in item 3 of the patent scope of the beta, wherein the operation parameter is a random random number corresponding to one of the identification codes. 5. The method for verifying a financial transaction according to claim 3, wherein in the step of driving the server, the operation of the __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The data is added to the operation parameter to perform a mutual exclusion or operation to generate the second identification data. 6. The financial transaction verification method as claimed in claim 5, wherein the operation parameter is a random random number corresponding to one of the identification codes. 7. If the scope of the patent is claimed! The financial transaction verification method according to the item, wherein in the step of driving the server to verify the first identification data according to the first-class material and the password, verifying the 201040870 8. The second knowledge is expected to be in the township - Know the material to verify the password. If the patent application is based on the financial transaction verification method described in item 1 - verification success message to the transaction unit for payment (four), = touch the Qin according to the father Yi _ _ first - balance f material - the second balance data · identification a code, the second remaining feed, and the generating a third identification data: the Λ Λ Τ帛 嶋 胄 胄 胄 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别 识别Driving the server to transmit the identification code, the second balance data, and the password to the transaction unit; and driving the delivery unit to write the job code, the _二余崎料, the fresh four identification data, and the password to the stored value unit. 9. The financial transaction verification method according to claim 8, wherein when the transaction is a consumer transaction, the second balance data is smaller than the first balance data. 10. The financial transaction verification method of claim 8, wherein the second balance data is greater than the first balance data when the transaction is a value-added transaction. 11. The method for verifying a financial transaction according to claim 8, wherein the step of driving the server to perform calculation according to the identification code and the second balance data is based on the identification code and the second balance The data is added to an operation parameter for mutual exclusion or operation, and the third identification data is generated. 12. The financial transaction verification method according to claim 11, wherein the operation parameter is a random random number corresponding to one of the identification codes. 13. The financial transaction verification method according to claim 8, wherein the step of driving the transaction unit to write the identification code, the second balance data, the fourth identification data, and the password to the stored value unit Afterwards, the method further includes the step of: asking whether to choose to update the password via the transaction unit, and when the selection is yes, updating the password to a new password, and then ending the transaction, when the selection is no, the transaction is terminated. 14. The financial transaction verification method as described in claim 8 of the patent application, wherein in the step of updating the password to 201040870 - a new password, the steps of the step include: inputting the new input code to the transaction unit. The new password is sent to the ship^ to update the password for the new password. 15. The method of financial cross-examination as described in claim 14, wherein the new password is a 16-bit encryption code. 16. If the patent is claimed, the financial transaction verification method described in item 1 above, wherein the password is 16-bit encryption code. 17. The financial transaction verification method according to claim 1, wherein before the step of inputting the password to the transaction unit for the first time, the method further comprises: 〇 inputting a user identity data corresponding to one of the value units To the transaction unit; and to drive the 3d single TL to the unit according to the system identity data. 18. The financial transaction verification method according to claim 1, wherein the stored value unit is a wafer card. 19. The financial transaction verification method according to item ith of the patent application scope, wherein the stored value unit is a ',, a radio frequency identification chip (RFID chip) 〇
TW98115332A 2009-05-08 2009-05-08 Financial transaction verification method TW201040870A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98115332A TW201040870A (en) 2009-05-08 2009-05-08 Financial transaction verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98115332A TW201040870A (en) 2009-05-08 2009-05-08 Financial transaction verification method

Publications (1)

Publication Number Publication Date
TW201040870A true TW201040870A (en) 2010-11-16

Family

ID=44996128

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98115332A TW201040870A (en) 2009-05-08 2009-05-08 Financial transaction verification method

Country Status (1)

Country Link
TW (1) TW201040870A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8774412B2 (en) 2011-08-08 2014-07-08 Industrial Technology Research Institute Verification method and system
US9959537B2 (en) 2014-02-27 2018-05-01 Pinsheng Sun Portable electronic card system and method for manufacturing a rewritable plastic card

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8774412B2 (en) 2011-08-08 2014-07-08 Industrial Technology Research Institute Verification method and system
US9959537B2 (en) 2014-02-27 2018-05-01 Pinsheng Sun Portable electronic card system and method for manufacturing a rewritable plastic card

Similar Documents

Publication Publication Date Title
JP5642932B2 (en) Authentication and verification services for third-party vendors using mobile devices
JP5562965B2 (en) Electronic payment application system and payment authentication method
JP4597529B2 (en) Authentication mechanisms and methods for use in financial transactions
AU2007261072B2 (en) Consumer authentication system and method
AU2004252824B2 (en) Customer authentication in e-commerce transactions
US10108958B2 (en) Method for processing a payment, and system and electronic device for implementing the same
CN110612546A (en) Digital asset account management
TW201104628A (en) Financial transaction system, automated teller machine (ATM), and method for operating an ATM
US20090172402A1 (en) Multi-factor authentication and certification system for electronic transactions
US20100017334A1 (en) Authentication system and authentication method
WO2011130422A2 (en) Mobile phone as a switch
RU2004129334A (en) ELECTRONIC TRANSFER SYSTEM
BR112012017880A2 (en) &#34;method and system&#34;
KR20140125449A (en) Transaction processing system and method
JP5978326B2 (en) Dynamic authentication system, dynamic authentication method, reader for dynamic authentication, user terminal device, and dynamic authentication program
CN110880113A (en) Authentication server and authentication method for block chain transaction
JP2010287250A (en) Authentication system for cashless payment
BR112018069613B1 (en) METHOD AND ACCESS DEVICE
TWI642010B (en) Electronic transaction password reset system and method thereof
US20210012348A1 (en) Smart physical payment cards
TW201040870A (en) Financial transaction verification method
WO2017092202A1 (en) Transaction method and transaction system
TWI822087B (en) Service provision system, service provision method and program product
JP7313179B2 (en) IC card, IC card system and program
JP7490396B2 (en) Verification server and program