Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Card having password input key

A password input and key input technology, applied in the field involving password input keys, can solve problems such as inability to identify, and achieve the effects of reducing manufacturing costs, reducing damage or defects, and simplifying layout and design.

Inactive Publication Date: 2008-12-10
朴正雄
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Further, in the case of various identification cards such as resident cards, driver's licenses, or passports, if an illegal user changes the original photo to another photo, and carefully pastes the photo, which is often seen in forgery crimes, In the predetermined place, it is impossible to identify whether the illegal user who presents the ID card is a legal user by using the address, name, date of birth, ID card number, etc. printed on the surface of the ID card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Card having password input key
  • Card having password input key
  • Card having password input key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0064] Embodiment 1 (method of inputting and using a simple password)

[0065] First, if the function key 16a or 17a is pressed for a long time (about 3 seconds), the power of the card 1 is turned on under the control of the controller 10, and the number "1" is displayed in the display panel 13.

[0066] In order to input the password (in this example, the password is "2573") in the password reset state of the newly issued card 1, if the user turns on the power supply of the card 1 by pressing the function key 16a or 17a, by operating the up / down key 16b or 17b and 16d or 17d cause the display panel 13 to display the number "2", and then briefly press the function key 16a or 17a to form a rectangular frame around the number "2", or present a shadow behind the number "2" as a confirmation of the controller 10 indication, thus setting the number "2".

[0067] Further, in order to set the number "5", the user presses the up / down keys 16b or 17b and 16d in the state where the cur...

Embodiment approach 2

[0080] Embodiment 2 (method of storing and displaying card verification value on display panel)

[0081] Rather than being printed on the face of the card 1, the card authentication value entered when conducting an online transaction by telephone or the Internet is stored in the controller 10 or memory connected thereto. Of course, the card 1 is configured to set an independent password, as in the case of Embodiment 1, when the input password is consistent with the preset password, the card 1 enters the state of turning on its power supply, that is, the state where the card 1 can be used.

[0082] Therefore, if the password input by operating the input key unit 16 or 17 coincides with the preset password, a message "OK" indicating that the card 1 can be used is displayed in the display panel 13. Then, if the function key 16a or 17a is briefly pressed twice, the card verification value is displayed on the display panel 13 for 3 to 5 seconds, so that the holder of the card 1 can...

Embodiment approach 3

[0088] Embodiment 3 (the method of storing and displaying the one-time password in the display panel)

[0089] By providing a combination of numbers to create the set of four or six numbers required for a one-time password entered in an on-line transaction by telephone or the Internet, said set of numbers is stored in the controller 10 connected to it when the card issuing company issues the card. or in memory instead of printing groups of numbers on separate sheets of paper.

[0090] For example, several groups of numbers could be, eg, A: 48-25, B: 36-23, C: 78-49, and D: 85-27.

[0091] Of course, even in this case, the card 1 is configured to be similar to the above-mentioned embodiment, and an independent password is set. When the input password is consistent with the preset password, the card 1 enters the state of turning on its power, that is, the card 1 can be used. state.

[0092] Therefore, if the password input by operating the input key unit 16 or 17 coincides wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a card having password input keys, which can prevent duplication of a credit card, a cash card, or an electronic identification card by a unauthorized third party upon loss or theft of the card, and which is constructed so that a separate password, other than a password for card payment assigned when the card is issued, is set in the card, and a magnetic stripe card or smart card-type credit card, cash card or electronic identification card can be turned on / off when a correct password is input, thus implementing a plurality of security functions without requiring changes to be made to a conventional card terminal or various operating systems.

Description

technical field [0001] The present invention generally relates to code entry keys, and in particular to cards having code entry keys which allow the entry of a code provided in the card itself with a small number of entry keys, allowing the verification of the card verification value to be confirmed only when the correct code is entered, one time Passwords, information about cardholders, etc. prevent card re-use and report crimes such as unauthorized cash withdrawals resulting from kidnapping. Background technique [0002] A method for preventing various credit cards, gift cards, cash cards, and electronic identification cards (IDs) from being illegally used or possessed may include, for example, a method of providing a plurality of input keys on a single card and inputting a password using the input keys. Since the input keys are mounted on the surface of the card, the card has structural limitations and a high failure rate in use. [0003] Such as figure 1 As shown, in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K19/07G06F21/34G06F21/35
CPCG06K19/07345G07F7/0806H01H2231/05G06K19/07G06K19/00G06K19/067
Inventor 朴正雄
Owner 朴正雄
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products