Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

A Self Protected and Supporting chained delegation method for card

IP.com Disclosure Number: IPCOM000240120D
Publication Date: 2015-Jan-05

Publishing Venue

The IP.com Prior Art Database

Abstract

The card (e.g. Bank Card, Identification card etc.) is used widely in our life, but the security of card is an important and critical issues today, when card lost, many personal information maybe lost and the card may be fraudulent used by some others. This article provide a serials of method to protect the card and improve the card security, e.g., no infomration was displayed on the card before the card was activited to avoid information lost, the IC contact point was disabled before the card was actived, the card will be actived via correct fingerprint and then the information will be displayed on the surface of card and the IC contact point will be enabled, the card provide the chained delegation so that to support the delegate function.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 33% of the total text.

Page 01 of 12

A Self Protected and Supporting chained delegation method for card

Background:
The identification card is proved to be very important and necessary to all areas of our life, such as going to school, working, getting the driving license, applying a loan or even for traveling. Now the second generation of ID card improves enormously based on the first generation, it uses the IC chip that can be read by the reader, and add the anti-fake technology on the surface.

Problem:


Unfortunately, many personal information are clearly displayed, the photo may be different from the real style of user, therefore the reader of IC card is needed in order to check the ownership of card, all those features that increase the cost and complexity, and what's more, the IC card can be reported lost but the card itself can be still valid, which means all the others who have the lost card can still use it, thus also increases the probability of business fraud and illegal trade on network.

Known solutions (Prior Art):


It is known to use fingerprints in conjunction with an ID card to verify ownership of the card at the point of said. For example, U.S. Pat. No. 4253086 discloses a credit card having a fingerprint stored thereon for later verification that the holder is indeed the true owner of the card. The fingerprint may be recorded using mechanical steps wherein the fingerprint is first taken using a stamp pad and paper. The image is then enlarged, retraced to form clean lines, reduced to its normal size, and stored on the ID card, preferably in mirror reverse form. A fresh print is compared to the stored master print using a viewer projector, episcope, or computer.

WO.Pat. No. 2001020422A2 discloses an financial service system using a fingerprint identification and a method thereof, and in particular to a financial service system by which a user, who is identified by inputting his fingerprint and password (optional), can deposit or withdraw money. It enhances the stability and reliability of a financial service system by separating a fingerprint stored in a normal state and a fingerprint stored in an alarm state.

U.S. Pat. No. 4983036 discloses a "smart" credit card which may include the complete records of an individual's bank balance, and their transactions, so that a merchant can confirm a balance based on the information stored on the card itself. The card includesa fingerprint exemplar which is compared with a print taken on a treated paper carrier. The two images are optically compared in a reader using autocorrelation to confirm a match.

Drawbacks:


The above cited references using fingerprint identification need to operate in conjunction with some form of separate fingerprint scanner. Separate scanners, and the knowledge to operate them, dramatically increase the costs and complexity associated with an identification card system. In addition, security can still be breached, either by scanning a magnetic stripe or recording the account information p...