Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe authorization method and system

A security and authorization code technology, applied in the field of security authorization, can solve the problems of troublesome implementation and deployment of payment systems, low work efficiency, and high cost, and achieve the effects of convenience, work efficiency, and security enhancement.

Active Publication Date: 2010-06-23
FEITIAN TECHNOLOGIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is highly secure, but requires the authorized terminal to visit the site in person, which is costly and inefficient, and the implementation and deployment of the entire payment system is very troublesome, because most payment terminals do not have peripherals for related equipment, which requires that in order to support magnetic cards , IC card, USB Key and other authentication equipment, it is necessary to upgrade the payment terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe authorization method and system
  • Safe authorization method and system
  • Safe authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Embodiment 1 of the present invention provides a method for security authorization. In this method, the authorization terminal generates a dynamic password, and the payment terminal judges the correctness of the dynamic password, which enhances transaction security, reduces costs, and improves work efficiency. The technical solution of this embodiment includes the steps of binding the dynamic tokens of the payment terminal and the authorization terminal and the steps of security authorization:

[0074] The binding steps are as follows: figure 1 Shown:

[0075] 101: Import dynamic token information, operation terminal information and authorization terminal information to the payment terminal.

[0076] The dynamic token information includes a dynamic token ID and a dynamic password generation algorithm corresponding to the dynamic token ID. Importing dynamic token information refers to importing the dynamic token identification and the corresponding dynamic password gen...

Embodiment 2

[0106] The present invention also provides a security authorization system, including: an operation terminal 301, a payment terminal 302 and an authorization terminal 302;

[0107] see image 3 , the payment terminal 302 includes: a first acquisition module 3021, a control module 3022, a judgment module 3023, a transaction processing module 3024, a request information generation module 3025, a first output module 3026, a password generation and verification module 3027;

[0108] The first obtaining module 3021 is used to obtain the operation terminal information and transaction application information sent by the operation terminal 301; it is also used to obtain the authorization code sent by the operation terminal 301 or the authorization terminal 303;

[0109] The control module 3022 is used to start the password generation and verification module 3027 after the information obtained by the first obtaining module 3021 is the operation terminal information; it is also used to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe authorization method and a safe authorization system, which belongs to the computer field. The safe authorization method comprises the steps as follows: a payment terminal obtains the information of an operation terminal and verifies the information; if the information passes the verification, the payment terminal obtains a transaction application; the payment terminal judges whether the transaction application needs to be authorized or not, if required, the payment terminal transmits a request message for obtaining an authorization code to an authorization terminal, the request message comprises a challenge value; the authorization terminal generates a dynamic password by virtue of a pre-bound dynamic token according to the challenge value, the generated dynamic password is taken as an authorization code and is returned to the payment terminal by the authorization terminal; the payment terminal receives the authorization code and generates a dynamic password according to an internally pre-bound dynamic password generation algorithm which is same as the generation algorithm of the authorization code; the payment terminal compares and checks the received authorization code with the generated dynamic password, if the received authorization code is the same as the generated dynamic password, the normal transaction is performed and completed. The technical proposal provided by the method can strengthen the security of transaction, can reduce cost and greatly improve working efficiency.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and system for security authorization. Background technique [0002] At present, the banking business system divides all types of business into two categories: general business and special business: general business refers to the financial business handled daily by the operator, such as opening a savings account, depositing and withdrawing, etc.; High-authority operators (hereinafter referred to as the authorized terminal) can handle financial services only after authorization, such as large-amount withdrawals, frozen accounts, and fund transfers. [0003] The existing banking system requires an authorization terminal to manage one or several business outlets and be responsible for authorizing the special services belonging to these business outlets. In actual work, the authorizing terminal is responsible for other business and management work at the same time, and the time and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07F7/00G07F19/00G06Q40/00G06Q20/40G06Q40/02
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES