Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet transaction identity authentication method and device

An identity authentication device and network transaction technology, applied in the field of network transaction identity authentication methods and devices, can solve problems such as network transaction security risks, and achieve the effects of ensuring security and improving reliability.

Active Publication Date: 2009-12-30
BEIJING WATCH DATA SYST
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When using the OCL device for network transactions, as long as you obtain the private key of the OCL device, you can use the OCL device for transactions at will, and there are certain risks in the security of network transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet transaction identity authentication method and device
  • Internet transaction identity authentication method and device
  • Internet transaction identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment provides a network transaction identity authentication method, which can effectively ensure the security of network transactions.

[0034] Such as figure 1 Shown, described network transaction identity authentication method, it carries out network transaction by using OCL equipment, and described method comprises:

[0035] 101. The user inputs a PIN code through the OCL device, and the OCL device verifies the PIN code and passes it.

[0036] 102. The OCL device acquires a dynamic password;

[0037] 103. The OCL device displays the dynamic password;

[0038] 104. The OCL device verifies the dynamic password;

[0039] 105. After passing the verification of the dynamic password, the OCL device uses the private key to sign;

[0040] 106. The user physically confirms the button for the network transaction.

[0041] In the network transaction identity authentication method of the embodiment of the present invention, after the PIN code verification is pass...

Embodiment 2

[0043] In this embodiment, the OCL device itself generates a dynamic password and displays it, and the user enters the dynamic password displayed by the OCL device through a keyboard on the OCL device or a keyboard on a PC, or physically confirms through a button on the OCL device. The dynamic password generated by the OCL device is verified.

[0044] Such as figure 2 As shown, the network transaction identity authentication method includes:

[0045] 201. The user logs in to the online banking.

[0046] 202. The user inserts the OCL device into the PC.

[0047] 203. The user inputs the PIN code of the OCL device through the keyboard on the OCL device or the keyboard on the PC, and performs verification.

[0048] 204. If the verification fails, prompt the user for an error and re-enter.

[0049] 205. If the verification passes, the OCL device itself generates a dynamic password.

[0050] Among them, the OCL device itself has the function of generating random numbers. When...

Embodiment 3

[0064] In this embodiment, the verification server located at the backstage of the Internet bank generates a dynamic password, and sends the dynamic password to the OCL device, and the OCL device displays the dynamic password, and the user passes through the keyboard on the OCL device or the key on the PC. Input the dynamic password displayed by the OCL device through the keyboard, or perform physical confirmation through the buttons on the OCL device, and verify the dynamic password received by the OCL device.

[0065] Such as image 3 As shown, the network transaction identity authentication method includes:

[0066] Steps 301-304 are the same as steps 201-204, and will not be repeated here.

[0067] 305. If the verification passes, the verification server generates a dynamic password.

[0068] A verification server is deployed in the background of the online bank. After the OCL device passes the verification of the PIN code, the verification server uses its own internal k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an internet transaction identity authentication method, comprising the steps as follows: after passing PIN code verification on OCL equipment, obtaining a dynamic password, displaying the dynamic password, verifying the dynamic password, carrying out signing by a private key after passing dynamic password verification and carrying out physical confirmation of press keys on the internet transaction. The embodiment of the invention discloses an internet transaction identity authentication device and the invention is suitable for user identity authentication in the internet transaction.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a network transaction identity authentication method and device. Background technique [0002] At present, in online banking applications, USB Key is widely used as an identity authentication and electronic certificate tool. USB Key is a hardware device with USB interface. It has a built-in single-chip microcomputer or smart card chip, and has a certain storage space, which can store the user's private key and digital certificate, and use the built-in public key algorithm of USB Key to realize the authentication of user identity. Since the user's private key is stored in the password lock, theoretically it cannot be read by any means, thus ensuring the security of user authentication. [0003] OCL (Operation Control List, Operation Control List) device is a high-end USB Key. Compared with traditional USB Key products, it adds interfaces for human-computer interaction such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q30/00
Inventor 耿建华胡鹏
Owner BEIJING WATCH DATA SYST