Method and system based on USBKey online banking trade information authentication

A technology of transaction information and online banking, applied in transmission systems, instruments, finance, etc., can solve problems such as data theft or tampering, lack of protection measures for user input data, etc., and achieve the effect of solving tampering and security risks

Active Publication Date: 2010-03-03
ZHEJIANG WELLCOM TECH
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the transaction process, from the user input data to the process of the input data being sent to the device for digital signature, there is a lack of necessary protection measures for the user input data
Data entered by the user during this process may be stolen or tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system based on USBKey online banking trade information authentication
  • Method and system based on USBKey online banking trade information authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with specific examples, but the present invention is not limited to these specific implementations. Those skilled in the art will realize that the present invention covers all alternatives, modifications and equivalents as may be included within the scope of the claims.

[0040] This patent utilizes the feature of no drive and no software realized by the system equipment. When it leaves the factory, there is a signature authentication component inside the device. By using the binding between the component and the device and using the shared key method, the system software will send the transaction data. Verify the authenticity of the data to ensure that the data received by the device has not been illegally tampered with in the network link.

[0041] First of all, when the device leaves the factory, the system software has been stored in the safe storage space of the device, and the system software has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method based on USBKey online banking trade information authentication; when being used for the first time, system software is automatically mounted into an operating systemand a solidifying key is mounted simultaneously; when a user finishes pressing a trade fingerprint to confirm the trade, application software generates a random number and uses the solidifying key toencrypt and transmit to a USBKey; meanwhile, the application software uses the random number to implement inserting and upsetting on the received trade data and uses the solidifying key to encrypt andtransmit to the USBKey; the USBKey uses the shared solidifying key to decrypt to obtain one random number and a string of trade data upset by the random number, uses the shared key to take out the random number inserted into the trade data and compares the random number with the random number obtained by directly deciphering, and the random number is confirmed to be true and valid if the resultsare the same. The invention can guarantee the trade information to be safely transferred in the network links by establishing a data truth authentication system, stop the trade information from beingmaliciously altered and protect the user trade to be safely and validly executed.

Description

technical field [0001] The invention relates to a network data authentication method and system, in particular to a method for authenticity authentication of information data sent by an application system. Background technique [0002] With the rapid development of network technology, online transactions are gradually accepted by the public due to their convenience and low cost of use, and the number of users of online transactions is gradually increasing. However, the security of online transactions has gradually become the focus of attention of users. There are more and more reports of online transaction security incidents caused by "Trojan horse" or "broiler" programs, and a large number of users are increasingly worried about online transactions. [0003] The existing client identity authentication system for online transactions is based on U-shield as the technical core. For example, ICBC’s online banking, in terms of transaction security, ICBC uses U-shield to protect ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q40/00
Inventor 岑旭聚张伟峰邹建军陆捷
Owner ZHEJIANG WELLCOM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products