Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-factor online transaction safety authentication method and system

A security authentication, two-factor technology, applied in the field of security authentication, can solve the problem of low security of short messages

Inactive Publication Date: 2011-01-12
INSTITUTE FOR INFORMATION INDUSTRY
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] After the dynamic password is generated by the server, the dynamic password is sent to the user's mobile phone through a short message, which can reduce the user's burden and all mobile phones can support it. However, the security of the short message is not high and when the mobile phone is stolen or the user identification module When the (Subscriber Identity Module, SIM) card is fraudulently used, others can impersonate the user to conduct transactions after receiving the dynamic password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor online transaction safety authentication method and system
  • Two-factor online transaction safety authentication method and system
  • Two-factor online transaction safety authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the above-mentioned purposes, features and advantages of the present invention more obvious and understandable, some preferred embodiments are specially cited below, and in conjunction with the accompanying drawings, the detailed description is as follows:

[0030] figure 1 It is a schematic diagram of a two-factor online transaction security authentication system according to an embodiment of the present invention. The two-factor online transaction security authentication system 100 includes an electronic device representing a user 110 - a client computer 111 and a mobile communication device 112 , and a transaction server 120 . Wherein the client computer 111 and the transaction server 120 are respectively connected to the Internet 130, and transmit data to each other through the Internet 130 to carry out information communication required for online transactions. In addition, the mobile communication device 112 is connected to the mobile communicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a two-factor online transaction safety authentication system. In the system, a transaction server is used to provide an online transaction service; a mobile communication device is used to receive short messages; a client computer uses a first verification function to communicate with the transaction server, receives a first verification code through short messages to verify the transaction server and uses a second verification function to generate a second verification code, and then the transaction server uses the second verification function and the second verification code to verify the client computer so as to achieve the aim of mutual authentication.

Description

technical field [0001] The present invention mainly relates to a security authentication technology, in particular to a two factor (two factor) online transaction security authentication method and system. Background technique [0002] With the popularization of the Internet and the rapid development of related applications, a part of traditional business activities has gradually shifted to online, and due to the convenience of online transactions, people can search online without going out. To obtain the desired goods and conduct transactions, so the number of online transactions has grown exponentially in recent years. However, online transactions are carried out remotely through the network, and the payment of transaction funds must rely on specific currency types, such as: credit card, debit card and other mechanisms, and the transaction data that must be transmitted through the network during the transaction process of the mechanism includes User data and payment data....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00H04L9/32
Inventor 吴瑞明洪嘉骏林志达赖欣怡
Owner INSTITUTE FOR INFORMATION INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products