Multi-channel safety authenticating system and authenticating method based on U-Key

A security authentication, multi-channel technology, applied in the direction of transmission system, payment system structure, instrument, etc., can solve the problems of hidden dangers, difficult identification of bank authentication systems, hidden dangers of authentication methods, etc., to achieve the effect of ensuring security

Inactive Publication Date: 2012-12-12
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, at present, online banking transaction data is transmitted through the only Internet network channel, and the authentication of transactions is limited to the corresponding relationship between the digital signature of the U-Key and the bank account. This authentication method has great security risks.
First, if the user forgets to unplug the U-Key after completing the transaction, hackers or computer viruses will simulate the user's behavior and transfer the account funds; Illegal operations, so that the legitimacy of the identity of the U-Key holder cannot be guaranteed; third, the transaction data is transmitted on the public network, and the signed data also has the risk of being cracked and tampered with. The tampered data, Bank authentication system is also difficult to identify
Therefore, the existing method of ensuring the security of network transactions through a single U-Key has relatively large security risks. It is necessary to provide a multi-channel security authentication method to ensure the authenticity of data, the legitimacy of user identities, and transaction data. in line with the wishes of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-channel safety authenticating system and authenticating method based on U-Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with accompanying drawing and embodiment:

[0030] like figure 1 As shown, a U-Key-based multi-channel security authentication system is characterized in that:

[0031] On the basis of the existing U-Key, a GSM module is added. One side of the GSM module is connected to the main control chip of the U-Key, and the other side is connected to the user's mobile phone and the bank network server through the wireless network.

[0032] The U-Key has a display screen, which can echo transaction information such as transaction account and amount;

[0033] The U-Key also has a button for confirming or canceling the operation.

[0034] In the first channel, the user's transaction data is output through the USB interface after being authenticated by the U-Key signature, and sent to the bank server by the user's computer through the Internet network, and cached in the bank server; in the second channel, the digit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-channel safety authenticating system and an authenticating method based on a U-Key, aiming at ensuring safety of a network transaction; the authenticating system comprises the U-Key; a global system for mobile communications (GSM) module is added on the U-Key; one side of the GSM module is connected with a U-Key main control chip and the other is connected with a user mobile telephone and a bank network server through a wireless network; the U-Key comprises a display screen which is used for echoing a transaction account and amount transaction information, as well as a button for finishing an operation of confirming or canceling; data is transmitted to the user mobile telephone and the bank network server by the GSM module as authenticating a signature of the U-Key; with multi-channel transmission and multi-side authentication, risks that a user identity is falsely used and transmission data is interpolated are prevented; user transaction data is output by a USB (Universal Serial Bus) interface after authenticating a signature of the U-Key, and is then transmitted to a bank server by a user computer through a network and cached in the bank server; by checking and verifying the user identity and the transaction information through multiple channels, therefore, validity of the user identity and transmission security of the transaction data are effectively guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a U-Key-based multi-channel security authentication system and authentication method for ensuring network transaction security. Background technique [0002] With the popularization of financial activities such as online banking and online transactions, using the Internet for transactions has the characteristics of fast and convenient payment, and has been widely welcomed by users. However, the network is open, and the application systems and data in the network are attacked by many hackers and viruses, and the user's transaction data is easily stolen and tampered with. [0003] The existing popular terminal device for protecting user transaction security is U-Key, U-Key, full name USB Key, which is a hardware storage device with USB interface. The appearance of the USB Key is similar to that of an ordinary U disk. The difference is that it stores a single-chip micr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/42H04L29/08H04L29/06
Inventor 苏庆会董建强梁松涛张鲁国刘熙胖王科峰刘长河
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products