Identity authentication method for security information interaction

A security information and identity authentication technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as poor convenience and versatility, malicious theft, and low security, and achieve a high degree of ease of use, The effect of avoiding leakage and high security

Active Publication Date: 2015-10-14
CHINA UNIONPAY
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above existing technical solutions have the following problems: (1) For the first method, due to the need to use a specific hardware security device, the convenience and versatility are poor; (2) For the second method, due to the need The user's sensitive information (such as card number) is stored at the gateway of the service provider, and the SMS verification code has the risk of being intercepted and maliciously stolen by a Trojan horse, so the security is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for security information interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] figure 1 It is a flow chart of the key process of the identity authentication method for security information interaction according to the embodiment of the present invention. like figure 1 As shown, the identity authentication method for security information interaction disclosed in the present invention includes the following steps: (A1) The user obtains a security device containing a security chip from a service provider and performs an initialization operation to activate the security device; ( A2) The user initiates and completes the security information interaction process by means of the activated security device.

[0035]Preferably, in the identity authentication method for security information interaction disclosed in the present invention, the initialization operation includes combining information (such as card number) of at least one security information carrier (such as a bank card) of the user with the security The device is bound, and the binding relati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method for security information interaction. The method comprises the following steps: a user acquiring security equipment containing a security chip from a service provider and executing an initialization operation to activate the security equipment; the user initiating and finishing the security information interaction process in virtue of the activated security equipment. The identity authentication method for security information interaction disclosed by the invention is high in security and convenient for use.

Description

technical field [0001] The present invention relates to an identity authentication method, and more particularly, to an identity authentication method for security information interaction. Background technique [0002] At present, with the increasingly wide application of computers and networks and the increasing variety of business types in different fields, it is used for security information interaction (that is, information interaction with high security requirements, such as remote payment transaction processing in the financial field) Authentication methods are becoming more and more important. [0003] For the Internet-based remote security information interaction process, the existing technical solutions usually use the following two methods for user identity authentication: (1) The user uses a specific hardware security device (such as a USB key) issued by a service provider (such as a bank); , OTP token, etc.); (2) The user pre-connects the information associated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 赵海徐燕军李伟章明陈芳周皓周明
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products