Identity authentication method for security information exchange

A security information and identity authentication technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of malicious theft, poor convenience and versatility, and low security, and achieve a high degree of security. Ease of use and the effect of avoiding leakage

Active Publication Date: 2018-08-07
CHINA UNIONPAY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above existing technical solutions have the following problems: (1) For the first method, due to the need to use a specific hardware security device, the convenience and versatility are poor; (2) For the second method, due to the need The user's sensitive information (such as card number) is stored at the gateway of the service provider, and the SMS verification code has the risk of being intercepted and maliciously stolen by a Trojan horse, so the security is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for security information exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] figure 1 It is a flow chart of the key process of the identity authentication method for security information interaction according to the embodiment of the present invention. Such as figure 1 As shown, the identity authentication method for security information interaction disclosed in the present invention includes the following steps: (A1) The user obtains a security device containing a security chip from a service provider and performs an initialization operation to activate the security device; ( A2) The user initiates and completes the security information interaction process by means of the activated security device.

[0035]Preferably, in the identity authentication method for security information interaction disclosed in the present invention, the initialization operation includes combining information (such as card number) of at least one security information carrier (such as a bank card) of the user with the security The device is bound, and the binding rel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes an identity authentication method for security information interaction, which includes the following steps: the user acquires a security device containing a security chip from a service provider and performs an initialization operation to activate the security device; the user uses the security chip to activate the security device; The activated security device initiates and completes the security information exchange process. The identity authentication method for security information interaction disclosed by the invention has high security and is convenient to use.

Description

technical field [0001] The present invention relates to an identity authentication method, and more particularly, to an identity authentication method for security information interaction. Background technique [0002] At present, with the increasingly wide application of computers and networks and the increasing variety of business types in different fields, it is used for security information interaction (that is, information interaction with high security requirements, such as remote payment transaction processing in the financial field) Authentication methods are becoming more and more important. [0003] For the Internet-based remote security information interaction process, the existing technical solutions usually use the following two methods for user identity authentication: (1) The user uses a specific hardware security device (such as a USB key) issued by a service provider (such as a bank); , OTP token, etc.); (2) The user pre-connects the information associated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 赵海徐燕军李伟章明陈芳周皓周明
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products