Method and device for verifying reliability of identity of financial card user

A user identity and financial card technology, applied in the field of information security, can solve problems such as leakage, easy loss, and increase user costs, and achieve the effect of avoiding security risks, protecting information security, and improving security.

Active Publication Date: 2016-08-24
GRG BAKING EQUIP CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in the financial field, transactions such as mobile banking login, transfer, inquiry, and wealth management all face identity verification. At present, some banks use the U-Shield additionally issued by the bank to verify the legality of the user's identity when transferring money through mobile banking. Not only It increases the cost, and the U-shield needs to be carried with you, which is easy to lose, which increases the difficulty for users to use
There are also other fields, such as personal credit information platforms, which require bank cards, USB-shields and mobile phones to verify the legitimacy of user identities. If users do not apply for USB-shields, there will be a certain risk of leakage
In addition, in the field of mobile payment, it also faces the problem of verifying the legality of user identity
[0003] For mobile devices, transactions such as mobile online banking, shopping payment, and transfers all face the problem of user identity verification. Some only use user names and passwords to verify, and some use SMS to send verification codes. These methods are very easy. It is intercepted, and the mobile phone is also easy to be stolen. Some users verify the legitimacy of the user's identity through the bank's U-shield or the issuance of an encryption module, which not only increases the difficulty of carrying the user, but also increases the cost of the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying reliability of identity of financial card user
  • Method and device for verifying reliability of identity of financial card user
  • Method and device for verifying reliability of identity of financial card user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0054] figure 1 A schematic diagram of the working environment in one embodiment of the present invention is shown. The working environment involves a financial card 101 (such as a financial IC card, or a financial card with an information storage function), a terminal 102 (such as a smart phone), and a card issuer server 103, and may also involve a cloud payment platform 100. The field communication method (NFC) interacts with the terminal 102 to realize the verification of the identity reliability of the financial card 101 party. The terminal 102 directly interacts wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for verifying reliability of an identity of a financial card user. The method comprises the steps that response data required by a financial card is sent to the financial card; interactions are implemented to the financial card, so that card number information and ciphertext response information of first application ciphertext are obtained; transaction password information input by the user is received; the ciphertext response information, the transaction password information and the response data are sent to a card issuer server; interactions are carried out to the card issuer server, so that a first authentication result and first authentication data are obtained; the first authentication data is sent to the financial card; a second authentication result is obtained after verification of the financial card based on the first authentication data; and legality of the user identity is determined according to the first authentication result and the second authentication result. The scheme provided by the embodiment of the invention has the advantages that the verification of the user identity and issuance can be carried out conveniently, rapidly and reliability without use of extra hardware equipment; safety ricks caused by frauds are avoided; and information safety is protected.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for verifying the reliability of a financial card user identity and a device for verifying the reliability of a financial card user identity. Background technique [0002] With the continuous improvement of computer networks and the maturity of the Internet data service industry chain, the number of mobile phone Internet users continues to increase, and the verification of user identity reliability is also facing severe challenges. For example, in the financial field, transactions such as mobile banking login, transfer, inquiry, and wealth management all face identity verification. At present, some banks use the U-Shield additionally issued by the bank to verify the legality of the user's identity when transferring money through mobile banking. Not only The cost is increased, and the U-shield needs to be carried around, which is easy to lose, which increases the diffi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06Q20/32
CPCG06Q20/3278H04L63/0428H04L63/083H04L67/60G06Q20/40
Inventor 陈明宇熊飞张雲瑞
Owner GRG BAKING EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products