Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Financial terminal authentication method and device

A financial terminal and authentication method technology, applied in the field of financial terminal authentication methods and devices, can solve problems such as loss of security of other cards, hidden dangers of authentication information processing, hidden safety hazards, etc., to prevent authentication information from being embezzled, prevent embezzlement, and protect Privacy Effects

Active Publication Date: 2016-10-12
HUNAN UNIV OF FINANCE & ECONOMICS
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, biometric features such as fingerprints and irises belong to personal privacy. When used for user identity authentication, improper use may easily cause privacy leakage and cause new security issues.
In order to solve the security problem of authentication information during storage and transmission, the main method currently used is to encrypt these information, such as patent 201110373961.3, which encrypts biological information and user private information through an encryption chip, but from the perspective of cryptography , due to the reversibility of encryption and decryption, there are still huge hidden dangers in the processing of authentication information using encryption. For example, people with ulterior motives can crack weaker passwords through exhaustive dictionary attacks and obtain confidential information of users. Steal user's property and personal privacy
In particular, in order to make the password simple and easy to remember, many users will use the same password to deal with different applications, such as multiple bank cards sharing a password, etc., and the biological characteristics of the same user are also fixed, regardless of whether the authentication information is encrypted. The authentication information of these bank cards is the same. Once the authentication information of one card is stolen, other cards will lose their security at the same time. Therefore, even if encryption is used to encrypt the authentication, there are still potential security risks in the entire authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial terminal authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. The examples are only used to illustrate the present invention, but do not limit the protection scope of the present invention. Considering that the current MD5 algorithm is one of the most widely used hash functions, and considering that the current fingerprint identification technology is a very mature biometric authentication technology, the following uses fingerprint and MD5 algorithm as examples to illustrate the implementation of the present invention.

[0044] like figure 1 As shown, the present invention also discloses a financial terminal authentication device, which is arranged in the teller terminal and the self-service terminal; the authentication device includes: a host, a financial card reading device, a biological information reading device and a keyboard, the financial card reading device , The biological information readi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a financial terminal authentication method and a financial terminal authentication device. Authentication information is generated in combination with a bank card number, biological characteristics and a conventional password, specifically, the authentication information is generated in combination with three parameters including the bank card number, the biological characteristics and the conventional password of a user by using a one-way hash function through an operation; the authentication information stored in a bank system server is neither the password and the biological information of the user nor the information of the encrypted password and the encrypted biological information; if any of the three parameters is different, the entirely different authentication information is generated; and the generated authentication information cannot be falsified and cannot be obtained through a password cracking method. According to the financial terminal authentication method and the financial terminal authentication device, the safety problem that the authentication information is stolen and cracked can be prevented, and the final authentication information generated by the same original authentication information such as the same password and the same biological information in a bank system are completely different, and thus the method is high in authentication safety.

Description

technical field [0001] The invention relates to the field of information security, in particular to a financial terminal authentication method and device. Background technique [0002] At present, when domestic bank card users make payment, transfer and other business processing on financial terminals, they generally use password to authenticate the user's identity. For example, credit card payment is generally defaulted to transaction by password, and the ATM machine also uses password to confirm the user's identity. , but it is not secure enough to authenticate users with passwords alone. For example, if criminals steal the user's password through voyeurism, coercion, etc., the criminals can clone the user's bank card in a remote location, and then steal the user's funds by stealing the user's password. This kind of incident Emerging in an endless stream, it brings security risks to users. What's more, after the criminals rob the user's bank card through coercion and oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06Q20/40
CPCG06F21/32G06Q20/40145
Inventor 谢建全
Owner HUNAN UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products