Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Financial terminal authentication method and device

A financial terminal and authentication method technology, applied in the field of financial terminal authentication methods and devices, can solve the problems of loss of security of other cards, hidden dangers in processing authentication information, and hidden dangers, so as to prevent the theft of authentication information, prevent theft, and protect The effect of privacy

Active Publication Date: 2017-08-08
HUNAN UNIV OF FINANCE & ECONOMICS
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, biometric features such as fingerprints and irises belong to personal privacy. When used for user identity authentication, improper use may easily cause privacy leakage and cause new security issues.
In order to solve the security problem of authentication information during storage and transmission, the main method currently used is to encrypt these information, such as patent 201110373961.3, which encrypts biological information and user private information through an encryption chip, but from the perspective of cryptography , due to the reversibility of encryption and decryption, there are still huge hidden dangers in the processing of authentication information using encryption. For example, people with ulterior motives can crack weaker passwords through exhaustive dictionary attacks and obtain confidential information of users. Steal user's property and personal privacy
In particular, in order to make the password simple and easy to remember, many users will use the same password to deal with different applications, such as multiple bank cards sharing a password, etc., and the biological characteristics of the same user are also fixed, regardless of whether the authentication information is encrypted. The authentication information of these bank cards is the same. Once the authentication information of one card is stolen, other cards will lose their security at the same time. Therefore, even if encryption is used to encrypt the authentication, there are still potential security risks in the entire authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial terminal authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. The examples are only used to illustrate the present invention, but not to limit the protection scope of the present invention. Considering that the current MD5 algorithm is one of the most widely used hash functions, and considering that the current fingerprint recognition technology is a very mature biometric authentication technology, the implementation of the present invention will be described below by taking the fingerprint and the MD5 algorithm as examples.

[0044] Such as figure 1 As shown, the present invention also discloses a financial terminal authentication device, which is installed in a teller terminal and a self-service terminal; the authentication device includes: a host, a financial card reading device, a biological information reading device and a keyboard, and the financial card reading device , The biological information rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a financial terminal authentication method and a financial terminal authentication device. Authentication information is generated in combination with a bank card number, biological characteristics and a conventional password, specifically, the authentication information is generated in combination with three parameters including the bank card number, the biological characteristics and the conventional password of a user by using a one-way hash function through an operation; the authentication information stored in a bank system server is neither the password and the biological information of the user nor the information of the encrypted password and the encrypted biological information; if any of the three parameters is different, the entirely different authentication information is generated; and the generated authentication information cannot be falsified and cannot be obtained through a password cracking method. According to the financial terminal authentication method and the financial terminal authentication device, the safety problem that the authentication information is stolen and cracked can be prevented, and the final authentication information generated by the same original authentication information such as the same password and the same biological information in a bank system are completely different, and thus the method is high in authentication safety.

Description

technical field [0001] The invention relates to the field of information security, in particular to a financial terminal authentication method and device. Background technique [0002] At present, when domestic bank card users conduct payment, transfer and other business processing on financial terminals, they usually use passwords to authenticate the user's identity. For example, credit card payment generally uses passwords for transactions by default, and passwords are also used to confirm users on ATMs. , but it is not safe enough to authenticate users with passwords alone. For example, if criminals steal the user's password through spying, coercion, etc., the criminals can steal the user's funds by cloning the user's bank card in a different place. Emerging in endlessly, bring security risks to users. What's more, criminals rob the user's bank card by coercion and other means, and then further coerce the user to reveal the password, and then illegally withdraw or trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06Q20/40
CPCG06F21/32G06Q20/40145
Inventor 谢建全
Owner HUNAN UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products