System and method for realizing identity identification and data authentication based on security medium confidential short message

A technology of data authentication and security media, applied in digital transmission systems, secure communication devices, user identity/authority verification, etc., can solve the problems of low convenience and adaptability, malicious attacks, malicious forwarding, etc., and reduce interception and the risk of tampering attacks, enhancing authentication security, and improving transaction security

Pending Publication Date: 2017-05-10
北京博惠城信息科技有限公司
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of micropayments, the identity authentication method of SMS verification code is generally used at present. The advantages of this method are high convenience, low cost, and easy popularization. However, this method has great security risks: Encryption technology is not used in the sending process, which is prone to risks such as SMS in-transit attack, malicious forwarding, SMS interception, and SMS tampering. Moreover, the customer who receives the SMS cannot be guaranteed to be the customer himself. Once the mobile phone card is copied or the verified SMS is hijacked and forwarded, then It will lead to illegal theft of the user'

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing identity identification and data authentication based on security medium confidential short message
  • System and method for realizing identity identification and data authentication based on security medium confidential short message
  • System and method for realizing identity identification and data authentication based on security medium confidential short message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] The present invention provides a system for realizing identity authentication and data authentication based on secure medium and confidential short messages. It mainly realizes the interaction with the function-expanded SIM card through the method based on the security data short message. The server side establishes a secure transmission channel, and fully utilizes the function to expand the SIM card hardware signature security mechanism. At the same time, the STK program is introduced in the transactio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and method for realizing identity identification and data authentication based on a security medium confidential short message. The system comprises a function extension SIM card, a mobile terminal application program, and a cloud-side server, wherein the function extension SIM card comprises a security chip, a buzzer, and an indicator light, wherein the security chip is formed by integrating a control module and a security processing module; a JAVA-based platform operation system, an authentication application, a STK application and a multi-application management platform are installed in the function extension SIM card; the cloud-side server comprises an authentication server, a CA server and a business server; the authentication server is used for managing the authentication application; the CA server is used for generating and managing a certificate; the business server is used for managing the third-party application; the JAVA-based platform operation system is used for providing operating environment and an API interface; the multi-application management platform is used for the security and management of the authentication application and the STK application; the authentication application is used for performing signature authentication; and the STK application is used for the input-output of the data in the function extension SIM card.

Description

technical field [0001] The invention relates to the technical field of mobile payment security communication, in particular to a system and method for realizing identity authentication and data authentication based on a security medium and a secret short message. Background technique [0002] In the context of the rapid development of Internet finance, mobile Internet is penetrating into various industries. With the popularity of mobile phones and other mobile terminals and the maturity of the mobile payment market, more and more users choose to handle financial services on the mobile terminal. At the same time, when handling financial services on mobile terminals, user identity authentication and data authentication are the first link to ensure the security of financial applications and the basis of other security mechanisms. It has become a key problem to be solved urgently in mobile Internet finance. [0003] Based on the existing mobile phone baseband chips, most mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32G06Q20/38G06Q20/40
CPCH04L9/3215H04L9/3249H04L9/3263H04L63/0823H04L63/0838H04L63/18G06Q20/38215G06Q20/3825G06Q20/401
Inventor 王东芳
Owner 北京博惠城信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products