Safety verification method, platform, device and system

A security verification and platform technology, applied in the field of security verification methods and systems, can solve the problems of biometric information being stolen or forged and difficult to detect, hidden dangers, and high hardware requirements

Active Publication Date: 2017-07-28
CHINA UNIONPAY
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method has the following disadvantages: (1) biometric information such as fingerprints and voiceprints are easily stolen and forged, and hardware devices are required to support the collection of biometric information, which requires high hardware requirements; (2) users The stolen or forged biometric information is not easy to be detected, resulting in the theft or forger can use this method to apply for a large number of cards, resulting in continuous loss of user property; (3) There is no mechanism to block illegal activities
This has caused great security risks for the card-issuing stage of cardless payment and the subsequent transaction stage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method, platform, device and system
  • Safety verification method, platform, device and system
  • Safety verification method, platform, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Illustrative examples of the invention will now be described with reference to the drawings, wherein like reference numerals refer to like elements. Each example described below helps those skilled in the art to thoroughly understand the present invention, and each example is intended to be an illustration rather than a limitation. The diagrams of the components, components, modules, devices and equipment bodies in the figure only schematically indicate the existence of these components, components, modules, devices and equipment bodies, and also indicate the relative relationship between them, but are not intended to limit their specific Shape; the relationship of each step in the flow chart is not limited to the order given, and can be adjusted according to actual applications without departing from the scope of protection of the present application.

[0033] figure 1 is a schematic block diagram of a security verification system according to an example of the presen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety verification method. The safety verification method includes: receiving a service request from a user, wherein the service request includes user information and device information; creating a current device fingerprint on the basis of the device information; acquiring a device fingerprint list, wherein the device fingerprint list includes pre-stored device fingerprints of all the devices associated with the user; comparing the current device fingerprint and the device fingerprint list; and determining that the service request passes through safety verification when at least one items of the current device fingerprint and the device fingerprint list match each other, wherein the device information includes a device hardware parameter and device use information data, and the device fingerprint is a device model which is created according to the device hardware parameter and the device use information data. The invention provides a corresponding safety verification platform, a corresponding safety verification method which is implemented on a user device, a corresponding safety verification device, and a safety verification system.

Description

technical field [0001] The present invention generally relates to the technical field of bank card security, and in particular, relates to a security verification method and system related to applications such as card-not-present payment. Background technique [0002] With the popularity of virtualized transactions, the banking system is also increasingly experimenting with card-not-present payments. In the case of non-card payment, there are typically two ways to put the bank card in the mobile phone: one is when there is no physical card, the user applies to the bank for "air card issuance" through a specific mobile application, After the bank conducts identity verification, it will load all the information of a financial IC card to the SIM card or SD card of the user's mobile phone; the other is to apply for a virtual card from the issuing bank when there is an existing physical card. account, the issuing bank issues a virtual card to the user based on token technology. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44H04L29/06
CPCG06F21/44H04L63/0876
Inventor 童耀刚郑建宾周钰张玉风
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products