Safe E-bank implementation method

An implementation method and safety net technology, which is applied in the field of secure transfer system and e-commerce payment, can solve the problems of stealing and misappropriating private keys and digital certificates in USBKEY, and achieve the effect of increasing security, making small changes and achieving great results

Inactive Publication Date: 2014-06-11
吴伟峰
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the advancement of network and hacker technology, the private key and digital certificate in the USBKEY may still be stolen during the operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe E-bank implementation method
  • Safe E-bank implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 , 2 As shown, an implementation method of secure online banking combined with a mobile terminal, the specific implementation steps are as follows:

[0020] 101: The user enters the personal account number and network login password (or dynamic password) through the Internet;

[0021] 102: After receiving the user's input of the network login password, the online banking system automatically sends a randomly generated dynamic mobile phone login password to the user's registered mobile phone number;

[0022] 103: The user logs in to the online banking client through the mobile phone, enters the received dynamic mobile phone login password, and the system verifies that the mobile phone login password and the mobile phone number that sent the mobile phone login password are correct, then successfully logs in to the online banking transaction interface and enters step 104; If the login password or the mobile phone number sending the mobile login password i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal combined safe E-bank implementation method which comprises the following implementation steps: a cellphone login password authentification step is additionally added based on original dynamic coded lock and USB KEY, a user needs to use a cellphone to log in a cellphone E-bank client through a specific cellphone number and input an instantly-received dynamic cellphone login password for verification, and the user can successively log in the world-wide-web terminal and continue to operate the E-bank system only if the verification password is errorless. The principle of the safe E-bank implementation method provided by the invention is that mobile communications and the world-wide-web adopt different and individual networks for login and a dynamic password is used for verification. Thus, the possibility that a relative secret key is disclosed or stolen is reduced greatly, and E-bank operation safety is raised.

Description

technical field [0001] The invention relates to the field of information security, and is suitable for a safe transfer system of network banks and an e-commerce payment method. Background technique [0002] With the rapid development of e-commerce and the Internet, the amount of online transactions in Internet banking (referred to as Internet banking) continues to expand, and the problem of network transaction security has become increasingly prominent. At present, in the process of online banking transactions, dynamic password locks and USBKEYs are generally used as user identity authentication technologies at home and abroad. [0003] The dynamic password lock includes two elements: one is the static PIN code (identification code), which is set and kept by the user; the other is the dynamic password, which is randomly generated by the dynamic password card, is unpredictable, and is synchronized with the access control of the background server After the dynamic password is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L9/32H04L29/06
CPCG06Q20/38G06F21/00G06F21/34G06F21/42H04L63/083H04L63/0853H04L63/18G06Q20/3823
Inventor 吴伟峰
Owner 吴伟峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products