Debit credit transaction system with security loophole protection mechanism and method thereof

A transaction method and transaction system technology, applied in the field of debit and credit transaction systems, can solve the problems of not including terminal identification, malicious terminal attacks, etc., and achieve the effect of ensuring implementation and security

Active Publication Date: 2017-01-25
WUHAN TIANYU INFORMATION IND
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Moreover, the EMV protocol itself has a very important security loophole, that is, it does not contain terminal identification, which provides a door for attacks brought by malicious terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Debit credit transaction system with security loophole protection mechanism and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0035] An embodiment of the present invention provides a debit credit transaction system with a security breach protection mechanism, including:

[0036] A transaction terminal, which includes a transaction ID requesting unit, configured to request a transaction ID from the issuing bank server, the transaction terminal is provided with an interface device, and the IC card is connected to the transaction terminal through the interface device, for Cooperate with IC cards to complete financial transactions; install at transaction points, mainly including ATM machines and POS machines;

[0037] The card issuer server includes a transaction ID generating unit, which generates a transaction ID for participating in debit and credit transactions, and the card issuer server is used to issue IC cards, and through interaction with the transaction termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The system comprises a issuing bank server, where in a transaction ID generating unit is used for generating a transaction ID participating in a debit credit transaction; a transaction terminal, wherein a transaction ID request unit is used for requesting a transaction ID from the transaction ID generation unit; an IC card, wherein a ciphertext generating unit that generates an authorization request ciphertext ARQC based on the transaction ID encryption calculation; at the same time, the issuing bank server further comprises an authentication unit that analyzes the ARQC and obtains the verification ID and judges whether the debit credit transaction is safe by verifying whether the verification ID and the transaction ID match. The invention strengthens the direct authentication between the issuing bank server and the IC card, and effectively resists various malicious attacks.

Description

technical field [0001] The invention relates to the technical field of electronic equipment in the financial field, in particular to a debit credit transaction system and method with a security loophole protection mechanism. Background technique [0002] With the accelerated pace of industrialization and technology in the bank card market, it is an indisputable fact that the security risks in the bank card market are increasing, and this risk has spread from the cardholder's personal credit risk to the bank card business process In many links of the crime, the forms of crime are constantly being refurbished, and the means of crime are becoming more secretive. for example: [0003] 1) For PBOC transactions, the MITM (Man-In-The-Middle) attack in the PIN verification phase of the cardholder can make the terminal believe that the PIN has been verified correctly, and at the same time inform the IC card that there is no PIN input; [0004] 2) The pre-play attack against the ATM...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40G06Q40/02
CPCG06Q20/3823G06Q20/4012G06Q40/03
Inventor 王小芬熊传光胡瑞璟肖灵沈恺
Owner WUHAN TIANYU INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products