Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for reducing risk of financial transaction

A financial transaction and financial technology, applied in the field of information security, can solve problems such as transaction password leakage, achieve the effect of improving security, preventing leakage, and reducing transaction risks

Active Publication Date: 2018-06-22
FEITIAN TECHNOLOGIES
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, some transactions on the website or by telephone still require the user to provide the account number and transaction password of the financial IC card, and there is a risk of transaction password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for reducing risk of financial transaction
  • Method and device for reducing risk of financial transaction
  • Method and device for reducing risk of financial transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment provides a method for reducing financial transaction risks, which is applied to a system including a card reading chip and a financial IC card chip. Specifically, the financial IC card chip and the card reading chip can be packaged in different hardware devices, for example, respectively Packaged in a financial IC card and a card reading device; or, the financial IC card chip and the card reading chip are packaged in the same hardware device, for example, both are packaged in a financial IC card. Such as figure 1 As shown, the method includes:

[0031] Step S1, the card reading chip prepares to send to the data source of the financial IC card chip, and generates an application authentication ciphertext request including the data source sent to the financial IC card chip;

[0032] In this embodiment, the request to generate an application authentication ciphertext is specifically a request to generate an application authentication ciphertext in which the...

Embodiment 2

[0041] Such as figure 2 As shown, the present embodiment provides a method for reducing financial IC card transaction risks on the basis of Embodiment 1, including:

[0042] Step S11, the card reading chip is ready to be sent to the data source of the financial IC card chip;

[0043] Specifically, step S11 includes:

[0044] Step 1-1, the card reader chip obtains the default data element;

[0045] In this embodiment, the default data element specifically includes authorized amount, other amount, terminal country code, terminal verification result, transaction currency code, transaction date, transaction type and unpredictable number;

[0046] Step 1-2, the card reading chip splicing according to the default data elements to obtain the data source sent to the financial IC card chip;

[0047] In this embodiment, the card reading chip splices the authorized amount, other amounts, terminal country code, terminal verification result, transaction currency code, transaction date,...

Embodiment 3

[0087] Such as image 3 As shown, the present embodiment provides a method for reducing financial IC card transaction risks based on Embodiment 1 and Embodiment 2, and is applied to a system including a financial IC card chip, a card reader chip, a client and a card issuing bank authentication server, and the client It is a browser web page or an application program installed in a mobile terminal device such as a smart phone. The methods include:

[0088] Step 101, the client receives the user's transaction request and prompts the user to use a dynamic password for authentication;

[0089] Step 102, the card reading chip receives and generates a dynamic password request;

[0090] In this embodiment, the card-reading chip obtains the request for generating a dynamic password input by the user on the hardware device where the card-reading chip is located. For example, the hardware device where the card-reading chip is located is provided with physical buttons. Obtain the requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for reducing the risk of a financial transaction. The method comprises the steps that a card reader chip prepares a data source to be sent to a financial ICchip, and a request for generating application authentication ciphertext including the data source is generated; the card reader chip sends the request for generating the application authentication ciphertext to the financial IC chip; the card reader chip receives response data, containing the application authentication ciphertext, returned by the financial IC chip; the card reader chip conductscompression, scrambling and conversion on the response data to obtain a dynamic password; the card reader chip outputs the dynamic password to complete the financial transaction. The method and devicehave the advantages that the transaction password can be prevented from being exposed in an unsafe environment in the process of using a financial IC for transactions, the transaction password is prevented from being leaked, the transaction risk is reduced, and the transaction security is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for reducing financial transaction risks. Background technique [0002] With the continuous improvement of the financial industry's informatization level, the financial industry's requirements for security levels are also increasing. Major banks at home and abroad are rushing to launch financial IC cards to completely replace traditional magnetic stripe cards. Financial IC card, also known as chip bank card, is a bank card with a chip as the medium. The chip card has a large capacity and can store information such as keys, digital certificates, and fingerprints. After loading display technologies such as electronic paper, it can display electronic cash balances , transaction details and custom data of the issuing bank and other non-sensitive information. However, in the prior art, some transactions on the website or by telephone still require the user to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07F7/08G07F7/10G07F7/12G06Q20/34G06Q20/38
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products