Method and device for reducing risk of financial transaction
A financial transaction and financial technology, applied in the field of information security, can solve problems such as transaction password leakage, achieve the effect of improving security, preventing leakage, and reducing transaction risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] This embodiment provides a method for reducing financial transaction risks, which is applied to a system including a card reading chip and a financial IC card chip. Specifically, the financial IC card chip and the card reading chip can be packaged in different hardware devices, for example, respectively Packaged in a financial IC card and a card reading device; or, the financial IC card chip and the card reading chip are packaged in the same hardware device, for example, both are packaged in a financial IC card. Such as figure 1 As shown, the method includes:
[0031] Step S1, the card reading chip prepares to send to the data source of the financial IC card chip, and generates an application authentication ciphertext request including the data source sent to the financial IC card chip;
[0032] In this embodiment, the request to generate an application authentication ciphertext is specifically a request to generate an application authentication ciphertext in which the...
Embodiment 2
[0041] Such as figure 2 As shown, the present embodiment provides a method for reducing financial IC card transaction risks on the basis of Embodiment 1, including:
[0042] Step S11, the card reading chip is ready to be sent to the data source of the financial IC card chip;
[0043] Specifically, step S11 includes:
[0044] Step 1-1, the card reader chip obtains the default data element;
[0045] In this embodiment, the default data element specifically includes authorized amount, other amount, terminal country code, terminal verification result, transaction currency code, transaction date, transaction type and unpredictable number;
[0046] Step 1-2, the card reading chip splicing according to the default data elements to obtain the data source sent to the financial IC card chip;
[0047] In this embodiment, the card reading chip splices the authorized amount, other amounts, terminal country code, terminal verification result, transaction currency code, transaction date,...
Embodiment 3
[0087] Such as image 3 As shown, the present embodiment provides a method for reducing financial IC card transaction risks based on Embodiment 1 and Embodiment 2, and is applied to a system including a financial IC card chip, a card reader chip, a client and a card issuing bank authentication server, and the client It is a browser web page or an application program installed in a mobile terminal device such as a smart phone. The methods include:
[0088] Step 101, the client receives the user's transaction request and prompts the user to use a dynamic password for authentication;
[0089] Step 102, the card reading chip receives and generates a dynamic password request;
[0090] In this embodiment, the card-reading chip obtains the request for generating a dynamic password input by the user on the hardware device where the card-reading chip is located. For example, the hardware device where the card-reading chip is located is provided with physical buttons. Obtain the requ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com