USB Key safety control method and device

A technology of security control and duration, applied in the field of identity authentication, can solve the problems of not fully guaranteeing the security of user funds, too long content, unable to display the transfer object and transfer amount, etc., so as to reduce the risk of fraud and improve the effect of security.

Pending Publication Date: 2022-05-27
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under special circumstances, the USB Key cannot fully guarantee the safety of the user's funds. For example, the customer's computer may be controlled by a hacker, causing the screen to go out, and information such as the transfer recipient and the transfer amount cannot be displayed, and it is difficult for the user to check the above content; Or because the content of the transfer object and transfer amount is too long, the user does not carefully check whether the above content has been tampered with, and then clicks to continue the transaction, resulting in money loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB Key safety control method and device
  • USB Key safety control method and device
  • USB Key safety control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The embodiments of the present application will be described in detail below with reference to the accompanying drawings and examples, so as to fully understand and implement the implementation process of how to apply technical means to solve technical problems and achieve technical effects in the present application. It should be noted that, as long as there is no conflict, the various embodiments in this application and various features in each embodiment can be combined with each other, and the formed technical solutions are all within the protection scope of this application.

[0028] Additionally, the steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although shown in a logical order in the flowcharts, in some cases, may be executed differently The steps shown or described are performed in the order shown herein.

[0029] Please refer to figure 1 As shown, a USB Key security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a USB Key safety control method and device, relates to the field of identity authentication, can be applied to the financial field, the information safety field and other fields, and comprises the following steps: obtaining a trigger instruction generated by a USB Key connection terminal, and extracting a transaction request according to the trigger instruction to obtain transaction information; generating audio prompt data according to the transaction information, triggering a duration monitoring process through the audio prompt data, and prompting the corresponding transaction information through voice; monitoring the operation duration of inputting a confirmation transaction instruction by a user according to the transaction information prompted by the voice through the duration monitoring process; and performing validity analysis on the transaction confirmation instruction by using the operation duration to obtain an analysis result, and processing the transaction request according to the analysis result and the transaction confirmation instruction.

Description

technical field [0001] The present application relates to the field of identity authentication and can be applied to the financial field, the information security field and other fields, in particular, to a USB Key security control method and device. Background technique [0002] In recent years, with the development of e-banking related technologies, criminals' attack methods have been continuously upgraded, such as obtaining sensitive customer information through illegal means, bypassing static password and SMS verification code authentication, cracking face recognition, and stealing customer funds. In order to ensure the security of user funds, the security control of important links such as login, transfer, and payment is particularly important. Many banks' electronic banking systems (such as online banking, mobile banking, etc.) need to use USB Key to authenticate the user's identity before logging in. or make important transactions. However, under special circumstance...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/401
Inventor 吴鸿霖姜城叶红金驰
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products