CN115423456A - Zero-trust digital RMB payment system and safety protection method - Google Patents

Zero-trust digital RMB payment system and safety protection method Download PDF

Info

Publication number
CN115423456A
CN115423456A CN202211054399.2A CN202211054399A CN115423456A CN 115423456 A CN115423456 A CN 115423456A CN 202211054399 A CN202211054399 A CN 202211054399A CN 115423456 A CN115423456 A CN 115423456A
Authority
CN
China
Prior art keywords
message
payment
user
zero
trust
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211054399.2A
Other languages
Chinese (zh)
Inventor
孙运传
石玉峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Normal University
Shandong University
Original Assignee
Beijing Normal University
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Normal University, Shandong University filed Critical Beijing Normal University
Priority to CN202211054399.2A priority Critical patent/CN115423456A/en
Publication of CN115423456A publication Critical patent/CN115423456A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a zero trust digital RMB payment system and a safety protection method, comprising a payment APP, a zero trust payment gateway, a mobile payment server, a zero trust strategy management system and a risk information system; the method comprises the steps of authenticating a terminal, a person, an account and a payment platform in the mobile payment, continuously and credibly verifying the identity in the mobile payment, and continuously and credibly verifying the identity authentication certificate and the payment message by default, so that the content is controllable under the condition that the identity is completely forged, and each link of the payment is ensured to be credible.

Description

Zero-trust digital RMB payment system and safety protection method
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a zero-trust digital RMB payment system and a safety protection method.
Background
With the development of digital RMB, mobile payment and mobile transfer become a relatively normal financial activity mode in daily life of people. In the current mobile payment and transfer function, after a user account password is logged in and a transfer target account is filled, strong authentication is generally carried out through face or fingerprint identification, and the transfer is considered to be successful after the strong authentication is passed.
The current mobile transfer is to authenticate the user identity, and still has some risks: if the account password is divulged, the user is pretended to log in by an attacker; the fingerprint and the face identification information are maliciously stolen, so that a legal user is counterfeited and maliciously transferred accounts are carried out, and property loss is brought; mobile payments may also be subject to man-in-the-middle attacks where payment content is tampered with resulting in property loss for legitimate users; also legitimate users are tricked into transferring money to fraudulent accounts resulting in property loss. Therefore, how to improve the security of mobile payment transfer is always a problem for research of security enterprises and network security experts.
Disclosure of Invention
Based on the technical current situation, the invention aims to provide a zero-trust digital RMB payment system and a safety protection method, which are used for authenticating a terminal, a person, an account and a payment platform in mobile payment, continuously and truthfully verifying the identity in the mobile payment, and continuously and truthfully verifying both the default identity authentication certificate and the payment message without trusting, so that under the condition of completely forged identity, the content is controllable, and each link of payment is guaranteed to be trustable.
The technical scheme adopted by the invention is as follows: a zero-trust digital RMB-based mobile payment system comprises a payment APP, a zero-trust payment gateway, a mobile payment server, a zero-trust policy management system and a risk information system;
the payment APP is used for a user to register a terminal, supports authentication of a user account and the terminal, obtains user identification information and a credible label, is used for the user to actually operate mobile payment and mobile account transfer, and sends a credible verification message to a zero trust payment gateway;
the zero trust payment gateway is used for verifying the message, extracting user identification information after receiving the message, obtaining a trusted label of a user from the zero trust strategy management system according to the user identification information, performing trusted verification on the message by using the trusted label, and performing denoising restoration on the message;
the mobile payment server side provides mobile payment and mobile transfer capacity for the user;
the zero trust strategy management system is responsible for management of the terminal and the user account, binds the terminal and the user account after authentication, generates user identification information and a trusted tag for a user with a legal binding relation, and is responsible for issuing the trusted tag to a payment APP and the zero trust payment gateway;
and the risk information system is used for evaluating the risk of the transferred target account and sending risk evaluation information to the payment APP through the zero trust policy management system.
The zero trust strategy management system carries out risk monitoring and evaluation according to information change of a user, and enhanced identity confirmation is triggered when risk is monitored, wherein the information change comprises ip address change of the user and geographical position change of the user.
The credible verification message supported by the payment APP comprises an authentication message and a payment message of user identity, and the authentication message and the payment message comprise the following verification steps:
s1, paying APP to generate an original message pakData, calculating a hash value of the original message pakData and placing the hash value behind the original message pakData;
s2, taking the credible label as noise noiseData, adding the noise noiseData to the original message to obtain a middle message SecpakData, wherein the middle message SecpakData = pakData or noiseData;
s3, recalculating the hash value and placing the hash value behind the intermediate message to obtain a message to be sent, wherein the message content of the message to be sent is SecpakData;
s4, adding user identification information in message information of a message to be sent, then sending the message to a zero trust payment gateway, extracting the user identification information by the zero trust payment gateway, and acquiring corresponding noise noiseData according to the user identification information;
s5, message verification is carried out:
s5.1, verifying the correctness of the hash value of the content SecpakData of the message, and if the hash value of the content SecpakData of the message is correct, continuing to verify the message;
s5.2, acquiring original messages pakData = SecpakData or noiseData;
and S5.3, verifying the correctness of the hash value of the original message pakData, and if the hash value is correct, determining that the message is a credible message.
In addition, the invention also requests to protect a safety protection method based on zero trust digital RMB payment, which uses the zero trust digital RMB mobile payment system, and the method comprises the following steps:
the user registers a user account and a terminal, binds the user account and the terminal through authentication, generates a trusted tag and user identification information, and sends the trusted tag and the user identification information to a payment APP and a zero trust payment gateway;
when a user performs mobile transfer, an authentication message is sent to a zero trust payment gateway through a payment APP, the authentication message carries user identification information and adds a 'trusted label' to the content of the authentication message as noise, after the zero trust payment gateway receives the message, the user identification information in the message is extracted, the trusted label is extracted according to the user identification information, then message verification is performed, and the message is released after the verification is passed;
after a user inputs a paid account through a payment APP, a zero trust strategy management system acquires risk information of the paid account through a risk information system, if the risk is confirmed to exist, a payment user is informed, and the payment user stops transferring accounts;
and the zero trust strategy management system carries out risk monitoring and evaluation according to the information change of the user, triggers enhanced identity confirmation if the risk is monitored, and determines the illegal binding relationship if the enhanced identity confirmation fails to pass, and stops transferring accounts.
In the method, a user registers an account in a mobile phone bank or an online account and simultaneously registers a mobile terminal (a registered payment APP account), after the user logs in the terminal, the terminal authentication is firstly carried out, then the basic authentication of the user account is carried out, and after the authentication is passed, the binding relationship between the user account and the terminal is confirmed, namely the terminal and the user are bound.
In order to achieve the above object, the present invention further provides a security protection device for payment based on zero trust digital rmb, which is characterized by comprising:
at least one processor;
at least one memory for storing at least one program;
when executed by at least one processor, cause the at least one processor to implement a zero trust digital RMB based payment security method as described above.
To achieve the above object, the present invention further provides a computer storage medium having a program executable by a processor stored therein, wherein the program executable by the processor, when executed by the processor, implements a zero trust digital rmb-based payment security protection method as described above.
By adopting the technical scheme provided by the invention, the following technical advantages can be obtained:
(1) Based on the zero trust thought, the user account and the terminal are bound, so that the problem that the user can illegally and successfully log in after the account and the password are stolen is solved;
(2) Based on the zero trust thought, the credible verification of the biological authentication such as the strong authentication face and the fingerprint is realized, and the illegal payment transfer using by a malicious attacker in illegally stealing the information such as the fingerprint and the face is avoided;
(3) Based on the zero trust thought, the credible authentication of the payment message is realized, and the illegal transfer after the payment message is attacked by a man-in-the-middle is avoided.
Drawings
FIG. 1 is a zero trust digital RMB based mobile payment framework architecture of the present invention;
fig. 2 is a flow chart of message verification in the technical solution of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
It should be noted that although functional block divisions are provided in the system drawings and logical orders are shown in the flowcharts, in some cases, the steps shown and described may be performed in different orders than the block divisions in the systems or in the flowcharts. The terms first, second and the like in the description and in the claims, and the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
In the following description, suffixes such as "module", "part", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no peculiar meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
As shown in fig. 1, the invention is a zero trust digital rmb-based mobile payment framework structure, and a zero trust digital rmb-based mobile payment system includes a payment APP, a zero trust payment gateway, a mobile payment server, a zero trust policy management system, and a risk information system;
the payment APP is a user payment APP issued by a bank, supports a terminal and user authentication (obtaining user identification information and a trusted tag), mobile payment and mobile transfer, and supports strong authentication and trusted verification of a target account;
the zero trust payment gateway receives the trusted user identification information and the trusted label, extracts the user identification information after receiving the payment message, uses the trusted label to carry out trusted verification on the payment message, and carries out recovery (noise removal) on the payment message;
the mobile payment server is responsible for providing mobile payment and mobile transfer capacity for the user;
the zero trust strategy management system is mainly used for strategy management of zero trust trusted payment, is responsible for management of a terminal and a mobile payment account, and comprises the following steps: binding a terminal and an account; authenticating a terminal and an account, and generating user identification information for a legal user; risk monitoring assessment of the user (e.g., assessment based on user ip address changes, user geographical location changes); generating a credible tag of a legal user and issuing the credible tag to a payment APP and a zero trust payment gateway; credible verification of the transfer target account;
the risk information system, namely the account risk assessment system, assesses the risk of the transfer target account through the system, judges whether the account is a fraud account, specifically, the account related to fraud case report information from the society is listed as a risk list by depending on a public security organization anti-fraud platform or a financial transaction platform, and the account with received money exceeding a certain frequency is listed as a risk reminding account, so that the online financial security protection and the social financial security protection are combined.
Based on above-mentioned zero trust strategy management system of mobile payment system, the user registers the account at cell-phone bank or online, registers mobile terminal (register payment APP account) simultaneously, binds user terminal and user, and when the authentication, the user logs in mobile terminal, carries out terminal authentication first, then carries out user basic authentication (password authentication), confirms user and terminal binding relationship after the authentication passes, generates credible label and user identification information, and sends credible label and user identification information to payment APP and zero trust payment gateway.
The payment APP performs subsequent factor authentication on the user, such as 'face' authentication and 'fingerprint' authentication, the authentication message carries user identification information and adds a 'credible label' to the content of the authentication message as noise, malicious counterfeiting is avoided, in the subsequent 'face' authentication and 'fingerprint' authentication, noise extraction and identification are performed firstly, deep authentication is continued under legal conditions, specifically, after the zero trust payment gateway receives the message, the user identification information in the message is extracted, the credible label is extracted according to the user identification information, then message authentication is performed, and the authentication can be released.
Through the payment APP, the payment user informs the paid account to the zero trust policy management system, the zero trust policy management system acquires risk information of the paid account through the risk information system, and if the risk is confirmed to exist, the payment user is informed, and the payment user stops transferring accounts. Meanwhile, the zero trust policy management system carries out risk monitoring and evaluation on the behaviors of the payment user, such as carrying out continuous risk monitoring according to information of position, time, ip and the like, and triggering enhanced identity confirmation, such as video surface-to-surface authentication, when the risk is monitored.
The message verification comprises the credible verification of the authentication message and the payment message, and the flow is as follows:
paying APP to generate original message pakData, calculating a hash value of the original message pakData and placing the hash value behind the original message pakData, taking a credible label as noise noiseData, adding the noise noiseData to the original message to obtain a middle message SecpakData, wherein the middle message SecpakData = pakData or noiseData, recalculating the hash value and placing the hash value behind the middle message to obtain a message to be sent, wherein the message content of the message to be sent is SecpakData; adding user identification information in message information of a message to be sent, and then sending the message; the message reaches a zero trust payment gateway, the zero trust payment gateway extracts user identification information, acquires corresponding noise noiseData according to the user identification information, and then performs message verification; the message verification process comprises the following steps: (1) Verifying the correctness of the hash value of the message content SecpakData, and if the hash value of the message content SecpakData is correct, continuing to verify; (2) Acquiring an original message pakData = SecpakData or noiseData; (3) And verifying the correctness of the hash value of the original message pakData, and if the hash value is correct, determining the message to be a credible message.
In the terminal authentication, the user can be successfully authenticated only by using the registered terminal, otherwise, the zero trust policy management system judges that the binding relationship between the user and the terminal is illegal, and the continuous operation is prevented.
By the zero-trust digital RMB mobile payment system and the digital RMB payment safety protection method based on the payment system, disclosed by the invention, the phenomenon that an illegal user falsely logs in for transferring accounts due to the leakage of a user account and a password and the leakage of user fingerprint and face information can be avoided, property loss caused by man-in-the-middle attack is avoided through the credible verification of a payment message, and the risk evaluation is carried out on a transfer target account through a risk information system, so that the risk of transferring accounts to fraud accounts is reduced.
As will be seen in conjunction with the detailed description of the application and the examples given herein, the methods of the present application may be stored on or loaded onto a computer or other programmable data processing apparatus by way of computer program instructions, that may be provided to cause a machine, such computer program instructions implementing the functions specified in the flowchart flow or flows.
The methods of the present application may be stored on or loaded onto a computer or other programmable data processing apparatus by computer program instructions that cause the computer or other programmable data processing apparatus to perform a series of operational steps by reading the instructions to produce a computer-implemented process such that the execution of the instructions in the computer or other programmable data processing apparatus provides steps for implementing the functions specified in the flowchart flow or flows.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.

Claims (8)

1. A zero-trust digital RMB-based mobile payment system comprises a payment APP, a zero-trust payment gateway, a mobile payment server, a zero-trust policy management system and a risk information system;
the payment APP is used for a user to register a terminal, supports authentication of a user account and the terminal, obtains user identification information and a credible label, is used for the user to actually operate mobile payment and mobile account transfer, and sends a credible verification message to a zero trust payment gateway;
the zero trust payment gateway is used for verifying the message, extracting user identification information after receiving the message, obtaining a trusted label of a user from the zero trust strategy management system according to the user identification information, performing trusted verification on the message by using the trusted label, and performing denoising restoration on the message;
the mobile payment server side provides mobile payment and mobile transfer capacity for the user;
the zero trust strategy management system is responsible for management of the terminal and the user account, binds the terminal and the user account after authentication, generates user identification information and a trusted tag for a user with a legal binding relation, and is responsible for issuing the trusted tag to a payment APP and the zero trust payment gateway;
and the risk information system is used for evaluating the risk of the transferred target account and sending risk evaluation information to the payment APP through the zero trust policy management system.
2. The zero-trust digital RMB-based mobile payment system of claim 1, wherein the zero-trust policy management system performs risk monitoring and evaluation according to information changes of the user, and triggers enhanced identity confirmation if the risk is monitored, wherein the information changes comprise ip address changes of the user and geographical position changes of the user.
3. The zero-trust digital RMB-based mobile payment system of claim 1, further characterized in that the trusted verification messages supported by the payment APP comprise authentication messages and payment messages of user identity.
4. The zero-trust digital renminbi-based mobile payment system of claim 3, further characterized in that the authentication message and the payment message each comprise the following verification steps:
s1, paying APP to generate an original message pakData, calculating a hash value of the original message pakData and placing the hash value behind the original message pakData;
s2, taking the credible label as noise noiseData, adding the noise noiseData to the original message to obtain a middle message SecpakData, wherein the middle message SecpakData = pakData exclusive or noiseData;
s3, recalculating the hash value and placing the hash value behind the intermediate message to obtain a message to be sent, wherein the message content of the message to be sent is SecpakData;
s4, adding user identification information in message information of a message to be sent, then sending the message to a zero trust payment gateway, extracting the user identification information by the zero trust payment gateway, and acquiring corresponding noise noiseData according to the user identification information;
s5, message verification is carried out:
s5.1, verifying the correctness of the hash value of the content SecpakData of the message, and if the hash value of the content SecpakData of the message is correct, continuing to verify the message;
s5.2, acquiring original messages pakData = SecpakData or noiseData;
and S5.3, verifying the correctness of the hash value of the original message pakData, and if the hash value is correct, determining that the message is a credible message.
5. A zero trust digital rmb based payment security protection method using the zero trust digital rmb based mobile payment system of any one of claims 1 to 4, the method comprising:
the user registers a user account and a terminal, binds the user account and the terminal through authentication, generates a trusted tag and user identification information, and sends the trusted tag and the user identification information to a payment APP and a zero trust payment gateway;
when a user performs mobile transfer, an authentication message is sent to a zero trust payment gateway through a payment APP, the authentication message carries user identification information and adds a 'trusted label' to the content of the authentication message as noise, after the zero trust payment gateway receives the message, the user identification information in the message is extracted, the trusted label is extracted according to the user identification information, then message verification is performed, and the message is released after the verification is passed;
after a user inputs a paid account through a payment APP, a zero trust strategy management system acquires risk information of the paid account through a risk information system, if the risk is confirmed to exist, a payment user is informed, and the payment user stops transferring accounts;
and the zero trust strategy management system carries out risk monitoring and evaluation according to the information change of the user, triggers enhanced identity confirmation if the risk is monitored, and determines the illegal binding relationship if the enhanced identity confirmation fails to pass, and stops transferring accounts.
6. The method of claim 5, further characterized in that after the user logs in the terminal, the terminal authentication is firstly performed, then the basic authentication of the user account is performed, and after the authentication is passed, the binding relationship between the user account and the terminal is confirmed.
7. The utility model provides a pay safety device based on zero trust digital RMB, its characterized in that includes:
at least one processor;
at least one memory for storing at least one program;
when executed by at least one processor, cause the at least one processor to implement the zero trust digital RMB based payment security method of claim 5 or 6.
8. A computer storage medium having stored therein a processor-executable program, wherein the processor-executable program, when executed by the processor, implements the zero trust digital renminbi based payment security protection method of claim 5 or 6.
CN202211054399.2A 2022-08-30 2022-08-30 Zero-trust digital RMB payment system and safety protection method Pending CN115423456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211054399.2A CN115423456A (en) 2022-08-30 2022-08-30 Zero-trust digital RMB payment system and safety protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211054399.2A CN115423456A (en) 2022-08-30 2022-08-30 Zero-trust digital RMB payment system and safety protection method

Publications (1)

Publication Number Publication Date
CN115423456A true CN115423456A (en) 2022-12-02

Family

ID=84200114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211054399.2A Pending CN115423456A (en) 2022-08-30 2022-08-30 Zero-trust digital RMB payment system and safety protection method

Country Status (1)

Country Link
CN (1) CN115423456A (en)

Similar Documents

Publication Publication Date Title
JP4778899B2 (en) System and method for risk-based authentication
US11470116B2 (en) Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
CN104573547B (en) Information interaction safety precaution system and operation implementation method thereof
US20070043681A1 (en) Online transactions systems and methods
CN102739638B (en) Establishing privileges through claims of valuable assets
KR20070036125A (en) Network security and fraud detection system and method
WO2009055785A2 (en) Fraud detection using honeytoken data tracking
CN102611702B (en) A kind of system and method ensureing safety of network trade
CN105260890A (en) On-line secure payment method based on multi-domain user information big data analysis
CN111754237B (en) Verification method and device for transfer transaction
Mridha et al. A new approach to enhance internet banking security
CN104657860A (en) Mobile banking security authentication method
Wang et al. The evolutional view of the types of identity thefts and online frauds in the era of the Internet
CN116720839A (en) Financial information management method based on blockchain technology and supervision system thereof
US7991663B1 (en) System for volume and stress testing bank debit card processing systems
Abedin et al. Cyber Security in Banking Sector
Park et al. A study on secure authentication system using integrated user authentication service
CN115499508A (en) POS safety control system and method
CN115423456A (en) Zero-trust digital RMB payment system and safety protection method
WO2012155818A1 (en) Method and device for protecting user information based on credible resource
CN106060791A (en) Method and system for sending and obtaining short message verification code
Hewamadduma Detection and prevention of possible unauthorized login attempts through stolen credentials from a phishing attack in an online banking system
US11544714B2 (en) Apparatus, computer program and method of tracing events in a communications network
KR101586643B1 (en) Authentication method and server for providing e-finance for foreign resident
US20230376954A1 (en) An Electronic Device, Method and Computer Program Product for Instructing Performance of a Transaction which has been Requested at an Automated Teller Machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination