CN116527363A - Method, device, equipment, medium and program product for safety authentication of internet banking - Google Patents

Method, device, equipment, medium and program product for safety authentication of internet banking Download PDF

Info

Publication number
CN116527363A
CN116527363A CN202310507796.9A CN202310507796A CN116527363A CN 116527363 A CN116527363 A CN 116527363A CN 202310507796 A CN202310507796 A CN 202310507796A CN 116527363 A CN116527363 A CN 116527363A
Authority
CN
China
Prior art keywords
authentication
information
banking
password
bank
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310507796.9A
Other languages
Chinese (zh)
Inventor
石旭东
张文文
罗旭东
邢向远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310507796.9A priority Critical patent/CN116527363A/en
Publication of CN116527363A publication Critical patent/CN116527363A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides an online banking security authentication method, device, electronic equipment, medium and computer program product based on a mobile phone banking soft token. The method and the device can be used in the technical field of information security. Acquiring opening registration information of a soft token which is opened in advance from a mobile phone bank; responding to a transaction authentication request of a user with an opened soft token at an online bank, and generating an authentication instruction according to the transaction authentication request information; sending an authentication notification to a mobile banking according to the authentication instruction; acquiring authentication information fed back by a mobile phone bank in response to an authentication notification; obtaining a first authentication result according to the opening registration information and the transaction authentication request information; the first authentication result is sent to a mobile phone bank, and a second authentication result fed back by the mobile phone bank in response to the first authentication result is obtained; and sending the second authentication result to the internet banking.

Description

Method, device, equipment, medium and program product for safety authentication of internet banking
Technical Field
The present disclosure relates to the field of information security technologies, and in particular, to an online banking security authentication method, apparatus, electronic device, medium, and computer program product based on a mobile banking soft token.
Background
At present, high-risk transactions such as large transfers and the like are carried out by an online bank, and entity security medium authentication is needed, for example, an electronic cipher device or a U shield and the like are used. The main process of entity security medium authentication is as follows: when a user executes high-risk transactions such as transfer remittance and password modification at an online bank, the user enters an authentication page after submitting the high-risk transactions, if an electronic cipher device is used, the user needs to input the startup password of the electronic cipher device, clicks the acquisition time type password or inputs a transaction element, clicks the acquisition element type password, and submits the acquired element type password to the background to complete an authentication process; if the U shield is used, the user needs to insert the U shield into the computer and input a password to start the computer, confirms transaction information from the U shield and clicks and confirms to submit to the background to finish authentication. It will be appreciated that the physical security media is inconvenient to carry and is subject to loss, and therefore the manner in which the physical security media is authenticated is subject to user complaints.
Disclosure of Invention
In view of this, the present disclosure provides a method, an apparatus, an electronic device, a computer readable storage medium and a computer program product for online banking security authentication based on a mobile phone banking soft token, which are convenient, labor-saving and safe.
An aspect of the present disclosure provides an online banking security authentication method based on a mobile banking soft token, which is applied to an electronic banking server, wherein the electronic banking includes a mobile banking and an online banking, and is characterized in that the method includes: acquiring opening registration information of a soft token which is opened in advance from a mobile phone bank, wherein the opening registration information comprises the mapping relation of equipment information, a client number and an authentication password of the mobile phone bank; responding to a transaction authentication request of a user with an opened soft token at an online bank, and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number; sending an authentication notification to a mobile banking according to the authentication instruction; acquiring authentication information fed back by a mobile phone bank in response to the authentication notification, wherein the authentication information comprises the opening registration information and the transaction authentication request information; obtaining a first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing; the first authentication result is sent to a mobile phone bank, and a second authentication result fed back by the mobile phone bank in response to the first authentication result is obtained, wherein the second authentication result comprises a new authentication password and authentication pass or comprises a new authentication password and authentication fail; and sending the second authentication result to an online bank.
According to the online banking security authentication method based on the mobile phone bank soft token, the online banking is interacted with the electronic banking server, and the electronic banking server is interacted with the mobile phone bank, so that the mobile phone bank can conduct transaction authentication for online banking transactions through the pre-opened soft token. Therefore, the online banking security authentication method based on the mobile phone banking soft token can achieve the purpose that the online banking security transaction can be completed without an entity security medium, and is trouble-saving, time-saving and labor-saving, so that user transaction experience can be improved.
In some embodiments, the mobile phone bank includes a mobile phone bank client and a mobile phone bank server, and the mobile phone bank pre-opens the soft token, including: binding equipment information and client information according to the acquired soft token opening request by the mobile banking client side, and sending the bound equipment information and client information to a mobile banking server side, wherein the soft token opening request comprises the client information; the mobile banking server generates token information of a soft token according to the equipment information and the client information and sends the token information to a mobile banking client, wherein the token information comprises a mapping relation among the equipment information, the client information and a token number; the mobile banking client activates the soft token according to the token information, generates an authentication password, and sends the authentication password to a mobile banking server; and the mobile banking server authenticates the authentication password, generates the opening registration information of the soft token when the authentication is successful, and sends the opening registration information to the electronic banking server.
In some embodiments, the mobile banking client activates the soft token according to the token information to generate an authentication password, including: the mobile banking client side sends an activation instruction to the mobile banking server side according to the token information; the mobile banking server generates an activation code and a verification code according to the activation instruction, and sends the activation code and the verification code to the mobile banking client; and the mobile banking client responds to the activation code, a popup window input box, responds to the verification code input in the input box, a popup window password setting box and responds to the password input in the password setting box, and an authentication password is generated.
In some embodiments, the popup password setting box is configured to generate an authentication password in response to the authentication code entered in the input box, and to invoke a software development kit operation in response to the password entered in the password setting box.
Another aspect of the present disclosure provides an online banking security authentication device based on a mobile banking soft token, which is applied to an electronic banking server, wherein the electronic banking includes a mobile banking and an online banking, and the device includes: the mobile phone comprises a first acquisition module, a second acquisition module and a first control module, wherein the first acquisition module is used for executing acquisition of opening registration information of a pre-opened soft token from a mobile phone bank, and the opening registration information comprises mapping relation of equipment information, a client number and an authentication password of the mobile phone bank; the first generation module is used for executing a transaction authentication request of a user responding to the opened soft token at an online bank and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number; the first sending module is used for executing the authentication instruction and sending an authentication notification to a mobile phone bank; the second acquisition module is used for executing the acquisition of authentication information fed back by the mobile phone bank in response to the authentication notification, wherein the authentication information comprises the opening registration information and the transaction authentication request information; the determining module is used for executing the first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing; the third acquisition module is used for sending the first authentication result to a mobile phone bank and acquiring a second authentication result fed back by the mobile phone bank in response to the first authentication result, wherein the second authentication result comprises a new authentication password and authentication pass or comprises a new authentication password and authentication fail; and the second sending module is used for sending the second authentication result to the internet banking.
Another aspect of the present disclosure provides an online banking security authentication method based on a mobile banking soft token, applied to a mobile banking, an electronic banking including the mobile banking and the online banking, the method including: transmitting the opening registration information of the opened soft token to an electronic bank server in advance; receiving an authentication notification of the electronic bank server, wherein the authentication notification carries transaction authentication request information; responding to the authentication notification, and feeding back authentication information to the electronic bank server, wherein the authentication information comprises the opening registration information and the transaction authentication request information; receiving a first authentication result of the electronic bank server, wherein the first authentication result comprises authentication passing or authentication failing; and responding to the first authentication result, and feeding back a second authentication result to the electronic bank server, wherein the second authentication result comprises a new authentication password and authentication pass or the second authentication result comprises a new authentication password and authentication fail.
In some embodiments, the responding to the first authentication result, feeding back a second authentication result to the electronic banking server, includes: responding to a first authentication result passing authentication, popup the password input box, responding to the password input in the password input box, and generating a new authentication password; and authenticating the new authentication password to generate a second authentication result, wherein the second authentication result comprises the new authentication password and authentication pass, or the second authentication result comprises the new authentication password and authentication fail.
Another aspect of the present disclosure provides an online banking security authentication device based on a soft token of a mobile phone bank, which is applied to the mobile phone bank, wherein an electronic bank includes the mobile phone bank and the online bank, and the device includes: the first transmission module is used for transmitting the opening registration information of the opened soft token to the electronic bank server in advance; the first receiving module is used for executing and receiving an authentication notification of the electronic bank server, wherein the authentication notification carries transaction authentication request information; the second transmission module is used for responding to the authentication notification and feeding back authentication information to the electronic bank server, wherein the authentication information comprises the opening registration information and the transaction authentication request information; the second receiving module is used for executing and receiving a first authentication result of the electronic bank server, wherein the first authentication result comprises authentication passing or authentication failing; and the third transmission module is used for executing response to the first authentication result and feeding back a second authentication result to the electronic bank server, wherein the second authentication result comprises a new authentication password and authentication pass or the second authentication result comprises a new authentication password and authentication fail.
Another aspect of the present disclosure provides an electronic device comprising one or more processors and one or more memories, wherein the memories are configured to store executable instructions that, when executed by the processors, implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, are configured to implement a method as described above.
Another aspect of the present disclosure provides a computer program product comprising a computer program comprising computer executable instructions which, when executed, are for implementing a method as described above.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments thereof with reference to the accompanying drawings in which:
FIG. 1 schematically illustrates an exemplary system architecture to which methods, apparatuses may be applied according to embodiments of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an online banking security authentication method based on a mobile banking soft token in accordance with an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of a mobile banking pre-provisioning soft tokens in accordance with an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram of a mobile banking client activating a soft token from token information, generating an authentication password, in accordance with an embodiment of the present disclosure;
fig. 5 schematically illustrates a block diagram of an online banking security authentication device based on a mobile banking soft token according to an embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of an online banking security authentication method based on a mobile banking soft token in accordance with an embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow chart of feeding back a second authentication result to an electronic banking server in response to a first authentication result in accordance with an embodiment of the present disclosure;
fig. 8 schematically illustrates a block diagram of an online banking security authentication device based on a mobile banking soft token according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a flow chart of integrating a soft token SDK by a mobile banking client, completing user identity authentication, binding a soft token and storing provisioning information in a soft token server according to an embodiment of the present disclosure;
FIG. 10 schematically illustrates a flow chart of querying a soft token authentication result according to a transaction instruction in accordance with an embodiment of the present disclosure;
fig. 11 schematically illustrates a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the related personal information of the user all conform to the regulations of related laws and regulations, necessary security measures are taken, and the public order harmony is not violated. In the technical scheme of the disclosure, the processes of acquiring, collecting, storing, using, processing, transmitting, providing, disclosing, applying and the like of the data all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public order harmony is not violated.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). The terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more of the described features.
At present, high-risk transactions such as large transfers and the like are carried out by an online bank, and entity security medium authentication is needed, for example, an electronic cipher device or a U shield and the like are used. The main process of entity security medium authentication is as follows: when a user executes high-risk transactions such as transfer remittance and password modification at an online bank, the user enters an authentication page after submitting the high-risk transactions, if an electronic cipher device is used, the user needs to input the startup password of the electronic cipher device, clicks the acquisition time type password or inputs a transaction element, clicks the acquisition element type password, and submits the acquired element type password to the background to complete an authentication process; if the U shield is used, the user needs to insert the U shield into the computer and input a password to start the computer, confirms transaction information from the U shield and clicks and confirms to submit to the background to finish authentication. It will be appreciated that the physical security media is inconvenient to carry and is subject to loss, and therefore the manner in which the physical security media is authenticated is subject to user complaints.
Embodiments of the present disclosure provide an online banking security authentication method, apparatus, electronic device, computer readable storage medium and computer program product based on a mobile banking soft token. The online banking safety authentication method based on the mobile phone banking soft token is applied to an electronic banking server, wherein the electronic banking comprises a mobile phone banking and an online banking, and the online banking safety authentication method based on the mobile phone banking soft token comprises the following steps: acquiring opening registration information of a soft token which is opened in advance from a mobile phone bank, wherein the opening registration information comprises the mapping relation of equipment information, a client number and an authentication password of the mobile phone bank; responding to a transaction authentication request of a user with an opened soft token at an online bank, and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number; sending an authentication notification to a mobile banking according to the authentication instruction; acquiring authentication information fed back by a mobile phone bank in response to an authentication notification, wherein the authentication information comprises opening registration information and transaction authentication request information; obtaining a first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing; the first authentication result is sent to a mobile phone bank, and a second authentication result fed back by the mobile phone bank in response to the first authentication result is obtained, wherein the second authentication result comprises a new authentication password and authentication pass, or the second authentication result comprises a new authentication password and authentication fail; and sending the second authentication result to the internet banking.
It should be noted that, the online banking security authentication method, device, electronic apparatus, computer readable storage medium and computer program product based on the mobile phone banking soft token of the present disclosure may be used in the information security technical field, and may also be used in any field other than the information security technical field, for example, the financial field, which is not limited herein.
Fig. 1 schematically illustrates an exemplary system architecture 100 in which an online banking security authentication method, apparatus, electronic device, computer-readable storage medium and computer program product based on a mobile banking soft token may be applied, according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which embodiments of the present disclosure may be applied to assist those skilled in the art in understanding the technical content of the present disclosure, but does not mean that embodiments of the present disclosure may not be used in other devices, systems, environments, or scenarios.
As shown in fig. 1, a system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the online banking security authentication method based on the mobile banking soft token provided in the embodiments of the present disclosure may be generally executed by the server 105. Accordingly, the online banking security authentication device based on the mobile banking soft token provided in the embodiments of the present disclosure may be generally disposed in the server 105. The online banking security authentication method based on the mobile banking soft token provided by the embodiment of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the online banking security authentication device based on the mobile banking soft token provided by the embodiments of the present disclosure may also be disposed in a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The online banking security authentication method based on the mobile banking soft token according to the embodiment of the present disclosure will be described in detail with reference to fig. 2 to 4 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flowchart of an online banking security authentication method based on a mobile banking soft token according to an embodiment of the present disclosure. The online banking security authentication method based on the mobile phone banking soft token is applied to an electronic banking server, and the electronic banking comprises a mobile phone banking and an online banking.
As shown in fig. 2, the online banking security authentication method based on the mobile banking soft token of the embodiment includes operations S210 to S270.
In operation S210, provisioning registration information of a pre-provisioned soft token from a mobile banking is acquired, wherein the provisioning registration information includes mapping relationships of device information, a client number, and an authentication password of the mobile banking.
In operation S220, in response to a transaction authentication request of the user who has opened the soft token at the online banking, an authentication instruction is generated according to transaction authentication request information, wherein the transaction authentication request information includes at least a client number.
In operation S230, an authentication notification is transmitted to the mobile banking according to the authentication instruction.
In operation S240, authentication information fed back by the mobile banking in response to the authentication notification is acquired, wherein the authentication information includes provisioning registration information and transaction authentication request information.
In operation S250, a first authentication result is obtained according to the provisioning registration information and the transaction authentication request information, where the first authentication result includes authentication pass or authentication fail.
In operation S260, the first authentication result is sent to the mobile phone bank, and a second authentication result fed back by the mobile phone bank in response to the first authentication result is obtained, where the second authentication result includes a new authentication password and authentication pass, or the second authentication result includes a new authentication password and authentication fail.
The second authentication result is transmitted to the internet banking in operation S270.
According to the online banking security authentication method based on the mobile phone bank soft token, the online banking is interacted with the electronic banking server, and the electronic banking server is interacted with the mobile phone bank, so that the mobile phone bank can conduct transaction authentication for online banking transactions through the pre-opened soft token. Therefore, the online banking security authentication method based on the mobile phone banking soft token can achieve the purpose that the online banking security transaction can be completed without an entity security medium, and is trouble-saving, time-saving and labor-saving, so that user transaction experience can be improved.
According to some embodiments of the present disclosure, the mobile banking includes a mobile banking client and a mobile banking server, and as shown in fig. 3, the mobile banking pre-opening the soft token may include operations S310 to S340.
In operation S310, the mobile banking client binds the device information and the client information according to the obtained soft token provisioning request, and transmits the bound device information and client information to the mobile banking server, wherein the soft token provisioning request includes the client information.
In operation S320, the mobile banking server generates token information of the soft token according to the device information and the client information, and transmits the token information to the mobile banking client, wherein the token information includes a mapping relationship of the device information, the client information and the token number.
In operation S330, the mobile banking client activates the soft token according to the token information, generates an authentication password, and transmits the authentication password to the mobile banking server.
In operation S340, the mobile banking server authenticates the authentication password, generates the provisioning registration information of the soft token when the authentication is successful, and transmits the provisioning registration information to the electronic banking server.
The soft token can be conveniently opened in advance by the mobile phone bank through operations S310 to S340.
According to some embodiments of the present disclosure, as shown in fig. 4, the operation S330 mobile banking client activates a soft token according to the token information, generates an authentication password, and includes operations S331 to S333.
In operation S331, the mobile banking client sends an activation instruction to the mobile banking server according to the token information.
In operation S332, the mobile banking server generates an activation code and a verification code according to the activation instruction, and sends the activation code and the verification code to the mobile banking client.
In operation S333, the mobile banking client generates an authentication password in response to the activation code, the popup input box, in response to the authentication code input in the input box, the popup password setting box, and in response to the password input in the password setting box.
The mobile banking client can activate the soft token according to the token information to generate the authentication password through operations S331-S333.
According to some embodiments of the present disclosure, in response to the verification code entered in the input box, the pop-up password setting box generates an authentication password in response to the password entered in the password setting box in operation S333, in order to invoke the software development kit operation. Thereby making operation S333 easy to implement.
Based on the online banking security authentication method based on the mobile phone banking soft token, the invention also provides an online banking security authentication device based on the mobile phone banking soft token. The internet banking security authentication device 10 based on the mobile banking soft token will be described in detail with reference to fig. 5.
Fig. 5 schematically illustrates a block diagram of the internet banking security authentication device 10 based on a mobile banking soft token according to an embodiment of the present disclosure. The online banking security authentication device based on the mobile banking soft token is applied to an electronic banking server, and the electronic banking comprises a mobile banking and an online banking.
The internet banking security authentication device 10 based on the mobile banking soft token may include a first acquisition module 11, a first generation module 12, a first transmission module 13, a second acquisition module 14, a determination module 15, a third acquisition module 16, and a second transmission module 17.
The first acquisition module 11, the first acquisition module 11 is configured to perform operation S210: and acquiring opening registration information of the pre-opened soft token from the mobile phone bank, wherein the opening registration information comprises the mapping relation of equipment information, client numbers and authentication passwords of the mobile phone bank.
The first generating module 12, the first generating module 12 is configured to perform operation S220: and responding to a transaction authentication request of the user with the opened soft token at the online bank, and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number.
The first sending module 13, the first sending module 13 is configured to perform operation S230: and sending an authentication notice to the mobile phone bank according to the authentication instruction.
The second acquisition module 14, the second acquisition module 14 is configured to perform operation S240: and acquiring authentication information fed back by the mobile phone bank in response to the authentication notification, wherein the authentication information comprises opening registration information and transaction authentication request information.
The determining module 15, the determining module 15 is configured to perform operation S250: and obtaining a first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing.
The third acquiring module 16, the third acquiring module 16 is configured to perform operation S260: and sending the first authentication result to the mobile phone bank, and acquiring a second authentication result fed back by the mobile phone bank in response to the first authentication result, wherein the second authentication result comprises a new authentication password and authentication pass, or the second authentication result comprises a new authentication password and authentication fail.
The second transmitting module 17, the second transmitting module 17 is configured to perform operation S270: and sending the second authentication result to the internet banking.
According to the online banking security authentication device 10 based on the mobile phone bank soft token in the embodiment of the disclosure, the online banking interacts with the electronic banking server, and the electronic banking server interacts with the mobile phone bank, so that the mobile phone bank can perform transaction authentication for online banking transactions through the pre-opened soft token. Therefore, the online banking security authentication method based on the mobile phone banking soft token can achieve the purpose that the online banking security transaction can be completed without an entity security medium, and is trouble-saving, time-saving and labor-saving, so that user transaction experience can be improved.
In addition, according to the embodiment of the present disclosure, any of the first acquisition module 11, the first generation module 12, the first transmission module 13, the second acquisition module 14, the determination module 15, the third acquisition module 16, and the second transmission module 17 may be incorporated in one module to be implemented, or any of them may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module.
According to embodiments of the present disclosure, at least one of the first acquisition module 11, the first generation module 12, the first transmission module 13, the second acquisition module 14, the determination module 15, the third acquisition module 16, and the second transmission module 17 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware.
Alternatively, at least one of the first acquisition module 11, the first generation module 12, the first transmission module 13, the second acquisition module 14, the determination module 15, the third acquisition module 16 and the second transmission module 17 may be at least partially implemented as computer program modules, which, when executed, may perform the respective functions.
The online banking security authentication method based on the mobile banking soft token according to the embodiment of the present disclosure will be described in detail with reference to fig. 6 and 7 based on the scenario described in fig. 1.
Fig. 6 schematically illustrates a flowchart of an online banking security authentication method based on a mobile banking soft token according to an embodiment of the present disclosure. The online banking security authentication method based on the mobile banking soft token is applied to mobile banking, and the electronic banking comprises the mobile banking and the online banking.
As shown in fig. 6, the online banking security authentication method based on the mobile banking soft token of the embodiment includes operations S410 to S450.
In operation S410, the provisioning registration information of the provisioned soft token is transmitted to the electronic banking server in advance.
In operation S420, an authentication notification of the electronic banking server is received, where the authentication notification carries transaction authentication request information.
In response to the authentication notification, authentication information including provisioning registration information and transaction authentication request information is fed back to the electronic banking server in operation S430.
In operation S440, a first authentication result of the electronic banking server is received, wherein the first authentication result includes authentication pass or authentication fail.
In operation S450, a second authentication result is fed back to the electronic banking server in response to the first authentication result, wherein the second authentication result includes a new authentication password and authentication pass, or the second authentication result includes a new authentication password and authentication fail.
According to the online banking security authentication method based on the mobile phone bank soft token, the online banking is interacted with the electronic banking server, and the electronic banking server is interacted with the mobile phone bank, so that the mobile phone bank can conduct transaction authentication for online banking transactions through the pre-opened soft token. Therefore, the online banking security authentication method based on the mobile phone banking soft token can achieve the purpose that the online banking security transaction can be completed without an entity security medium, and is trouble-saving, time-saving and labor-saving, so that user transaction experience can be improved.
According to some embodiments of the present disclosure, as shown in fig. 7, operation S450, in response to the first authentication result, feeds back the second authentication result to the electronic banking server, includes operation S451 and operation S452.
In operation S451, in response to the first authentication result that passes authentication, a pop-up password input box generates a new authentication password in response to the password input in the password input box.
In operation S452, the new authentication password is authenticated, and a second authentication result is generated, wherein the second authentication result includes the new authentication password and authentication pass, or the second authentication result includes the new authentication password and authentication fail.
The operations S451 and S452 may facilitate that the second authentication result is fed back to the electronic banking server in response to the first authentication result.
Based on the online banking security authentication method based on the mobile phone banking soft token, the invention also provides an online banking security authentication device based on the mobile phone banking soft token. The internet banking security authentication device 20 based on the mobile banking soft token will be described in detail with reference to fig. 8.
Fig. 8 schematically illustrates a block diagram of the internet banking security authentication device 20 based on a mobile banking soft token according to an embodiment of the present disclosure. The online banking security authentication device based on the mobile banking soft token is applied to mobile banking, and the electronic banking comprises the mobile banking and the online banking.
The internet banking security authentication device 20 based on the mobile banking soft token may include a first transmission module 21, a first reception module 22, a second transmission module 23, a second reception module 24, and a third transmission module 25.
The first transmission module 21, the first transmission module 21 is configured to perform operation S410: and transmitting the opening registration information of the opened soft token to the electronic bank server in advance.
The first receiving module 22, the first receiving module 22 is configured to perform operation S420: and receiving an authentication notice of the electronic bank server, wherein the authentication notice carries transaction authentication request information.
The second transmission module 23, the second transmission module 23 is configured to perform operation S430: and responding to the authentication notice, and feeding back authentication information to the electronic bank server, wherein the authentication information comprises opening registration information and transaction authentication request information.
The second receiving module 24, the second receiving module 24 is configured to perform operation S440: and receiving a first authentication result of the electronic bank server, wherein the first authentication result comprises authentication passing or authentication failing.
The third transmission module 25, the third transmission module 25 is configured to perform operation S450: and responding to the first authentication result, and feeding back a second authentication result to the electronic bank server, wherein the second authentication result comprises a new authentication password and authentication pass, or the second authentication result comprises a new authentication password and authentication fail.
According to the online banking security authentication device 20 based on the mobile phone bank soft token in the embodiment of the disclosure, the online banking interacts with the electronic banking server, and the electronic banking server interacts with the mobile phone bank, so that the mobile phone bank can perform transaction authentication for the online banking transaction through the pre-opened soft token. Therefore, the online banking security authentication method based on the mobile phone banking soft token can achieve the purpose that the online banking security transaction can be completed without an entity security medium, and is trouble-saving, time-saving and labor-saving, so that user transaction experience can be improved.
In addition, according to an embodiment of the present disclosure, any of the first transmission module 21, the first reception module 22, the second transmission module 23, the second reception module 24, and the third transmission module 25 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module.
According to embodiments of the present disclosure, at least one of the first transmission module 21, the first reception module 22, the second transmission module 23, the second reception module 24, and the third transmission module 25 may be implemented at least partially as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or as hardware or firmware in any other reasonable way of integrating or packaging the circuitry, or as any one of or a suitable combination of three of software, hardware, and firmware.
Alternatively, at least one of the first transmission module 21, the first reception module 22, the second transmission module 23, the second reception module 24 and the third transmission module 25 may be at least partially implemented as computer program modules, which, when executed, may perform the respective functions.
An online banking security authentication method based on a mobile banking soft token according to an embodiment of the present disclosure is described in detail with reference to fig. 9 and 10 as follows. It is to be understood that the following description is exemplary only and is not intended to limit the disclosure in any way.
The online banking safety authentication method based on the mobile phone bank soft token provides a mechanism for the online banking to finish transaction authentication through the mobile phone bank soft token, so that the characteristics of safety, convenience and reliability of the mobile phone bank soft token are applied to online banking transaction authentication, and when the online banking carries out high-risk transaction, the online banking transaction is conveniently used by a user through the mobile phone bank soft token to finish safety authentication to replace an electronic cipher device, a U shield and the like.
The online banking security authentication method based on the mobile phone banking soft token comprises the following steps.
1. The mobile banking client integrates the soft token SDK, completes user identity authentication, binds the soft token and stores the opening information in the soft token server, and the specific binding flow is shown in figure 9.
2. When the online banking needs to perform high risk authentication, firstly, an authentication server is called to judge the state of a soft token, if the authentication server is normal, a mobile banking soft token authentication flow is entered, an OEBB interface is called to send current transaction information and generate an authentication instruction, then a message push is sent to push the message to a mobile banking client, a client reminds to open the mobile banking through the message, if the client is not logged in, a login flow is executed and an authentication page is jumped in, a mobile banking background obtains an instruction to be authenticated from the OEBB and displays an online banking transaction element in the mobile banking, the front end of the mobile banking is spent on calling the soft token SDK to finish client authentication, then the soft token server is accessed and authentication of the current transaction instruction is finished, and then the mobile banking background is called to update an authentication result.
3. The internet bank submits the page polling inquiry authentication result, the background inquires the soft token authentication result according to the transaction instruction, and the concrete flow of inquiring the soft token authentication result according to the transaction instruction is shown in fig. 10.
Fig. 11 schematically shows a block diagram of an electronic device adapted to implement the above-described method according to an embodiment of the present disclosure.
As shown in fig. 11, an electronic device 900 according to an embodiment of the present disclosure includes a processor 901 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. The processor 901 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 901 may also include on-board memory for caching purposes. Processor 901 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic device 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other by a bus 904. The processor 901 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the program may be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 900 may also include an input/output (I/O) interface 905, the input/output (I/O) interface 905 also being connected to the bus 904. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input section 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 908 including a hard disk or the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to an input/output (I/O) interface 905 as needed. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 910 so that a computer program read out therefrom is installed into the storage section 908 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 902 and/or RAM 903 and/or one or more memories other than ROM 902 and RAM 903 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to perform the methods of embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, via communication portion 909, and/or installed from removable medium 911. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from the network via the communication portion 909 and/or installed from the removable medium 911. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 901. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (11)

1. The online banking safety authentication method based on the mobile banking soft token is applied to an electronic banking server, wherein the electronic banking comprises a mobile banking and an online banking, and is characterized by comprising the following steps:
Acquiring opening registration information of a soft token which is opened in advance from a mobile phone bank, wherein the opening registration information comprises the mapping relation of equipment information, a client number and an authentication password of the mobile phone bank;
responding to a transaction authentication request of a user with an opened soft token at an online bank, and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number;
sending an authentication notification to a mobile banking according to the authentication instruction;
acquiring authentication information fed back by a mobile phone bank in response to the authentication notification, wherein the authentication information comprises the opening registration information and the transaction authentication request information;
obtaining a first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing;
the first authentication result is sent to a mobile phone bank, and a second authentication result fed back by the mobile phone bank in response to the first authentication result is obtained, wherein the second authentication result comprises a new authentication password and authentication pass or comprises a new authentication password and authentication fail; and
And sending the second authentication result to an online bank.
2. The method according to claim 1, wherein the mobile banking includes a mobile banking client and a mobile banking server, the mobile banking pre-opens the soft token, comprising:
binding equipment information and client information according to the acquired soft token opening request by the mobile banking client side, and sending the bound equipment information and client information to a mobile banking server side, wherein the soft token opening request comprises the client information;
the mobile banking server generates token information of a soft token according to the equipment information and the client information and sends the token information to a mobile banking client, wherein the token information comprises a mapping relation among the equipment information, the client information and a token number;
the mobile banking client activates the soft token according to the token information, generates an authentication password, and sends the authentication password to a mobile banking server; and
and the mobile banking server authenticates the authentication password, generates the opening registration information of the soft token when the authentication is successful, and sends the opening registration information to the electronic banking server.
3. The method of claim 2, wherein the mobile banking client activates the soft token according to the token information to generate an authentication password, comprising:
the mobile banking client side sends an activation instruction to the mobile banking server side according to the token information;
the mobile banking server generates an activation code and a verification code according to the activation instruction, and sends the activation code and the verification code to the mobile banking client; and
and the mobile banking client responds to the activation code, a popup window input box, responds to the verification code input in the input box, a popup window password setting box and responds to the password input in the password setting box, and an authentication password is generated.
4. The method of claim 3, wherein the popup password setting box generates an authentication password in response to the entered password in the password setting box in response to the entered authentication code in the input box, in order to invoke a software development kit operation.
5. The device is applied to an electronic bank server, and the electronic bank comprises a mobile phone bank and an online bank, and is characterized by comprising the following components:
The mobile phone comprises a first acquisition module, a second acquisition module and a first control module, wherein the first acquisition module is used for executing acquisition of opening registration information of a pre-opened soft token from a mobile phone bank, and the opening registration information comprises mapping relation of equipment information, a client number and an authentication password of the mobile phone bank;
the first generation module is used for executing a transaction authentication request of a user responding to the opened soft token at an online bank and generating an authentication instruction according to transaction authentication request information, wherein the transaction authentication request information at least comprises a client number;
the first sending module is used for executing the authentication instruction and sending an authentication notification to a mobile phone bank;
the second acquisition module is used for executing the acquisition of authentication information fed back by the mobile phone bank in response to the authentication notification, wherein the authentication information comprises the opening registration information and the transaction authentication request information;
the determining module is used for executing the first authentication result according to the opening registration information and the transaction authentication request information, wherein the first authentication result comprises authentication passing or authentication failing;
The third acquisition module is used for sending the first authentication result to a mobile phone bank and acquiring a second authentication result fed back by the mobile phone bank in response to the first authentication result, wherein the second authentication result comprises a new authentication password and authentication pass or comprises a new authentication password and authentication fail; and
and the second sending module is used for sending the second authentication result to the internet banking.
6. The online banking safety authentication method based on the mobile banking soft token is applied to a mobile banking, and an electronic banking comprises the mobile banking and the online banking, and is characterized by comprising the following steps:
transmitting the opening registration information of the opened soft token to an electronic bank server in advance;
receiving an authentication notification of the electronic bank server, wherein the authentication notification carries transaction authentication request information;
responding to the authentication notification, and feeding back authentication information to the electronic bank server, wherein the authentication information comprises the opening registration information and the transaction authentication request information;
receiving a first authentication result of the electronic bank server, wherein the first authentication result comprises authentication passing or authentication failing; and
And responding to the first authentication result, and feeding back a second authentication result to the electronic bank server, wherein the second authentication result comprises a new authentication password and authentication pass or comprises a new authentication password and authentication fail.
7. The method according to claim 6, wherein the feeding back a second authentication result to the electronic banking server in response to the first authentication result includes:
responding to a first authentication result passing authentication, popup the password input box, responding to the password input in the password input box, and generating a new authentication password; and
and authenticating the new authentication password to generate a second authentication result, wherein the second authentication result comprises the new authentication password and authentication pass, or the second authentication result comprises the new authentication password and authentication fail.
8. The device is applied to a mobile phone bank, and an electronic bank comprises the mobile phone bank and the online bank, and is characterized in that the device comprises:
the first transmission module is used for transmitting the opening registration information of the opened soft token to the electronic bank server in advance;
The first receiving module is used for executing and receiving an authentication notification of the electronic bank server, wherein the authentication notification carries transaction authentication request information;
the second transmission module is used for responding to the authentication notification and feeding back authentication information to the electronic bank server, wherein the authentication information comprises the opening registration information and the transaction authentication request information;
the second receiving module is used for executing and receiving a first authentication result of the electronic bank server, wherein the first authentication result comprises authentication passing or authentication failing; and
and the third transmission module is used for executing response to the first authentication result and feeding back a second authentication result to the electronic bank server, wherein the second authentication result comprises a new authentication password and authentication pass or the second authentication result comprises a new authentication password and authentication fail.
9. An electronic device, comprising:
one or more processors;
one or more memories for storing executable instructions which, when executed by the processor, implement the method according to any of claims 1 to 4 or any of claims 6 to 7.
10. A computer readable storage medium having stored thereon executable instructions which when executed by a processor implement the method according to any of claims 1 to 4 or any of claims 6 to 7.
11. A computer program product comprising a computer program comprising one or more executable instructions which when executed by a processor implement the method of any one of claims 1 to 4 or any one of claims 6 to 7.
CN202310507796.9A 2023-05-08 2023-05-08 Method, device, equipment, medium and program product for safety authentication of internet banking Pending CN116527363A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310507796.9A CN116527363A (en) 2023-05-08 2023-05-08 Method, device, equipment, medium and program product for safety authentication of internet banking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310507796.9A CN116527363A (en) 2023-05-08 2023-05-08 Method, device, equipment, medium and program product for safety authentication of internet banking

Publications (1)

Publication Number Publication Date
CN116527363A true CN116527363A (en) 2023-08-01

Family

ID=87393833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310507796.9A Pending CN116527363A (en) 2023-05-08 2023-05-08 Method, device, equipment, medium and program product for safety authentication of internet banking

Country Status (1)

Country Link
CN (1) CN116527363A (en)

Similar Documents

Publication Publication Date Title
US20240152996A1 (en) System and method for programmatically accessing financial data
US20210279795A1 (en) Integrated credit application and provisioning solution
US10884825B2 (en) Application programming interface (API) service apparatus and application programming interface (API) service system
US11182844B2 (en) Virtual resource transfer method, client device, application server, and system
CN107748985B (en) Network-based payment method and network payment server
CN111160845B (en) Service processing method and device
US20210081524A1 (en) Systems and methods of establishing secure passwords using real-time dynamic feedback.
US10853786B2 (en) Multi-factor identity authentication
US11282084B2 (en) Repurposing a transaction authorization channel to provide fraud notifications
US9544317B2 (en) Identification of potential fraudulent website activity
US9842355B2 (en) Biller-initiated electronic billing activation
US10148646B2 (en) Preventing unauthorized access to secured information systems using tokenized authentication techniques
CN109257321A (en) Safe login method and device
US20220215374A1 (en) Payment Method, Apparatus and System, Device, and Storage Medium
TWI839875B (en) Payment method, user terminal, device, equipment, system and medium
US11354375B2 (en) Methods and systems for providing authenticated one-click access to a customized user interaction-specific web page
US20180026960A1 (en) Preventing Unauthorized Access to Secured Information Systems Using Tokenized Authentication Techniques
CN114116036A (en) Calling method, device and medium of application plug-in and electronic equipment
CN113572763A (en) Data processing method and device, electronic equipment and storage medium
CN113393239A (en) Transaction processing method, system, device, electronic equipment and storage medium
US10181143B2 (en) Providing privileges and granting or denying a level of access to resources based on authentication by authentication sources
CN110942567A (en) Self-service equipment data processing method, device and system
US10592898B2 (en) Obtaining a signature from a remote user
US20150039497A1 (en) Biller-initiated electronic billing activation
WO2019025868A1 (en) System and method for providing secured services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination