TW202006604A - System and method of financial services certification - Google Patents

System and method of financial services certification Download PDF

Info

Publication number
TW202006604A
TW202006604A TW107123171A TW107123171A TW202006604A TW 202006604 A TW202006604 A TW 202006604A TW 107123171 A TW107123171 A TW 107123171A TW 107123171 A TW107123171 A TW 107123171A TW 202006604 A TW202006604 A TW 202006604A
Authority
TW
Taiwan
Prior art keywords
client
financial service
module
feature
server
Prior art date
Application number
TW107123171A
Other languages
Chinese (zh)
Inventor
蘇威嘉
Original Assignee
永豐金融控股股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 永豐金融控股股份有限公司 filed Critical 永豐金融控股股份有限公司
Priority to TW107123171A priority Critical patent/TW202006604A/en
Priority to CN201811051764.8A priority patent/CN110689351A/en
Publication of TW202006604A publication Critical patent/TW202006604A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention is a financial services certification system and method of providing the same, the financial services certification system includes: client terminal information security module, storing in client terminal, the client terminal further including client terminal control module; wherein the client terminal information security module connect to client terminal control module to input bio feature, certifying the identity of client, and, financial service module, storing in near-end or far-end connecting to client terminal control module for processing execution and application of financial services.

Description

金融服務驗證系統與方法 Financial service verification system and method

本發明涉及一種金融服務的驗證系統與方法,更詳而言之,其為一種藉由生物特徵值產生加解密金鑰,以保障金融服務資訊安全的系統與方法。 The present invention relates to a financial service verification system and method. More specifically, it is a system and method for generating encryption and decryption keys by using biological characteristic values to ensure the security of financial service information.

電子商務,得益於美國國家科學基金會(National Science Foundation,NSF)在1995年,將由冷戰時期所發展,原作為軍事情報用途的網際網路開放予民用後,加速了其網路化的應用。自從約2000年左右以後,超文字傳輸安全協定(Hypertext Transfer Protocol Secure,HTTPS)中,以SSL協定加密HTTP的資安技術發展成熟,電子商務的安全性獲得較高的保證後,利用網路商店或網路金融機構等電子貨幣支付形式,通過網際網路完成商品或服務的交易方式的蓬勃發展,也直接使eBay、paypal、Amazon等搭上電子商務熱潮的公司,因線上交易的便利與迅速而崛起。 E-commerce, benefited from the National Science Foundation (NSF) in 1995, will be developed by the Cold War period, after the Internet used for military intelligence was opened to civilian use, accelerated its networked application . Since about 2000, in the Hypertext Transfer Protocol Secure (HTTPS), the security technology for encrypting HTTP with the SSL protocol has matured, and after the security of e-commerce has been highly guaranteed, the online store has been used. E-currency payment methods such as online financial institutions, the vigorous development of the way to complete the transaction of goods or services through the Internet, and also directly enable eBay, paypal, Amazon and other companies to catch up with the e-commerce boom, due to the convenience and speed of online transactions And rise.

於以往習知技術中,電子商務針對用戶端確認身份的方式,為採用一組成對的帳號與密碼,以登入電子商務的商務系統,並選擇所欲進行的商務服務後,商務系統旋即透過電子郵件或電話簡訊的方式寄送一一次性密碼(One Time Password,OTP)以供用戶確認該筆商務服務的有效性。所謂的一次性密碼顧名思義,為一僅在一定交易次數(通常為1次)或一定時間內始有作用的密碼,在超過所預定的交易次數或時間後即失去效用,以達到即便密碼為人所竊取,也不致於使資訊的洩漏繼續擴大的目的。 In the prior art, e-commerce uses a pair of accounts and passwords to log in to the e-commerce business system by selecting a pair of accounts and passwords for the user to confirm the identity, and select the desired business service. One-time password (OTP) is sent by email or phone message for users to confirm the validity of the business service. The so-called one-time password, as the name implies, is a password that only works for a certain number of transactions (usually 1 time) or within a certain period of time. After a predetermined number of transactions or time, it loses its effectiveness, so that even if the password is human The stolen, it is not for the purpose of continuing to expand the leakage of information.

一次性密碼運作的原理為,欲進行通訊的雙方:鮑伯(Bob)與愛麗絲(Alice),均使用同一份隨機生成的一次性加密金鑰來加密欲傳輸的通訊 文本,接著將加密金鑰裡的字母,與通訊文本的字母按某個的規定相互混合。其中一種作法是將字母指定數字(如A=0;B=1;C=2;D=3;......Z=25),然後將加密金鑰上的字母所代表的數字和通訊文本上相對應的數字給相加,再除以該語言的字母數後取得其餘數即完成加密,例如:通訊文本為:{forinstance}={A}={5,14,17,8,13,18,19,0,13,2,4};加密金鑰為:{masklnsfldf}={B}={12,0,18,10,11,13,18,5,11,3,5}則({A}+{B})mod 26={17,14,9,18,24,5,11,5,24,5,9}即完成後的加密文本為{rogsyflfyfg},若要解密,逆向操作即可。 The principle of the one-time password operation is that both parties who want to communicate: Bob and Alice use the same randomly generated one-time encryption key to encrypt the communication text to be transmitted, and then encrypt the encryption The letters in the key are mixed with the letters in the communication text according to certain regulations. One way is to assign letters to numbers (such as A=0; B=1; C=2; D=3;...Z=25), and then combine the numbers represented by the letters on the encryption key with Corresponding numbers in the communication text are added, and then the remaining number is obtained after dividing by the number of letters in the language to complete the encryption, for example: the communication text is: {forinstance}={A}={5, 14, 17, 8, 13, 18, 19, 0, 13, 2, 4}; the encryption key is: {masklnsfldf}={B}={12, 0, 18, 10, 11, 13, 18, 5, 11, 3, 5 } Then ({A}+{B}) mod 26={17,14,9,18,24,5,11,5,24,5,9}, that is, the encrypted text after completion is {rogsyflfyfg}, if you want to To decrypt, just reverse the operation.

上述以一次性密碼加密通訊文本的方式,雖然其安全性於1949年已在「Bell Labs Technical Journal」期刊上,為克勞德.愛伍德.山農(Claude Elwood Shannon)所證實,然則要達成其安全性尚有前提要件須滿足,即其加密金鑰對非通訊雙方的第三者馬洛里(Mallory)必須非常保密。然則以現有商務系統的運作方式,鮑伯和愛麗絲雙方大多在通訊事前並未約定過加密文本的產生方法,折衷的方式就是商務系統以電子郵件或電話簡訊的方式寄送該一次性密碼予用戶端,而在此過程中電子郵件或電話簡訊極為容易為馬洛里所攔截,而使得一次性密碼在電子商務上出現安全性的漏洞,因此在2016年美國國家標準技術研究所(National Institute of Standards and Technology,NIST)即建議把此種驗證身份的方式,排除在未來身份驗證的標準之外。 The above method of encrypting the communication text with a one-time password, although its security was in the "Bell Labs Technical Journal" in 1949, is Claude. Love Wood. Claude Elwood Shannon confirmed that there are still prerequisites to achieve its security, that is, its encryption key must be kept very secret from Mallory, a third party who is not a party to the communication. However, according to the operation method of the existing business system, most of Bob and Alice have not agreed on the method of generating encrypted text before the communication. The compromise method is that the business system sends the one-time password to the email or phone message. On the user side, during this process emails or phone text messages are extremely easy to be intercepted by Mallory, which makes the one-time passwords appear to have security holes in e-commerce. Therefore, in 2016, the National Institute of Standards and Technology (National Institute of Standards and Technology) of Standards and Technology (NIST) recommends that this method of identity verification be excluded from future identity verification standards.

此外,以用戶實際操作的角度來說,現有以成對的帳號密碼以登入商務系統的方式實際上安全性與便利性均相當堪慮,理由為目前的電子商務因蓬勃發展的關係,為了密碼安全著想,均不建議用戶使用太短或太容易記憶的密碼(如:以生日、學號、手機號碼、車牌號碼等作密碼),這造成了用戶相當容易遺忘掉不常使用的帳號密碼,或在多個商務系統所對應的帳號密碼間的管理發生困難。是以,大多用戶為了避免遺忘帳戶密碼,普遍將其記錄在一實體或數位的記事本中,從而使得馬洛里容易藉由反覆的嘗試(Trial and Error)而能取得用戶的帳號與密碼,或是因不慎遺失紀錄帳號密碼的記事本,使非法的第三者檢拾到而有機會產生安全性的漏洞,使一般普羅大眾雖承認電子商務的便利和快捷,卻依然對資安上存有疑慮,尤其對於目前各大金融機構來說, 某些金融商品,如股票、權證、期貨、選擇權等等,若是因資訊安全遭到破解,其損失的價值可能高達數十甚至數千萬,其牽涉的責任和法律問題均非一般情況可等閒視之。 In addition, from the perspective of the user's actual operation, the existing method of logging into the business system with a pair of account passwords is actually quite safe and convenient. The reason is that the current e-commerce is due to the booming relationship. For security reasons, it is not recommended that users use passwords that are too short or too easy to remember (such as birthday, school number, mobile phone number, license plate number, etc.), which causes users to easily forget account passwords that are not commonly used, or It is difficult to manage between account passwords corresponding to multiple business systems. Therefore, in order to avoid forgetting the account password, most users generally record it in a physical or digital notebook, so that Mallory can easily obtain the user's account and password through repeated attempts (Trial and Error). Or a notepad that accidentally loses the password of the recorded account, so that an illegal third party can pick it up and have a chance to create a security loophole, so that the general public still recognizes the convenience and speed of e-commerce, but it still has There are doubts, especially for the major financial institutions, some financial commodities, such as stocks, warrants, futures, options, etc., if the information security is cracked, the value of the loss may be as high as tens or even thousands Wan, the responsibilities and legal issues involved are not ordinary circumstances and can be taken lightly.

是以,有鑑於前述習知技術的缺點,現時時點上,金融機構於電子商務上亟需要一種既能兼顧用戶的使用便利性,同時也能具備高安全性,而不易為第三者竊取或竄改交易資料的發明。 Therefore, in view of the shortcomings of the aforementioned conventional technologies, at present, financial institutions urgently need a way of taking into account the user's convenience and high security, which is not easy for third parties to steal or The invention of tampering with transaction data.

有鑒於前述習知技術的缺點,本發明之一目的,乃在於改善前述以一次性密碼在電子商務的實際運作上,容易將交易雙方的交易資訊,被一與交易無關的不明第三者所竊取或竄改的缺點;此外,本發明之再一目的,在於改善習知技術中以冗長的帳號密碼對使用者所帶來管理的不便,同時容易被第三者盜竊,甚至過短的帳號密碼可能容易被簡單猜測的缺點,並期能由本發明所提出之技術方案,達到提高安全性與便利性的效能。 In view of the shortcomings of the aforementioned conventional technology, one object of the present invention is to improve the practical operation of the aforementioned one-time password in e-commerce, and it is easy to use the transaction information of both parties of the transaction to an unknown third party who has nothing to do with the transaction. The shortcomings of stealing or tampering; in addition, another object of the present invention is to improve the inconvenience to users caused by the lengthy account password in the conventional technology, and it is easy to be stolen by a third party, or even a short account password The shortcomings that may be easily guessed, and the technical solution proposed by the present invention can achieve the effect of improving safety and convenience.

本發明提出一種金融服務驗證系統,其包含:用戶端,該用戶端進一步包含,用戶端控制模組;生物特徵輸入模組,耦接上述用戶端控制模組,以輸入生物特徵;用戶端資安模組,耦接用戶端輸入模組,根據所輸入的生物特徵驗證身份;伺服端,該伺服端進一步包含,伺服端控制模組;以及,金融服務模組,耦接伺服端控制模組,提供金融服務的執行與申請。 The invention provides a financial service verification system, which includes: a user terminal, the user terminal further includes a user terminal control module; a biometric input module coupled to the user terminal control module to input biometrics; The security module is coupled to the input module of the user terminal and verifies the identity based on the input biometrics; the server terminal further includes a server control module; and a financial service module coupled to the server control module , The implementation and application of financial services.

根據本發明內容,上述伺服端更包含伺服端資安模組,耦接上述用戶端資安模組,驗證用戶端以登入金融服務驗證系統。 According to the content of the present invention, the above-mentioned server further includes a server-side security module, coupled to the above-mentioned client-side security module, to authenticate the client to log in to the financial service verification system.

根據本發明內容,用戶端資安模組更包含用戶端金鑰單元,根據所輸入的生物特徵第一特徵值,產生一驗證身份的驗證訊息。 According to the content of the present invention, the client-side security module further includes a client-side key unit, which generates a verification message to verify the identity according to the input first feature value of the biometrics.

根據本發明內容,用戶端資安模組更包含用戶端安全碼單元,儲存複數筆對應金融服務的用戶端安全碼。 According to the content of the present invention, the client security module further includes a client security code unit, which stores a plurality of client security codes corresponding to financial services.

根據本發明內容,金融服務模組更包含金融服務管理單元,儲存管理金融服務之種類,根據本發明之實施例,該金融服務可為金融機關本身所有,或由外部金融機關所提供。 According to the content of the present invention, the financial service module further includes a financial service management unit that stores and manages the types of financial services. According to an embodiment of the present invention, the financial service may be owned by the financial institution itself or provided by an external financial institution.

本發明提出一種金融服務驗證方法,其包含:由生物特徵輸入模組輸入生物特徵;用戶端資安模組將上述生物特徵提取第一特徵值,並計算第一特徵值與第二特徵值間的相關係數以判斷兩者是否大於一預設值,以驗證用戶身份;用戶端資安模組傳送一驗證訊息予伺服端;以及,金融服務模組執行所申請的金融服務。 The present invention provides a financial service verification method, which includes: inputting biometrics from a biometric input module; the user-side security module extracts the first biometrics from the biometrics, and calculates between the first and second characteristics To determine whether the two are greater than a preset value to verify the user's identity; the client security module sends a verification message to the server; and, the financial service module executes the requested financial service.

根據本發明內容,該方法更包含以上述用戶端控制模組選擇欲進行的金融服務。 According to the content of the present invention, the method further includes selecting the financial service to be performed with the user terminal control module.

根據本發明內容,該方法更包含伺服端資安模組驗證上述驗證訊息,以確認用戶端是否合法。 According to the content of the present invention, the method further includes the server-side security module verifying the verification message to confirm whether the client is legal.

根據本發明內容,該方法更包含用戶端資安模組驗證由伺服端資安模組傳輸的數位簽章,以互相驗證用戶端和伺服端之身份。 According to the content of the present invention, the method further includes the client-side security module verifying the digital signature transmitted by the server-side security module to verify the identity of the client and the server.

根據本發明內容,該方法更包含執行金融服務前,再次驗證由用戶端所輸入的生物特徵,以確認金融服務是否予以執行。 According to the content of the present invention, the method further includes verifying the biometrics input by the user terminal before executing the financial service to confirm whether the financial service is executed.

以上所述係用以說明本發明之目的、技術手段以及其可達成之功效,相關領域內熟悉此技術之人可以經由以下實施例之示範與伴隨之圖式說明及申請專利範圍更清楚明瞭本發明。 The above is used to illustrate the purpose, technical means and achievable effects of the present invention. Those familiar with this technology in the related arts can more clearly understand the present invention through the following examples and accompanying drawings and patent application. invention.

100‧‧‧金融服務驗證系統 100‧‧‧Financial Service Verification System

110‧‧‧用戶端 110‧‧‧Client

111‧‧‧生物特徵輸入模組 111‧‧‧Biometric input module

113‧‧‧用戶端控制模組 113‧‧‧Client control module

115‧‧‧用戶端資安模組 115‧‧‧Client Security Module

115a‧‧‧用戶端金鑰單元 115a‧‧‧Client key unit

115c‧‧‧用戶端安全碼單元 115c‧‧‧Client security code unit

130‧‧‧伺服端 130‧‧‧Servo

131‧‧‧伺服端控制模組 131‧‧‧Servo control module

133‧‧‧伺服端資安模組 133‧‧‧Servo-side security module

133a‧‧‧伺服端金鑰單元 133a‧‧‧server key unit

135‧‧‧金融服務模組 135‧‧‧Financial Service Module

135a‧‧‧金融服務管理單元 135a‧‧‧Financial Service Management Unit

300A‧‧‧第一圖譜 300A‧‧‧The first map

300B‧‧‧第二圖譜 300B‧‧‧The second map

410‧‧‧第一特徵集合 410‧‧‧The first feature set

420‧‧‧第二特徵集合 420‧‧‧Second feature set

430‧‧‧特徵集合比對 430‧‧‧ feature set comparison

510‧‧‧第一特徵值 510‧‧‧ First characteristic value

530‧‧‧第二特徵值 530‧‧‧Second characteristic value

551‧‧‧用戶端安全碼 551‧‧‧Client security code

571‧‧‧金融服務 571‧‧‧ Financial Services

700‧‧‧金融服務驗證方法 700‧‧‧ Financial service verification method

S1-S13‧‧‧方法流程 S1-S13‧‧‧Method flow

如下所述之對本發明的詳細描述與實施例之示意圖,應使本發明更被充分地理解;然而,應可理解此僅限於作為理解本發明應用之參考,而非 限制本發明於一特定實施例之中。 The detailed description of the present invention and the schematic diagrams of the embodiments as described below should make the present invention more fully understood; however, it should be understood that this is only a reference for understanding the application of the present invention and does not limit the present invention to a specific implementation Cases.

圖1係顯示本發明所提出金融服務驗證系統的系統架構。 FIG. 1 shows the system architecture of the financial service verification system proposed by the present invention.

圖2A進一步說明本發明中用戶端資安模組的系統架構。 FIG. 2A further illustrates the system architecture of the client-side security module in the present invention.

圖2B進一步說明本發明中伺服端資安模組的系統架構。 FIG. 2B further illustrates the system architecture of the server-side security module in the present invention.

圖2C進一步說明本發明中金融服務模組的系統架構。 FIG. 2C further illustrates the system architecture of the financial service module in the present invention.

圖3A係顯示本發明一實施例中,如何利用人臉的生物特徵進行身份驗證。 FIG. 3A shows how to use the biometrics of a human face for identity verification in an embodiment of the present invention.

圖3B係顯示本發明一實施例中,如何利用人臉的生物特徵進行身份驗證。 FIG. 3B shows how to use the biometrics of a human face for identity verification in an embodiment of the present invention.

圖4A係說明本發明中如何提取第一特徵值。 FIG. 4A illustrates how to extract the first feature value in the present invention.

圖4B係說明本發明中第二特徵值的來源。 FIG. 4B illustrates the source of the second feature value in the present invention.

圖4C係說明本發明中第一特徵值與第二特徵值在本發明一實施例中的比對方式。 FIG. 4C illustrates the comparison method of the first feature value and the second feature value in an embodiment of the present invention.

圖5說明本發明驗證身份之方式。 Figure 5 illustrates the identity verification method of the present invention.

圖6說明用戶端與伺服端加解密傳輸文本的方式。 Fig. 6 illustrates the way in which the client and the server encrypt and decrypt the transmitted text.

圖7係說明本發明所提出金融服務驗證方法的方法流程。 FIG. 7 illustrates the method flow of the financial service verification method proposed by the present invention.

本發明將以較佳之實施例及觀點加以詳細敘述。下列描述提供本發明特定的施行細節,俾使閱者徹底瞭解這些實施例之實行方式。然該領域之熟習技藝者須瞭解本發明亦可在不具備這些細節之條件下實行。此外,本發明亦可藉由其他具體實施例加以運用及實施,本說明書所闡述之各項細節亦可基於不同需求而應用,且在不悖離本發明之精神下進行各種不同的修飾或變更。本發明將以較佳實施例及觀點加以敘述,此類敘述係解釋本發明之結構,僅用以說明而非用以限制本發明之申請專利範圍。以下描述中使用之術語將以最廣義的合理方式解釋,即使其與本發明某特定實施例之細節描述一起使用。 The present invention will be described in detail with preferred embodiments and viewpoints. The following description provides specific implementation details of the present invention so that readers can thoroughly understand the implementation of these embodiments. However, those skilled in the art should understand that the present invention can also be implemented without these details. In addition, the present invention can also be applied and implemented by other specific embodiments. The details described in this specification can also be applied based on different needs, and various modifications or changes can be made without departing from the spirit of the present invention. . The present invention will be described in terms of preferred embodiments and viewpoints. Such descriptions explain the structure of the present invention, and are used only for illustration rather than to limit the patent scope of the present invention. The terms used in the following description will be interpreted in the broadest reasonable manner, even if they are used in conjunction with the detailed description of a specific embodiment of the present invention.

根據前述習知技術的缺點,本發明所提出之金融服務驗證系統(100)具體所欲達到的效能為,透過用戶端(110)所含之生物特徵輸入模組(111)輸入用戶的本身所具有的生物特徵以供金融服務驗證系統(100)驗證用戶的身份,以改善習知技術中,一成對的帳號密碼在驗證身份時容易被遺忘或為具有惡意的第三者所猜測的缺點;同時,以一具有更高安全性的用戶端資安模組(115)所含有的金鑰,改善傳統中利用電子郵件或電話簡訊的方式寄送一次性密碼容易為第三者所攔截的缺點,以達到本發明的目的。 According to the shortcomings of the aforementioned conventional technology, the financial service verification system (100) proposed by the present invention specifically achieves the performance of inputting the user's own through the biometric input module (111) included in the user terminal (110) It has biological characteristics for the financial service verification system (100) to verify the user's identity, to improve the conventional technology, a pair of account passwords are easily forgotten or guessed by malicious third parties when verifying their identities At the same time, the key contained in a higher security client security module (115) improves the traditional way of sending one-time passwords that are easily intercepted by third parties by email or telephone text message Disadvantages to achieve the purpose of the present invention.

請參閱圖1,本發明提出一種金融服務驗證系統(100),其包含:用戶端(110),該用戶端(110)進一步包含,用戶端控制模組(113);生物特徵輸入模組(111),耦接上述用戶端控制模組(113),以輸入生物特徵;用戶端資安模組(115),耦接用戶端控制模組(113),根據所輸入的生物特徵驗證身份;伺服端(130),該伺服端(130)進一步包含,伺服端控制模組(131);以及,金融服務模組(135),耦接伺服端控制模組(131)與用戶端資安模組(115),提供金融服務的執行與申請。於本發明一實施例中,該金融服務模組(135)可儲存於近端或遠端。根據本發明之內容,上述之用戶端控制模組(113),與伺服端控制模組(131),通常包含處理器、記憶體、暫存記憶體、顯示裝置、網路通訊模組、作業系統及應用程式等等,以通常已知方式相互連接,提供金融服務驗證系統(100)之運作與管理協調等功能,基於以上係屬通常已知架構,故在此不贅述。 Referring to FIG. 1, the present invention provides a financial service verification system (100), which includes: a user terminal (110), the user terminal (110) further includes a user terminal control module (113); a biometric input module (113) 111), coupled to the above-mentioned user-side control module (113) to input biometrics; the user-side information security module (115), coupled to the user-side control module (113), and verifying the identity according to the input biometrics; The server (130), the server (130) further includes a server control module (131); and a financial service module (135), which is coupled to the server control module (131) and the client security module Group (115), which provides the execution and application of financial services. In an embodiment of the invention, the financial service module (135) can be stored at the near end or the far end. According to the content of the present invention, the client control module (113) and the server control module (131) generally include a processor, memory, temporary memory, display device, network communication module, and operation Systems and applications, etc., are connected to each other in a generally known manner to provide functions such as operation and management coordination of the financial service verification system (100). Based on the above, they are generally known architectures, so they are not repeated here.

根據本發明之實施例,生物特徵輸入模組(111)可為但不限於人臉識別攝像機、虹膜掃描攝像機、指紋掃描器、聲紋掃描麥克風。請參閱圖3A與圖3B,其為本發明其中一以人臉圖譜進行身份驗證的實施例。於該實施例中,用戶於生物特徵輸入模組(111)輸入第一圖譜(300A),並與儲存於用戶端資安模組(115)的第二圖譜(300B)進行比較,以驗證用戶的身份。於本發明之較佳的實施例中,用戶端資安模組(115)首先將上述第一圖譜(300A)的生物特徵轉換為一數值化,可由多維度空間表示的第一特徵值(510),請參閱圖4A,坐標軸X1,X2,X3,X4,X5......Xn,分別可對應第一圖譜的橫軸、縱軸與紅光相對亮度、藍光相對亮度、綠光相對強度等等相關參數,並與圖4B中,儲存於用戶端資安模組(115)中,由多維度空間表示的第二特徵值(530)進行影像比對,以及相關係數α的計算。上述若其相關係數α大於一預設值K,則用戶端資安模組(115)判定該用戶的身份確為用戶本人;反之,若相關係數α小於該預設值K,則用戶端資安模組(115)判定身份驗證不通過。 According to an embodiment of the present invention, the biometric input module (111) may be, but not limited to, a face recognition camera, an iris scanning camera, a fingerprint scanner, and a voiceprint scanning microphone. Please refer to FIG. 3A and FIG. 3B, which is one of the embodiments of the present invention for identity verification using a face map. In this embodiment, the user inputs the first map (300A) in the biometric input module (111) and compares it with the second map (300B) stored in the user-side security module (115) to verify the user identity of. In a preferred embodiment of the present invention, the client-side security module (115) first converts the biological features of the first atlas (300A) into a numerical, first feature value (510) that can be expressed in a multi-dimensional space ), please refer to FIG. 4A, the coordinate axes X 1 , X 2 , X 3 , X 4 , X 5 ... X n , which can correspond to the horizontal axis, vertical axis of the first map and the relative brightness of the red light, Relative brightness of blue light, relative intensity of green light and other related parameters are compared with the second feature value (530) represented by multi-dimensional space and stored in the user-side security module (115) in FIG. 4B. And the calculation of the correlation coefficient α. If the above correlation coefficient α is greater than a preset value K, the user terminal security module (115) determines that the user's identity is indeed the user himself; otherwise, if the correlation coefficient α is smaller than the preset value K, the client terminal The security module (115) determines that the identity verification fails.

根據本發明一實施例,上述影像比對的方式可為赫斯朵夫距離演算法(Hausdorff Distance),其特點為當目標被遮擋、影像的訊噪比(Signal-to-noise ratio)較低,或影像晃動時仍能有良好的匹配精準度。請參閱圖4C,其首先分別將第一特徵值(510)與第一特徵值(530)降維演算後,以其分別對應的第一特徵集合(410)與對二特徵集合(420)進行疊圖比對,如特徵集合比對(430)所示,透過計算特徵集合比對(430)中每一個相對應的資料點,以計算第一特徵集合(410)的資料點,相對於第二特徵集合資料點的距離,並將結果計算出一相關係數α,如此即可比對出第一圖譜(300A)與第二圖譜(300B)的匹配程度。根據本發明之另一實施例,上述赫斯朵夫距離演算法亦可應用於指紋與虹膜等基於影像比對的生物特徵辨識。 According to an embodiment of the present invention, the above-mentioned image comparison method may be a Hausdorff Distance algorithm, which is characterized by a lower signal-to-noise ratio when the target is blocked. , Or when the image is shaking, it can still have a good matching accuracy. Please refer to FIG. 4C, which first performs dimension reduction calculation on the first feature value (510) and the first feature value (530) respectively, and then performs the first feature set (410) and the second feature set (420) corresponding to them respectively. Overlay comparison, as shown in feature set comparison (430), by calculating each corresponding data point in feature set comparison (430), to calculate the data point of the first feature set (410), relative to the first The distance between the data points of the two feature sets, and the result calculates a correlation coefficient α, so that the matching degree of the first map (300A) and the second map (300B) can be compared. According to another embodiment of the present invention, the above-described Hessdorf distance algorithm can also be applied to biometric identification based on image comparison, such as fingerprints and irises.

根據本發明內容,用戶端資安模組(115)更包含用戶端安全碼單元(115c),根據不同的金融服務儲存數筆對應的用戶端安全碼(551),該用戶端安全碼(551)包含了成對的帳號與密碼。請參閱圖5,上述複數筆的用戶端安全碼(551)均對應第二特徵值(530),亦即,用戶須通過生物特徵輸入模組(111)所輸入的第一特徵值(510)與第二特徵值(530)比對驗證用戶身份, 以啟動相對應的用戶端安全碼(551)與金融服務(571),以達到本發明中,以用戶輸入生物特徵取代以往習知技術直接使用帳號與密碼驗證身份的目的。此外,其金融服務(571)不限於金融機關本身所有,或可由外部金融機關所提供。 According to the content of the invention, the client security module (115) further includes a client security code unit (115c), which stores several corresponding client security codes (551) according to different financial services, and the client security code (551) ) Contains a pair of account and password. Please refer to FIG. 5, the plurality of client security codes (551) correspond to the second feature value (530), that is, the user must enter the first feature value (510) through the biometric input module (111) Compare with the second feature value (530) to verify the user's identity to activate the corresponding client security code (551) and financial service (571), in order to achieve the present invention, the user input biometrics to replace the conventional technology directly The purpose of using account and password to verify identity. In addition, its financial services (571) are not limited to financial institutions themselves, or may be provided by external financial institutions.

根據本發明內容,用戶端資安模組(115)更包含用戶端金鑰單元(115a),根據第一特徵值(510)與第二特徵值(530)的比對結果,產生一向伺服端(130)驗證用戶端(110),並經過加密的驗證訊息。在本發明中之實施例中,用作加解密的手段可為對稱金鑰、非對稱金鑰,或是以上的混用。 According to the present invention, the client security module (115) further includes a client key unit (115a), which generates a one-way server based on the comparison result of the first feature value (510) and the second feature value (530) (130) Verify the client (110), and the encrypted verification message. In the embodiments of the present invention, the means used for encryption and decryption may be a symmetric key, an asymmetric key, or a mixture of the above.

根據本發明之一實施例,請參閱圖6,使用非對稱演算法作為加解密的技術手段。在非對稱金鑰中,一完整的金鑰由一公鑰(Public Key)和一私鑰(Private Key)所組成,其做法為:當用戶端(110)欲與伺服端(130)進行身份驗證時,伺服端(130)將其所持有的公鑰傳送予用戶端(110);當用戶端(110)接收到伺服端(130)給予的公鑰時,則將要傳輸的驗證訊息以伺服端(130)的公鑰進行加密並傳送予伺服端(130);伺服端(130)再使用私鑰將上述以公鑰加密的驗證訊息進行解密。而該伺服端(130)的公鑰只能加密驗證訊息,而無法解密驗證訊息,若要解密,則必須使用伺服端(130)的私鑰始可完成。如此作法的好處為,當用戶端(110)的驗證訊息在傳送給伺服端(130)的過程中,即便為具有惡意的第三者所攔截,由於私鑰僅伺服端(130)持有,而第三者其並未持有伺服端(110)的私鑰,同時第三者也無法藉由伺服端(110)公開的公鑰逆向推得所對應的私鑰,故而第三者無法解密用戶端(110)與伺服端(130)的驗證訊息,達到通訊安全的目的。 According to an embodiment of the present invention, please refer to FIG. 6, which uses an asymmetric algorithm as a technical means of encryption and decryption. In the asymmetric key, a complete key is composed of a public key (Public Key) and a private key (Private Key), the method is as follows: when the client (110) wants to identify with the server (130) During verification, the server (130) sends the public key it holds to the client (110); when the client (110) receives the public key given by the server (130), the verification message to be transmitted is The public key of the server (130) is encrypted and sent to the server (130); the server (130) then uses the private key to decrypt the verification message encrypted with the public key. The public key of the server (130) can only encrypt the verification message, but cannot decrypt the verification message. If you want to decrypt, you must use the private key of the server (130) to complete. The advantage of this approach is that when the authentication message of the client (110) is sent to the server (130), even if it is intercepted by a malicious third party, because the private key is only held by the server (130), The third party does not hold the private key of the server (110), and the third party cannot use the public key published by the server (110) to reversely derive the corresponding private key, so the third party cannot decrypt The authentication messages of the client (110) and the server (130) achieve the purpose of communication security.

根據本發明一實施例,上述用戶端(110)與伺服端(130)各別擁有的公私鑰可分別由用戶端金鑰單元(115a)與伺服端金鑰單元(133a),基於公開金鑰基礎建設(Public Key Infrastructure,PKI,或稱PKI機制)所產生。該PKI機制具有下述特點: According to an embodiment of the present invention, the public and private keys respectively owned by the client (110) and the server (130) can be composed of a client key unit (115a) and a server key unit (133a), based on the public key Infrastructure (Public Key Infrastructure, PKI, or PKI mechanism). The PKI mechanism has the following characteristics:

1.訊息的隱蔽性:由於上述的私鑰於傳輸的過程中自始至終均未被傳輸,因此在加解密的過程中物理上即無法為第三者所得知。 1. Concealment of the message: Since the private key mentioned above has not been transmitted from the beginning to the end, it is physically impossible for the third party to know during the encryption and decryption process.

2.訊息完整性:由於上述的公私鑰的產生機制為成對產生,在對驗證訊息加解密 的過程中無論伺服端(130)驗證用戶端(110)身份,抑或用戶端(110)反向驗證伺服端(130)身份,均需以私鑰進行解密,故驗證訊息不會被非法竄改。 2. Message integrity: Since the above-mentioned public and private key generation mechanisms are generated in pairs, whether the server (130) verifies the identity of the client (110) or reverses the client (110) during the process of encrypting and decrypting the verification message The identity of the server (130) needs to be decrypted with the private key, so the verification message will not be tampered with illegally.

3.身份辨識性:成對的公私鑰僅可為用戶端金鑰單元(115a)或伺服端金鑰單元(133a)產生,其驗證訊息無法冒名產生。 3. Identity recognition: the paired public and private keys can only be generated for the client-side key unit (115a) or the server-side key unit (133a), and the verification message cannot be generated in a false name.

4.交易不可否認性:基於上述的身份辨識性,已完成的交易無法被否認。 4. Non-repudiation of transactions: Based on the above-mentioned identification, completed transactions cannot be denied.

根據本發明內容,PKI機制中產生公私鑰的方式可為但不限於RSA演算法、EIGamal演算法、橢圓曲線加密演算法(Elliptic curve cryptography,ECC)。在本發明一實施例中,為橢圓曲線加密演算法(Elliptic curve cryptography,ECC),其優勢在於以橢圓曲線加密的公鑰與私鑰對與其它方法所產生的更小,其最小密鑰長度僅需160位元,相對其它演算法所產生的密鑰長度需512位元或512位元以上,當驗證訊息的傳輸大小有一定要求時,則其能在較短的密鑰長度下仍能提供同等或更高的安全性。其運作的原理基於在一定義的有限數學空間中(該有限數學空間可以二元三次方程式表示,並包含無窮遠之一點),容易對該有限數學空間的每個元素進行加法、減法、乘法,但難以進行除法,同時在該有限數學空間中的每個元素無論進行任何運算,最終的運算結果仍屬於該有限數學空間所含元素的數學性質,加密驗證訊息,使第三者無法藉由簡單的除法運算得到驗證訊息的內容,以達到驗證訊息在傳輸過程中得以滿足前述訊息隱蔽性、訊息完整性、身份辨識性與交易不可否認性的目的。 According to the content of the present invention, the method for generating the public and private keys in the PKI mechanism may be, but not limited to, RSA algorithm, EIGamal algorithm, Elliptic curve cryptography (ECC). In one embodiment of the present invention, it is an elliptic curve cryptography (ECC), which has the advantage that the pair of public and private keys encrypted with an elliptic curve is smaller than other methods, and its minimum key length It only needs 160 bits, and the key length generated by other algorithms needs to be 512 bits or more. When the transmission size of the verification message has certain requirements, it can still work with a shorter key length. Provide equal or higher security. The principle of its operation is based on a defined finite mathematical space (the finite mathematical space can be represented by a binary cubic equation and contains one point of infinity), and it is easy to add, subtract, and multiply each element of the finite mathematical space, But it is difficult to divide. At the same time, no matter whether any operation is performed on each element in the limited mathematical space, the final operation result still belongs to the mathematical nature of the elements contained in the limited mathematical space. The encrypted verification information prevents the third party from simply The division operation of obtains the content of the verification message, so as to achieve the purpose of concealment, message integrity, identity recognition and non-repudiation of the transaction during the transmission process of the verification message.

根據本發明內容,上述伺服端(130)更包含伺服端資安模組(133),耦接上述用戶端資安模組(115),根據用戶端(110)所傳輸的驗證訊息以驗證用戶端(110)的身份。在本發明一實施例中,當該伺服端資安模組(133)接到驗證訊息,確認了用戶端(110)之身份後,即回應一同樣能表明伺服端(130)的數位簽章予用戶端(110),以完成伺服端(130)和用戶端(110)互相身份的驗證,以達到加強前述訊息隱蔽性、訊息完整性、身份辨識性,與交易不可否認性的目的。 According to the present invention, the server (130) further includes a server-side security module (133), coupled to the client-side security module (115), and authenticates the user according to the verification message transmitted by the client (110) End (110) identity. In an embodiment of the invention, when the server-side security module (133) receives the verification message and confirms the identity of the client (110), it responds with a digital signature that also indicates the server (130) To the client (110) to complete the mutual identity verification of the server (130) and the client (110) to achieve the purpose of enhancing the aforementioned message concealment, message integrity, identity recognition, and transaction non-repudiation.

根據本發明內容,金融服務模組(135)耦接伺服端控制模組(131), 當伺服端控制模組(131)確認上述伺服端(130)和用戶端(110)互相驗證身份無誤後,金融服務模組(135)即開始進行用戶端(110)所需的金融服務(571)執行與申請。在本發明一實施例中,金融服務模組(135)中所含的金融服務管理單元(135a)儲存複數筆不同種類的金融服務(571),其可為但不限於與金融相關的各類電子商務,包含交易轉帳、貨幣交易、服務查詢、儲金保險業務、信用貸款、基金股票業務、信託申請與金融商品交易等等,而用戶可透過用戶端控制模組(113)選擇一筆或數筆欲進行的金融服務(571)類別,以達成本發明金融服務驗證系統(100)提高安全性與便利性的效能。在本發明之另一實施例,該金融服務(571)可為金融機關本身所有,或由外部的金融機關所提供。 According to the content of the present invention, the financial service module (135) is coupled to the server control module (131). After the server control module (131) confirms that the server (130) and the client (110) verify each other's identity correctly Then, the financial service module (135) starts to execute and apply for the financial service (571) required by the client (110). In an embodiment of the invention, the financial service management unit (135a) contained in the financial service module (135) stores a plurality of different types of financial services (571), which may be, but not limited to, various types of financial-related E-commerce, including transaction transfer, currency transaction, service inquiry, deposit insurance business, credit loan, fund stock business, trust application and financial commodity transaction, etc., and users can choose a sum or a number through the user terminal control module (113) The financial service (571) category that I intend to perform is to invent the financial service verification system (100) to improve the efficiency of security and convenience. In another embodiment of the present invention, the financial service (571) may be owned by the financial institution itself or provided by an external financial institution.

為改善習知技術的缺點,請參閱圖7,本發明提出一種金融服務驗證方法(700),其包含:於流程(S1)中,由生物特徵輸入模組(111)輸入生物特徵;而於流程(S2)中,用戶端資安模組(115)將上述生物特徵提取第一特徵值(510),並於流程(S3)計算第一特徵值(510)與第二特徵值(530)間的相關係數α以判斷兩者是否大於一預設值K,以驗證用戶身份,當相關係數α小於K時,代表第一圖譜(300A)與第二圖譜(300B)可能並不相同,故要求執行流程(S4)重新輸入生物特徵,或直接結束流程,反之,則執行流程(S6),用戶端資安模組(115)傳送一加密後的驗證訊息予伺服端(130);以及,流程(S13),金融服務模組(135)執行所申請的金融服務(571)。 To improve the shortcomings of the conventional technology, please refer to FIG. 7, the present invention proposes a financial service verification method (700), which includes: in the process (S1), the biometric input module (111) inputs biometrics; and In the process (S2), the user-side security module (115) extracts the above-mentioned biological characteristics to the first feature value (510), and calculates the first feature value (510) and the second feature value (530) in the process (S3) To determine whether the two are greater than a preset value K to verify the user's identity. When the correlation coefficient is less than K, it means that the first map (300A) and the second map (300B) may be different, so The execution process (S4) is required to re-enter the biometrics, or the process is ended directly, otherwise, the process (S6) is executed, and the client security module (115) sends an encrypted verification message to the server (130); and, Process (S13), the financial service module (135) executes the applied financial service (571).

根據本發明之實施例,上述由生物特徵輸入模組(111)所輸入的生物特徵,可為但不限於人臉特徵、虹膜特徵、指紋特徵、聲紋特徵。由本發明之一觀點中,以人臉特徵、虹膜特徵、指紋特徵等基於影像所提取之第一特徵值(510)與第二特徵值(530)的比對方式可為赫斯朵夫距離演算法。 According to an embodiment of the present invention, the biometrics input by the biometrics input module (111) may be, but not limited to, facial features, iris features, fingerprint features, and voiceprint features. According to one aspect of the present invention, the comparison method of the first feature value (510) and the second feature value (530) extracted from the image based on facial features, iris features, fingerprint features, etc. can be the Hessdorf distance calculation law.

根據本發明內容,該方法更包含流程(S5),以上述用戶端控制模組(113)選擇欲進行的金融服務(571)。在本發明一實施例中,上述金融服務(571)之種類儲存於金融服務管理單元(135a),其可為但不限於與金融相關的各類電子商務,包含交易轉帳、貨幣交易、服務查詢、儲金保險業務、信用貸款、基金股票業務、信託申請與金融商品交易等等。 According to the content of the present invention, the method further includes a process (S5), which uses the client control module (113) to select the financial service (571) to be performed. In an embodiment of the present invention, the types of the financial services (571) are stored in the financial service management unit (135a), which can be, but not limited to, various types of e-commerce related to finance, including transaction transfer, currency transactions, and service inquiries , Savings insurance business, credit loan, fund stock business, trust application and financial commodity trading, etc.

根據本發明內容,該方法更包含流程(S7),伺服端資安模組(133)驗證上述經過加密的驗證訊息,以確認用戶端(110)是否合法。其中,該驗證訊息的加密方法可為但不限於RSA演算法、EIGamal演算法、橢圓曲線加密演算法(Elliptic curve cryptography,ECC)等等。在本發明實施例中,當流程(S7)中驗證用戶端(110)失敗或不合法時,執行(S8)流程以再一次執行流程(S6)或結束金融服務驗證方法(700);反之,則執行流程(S9)。 According to the present invention, the method further includes a process (S7). The server-side security module (133) verifies the encrypted verification message to confirm whether the client (110) is legal. The encryption method of the verification message may be, but not limited to, RSA algorithm, EIGamal algorithm, elliptic curve cryptography (ECC), and so on. In the embodiment of the present invention, when the verification of the client (110) in the process (S7) fails or is illegal, the process (S8) is executed to execute the process (S6) again or end the financial service verification method (700); otherwise, Then the flow (S9) is executed.

根據本發明內容,於流程(S9)中,當流程(S7)中驗證用戶端(110)身份成功後,伺服端資安模組(133)傳輸予用戶端(110)一數位簽章,而用戶端資安模組(115)驗證該數位簽章,以達到互相驗證用戶端(110)和伺服端(130)是否合法的目的。在本發明一實施例中,若上述之驗證動作失敗,執行流程(S10),則再一次執行流程(S9)或結束金融服務驗證方法(700),反之,則執行流程(S11)。 According to the content of the invention, in the process (S9), when the identity of the client (110) is successfully verified in the process (S7), the server-side security module (133) transmits a digital signature to the client (110), and The client security module (115) verifies the digital signature to achieve the purpose of mutually verifying whether the client (110) and the server (130) are legal. In an embodiment of the present invention, if the verification operation fails and the process (S10) is executed, the process (S9) is executed again or the financial service verification method (700) is ended, otherwise, the process (S11) is executed.

根據本發明內容,該方法更包含流程(S11),執行金融服務(571)前,再次驗證由用戶端(110)所輸入的生物特徵,以確認金融服務(571)是否予以執行,流程(S11)的目的,在於避免用戶誤觸金融服務(571),或是避免用戶在不完全明瞭金融服務(571)的情況下,執行該項金融服務(571),造成金融機關與用戶的誤會,同時,於用戶端(110)再次輸入生物特徵,亦可確保所申請金融服務(571)確為用戶本人,其驗證的方法同流程(S1)-流程(S3)所述。根據本發明之實施例,當流程(S11)確認失敗時,則執行流程(S12),再次執行流程(S11),或結束流程金融服務驗證方法(700),反之,則執行流程(S13),金融服務模組(135)旋即開始執行所申請的金融服務(571)。 According to the content of the present invention, the method further includes a process (S11). Before executing the financial service (571), the biometrics input by the user terminal (110) are verified again to confirm whether the financial service (571) is executed, the process (S11) ) Is to prevent users from accidentally touching financial services (571), or to prevent users from executing financial services (571) without fully understanding the financial services (571), causing misunderstandings between financial institutions and users, and In the user terminal (110), enter the biometrics again to ensure that the financial service (571) applied is indeed the user. The verification method is the same as the process (S1)-process (S3). According to an embodiment of the present invention, when the process (S11) confirmation fails, the process (S12) is executed, the process (S11) is executed again, or the process financial service verification method (700) is ended, otherwise, the process (S13) is executed, The financial service module (135) immediately begins to execute the applied financial service (571).

100‧‧‧金融服務驗證系統 100‧‧‧Financial Service Verification System

110‧‧‧用戶端 110‧‧‧Client

111‧‧‧生物特徵輸入模組 111‧‧‧Biometric input module

113‧‧‧用戶端控制模組 113‧‧‧Client control module

115‧‧‧用戶端資安模組 115‧‧‧Client Security Module

130‧‧‧伺服端 130‧‧‧Servo

131‧‧‧伺服端控制模組 131‧‧‧Servo control module

133‧‧‧伺服端資安模組 133‧‧‧Servo-side security module

135‧‧‧金融服務模組 135‧‧‧Financial Service Module

Claims (12)

一種金融服務驗證系統,包含:一用戶端資安模組,儲存於一用戶端,該用戶端包含用戶端控制模組;其中該用戶端資安模組,耦接該用戶端控制模組,藉由一生物特徵輸入模組,可輸入至少一筆生物特徵,驗證用戶身份;以及,一金融服務模組,儲存於近端或遠端,耦接該用戶端控制模組,提供至少一筆金融服務的執行與申請。 A financial service verification system includes: a client-side security module stored in a client, the client includes a client-side control module; wherein the client-side security module is coupled to the client-side control module, A biometric input module can input at least one biometric to verify the user's identity; and, a financial service module, stored at the near-end or far-end, coupled to the client control module to provide at least one financial service Implementation and application. 如請求項1所述之金融服務驗證系統,其中更包含一伺服端,該伺服端包含一伺服端資安模組,耦接該用戶端資安模組,根據該用戶端所傳輸經過加密的一驗證訊息以驗證該用戶端的身份。 The financial service verification system according to claim 1, further comprising a server, the server includes a server-side security module, coupled to the client-side security module, based on the encrypted data transmitted by the client A verification message to verify the identity of the client. 如請求項2所述之金融服務驗證系統,當該伺服端資安模組接收到該驗證訊息,回應經過加密的一數位簽章予該用戶端,以使該伺服端和該用戶端得互相驗證身份。 According to the financial service verification system described in claim 2, when the server-side security module receives the verification message, it responds with an encrypted digital signature to the client, so that the server and the client have to communicate with each other Verify identidy. 如請求項1所述之金融服務驗證系統,該用戶端資安模組更包含一用戶端安全碼單元,根據該至少一筆金融服務儲存所對應的至少一筆用戶端安全碼。 According to the financial service verification system of claim 1, the client security module further includes a client security code unit, and stores at least one client security code corresponding to the at least one financial service. 如請求項1所述之金融服務驗證系統,該至少一筆生物特徵可為人臉特徵、虹膜特徵、指紋特徵、聲紋特徵,或以上之組合。 According to the financial service verification system of claim 1, the at least one biometric feature may be a facial feature, an iris feature, a fingerprint feature, a voiceprint feature, or a combination of the above. 如請求項2或3所述之金融服務驗證系統,加密的方法可為對稱金鑰、非對稱金鑰,或是以上的組合。 As in the financial service verification system described in claim 2 or 3, the encryption method may be a symmetric key, an asymmetric key, or a combination of the above. 一種金融服務驗證方法,包含下列流程:由一生物特徵輸入模組輸入至少一筆生物特徵;一用戶端資安模組將該至少一筆生物特徵提取一第一特徵值,計算該第一特徵值與一第二特徵值的一相關係數是否大於一預設值;以及若該相關係數大於該預設值,則該用戶端資安模組傳送加密的一驗證訊息, 並藉由一金融服務模組執行至少一筆金融服務。 A financial service verification method includes the following processes: a biometric input module inputs at least one biometric feature; a user information security module extracts the at least one biometric feature from a first feature value, and calculates the first feature value and Whether a correlation coefficient of a second eigenvalue is greater than a preset value; and if the correlation coefficient is greater than the preset value, the client security module sends an encrypted verification message through a financial service module Perform at least one financial service. 如請求項7所述之金融服務驗證方法,更包含一伺服端資安模組驗證該驗證訊息;以及,該用戶端資安模組驗證由一伺服端資安模組傳輸加密的一數位簽章,以驗證一用戶端與一伺服端的身份。 The financial service verification method described in claim 7 further includes a server-side security module verifying the verification message; and, the client-side security module verifies that a digital signature transmitted by a server-side security module is encrypted Chapter to verify the identity of a client and a server. 如請求項7所述之金融服務驗證方法,更包含一用戶端透過一用戶端控制模組選擇欲進行的該至少一筆金融服務。 The financial service verification method according to claim 7, further comprising a user terminal selecting the at least one financial service to be performed through a user terminal control module. 如請求項9所述之金融服務驗證方法,更包含選擇該至少一筆金融服務後,再度由該生物特徵輸入模組輸入該至少一筆生物特徵,並由該用戶端資安模組再度比較該第一特徵值與該第二特徵值之相關係數是否大於該預設值,以驗證該用戶端的身份。 The financial service verification method as described in claim 9, further includes selecting the at least one financial service, inputting the at least one biometric feature from the biometric input module again, and comparing the first Whether the correlation coefficient between a feature value and the second feature value is greater than the preset value to verify the identity of the user terminal. 如請求項7所述之金融服務驗證方法,該至少一筆生物特徵可為人臉特徵、虹膜特徵、指紋特徵、聲紋特徵,或以上之組合。 According to the financial service verification method of claim 7, the at least one biometric feature may be a facial feature, an iris feature, a fingerprint feature, a voiceprint feature, or a combination of the above. 如請求項8所述之金融服務驗證方法,加密的方法可為對稱金鑰、非對稱金鑰,或是以上的組合。 As in the financial service verification method described in claim 8, the encryption method may be a symmetric key, an asymmetric key, or a combination of the above.
TW107123171A 2018-07-04 2018-07-04 System and method of financial services certification TW202006604A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW107123171A TW202006604A (en) 2018-07-04 2018-07-04 System and method of financial services certification
CN201811051764.8A CN110689351A (en) 2018-07-04 2018-09-10 Financial service verification system and financial service verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107123171A TW202006604A (en) 2018-07-04 2018-07-04 System and method of financial services certification

Publications (1)

Publication Number Publication Date
TW202006604A true TW202006604A (en) 2020-02-01

Family

ID=69107384

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107123171A TW202006604A (en) 2018-07-04 2018-07-04 System and method of financial services certification

Country Status (2)

Country Link
CN (1) CN110689351A (en)
TW (1) TW202006604A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI781071B (en) * 2021-07-27 2022-10-11 玉山綜合證券股份有限公司 Method of verifying securities orders

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709716A (en) * 2015-11-13 2017-05-24 航天信息股份有限公司 Method, device and system for PBOC transaction based on biometric encryption
CN105740682B (en) * 2016-01-12 2018-08-31 黑河学院 The personal identification method and system of a kind of computer system and its user
CN105681324B (en) * 2016-02-25 2019-03-08 上海诺亚投资管理有限公司 Internet financial transaction system and method
CN107113315B (en) * 2016-04-15 2020-11-13 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
US10373167B2 (en) * 2016-06-30 2019-08-06 Square, Inc. Logical validation of devices against fraud

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI781071B (en) * 2021-07-27 2022-10-11 玉山綜合證券股份有限公司 Method of verifying securities orders

Also Published As

Publication number Publication date
CN110689351A (en) 2020-01-14

Similar Documents

Publication Publication Date Title
US11770369B2 (en) System and method for identity verification across mobile applications
US20180144114A1 (en) Securing Blockchain Transactions Against Cyberattacks
US11824991B2 (en) Securing transactions with a blockchain network
US10810585B2 (en) Systems and methods for authenticating users in connection with mobile operations
US9384338B2 (en) Architectures for privacy protection of biometric templates
US20130219481A1 (en) Cyberspace Trusted Identity (CTI) Module
US20180288031A1 (en) Collection point anchored multi-property identity based application specific token origination
US20210367786A1 (en) Server-assisted privacy protecting biometric comparison
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
US20240048555A1 (en) Privacy-Preserving Biometric Authentication
US20140047233A1 (en) System and methods for automated transaction key generation and authentication
US11949785B1 (en) Biometric authenticated biometric enrollment
WO2013044192A2 (en) Securing transactions against cyberattacks
US11792012B2 (en) Distributed biometric comparison framework
US11303447B2 (en) Authentication system using paired, role reversing personal devices
WO2022042745A1 (en) Key management method and apparatus
TW202006604A (en) System and method of financial services certification
Alese et al. Multilevel authentication system for stemming crime in online banking
US20230362009A1 (en) User identification and authentication method and system
US20240169350A1 (en) Securing transactions with a blockchain network
US20240121098A1 (en) Scalable Authentication System with Synthesized Signed Challenge
US11444953B2 (en) Methods, systems, apparatuses and devices for facilitating security of a resource using a plurality of credentials
Abinaya Secure Banking Transaction using Encryption Based Negative Password Scheme
Lora et al. Enhancing Security Through the Utilization of Multifactor Security Algorithms