WO2019114431A1 - 一种具有指纹验证功能的金融卡及其工作方法 - Google Patents
一种具有指纹验证功能的金融卡及其工作方法 Download PDFInfo
- Publication number
- WO2019114431A1 WO2019114431A1 PCT/CN2018/112122 CN2018112122W WO2019114431A1 WO 2019114431 A1 WO2019114431 A1 WO 2019114431A1 CN 2018112122 W CN2018112122 W CN 2018112122W WO 2019114431 A1 WO2019114431 A1 WO 2019114431A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification
- fingerprint
- instruction
- user
- financial card
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0716—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor
- G06K19/0718—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor the sensor being of the biometric kind, e.g. fingerprint sensors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/354—Card activation or deactivation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
- G06Q20/3563—Software being resident on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3574—Multiple applications on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0833—Card having specific functional components
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
Definitions
- the present disclosure relates to the field of information technology, and in particular, to a financial card with a fingerprint verification function and a working method thereof.
- the use of financial cards for electronic transactions is becoming more and more common in daily life.
- identity verification is required in the electronic transaction process, and the existing authentication methods are mostly the upper computer of the financial card user in data interaction with the financial card (the upper computer can be a transaction)
- the terminal or the smart terminal, for example, the transaction terminal is a POS machine, enters an authentication code.
- the authentication method in the prior art has the following defects: the user of the financial card needs to input the authentication code on the upper computer during the authentication, and the risk of the identity verification code is leaked, which brings the opportunity for the illegally stealing the authentication code. In actual transactions, sometimes the user of the financial card forgets the authentication code, which will result in the transaction being impossible. When the number of input authentication codes exceeds the preset number, the financial card will be locked and the user experience is not good.
- the present disclosure provides a financial card with fingerprint verification function and a working method thereof.
- the working method of a financial card with fingerprint verification function includes:
- Step S1 the financial card waits to receive an instruction from the upper computer
- Step S2 When the financial card receives an instruction from the upper computer, it determines the type of the instruction, when it is determined that the received instruction is an application selection instruction, step S3 is performed; when it is determined that the received instruction is an acquisition processing option instruction, Step S4 is performed; when it is determined that the received command is a read application data command, step S5 is performed; when it is determined that the received command is an application cipher command, step S6 is performed;
- Step S3 the financial card sends the application information supported by itself to the upper computer
- Step S4 the financial card sends the file information to the upper computer
- Step S5 The financial card sends the application data corresponding to the file identifier in the read application data instruction to the upper computer;
- Step S6 The financial card performs card behavior analysis and generates an application ciphertext, and sends the application ciphertext to the upper computer;
- the above methods also include:
- the financial card in the step S2 determines that the received instruction is a verification instruction, and the verification instruction is specifically a fingerprint verification instruction, performing a cardholder verification operation according to the fingerprint of the user, and returning the card to the upper computer Person verification related information;
- the method further comprises: when the financial card receives the power-on event, performing power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and performing step S1 when the verification is passed.
- the present invention provides a financial card with fingerprint verification function, including:
- a determining module configured to determine a type of the instruction when the waiting receiving module receives an instruction from the upper computer
- a saving module for saving application information supported by the financial card; for saving file information; for saving application data;
- a first sending module configured to send the application information supported by the financial card saved by the saving module to the upper computer when the determining module determines that the instruction received by the waiting receiving module is an application selecting instruction
- a second sending module configured to: when the determining module determines that the instruction received by the waiting receiving module is an acquiring processing option instruction, sending the file information saved by the saving module to the upper computer;
- a third sending module configured to: when the determining module determines that the instruction received by the waiting receiving module is a read application data instruction, save the save module to correspond to a file identifier in the read application data command Application data is sent to the upper computer;
- the ciphertext generating module is configured to perform card behavior analysis and generate an application ciphertext when the determining module determines that the instruction received by the waiting receiving module is an application ciphertext instruction;
- a fourth sending module configured to send the application ciphertext generated by the application ciphertext generating module to the upper computer
- the financial card further includes: a cardholder verification module and/or a power on verification module;
- the cardholder verification module is configured to: when the determining module determines that the instruction received by the waiting receiving module is a verification instruction, and the verification instruction is specifically a fingerprint verification instruction, performing cardholder verification according to the fingerprint of the user Operation, returning cardholder verification related information to the upper computer;
- the saving module is further configured to save a user registration fingerprint
- the power-on verification module is configured to perform power-on verification according to the user registration fingerprint saved by the save module and the fingerprint input by the user when receiving a boot event;
- the waiting for receiving module is specifically configured to wait for receiving an instruction from the upper computer when the power-on verification module passes the verification.
- the utility model has the beneficial effects that in the electronic transaction, the financial card performs the cardholder verification operation according to the fingerprint of the user and/or performs the power-on verification according to the fingerprint input by the user when the financial card receives the booting event, without the user on the transaction terminal. Enter the authentication code to ensure that the authentication information of the authentication will not be leaked, which improves the security of the authentication.
- the fingerprint verification method is used for identity verification, and the user of the financial card does not cause the transaction to be impossible because the ID verification code is forgotten, and the financial card is not locked up.
- the use of fingerprints for authentication makes electronic transactions more convenient and faster than authentication using authentication codes.
- FIG. 1 is a flowchart of a working method of a financial card with a fingerprint verification function according to Embodiment 2 of the present invention.
- FIG. 2 is a flowchart of a working method of a financial card with a fingerprint verification function according to Embodiment 3 of the present invention.
- FIG. 3 is a block diagram showing the module composition of a financial card having a fingerprint verification function according to Embodiment 4 of the present invention.
- the working method of a financial card with fingerprint verification function includes:
- Step S1 the financial card waits to receive an instruction from the upper computer
- Step S2 When receiving the instruction from the upper computer, the financial card determines the type of the instruction. When it is determined that the received instruction is an application selection instruction, step S3 is performed; when it is determined that the received instruction is an acquisition processing option instruction, the step is performed. S4; when it is determined that the received instruction is a read application data instruction, step S5 is performed; when it is determined that the received instruction is an application ciphertext instruction, step S6 is performed;
- Step S3 the financial card sends the application information supported by itself to the upper computer
- Step S4 the financial card sends the file information to the upper computer
- Step S5 the financial card sends the application data corresponding to the file identifier in the read application data instruction to the upper computer;
- Step S6 the financial card performs card behavior analysis and generates an application ciphertext, and sends the application ciphertext to the upper computer;
- the above methods also include:
- the instruction received by the financial card in step S2 is a verification instruction, and the verification instruction is specifically a fingerprint verification instruction, the cardholder verification operation is performed according to the fingerprint of the user, and the card holder returns the card verification information;
- the method further comprises: when the financial card receives the power-on event, performing power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and performing step S1 when the verification is passed.
- the fingerprint verification instruction is specifically an online fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user, and the host computer returns the cardholder verification related information, specifically: the financial card waits for the user to input the fingerprint.
- the online fingerprint feature is calculated according to the obtained fingerprint, and the online fingerprint feature is sent to the upper computer.
- the method of the present disclosure further includes: when the instruction received by the financial card in step S2 is a verification instruction, and the verification instruction is specifically an online verification instruction, the financial card waits for the user to input a fingerprint, and when the fingerprint input by the user is obtained, The fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the online verification code saved by the user is returned to the host computer after verification, otherwise the information of the verification failure is returned to the upper computer.
- the fingerprint verification instruction is specifically an offline fingerprint verification instruction
- the financial card performs the cardholder verification operation according to the fingerprint of the user, and returns the cardholder verification related information to the upper computer, specifically: the financial card waits for the user to input the fingerprint, and when the fingerprint input by the user is obtained, the user registration fingerprint is saved according to the user. The fingerprint input by the user is verified, and the verification succeeds to return the information that the offline fingerprint verification succeeds to the upper computer, otherwise the information returned by the offline fingerprint verification is returned to the upper computer.
- the above method of the present disclosure further includes:
- the verification instruction is specifically an offline verification code verification instruction
- the user is waiting for the offline verification code to be input, and when the offline verification code input by the user is obtained, according to The offline verification code saved by the user verifies the offline verification code input by the user, and if the verification is passed, the information that the offline verification succeeds is returned to the upper computer, otherwise the information of the offline verification failure is returned to the upper computer.
- the instruction received by the financial card in the above step S2 is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction
- the offline verification code is obtained from the offline verification code verification instruction, and the The machine verification code verifies the obtained offline verification code. If the verification is passed, the information returned to the offline machine is returned successfully. Otherwise, the information returned to the offline machine fails.
- step S91-step S93 is performed:
- Step S91 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step S92 is performed, otherwise step S93 is performed;
- Step S92 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and performs step S93 if the verification is passed, otherwise returns to the offline verification by the upper computer. Failed information;
- Step S93 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds, the information of the offline fingerprint verification is returned to the upper computer, otherwise Return to the offline machine for information that the offline fingerprint verification failed.
- step S101-step S103 is performed:
- Step S101 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step S102 is performed, otherwise step S103 is performed;
- Step S102 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and returns the offline verification success information to the host computer after verification, and verifies If it fails, the host computer returns the information that the offline verification failed;
- Step S103 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information of the offline verification success to the upper computer, otherwise The bit machine returns information that the offline verification failed.
- step S2 of the present disclosure further includes: when it is determined that the received instruction is a transaction verification instruction, step S0 is performed;
- Step S0 the financial card prompts the user to input the transaction verification information, and after receiving the transaction verification information input by the user, the transaction verification information input by the user is verified, and the verification succeeds, the information that the verification is successful is returned to the upper computer; otherwise, the verification is returned to the upper computer.
- the failed message ends the transaction.
- step S0 specifically includes:
- Step S01 the financial card prompts the user to input a fingerprint
- Step S02 the financial card receives the fingerprint input by the user
- Step S03 the financial card verifies the fingerprint input by the user according to the user registration fingerprint saved by itself, and the information that the verification succeeds is generated by the verification, and the information of the verification success is returned to the upper computer; otherwise, the information of the verification failure is generated, and the verification of the verification failure is performed by the upper computer. Information, end the transaction.
- the financial card verifies the fingerprint input by the user according to the user registration fingerprint saved by itself, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines whether the calculated fingerprint feature is saved with itself.
- the fingerprint features of the user registration fingerprint are consistent, and the verification is passed, otherwise the verification fails;
- the verifying in step S03 further includes: the financial card saves the fingerprint feature calculated according to the fingerprint input by the user;
- the fingerprint verification instruction is specifically an online fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user
- the host computer returns the cardholder verification related information, specifically: the financial card will be saved and calculated.
- the fingerprint feature is sent to the host computer.
- the fingerprint verification instruction is specifically an offline fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user
- the host computer returns the cardholder verification related information, specifically: the financial card is successfully verified according to the verification
- the information generates a successful offline fingerprint verification result, and sends the successful offline fingerprint verification result to the upper computer.
- step S0 may further include:
- Step L01 the financial card prompts the user to input a transaction verification code
- Step L02 the financial card acquires a transaction verification code input by the user
- Step L03 The financial card verifies the transaction verification code input by the user according to the transaction verification code saved by itself, and the verification success message is generated by the verification, and the verification success information is returned to the upper computer; otherwise, the verification failure information is generated, and the verification is returned to the upper computer. The failed message ends the transaction;
- step S0 specifically includes:
- Step W01 the financial card obtains the transaction verification code from the transaction verification instruction
- Step W02 the financial card verifies the transaction verification code obtained from the transaction verification instruction according to the transaction verification code saved by itself, and the verification success message is generated by the verification, and the verification success information is returned to the upper computer; otherwise, the verification failure information is generated, and the information is generated.
- the bit machine returns the information that the verification failed, and ends the transaction.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step S2, and the verification instruction is specifically an offline verification code verification instruction, generating a successful offline verification code verification according to the information of successful verification. As a result, the successful offline verification code verification result is sent to the upper computer.
- the above-mentioned financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and specifically includes:
- Step H1 The financial card prompts the user to input a fingerprint
- Step H2 When the financial card acquires the fingerprint input by the user, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user.
- the financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines whether the calculated fingerprint feature is saved with itself.
- the fingerprint features of the user registration fingerprint are consistent, and the verification is passed, otherwise the verification fails; when the verification is passed, the financial card further saves the calculated fingerprint feature;
- the fingerprint verification instruction is specifically an online fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user, and returns the cardholder verification related information to the host computer, specifically: the fingerprint that the financial card will save.
- the feature is sent to the host computer.
- the method further includes: the financial card saves the result of the verification;
- the fingerprint verification instruction is specifically an offline fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user, and returns the cardholder verification related information to the host computer, specifically: the financial card is saved according to the The result of the verification is generated to generate information that the offline fingerprint verification succeeds, and the information of the successful offline fingerprint verification is sent to the upper computer.
- the financial card generates the application ciphertext
- the specific information may be: the financial card generates the application ciphertext according to the information that the offline fingerprint verification succeeds or the information that the offline fingerprint verification fails.
- the financial card before the step S1, the financial card further includes: when the financial card receives the power-on event, performing power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and when the verification is passed:
- the file information sent by the financial card to the upper computer in the above step S4 includes the record information related to the online verification code;
- the application data sent by the financial card to the upper computer in the above step S5 includes the online verification code in the read application data command. Record the online verification code corresponding to the information.
- the financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines whether the calculated fingerprint feature is The fingerprint features of the user-registered fingerprints saved by themselves are consistent, and the verification is passed, otherwise the verification fails; when the power-on verification is passed, the financial card further saves the calculated fingerprint features;
- the file information sent by the financial card to the upper computer in the above step S4 includes the record information related to the fingerprint feature;
- the application data sent by the financial card to the upper computer in the step S5 includes the fingerprint feature in the read application data command.
- the fingerprint characteristics corresponding to the recorded information includes the fingerprint characteristics corresponding to the recorded information.
- the fingerprint verification instruction is specifically an offline fingerprint verification instruction
- the financial card performs a cardholder verification operation according to the fingerprint of the user, and the host computer returns the cardholder verification related information, specifically: the financial card waits for the user input Fingerprint, when the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information that the offline fingerprint verification succeeds to the upper computer, otherwise the offline machine returns the offline fingerprint verification. Failure information.
- the financial card receives the boot event, specifically: the financial card is powered on or receives a boot event from the user.
- the financial card can perform data communication with the host computer through Bluetooth. It is also possible to perform data communication with the host computer through a non-contact or contact form.
- This embodiment provides a working method of a financial card with a fingerprint verification function, as shown in FIG. 1 , including:
- Step 101 The financial card waits to receive an instruction from the upper computer.
- Step 102 When receiving the instruction from the upper computer, the financial card determines the type of the instruction. When it is determined that the received instruction is an application selection instruction, step 103 is performed; when it is determined that the received instruction is an acquisition processing option instruction, the step is performed. 104. When it is determined that the received instruction is a read application data instruction, step 105 is performed; when it is determined that the received instruction is a verification instruction, and the verification instruction is specifically an offline fingerprint verification instruction, step 106 is performed; when it is determined that the received instruction is received When the instruction is a verification instruction, and the verification instruction is specifically an online fingerprint verification instruction, step 107 is performed; when it is determined that the received instruction is an application ciphertext instruction, step 108 is performed.
- Step 103 The financial card sends the application information supported by itself to the upper computer.
- the application information may include a card issuer parameter, for example, selecting an application name of the application.
- the application information may also include a processing option data object list (PDOL) that requires the host computer to transmit data elements to the financial card.
- PDOL processing option data object list
- the application selection instruction received by the financial card is specifically: 00 A4 04 00 07 A0 00 00 00 04 10 10; obtaining the first byte of the instruction and the data 00 A4 on the second byte as the identifier of the application selection instruction, obtaining The data 04 on the third byte of the instruction is used as the identifier selected by the name; the data 07 on the fifth byte in the instruction is obtained as the length of the data field, and the data on the sixth byte to the twelfth byte in the instruction is acquired.
- A0 00 00 00 04 10 10 as the terminal application name.
- the application information of the financial card according to the application name identifier 84, the application name A0 00 00 00 04 10 10, the application priority 87, and the preferred language 5F 2D is specifically: 6F 49 84 07 A0 00 00 00 04 10 10A5 3E 50 0A 4D 61 73 74 65 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D 61 73 74 65 72 43 61 72 64BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F 6E 06 06 43 00 00 30 30.
- the data 84 on the third byte is an application name identifier, and the data A0 00 00 00 04 10 10 on the fifth byte to the eleventh byte is an application name; the second sixteenth to the twenty-seventh
- the data 5F 2D on the byte is the identifier of the preferred language; the data 87 on the 33rd byte is the application priority identifier, and the data 01 on the 35th byte is the priority level, indicating that the priority level is the highest.
- Step 104 The financial card sends the file information to the upper computer.
- the file information includes an application file locator and an application interaction feature, wherein the application file locator lists the short file identifier, the record number, the number of records, and the static signature data required for offline data authentication corresponding to the data that the transaction needs to read.
- Storage location; application interaction features list the functions that transactions perform during processing, such as static offline data authentication, dynamic offline data authentication, composite dynamic offline data authentication, cardholder verification, and so on.
- Application interaction features are written to the financial card when personalized.
- the step 104 further includes: the financial card checks the terminal data specified in the acquisition processing option data object list, and the inspection passes the application.
- the file locator and the application interaction feature are sent to the upper computer, and if the check fails, the upper machine returns information that the usage condition is not satisfied.
- the acquisition processing option instruction received by the financial card is specifically: 80 A8 00 00 02 83 00, and the first byte of the instruction and the data 80 A8 on the second byte are obtained as identifiers for acquiring the processing option instruction;
- the financial card is organized and returned to the host computer according to the identifier 82 of the application interaction feature, the application interaction feature 38 00, the application file locator identifier 94, and the application file locator 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00
- the response data is: 77 16 82 02 38 00 94 10 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00, wherein the data 82 on the third byte is the identifier of the application interaction feature, the fifth byte And the data 38 00 on the sixth byte is an application interaction feature; the data 94 on the seventh byte is the application file locator identifier, and the data on the ninth byte to the twenty-fourth byte is 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00 is the application file locator.
- Step 105 The financial card sends the application data corresponding to the file identifier in the read application data instruction to the upper computer.
- the file identification may include a short file identifier and a record number.
- the read application data command received by the financial card is specifically: 00 B2 02 2C 00, and the first byte of the instruction and the data 00 B2 on the second byte are obtained as the identifier of the read application data instruction, and the third word in the instruction is obtained.
- the data 02 2C on the section and the fourth byte is used as the record number and the short file identifier, indicating that the file corresponding to the second record number in the fifth file is to be read.
- the financial card is identified according to the public key certificate 9F 46, the public key certificate 59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4 B5
- Step 106 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information that the offline fingerprint verification succeeds to the upper computer; The information that the offline fingerprint verification failed was not returned to the host computer.
- the offline fingerprint verification instruction received by the financial card is specifically: 00 20 01 00 00, and the data 00 20 on the first and second bytes in the instruction is used as the identifier of the verification instruction, and the third byte of the instruction is Data 01 is used as an identifier for offline fingerprint verification.
- the offline fingerprint verification instruction received by the financial card is specifically: 00 21 00 00 00, and the data 00 21 on the first and second bytes in the instruction is used as an identifier of the offline fingerprint verification instruction.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the fingerprint verification fails is returned to the upper computer; Update the number of remaining verifications and proceed to step 106.
- the method further includes: the financial card displays the number of remaining verifications.
- Step 107 The financial card waits for the user to input the fingerprint.
- the online fingerprint feature is calculated according to the obtained fingerprint, and the online fingerprint feature is sent to the upper computer.
- the online fingerprint verification instruction received by the financial card is specifically: 00 20 02 00 00, and the data 00 20 on the first and second bytes in the instruction is used as the identifier of the verification instruction, and the data on the third byte in the instruction is used. 02 as an identifier for online fingerprint verification.
- the step 107 further includes: the financial card encrypting the online fingerprint feature to obtain the encrypted online fingerprint feature; correspondingly, the financial card sends the online fingerprint feature to the upper computer, specifically: the financial card sends the encrypted online fingerprint feature Give the host computer.
- the method further includes: when the upper computer receives the encrypted online fingerprint feature, sending the encrypted online fingerprint feature to the server; after receiving the online fingerprint feature, the server receives the received online according to the fingerprint feature saved by itself. Fingerprint features are verified.
- the host computer when the host computer receives the online fingerprint feature, the online fingerprint feature is encrypted to obtain an encrypted online fingerprint feature, and the encrypted fingerprint feature is sent to the server; after receiving the encrypted online fingerprint feature, the server performs the encrypted online fingerprint feature.
- the decrypted fingerprint feature is obtained, and the decrypted fingerprint feature is verified according to the fingerprint feature saved by itself.
- Step 108 The financial card performs card behavior analysis and generates an application ciphertext, and sends the application ciphertext to the upper computer.
- the acquisition application ciphertext command received by the financial card is specifically: 80 AE 80 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 00 00 BE 05 0D 31 37 E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- the financial card is based on the ciphertext information data identifier 27, the ciphertext information data 80, the identifier of the application ciphertext 26, and the application ciphertext 81 4E F5 A4 E9 68 37 1B to organize and return the response data to the upper computer, specifically: 77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 81 4E F5 A4 E9 68 37 1B 9F 10 12 01 10 A7 80 03 02 00 00 BE 05 00 00 00 00 00 00 00 00 00 FF.
- the data 27 on the fourth byte is the ciphertext information data identifier
- the data 80 on the sixth byte is the ciphertext information data, indicating that the type of the application ciphertext is an authorization request
- the data on the thirteenth byte is 26
- the data on the fifteenth to twenty-thirdth bytes 81 4E F5 A4 E9 68 37 1B is the application ciphertext.
- the upper computer can be a transaction terminal or an intelligent terminal.
- the host computer may also prompt the user to input a fingerprint.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 102, and the verification instruction is specifically an online verification instruction, the financial card waits for the user to input the fingerprint, and when the fingerprint input by the user is obtained, The fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the online verification code saved by the user is returned to the host computer after verification, otherwise the information of the verification failure is returned to the upper computer.
- the received instruction is specifically 00 20 00 00 02 00 00
- the data 00 20 on the first and second bytes in the instruction is obtained as an identifier of the verification instruction, and the sixth byte to the seventh byte in the instruction are obtained.
- the data 00 00 is used as an identifier that requires the user to input a fingerprint and return an online verification code to the upper computer.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 102, and the verification instruction is specifically an offline verification code verification instruction, step 109 is performed;
- Step 109 The financial card waits for the user to input the offline verification code.
- the offline verification code input by the user is obtained, the offline verification code input by the user is verified according to the offline verification code saved by the user, and the verification is passed to the upper computer. Returns the information that the offline verification is successful, otherwise the information returned to the offline machine fails.
- the offline verification code verification instruction received by the financial card is specifically: 00 20 00 00 02 00 00, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the sixth word in the instruction is obtained.
- the data 00 00 on the 7th byte is used as an identifier requiring the user to input a verification code.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the verification fails is returned to the upper machine; Update the number of remaining verifications and proceed to step 109.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: when the financial card determines in step 102 that the received instruction is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, step 110 is performed;
- Step 110 The financial card obtains the offline verification code from the offline verification code verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and returns the offline verification success information to the upper computer after the verification is passed. Otherwise, the host computer returns the information that the offline verification failed.
- the offline fingerprint verification instruction received by the financial card is specifically: 00 20 00 00 02 12 34, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the fifth byte in the instruction is obtained.
- the upper data 02 is used as the length of the verification code, and the data in the sixth byte and the seventh byte of the instruction is obtained as an offline verification code, and it is determined whether the verification code in the instruction is consistent with the verification code saved by itself.
- the information returned to the offline verification success is returned to the upper computer, otherwise the information returned by the offline machine fails.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the verification fails is returned to the upper machine; Update the number of remaining verifications, and return the number of remaining verifications to the host computer, and return to step 101.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 102, and the verification instruction is specifically an offline verification instruction, performing the following steps:
- Step R01 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step R02 is performed, otherwise step R03 is performed;
- step R02 is executed, and the first byte of the instruction and the data 00 20 on the second byte are used as the identifier of the verification instruction, and the instruction is The data 01 on the third byte is used as the identifier of the fingerprint that needs to be verified by the user, and the data 00 20 on the third byte of the instruction is used as the identifier of the verification instruction, and the data 02 on the fifth byte of the instruction is used as the verification code.
- the length of the instruction, the data in the sixth byte and the seventh byte of the instruction 12 34 is used as the verification code; when the offline verification instruction received by the financial card is 00 20 00 00 02FF FF, step R03 is executed, and the first instruction is obtained.
- the data 00 20 on the byte and the second byte is used as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the length of the verification code, and the data on the sixth byte and the seventh byte in the instruction are acquired.
- FF FF is used as an identifier for the fingerprint that needs to be verified by the user.
- Step R02 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and performs step R03 after the verification is passed, otherwise the offline machine returns to the offline verification. Failure information.
- the financial card acquires the data 12 34 on the sixth to seventh bytes in the offline verification instruction 00 20 00 00 02 12 34 as an offline verification code, and takes the obtained offline verification code 12 34 offline with itself.
- the verification code 12 34 is compared, and if it is consistent, step R03 is performed.
- Step R03 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user. If the verification is passed, the information of the offline fingerprint verification is returned to the upper computer, otherwise Return to the offline machine for information that the offline fingerprint verification failed.
- the offline verification code when the user remembers the offline verification code, the offline verification code may be selected on the upper computer, and the transaction is more secure through the offline verification code and the fingerprint double verification; when the user forgets the offline verification code When you choose not to enter the offline verification code on the host computer, the transaction can continue to be executed. The financial card will not continue to execute because the online verification code is forgotten, and the user experience is better.
- the method when the verification fails, the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the verification fails is returned to the upper machine, and ends; otherwise Update the number of remaining verifications and proceed to step R02.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 102, and the verification instruction is specifically an offline verification instruction, performing the following steps:
- Step R11 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step R12 is performed, otherwise step R13 is performed;
- step R12 is executed, and the data 00 20 on the first byte and the second byte in the instruction is used as the identifier of the verification instruction, and the instruction is The data 01 on the third byte is used as the identifier of the fingerprint that needs to be verified by the user, and the data 00 20 on the third byte in the instruction is obtained as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the verification code.
- the length, the data in the sixth byte and the seventh byte of the instruction 12 34 is taken as the offline verification code; when the offline verification instruction received by the financial card is 00 20 00 00 02 00 00, step R13 is executed to obtain the instruction
- the data 00 20 on the first byte and the second byte is used as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the length of the verification code, and the sixth byte and the seventh byte in the instruction are obtained.
- the data 00 00 on the above is used as an identifier of the fingerprint that needs to be verified by the user.
- Step R12 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and returns the offline verification success information to the upper computer after verification, otherwise The machine returns the information that the offline verification failed.
- the financial card acquires the data 12 34 of the sixth to seventh byte words in the offline verification instruction 00 20 00 00 02 12 34 as an offline verification code, and takes the obtained offline verification code 12 34 offline with itself.
- the verification code 12 34 is compared, and if the comparison is consistent, the information returned to the offline verification success is returned to the upper computer.
- Step R13 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information of the offline verification success to the upper computer, otherwise upward
- the bit machine returns information that the offline verification failed.
- the method further includes: when the financial card receives the power-on event, performing the power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and performing step 101 when the verification is passed.
- the financial card receives the boot event, specifically: the financial card is powered on or receives a boot event from the user.
- the financial card is powered on specifically for the financial card to be inserted into the card slot of the contact type card reader, and the contact card reader is used to supply the financial card; or the financial card enters the non-connected card reader for non-receiving and powering up,
- the non-card reader supplies power to the financial card;
- the financial card receives the boot event from the user, specifically, after the user presses the power button of the financial card, the financial card receives the boot event.
- the financial card after the user presses the power-on button, the financial card automatically shuts down after a preset time, or the user presses the power-off button to perform shutdown.
- the financial card performs boot verification on the fingerprint input by the user according to the user registration fingerprint saved by the user, and specifically includes:
- Step T1 the financial card prompts the user to input a fingerprint
- Step T2 When the financial card acquires the fingerprint input by the user, the fingerprint input by the user is verified according to the user registration fingerprint saved by itself, and the verification proceeds to step 101;
- the method further includes: the number of times the financial card update verification fails, determining whether the number of times the verification fails to pass exceeds the preset number of times, and ending; otherwise, performing step T1; for example, the preset number of times is 3 times, the number of times the update verification failed is specifically to increase the number of times the verification failed.
- the method further includes: the financial card updates the remaining verification times, and displays the updated remaining verification times .
- the financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines whether the calculated fingerprint feature is related to itself.
- the fingerprint features of the saved user registration fingerprints are consistent, and the verification is passed, otherwise the verification fails;
- the method further includes: the financial card saves the calculated fingerprint feature;
- the above step 107 may also be specifically: the financial card sends the saved fingerprint feature to the upper computer.
- the file information sent by the financial card to the upper computer in the above step 104 includes the record information related to the fingerprint feature; specifically, the record information related to the fingerprint feature includes the short file identifier of the file record in which the fingerprint feature is located and the corresponding record number;
- the application data sent by the financial card to the upper computer in the above step 105 includes the fingerprint feature corresponding to the record information of the fingerprint feature in the read application data command.
- the record information of the fingerprint feature specifically includes a short file identifier of the file where the fingerprint feature is located and a corresponding record number;
- the method further includes: the financial card saves the result of the verification;
- the above step 106 may further be: the financial card generates the information that the offline fingerprint verification succeeds according to the saved verification result, and sends the offline fingerprint verification success information to the upper computer.
- the power-on verification is performed according to the user registration fingerprint saved by the user and the fingerprint input by the user, and when the verification is passed: the financial card is sent to the upper-level in the above step 104.
- the file information of the machine includes the record information related to the online verification code; specifically, the record information related to the online verification code includes a short file identifier of the file record of the online verification code and a corresponding record number;
- the application data sent by the financial card to the upper computer in the above step 105 includes an online verification code corresponding to the record information of the online verification code in the read application data command.
- the record information of the online verification code specifically includes a short file identifier of the file where the online verification code is located and a corresponding record number.
- the above-mentioned financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, and may be replaced by: the financial card performs power-on verification according to the power-on verification code saved by the financial card and the power-on verification code input by the user.
- the performing, by the financial card, the power-on verification according to the power-on verification code saved by the user and the power-on verification code input by the user includes:
- Step M1 The financial card prompts the user to input a power-on verification code
- Step M2 When the financial card obtains the power-on verification code input by the user, the power-on verification code input by the user is verified according to the power-on verification code saved by the user, and if the verification is passed, step 101 is performed;
- the method further includes: the number of times the financial card update verification fails, determining whether the number of times the verification fails to pass exceeds the preset number of times, and ending; otherwise, performing step M1; for example, the preset number of times is 3 times, the number of times the update verification failed is specifically to increase the number of times the verification failed.
- the user waits for the user to input the power-on verification code or waits for the user to input the power-on verification code, and further includes: the financial card updates the remaining verification times, and displays the updated number.
- step 102 further includes: when it is determined that the received instruction is a transaction verification instruction, step S0 is performed;
- Step S0 the financial card prompts the user to input the transaction verification information, and after receiving the transaction verification information input by the user, the transaction verification information input by the user is verified, and the verification succeeds, the information that the verification is successful is returned to the upper computer; otherwise, the verification is returned to the upper computer.
- the failed message ends the transaction.
- step S0 specifically includes:
- Step S01 the financial card prompts the user to input a fingerprint
- Step S02 the financial card receives the fingerprint input by the user
- Step S03 the financial card verifies the fingerprint input by the user according to the user registration fingerprint saved by itself, and the information that the verification succeeds is generated by the verification, and the information of the verification success is returned to the upper computer; otherwise, the information of the verification failure is generated, and the verification of the verification failure is performed by the upper computer. Information, end the transaction.
- step S03 the financial card verifies the fingerprint input by the user according to the user registration fingerprint saved by itself, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines whether the calculated fingerprint feature is The fingerprint features of the user-registered fingerprints saved by themselves are consistent, and the verification is passed, otherwise the verification fails;
- the verification in step S03 further includes: the financial card saves the fingerprint feature calculated according to the fingerprint input by the user;
- step 107 in this embodiment may further be: the financial card sends the saved fingerprint feature to the upper computer.
- the foregoing step 106 may further be: the financial card generates a successful offline fingerprint verification result according to the information of the successful verification, and sends the successful offline fingerprint verification result to the upper computer.
- step S0 may further include:
- Step L01 the financial card prompts the user to input a transaction verification code
- Step L02 the financial card acquires a transaction verification code input by the user
- Step L03 The financial card verifies the transaction verification code input by the user according to the transaction verification code saved by itself, and the verification success message is generated by the verification, and the verification success information is returned to the upper computer; otherwise, the verification failure information is generated, and the verification is returned to the upper computer. The failed message ends the transaction.
- step S0 may further include:
- Step W01 the financial card obtains the transaction verification code from the transaction verification instruction
- Step W02 the financial card verifies the transaction verification code obtained from the transaction verification instruction according to the verification code saved by itself, and the information that the verification succeeds is generated by the verification, and the information that the verification succeeds is returned to the upper computer; otherwise, the verification failure information is generated, and the information is up.
- the machine returns the information that the verification failed, and ends the transaction.
- the method of the present embodiment further includes: when it is determined in step 102 that the received instruction is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, the financial card generates a successful offline verification code verification result according to the information that the verification is successful. , the successful offline verification code verification result is sent to the upper computer.
- the foregoing financial card generates an application ciphertext, which may be specifically: the financial card generates an application ciphertext according to the offline fingerprint verification success information or the offline fingerprint verification failure information.
- the method when the financial card waits for the user to input the fingerprint, the method further includes: the financial card prompting the user to input the fingerprint.
- the financial card prompts the user to input a fingerprint
- the financial card prompts the user to input the fingerprint through a display screen, an indicator light, or an audio.
- the operation of entering a fingerprint by the financial card is also included.
- the user registration fingerprint saved by the financial card itself is registered and entered when the fingerprint operation is entered.
- the operation of inputting a fingerprint on the financial card may input the fingerprint of the user at the bank service desk when the financial card is personalized; or the user himself or herself enters the fingerprint of the user on the financial card.
- the operation of inputting the fingerprint by the financial card specifically includes: the financial card receives the input fingerprint event, waits for the user to input the fingerprint, and saves the entered fingerprint when receiving the fingerprint entered by the user.
- the operation of inputting the fingerprint by the financial card is specifically: when the financial card receives the fingerprint instruction (financial card personalization) of the upper computer, the user waits for the user to enter the fingerprint, and when receiving the fingerprint entered by the user, saves the entered fingerprint.
- the receipt of the fingerprint event by the financial card is specifically: receiving an input fingerprint event from the user (the user enters the fingerprint by himself).
- the financial card receiving the input fingerprint event from the user may be specifically: after the user presses the input fingerprint function button on the financial card, the financial card receives the input fingerprint event from the user; or the user presses the function button, and the financial card displays Function menu, when the user selects the fingerprint function function in the function menu, the financial card receives the event of entering the fingerprint from the user.
- the financial card after receiving the fingerprinting event or receiving the fingerprinting instruction, the financial card further includes: the financial card prompting the user to input the fingerprint; specifically, the financial card passes the display screen, the indicator light, or the sound terminal by one or more methods. Prompt the user to enter the fingerprint.
- the operation of inputting the fingerprint of the financial card may also be specifically as follows: the financial card receives the fingerprint from the fingerprint collector (the fingerprint is entered when the financial card is personalized), and saves the received fingerprint.
- the financial card can perform data communication with the upper computer through Bluetooth; and can also perform data communication with the upper computer through contact or non-contact.
- the financial card of the embodiment further includes: performing, by the financial card, the operation of step 101.
- This embodiment provides a working method of a financial card with a fingerprint verification function, as shown in FIG. 2, including:
- Step 200 When the financial card receives the power-on event, the user is prompted to input the power-on verification information, and the power-on verification is performed according to the power-on verification information input by the user, and the verification is performed by performing step 201, and the verification fails.
- the financial card receives the boot event, specifically: the financial card is powered on or receives a boot event from the user.
- the financial card is powered on, and the financial card is inserted into the card slot of the contact type card reader, and the contact card reader supplies power to the financial card; or the financial card enters the non-connected card reader to be powered on.
- the financial card is powered by the non-card reader; the financial card receives the boot event from the user, specifically, after the user presses the power button of the financial card, the financial card receives the boot event.
- the financial card after the user presses the power-on button, the financial card automatically shuts down after a preset time, or the user presses the power-off button to perform shutdown.
- the financial card prompts the user to input the power-on verification information, and performs power-on verification according to the power-on verification information input by the user, specifically: the financial card prompts the user to input the fingerprint, and starts according to the user-registered fingerprint and the fingerprint input by the user. Verification; or, the financial card prompts the user to input the power-on verification code, and performs power-on verification according to the power-on verification code saved by the user and the power-on verification code input by the user.
- the financial card prompts the user to input a fingerprint, and performs boot verification according to the fingerprint registered by the user and the fingerprint input by the user, which specifically includes:
- Step T1 the financial card prompts the user to input a fingerprint
- Step T2 When the financial card obtains the fingerprint input by the user, the fingerprint input by the user is verified according to the fingerprint registered by the user, and the verification proceeds to step 201.
- the method further includes: the number of times the financial card update verification fails, determining whether the number of times the verification fails to pass exceeds the preset number of times, and ending; otherwise, performing step T1; for example, the preset number of times is 3 times, the number of times the update verification failed is specifically to increase the number of times the verification failed.
- the method further includes: the financial card updates the remaining verification times, and displays the updated remaining verification times .
- the financial card prompts the user to input the power-on verification code, and performs power-on verification according to the power-on verification code saved by the user and the power-on verification code input by the user, which specifically includes:
- Step M1 The financial card prompts the user to input a power-on verification code
- Step M2 When the financial card obtains the power-on verification code input by the user, the power-on verification code input by the user is verified according to the power-on verification code saved by the user, and if the verification is passed, step 201 is performed; if the verification fails, the process returns to step M1 or ends.
- the method further includes: the number of times the financial card update verification fails, determining whether the number of times the verification fails to pass exceeds the preset number of times, and ending; otherwise, performing step M1; for example, the preset number of times is 3 times, the number of times the update verification failed is specifically to increase the number of times the verification failed.
- the user waits for the user to input the power-on verification code or waits for the user to input the power-on verification code, and further includes: the financial card updates the remaining verification times, and displays the updated number.
- Step 201 The financial card waits to receive an instruction from the upper computer.
- Step 202 When receiving the instruction from the upper computer, the financial card determines the type of the instruction. When it is determined that the received instruction is an application selection instruction, step 203 is performed; when it is determined that the received instruction is an acquisition processing option instruction, the step is performed. 204. When it is determined that the received instruction is a read application data instruction, step 205 is performed; when it is determined that the received instruction is an application application ciphertext instruction, step 206 is performed.
- Step 203 The financial card sends the application information supported by the financial card to the upper computer.
- the application information may include a card issuer parameter, for example, selecting an application name of the application.
- the application information may also include a processing option data object list (PDOL) that requires the host computer to transmit data elements to the financial card.
- PDOL processing option data object list
- the application selection instruction received by the financial card is specifically: 00 A4 04 00 07 A0 00 00 00 04 20 20; obtaining the first byte of the instruction and the data 00 A4 on the second byte as the identifier of the application selection, obtaining the instruction
- the data 04 on the third byte is used as the identifier selected by the name; the data 07 on the fifth byte in the instruction is obtained as the length of the data field, and the data A0 on the sixth byte to the twelfth byte in the instruction is obtained.
- 00 00 00 04 20 20 as the terminal application name.
- the application information of the financial card according to the application name identifier 84, the application name A0 00 00 00 04 20 20, the application priority 87, and the preferred language 5F 2D is specifically: 6F 49 84 07 A0 00 00 04 20 20 A5 3E 50 0A 4D 61 73 74 65 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D 61 73 74 65 72 43 61 72 64BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F 6E 06 06 43 00 00 30 30.
- the data 84 on the third byte is an application name identifier, and the data A0 00 00 00 04 20 20 on the fifth byte to the eleventh byte is an application name; the second sixteenth to the twenty-seventh
- the data 5F 2D on the byte is the identifier of the preferred language; the data 87 on the 33rd byte is the application priority identifier, and the data 01 on the 35th byte is the priority level, indicating that the priority level is the highest.
- Step 204 The financial card sends the file information to the upper computer.
- the file information includes an application file locator and an application interaction feature, wherein the application file locator lists the short file identifier, the record number, the number of records, and the static signature data required for offline data authentication.
- Storage location; application interaction features list the functions that transactions perform during processing, such as static offline data authentication, dynamic offline data authentication, composite dynamic offline data authentication, cardholder verification, and so on.
- Application interaction features are written to the financial card when personalized.
- the step 204 further includes: the financial card checks the terminal data specified in the processing option data object list, and the inspection application passes the application file.
- the locator and the application interaction feature are sent to the upper computer, and if the check fails, the upper machine returns information that the usage condition is not satisfied.
- the acquisition processing option instruction received by the financial card is specifically: 80 A8 00 00 02 83 00, and the first byte of the instruction and the data 80 A8 on the second byte are obtained as identifiers for acquiring the processing option instruction;
- the financial card is organized and returned to the host computer according to the identifier 82 of the application interaction feature, the application interaction feature 38 00, the application file locator identifier 94, and the application file locator 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00
- the response data is: 77 16 82 02 38 00 94 20 20 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00, wherein the data 82 on the third byte is the identification of the application interaction feature, the fifth byte And the data 38 00 on the sixth byte is an application interaction feature; the data 94 on the seventh byte is the application file locator identifier, and the data on the ninth byte to the twenty-fourth byte 20 02 02 01 18 01 01 00 20 01 01 01 00 28 01 02 00 is the application file locator.
- Step 205 The financial card sends the application data corresponding to the file identifier in the read application data instruction to the upper computer.
- the file identification may include a short file identifier and a record number.
- the read application data command received by the financial card is specifically: 00B2 02 2C 00, and the first byte of the instruction and the data 00 B2 on the second byte are obtained as the identifier of the read application data instruction, and the third byte of the instruction is obtained. And the data 02 2C on the fourth byte is used as the record number and the short file identifier, indicating that the file corresponding to the second record number in the fifth file is to be read.
- the financial card is identified according to the public key certificate 9F 46, the public key certificate 59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4 B5
- Step 206 The financial card performs card behavior analysis and generates an application ciphertext, and sends the application ciphertext to the upper computer.
- the acquisition application ciphertext command received by the financial card is specifically: 80 AE 80 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 00 00 BE 05 0D 31 37 E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- the financial card is based on the ciphertext information data identifier 27, the ciphertext information data 80, the identifier of the application ciphertext 26, and the application ciphertext 81 4E F5 A4 E9 68 37 1B to organize and return the response data to the upper computer, specifically: 77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 81 4E F5 A4 E9 68 37 1B 9F 20 12 01 20 A7 80 03 02 00 00 BE 05 00 00 00 00 00 00 00 00 00 FF FF.
- the data 27 on the fourth byte is the ciphertext information data identifier
- the data 80 on the sixth byte is the ciphertext information data, indicating that the type of the application ciphertext is an authorization request
- the data on the thirteenth byte is 26
- the data on the fifteenth to twenty-thirdth bytes 81 4E F5 A4 E9 68 37 1B is the application ciphertext.
- the upper computer can be a transaction terminal or an intelligent terminal.
- the host computer may also prompt the user to input a fingerprint.
- the file information sent by the financial card to the upper computer in the foregoing step 204 includes the record information related to the online verification code; specifically, the record information related to the online verification code includes the short file identifier of the file record where the online verification code is located. And the corresponding record number;
- the application data sent by the financial card to the upper computer in the above step 205 includes an online verification code corresponding to the record information of the online verification code in the read application data command.
- the record information of the online verification code specifically includes a short file identifier of the file where the online verification code is located and a corresponding record number.
- the financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and determines the calculated fingerprint feature. Whether it is consistent with the fingerprint feature of the user registration fingerprint saved by itself, if the verification is passed, otherwise the verification fails;
- step T2 when the boot verification is passed, the method further includes: the financial card saves the calculated fingerprint feature;
- the file information sent by the financial card to the upper computer in the above step 204 includes the record information related to the fingerprint feature; specifically, the record information related to the fingerprint feature includes the short file identifier of the file record in which the fingerprint feature is located and the corresponding Record number
- the application data sent by the financial card to the upper computer in the above step 205 includes the fingerprint feature corresponding to the record information of the fingerprint feature in the read application data command.
- the record information of the fingerprint feature specifically includes a short file identifier of the file where the fingerprint feature is located and a corresponding record number.
- the method further includes: when the financial card determines that the received instruction is a verification instruction, and the verification instruction is an offline fingerprint verification instruction, performing step 207:
- Step 207 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user. If the verification is passed, the information of the offline fingerprint verification is returned to the upper computer, otherwise Return to the offline machine for information that the offline fingerprint verification failed.
- the offline fingerprint verification instruction received by the financial card is specifically: 00 20 01 00 00, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the third byte in the instruction is obtained.
- Data 01 is used as an identifier for offline fingerprint verification.
- the offline fingerprint verification instruction received by the financial card is specifically: 00 21 00 00 00, and the data 00 21 on the first and second bytes in the instruction is obtained as an identifier of the offline fingerprint verification instruction.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than a preset number of times, and the information that the fingerprint verification fails is returned to the upper computer; Update the number of remaining verifications and proceed to step 207.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: the financial card saves the result of the verification;
- the foregoing step 207 may be specifically: the financial card generates the information that the offline fingerprint verification succeeds according to the saved verification result, and sends the offline fingerprint verification success information to the upper computer.
- the method further includes: when the financial card determines that the received instruction is a verification instruction, and the verification instruction is an online fingerprint verification instruction, performing step 208:
- Step 208 The financial card waits for the user to input the fingerprint.
- the online fingerprint feature is calculated according to the obtained fingerprint, and the online fingerprint feature is sent to the upper computer.
- the online fingerprint verification instruction received by the financial card is specifically: 00 20 02 00 00, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the data on the third byte in the instruction is obtained. 02 as an identifier for online fingerprint verification.
- the step 208 further includes: the financial card encrypts the online fingerprint feature to obtain the encrypted online fingerprint feature; correspondingly, the financial card sends the online fingerprint feature to the upper computer, specifically: the financial card sends the encrypted online fingerprint feature Give the host computer.
- the method further includes: when the upper computer receives the encrypted online fingerprint feature, sending the encrypted online fingerprint feature to the server; and when the upper computer receives the online fingerprint feature, encrypting the online fingerprint feature to obtain the encrypted
- the online fingerprint feature sends the encrypted fingerprint feature to the server.
- the server decrypts the encrypted online fingerprint feature to obtain an online fingerprint feature, and verifies the decrypted fingerprint feature according to the fingerprint feature saved by the server.
- the server verifies the received online fingerprint feature according to the fingerprint feature saved by itself.
- step T2 the financial card performs power-on verification according to the user registration fingerprint saved by the user and the fingerprint input by the user, specifically: the financial card calculates the fingerprint feature according to the fingerprint input by the user, and the judgment is calculated. Whether the fingerprint feature is consistent with the fingerprint feature of the user-registered fingerprint saved by itself, if the verification is passed, otherwise the verification fails; when the verification is passed, the method further includes: the financial card saves the calculated fingerprint feature ;
- the above step 208 can also be specifically: the financial card sends the saved fingerprint feature to the upper computer.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 202, and the verification instruction is specifically an online verification instruction, the financial card waits for the user to input a fingerprint, and when the fingerprint input by the user is obtained, The fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the online verification code saved by the user is returned to the host computer after verification, otherwise the information of the verification failure is returned to the upper computer.
- the received instruction is specifically 00 20 00 00 02 00 00
- the data 00 20 on the first and second bytes in the instruction is obtained as an identifier of the verification instruction, and the sixth byte to the seventh byte in the instruction are obtained.
- the data 00 00 is used as an identifier that requires the user to input a fingerprint and return an online verification code to the upper computer.
- the method further includes: when the financial card determines in step 202 that the received instruction is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, step 209 is performed;
- Step 209 The financial card waits for the user to input the offline verification code.
- the offline verification code input by the user is obtained, the offline verification code input by the user is verified according to the offline verification code saved by the user, and the verification is passed to the upper verification machine. Returns the information that the offline verification is successful, otherwise the information returned to the offline machine fails.
- the offline verification code verification instruction received by the financial card is specifically: 00 20 00 00 02 00 00, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the sixth word in the instruction is obtained.
- the data 00 00 on the 7th byte is used as an identifier requiring the user to input an offline verification code.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than a preset number of times, and the information that the verification fails is returned to the upper machine; Update the number of remaining verifications and proceed to step 209.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: the financial card saves the result of the verification;
- the foregoing step 209 may be specifically: the financial card generates a successful offline verification result according to the saved verification result, and sends the successful offline verification code verification result to the upper computer.
- the method further includes: when the financial card determines in step 202 that the received instruction is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, step 210 is performed;
- Step 210 The financial card obtains the offline verification code from the offline verification code verification instruction, and verifies the obtained offline verification code according to the verification code saved by itself, and returns the offline verification success information to the upper computer after verification, otherwise The machine returns the information that the offline verification failed.
- the offline verification code verification instruction received by the financial card is specifically: 00 20 00 00 02 12 34, and the data 00 20 on the first and second bytes in the instruction is obtained as the identifier of the verification instruction, and the fifth word in the instruction is obtained.
- the data 02 on the section is used as the length of the verification code, and the data in the sixth byte and the seventh byte of the instruction is obtained as an offline verification code, and it is determined whether the offline verification code in the instruction is offline verification saved by itself. If the code is consistent, the information returned to the offline verification success will be returned to the upper computer, otherwise the information returned by the offline machine will be returned.
- the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the verification fails is returned to the upper machine; The remaining verification times are updated, and the remaining verification times are returned to the upper machine, and the process returns to step 201.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: the financial card saves the result of the verification;
- the foregoing step 210 may be specifically: the financial card generates a successful offline verification code verification result according to the saved verification result, and sends the successful offline verification code verification result to the upper computer.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 202, and the verification instruction is specifically an offline verification instruction, performing the following steps:
- Step R01 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step R02 is performed, otherwise step R03 is performed;
- step R02 is performed, and the first byte of the instruction and the data 00 20 on the second byte are obtained as the identifier of the verification instruction, and the instruction is obtained.
- the data 01 on the third byte is used as the identifier of the fingerprint that needs to be verified by the user, and the data 00 20 on the third byte in the instruction is obtained as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the verification code.
- the length, the data in the sixth byte and the seventh byte of the instruction 12 34 is taken as the offline verification code; when the offline verification instruction received by the financial card is 00 20 00 00 02 FF FF, step R03 is executed, the instruction is executed
- the data 00 20 on the first byte and the second byte is used as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the length of the verification code, and the sixth byte and the seventh byte in the instruction are obtained.
- the above data FF FF is used as an identifier of the fingerprint that needs to be verified by the user.
- Step R02 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and performs step R03 after the verification is passed, otherwise the offline machine returns to the offline verification. Failure information.
- the financial card acquires the data 12 34 on the sixth to seventh bytes in the offline verification instruction 00 20 00 00 02 12 34 as an offline verification code, and takes the obtained offline verification code 12 34 offline with itself.
- the verification code 12 34 is compared, and if the comparison result is consistent, step R03 is performed.
- Step R03 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information of the offline verification success to the upper computer, otherwise The bit machine returns information that the offline verification failed.
- the offline verification code when the user remembers the offline verification code, the offline verification code may be selected on the upper computer, and the transaction is more secure through the offline verification code and the fingerprint double verification; when the user forgets the offline verification code When you choose not to enter the offline verification code on the host computer, the transaction can continue to be executed. The financial card will not continue to execute because the online verification code is forgotten, and the user experience is better.
- the method when the verification fails, the method further includes: the number of times the financial card update verification fails, and determining whether the number of times the verification fails is more than the preset number of times, and the information that the verification fails is returned to the upper machine, and ends; otherwise Update the number of remaining verifications and proceed to step R02.
- the method further includes: the financial card displays the number of remaining verifications.
- the method further includes: when the financial card determines that the received instruction is a verification instruction in step 202, and the verification instruction is specifically an offline verification instruction, performing the following steps:
- Step R11 The financial card determines whether the offline verification code is included in the offline verification instruction, if yes, step R12 is performed, otherwise step R13 is performed;
- step R12 is performed, and the data 00 20 on the first byte and the second byte in the instruction is obtained as the identifier of the verification instruction, and the instruction is obtained.
- the data 01 on the third byte is used as the identifier of the fingerprint that needs to be verified by the user, and the data 00 20 on the third byte in the instruction is obtained as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the verification code.
- the length, the data in the sixth byte and the seventh byte of the instruction 12 34 is taken as the offline verification code; when the offline verification instruction received by the financial card is 00 20 00 00 02 00 00, step R13 is executed to obtain the instruction
- the data 00 20 on the first byte and the second byte is used as the identifier of the verification instruction, and the data 02 on the fifth byte in the instruction is obtained as the length of the verification code, and the sixth byte and the seventh byte in the instruction are obtained.
- the data 00 00 on the above is used as an identifier of the fingerprint that needs to be verified by the user.
- Step R12 The financial card obtains the offline verification code from the offline verification instruction, and verifies the obtained offline verification code according to the offline verification code saved by itself, and returns the offline verification success information to the upper computer after verification, otherwise The machine returns the information that the offline verification failed.
- the financial card acquires the data 12 34 on the sixth to seventh bytes in the offline verification instruction 00 20 00 00 02 12 34 as an offline verification code, and takes the obtained offline verification code 12 34 offline with itself.
- the verification code 12 34 is compared, and if the comparison result is consistent, the information returned to the offline verification success is returned to the upper computer.
- Step R13 The financial card waits for the user to input the fingerprint.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the user, and the verification succeeds to return the information of the offline verification success to the upper computer, otherwise upward
- the bit machine returns information that the offline verification failed.
- the foregoing financial card generates the application ciphertext, which may be specifically: the financial card generates the application ciphertext according to the information of the offline fingerprint verification success or the offline fingerprint verification failure information.
- the method when the financial card waits for the user to input the fingerprint, the method further includes: the financial card prompting the user to input the fingerprint.
- the financial card prompts the user to input a fingerprint
- the financial card prompts the user to input the fingerprint through a display screen, an indicator light, or an audio.
- the operation of inputting a fingerprint by the financial card is further included.
- the operation of inputting a fingerprint into the financial card is the same as that in Embodiment 2, and details are not described herein again.
- the financial card can perform data communication with the host computer through Bluetooth.
- Data communication with the host computer can also be performed by contact or non-contact.
- the financial card of the embodiment further includes: performing, by the financial card, the operation of step 201.
- the manner in which the financial card prompts the user may be one or more of the display, sound, and indicator lights.
- the financial card prompts the user to input a fingerprint
- the financial card prompts by voice and/or displays a prompt: "Please enter a fingerprint.”
- This embodiment provides a financial card with a fingerprint verification function, as shown in FIG. 3, including:
- the determining module 402 is configured to determine the type of the instruction when waiting for the receiving module 401 to receive an instruction from the upper computer;
- a saving module 403 configured to save application information supported by the financial card; to save the file information; and to save the application data;
- the first sending module 404 is configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is an application selection instruction, send the application information supported by the financial card saved by the saving module 403 to the upper computer;
- the second sending module 405 is configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a processing option, the file information saved by the saving module 403 is sent to the upper computer;
- the third sending module 406 is configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a read application data instruction, send, to the application data corresponding to the file identifier in the read application data instruction saved by the saving module 403 Host computer
- the application ciphertext generating module 407 is configured to perform card behavior analysis and generate an application ciphertext when the determining module 402 determines that the instruction received by the receiving module 401 is to obtain an application ciphertext instruction;
- the fourth sending module 408 is configured to send the application ciphertext generated by the application ciphertext generating module 407 to the upper computer;
- the financial card further includes: a cardholder verification module 409 and/or a power on verification module;
- the cardholder verification module 409 is configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically a fingerprint verification instruction, performing cardholder verification operation according to the fingerprint of the user, the upper computer Return to the cardholder verification related information;
- the saving module 403 is further configured to save a user registration fingerprint
- the boot verification module is configured to perform boot verification according to the user registration fingerprint saved by the save module 403 and the fingerprint input by the user when receiving the boot event;
- the waiting receiving module 401 is specifically configured to receive an instruction from the upper computer when the power-on verification module passes the verification.
- the cardholder verification module 409 is specifically configured to determine, when the determining module 402, that the instruction received by the receiving module 401 is a verification instruction.
- the verification instruction is specifically an online fingerprint verification instruction
- the user waits for the user to input a fingerprint.
- the online fingerprint feature is calculated according to the obtained fingerprint, and the online fingerprint feature is sent to the upper computer.
- the saving module 403 is further configured to save an online verification code.
- the cardholder verification module 409 is further configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an online verification instruction, waiting for the user to input a fingerprint, when the user is acquired When the fingerprint is input, the fingerprint input by the user is verified according to the user registration fingerprint saved by the saving module 403. If the verification is passed, the online verification code saved by the saving module 403 is returned to the upper computer, otherwise the information of the verification failure is returned to the upper computer.
- the fingerprint verification command received by the waiting receiving module 401 is specifically an offline fingerprint verification instruction
- the cardholder verification module 409 is specifically configured to determine, when the determining module 402, that the instruction received by the receiving module 401 is a verification instruction.
- the verification instruction is specifically an offline fingerprint verification instruction
- the user waits for the fingerprint to be input by the user.
- the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the saving module 403, and the verification is passed to the upper computer. Returns the information that the offline fingerprint verification succeeds, otherwise the information returned by the offline fingerprint verification is returned to the host computer.
- the saving module 403 is further configured to save an offline verification code.
- the cardholder verification module 409 is further configured to wait for the user to input offline verification when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction.
- the code when the offline verification code input by the user is obtained, the offline verification code input by the user is verified according to the offline verification code saved by the saving module 403, and the information that the offline verification succeeds is returned to the upper computer by the verification, otherwise The machine returns the information that the offline verification failed.
- the cardholder verification module 409 is further configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, the offline verification code verification instruction Obtain an offline verification code, and verify the obtained offline verification code according to the offline verification code saved by the saving module 403. If the verification succeeds, the information of the offline verification success is returned to the upper computer, otherwise the offline verification fails to be returned to the upper computer. Information.
- the cardholder verification module 409 includes a first determining submodule, a first verifying submodule, a second verifying submodule, and a first sending submodule;
- a first determining sub-module configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an offline verification instruction, determining whether the offline verification code includes an offline verification code;
- a first verification submodule configured to: when the first determining submodule determines that the offline verification code includes an offline verification code, obtain an offline verification code from the offline verification instruction, and according to the offline verification code pair saved by the saving module 403 Obtain an offline verification code for verification;
- a first sending submodule configured to return, to the upper computer, information that the offline verification fails when the first verification submodule fails to pass the verification
- a second verification sub-module configured to wait for the user to input a fingerprint when the first verification sub-module passes the verification, and when the fingerprint input by the user is obtained, verify the fingerprint input by the user according to the user registration fingerprint saved by the saving module 403; And when the first determining sub-module determines that the offline verification code does not include the offline verification code, waiting for the user to input the fingerprint, and when acquiring the fingerprint input by the user, the fingerprint input by the user according to the user registration fingerprint saved by the saving module 403 authenticating;
- the first sending submodule is further configured to: when the second verification submodule verification result is passed, the upper computer returns information that the offline fingerprint verification succeeds; and is used for the upper digit when the second verification submodule verification result is not passed The machine returns information that the offline fingerprint verification failed.
- the cardholder verification module 409 includes a second determining submodule, a third verifying submodule, a fourth verifying submodule, and a second sending submodule;
- a second determining sub-module configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an offline verification instruction, determining whether the offline verification code includes an offline verification code;
- a third verification submodule configured to: when the second determining submodule determines that the offline verification code includes an offline verification code, obtain an offline verification code from the offline verification instruction, and according to the offline verification code pair saved by the saving module 403 Obtain an offline verification code for verification;
- a second sending submodule configured to return information that the offline verification succeeds to the upper computer when the third verification submodule passes the verification; and when the third verification submodule fails to pass the verification, the offline verification fails to be returned to the upper computer Information;
- a fourth verification submodule configured to wait for the user to input a fingerprint when the second judgment submodule determines that the offline verification code is not included in the offline verification instruction, and obtain the user registration saved according to the saving module 403 when the fingerprint input by the user is obtained.
- the fingerprint verifies the fingerprint input by the user;
- the second sending sub-module is further configured to: when the verification result of the fourth verification sub-module is passed, the information returned to the offline verification device is successful; and when the verification result of the fourth verification sub-module is not passed, the upper-end machine is Returns information that failed offline verification.
- the foregoing financial card further includes a transaction verification module
- the transaction verification module is configured to prompt the user to input transaction verification information when the judgment module 402 determines that the instruction received by the receiving module 401 is a transaction verification instruction, and after receiving the transaction verification information input by the user, perform transaction verification information input by the user. Verification, if the verification is passed, the information that the verification is successful is returned to the upper computer; otherwise, the information returned to the upper computer returns the verification failure message, and the transaction is terminated.
- the transaction verification module includes: a first prompt sub-module, a first receiving sub-module, a first fingerprint verification sub-module, and a first generation and transmission sub-module;
- a first prompt sub-module configured to prompt the user to input a fingerprint when the determining module 402 determines that the instruction received by the receiving module 401 is a transaction verification instruction;
- a first receiving submodule configured to receive a fingerprint input by a user
- a first fingerprint verification sub-module configured to verify a fingerprint input by the user according to the user registration fingerprint saved by the saving module 403;
- a first generation sending submodule configured to generate information that the verification succeeds when the first fingerprint verification submodule passes the verification, and return information that the verification succeeds to the upper computer; and generate information that the verification fails when the first fingerprint verification submodule fails to pass the verification , the upper machine returns the information that the verification failed, and ends the transaction.
- the transaction verification module further includes a saving submodule
- the first fingerprint verification sub-module is specifically configured to calculate a fingerprint feature according to a fingerprint input by the user, and determine whether the calculated fingerprint feature is consistent with the fingerprint feature of the user registration fingerprint saved by the saving module 403, and the verification is passed, otherwise Verification failed;
- the saving submodule is configured to save, when the first fingerprint verification submodule passes the verification, the fingerprint feature calculated by the first fingerprint verification submodule according to the fingerprint input by the user;
- the fingerprint verification command received by the waiting receiving module 401 is specifically an online fingerprint verification instruction;
- the cardholder verification module 409 is specifically configured to: when the determining module determines 402, the instruction received by the receiving module 401 is a verification instruction, and When the verification instruction is specifically an online fingerprint verification instruction, the calculated fingerprint feature saved by the saving submodule is sent to the upper computer.
- the fingerprint verification instruction received by the waiting receiving module 401 is specifically an offline fingerprint verification instruction;
- the cardholder verification module 409 is specifically configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction,
- the verification instruction is specifically an offline fingerprint verification instruction, the successful offline fingerprint verification result is generated according to the verification success information generated by the first generation sending sub-module, and the successful offline fingerprint verification result is sent to the upper computer.
- the foregoing transaction verification module may further include: a second prompting submodule, a second obtaining submodule, a second verification code verifying submodule, and a second generating and transmitting submodule;
- a second prompt sub-module configured to prompt the user to input a transaction verification code when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction
- a second obtaining submodule configured to obtain a verification code input by the user
- a second verification code verification sub-module configured to verify, according to the transaction verification code saved by the saving module 403, the transaction verification code input by the user acquired by the second acquisition sub-module;
- a second generation sending submodule configured to generate information that the verification succeeds when the second verification code verification submodule passes the verification, and return information that the verification succeeds to the upper computer; and generate verification failure when the second verification code verification submodule fails to pass the verification
- the information, the upper machine returns the information that failed the verification, and ends the transaction
- transaction verification module specifically includes: a second acquisition submodule, a second verification code verification submodule, and a second generation and transmission submodule;
- a second obtaining submodule configured to obtain a transaction verification code from the transaction verification instruction
- a second verification code verification sub-module configured to verify, according to the transaction verification code saved by the saving module 403, the transaction verification code obtained by the second acquisition sub-module from the transaction verification instruction;
- a second generation sending submodule configured to generate information that the verification succeeds when the second verification code verification submodule passes the verification, and return information that the verification succeeds to the upper computer; and generate verification failure when the second verification code verification submodule fails to pass the verification
- the information, the upper machine returns the information that failed the verification, and ends the transaction
- the cardholder verification module 409 is further configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and the verification instruction is specifically an offline verification code verification instruction, sending according to the second generation
- the successful verification information generated by the sub-module generates a successful offline verification code verification result, and sends the successful offline verification code verification result to the upper computer.
- the booting verification module is specifically configured to prompt the user to input a fingerprint when receiving the boot event, and obtain the fingerprint input by the user, and verify the fingerprint input by the user according to the user registration fingerprint saved by the saving module 403. ;
- the waiting receiving module 401 is specifically configured to wait to receive an instruction from the upper computer when the power-on verification module passes the verification.
- the power-on verification module is specifically configured to: when receiving a boot event, calculate a fingerprint feature according to a fingerprint input by the user, and determine whether the calculated fingerprint feature and the fingerprint feature of the user registration fingerprint saved by the save module 403 are Consistent, yes, the verification is passed, otherwise the verification fails;
- the above-mentioned power-on verification module is further configured to save the calculated fingerprint feature when the verification is passed;
- the fingerprint verification instruction received by the waiting receiving module 401 is specifically an online fingerprint verification instruction;
- the cardholder verification module 409 is specifically configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and is verified When the instruction is specifically an online fingerprint verification instruction, the fingerprint feature saved by the power-on verification module is sent to the upper computer.
- the boot verification module is further configured to save the result of the verification pass
- the fingerprint verification instruction received by the waiting receiving module 401 is specifically an offline fingerprint verification instruction;
- the cardholder verification module 409 is specifically configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is a verification instruction, and When the verification instruction is specifically an offline fingerprint verification instruction, the offline fingerprint verification success information is generated according to the verification result saved by the power-on verification module, and the offline fingerprint verification success information is sent to the upper computer.
- the application ciphertext generating module 407 is specifically configured to generate an application ciphertext according to the offline fingerprint verification success information generated by the cardholder verification module 409 or the offline fingerprint verification failure information.
- the save module 403 is specifically configured to save the application information supported by the financial card, and save the file information including the record information related to the online verification code. , save the application data containing the online verification code, and save the user registration fingerprint.
- the power-on verification module is specifically configured to: when receiving a boot event, calculate a fingerprint feature according to a fingerprint input by the user, and determine whether the calculated fingerprint feature and the fingerprint feature of the user registration fingerprint saved by the save module 403 are Consistent, yes, the verification is passed, otherwise the verification fails;
- the saving module 403 is specifically configured to save the application information supported by the financial card, and save the file information including the record information related to the fingerprint feature calculated by the power-on verification module, and save the calculation including the power-on verification module.
- the applied data of the fingerprint feature is obtained, and the user registration fingerprint is saved.
- the fingerprint verification instruction received by the waiting receiving module 401 is specifically an offline fingerprint verification instruction.
- the cardholder verification module 409 is specifically configured to: when the determining module 402 determines that the instruction received by the receiving module 401 is When the verification instruction is specifically an offline fingerprint verification instruction, the user waits for the fingerprint to be input by the user. When the fingerprint input by the user is obtained, the fingerprint input by the user is verified according to the user registration fingerprint saved by the saving module 403, and the verification is performed upward. The bit machine returns the information that the offline fingerprint verification is successful, otherwise the upper machine returns the information that the offline fingerprint verification failed.
- the power-on verification mode is specifically used to perform power-on verification according to the user registration fingerprint saved by the save module and the fingerprint input by the user when powering on or receiving a boot event from the user.
- the above financial card further includes a Bluetooth module
- Bluetooth module for Bluetooth to communicate with the host computer
- the waiting receiving module waits for receiving an instruction from the upper computer through the Bluetooth module
- the first sending module 404, the second sending module 405, the third sending module 406, and the fourth sending module 408 send data to the upper computer through the Bluetooth module.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Collating Specific Patterns (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
一种具有指纹验证功能的金融卡及其工作方法,属于信息技术领域。该方法提供的具有指纹验证功能的金融卡包括:等待接收模块(401)、判断模块(402)、保存模块(403)、第一发送模块(404)、第二发送模块(405)、第三发送模块(406)、应用密文生成模块(407)、第四发送模块(408);金融卡还包括持卡人验证模块(409)和/或开机验证模块。该技术方案可以提高电子交易中身份验证的安全性,并且使用指纹进行身份验证使电子交易更加方便快捷。
Description
本公开涉及信息技术领域,尤其涉及一种具有指纹验证功能的金融卡及其工作方法。
现有技术中,随着电子信息科技的快速发展,使用金融卡进行电子交易在日常生活中越来越普遍。现有技术中为提高电子交易的安全性,在电子交易过程中需要进行身份验证,现有的身份验证方法多数是金融卡的用户在与金融卡进行数据交互的上位机(上位机可以为交易终端或者智能终端,例如交易终端为POS机)上输入身份验证码。
现有技术中身份验证方法存在以下缺陷:在身份验证时金融卡的用户需要在上位机上输入身份验证码,存在身份验证码泄露的风险,给非法盗取身份验证码者带来可乘之机;在实际交易中有时金融卡的用户忘记了身份验证码,会导致交易无法进行,当输入身份验证码的次数超过预设次数时会使金融卡锁死,用户体验不佳。
发明内容
本公开提供一种具有指纹验证功能的金融卡及其工作方法。
本公开提供的一种具有指纹验证功能的金融卡的工作方法,包括:
步骤S1:金融卡等待接收来自上位机的指令;
步骤S2:所述金融卡接收到来自上位机的指令时,判断指令的类型,当判定接收到的指令是应用选择指令时,执行步骤S3;当判定接收到的指令是获取处理选项指令时,执行步骤S4;当判定接收到的指令是读应用数据指令时,执行步骤S5;当判定接收到的指令是获取应用密文指令时,执 行步骤S6;
步骤S3:所述金融卡将自身支持的应用信息发送给所述上位机;
步骤S4:所述金融卡将文件信息发送给所述上位机;
步骤S5:所述金融卡将与所述读应用数据指令中的文件标识所对应的应用数据发送给所述上位机;
步骤S6:所述金融卡执行卡片行为分析并生成应用密文,将所述应用密文发送给所述上位机;
上述方法还包括:
当所述步骤S2中所述金融卡判定接收到的指令是验证指令,且所述验证指令具体为指纹验证指令时,根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息;
和/或,所述步骤S1之前还包括:所述金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,验证通过时执行步骤S1。
本公开提供的一种具有指纹验证功能的金融卡,包括:
等待接收模块,用于等待接收来自上位机的指令;
判断模块,用于当所述等待接收模块接收到来自上位机的指令时,判断指令的类型;
保存模块,用于保存金融卡支持的应用信息;用于保存文件信息;用于保存应用数据;
第一发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是应用选择指令时,将所述保存模块保存的所述金融卡支持的应用信息发送给所述上位机;
第二发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是获取处理选项指令时,将所述保存模块保存的所述文件信息发送给所述上位机;
第三发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是读应用数据指令时,将所述保存模块保存的与所述读应用数据指令中的文件标识所对应的应用数据发送给所述上位机;
应用密文生成模块,用于当所述判断模块判定所述等待接收模块接收到的指令是获取应用密文指令时,执行卡片行为分析并生成应用密文;
第四发送模块,用于将所述应用密文生成模块生成的所述应用密文发送给所述上位机;
所述金融卡还包括:持卡人验证模块和/或开机验证模块;
所述持卡人验证模块,用于当所述判断模块判定所述等待接收模块接收到的指令是验证指令,且所述验证指令具体为指纹验证指令时,根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息;
所述保存模块,还用于保存用户注册指纹;
所述开机验证模块,用于接收到开机事件时,根据所述保存模块保存的所述用户注册指纹和用户输入的指纹进行开机验证;
当所述金融卡包括所述开机验证模块时,所述等待接收模块具体用于所述开机验证模块验证通过时,等待接收来自上位机的指令。
本公开的有益效果是:在电子交易中,金融卡根据用户的指纹执行持卡人验证操作和/或者在金融卡接收到开机事件时根据用户输入的指纹进行开机验证,无需用户在交易终端上输入身份验证码,保证身份验证的验证信息不会泄露,提高了身份验证的安全性。
同时,本公开中通过指纹验证方法进行身份验证,金融卡的用户不会因为忘记身份验证码导致交易无法进行,更不会因此将金融卡锁死。另外,使用指纹进行身份验证,与使用身份认证码的验证方式相比,使电子交易更加方便快捷。
图1所示为本发明实施例2中一种具有指纹验证功能的金融卡的工作方法的流程图。
图2所示为本发明实施例3中一种具有指纹验证功能的金融卡的工作方法的流程图。
图3所示为本发明实施例4中一种具有指纹验证功能的金融卡的模块组成框图。
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
实施例1
本公开提供的一种具有指纹验证功能的金融卡的工作方法,包括:
步骤S1:金融卡等待接收来自上位机的指令;
步骤S2:金融卡接收到来自上位机的指令时,判断指令的类型,当判定接收到的指令是应用选择指令时,执行步骤S3;当判定接收到的指令是获取处理选项指令时,执行步骤S4;当判定接收到的指令是读应用数据指令时,执行步骤S5;当判定接收到的指令是获取应用密文指令时,执行步骤S6;
步骤S3:金融卡将自身支持的应用信息发送给上位机;
步骤S4:金融卡将文件信息发送给上位机;
步骤S5:金融卡将与读应用数据指令中的文件标识所对应的应用数据发送给上位机;
步骤S6:金融卡执行卡片行为分析并生成应用密文,将应用密文发送给上位机;
上述方法还包括:
当步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体 为指纹验证指令时,根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息;
和/或,步骤S1之前还包括:金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,验证通过时执行步骤S1。
本公开中,当上述指纹验证指令具体为联机指纹验证指令时,金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据获取的指纹计算得出联机指纹特征,将联机指纹特征发送给上位机。
本公开上述方法中还包括:当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为联机验证指令时,金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回自身保存的联机验证码,否则向上位机返回验证失败的信息。
本公开中,当上述指纹验证指令具体为脱机指纹验证指令;
金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
本公开上述方法中还包括:
当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,等待用户输入脱机验证码,当获取到用户输入的脱机验证码时,根据自身保存的脱机验证码对用户输入的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
或者,当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,从脱机验证码验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行步骤S91-步骤S93:
步骤S91:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤S92,否则执行步骤S93;
步骤S92:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则执行步骤S93,否则向上位机返回脱机验证失败的信息;
步骤S93:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
或者,当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行步骤S101-步骤S103:
步骤S101:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤S102,否则执行步骤S103;
步骤S102:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,验证未通过则向上位机返回脱机验证失败的信息;
步骤S103:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
本公开上述步骤S2中还包括:当判定接收到的指令是交易验证指令时,执行步骤S0;
步骤S0:金融卡提示用户输入交易验证信息,接收到用户输入的交易验证信息之后,对用户输入的交易验证信息进行验证,验证通过则向上位机返回验证成功的信息;否则向上位机返回验证失败的信息,结束交易。
具体地,上述步骤S0具体包括:
步骤S01:金融卡提示用户输入指纹;
步骤S02:金融卡接收用户输入的指纹;
步骤S03:金融卡根据自身保存的用户注册指纹验证用户输入的指纹,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束交易。
具体地,上述步骤S03中,金融卡根据自身保存的用户注册指纹验证用户输入的指纹,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
上述步骤S03中验证通过时还包括:金融卡对根据用户输入的指纹计算得出的指纹特征进行保存;
相应地,当上述指纹验证指令具体为联机指纹验证指令时,金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡将保存的计算得出的指纹特征发送给上位机。
具体地,当上述指纹验证指令具体为脱机指纹验证指令时,上述金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡根据验证成功的信息生成成功的脱机指纹验证结果,将成功的脱机指纹验证结果发送给上位机。
具体地,上述步骤S0还可以具体包括:
步骤L01:金融卡提示用户输入交易验证码;
步骤L02:金融卡获取用户输入的交易验证码;
步骤L03:金融卡根据自身保存的交易验证码验证用户输入的交易验证码,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束交易;
或者,上述步骤S0具体包括:
步骤W01:金融卡从交易验证指令中获取交易验证码;
步骤W02:金融卡根据自身保存的交易验证码验证从交易验证指令中获取的交易验证码,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束交易。
进一步地,上述方法还包括:当上述步骤S2中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,根据验证成功的信息生成成功的脱机验证码验证结果,将成功的脱机验证码验证结果发送给上位机。
本公开中,上述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体包括:
步骤H1:金融卡提示用户输入指纹;
步骤H2:金融卡获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证。
本公开中,上述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当验证通过时,还包括:金融卡对计算得出的指纹特征进行保存;
相应地,当上述指纹验证指令具体为联机指纹验证指令时,上述金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信 息,具体为:金融卡将保存的指纹特征发送给上位机。
本公开中,当上述金融卡根据自身注册的指纹和用户输入的指纹进行开机验证,并且验证通过时,还包括:金融卡对验证通过的结果进行保存;
相应地,当上述指纹验证指令具体为脱机指纹验证指令时,上述金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡根据保存的验证通过的结果生成脱机指纹验证成功的信息,将脱机指纹验证成功的信息发送给上位机。
本公开中,上述金融卡生成应用密文,可以具体为:金融卡根据上述脱机指纹验证成功的信息或上述脱机指纹验证失败的信息生成应用密文。
本公开中,当上述步骤S1之前还包括:金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,并且验证通过时:
上述步骤S4中金融卡发送给上位机的文件信息中包括与联机验证码相关的记录信息;上述步骤S5中金融卡发送给上位机的应用数据中包括与读应用数据指令中的联机验证码的记录信息对应的联机验证码。
本公开的方法中,上述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当开机验证通过时,还包括:金融卡对计算得出的指纹特征进行保存;
相应地,上述步骤S4中金融卡发送给上位机的文件信息中包括与指纹特征相关的记录信息;上述步骤S5中金融卡发送给上位机的应用数据中包括与读应用数据指令中的指纹特征的记录信息对应的指纹特征。
进一步地,当上述指纹验证指令具体为脱机指纹验证指令时,上述金融卡根据用户的指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息,具体为:金融卡等待用户输入指纹,当获取到用户输入的指纹时, 根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
本公开中,上述金融卡接收到开机事件,具体为:金融卡上电或者接收到来自用户的开机事件。
可选地,本公开上述方法中,金融卡可以通过蓝牙与上位机进行数据通信。还可以通过非接或者接触形式与上位机进行数据通信。
实施例2
本实施例提供一种具有指纹验证功能的金融卡的工作方法,如图1所示,包括:
步骤101:金融卡等待接收来自上位机的指令。
步骤102:金融卡接收到来自上位机的指令时,判断指令的类型,当判定接收到的指令是应用选择指令时,执行步骤103;当判定接收到的指令是获取处理选项指令时,执行步骤104;当判定接收到的指令是读应用数据指令时,执行步骤105;当判定接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,执行步骤106;当判定接收到的指令是验证指令,且验证指令具体为联机指纹验证指令时,执行步骤107;当判定接收到的指令是获取应用密文指令时,执行步骤108。
步骤103:金融卡将自身支持的应用信息发送给上位机。
本实施例中,应用信息可以包括发卡行参数,例如:选择应用的应用名称。应用信息也可以包含要求上位机向金融卡传送数据元的处理选项数据对象列表(PDOL)。
例如,金融卡接收的应用选择指令具体为:00 A4 04 00 07 A0 00 00 00 04 10 10;获取指令中第一字节和第二字节上的数据00 A4作为应用选择指令的标识,获取指令中第三字节上的数据04作为通过名称选择的标识;获取指令中第五字节上的数据07作为数据域的长度,获取 指令中第六字节至第十二字节上的数据A0 00 00 00 04 10 10作为终端应用名称。
金融卡根据应用名称标识84、应用名称A0 00 00 00 04 10 10、应用优先级87、首选语言5F 2D组织的应用信息具体为:6F 49 84 07 A0 00 00 00 04 10 10A5 3E 50 0A 4D 61 73 74 65 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D 61 73 74 65 72 43 61 72 64BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F 6E 06 06 43 00 00 30 30。其中,第三字节上的数据84为应用名称标识,第五字节至第十一字节上的数据A0 00 00 00 04 10 10为应用名称;第二十六字节至第二十七字节上的数据5F 2D为首选语言的标识;第三十三字节上的数据87为应用优先级标识,第三十五字节上的数据01为优先级,表示优先级别为最高。
步骤104:金融卡将文件信息发送给上位机。
文件信息中包括应用文件定位器和应用交互特征,其中,应用文件定位器列出交易需要读出的数据对应的短文件标识符、记录号、记录个数以及脱机数据认证需要的静态签名数据的存放位置;应用交互特征列出了交易在处理过程中执行的功能,例如,静态脱机数据认证、动态脱机数据认证、复合动态脱机数据认证、持卡人验证等。应用交互特征在个人化时被写入金融卡。
当获取处理选项指令中包括处理选项数据对象列表(PDOL)中指定的终端数据时,步骤104中还包括:金融卡对获取处理选项数据对象列表中指定的终端数据进行检查,检查通过则将应用文件定位器和应用交互特征发送给上位机,检查不通过则向上位机返回使用条件不满足的信息。
例如,金融卡接收的获取处理选项指令具体为:80 A8 00 00 02 83 00,获取指令中第一字节和第二字节上的数据80 A8作为获取处理选项指令的标识;
金融卡根据应用交互特征的标识82、应用交互特征38 00、应用文件 定位器标识94、应用文件定位器10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00组织并向上位机返回的响应数据为:77 16 82 02 38 00 94 10 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00,其中,第三字节上的数据82为应用交互特征的标识,第五字节和第六字节上的数据38 00为应用交互特征;第七字节上的数据94为应用文件定位器标识,第九字节至第二十四字节上的数据10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00为应用文件定位器。
步骤105:金融卡将与读应用数据指令中的文件标识所对应的应用数据发送给上位机。
具体地,文件标识可以包括短文件标识符和记录号。
例如,金融卡接收的读应用数据指令具体为:00 B2 02 2C 00,获取指令中第一字节和第二字节上的数据00 B2作为读应用数据指令的标识,获取指令中第三字节和第四字节上的数据02 2C作为记录号和短文件标识符,表示要读取第五个文件中第二个记录号所对应的文件。
金融卡根据公钥证书标识9F 46、公钥证书59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4 B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 28 6D 61 7C 28EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46组织并向上位机返回的响应数据为:70 81 BA 9F 46 81 B0 59 BB 97 63 1D 8B 85 78 53 18 21 34 63 BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66EC EC FB 21 12 86 C4 B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40F6 28 6D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46 9F 49 03 9F 37 04,其中,第四字节和第五字节上的数据9F 46为公钥证书标识,第七字节至第一百八十三字节上的数据59 BB 97 63 1D 8B 85 78 53 18 21 34 63 BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 86 74BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40F6 28 6D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46为公钥证书。
步骤106:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息;验证未通过向上位机返回脱机指纹验证失败的信息。
例如,金融卡接收的脱机指纹验证指令具体为:00 20 01 00 00,将指令中第一和第二字节上的数据00 20作为验证指令的标识,将指令中第三字节上的数据01作为脱机指纹验证的标识。
或者,金融卡接收的脱机指纹验证指令具体为:00 21 00 00 00,将指令中第一和第二字节上的数据00 21作为脱机指纹验证指令的标识。
进一步地,步骤106中验证未通过时,还包括:金融卡更新验证未通过的次数,判断验证未通过的次数是否超过预设次数,是则向上位机返回指纹验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤106。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数 为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
步骤107:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据获取的指纹计算得出联机指纹特征,将联机指纹特征发送给上位机。
例如,金融卡接收的联机指纹验证指令具体为:00 20 02 00 00,将指令中第一和第二字节上的数据00 20作为验证指令的标识,将指令中第三字节上的数据02作为联机指纹验证的标识。
进一步地,步骤107中还包括:金融卡对联机指纹特征进行加密得到加密的联机指纹特征;相应地,金融卡将联机指纹特征发送给上位机,具体为:金融卡将加密的联机指纹特征发送给上位机。
进一步地,上述步骤107之后还包括:当上位机接收到加密的联机指纹特征时,将加密的联机指纹特征发送给服务器;服务器接收到联机指纹特征之后,根据自身保存的指纹特征对接收的联机指纹特征进行验证。
或者,当上位机接收联机指纹特征时,对联机指纹特征进行加密得到加密的联机指纹特征,将加密的指纹特征发送给服务器;服务器接收到加密的联机指纹特征之后,对加密的联机指纹特征进行解密得到联机指纹特征,根据自身保存的指纹特征对解密得到的指纹特征进行验证。
步骤108:金融卡执行卡片行为分析并生成应用密文,将应用密文发送给上位机。
例如,金融卡接收的获取应用密文指令具体为:80 AE 80 00 42 00 00 00 00 12 00 00 00 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 00 00 BE 05 0D 31 37 E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00,获取指令中第一字节和第二字节上的数据80AE作为获取应用密文指令的标识。
金融卡根据密文信息数据标识27、密文信息数据80、应用密文的标 识26、应用密文81 4E F5 A4 E9 68 37 1B组织并向上位机返回的响应数据,具体为:77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 81 4E F5 A4 E9 68 37 1B 9F 10 12 01 10 A7 80 03 02 00 00 BE 05 00 00 00 00 00 00 00 FF。其中,第四字节上的数据27为密文信息数据标识,第六字节上的数据80为密文信息数据,表示应用密文的类型为授权请求;第十三字节上的数据26为应用密文的标识,第十五字节至第二十三字节上的数据81 4E F5 A4 E9 68 37 1B为应用密文。
本实施例中,上位机可以为交易终端或智能终端。上述金融卡等待用户输入指纹时,上位机也可以提示用户输入指纹。
可选地,上述方法还包括:当步骤102中金融卡判定接收到的指令是验证指令,且验证指令具体为联机验证指令时,金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回自身保存的联机验证码,否则向上位机返回验证失败的信息。
例如,接收的指令具体为00 20 00 00 02 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指令中第6字节至第7字节上的数据00 00作为需要用户输入指纹并向上位机返回联机验证码的标识。
可选地,上述方法还包括:当步骤102中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,执行步骤109;
步骤109:金融卡等待用户输入脱机验证码,当获取到用户输入的脱机验证码时,根据自身保存的脱机验证码对用户输入的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡接收的脱机验证码验证指令具体为:00 20 00 00 02 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指 令中第6字节至第7字节上的数据00 00作为需要用户输入验证码的标识。
进一步地,上述步骤109中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤109。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
可选地,上述方法还包括:当步骤102中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,执行步骤110;
步骤110:金融卡从脱机验证码验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡接收的脱机指纹验证指令具体为:00 20 00 00 02 12 34,获取指令中第1和第2字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据12 34作为脱机验证码,判断指令中的验证码是否与自身保存的验证码一致,是则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
进一步地,上述步骤110中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,并向上位机返回剩余验证次数,返回步骤101。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
可选地,上述方法还包括:当步骤102中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行以下步骤:
步骤R01:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤R02,否则执行步骤R03;
例如,当金融卡接收的脱机验证指令为00 20 01 00 02 12 34时执行步骤R02,将指令中第一字节和第二字节上的数据00 20作为验证指令的标识,将指令中第三字节上的数据01作为需要验证用户输入的指纹的标识,将指令中第三字节上的数据00 20作为验证指令的标识,将指令中第五字节上的数据02作为验证码的长度,将指令中第六字节和第七字节上的数据12 34作为验证码;当金融卡接收的脱机验证指令为00 20 00 00 02FF FF时执行步骤R03,获取指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据FF FF作为需要验证用户输入的指纹的标识。
步骤R02:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则执行步骤R03,否则向上位机返回脱机验证失败的信息。
例如,金融卡获取脱机验证指令00 20 00 00 02 12 34中第六至第七字节上的数据12 34作为脱机验证码,将获取的脱机验证码12 34与自身保存的脱机验证码12 34进行比较,比较一致则执行步骤R03。
步骤R03:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
本实施例提供的技术方案中,当用户记得脱机验证码时,可以选择在上位机上输入脱机验证码,通过脱机验证码和指纹双重验证使交易更加安 全;当用户忘记脱机验证码时,可以选择不在上位机上输入脱机验证码,交易也可以继续执行,金融卡不会因为忘记脱机验证码而无法继续执行,用户体验较好。
进一步地,上述步骤R02中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤R02。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
可选地,上述方法还包括:当步骤102中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行以下步骤:
步骤R11:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤R12,否则执行步骤R13;
例如,当金融卡接收的脱机验证指令为00 20 01 00 02 12 34时执行步骤R12,将指令中第一字节和第二字节上的数据00 20作为验证指令的标识,将指令中第三字节上的数据01作为需要验证用户输入的指纹的标识,获取指令中第三字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据12 34作为脱机验证码;当金融卡接收的脱机验证指令为00 20 00 00 02 00 00时执行步骤R13,获取指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据00 00作为需要验证用户输入的指纹的标识。
步骤R12:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱 机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡获取脱机验证指令00 20 00 00 02 12 34中第六至第七字节字的数据12 34作为脱机验证码,将获取的脱机验证码12 34与自身保存的脱机验证码12 34进行比较,比较一致则向上位机返回脱机验证成功的信息。
步骤R13:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
可选地,本实施例步骤101之前,还包括:金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹执行开机验证,验证通过时执行步骤101。
具体地,本实施例中,金融卡接收开机事件,具体为:金融卡上电或者接收到来自用户的开机事件。例如,金融卡上电具体为金融卡插入接触型读卡器的卡槽上电,由接触型读卡器为金融卡供电;或金融卡进入非接读卡器的非接场上电,由非接读卡器为金融卡供电;金融卡接收到来自用户的开机事件,具体为用户按下金融卡的开机按键后,金融卡接收到开机事件。本实施例中,当用户按下开机按键之后,在预设时间后金融卡自动关机,或者用户按下关机按键进行关机。
具体地,金融卡根据自身保存的用户注册指纹对用户输入的指纹进行开机验证,具体包括:
步骤T1:金融卡提示用户输入指纹;
步骤T2:金融卡获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则执行步骤101;
进一步地,步骤T2中验证未通过时,还包括:金融卡更新验证未通过的次数,判断验证未通过的次数是否超过预设次数,是则结束;否则执行步骤T1;例如,预设次数为3次,更新验证未通过的次数具体为将验 证未通过的次数加1。
更进一步地,金融卡判断验证未通过的次数未超过预设次数时,在等待用户输入指纹过程中或等待用户输入指纹之前还包括:金融卡更新剩余验证次数,并显示更新后的剩余验证次数。例如,更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。
本实施例中,上述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
当验证通过时,还包括:金融卡对计算得出的指纹特征进行保存;
上述步骤107还可以具体为:金融卡将保存的指纹特征发送给上位机。
上述步骤104中金融卡发送给上位机的文件信息中包括与指纹特征相关的记录信息;具体地,与指纹特征相关的记录信息包括指纹特征所在文件记的短文件标识符以及对应的记录号;
上述步骤105中金融卡发送给上位机的应用数据中包括与读应用数据指令中的指纹特征的记录信息对应的指纹特征。具体地,指纹特征的记录信息具体包括指纹特征所在文件的短文件标识符以及对应的记录号;
本实施例中,当金融卡根据自身注册的指纹和用户输入的指纹进行开机验证,并且验证通过时,还包括:金融卡对验证通过的结果进行保存;
上述步骤106还可以具体为:金融卡根据保存的验证通过的结果生成脱机指纹验证成功的信息,将脱机指纹验证成功的信息发送给上位机。
本实施例中,当步骤101之前包括:金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,并且在验证通过时:上述步骤104中金融卡发送给上位机的文件信息中包括与联机验证码相关的记录信息;具体地,与联机验证码相关的记录信息包括联机验证码所在文件记的短文件标识符以及对应的记录号;
上述步骤105中金融卡发送给上位机的应用数据中包括与读应用数据指令中的联机验证码的记录信息对应的联机验证码。具体地,联机验证码的记录信息具体包括联机验证码所在文件的短文件标识符以及对应的记录号。
本实施例中,上述金融卡根据自身保存的用户注册指纹和用户输入的指纹执行开机验证还可以替换为:金融卡根据自身保存的开机验证码和用户输入的开机验证码执行开机验证。
具体地,金融卡根据自身保存的开机验证码和用户输入的开机验证码执行开机验证具体包括:
步骤M1:金融卡提示用户输入开机验证码;
步骤M2:金融卡获取到用户输入的开机验证码时,根据自身保存的开机验证码对用户输入的开机验证码进行验证,验证通过则执行步骤101;
进一步地,步骤M2中验证未通过时,还包括:金融卡更新验证未通过的次数,判断验证未通过的次数是否超过预设次数,是则结束;否则执行步骤M1;例如,预设次数为3次,更新验证未通过的次数具体为将验证未通过的次数加1。
更进一步地,金融卡判断验证未通过的次数未超过预设次数时,在等待用户输入开机验证码过程中或等待用户输入开机验证码之前还包括:金融卡更新剩余验证次数,并显示更新后的剩余验证次数。例如,更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。
可选地,上述步骤102中还包括:当判定接收到的指令是交易验证指令时,执行步骤S0;
步骤S0:金融卡提示用户输入交易验证信息,接收到用户输入的交易验证信息之后,对用户输入的交易验证信息进行验证,验证通过则向上位机返回验证成功的信息;否则向上位机返回验证失败的信息,结束交易。
具体地,上述步骤S0具体包括:
步骤S01:金融卡提示用户输入指纹;
步骤S02:金融卡接收用户输入的指纹;
步骤S03:金融卡根据自身保存的用户注册指纹验证用户输入的指纹,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束交易。
本实施例中,上述步骤S03中,金融卡根据自身保存的用户注册指纹验证用户输入的指纹,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
步骤S03中验证通过时还包括:金融卡对根据用户输入的指纹计算得出的指纹特征进行保存;
相应地,本实施例上述步骤107还可以为:金融卡将保存的指纹特征发送给上位机。
本实施例中,上述步骤106还可以为:金融卡根据验证成功的信息生成成功的脱机指纹验证结果,将成功的脱机指纹验证结果发送给上位机。
或者,上述步骤S0还可以具体包括:
步骤L01:金融卡提示用户输入交易验证码;
步骤L02:金融卡获取用户输入的交易验证码;
步骤L03:金融卡根据自身保存的交易验证码验证用户输入的交易验证码,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束交易。
或者,上述步骤S0还可以具体包括:
步骤W01:金融卡从交易验证指令中获取交易验证码;
步骤W02:金融卡根据自身保存的验证码验证从交易验证指令中获取的交易验证码,验证通过则生成验证成功的信息,向上位机返回验证成功的信息;否则生成验证失败的信息,向上位机返回验证失败的信息,结束 交易。
本实施例上述方法还包括:当步骤102中判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,金融卡根据验证成功的信息生成成功的脱机验证码验证结果,将成功的脱机验证码验证结果发送给上位机。
可选地,本实施例中,上述金融卡生成应用密文,可以具体为:金融卡根据脱机指纹验证成功的信息或脱机指纹验证失败的信息生成应用密文。
在本实施例中,上述金融卡等待用户输入指纹时,还包括:金融卡提示用户输入指纹。
具体地,上述金融卡提示用户输入指纹,具体为:金融卡通过显示屏、指示灯或声音提示用户输入指纹。
本发明中,还包括金融卡录入指纹的操作。本实施例中,上述金融卡自身保存的用户注册指纹是录入指纹操作时注册录入。
本发明中,金融卡录入指纹的操作可以在金融卡个人化时,在银行服务台录入用户的指纹;或者用户自己在金融卡上自行录入用户的指纹。
具体地,金融卡录入指纹的操作具体包括:金融卡接收到录入指纹事件,等待用户录入指纹,当接收到用户录入的指纹时,保存录入的指纹。或者,金融卡录入指纹的操作具体为:金融卡接收到上位机的录入指纹指令(金融卡个人化)时,等待用户录入指纹,当接收到用户录入的指纹时,保存录入的指纹。
进一步具体地,金融卡接收到录入指纹事件具体为:接收到来自用户的录入指纹事件(用户自行录入指纹)。例如,金融卡接收到来自用户的录入指纹事件可以具体为:用户按下金融卡上的录入指纹功能按键后,金融卡接收到来自用户的录入指纹事件;或者用户按下功能按键,金融卡显示功能菜单,用户选择功能菜单中的录入指纹功能时,金融卡接收到来自 用户的录入指纹的事件。
本实施例中,金融卡接收到录入指纹事件或者接收到录入指纹指令之后,还包括:金融卡提示用户录入指纹;具体地,金融卡通过显示屏、指示灯或声音终端一种或多种方法提示用户录入指纹。
金融卡录入指纹的操作还可以具体为:金融卡接收到来自指纹采集器的指纹(金融卡个人化时录入指纹),对接收的指纹进行保存。
可选地,本实施例上述方法中,金融卡可以通过蓝牙与上位机进行数据通信;还可以通过接触或者非接触方式与上位机进行数据通信。
可选地,本实施例上述金融卡执行完步骤103—步骤110中的每个步骤之后还包括:金融卡执行步骤101的操作。
实施例3
本实施例提供一种具有指纹验证功能的金融卡的工作方法,如图2所示,包括:
步骤200:金融卡接收到开机事件时,提示用户输入开机验证信息,根据用户输入的开机验证信息进行开机验证,验证通过执行步骤201,验证未通过则结束。
具体地,金融卡接收开机事件,具体为:金融卡上电或者接收到来自用户的开机事件。例如,金融卡上电具体为金融卡插入接触型读卡器的卡槽上电,由接触型读卡器为金融卡供电;或金融卡进入非接读卡器的非接场中上电,由非接读卡器为金融卡供电;金融卡接收到来自用户的开机事件,具体为用户按下金融卡的开机按键后,金融卡接收到开机事件。本实施例中,当用户按下开机按键之后,在预设时间后金融卡自动关机,或者用户按下关机按键进行关机。
本实施例中,上述金融卡提示用户输入开机验证信息,根据用户输入的开机验证信息进行开机验证,具体为:金融卡提示用户输入指纹,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证;或者,金融卡 提示用户输入开机验证码,根据自身保存的开机验证码和用户输入的开机验证码执行开机验证。
具体地,上述金融卡提示用户输入指纹,根据自身保存的用户注册的指纹和用户输入的指纹进行开机验证,具体包括:
步骤T1:金融卡提示用户输入指纹;
步骤T2:金融卡获取到用户输入的指纹时,根据自身保存的用户注册的指纹对用户输入的指纹进行验证,验证通过则执行步骤201。
进一步地,步骤T2中验证未通过时,还包括:金融卡更新验证未通过的次数,判断验证未通过的次数是否超过预设次数,是则结束;否则执行步骤T1;例如,预设次数为3次,更新验证未通过的次数具体为将验证未通过的次数加1。
更进一步地,金融卡判断验证未通过的次数未超过预设次数时,在等待用户输入指纹过程中或等待用户输入指纹之前还包括:金融卡更新剩余验证次数,并显示更新后的剩余验证次数。例如,更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。
具体地,金融卡提示用户输入开机验证码,根据自身保存的开机验证码和用户输入的开机验证码执行开机验证,具体包括:
步骤M1:金融卡提示用户输入开机验证码;
步骤M2:金融卡获取到用户输入的开机验证码时,根据自身保存的开机验证码对用户输入的开机验证码进行验证,验证通过则执行步骤201;验证未通过则返回步骤M1或者结束。
进一步地,步骤M2中验证未通过时,还包括:金融卡更新验证未通过的次数,判断验证未通过的次数是否超过预设次数,是则结束;否则执行步骤M1;例如,预设次数为3次,更新验证未通过的次数具体为将验证未通过的次数加1。
更进一步地,金融卡判断验证未通过的次数未超过预设次数时,在等 待用户输入开机验证码过程中或等待用户输入开机验证码之前还包括:金融卡更新剩余验证次数,并显示更新后的剩余验证次数。例如,更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。
步骤201:金融卡等待接收来自上位机的指令。
步骤202:金融卡接收到来自上位机的指令时,判断指令的类型,当判定接收到的指令是应用选择指令时,执行步骤203;当判定接收到的指令是获取处理选项指令时,执行步骤204;当判定接收到的指令是读应用数据指令时,执行步骤205;当判定接收到的指令是获取应用密文指令时,执行步骤206。
步骤203:金融卡将自身支持的应用信息发送给上位机。
本实施例中,应用信息可以包括发卡行参数,例如:选择应用的应用名称。应用信息也可以包含要求上位机向金融卡传送数据元的处理选项数据对象列表(PDOL)。
例如,金融卡接收的应用选择指令具体为:00 A4 04 00 07 A0 00 00 00 04 20 20;获取指令中第一字节和第二字节上的数据00 A4作为应用选择的标识,获取指令中第三字节上的数据04作为通过名称选择的标识;获取指令中第五字节上的数据07作为数据域的长度,获取指令中第六字节至第十二字节上的数据A0 00 00 00 04 20 20作为终端应用名称。
金融卡根据应用名称标识84、应用名称A0 00 00 00 04 20 20、应用优先级87、首选语言5F 2D组织的应用信息具体为:6F 49 84 07 A0 00 00 00 04 20 20 A5 3E 50 0A 4D 61 73 74 65 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D 61 73 74 65 72 43 61 72 64BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F 6E 06 06 43 00 00 30 30。其中,第三字节上的数据84为应用名称标识,第五字节至第十一字节上的数据A0 00 00 00 04 20 20为应用名称;第二十六字节至第二十七字节上的数据5F 2D为 首选语言的标识;第三十三字节上的数据87为应用优先级标识,第三十五字节上的数据01为优先级,表示优先级别为最高。
步骤204:金融卡将文件信息发送给上位机。
文件信息中包括应用文件定位器和应用交互特征,其中,应用文件定位器列出交易需要读出的数据存放的短文件标识符、记录号、记录个数以及脱机数据认证需要的静态签名数据的存放位置;应用交互特征列出了交易在处理过程中执行的功能,例如,静态脱机数据认证、动态脱机数据认证、复合动态脱机数据认证、持卡人验证等。应用交互特征在个人化时被写入金融卡。
当获取处理选项指令中包括处理选项数据对象列表(PDOL)中指定的终端数据时,步骤204中还包括:金融卡对处理选项数据对象列表中指定的终端数据进行检查,检查通过则将应用文件定位器和应用交互特征发送给上位机,检查不通过则向上位机返回使用条件不满足的信息。
例如,金融卡接收的获取处理选项指令具体为:80 A8 00 00 02 83 00,获取指令中第一字节和第二字节上的数据80 A8作为获取处理选项指令的标识;
金融卡根据应用交互特征的标识82、应用交互特征38 00、应用文件定位器标识94、应用文件定位器10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00组织并向上位机返回的响应数据为:77 16 82 02 38 00 94 20 20 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00,其中,第三字节上的数据82为应用交互特征的标识,第五字节和第六字节上的数据38 00为应用交互特征;第七字节上的数据94为应用文件定位器标识,第九字节至第二十四字节上的数据20 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00为应用文件定位器。
步骤205:金融卡将与读应用数据指令中的文件标识所对应的应用数据发送给上位机。
具体地,文件标识可以包括短文件标识符和记录号。
例如,金融卡接收的读应用数据指令具体为:00B2 02 2C 00,获取指令中第一字节和第二字节上的数据00 B2作为读应用数据指令的标识,获取指令中第三字节和第四字节上的数据02 2C作为记录号和短文件标识符,表示要读取第五个文件中第二个记录号所对应的文件。
金融卡根据公钥证书标识9F 46、公钥证书59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4 B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 28 6D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46组织并向上位机返回的响应数据为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其中,第四字节和第五字节上的数据9F 46为公钥证书标识,第七字节至第一百八十三字节上的数据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为公钥证书。
步骤206:金融卡执行卡片行为分析并生成应用密文,将应用密文发送给上位机。
例如,金融卡接收的获取应用密文指令具体为:80 AE 80 00 42 00 00 00 00 12 00 00 00 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 00 00 BE 05 0D 31 37 E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00。获取指令中第一字节和第二字节上的数据80AE作为获取应用密文指令的标识。
金融卡根据密文信息数据标识27、密文信息数据80、应用密文的标识26、应用密文81 4E F5 A4 E9 68 37 1B组织并向上位机返回的响应数据,具体为:77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 81 4E F5 A4 E9 68 37 1B 9F 20 12 01 20 A7 80 03 02 00 00 BE 05 00 00 00 00 00 00 00 FF。其中,第四字节上的数据27为密文信息数据标识,第六字节上的数据80为密文信息数据,表示应用密文的类型为授权请求;第十三字节上的数据26为应用密文的标识,第十五字节至第二十三字节上的数据81 4E F5 A4 E9 68 37 1B为应用密文。
本实施例中,上位机可以为交易终端或智能终端。上述金融卡等待用户输入指纹时,上位机也可以提示用户输入指纹。
可选地,上述步骤204中金融卡发送给上位机的文件信息中包括与联机验证码相关的记录信息;具体地,与联机验证码相关的记录信息包括联机验证码所在文件记的短文件标识符以及对应的记录号;
相应地,上述步骤205中金融卡发送给上位机的应用数据中包括与读应用数据指令中的联机验证码的记录信息对应的联机验证码。具体地,联机验证码的记录信息具体包括联机验证码所在文件的短文件标识符以及 对应的记录号。
可选地,上述步骤T2中,金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
步骤T2中,当开机验证通过时,还包括:金融卡对计算得出的指纹特征进行保存;
相应地,上述步骤204中金融卡发送给上位机的文件信息中包括与指纹特征相关的记录信息;具体地,与指纹特征相关的记录信息包括指纹特征所在文件记的短文件标识符以及对应的记录号;
相应地,上述步骤205中金融卡发送给上位机的应用数据中包括与读应用数据指令中的指纹特征的记录信息对应的指纹特征。具体地,指纹特征的记录信息具体包括指纹特征所在文件的短文件标识符以及对应的记录号。
可选地,上述方法还包括:当上述步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,执行步骤207:
步骤207:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
例如,金融卡接收的脱机指纹验证指令具体为:00 20 01 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指令中第三字节上的数据01作为脱机指纹验证的标识。
或者,金融卡接收的脱机指纹验证指令具体为:00 21 00 00 00,获取指令中第一和第二字节上的数据00 21作为脱机指纹验证指令的标识。
进一步地,步骤207中验证未通过时,还包括:金融卡更新验证未通 过的次数,判断验证未通过的次数是否超过预设次数,是则向上位机返回指纹验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤207。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
本实施例中,上述步骤T2验证通过时,还包括:金融卡对验证通过的结果进行保存;
上述步骤207还可以具体为:金融卡根据保存的验证通过的结果生成脱机指纹验证成功的信息,将脱机指纹验证成功的信息发送给上位机。
可选地,上述方法还包括:当上述步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为联机指纹验证指令时,执行步骤208:
步骤208:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据获取的指纹计算得出联机指纹特征,将联机指纹特征发送给上位机。
例如,金融卡接收的联机指纹验证指令具体为:00 20 02 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指令中第三字节上的数据02作为联机指纹验证的标识。
进一步地,步骤208中还包括:金融卡对联机指纹特征进行加密得到加密的联机指纹特征;相应地,金融卡将联机指纹特征发送给上位机,具体为:金融卡将加密的联机指纹特征发送给上位机。
进一步地,上述步骤208之后还包括:当上位机接收到加密的联机指纹特征时,将加密的联机指纹特征发送给服务器;当上位机接收联机指纹特征时,对联机指纹特征进行加密得到加密的联机指纹特征,将加密的指纹特征发送给服务器;服务器接收到加密的联机指纹特征之后,对加密的联机指纹特征进行解密得到联机指纹特征,根据自身保存的指纹特征对解密得到的指纹特征进行验证;服务器接收到联机指纹特征之后,根据自身 保存的指纹特征对接收的联机指纹特征进行验证。
本实施例中,当上述步骤T2中,金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:所述金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当验证通过时,还包括:所述金融卡对计算得出的所述指纹特征进行保存;
上述步骤208还可以具体为:金融卡将保存的指纹特征发送给上位机。
可选地,上述方法还包括:当步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为联机验证指令时,金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回自身保存的联机验证码,否则向上位机返回验证失败的信息。
例如,接收的指令具体为00 20 00 00 02 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指令中第6字节至第7字节上的数据00 00作为需要用户输入指纹并向上位机返回联机验证码的标识。
可选地,上述方法还包括:当步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,执行步骤209;
步骤209:金融卡等待用户输入脱机验证码,当获取到用户输入的脱机验证码时,根据自身保存的脱机验证码对用户输入的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡接收的脱机验证码验证指令具体为:00 20 00 00 02 00 00,获取指令中第一和第二字节上的数据00 20作为验证指令的标识,获取指令中第6字节至第7字节上的数据00 00作为需要用户输入脱机验证码的标识。
进一步地,上述步骤209中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤209。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
本实施例中,上述步骤M2验证通过时,还包括:金融卡对验证通过的结果进行保存;
上述步骤209还可以具体为:金融卡根据保存的验证通过的结果生成成功的脱机验证结果,将成功的脱机验证码验证结果发送给上位机。
可选地,上述方法还包括:当步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,执行步骤210;
步骤210:金融卡从脱机验证码验证指令中获取脱机验证码,根据自身保存的验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡接收的脱机验证码验证指令具体为:00 20 00 00 02 12 34,获取指令中第1和第2字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据12 34作为脱机验证码,判断指令中的脱机验证码是否与自身保存的脱机验证码一致,是则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
进一步地,上述步骤210中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,并向上位机返回剩余验证次数,返回步骤201。例如,更新验证未通过的次数具体为将验证 未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
本实施例中,上述步骤M2中验证通过时,还包括:金融卡对验证通过的结果进行保存;
上述步骤210还可以具体为:金融卡根据保存的验证通过的结果生成成功的脱机验证码验证结果,将成功的脱机验证码验证结果发送给上位机。
可选地,上述方法还包括:当步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行以下步骤:
步骤R01:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤R02,否则执行步骤R03;
例如,当金融卡接收的脱机验证指令为00 20 01 00 02 12 34时执行步骤R02,获取指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第三字节上的数据01作为需要验证用户输入的指纹的标识,获取指令中第三字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据12 34作为脱机验证码;当金融卡接收的脱机验证指令为00 20 00 00 02 FF FF时执行步骤R03,将指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据FF FF作为需要验证用户输入的指纹的标识。
步骤R02:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则执行步骤R03,否则向上位机返回脱机验证失败的信息。
例如,金融卡获取脱机验证指令00 20 00 00 02 12 34中第六至第七字节上的数据12 34作为脱机验证码,将获取的脱机验证码12 34与自身保 存的脱机验证码12 34进行比较,比较结果为一致则执行步骤R03。
步骤R03:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
本实施例提供的技术方案中,当用户记得脱机验证码时,可以选择在上位机上输入脱机验证码,通过脱机验证码和指纹双重验证使交易更加安全;当用户忘记脱机验证码时,可以选择不在上位机上输入脱机验证码,交易也可以继续执行,金融卡不会因为忘记脱机验证码而无法继续执行,用户体验较好。
进一步地,上述步骤R02中,验证未通过时还包括:金融卡更新验证未通过次数,并判断验证未通过的次数是否超过预设次数,是则向上位机返回验证失败的信息,结束;否则更新剩余验证次数,继续执行步骤R02。例如,更新验证未通过的次数具体为将验证未通过的次数加1;预设次数为3次;更新剩余验证次数的方法为:剩余验证次数=预设次数-验证未通过的次数。更进一步地,当金融卡判断验证未通过的次数没有超过预设次数时,还包括:金融卡显示剩余验证次数。
可选地,上述方法还包括:当步骤202中金融卡判定接收到的指令是验证指令,且验证指令具体为脱机验证指令时,执行以下步骤:
步骤R11:金融卡判断脱机验证指令中是否包括脱机验证码,是则执行步骤R12,否则执行步骤R13;
例如,当金融卡接收的脱机验证指令为00 20 01 00 02 12 34时执行步骤R12,获取指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第三字节上的数据01作为需要验证用户输入的指纹的标识,获取指令中第三字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据12 34作为脱机验证码;当金融卡接收的脱机验证指令为 00 20 00 00 02 00 00时执行步骤R13,获取指令中第一字节和第二字节上的数据00 20作为验证指令的标识,获取指令中第五字节上的数据02作为验证码的长度,获取指令中第六字节和第七字节上的数据00 00作为需要验证用户输入的指纹的标识。
步骤R12:金融卡从脱机验证指令中获取脱机验证码,根据自身保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
例如,金融卡获取脱机验证指令00 20 00 00 02 12 34中第六至第七字节上的数据12 34作为脱机验证码,将获取的脱机验证码12 34与自身保存的脱机验证码12 34进行比较,比较结果一致则向上位机返回脱机验证成功的信息。
步骤R13:金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
本实施例中,上述金融卡生成应用密文,可以具体为:金融卡根据脱机指纹验证成功的信息或脱机指纹验证失败的信息生成应用密文。
在本实施例中,上述金融卡等待用户输入指纹时,还包括:金融卡提示用户输入指纹。
具体地,上述金融卡提示用户输入指纹,具体为:金融卡通过显示屏、指示灯或声音提示用户输入指纹。
本实施例中,还包括金融卡录入指纹的操作。本实施例中,金融卡录入指纹的操作与实施例2中相同,在此不再赘述。
可选地,本实施例上述方法中,金融卡可以通过蓝牙与上位机进行数据通信。还可以通过接触或者非接触方式与上位机进行数据通信。
可选地,本实施例上述金融卡执行完步骤203—步骤210中的每个步骤之后还包括:金融卡执行步骤201的操作。
本发明中,金融卡提示用户的方式可以为显示、声音、指示灯中的一种或多种提示方式。例如,金融卡提示用户输入指纹时,金融卡通过声音提示和/或显示提示:“请输入指纹”。
实施例4
本实施例提供一种具有指纹验证功能的金融卡,如图3所示,包括:
等待接收模块401,用于等待接收来自上位机的指令;
判断模块402,用于当等待接收模块401接收到来自上位机的指令时,判断指令的类型;
保存模块403,用于保存金融卡支持的应用信息;用于保存文件信息;用于保存应用数据;
第一发送模块404,用于当判断模块402判定等待接收模块401接收到的指令是应用选择指令时,将保存模块403保存的金融卡支持的应用信息发送给上位机;
第二发送模块405,用于当判断模块402判定等待接收模块401接收到的指令是获取处理选项指令时,将保存模块403保存的文件信息发送给上位机;
第三发送模块406,用于当判断模块402判定等待接收模块401接收到的指令是读应用数据指令时,将保存模块403保存的与读应用数据指令中的文件标识所对应的应用数据发送给上位机;
应用密文生成模块407,用于当判断模块402判定等待接收模块401接收到的指令是获取应用密文指令时,执行卡片行为分析并生成应用密文;
第四发送模块408,用于将应用密文生成模块407生成的应用密文发送给上位机;
金融卡还包括:持卡人验证模块409和/或开机验证模块;
持卡人验证模块409,用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为指纹验证指令时,根据用户的 指纹执行持卡人验证操作,向上位机返回持卡人验证相关信息;
保存模块403,还用于保存用户注册指纹;
开机验证模块,用于接收到开机事件时,根据保存模块403保存的用户注册指纹和用户输入的指纹进行开机验证;
当金融卡包括开机验证模块时,等待接收模块401具体用于开机验证模块验证通过时,等待接收来自上位机的指令。
本实施例中,上述等待接收模块401接收的指纹验证指令具体为联机指纹验证指令时,上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为联机指纹验证指令时,等待用户输入指纹,当获取到用户输入的指纹时,根据获取的指纹计算得出联机指纹特征,将联机指纹特征发送给上位机。
本实施例中,上述保存模块403,还用于保存联机验证码;
相应地,上述持卡人验证模块409,还用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为联机验证指令时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回保存模块403保存的联机验证码,否则向上位机返回验证失败的信息。
本实施例中,上述等待接收模块401接收的指纹验证指令具体为脱机指纹验证指令,上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
本实施例中,上述保存模块403还用于保存脱机验证码;
相应地,上述持卡人验证模块409,还用于当判断模块402判定等待 接收模块401接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,等待用户输入脱机验证码,当获取到用户输入的脱机验证码时,根据保存模块403保存的脱机验证码对用户输入的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
或者,上述持卡人验证模块409,还用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,从脱机验证码验证指令中获取脱机验证码,根据保存模块403保存的脱机验证码对获取的脱机验证码进行验证,验证通过则向上位机返回脱机验证成功的信息,否则向上位机返回脱机验证失败的信息。
或者,上述持卡人验证模块409包括第一判断子模块、第一验证子模块、第二验证子模块、第一发送子模块;
第一判断子模块,用于当上述判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机验证指令时,判断脱机验证指令中是否包括脱机验证码;
第一验证子模块,用于当第一判断子模块判定脱机验证指令中包括脱机验证码时,从脱机验证指令中获取脱机验证码,根据保存模块403保存的脱机验证码对获取的脱机验证码进行验证;
第一发送子模块,用于当第一验证子模块验证未通过时,向上位机返回脱机验证失败的信息;
第二验证子模块,用于当第一验证子模块验证通过时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证;还用于当第一判断子模块判定脱机验证指令中不包括脱机验证码时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证;
第一发送子模块,还用于当第二验证子模块验证结果为通过时,向上 位机返回脱机指纹验证成功的信息;用于当第二验证子模块验证结果为未通过时,向上位机返回脱机指纹验证失败的信息。
或者,上述持卡人验证模块409包括第二判断子模块、第三验证子模块、第四验证子模块、第二发送子模块;
第二判断子模块,用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机验证指令时,判断脱机验证指令中是否包括脱机验证码;
第三验证子模块,用于当第二判断子模块判定脱机验证指令中包括脱机验证码时,从脱机验证指令中获取脱机验证码,根据保存模块403保存的脱机验证码对获取的脱机验证码进行验证;
第二发送子模块,用于当第三验证子模块验证通过时,向上位机返回脱机验证成功的信息;用于当第三验证子模块验证未通过时,向上位机返回脱机验证失败的信息;
第四验证子模块,用于当第二判断子模块判定脱机验证指令中不包括脱机验证码时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证;
第二发送子模块,还用于当第四验证子模块验证结果为通过时,向上位机返回脱机验证成功的信息;用于当第四验证子模块验证结果为未通过时,向上位机返回脱机验证失败的信息。
本实施例中,上述金融卡还包括交易验证模块;
交易验证模块,用于当判断模块402判定等待接收模块401接收到的指令是交易验证指令时,提示用户输入交易验证信息,接收到用户输入的交易验证信息之后,对用户输入的交易验证信息进行验证,验证通过则向上位机返回验证成功的信息;否则向上位机返回验证失败的信息,结束交易。
具体地,交易验证模块包括:第一提示子模块、第一接收子模块、第 一指纹验证子模块、第一生成发送子模块;
第一提示子模块,用于当判断模块402判定等待接收模块401接收到的指令是交易验证指令时,提示用户输入指纹;
第一接收子模块,用于接收用户输入的指纹;
第一指纹验证子模块,用于根据保存模块403保存的用户注册指纹验证用户输入的指纹;
第一生成发送子模块,用于当第一指纹验证子模块验证通过时生成验证成功的信息,向上位机返回验证成功的信息;当第一指纹验证子模块验证未通过时生成验证失败的信息,向上位机返回验证失败的信息,结束交易。
可选地,上述交易验证模块还包括保存子模块;
上述第一指纹验证子模块,具体用于根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与保存模块403保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
保存子模块,用于当第一指纹验证子模块验证通过时,对第一指纹验证子模块根据用户输入的指纹计算得出的指纹特征进行保存;
相应地,上述等待接收模块401接收的指纹验证指令具体为联机指纹验证指令;上述持卡人验证模块409,具体用于当判断模块判402定等待接收模块401接收到的指令是验证指令,且验证指令具体为联机指纹验证指令时,将保存子模块保存的计算得出的指纹特征发送给上位机。
可选地,上述等待接收模块401接收的指纹验证指令具体为脱机指纹验证指令;上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,根据上述第一生成发送子模块生成的验证成功的信息生成成功的脱机指纹验证结果,将成功的脱机指纹验证结果发送给上位机。
具体地,上述交易验证模块还可以具体包括:第二提示子模块、第二 获取子模块、第二验证码验证子模块、第二生成发送子模块;
第二提示子模块,用于当判断模块402判定等待接收模块401接收到的指令是验证指令时,提示用户输入交易验证码;
第二获取子模块,用于获取用户输入的验证码;
第二验证码验证子模块,用于根据保存模块403保存的交易验证码验证第二获取子模块获取的用户输入的交易验证码;
第二生成发送子模块,用于当第二验证码验证子模块验证通过时生成验证成功的信息,向上位机返回验证成功的信息;当第二验证码验证子模块验证未通过时生成验证失败的信息,向上位机返回验证失败的信息,结束交易;
或者,上述交易验证模块具体包括:第二获取子模块、第二验证码验证子模块、第二生成发送子模块;
第二获取子模块,用于从交易验证指令中获取交易验证码;
第二验证码验证子模块,用于根据保存模块403保存的交易验证码验证第二获取子模块从交易验证指令中获取的交易验证码;
第二生成发送子模块,用于当第二验证码验证子模块验证通过时生成验证成功的信息,向上位机返回验证成功的信息;当第二验证码验证子模块验证未通过时生成验证失败的信息,向上位机返回验证失败的信息,结束交易;
可选地,上述持卡人验证模块409,还用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机验证码验证指令时,根据第二生成发送子模块生成的验证成功的信息生成成功的脱机验证码验证结果,将成功的脱机验证码验证结果发送给上位机。
本实施例中,所上述开机验证模块,具体用于接收到开机事件时,提示用户输入指纹,获取到用户输入的指纹时,根据上述保存模块403保存的用户注册指纹对用户输入的指纹进行验证;
相应地,上述等待接收模块401,具体用于当开机验证模块验证通过时,等待接收来自上位机的指令。
本实施例中,上述开机验证模块,具体用于接收到开机事件时,根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与保存模块403保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
上述开机验证模块,还用于当验证通过时对计算得出的指纹特征进行保存;
相应地,上述等待接收模块401接收的指纹验证指令具体为联机指纹验证指令;上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为联机指纹验证指令时,将开机验证模块保存的指纹特征发送给上位机。
本实施例中,上述开机验证模块,还用于对验证通过的结果进行保存;
相应地,上述等待接收模块401接收的指纹验证指令具体为脱机指纹验证指令;上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,根据开机验证模块保存的验证通过的结果生成脱机指纹验证成功的信息,将脱机指纹验证成功的信息发送给上位机。
本实施例中,上述应用密文生成模块407,具体用于根据上述持卡人验证模块409生成的脱机指纹验证成功的信息或脱机指纹验证失败的信息生成应用密文。
本实施例中,当金融卡包括上述开机验证模块,并且开机验证模块验证通过时:上述保存模块403具体用于保存金融卡支持的应用信息,保存包含与联机验证码相关的记录信息的文件信息,保存包含联机验证码的应用数据,保存用户注册指纹。
本实施例中,上述开机验证模块,具体用于接收到开机事件时,根据 用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与保存模块403保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;
当上述开机验证模块验证通过时,上述保存模块403具体用于保存金融卡支持的应用信息,保存包含与开机验证模块计算得出的指纹特征相关的记录信息的文件信息,保存包含开机验证模块计算得出的指纹特征的应用数据,保存用户注册指纹。
可选地,上述等待接收模块401接收的指纹验证指令具体为脱机指纹验证指令;相应地,上述持卡人验证模块409,具体用于当判断模块402判定等待接收模块401接收到的指令是验证指令,且验证指令具体为脱机指纹验证指令时,等待用户输入指纹,当获取到用户输入的指纹时,根据保存模块403保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
本实施例中,上述开机验证模,具体用于上电或者接收到来自用户的开机事件时,根据上述保存模块保存的用户注册指纹和用户输入的指纹进行开机验证。
可选地,上述金融卡还包括蓝牙模块;
蓝牙模块,用于蓝牙与上位机进行数据通信;
相应地,上述等待接收模块通过蓝牙模块等待接收来自上位机的指令;
上述的第一发送模块404、第二发送模块405、第三发送模块406、第四发送模块408通过蓝牙模块向上位机发送数据。
以上,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求的保护范围为准。
Claims (20)
- 一种具有指纹验证功能的金融卡的工作方法,其特征在于,包括:步骤S1:金融卡等待接收来自上位机的指令;步骤S2:所述金融卡接收到来自上位机的指令时,判断指令的类型,当判定接收到的指令是应用选择指令时,执行步骤S3;当判定接收到的指令是获取处理选项指令时,执行步骤S4;当判定接收到的指令是读应用数据指令时,执行步骤S5;当判定接收到的指令是获取应用密文指令时,执行步骤S6;步骤S3:所述金融卡将自身支持的应用信息发送给所述上位机;步骤S4:所述金融卡将文件信息发送给所述上位机;步骤S5:所述金融卡将与所述读应用数据指令中的文件标识所对应的应用数据发送给所述上位机;步骤S6:所述金融卡执行卡片行为分析并生成应用密文,将所述应用密文发送给所述上位机;上述方法还包括:当所述步骤S2中所述金融卡判定接收到的指令是验证指令,且所述验证指令具体为指纹验证指令时,根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息;和/或,所述步骤S1之前还包括:所述金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,验证通过时执行步骤S1。
- 根据权利要求1所述的方法,其特征在于,所述步骤S2中还包括:当判定接收到的指令是交易验证指令时,执行步骤S0;步骤S0:所述金融卡提示用户输入交易验证信息,接收到用户输入的交易验证信息之后,对用户输入的交易验证信息进行验证,验证通过则向所述上位机返回验证成功的信息;否则向所述上位机返回验证失败的信息, 结束交易。
- 根据权利要求1所述的方法,其特征在于,所述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体包括:步骤H1:所述金融卡提示用户输入指纹;步骤H2:所述金融卡获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证。
- 根据权利要求1所述的方法,其特征在于,所述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:所述金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当验证通过时,还包括:所述金融卡对计算得出的所述指纹特征进行保存;所述指纹验证指令具体为联机指纹验证指令;所述金融卡根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息,具体为:所述金融卡将保存的所述指纹特征发送给所述上位机。
- 根据权利要求1所述的方法,其特征在于,当所述金融卡根据自身注册的指纹和用户输入的指纹进行开机验证,并且验证通过时,还包括:所述金融卡对验证通过的结果进行保存;所述指纹验证指令具体为脱机指纹验证指令;所述金融卡根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息,具体为:所述金融卡根据保存的所述验证通过的结果生成脱机指纹验证成功的信息,将所述脱机指纹验证成功的信息发送给所述上位机。
- 根据权利要求1所述的方法,其特征在于,当所述步骤S1之前还包 括:所述金融卡接收到开机事件时,根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,并且验证通过时:所述步骤S4中所述金融卡发送给所述上位机的所述文件信息中包括与联机验证码相关的记录信息;所述步骤S5中所述金融卡发送给所述上位机的应用数据中包括与所述读应用数据指令中的联机验证码的记录信息对应的联机验证码。
- 根据权利要求1所述的方法,其特征在于,所述金融卡根据自身保存的用户注册指纹和用户输入的指纹进行开机验证,具体为:所述金融卡根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与自身保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当开机验证通过时,还包括:所述金融卡对计算得出的所述指纹特征进行保存;所述步骤S4中所述金融卡发送给所述上位机的所述文件信息中包括与所述指纹特征相关的记录信息;所述步骤S5中所述金融卡发送给所述上位机的应用数据中包括与所述读应用数据指令中的指纹特征的记录信息对应的指纹特征。
- 根据权利要求6所述的方法,其特征在于,所述指纹验证指令具体为脱机指纹验证指令;所述金融卡根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息,具体为:所述金融卡等待用户输入指纹,当获取到用户输入的指纹时,根据自身保存的用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
- 根据权利要求1所述的方法,其特征在于,所述金融卡接收到开机事件,具体为:所述金融卡上电或者接收到来自用户的开机事件。
- 根据权利要求1所述的方法,其特征在于,所述金融卡通过蓝牙与所述上位机进行数据通信。
- 一种具有指纹验证功能的金融卡,其特征在于,包括:等待接收模块,用于等待接收来自上位机的指令;判断模块,用于当所述等待接收模块接收到来自上位机的指令时,判断指令的类型;保存模块,用于保存金融卡支持的应用信息;用于保存文件信息;用于保存应用数据;第一发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是应用选择指令时,将所述保存模块保存的所述金融卡支持的应用信息发送给所述上位机;第二发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是获取处理选项指令时,将所述保存模块保存的所述文件信息发送给所述上位机;第三发送模块,用于当所述判断模块判定所述等待接收模块接收到的指令是读应用数据指令时,将所述保存模块保存的与所述读应用数据指令中的文件标识所对应的应用数据发送给所述上位机;应用密文生成模块,用于当所述判断模块判定所述等待接收模块接收到的指令是获取应用密文指令时,执行卡片行为分析并生成应用密文;第四发送模块,用于将所述应用密文生成模块生成的所述应用密文发送给所述上位机;所述金融卡还包括:持卡人验证模块和/或开机验证模块;所述持卡人验证模块,用于当所述判断模块判定所述等待接收模块接收到的指令是验证指令,且所述验证指令具体为指纹验证指令时,根据用户的指纹执行持卡人验证操作,向所述上位机返回持卡人验证相关信息;所述保存模块,还用于保存用户注册指纹;所述开机验证模块,用于接收到开机事件时,根据所述保存模块保存的所述用户注册指纹和用户输入的指纹进行开机验证;当所述金融卡包括所述开机验证模块时,所述等待接收模块具体用于所述开机验证模块验证通过时,等待接收来自上位机的指令。
- 根据权利要求11所述的金融卡,其特征在于,还包括交易验证模块;所述交易验证模块,用于当所述判断模块判定所述等待接收模块接收到的指令是交易验证指令时,提示用户输入交易验证信息,接收到用户输入的交易验证信息之后,对用户输入的交易验证信息进行验证,验证通过则向所述上位机返回验证成功的信息;否则向所述上位机返回验证失败的信息,结束交易。
- 根据权利要求11所述的金融卡,其特征在于,所述开机验证模块,具体用于接收到开机事件时,提示用户输入指纹,获取到用户输入的指纹时,根据所述保存模块保存的所述用户注册指纹对用户输入的指纹进行验证;所述等待接收模块,具体用于当所述开机验证模块验证通过时,等待接收来自上位机的指令。
- 根据权利要求11所述的金融卡,其特征在于,所述开机验证模块,具体用于接收到开机事件时,根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与所述保存模块保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;所述开机验证模块,还用于当验证通过时对计算得出的所述指纹特征进行保存;所述等待接收模块接收的所述指纹验证指令具体为联机指纹验证指令;所述持卡人验证模块,具体用于当所述判断模块判定所述等待接收模块接收到的指令是验证指令,且所述验证指令具体为联机指纹验证指令时,将所述开机验证模块保存的所述指纹特征发送给所述上位机。
- 根据权利要求11所述的金融卡,其特征在于,所述开机验证模块,还用于对验证通过的结果进行保存;所述等待接收模块接收的所述指纹验证指令具体为脱机指纹验证指令;所述持卡人验证模块,具体用于当所述判断模块判定所述等待接收模块接收到的指令是验证指令,且所述验证指令具体为脱机指纹验证指令时,根据所述开机验证模块保存的所述验证通过的结果生成脱机指纹验证成功的信息,将所述脱机指纹验证成功的信息发送给所述上位机。
- 根据权利要求11所述的金融卡,其特征在于,当所述金融卡包括所述开机验证模块,并且所述开机验证模块验证通过时:所述保存模块具体用于保存金融卡支持的应用信息,保存包含与联机验证码相关的记录信息的文件信息,保存包含联机验证码的应用数据,保存用户注册指纹。
- 根据权利要求11所述的金融卡,其特征在于,所述开机验证模块,具体用于接收到开机事件时,根据用户输入的指纹计算得出指纹特征,判断计算得出的指纹特征是否与所述保存模块保存的用户注册指纹的指纹特征一致,是则验证通过,否则验证未通过;当所述开机验证模块验证通过时,所述保存模块具体用于保存金融卡支持的应用信息,保存包含与所述开机验证模块计算得出的所述指纹特征相关的记录信息的文件信息,保存包含所述开机验证模块计算得出的所述指纹特征的应用数据,保存用户注册指纹。
- 根据权利要求42所述的金融卡,其特征在于,所述等待接收模块接收的所述指纹验证指令具体为脱机指纹验证指令;所述持卡人验证模块,具体用于当所述判断模块判定所述等待接收模 块接收到的指令是验证指令,且所述验证指令具体为脱机指纹验证指令时,等待用户输入指纹,当获取到用户输入的指纹时,根据所述保存模块保存的所述用户注册指纹对用户输入的指纹进行验证,验证通过则向上位机返回脱机指纹验证成功的信息,否则向上位机返回脱机指纹验证失败的信息。
- 根据权利要求24所述的金融卡,其特征在于,所述开机验证模块,具体用于上电或者接收到来自用户的开机事件时,根据所述保存模块保存的所述用户注册指纹和用户输入的指纹进行开机验证。
- 根据权利要求24所述的金融卡,其特征在于,还包括蓝牙模块;所述蓝牙模块,用于蓝牙与所述上位机进行数据通信;所述等待接收模块通过所述蓝牙模块等待接收来自所述上位机的指令;所述第一发送模块、所述第二发送模块、所述第三发送模块、所述第四发送模块通过所述蓝牙模块向上位机发送数据。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/803,949 US11308495B2 (en) | 2017-12-11 | 2020-02-27 | Financial card with function of fingerprint verification and working method therefor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711306207.1A CN108038694B (zh) | 2017-12-11 | 2017-12-11 | 一种具有指纹验证功能的金融卡及其工作方法 |
CN201711306207.1 | 2017-12-11 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/803,949 Continuation US11308495B2 (en) | 2017-12-11 | 2020-02-27 | Financial card with function of fingerprint verification and working method therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019114431A1 true WO2019114431A1 (zh) | 2019-06-20 |
Family
ID=62102073
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/112122 WO2019114431A1 (zh) | 2017-12-11 | 2018-10-26 | 一种具有指纹验证功能的金融卡及其工作方法 |
Country Status (3)
Country | Link |
---|---|
US (1) | US11308495B2 (zh) |
CN (1) | CN108038694B (zh) |
WO (1) | WO2019114431A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103763103B (zh) * | 2013-12-31 | 2017-02-01 | 飞天诚信科技股份有限公司 | 一种智能卡生成脱机认证凭据的方法 |
CN108038694B (zh) * | 2017-12-11 | 2019-03-29 | 飞天诚信科技股份有限公司 | 一种具有指纹验证功能的金融卡及其工作方法 |
CN109344593B (zh) * | 2018-10-24 | 2021-01-26 | 三星(中国)半导体有限公司 | 生物信息验证方法以及验证服务器、录入和验证客户端 |
CN110826665A (zh) * | 2019-11-01 | 2020-02-21 | 楚天龙股份有限公司 | 一种指纹卡指纹管理方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100008535A1 (en) * | 2008-07-14 | 2010-01-14 | Abulafia David | Mobile Phone Payment System using Integrated Camera Credit Card Reader |
CN104574070A (zh) * | 2013-10-11 | 2015-04-29 | 北京数码视讯科技股份有限公司 | 金融联机交易方法及装置 |
CN106545993A (zh) * | 2016-12-06 | 2017-03-29 | 嘉兴家乐福新能源有限公司 | 一种分级速热式电热水器 |
CN108038694A (zh) * | 2017-12-11 | 2018-05-15 | 飞天诚信科技股份有限公司 | 一种具有指纹验证功能的金融卡及其工作方法 |
Family Cites Families (123)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6125192A (en) * | 1997-04-21 | 2000-09-26 | Digital Persona, Inc. | Fingerprint recognition system |
US8346663B2 (en) * | 1998-01-30 | 2013-01-01 | Citicorp Development Center, Inc. | Method and system of contactless interfacing for smart card banking |
US6012049A (en) * | 1998-02-04 | 2000-01-04 | Citicorp Development Center, Inc. | System for performing financial transactions using a smartcard |
US6182892B1 (en) * | 1998-03-25 | 2001-02-06 | Compaq Computer Corporation | Smart card with fingerprint image pass-through |
EP0956818B1 (en) * | 1998-05-11 | 2004-11-24 | Citicorp Development Center, Inc. | System and method of biometric smart card user authentication |
US6219439B1 (en) * | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
DE19860177C2 (de) * | 1998-12-24 | 2002-11-21 | Ibm | Verfahren und Vorrichtung zur benutzerkontrollierten Freischaltung von Chipkartenfunktionen |
CN1259712A (zh) * | 2000-01-11 | 2000-07-12 | 熊猫电子集团有限公司 | 身份辨别的指纹、ic卡识别方法和装置 |
US7280984B2 (en) * | 2000-05-08 | 2007-10-09 | Phelan Iii Frank | Money card system, method and apparatus |
AU8436001A (en) * | 2000-07-19 | 2002-02-05 | Young Wan Kim | System and method for cardless secure credit transaction processing |
US8015592B2 (en) * | 2002-03-28 | 2011-09-06 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
KR20010025234A (ko) * | 2000-11-09 | 2001-04-06 | 김진삼 | 지문정보를 이용한 카드거래 인증방법 및 그 시스템 |
US20020095587A1 (en) * | 2001-01-17 | 2002-07-18 | International Business Machines Corporation | Smart card with integrated biometric sensor |
US20040232224A1 (en) * | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method for registering biometric for use with a fob |
US7303120B2 (en) * | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US7360689B2 (en) * | 2001-07-10 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a FOB |
US20040238621A1 (en) * | 2001-07-10 | 2004-12-02 | American Express Travel Related Services Company, Inc. | Method and system for fingerprint biometrics on a fob |
JP2003123032A (ja) * | 2001-10-12 | 2003-04-25 | Hitachi Ltd | Icカード端末および本人認証方法 |
US20030074317A1 (en) * | 2001-10-15 | 2003-04-17 | Eyal Hofi | Device, method and system for authorizing transactions |
US20050212657A1 (en) * | 2001-11-07 | 2005-09-29 | Rudy Simon | Identity verification system with self-authenticating card |
JP4187451B2 (ja) * | 2002-03-15 | 2008-11-26 | 松下電器産業株式会社 | 個人認証用デバイスと携帯端末装置 |
US7543156B2 (en) * | 2002-06-25 | 2009-06-02 | Resilent, Llc | Transaction authentication card |
GB0400428D0 (en) * | 2004-01-09 | 2004-02-11 | Kinderguard Ltd | An identification card and a method of identifying a card holder using the card |
AU2003900981A0 (en) * | 2003-03-04 | 2003-03-20 | Grosvenor Leisure Incorporated | Secure steganographic biometric identification |
CN1553404A (zh) * | 2003-06-03 | 2004-12-08 | 岳文祥 | 具有指纹辨识的开机装置与方法 |
KR20060089231A (ko) * | 2003-09-26 | 2006-08-08 | 마스터카드 인터내셔날, 인코포레이티드 | 생체인식에 의한 근접 지불 기기 인증 방법 및 시스템 |
US7681232B2 (en) * | 2004-03-08 | 2010-03-16 | Cardlab Aps | Credit card and a secured data activation system |
US7363504B2 (en) * | 2004-07-01 | 2008-04-22 | American Express Travel Related Services Company, Inc. | Method and system for keystroke scan recognition biometrics on a smartcard |
US7341181B2 (en) * | 2004-07-01 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Method for biometric security using a smartcard |
US7325724B2 (en) * | 2004-07-01 | 2008-02-05 | American Express Travel Related Services Company, Inc. | Method for registering a biometric for use with a smartcard |
US20060016874A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | System for registering a biometric for use with a smartcard |
US20060000894A1 (en) * | 2004-07-01 | 2006-01-05 | American Express Travel Related Services Company, Inc. | Method and system for fingerprint biometrics on a smartcard |
US7318550B2 (en) * | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US7314165B2 (en) * | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | Method and system for smellprint recognition biometrics on a smartcard |
US20060020558A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | Method and system for proffering multiple biometrics for use with a smartcard |
US7314164B2 (en) * | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | System for biometric security using a smartcard |
US20060016876A1 (en) * | 2004-07-01 | 2006-01-26 | American Express Travel Related Services Company, Inc. | Method for registering a biometric for use with a smartcard-reader system |
JP4285368B2 (ja) * | 2004-08-25 | 2009-06-24 | セイコーエプソン株式会社 | Icカード、認証システムおよび認証方法 |
AU2005307724A1 (en) * | 2004-11-19 | 2006-05-26 | Triad Biometrics, Llc | Methods and systems for use in biomeiric authentication and/or identification |
JP4804759B2 (ja) * | 2005-01-11 | 2011-11-02 | 富士通株式会社 | 生体認証機能を持つicカードの更新方法及びicカード更新装置 |
JP4221385B2 (ja) * | 2005-02-21 | 2009-02-12 | 日立オムロンターミナルソリューションズ株式会社 | 生体認証装置、端末装置及び自動取引装置 |
JP2006235687A (ja) * | 2005-02-22 | 2006-09-07 | Seiko Epson Corp | 携帯情報端末 |
DE102005015180A1 (de) * | 2005-03-31 | 2006-10-05 | Giesecke & Devrient Gmbh | Verifizieren von Fingerabdrücken |
JP4813133B2 (ja) * | 2005-09-20 | 2011-11-09 | 富士通株式会社 | 生体認証方法及び生体認証システム |
US20070073619A1 (en) * | 2005-09-23 | 2007-03-29 | Smith Rebecca C | Biometric anti-fraud plastic card |
JP4500760B2 (ja) * | 2005-10-19 | 2010-07-14 | 日立オムロンターミナルソリューションズ株式会社 | Icカード内認証システム |
JP5274020B2 (ja) * | 2005-12-19 | 2013-08-28 | 国際先端技術総合研究所株式会社 | 真贋判別可能なカード |
US20070145121A1 (en) * | 2005-12-23 | 2007-06-28 | Menashe Fouad Dallal | Authentication system for the authorization of a transaction using a credit card, ATM card, or secured personal ID card |
US7594603B2 (en) * | 2006-03-29 | 2009-09-29 | Stmicroelectronics, Inc. | System and method for sensing biometric and non-biometric smart card devices |
US7818264B2 (en) * | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
JP4868947B2 (ja) * | 2006-06-05 | 2012-02-01 | 株式会社日立製作所 | 生体認証装置と生体認証システム及びicカード並びに生体認証方法 |
US9401063B2 (en) * | 2006-06-08 | 2016-07-26 | Mastercard International Incorporated | All-in-one proximity payment device with local authentication |
CN101485128B (zh) * | 2006-06-19 | 2016-08-03 | 维萨美国股份有限公司 | 便携式消费者设备验证系统 |
FR2905187B1 (fr) * | 2006-08-22 | 2012-11-16 | Ingenico Sa | Terminal de paiement electronique biometrique et procede de transaction |
US20080282540A1 (en) * | 2007-05-14 | 2008-11-20 | Innovatier, Inc. | Method for making advanced smart cards with integrated electronics using isotropic thermoset adhesive materials with high quality exterior surfaces |
US8276816B2 (en) * | 2007-12-14 | 2012-10-02 | Validity Sensors, Inc. | Smart card system with ergonomic fingerprint sensor and method of using |
CN101596820B (zh) * | 2008-06-03 | 2010-08-18 | 北京中维华盾科技发展有限公司 | 指纹加密证书及证卡的制作方法 |
US20160342995A9 (en) * | 2008-06-06 | 2016-11-24 | Ebay Inc. | Biometric authentication of mobile financial transactions by trusted service managers |
US20140025520A1 (en) * | 2008-06-06 | 2014-01-23 | Ebay Inc. | Biometric authentication of mobile financial transactions by trusted service managers |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US20100038418A1 (en) * | 2008-08-18 | 2010-02-18 | Fomitchev George I | Method for biometric authorization for financial transactions |
JP5337431B2 (ja) * | 2008-08-27 | 2013-11-06 | 日立オムロンターミナルソリューションズ株式会社 | カード処理装置及びカード処理方法 |
US8253531B2 (en) * | 2009-03-26 | 2012-08-28 | International Business Machines Corporation | On chip verification and consequent enablement of card OS operation in smart cards |
US8167201B2 (en) * | 2009-10-07 | 2012-05-01 | Castles Technology Co., Ltd. | Composite chip card with a security protection interface and a method for controlling the same |
CN102081821B (zh) * | 2009-11-27 | 2013-08-14 | 中国银联股份有限公司 | Ic卡支付系统和方法以及多应用ic卡、支付终端 |
CN102467775A (zh) * | 2010-11-19 | 2012-05-23 | 沈阳理工大学 | 一种便携式银行卡卡号密码存储机 |
US9600808B1 (en) * | 2011-06-24 | 2017-03-21 | Epic One Texas, Llc | Secure payment card, method and system |
US9495550B2 (en) * | 2011-08-04 | 2016-11-15 | J. Chance Anderson | System and method for sharing of data securely between electronic devices |
US20130036017A1 (en) * | 2011-08-05 | 2013-02-07 | Ivason Galloway | Financial card for online fund transfer and method therefor |
US20130056539A1 (en) * | 2011-09-07 | 2013-03-07 | Abiodun Daniel Iwaloye | i-card (biometric and contactless credit and debit cards) |
US8823497B2 (en) * | 2012-02-14 | 2014-09-02 | International Business Machines Corporation | Secure data card with passive RFID chip and biometric sensor |
WO2013186682A1 (en) * | 2012-06-10 | 2013-12-19 | Safe Sign Ltd | Biometric confirmation for bank card transaction |
GB2511505A (en) * | 2013-03-04 | 2014-09-10 | Mastercard International Inc | Dual/multiple pin payment account |
US9892576B2 (en) * | 2013-08-02 | 2018-02-13 | Jpmorgan Chase Bank, N.A. | Biometrics identification module and personal wearable electronics network based authentication and transaction processing |
US20150127550A1 (en) * | 2013-11-04 | 2015-05-07 | Apple Inc. | Using bioauthentication in near-field-communication transactions |
US9424568B2 (en) * | 2014-05-29 | 2016-08-23 | Apple Inc. | Financial-transaction notifications |
US20160042356A1 (en) * | 2014-08-11 | 2016-02-11 | Gabriel Jakobson | Biometric Reading Governing Commercial Transactions via Smart Devices |
WO2016072799A1 (en) * | 2014-11-08 | 2016-05-12 | Samsung Electronics Co., Ltd. | Electronic device including a plurality of payment modules |
WO2016106277A2 (en) * | 2014-12-22 | 2016-06-30 | Capital One Services, LLC. | A system, method and apparatus for reprogramming a transaction card |
CN104539430B (zh) * | 2014-12-30 | 2018-11-30 | 飞天诚信科技股份有限公司 | 一种基于卡片的动态口令生成方法及设备 |
US10037528B2 (en) * | 2015-01-14 | 2018-07-31 | Tactilis Sdn Bhd | Biometric device utilizing finger sequence for authentication |
US10395227B2 (en) * | 2015-01-14 | 2019-08-27 | Tactilis Pte. Limited | System and method for reconciling electronic transaction records for enhanced security |
US20160203478A1 (en) * | 2015-01-14 | 2016-07-14 | Tactilis Sdn Bhd | System and method for comparing electronic transaction records for enhanced security |
US20160203492A1 (en) * | 2015-01-14 | 2016-07-14 | Tactilis Sdn Bhd | System and method for requesting reconciliation of electronic transaction records for enhanced security |
US10289943B2 (en) * | 2015-02-23 | 2019-05-14 | Herzel Noach | Smart card for connection with a personal computing device |
US20160253669A1 (en) * | 2015-02-27 | 2016-09-01 | Samsung Electronics Co., Ltd. | Method for providing payment service and electronic device thereof |
US20160267486A1 (en) * | 2015-03-13 | 2016-09-15 | Radiius Corp | Smartcard Payment System and Method |
CA2980114C (en) * | 2015-04-23 | 2020-03-10 | Unho Choi | Authentication in ubiquitous environment |
US10817878B2 (en) * | 2015-06-09 | 2020-10-27 | Mastercard International Incorporated | Systems and methods for verifying users, in connection with transactions using payment devices |
KR102470570B1 (ko) * | 2015-07-14 | 2022-11-24 | 삼성전자주식회사 | 결제 시스템, 전자 장치 및 전자 장치의 결제 방법 |
KR102441758B1 (ko) * | 2015-07-14 | 2022-09-13 | 삼성전자주식회사 | 전자 장치, 인증 대행 서버 및 결제 시스템 |
CA2989940A1 (en) * | 2015-07-30 | 2017-02-02 | Visa International Service Association | System and method for conducting transactions using biometric verification |
CN108140081A (zh) * | 2015-08-11 | 2018-06-08 | 万事达卡国际股份有限公司 | 生物计量验证方法和系统 |
CN107924516B (zh) * | 2015-09-01 | 2021-02-02 | 华为技术有限公司 | 一种移动终端的支付认证方法、装置及移动终端 |
US9519901B1 (en) * | 2015-09-16 | 2016-12-13 | Square, Inc. | Biometric payment technology |
US20200302428A1 (en) * | 2015-12-01 | 2020-09-24 | Jpmorgan Chase Bank, N.A. | Secure Biometric Card and Method for Securing Information |
EP3179431A1 (en) * | 2015-12-11 | 2017-06-14 | Mastercard International Incorporated | User authentication for transactions |
CN205302348U (zh) * | 2015-12-18 | 2016-06-08 | 杭州晟元数据安全技术股份有限公司 | 一种结合指纹认证和key功能的金融ic卡 |
CN205247428U (zh) * | 2015-12-18 | 2016-05-18 | 杭州晟元数据安全技术股份有限公司 | 一种带指纹身份认证的金融ic卡 |
EP3185194A1 (en) * | 2015-12-24 | 2017-06-28 | Gemalto Sa | Method and system for enhancing the security of a transaction |
KR20170077425A (ko) * | 2015-12-28 | 2017-07-06 | 삼성전자주식회사 | 전자 장치 및 전자 장치의 핸드오프를 이용한 결제 수행 방법 |
US20170200163A1 (en) * | 2016-01-08 | 2017-07-13 | Kevin E. Davenport | Enhanced security credit card system |
GB201602371D0 (en) * | 2016-02-10 | 2016-03-23 | Zwipe As | Smartcard and method for controlling a smartcard |
GB2547905B (en) * | 2016-03-02 | 2021-09-22 | Zwipe As | Fingerprint authorisable device |
US20170286789A1 (en) * | 2016-03-31 | 2017-10-05 | Zwipe As | Biometric authorised smartcard and method for controlling a biometric authorised smartcard |
CN114120523B (zh) * | 2016-04-27 | 2023-11-03 | 武礼伟仁株式会社 | 生物体数据注册系统及结算系统 |
GB201609572D0 (en) * | 2016-06-01 | 2016-07-13 | Zwipe As | Smartcard and method for controlling a smartcard |
CN105959287A (zh) * | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | 一种基于生物特征的安全认证方法及装置 |
US20180004927A1 (en) * | 2016-07-01 | 2018-01-04 | Zwipe As | Biometric device with security function |
CN106203593A (zh) * | 2016-07-05 | 2016-12-07 | 商学全 | 一种有源指纹ic卡及使用方法 |
KR102103931B1 (ko) * | 2016-07-08 | 2020-04-24 | 김만이 | 식별 가능 태그와 인공지능을 이용한 결제수단과 문서 전산관리 방법 및 시스템 |
KR102608994B1 (ko) * | 2016-07-28 | 2023-12-06 | 삼성전자주식회사 | 생체 인증을 이용한 결제 방법 및 이를 수행하는 전자 장치 |
KR20180013524A (ko) * | 2016-07-29 | 2018-02-07 | 삼성전자주식회사 | 전자 장치 및 전자 장치의 생체 정보 인증 방법 |
CN206097155U (zh) * | 2016-08-05 | 2017-04-12 | 商学全 | 一种指纹智能cpu卡 |
WO2018027587A1 (zh) * | 2016-08-09 | 2018-02-15 | 华为技术有限公司 | 一种片上系统和处理设备 |
US10783337B2 (en) * | 2016-08-16 | 2020-09-22 | CPI Card Group—Colorado, Inc. | IC chip card |
CN106355404B (zh) * | 2016-08-26 | 2020-09-01 | 武汉天喻信息产业股份有限公司 | 一种具有安全漏洞防护机制的借记贷记交易系统及方法 |
US10496808B2 (en) * | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
GB2555817A (en) * | 2016-11-10 | 2018-05-16 | Sthaler Ltd | Biometric transaction system |
CN106845993A (zh) * | 2016-11-14 | 2017-06-13 | 大唐微电子技术有限公司 | 一种ic卡交易的实现方法和装置 |
CN106600825A (zh) * | 2016-11-23 | 2017-04-26 | 合肥星服信息科技有限责任公司 | 一种便携式安全银行卡套 |
KR20180061819A (ko) * | 2016-11-30 | 2018-06-08 | 주식회사 베프스 | 다중 생체 인증 장치 또는 다중 생체 인증 시스템, 그리고 이를 사용한 다중 생체 인증 방법 |
US20180189767A1 (en) * | 2016-12-29 | 2018-07-05 | Fotonation Limited | Systems and methods for utilizing payment card information with a secure biometric processor on a mobile device |
-
2017
- 2017-12-11 CN CN201711306207.1A patent/CN108038694B/zh active Active
-
2018
- 2018-10-26 WO PCT/CN2018/112122 patent/WO2019114431A1/zh active Application Filing
-
2020
- 2020-02-27 US US16/803,949 patent/US11308495B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100008535A1 (en) * | 2008-07-14 | 2010-01-14 | Abulafia David | Mobile Phone Payment System using Integrated Camera Credit Card Reader |
CN104574070A (zh) * | 2013-10-11 | 2015-04-29 | 北京数码视讯科技股份有限公司 | 金融联机交易方法及装置 |
CN106545993A (zh) * | 2016-12-06 | 2017-03-29 | 嘉兴家乐福新能源有限公司 | 一种分级速热式电热水器 |
CN108038694A (zh) * | 2017-12-11 | 2018-05-15 | 飞天诚信科技股份有限公司 | 一种具有指纹验证功能的金融卡及其工作方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108038694B (zh) | 2019-03-29 |
US11308495B2 (en) | 2022-04-19 |
US20200202360A1 (en) | 2020-06-25 |
CN108038694A (zh) | 2018-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220366413A1 (en) | Payment system | |
US8739266B2 (en) | Universal authentication token | |
JP5362558B2 (ja) | 生体特徴による身分認証の方法 | |
US20130246281A1 (en) | Service providing system and unit device | |
WO2019114431A1 (zh) | 一种具有指纹验证功能的金融卡及其工作方法 | |
JP5303407B2 (ja) | 生体認証システム、携帯端末、半導体素子、および情報処理サーバ | |
US10171456B2 (en) | Wireless authentication system and wireless authentication method for one time password of mobile communication terminal having near field communication function | |
WO2019237913A1 (zh) | 一种带有指纹识别功能的ic卡及其工作方法 | |
JP2009527835A (ja) | Pinサービス | |
JP5315137B2 (ja) | 認証システム、認証方法、読取装置およびプログラム | |
CN101714216B (zh) | 半导体元件、生物体认证方法和系统、便携式终端 | |
WO2019114542A1 (zh) | 一种蓝牙金融卡及其工作方法 | |
CN104835038A (zh) | 一种联网支付装置及方法 | |
KR101666591B1 (ko) | 스마트 오티피 인증 시스템 및 방법 | |
KR20110029032A (ko) | 공인 인증서 발급처리 방법 및 시스템과 이를 위한 단말 및 기록매체 | |
KR101103189B1 (ko) | 범용 가입자 식별 모듈 정보를 이용한 공인 인증서 발급방법 및 시스템과 이를 위한 기록매체 | |
CN104113417A (zh) | 一种基于nfc的动态口令身份认证方法及系统 | |
KR20120007591A (ko) | 다중매체를 이용한 금융거래 서비스 제공방법 및 시스템과 이를 위한 기록매체 | |
WO2021077627A1 (zh) | 一种智能密钥设备及其验证方法 | |
KR20110005612A (ko) | 생체 인식을 이용한 오티피 운영 방법 및 시스템과 이를 위한 오티피 장치 및 기록매체 | |
JP2008234316A (ja) | 携帯通信端末装置、金融機関の認証用サーバ、暗証番号要求プログラム、および暗証番号応答プログラム | |
KR101662246B1 (ko) | 휴대폰의 프로그램을 이용한 서비스 구현 방법 | |
KR101669245B1 (ko) | 휴대폰의 프로그램을 이용한 서비스 제공 방법 | |
KR20230045875A (ko) | 실물 카드를 이용한 사용자 인증 시스템 및 그 방법 | |
KR20100136134A (ko) | 사용자 매체와 연동하는 오티피 출력 방법 및 시스템과 이를 위한 기록매체 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18887934 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18887934 Country of ref document: EP Kind code of ref document: A1 |