TWM623435U - System for verifying client identity and transaction services using multiple security levels - Google Patents

System for verifying client identity and transaction services using multiple security levels Download PDF

Info

Publication number
TWM623435U
TWM623435U TW110213433U TW110213433U TWM623435U TW M623435 U TWM623435 U TW M623435U TW 110213433 U TW110213433 U TW 110213433U TW 110213433 U TW110213433 U TW 110213433U TW M623435 U TWM623435 U TW M623435U
Authority
TW
Taiwan
Prior art keywords
data
client
transaction
platform
verification
Prior art date
Application number
TW110213433U
Other languages
Chinese (zh)
Inventor
翁仲和
Original Assignee
翁仲和
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 翁仲和 filed Critical 翁仲和
Priority to TW110213433U priority Critical patent/TWM623435U/en
Publication of TWM623435U publication Critical patent/TWM623435U/en

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一種使用多安全層級驗證客戶身分與交易服務之系統,其透過客戶端使用線上快速認證架構以生物特徵登入金融機構端後,金融機構端於客戶端請求交易服務時,依據被請求之交易服務的風險層級選擇相對應的安全驗證方式對客戶身分進行驗證,且區塊鏈上的相關節點將能夠對驗證過程所產生的驗證資料與被請求之交易服務的交易資料進行驗證的存證資料發布到區塊鏈中之技術手段,可以建立能讓金融機構間互信之驗證流程與標準,並達成提高犯罪複雜度與成本、降低金融機構浪費之資源、並兼顧交易安全性及便利性的技術功效。A system that uses multiple security levels to verify customer identity and transaction services. After the client logs in to the financial institution end using an online fast authentication framework with biometric features, when the financial institution requests transaction services from the client end, the transaction service is requested according to the transaction service. The risk level selects the corresponding security verification method to verify the customer's identity, and the relevant nodes on the blockchain will be able to verify the verification data generated during the verification process and the transaction data of the requested transaction service. The technical means in the blockchain can establish verification processes and standards that enable mutual trust among financial institutions, and achieve technical effects that increase the complexity and cost of crimes, reduce wasted resources by financial institutions, and take into account transaction security and convenience.

Description

使用多安全層級驗證客戶身分與交易服務之系統A system for verifying client identity and transaction services using multiple security levels

一種身分與交易之驗證系統,特別係指一種使用多安全層級驗證客戶身分與交易服務之系統。An identity and transaction verification system, particularly a system that uses multiple security levels to verify client identity and transaction services.

資訊技術安全評估共同準則(CC, ISO/IES15408),為成立二十多年的資訊安全產品認證框架,其分為七個安全評估等級,第一級到第四級為評估一般產品或系統的安全等級,第五級以上則為評估設計國家安全或軍事設備產品的標準。在這樣明確、統一、共通的標準下,採用CC標準的國家所產出的IT產品,就可以大規模的取得政府、企業及社會大眾的信任,利用這些產品所設計出來的各種系統便可以量化其安全性,或反過來依照系統所需的安全強度來挑選適合的IT產品。The Common Criteria for Information Technology Security Assessment (CC, ISO/IES15408) is an information security product certification framework established for more than 20 years. It is divided into seven security assessment levels. Security level, the fifth level and above is the standard for evaluating the design of national security or military equipment products. Under such a clear, unified and common standard, the IT products produced by countries adopting the CC standard can gain the trust of the government, enterprises and the general public on a large scale, and various systems designed by using these products can be quantified. Its security, or conversely, select suitable IT products according to the security strength required by the system.

轉移到國內的金融業場景,全面數位化成為勢之所趨,但數位化的金融風險控制及資訊安全標準卻付之闕如,舉保險業而言,每一家保險公司的核保、理賠、保全等驗證工作流程,雖依照法規辦理,但法規僅為指導架構,並未明確流程與標準,這導致每一家保險公司的流程通常都不一樣,且驗證標準不一。如此,金融機構間並無法互信,也就是無法相信其他金融機構之驗證結果,導致每一間金融機構都需要執行相同的驗證過程,造成資源的浪費。In the domestic financial industry scenario, full digitization has become an inevitable trend, but digitized financial risk control and information security standards are still lacking. For the insurance industry, the underwriting, claims settlement, and preservation of every insurance company Although the verification workflow is handled in accordance with the regulations, the regulations are only a guiding framework and do not clarify the procedures and standards. This leads to the fact that each insurance company usually has different procedures and different verification standards. In this way, financial institutions cannot trust each other, that is, they cannot trust the verification results of other financial institutions, so that each financial institution needs to perform the same verification process, resulting in a waste of resources.

綜上所述,可知先前技術中長期以來一直存在國內金融機構間沒有能夠互信之驗證流程與標準的問題,因此有必要提出改進的技術手段,來解決此一問題。To sum up, it can be seen that there has been a long-standing problem in the prior art that there is no mutual trust verification process and standard between domestic financial institutions. Therefore, it is necessary to propose improved technical means to solve this problem.

有鑒於先前技術存在國內金融機構間沒有能夠互信之驗證流程與標準的問題,本創作遂揭露一種使用多安全層級驗證客戶身分與交易服務之系統,其中:In view of the problem that there is no mutually trusted verification process and standard among domestic financial institutions in the prior art, this author discloses a system for verifying customer identity and transaction services using multiple security levels, wherein:

本創作所揭露之使用多安全層級驗證客戶身分與交易服務之系統,至少包含:客戶端,安裝有可信模組,可信模組儲存交易驗證資料;金融機構端,用以提供客戶端使用線上快速認證(Fast IDentity Online, FIDO)架構以生物特徵進行登入,並於客戶端請求交易服務時,判斷交易服務是否符合基本交易層級,當交易服務為基本交易層級時,產生身分驗證請求;平台端,用以接收金融機構端所傳送之身分驗證請求,並要求客戶端進行身分驗證,使客戶端加密交易驗證資料以產生交易加密資料並傳送交易加密資料給平台端,及用以解密交易加密資料以取得身分檢核資料並確認身分檢核資料與交易驗證資料相符後,依據身分驗證請求及交易加密資料產生第一存證資料並發布第一存證資料至區塊鏈,並傳送身分驗證結果至金融機構端,使金融機構端於身分驗證結果表示通過驗證時,產生與被請求之交易服務對應之交易資料;公信單位端,用以接收金融機構端判斷交易服務為實際交易層級時所傳送之交易資料,對交易資料簽章以產生公信簽章,並傳送公信簽章至平台端;鑑證端,用以接收平台端所傳送之公信簽章,並依據公信簽章產生第二存證資料,及發布第二存證資料至區塊鏈。The system for verifying customer identity and transaction services using multiple security levels disclosed in this creation at least includes: a client, which is installed with a trusted module, and the trusted module stores transaction verification data; a financial institution, which is used by the client to use The Fast IDentity Online (FIDO) architecture uses biometric features to log in, and when the client requests transaction services, it determines whether the transaction services conform to the basic transaction level. When the transaction services are at the basic transaction level, an identity verification request is generated; the platform The terminal is used to receive the identity verification request sent by the financial institution, and request the client to perform identity verification, so that the client can encrypt the transaction verification data to generate transaction encryption data and transmit the transaction encryption data to the platform, and decrypt the transaction encryption. Data to obtain the identity verification data and confirm that the identity verification data is consistent with the transaction verification data, generate the first deposit certificate data according to the identity verification request and transaction encryption data, publish the first deposit certificate data to the blockchain, and transmit the identity verification data The result is sent to the financial institution side, so that the financial institution side generates the transaction data corresponding to the requested transaction service when the identity verification result indicates that the verification is passed; the public trust unit side is used to receive the information when the financial institution side judges that the transaction service is the actual transaction level. The transaction data sent, the transaction data is signed to generate a public letter seal, and the public letter seal is sent to the platform; the authentication end is used to receive the public letter seal sent by the platform, and generate a second deposit certificate according to the public letter seal data, and release the second deposit data to the blockchain.

本創作所揭露之系統如上,與先前技術之間的差異在於本創作透過客戶端使用線上快速認證架構以生物特徵登入金融機構端後,金融機構端於客戶端請求交易服務時,依據被請求之交易服務的風險層級選擇相對應的安全驗證方式對客戶身分進行驗證,並將能夠對驗證過程所產生的驗證資料與被請求之交易服務的交易資料進行驗證的存證資料發布到區塊鏈中,藉以解決先前技術所存在的問題,並可以達成提高犯罪複雜度與成本、降低金融機構浪費之資源、並兼顧交易安全性及便利性的技術功效。The system disclosed in this creation is as above, and the difference between it and the prior art is that after this creation uses the online quick authentication framework to log in to the financial institution with biometric features, when the financial institution requests transaction services from the client, it will The risk level of the transaction service selects the corresponding security verification method to verify the customer's identity, and publishes the certificate data that can verify the verification data generated during the verification process and the transaction data of the requested transaction service to the blockchain. , in order to solve the problems existing in the prior art, and can achieve the technical effect of increasing the complexity and cost of crime, reducing the wasted resources of financial institutions, and taking into account the security and convenience of transactions.

以下將配合圖式及實施例來詳細說明本創作之特徵與實施方式,內容足以使任何熟習相關技藝者能夠輕易地充分理解本創作解決技術問題所應用的技術手段並據以實施,藉此實現本創作可達成的功效。The features and implementations of the present creation will be described in detail below in conjunction with the drawings and examples, and the content is sufficient to enable any person skilled in the relevant arts to easily and fully understand the technical means applied to solve the technical problems of the present creation and implement them accordingly, thereby achieving The effect that this creation can achieve.

本創作可以讓金融機構端依據客戶端之交易服務的不同風險層級透過平台端使用不同的安全驗證技術。其中,交易服務包含未涉及金錢的金融服務、涉及小額金錢的金融交易、涉及大額金錢的金融交易等。This creation allows financial institutions to use different security verification technologies through the platform according to the different risk levels of the client's transaction services. Among them, transaction services include financial services that do not involve money, financial transactions involving small amounts of money, financial transactions involving large amounts of money, and the like.

以下先以「第1圖」本創作所提之使用多安全層級驗證客戶身分與交易服務之系統架構圖來說明本創作的系統功能。如「第1圖」所示,本創作之系統含有客戶端110、金融機構端130、平台端150、公信單位端160、鑑證端170,及可附加的服務端120。其中,客戶端110、服務端120、金融機構端130、平台端150、公信單位端160、鑑證端170可以是計算設備,且客戶端110與金融機構端130/平台端150之間、服務端120與金融機構端130/平台端150之間、金融機構端130與平台端150/公信單位端160之間、平台端150與公信單位端160之間可以透過有線或無線通訊方式連接,藉以相互傳遞資料或訊號。The following first describes the system functions of this creation by using the system architecture diagram of using multiple security levels to verify customer identity and transaction services proposed in this creation. As shown in "Figure 1", the system of this creation includes a client 110, a financial institution 130, a platform 150, a public trust unit 160, an authentication terminal 170, and an addable server 120. The client 110, the server 120, the financial institution 130, the platform 150, the public trust unit 160, and the authentication terminal 170 may be computing devices, and between the client 110 and the financial institution 130/platform 150, the server 120 and the financial institution side 130/platform side 150, between the financial institution side 130 and the platform side 150/public trust unit side 160, and between the platform side 150 and the public trust unit side 160 can be connected through wired or wireless communication, so as to communicate with each other. transmit data or signals.

客戶端110安裝有可信模組,可信模組為SIM卡、感應晶片、擴充卡等可儲存資料的實體元件,其中,感應晶片可以貼附於SIM卡,擴充卡可以嵌套SIM卡。客戶端110可以向平台端150或金融機構端130申請可信模組,並可以在可信模組被啟用後安裝可信模組,在部分的實施例中,可信模組可以與客戶端110的裝置識別資料綁定。要說明的是,可信模組僅提供寫入資料或讀取資料,以避免資料被竄改。The client 110 is installed with a trusted module. The trusted module is a physical element that can store data, such as a SIM card, a sensor chip, and an expansion card. The sensor chip can be attached to the SIM card, and the expansion card can be embedded with the SIM card. The client 110 can apply for a trusted module from the platform 150 or the financial institution 130, and can install the trusted module after the trusted module is enabled. In some embodiments, the trusted module can be used with the client. The device identification data of 110 is bound. It should be noted that the trusted module only provides writing data or reading data to prevent data from being tampered with.

客戶端110可以使用實名制驗證在平台端150註冊,也可以在完成註冊後接收平台端150所傳送的登入驗證資料及交易驗證資料,並可以使用可信模組儲存所接收到的登入驗證資料及交易驗證資料。其中,實名制驗證包含但不限於行動身分識別(Mobile ID, MID)或數位身分識別(eID)。The client 110 can use real-name authentication to register on the platform 150, and can also receive the login verification data and transaction verification data sent by the platform 150 after completing the registration, and can use the trusted module to store the received login verification data and Transaction verification information. Among them, real-name verification includes but is not limited to mobile identification (Mobile ID, MID) or digital identification (eID).

客戶端110也可以接收平台端150所傳送的客戶認證資料,並儲存所接收到的客戶認證資料。一般而言,客戶端110可以使用可信模組儲存客戶認證資料。The client 110 can also receive the client authentication data sent by the platform 150, and store the received client authentication data. In general, the client 110 may use a trusted module to store client authentication data.

客戶端110也可以透過分布式數位身分(Decentralized Identity, DID)註冊(Registry)服務在區塊鏈190上註冊以取得對應區塊鏈190的分布式數位身分識別資料。The client 110 can also register on the blockchain 190 through a Decentralized Identity (DID) registration (Registry) service to obtain the distributed DID data corresponding to the blockchain 190 .

客戶端110也負責以生物特徵登入金融機構端130,並負責向金融機構端13請求交易服務。例如,客戶端110可以使用線上快速認證(Fast IDentity Online, FIDO)架構以生物特徵登入金融機構端130,更詳細的,客戶端110在登入金融機構端130時,可以驗證使用者的生物特徵,並可以在使用者的生物特徵通過特徵辨識後,由可信模組中讀取出登入驗證資料與機構登入資料,並可以登入驗證資料與機構登入資料傳送至平台端150,藉以透過平台端150將機構登入資料傳送給金融機構端130。其中,本創作所提之生物特徵包含指紋特徵、人臉特徵、虹膜特徵等,但本創作並不以此為限;機構登入資料為客戶端110之使用者預先在金融機構端130註冊之資料,包含但不限於帳號密碼等。The client 110 is also responsible for logging in to the financial institution terminal 130 with biometric features, and is responsible for requesting transaction services from the financial institution terminal 13 . For example, the client 110 can use the Fast IDentity Online (FIDO) framework to log in to the financial institution terminal 130 with biometrics. More specifically, the client 110 can verify the user's biometrics when logging into the financial institution terminal 130. And after the user's biometrics are identified by the feature, the login verification data and the organization login data can be read out from the trusted module, and the login verification data and the organization login data can be transmitted to the platform side 150 , so as to pass the platform side 150 . The institution login information is transmitted to the financial institution terminal 130 . Among them, the biometric features mentioned in this creation include fingerprint features, facial features, iris features, etc., but this creation is not limited to this; the institution login information is the information pre-registered by the user of the client 110 on the financial institution terminal 130 , including but not limited to account passwords, etc.

客戶端110也可以在對使用者進行生物特徵辨識後,由可信模組中讀出登入驗證資料,並可以加密所讀出之登入驗證資料以產生相對應的登入加密資料,及可以將所產生之登入加密資料傳送至平台端150;客戶端110也負責在接收到平台端150所傳送的身分驗證要求時,由可信模組中讀出交易驗證資料,並加密所讀出之交易驗證資料以產生交易加密資料,及將所產生之交易加密資料傳送到平台端150,在部分的實施例中,客戶端110也可以在傳送交易加密資料時要求平台端150簽發可驗證聲明(Verifiable Credential, VC);客戶端110也可以在接收到平台端150所傳送的模組驗證請求時,由可信模組中讀出可信安全資料,並加密所讀出之可信安全資料以產生模組加密資料,及將所產生之模組加密資料傳送至平台端150。其中,可信安全資料為可信模組所儲存之全部資料或部分資料或特定資料。The client 110 can also read out the login verification data from the trusted module after performing biometric identification on the user, and can encrypt the read out login verification data to generate the corresponding login encryption data, and can store all the login verification data. The generated login encrypted data is sent to the platform 150; the client 110 is also responsible for reading the transaction verification data from the trusted module when receiving the identity verification request sent by the platform 150, and encrypting the read transaction verification data to generate transaction encrypted data, and transmit the generated transaction encrypted data to the platform 150. In some embodiments, the client 110 may also request the platform 150 to issue a Verifiable Credential when transmitting the transaction encrypted data. , VC); the client 110 can also read the trusted security data from the trusted module when receiving the module verification request sent by the platform 150, and encrypt the read trusted security data to generate a module. group encrypted data, and transmit the generated module encrypted data to the platform end 150 . Among them, the trusted security data refers to all or part of the data or specific data stored by the trusted module.

客戶端110可以使用私鑰加密待加密資料(如登入驗證資料、交易驗證資料、可信安全資料等)以產生對應之加密結果資料(如登入加密資料、交易加密資料、模組加密資料等),也可以使用接收自平台端150之基於時間的一次性密碼(Time-based One-Time Password, TOTP)加密待加密資料以產生加密結果資料,或可以先使用私鑰加密待加密資料以產生中間密文後,再使用基於時間的一次性密碼加密中間密文以產生加密結果資料,但客戶端110由登入驗證資料/交易驗證資料/可信安全資料產生登入加密資料/交易加密資料/模組加密資料之方式並不以上述為限。其中,客戶端110可以使用AES、RSA或其他相似之對稱或非對稱演算法加密待加密資料。The client 110 can use the private key to encrypt the data to be encrypted (such as login verification data, transaction verification data, trusted security data, etc.) to generate corresponding encrypted result data (such as login encrypted data, transaction encrypted data, module encrypted data, etc.) , the data to be encrypted can also be encrypted using the time-based one-time password (TOTP) received from the platform 150 to generate the encrypted result data, or the data to be encrypted can be encrypted by using the private key first to generate the intermediate data. After the ciphertext, the time-based one-time password is used to encrypt the intermediate ciphertext to generate the encrypted result data, but the client 110 generates the login encrypted data/transaction encrypted data/module from the login verification data/transaction verification data/trusted security data The method of encrypting data is not limited to the above. The client 110 can use AES, RSA or other similar symmetric or asymmetric algorithms to encrypt the data to be encrypted.

服務端120可以提供輸入客戶端110之裝置識別資料以使平台端150或金融機構端130啟用客戶端110所申請之可信模組。一般而言,服務端120可以透過有線或無線網路將裝置識別資料傳送給客戶端110申請可信模組之平台端150或金融機構端130。其中,客戶端110之裝置識別資料為能夠識別客戶端110的資料,包含但不限於可以是客戶端110的產品序號或機身號碼等。The server 120 can provide the device identification data input to the client 110 to enable the platform 150 or the financial institution 130 to activate the trusted module applied by the client 110 . Generally speaking, the server 120 can transmit the device identification data to the platform 150 or the financial institution 130 of the client 110 to apply for the trusted module through a wired or wireless network. Wherein, the device identification data of the client 110 is data capable of identifying the client 110 , including but not limited to the product serial number or the fuselage number of the client 110 .

金融機構端130可以在客戶端110以實名制驗證完成註冊時產生與客戶端110對應的登入驗證資料與交易驗證資料,並將所產生之登入驗證資料與交易驗證資料傳送至客戶端110。一般而言,金融機構端130可以隨機產生登入驗證資料/交易驗證資料,但本創作並不以此為限,例如也可以對當前時間進行雜湊(hash)或位元重新排列等演算以產生登入驗證資料/交易驗證資料。其中,登入驗證資料/交易驗證資料可以是由一定數量之文字、字母、數字、符號以任意排列而成。The financial institution terminal 130 can generate login verification data and transaction verification data corresponding to the client terminal 110 when the client terminal 110 completes the registration through real-name verification, and transmit the generated login verification data and transaction verification data to the client terminal 110 . Generally speaking, the financial institution terminal 130 can randomly generate the login verification data/transaction verification data, but the present invention is not limited to this. For example, the current time can also be hashed or bit rearranged to generate the login Verification Information/Transaction Verification Information. The login verification data/transaction verification data may be formed by a certain number of characters, letters, numbers, and symbols in any arrangement.

金融機構端130也可以認證客戶端110之使用者的個人資料。The financial institution terminal 130 can also authenticate the personal data of the user of the client terminal 110 .

金融機構端130負責提供客戶端110以生物特徵進行登入,例如使用FIDO架構等。金融機構端130可以在要求客戶端110登入時產生登入驗證請求,並可以將所產生之登入驗證請求傳送至平台端150,也可以接收平台端150所傳送的機構登入資料,並檢核所接收到的機構登入資料,當機構登入資料通過檢核時,允許客戶端110登入金融機構端130。其中,金融機構端130可以使用習知方式檢核客戶端110所註冊的機構登入資料,故不贅述。The financial institution terminal 130 is responsible for providing the client 110 to log in with biometric features, for example, using the FIDO framework. The financial institution terminal 130 can generate a login verification request when the client 110 is required to log in, and can transmit the generated login verification request to the platform terminal 150, and can also receive the institution login information transmitted by the platform terminal 150, and check the received The received institution login information, when the institution login information is checked, allows the client 110 to log in to the financial institution terminal 130 . The financial institution terminal 130 can use a conventional method to check the institution login information registered by the client terminal 110, so it is not repeated here.

金融機構端130也負責在接收到客戶端110發出之交易服務時判斷所接收到之交易服務所屬的風險層級。在本創作中,風險層級可以包含基本交易層級與實際交易層級,在部分實施例中,風險層級還可以包含監管交易層級,但本創作所提之風險層級並不以上述為限。其中,基本交易層級可以包含所有的交易服務,也就是可以包含未涉及金錢交易之查詢或設定等交易服務,及所有涉及金錢之交易服務;實際交易層級可以包含所有涉及金錢的交易服務;監管交易層級可以是涉及大額金錢(金額大於門檻值)的交易服務,但基本交易層級、實際交易層級、監管交易層級亦不以上述為限。要說明的是,一個交易服務可以同時屬於多個風險層級,金融機構端130可以在判斷交易服務屬於範圍較大的風險層級時,進一步判斷交易服務是否也屬於範圍較小的風險層級,例如,金融機構端130可以在交易服務屬於基本交易層級時判斷交易服務是否也屬於實際交易層級,並可以在交易服務屬於實際交易層級時判斷交易服務是否也屬於監管交易層級。The financial institution end 130 is also responsible for judging the risk level to which the received transaction service belongs when receiving the transaction service sent by the client 110 . In this creation, the risk level may include a basic transaction level and an actual transaction level. In some embodiments, the risk level may also include a supervisory transaction level, but the risk level mentioned in this creation is not limited to the above. Among them, the basic transaction level can include all transaction services, that is, it can include transaction services such as query or setting that do not involve money transactions, and all transaction services involving money; the actual transaction level can include all transaction services involving money; supervision transactions The level can be transaction services involving large amounts of money (the amount is greater than the threshold value), but the basic transaction level, actual transaction level, and regulatory transaction level are not limited to the above. It should be noted that a transaction service may belong to multiple risk levels at the same time, and the financial institution terminal 130 may further determine whether the transaction service also belongs to a relatively small risk level when judging that the transaction service belongs to a risk level of a relatively large range, for example, The financial institution terminal 130 can determine whether the transaction service also belongs to the actual transaction level when the transaction service belongs to the basic transaction level, and can determine whether the transaction service also belongs to the supervised transaction level when the transaction service belongs to the actual transaction level.

金融機構端130也負責在判斷所接收到之交易服務為基本交易層級時,產生身分驗證請求,並將所產生之身分驗證請求傳送給平台端150,及負責接收平台端150所產生之身分驗證結果,並在判斷身分驗證結果所記載的內容表示客戶端110之使用者通過驗證時,產生與被請求之交易服務對應的交易資料以完成交易。在部分的實施例中,身分驗證請求可以包含取得以客戶端110之使用者的分散式數位身分識別資料簽發之與金融機構端130相關的可驗證聲明之請求,且身分驗證結果可以是平台端150所發出的可驗證聲明,此時,金融機構端130可能不會接收到平台端150所傳送的身分驗證結果,而可以使用客戶端110之使用者之分散式數位身分識別資料由區塊鏈190取得相對應的可驗證聲明,並可以使用平台端150的公鑰驗證所取得之可驗證聲明中的簽章(並確認有效性與到期時間)以驗證所取得的可驗證聲明,當可驗證聲明通過驗證且可驗證聲明中確認客戶端110之使用者的身分後,金融機構端130可以判斷身分驗證結果表示通過驗證。The financial institution side 130 is also responsible for generating an identity verification request when judging that the received transaction service is at the basic transaction level, and transmitting the generated identity verification request to the platform side 150 , and is responsible for receiving the identity verification generated by the platform side 150 As a result, when it is determined that the content recorded in the identity verification result indicates that the user of the client terminal 110 has passed the verification, transaction data corresponding to the requested transaction service is generated to complete the transaction. In some embodiments, the authentication request may include a request to obtain a verifiable statement issued with the user's distributed digital identity of the client 110 associated with the financial institution 130, and the authentication result may be the platform The verifiable statement issued by 150, at this time, the financial institution terminal 130 may not receive the identity verification result sent by the platform terminal 150, but can use the distributed digital identity information of the user of the client terminal 110 to be transmitted by the blockchain 190 obtains the corresponding verifiable claim, and can use the public key of the platform 150 to verify the signature in the obtained verifiable claim (and confirm the validity and expiration time) to verify the obtained verifiable claim. After the verification statement is verified and the identity of the user of the client terminal 110 is confirmed in the verifiable statement, the financial institution terminal 130 can determine that the identity verification result indicates that the verification is passed.

金融機構端130也負責判斷所接收到之交易服務是否為實際交易層級,若是,則可以將所產生的交易資料傳送至公信單位端160;金融機構端130也可以判斷交易服務是否為監管交易層級,若是,則金融機構端130可以產生模組驗證請求,並可以將所產生的模組驗證請求傳送至平台端150;而若交易服務不屬於實際交易層級或監管交易層級,則金融機構端130可以提供交易服務後結束執行。The financial institution terminal 130 is also responsible for judging whether the received transaction service is at the actual transaction level, and if so, it can transmit the generated transaction data to the public trust unit terminal 160; the financial institution terminal 130 can also determine whether the transaction service is at the supervised transaction level. , if yes, the financial institution terminal 130 can generate a module verification request, and can transmit the generated module verification request to the platform terminal 150; and if the transaction service does not belong to the actual transaction level or the regulatory transaction level, the financial institution terminal 130 The execution ends after the transaction service can be provided.

金融機構端130也可以接收平台端150所傳送之申報表單,並可以依據所接收到的申報表單產生第一申報資料,及可以將所產生之第一申報資料傳送給平台端150。The financial institution terminal 130 can also receive the declaration form sent by the platform terminal 150 , and can generate the first declaration data according to the received declaration form, and can transmit the generated first declaration data to the platform terminal 150 .

平台端150負責接收金融機構端130所傳送之身分驗證請求,並依據所接收到之身分驗證請求要求客戶端110進行身分驗證;平台端150也可以接收金融機構端130所傳送的模組驗證請求,並依據所接收到的模組驗證請求要求客戶端110進行可信模組的驗證;平台端150也可以接收金融機構端130所傳送的登入驗證請求,並依據所接收到的登入驗證請求要求客戶端110提供登入驗證資料。The platform side 150 is responsible for receiving the identity verification request sent by the financial institution side 130 , and requires the client 110 to perform identity verification according to the received identity verification request; the platform side 150 can also receive the module verification request sent by the financial institution side 130 , and request the client 110 to verify the trusted module according to the received module verification request; the platform terminal 150 can also receive the login verification request sent by the financial institution terminal 130, and according to the received login verification request The client 110 provides login authentication data.

平台端150也可以接收客戶端110所傳送的登入驗證資料與機構登入資料,並驗證登入驗證資料,也就是比對所接收到的登入驗證資料與所儲存之登入驗證資料是否相同,若是,則表示登入驗證資料通過驗證,若否,則表示登入驗證資料沒有通過驗證。平台端150也可以在登入驗證資料通過驗證時,將所接收到的機構登入資料傳送到金融機構端130。The platform end 150 can also receive the login verification data and the organization login data sent by the client 110, and verify the login verification data, that is, compare whether the received login verification data is the same as the stored login verification data, and if so, then Indicates that the login verification data has passed the verification, if not, it means that the login verification data has not been verified. The platform terminal 150 may also transmit the received institutional login information to the financial institution terminal 130 when the login verification information passes the verification.

平台端150也負責接收客戶端110所傳送的交易加密資料,並解密所接收到的交易加密資料以取得身分檢核資料;平台端150也可以接收客戶端110所傳送的模組加密資料,並解密所接收到的模組加密資料以取得模組檢核資料;平台端150也可以接收客戶端110所傳送的登入加密資料,並解密登入加密資料以取得登入檢核資料。其中,平台端150解密加密結果資料(如登入加密資料、交易加密資料、模組加密資料等)的方式隨著加密結果資料被加密的方式不同而有不同,例如,當加密結果資料是被客戶端110以私鑰加密產生時,平台端150可以使用客戶端110的公鑰解密加密結果資料以產生解密資料(如登入檢核資料、身分檢核資料、模組檢核資料等);當加密結果資料是被客戶端110以平台端150所產生之基於時間的一次性密碼加密產生時,平台端150可以使用所產生之一次性密碼解密解密加密結果資料以產生原始資料;而當加密結果資料是被客戶端110先後以私鑰與一次性密碼加密產生時,平台端150可以先使用一次性密碼解密加密結果資料以產生中間密文,在使用客戶端110之公鑰解密中間密文以產生原始資料,但客戶端110解密登入加密資料/交易加密資料/模組加密資料以取得登入檢核資料/身分檢核資料/模組檢核資料之方式並不以上述為限。The platform end 150 is also responsible for receiving the encrypted transaction data sent by the client 110, and decrypting the received encrypted transaction data to obtain the identity verification data; the platform end 150 can also receive the encrypted data of the module sent by the client 110, and Decrypt the received module encrypted data to obtain the module verification data; the platform 150 can also receive the login encrypted data sent by the client 110 and decrypt the login encrypted data to obtain the login verification data. Among them, the way the platform 150 decrypts the encrypted result data (such as login encrypted data, transaction encrypted data, module encrypted data, etc.) varies with the way the encrypted result data is encrypted. For example, when the encrypted result data is encrypted by the client When the terminal 110 is encrypted with the private key, the platform terminal 150 can use the public key of the client 110 to decrypt the encrypted result data to generate decrypted data (such as login verification data, identity verification data, module verification data, etc.); When the result data is encrypted and generated by the client 110 with the time-based one-time password generated by the platform 150, the platform 150 can use the generated one-time password to decrypt and decrypt the encrypted result data to generate the original data; When generated by the client 110 encrypted with the private key and the one-time password successively, the platform 150 can first use the one-time password to decrypt the encrypted result data to generate the intermediate ciphertext, and then use the public key of the client 110 to decrypt the intermediate ciphertext to generate The original data, but the manner in which the client 110 decrypts the login encrypted data/transaction encrypted data/module encrypted data to obtain the login verification data/identity verification data/module verification data is not limited to the above.

平台端150也負責確認解密交易加密資料所取得之身分檢核資料是否與預先儲存之客戶端110的交易驗證資料相符,並可以產生與確認結果對應的身分驗證結果。平台端150可以在身分檢核資料與交易驗證資料不相符時,傳送身分驗證結果至客戶端110及/或金融機構端130;平台端150也負責在身分檢核資料與交易驗證資料相符時,將所產生的身分驗證結果傳送至金融機構端130,並負責依據身分驗證請求與交易加密資料產生第一存證資料,及將包含所產生之第一存證資料的區塊發布到區塊鏈190中。一般而言,平台端150可以先對身分驗證請求與交易加密資料進行特定運算以產生第一存證資料,再產生包含第一存證資料的區塊,但本創作並不以此為限,例如,平台端150也可以產生包含身分驗證請求與交易加密資料的第一存證資料。其中,上述之特定運算包含但不限於雜湊(hash)運算。The platform 150 is also responsible for confirming whether the identity verification data obtained by decrypting the encrypted transaction data is consistent with the pre-stored transaction verification data of the client 110, and can generate an identity verification result corresponding to the confirmation result. The platform 150 can transmit the identity verification result to the client 110 and/or the financial institution 130 when the identity verification data does not match the transaction verification data; the platform 150 is also responsible for, when the identity verification data matches the transaction verification data, The generated identity verification result is sent to the financial institution terminal 130, and is responsible for generating the first certificate data according to the identity verification request and the transaction encryption data, and publishing the block containing the generated first certificate data to the blockchain 190. Generally speaking, the platform 150 can first perform a specific operation on the identity verification request and the encrypted transaction data to generate the first certificate data, and then generate a block containing the first certificate data, but this creation is not limited to this. For example, the platform 150 may also generate the first certificate data including the authentication request and transaction encryption data. Wherein, the above-mentioned specific operations include but are not limited to hash operations.

平台端150也可以接收客戶端110所傳送之聲明簽發請求,並可以在確認所取得之身分檢核資料與預存之交易驗證資料相符時,依據所接收到之簽發請求讀出相對應的使用者資料,並依據全部或部分之使用者資料產生披露訊息,及使用平台端150的私鑰對披露訊息簽章以產生可驗證聲明,並可以將所簽發產生的可驗證聲明發布到區塊鏈190。其中,披露訊息可以是客戶端110所讀出之全部或部分的使用者資料,但本創作並不以此為限,披露訊息也可以是經過整理的使用者資料;可驗證聲明與客戶端110之使用者的分散式數位身分識別資料對應且亦與所接收到之聲明簽發請求對應。The platform side 150 can also receive the declaration issuance request sent by the client 110, and can read out the corresponding user according to the received issuance request when confirming that the obtained identity verification data is consistent with the pre-stored transaction verification data information, and generate a disclosure message based on all or part of the user information, and use the private key of the platform 150 to sign the disclosure message to generate a verifiable statement, and the issued verifiable statement can be published to the blockchain 190 . The disclosure information may be all or part of the user data read by the client terminal 110 , but this creation is not limited to this, and the disclosure information may also be the sorted user information; the verifiable statement and the client terminal 110 The user's DDI corresponds to the user's DID and corresponds to the claim issuance request received.

平台端150也可以比對解密模組加密資料所產生的模組檢核資料與預先儲存的可信安全資料是否相符,若否,則平台端150可以產生表示終止交易的通知訊息,並可以將所產生之通知訊息傳送給金融機構端130;而當模組檢核資料與可信安全資料相符時,平台端150可以產生或讀取申報表單,並將申報表單傳送至金融機構端130,平台端150還可以接收金融機構端130所傳送的第一申報資料,並產生包含第一申報資料的第二申報資料,及將第二申報資料傳送給監管端(圖中未示)存留。The platform side 150 can also compare whether the module check data generated by the decryption module encrypted data is consistent with the pre-stored trusted security data, if not, the platform side 150 can generate a notification message indicating that the transaction is terminated, and can The generated notification message is sent to the financial institution terminal 130; and when the module verification data is consistent with the trusted security data, the platform terminal 150 can generate or read the declaration form, and transmit the declaration form to the financial institution terminal 130. The platform The terminal 150 can also receive the first declaration data sent by the financial institution terminal 130, generate a second declaration document including the first declaration document, and transmit the second declaration document to the supervisory terminal (not shown in the figure) for storage.

平台端150也可以依據所接收到之模組驗證請求與模組加密資料及所產生之第二申報資料產生第三存證資料,並可以將所產生之第三存證資料發布至區塊鏈190中,但本創作產生第三存證資料之方式並不以上述為限,例如平台端150可以產生包含模組驗證請求、模組加密資料及第二申報資料之第三存證資料。The platform side 150 can also generate the third certificate data according to the received module verification request and module encryption data and the generated second declaration data, and can publish the generated third certificate data to the blockchain In 190, the method for generating the third certificate data in this creation is not limited to the above, for example, the platform 150 can generate the third certificate data including the module verification request, the module encryption data and the second declaration data.

平台端150也可以比對解密登入加密資料所產生的登入檢核資料與在客戶端110註冊完成時所產生並儲存的登入驗證資料是否相符,若否,則平台端150可以產生對應之通知訊息並將所產生之通知訊息傳送給客戶端110;而當登入檢核資料與登入驗證資料相符時,平台端150可以進行資料收集作業,例如,平台端150可以取得經金融機構端130認證之個人資料,並對所取得之個人資料進行特定運算以產生對應之客戶認證資料,及將所產生之客戶認證資料傳送給客戶端110。其中,上述之特定運算包含但不限於MD5等雜湊運算或base64等編碼(encoding)運算等。The platform 150 can also compare whether the login verification data generated by decrypting the login encrypted data is consistent with the login verification data generated and stored when the registration of the client 110 is completed. If not, the platform 150 can generate a corresponding notification message. The generated notification message is sent to the client 110; and when the login verification data is consistent with the login verification data, the platform 150 can perform data collection operations, for example, the platform 150 can obtain the individual authenticated by the financial institution 130. data, and perform specific operations on the obtained personal data to generate corresponding client authentication data, and transmit the generated client authentication data to the client 110 . The above specific operations include but are not limited to hash operations such as MD5 or encoding operations such as base64.

平台端150也負責接收公信單位端160所傳送的公信簽章,並負責將所接收到的公信簽章傳送給鑑證端170。The platform terminal 150 is also responsible for receiving the public letter signature sent by the public letter unit terminal 160 , and is responsible for transmitting the received public letter seal to the authentication terminal 170 .

公信單位端160負責接收金融機構端130所傳送的交易資料,並對所接收到的交易資料簽章以產生公信簽章,及負責將所產生的公信簽章傳送至平台端150。The public trust unit terminal 160 is responsible for receiving the transaction data transmitted by the financial institution terminal 130 , and signing the received transaction data to generate a public trust seal, and is responsible for transmitting the generated public trust seal to the platform terminal 150 .

鑑證端170負責接收平台端150所傳送的公信簽章,並可以儲存所接收到的公信簽章。鑑證端170也負責依據公信簽章產生第二存證資料或可以產生包含公信簽章之第二存證資料,並可以將所產生之第二存證資料發布至區塊鏈190中。The authentication terminal 170 is responsible for receiving the public letter seal sent by the platform terminal 150, and can store the received public letter seal. The authentication terminal 170 is also responsible for generating the second deposit data according to the public letter signature or can generate the second deposit information including the public letter seal, and can publish the generated second deposit information to the blockchain 190 .

接著以一個實施例來解說本創作的運作過程,並請參照「第2A圖」本創作所提之使用多安全層級驗證客戶身分與交易服務之流程圖。在本實施例中,假設客戶端110可以是手機或電腦,但本創作並不以此為限。Next, an embodiment is used to explain the operation process of this creation, and please refer to "Fig. 2A" the flow chart of using multiple security levels to verify client identity and transaction services mentioned in this creation. In this embodiment, it is assumed that the client 110 may be a mobile phone or a computer, but the present invention is not limited to this.

當使用者操作客戶端110連線到金融機構端130後,可以操作客戶端110以生物特徵登入金融機構端130(步驟210)。在本實施例中,假設客戶端110可以使用FIDO架構登入金融機構端130,進一步的,本實施例可以如「第2B圖」之流程所示,在客戶端110連線到金融機構端130時,金融機構端130可以要求客戶端110登入,並可以傳送登入驗證請求到平台端150,使平台端150向客戶端110要求提供登入驗證資料(步驟211)。客戶端110在接收到平台端150所傳送之提供登入驗證資料的要求後,可以要求使用者使用如指紋、臉部、虹膜等生物特徵進行生物特徵辨識,並可以在取得使用者之生物特徵並判斷所取得之生物特徵通過生物特徵辨識後,由可信模組中讀取預先儲存之登入驗證資料與金融機構端130的機構登入資料,及可以將所讀出之登入驗證資料與機構登入資料傳送到平台端150(步驟215)。在平台端150接收到客戶端110所傳送的登入驗證資料與機構登入資料後,可以驗證所接收到的登入驗證資料。若登入驗證資料通過平台端150的驗證,則平台端150可以在判斷登入驗證資料通過驗證後,傳送所接收到的機構登入資料給金融機構端130,使得金融機構端130允許客戶端110登入(步驟219)。After the user operates the client terminal 110 to connect to the financial institution terminal 130, the user can operate the client terminal 110 to log in to the financial institution terminal 130 by using the biometric feature (step 210). In this embodiment, it is assumed that the client 110 can log in to the financial institution terminal 130 using the FIDO architecture. Further, in this embodiment, as shown in the flowchart of "Fig. 2B", when the client 110 is connected to the financial institution terminal 130 , the financial institution 130 can request the client 110 to log in, and can transmit a login verification request to the platform 150 , so that the platform 150 requests the client 110 to provide login verification data (step 211 ). After receiving the request for providing login verification data sent by the platform 150, the client 110 may require the user to perform biometric identification using biometric features such as fingerprints, face, iris, etc. After judging that the acquired biometrics have passed the biometric identification, the pre-stored login verification data and the institution login information of the financial institution terminal 130 are read from the trusted module, and the read login verification information can be compared with the institution login information. transmitted to the platform side 150 (step 215). After the platform end 150 receives the login verification data and the organization login data transmitted by the client terminal 110, the received login verification data can be verified. If the login verification data passes the verification of the platform terminal 150, the platform terminal 150 can transmit the received institution login information to the financial institution terminal 130 after judging that the login verification data has passed the verification, so that the financial institution terminal 130 allows the client 110 to log in ( step 219).

回到「第2A圖」,在客戶端110使用FIDO架構以生物特徵登入金融機構端130(步驟210)後,客戶端110可以向金融機構端130請求交易服務,也就是向金融機構端130發出交易服務的請求。金融機構端130可以在接收到客戶端110所發出之交易服務的請求時,判斷被請求之交易服務的風險層級。當被請求之交易服務的風險層級屬於基本交易層級時,也就是被請求之交易服務為基本交易層級時,金融機構端130可以產生身分驗證請求,並可以將所產生之身分驗證請求傳送到平台端150,使得平台端150要求客戶端110進行身分驗證(步驟220)。在本實施例中,假設所有的交易服務均為基本交易層級。Returning to "Fig. 2A", after the client 110 uses the FIDO framework to log in to the financial institution 130 with biometric features (step 210), the client 110 can request transaction services from the financial institution 130, that is, send a transaction to the financial institution 130. A request for transaction services. The financial institution end 130 can determine the risk level of the requested transaction service when receiving the transaction service request sent by the client 110 . When the risk level of the requested transaction service belongs to the basic transaction level, that is, when the requested transaction service is the basic transaction level, the financial institution terminal 130 can generate an identity verification request, and can transmit the generated identity verification request to the platform terminal 150, so that the platform terminal 150 requires the client 110 for authentication (step 220). In this embodiment, it is assumed that all transaction services are at the basic transaction level.

在客戶端110接收到平台端150所傳送之身分驗證的要求時,客戶端110可以由可信模組中讀出交易驗證資料,並加密所讀出之交易驗證資料以產生交易加密資料,並可以將所產生之交易加密資料傳送到平台端150(步驟231)。在本實施例中,假設客戶端110與平台端150事先約定先後以客戶端110之私鑰與平台端150產生之基於時間的一次性密碼加密交易驗證資料以產生交易加密資料,例如,客戶端110可以先使用私鑰以RSA演算法對交易驗證資料加密而產生中間密文,再使用每隔預定時間(如60秒)與平台端150同步而取得的一次性密碼對中間密文加密以產生交易加密資料,同時,客戶端110也可以產生聲明簽發請求並與機要加密資料一同傳送給平台端150。When the client terminal 110 receives the identity verification request sent by the platform terminal 150, the client terminal 110 can read the transaction verification data from the trusted module, and encrypt the read transaction verification data to generate transaction encryption data, and The generated transaction encryption data may be transmitted to the platform side 150 (step 231). In this embodiment, it is assumed that the client 110 and the platform 150 agree in advance to encrypt the transaction verification data with the private key of the client 110 and the time-based one-time password generated by the platform 150 to generate the encrypted transaction data. For example, the client 110 can first use the private key to encrypt the transaction verification data with the RSA algorithm to generate an intermediate ciphertext, and then use the one-time password obtained by synchronizing with the platform 150 every predetermined time (such as 60 seconds) to encrypt the intermediate ciphertext to generate the intermediate ciphertext. At the same time, the client 110 can also generate a statement issuance request and send it to the platform 150 together with the confidential encrypted data.

在平台端150接收到客戶端110所傳送的交易加密資料後,可以解密所接收到的交易加密資料以取得身分檢核資料,並可以確認所取得之身分檢核資料與預先發給客戶端110之交易驗證資料是否相符以產生身分驗證結果,及可以傳送所產生之身分驗證結果到金融機構端130(步驟235)。在本實施例中,假設平台端150可以先使用最後產生之基於時間的一次性密碼解密交易加密資料而產生中間密文,再使用客戶端110的公鑰解密中間密文而取得身分檢核資料,接著,平台端150可以讀出客戶端110的交易驗證資料,並可以比對所取得之身分檢核資料與所讀出之交易驗證資料是否相符,當兩者相符時,平台端150可以產生表示通過驗證的身分驗證結果,而當兩者不符時,平台端150可以產生表示未通過驗證的身分驗證結果。另外,平台端150也可以在身分檢核資料與交易驗證資料相符時,依據所接收到之客戶端110所傳送的聲明簽發請求產生與客戶端之使用者之分散式數位身分識別資料對應的可驗證聲明,並可以將所簽發的可驗證聲明發布到區塊鏈190。After the platform end 150 receives the encrypted transaction data sent by the client terminal 110 , it can decrypt the received encrypted transaction data to obtain the identity verification data, and can confirm the obtained identity verification data and send it to the client terminal 110 in advance. Whether the transaction verification data are matched to generate an identity verification result, and the generated identity verification result can be transmitted to the financial institution terminal 130 (step 235 ). In this embodiment, it is assumed that the platform 150 can first use the last generated time-based one-time password to decrypt the encrypted transaction data to generate an intermediate ciphertext, and then use the public key of the client 110 to decrypt the intermediate ciphertext to obtain the identity verification data Then, the platform 150 can read the transaction verification data of the client 110, and can compare the obtained identity verification data with the read transaction verification data. When the two match, the platform 150 can generate The identity verification result indicates that the verification is passed, and when the two do not match, the platform side 150 may generate an identity verification result indicating that the verification is not passed. In addition, the platform side 150 can also generate a user terminal 110 according to the received statement issuance request sent by the client 110 when the identity verification data is consistent with the transaction verification data. The claims are verified, and the issued verifiable claims can be published to the blockchain 190 .

同樣在平台端150接收到客戶端110所傳送的交易加密資料後,可以依據接收自金融機構端130的身分驗證請求與接收自客戶端110的交易加密資料產生第一存證資料,並可以將所產生的第一存證資料發布到區塊鏈190中(步驟240),藉以透過區塊鏈190進行資料的存證。在本實施例中,假設平台端150可以對身分驗證請求與交易加密資料進行雜湊運算以產生第一存證資料。Similarly, after receiving the encrypted transaction data sent from the client terminal 110, the platform terminal 150 can generate the first certificate data according to the identity verification request received from the financial institution terminal 130 and the encrypted transaction data received from the client terminal 110, and can store The generated first certificate data is published in the blockchain 190 (step 240 ), so that the data can be recorded through the blockchain 190 . In this embodiment, it is assumed that the platform 150 can perform hash operation on the identity verification request and the transaction encryption data to generate the first certificate data.

在金融機構端130接收到平台端150所產生之身分驗證結果後,可以判斷所接收到的身分驗證結果是否表示通過驗證,若否,則金融機構端130可以拒絕客戶端110所請求的交易服務,而若身分驗證結果表示通過驗證,則金融機構端130可以產生與客戶端110所請求之交易服務對應的交易資料(步驟250)。其中,金融機構端130可以直接依據平台端150所傳送的身分驗證結果判斷身分驗證結果是否表示通過驗證,也可以依據客戶端110之使用者的分散式數位身分識別資料由區塊鏈190中取得可驗證聲明(身分驗證結果),並可以使用平台端150的公鑰驗證所取得之可驗證聲明中的簽章,並確認有效性與到期時間,藉以驗證所取得的可驗證聲明,當可驗證聲明通過金融機構端130的驗證且可驗證聲明中確認客戶端110之使用者的身分後,金融機構端130可以判斷身分驗證結果表示通過驗證。After the financial institution terminal 130 receives the identity verification result generated by the platform terminal 150, it can determine whether the received identity verification result indicates that the verification is passed. If not, the financial institution terminal 130 can reject the transaction service requested by the client terminal 110. , and if the identity verification result indicates that the verification is passed, the financial institution terminal 130 may generate transaction data corresponding to the transaction service requested by the client terminal 110 (step 250 ). The financial institution terminal 130 can directly determine whether the identity verification result indicates that the verification is passed according to the identity verification result sent by the platform terminal 150 , or can be obtained from the blockchain 190 according to the distributed digital identity information of the user of the client terminal 110 . Verifiable statement (identity verification result), and can use the public key of the platform 150 to verify the signature in the verifiable statement obtained, and confirm the validity and expiration time, so as to verify the obtained verifiable statement. After the verification statement is verified by the financial institution terminal 130 and the identity of the user of the client terminal 110 is confirmed in the verification statement, the financial institution terminal 130 can determine that the identity verification result indicates that the verification is passed.

接著,金融機構端130可以判斷客戶端110所請求之交易服務是否為實際交易層級,也就是判斷交易服務的風險層級是否屬於實際交易層級,若否,則金融機構端130可以執行被請求的交易服務,例如資料查詢等;而若客戶端110所請求之交易服務為實際交易層級,也就是交易服務的風險層級屬於實際交易層級,則金融機構端130可以將所產生的交易資料傳送到公信單位端160(步驟261)。在本實施例中,假設實際交易層級為涉及金錢交易的交易服務,交易資料包含金錢交易之商品的相關資料。Next, the financial institution terminal 130 can determine whether the transaction service requested by the client 110 is at the actual transaction level, that is, determine whether the risk level of the transaction service belongs to the actual transaction level. If not, the financial institution terminal 130 can execute the requested transaction. services, such as data query, etc.; and if the transaction service requested by the client 110 is at the actual transaction level, that is, the risk level of the transaction service belongs to the actual transaction level, the financial institution terminal 130 can transmit the generated transaction data to the public trust unit. terminal 160 (step 261). In this embodiment, it is assumed that the actual transaction level is a transaction service involving money transaction, and the transaction data includes relevant data of the commodity for money transaction.

在公信單位端160接收到金融機構端130所傳送的交易資料後,公信單位端160可以對交易資料簽章以產生公信簽章,並可以將所產生的公信簽章傳送到平台端150(步驟263)。After the public trust unit terminal 160 receives the transaction data transmitted by the financial institution terminal 130, the public trust unit terminal 160 can sign the transaction data to generate a public trust seal, and can transmit the generated public trust seal to the platform terminal 150 (step 263).

在平台端150接收到公信單位端160所傳送的公信簽章後,可以將所接收到的公信簽章傳送給客戶端110,也可以傳送給鑑證端170。客戶端110在接收到平台端150所傳送的公信簽章後,可以將所接收到的公信簽章儲存在可信模組中;鑑證端170在接收到平台端150所傳送的公信簽章後,可以依據所接收到的公信簽章產生第二存證資料,並可以將所產生的第二存證資料發布到區塊鏈190中(步驟265),藉以透過區塊鏈190進行資料的存證。在本實施例中,假設鑑證端170可以對公信簽章進行雜湊運算以產生第二存證資料。After the platform terminal 150 receives the official trust seal sent by the official trust unit terminal 160 , it can send the received official trust seal to the client 110 , and can also send it to the authentication terminal 170 . After the client 110 receives the official seal sent by the platform 150, it can store the received official seal in the trusted module; after the authentication terminal 170 receives the official seal sent by the platform 150 , the second deposit certificate data can be generated according to the received public letter seal, and the generated second deposit certificate data can be published to the blockchain 190 (step 265 ), so as to store the data through the blockchain 190 certificate. In this embodiment, it is assumed that the authentication terminal 170 can perform a hash operation on the public trust signature to generate the second authentication data.

如此,透過本創作,金融機構端130可以依據客戶端110所請求之交易服務的風險層級選擇需要執行的安全驗證機制,藉以利用不同的安全驗證技術完成不同風險層級的交易服務,如同利用複數鑰匙開啟不同交易大門,就算掉了其中一把鑰匙,攻擊者依然無法利用單一鑰匙進行假交易攻擊,因此,本創作可以提高犯罪成本,並兼顧交易安全性及便利性。In this way, through this creation, the financial institution terminal 130 can select the security verification mechanism to be executed according to the risk level of the transaction service requested by the client 110, so as to use different security verification technologies to complete the transaction service of different risk levels, just like using multiple keys Open different transaction doors, even if one of the keys is lost, the attacker still cannot use a single key to conduct fake transaction attacks. Therefore, this creation can increase the cost of crime, while taking into account transaction security and convenience.

上述的實施例中,交易服務的風險層級還可以包含監管交易層級,如「第2C圖」之流程所示,在金融機構端130將交易資料傳送到公信單位端160(步驟261)後(實務上也可以在平台端150將公信單位端160所產生的公信簽章傳送給客戶端110及/或鑑證端170後),金融機構端130可以進一步判斷客戶端110所請求的交易服務是否為監管交易層級,也就是判斷交易服務之風險層級是否屬於監管交易層級,若否,則金融機構端130可以執行被請求的交易服務,例如小額交易等;而若交易服務為監管交易層級,金融機構端130可以產生模組驗證請求,並可以將所產生之模組驗證請求傳送到平台端150,使得平台端150向客戶端110要求進行可信模組驗證(步驟271)。In the above-mentioned embodiment, the risk level of the transaction service may also include a supervisory transaction level. As shown in the flow of "Figure 2C", after the financial institution terminal 130 transmits the transaction data to the public trust unit terminal 160 (step 261) (practice After the platform side 150 transmits the public letter seal generated by the public trust unit terminal 160 to the client terminal 110 and/or the authentication terminal 170), the financial institution terminal 130 can further determine whether the transaction service requested by the client terminal 110 is a regulatory The transaction level, that is, to determine whether the risk level of the transaction service belongs to the supervised transaction level. If not, the financial institution terminal 130 can execute the requested transaction service, such as small-value transactions; and if the transaction service is the supervised transaction level, the financial institution terminal 130 130 may generate a module verification request, and may transmit the generated module verification request to the platform side 150, so that the platform side 150 requests the client 110 for trusted module verification (step 271).

在客戶端110接收到平台端150所傳送之驗證可信模組的要求時,客戶端110可以由可信模組中讀出可信安全資料,並加密所讀出之可信安全資料以產生模組加密資料,並可以將所產生之模組加密資料傳送到平台端150(步驟273)。在此實施例中,假設客戶端110與平台端150事先約定先後以客戶端110之私鑰與平台端150產生之基於時間的一次性密碼加密可信安全資料以產生模組加密資料,也就是說,與加密交易驗證資料相似的,客戶端110可以先由可信模組中讀取出全部、部分、或特定的資料作為可信安全資料,並可以使用私鑰對可信安全資料加密而產生中間密文,再使用每隔預定時間(如30秒或更短時間)與平台端150同步而取得的一次性密碼對中間密文加密以產生模組加密資料。When the client 110 receives the request for verifying the trusted module sent by the platform 150, the client 110 can read the trusted security data from the trusted module, and encrypt the read trusted security data to generate The module encrypts the data, and can transmit the generated module encrypted data to the platform 150 (step 273 ). In this embodiment, it is assumed that the client 110 and the platform 150 agree in advance to encrypt the trusted security data with the private key of the client 110 and the time-based one-time password generated by the platform 150 to generate the module encrypted data, that is, That is, similar to the encrypted transaction verification data, the client 110 can first read all, part, or specific data from the trusted module as the trusted security data, and can encrypt the trusted security data with the private key to obtain the trusted security data. The intermediate ciphertext is generated, and the intermediate ciphertext is encrypted by using the one-time password obtained by synchronizing with the platform terminal 150 every predetermined time (eg, 30 seconds or less) to generate module encrypted data.

在平台端150接收到客戶端110所傳送的模組加密資料後,可以解密所接收到的模組加密資料以取得模組檢核資料,並可以比對所取得之模組檢核資料與預先儲存之可信安全資料是否相符(步驟275)。在此實施例中,假設平台端150可以先使用最後產生之基於時間的一次性密碼解密模組加密資料而產生中間密文,再使用客戶端110的公鑰解密中間密文而取得模組檢核資料,接著,平台端150可以讀出客戶端110的可信安全資料,並可以比對所取得之身分檢核資料與所讀出之交易驗證資料是否相符。After the platform end 150 receives the module encryption data sent by the client 110, it can decrypt the received module encryption data to obtain the module check data, and can compare the obtained module check data with the pre-installed module check data. Whether the stored trusted security data match (step 275). In this embodiment, it is assumed that the platform terminal 150 can first use the last generated time-based one-time password to decrypt the module encrypted data to generate an intermediate ciphertext, and then use the public key of the client 110 to decrypt the intermediate ciphertext to obtain the module verification code. After verifying the data, the platform 150 can read the trusted security data of the client 110, and can compare the obtained identity verification data with the read transaction verification data.

當模組檢核資料與可信安全資料不相符時,金融機構端130可以拒絕執行客戶端110所請求的交易服務;而當模組檢核資料與可信安全資料相符時,金融機構端130可以產生第一申報資料並可以將所產生的第一申報資料傳送給平台端150(步驟277),並可以執行客戶端110所請求的交易服務。在此實施例中,假設平台端150可以產生表示模組檢核資料與可信安全資料是否相符的比對結果,並可以將所產生之比對結果傳送到金融機構端130,其中,當模組檢核資料與可信安全資料相符時,平台端150可以產生申報表單,並可以將申報表單與比對結果一同傳送給金融機構端130;金融機構端130可以在平台端150所產生的比對結果表示模組檢核資料與可信安全資料不相符時選擇拒絕服務客戶端110,也可以在比對結果表示模組檢核資料與可信安全資料相符時選擇依據平台端150所傳送之申報表單產生第一申報資料,並完成客戶端110所請求的大額交易。When the module check data does not match the trusted security data, the financial institution end 130 can refuse to execute the transaction service requested by the client 110; and when the module check data is consistent with the trusted security data, the financial institution end 130 The first declaration data can be generated and the generated first declaration data can be transmitted to the platform terminal 150 (step 277 ), and the transaction service requested by the client terminal 110 can be executed. In this embodiment, it is assumed that the platform end 150 can generate a comparison result indicating whether the module checking data is consistent with the trusted security data, and can transmit the generated comparison result to the financial institution end 130, wherein when the module checks When the group verification data is consistent with the trusted security data, the platform end 150 can generate a declaration form, and can transmit the declaration form and the comparison result to the financial institution end 130; the financial institution end 130 can compare the data generated by the platform end 150 When the result indicates that the module check data does not match the trusted security data, the client 110 can be refused to serve the client. Alternatively, when the comparison result indicates that the module check data is consistent with the trusted security data, the client 110 can be selected according to the data sent by the platform 150. The declaration form generates the first declaration data, and completes the large-value transaction requested by the client 110 .

在平台端150接收到金融機構端130所所送的第一申報資料後,平台端150可以產生包含第一申報資料的第二申報資料,並可以將所產生的第二申報資料傳送給監管端,及可以依據接收自金融機構端130之模組驗證請求、接收自客戶端110之模組加密資料、及所產生的第二申報資料產生第三存證資料,並將所產生的第三存證資料發布到區塊鏈190中(步驟279),藉以透過區塊鏈190進行資料的存證。在此實施例中,假設平台端150可以對模組驗證請求、模組加密資料、第二申報資料進行雜湊運算以產生第三存證資料。After the platform end 150 receives the first declaration data sent by the financial institution end 130, the platform end 150 can generate the second declaration data including the first declaration data, and can transmit the generated second declaration data to the supervisory end , and can generate the third deposit certificate data according to the module verification request received from the financial institution terminal 130, the module encryption data received from the client terminal 110, and the generated second declaration data, and the generated third deposit certificate data can be generated. The certificate data is published to the blockchain 190 (step 279 ), so that the data can be stored through the blockchain 190 . In this embodiment, it is assumed that the platform 150 can perform hash operation on the module verification request, the module encryption data, and the second declaration data to generate the third certificate data.

另外,上述實施例中,還可以如「第3A圖」之流程所示,在客戶端110使用FIDO架構以生物特徵登入金融機構端130(步驟210)前,客戶端110可以向平台端150或金融機構端130申請可信模組(步驟311)。平台端150或金融機構端130可以通知合作之電信商製作可信模組,並可以透過專人運送或郵寄等方式將可信模組遞交給客戶端110的使用者。In addition, in the above-mentioned embodiment, as shown in the flowchart of “FIG. 3A”, before the client 110 uses the FIDO framework to log in to the financial institution 130 with biometric features (step 210 ), the client 110 can request the platform 150 or The financial institution terminal 130 applies for a trusted module (step 311 ). The platform side 150 or the financial institution side 130 can notify the cooperative telecommunication company to make the trusted module, and can deliver the trusted module to the user of the client 110 by means of personal delivery or mail.

接著,客戶端110申請可信模組的平台端150或金融機構端130的服務人員可以操作服務端120輸入客戶端110的裝置識別資料,並可以將裝置識別資料透過網路傳送給平台端150或金融機構端130,藉以線上啟用可信模組(步驟313),也就是由平台端150或金融機構端130記錄可信模組與客戶端110的識別資料的對應關係,使得平台端150或金融機構端130可以確認存取可信模組的計算設備為申請可信模組的客戶端110。如此,在可信模組被啟用後,客戶端110的使用者可以將可信模組安裝於客戶端110中(步驟315),之後,客戶端110的使用者可以操作客戶端110進行生物特徵辨識,客戶端110可以在使用者的生物特徵通過生物特徵辨識後存取可信模組,藉以確認可信模組是否成功啟用。Next, the client 110 applies for the trusted module on the platform 150 or the service personnel of the financial institution 130 can operate the server 120 to input the device identification data of the client 110, and can transmit the device identification data to the platform 150 through the network Or the financial institution terminal 130, to enable the trusted module online (step 313), that is, the platform terminal 150 or the financial institution terminal 130 records the corresponding relationship between the trusted module and the identification data of the client 110, so that the platform terminal 150 or The financial institution terminal 130 can confirm that the computing device accessing the trusted module is the client 110 applying for the trusted module. In this way, after the trusted module is enabled, the user of the client 110 can install the trusted module in the client 110 (step 315 ), and then the user of the client 110 can operate the client 110 to perform biometric features. Identification, the client 110 can access the trusted module after the user's biometrics are identified by the biometrics, so as to confirm whether the trusted module is successfully activated.

此外,同樣在客戶端110使用FIDO架構以生物特徵登入金融機構端130(步驟210)前,也可以如「第3B圖」之流程所示,在使用者可以操作客戶端110連線到平台端150後,操作客戶端110在平台端150註冊,使得客戶端110以實名制驗證完成在平台端150的註冊(步驟351)。In addition, before the client 110 uses the FIDO framework to log in to the financial institution 130 with biometric features (step 210 ), the user can operate the client 110 to connect to the platform as shown in the flow of “FIG. 3B”. After 150, operate the client 110 to register on the platform 150, so that the client 110 completes the registration on the platform 150 through real-name authentication (step 351).

平台端150可以在客戶端110完成註冊後,產生與客戶端110對應之登入驗證資料與交易驗證資料,並可以儲存所產生的登入驗證資料、交易驗證資料、與客戶端110的公鑰,及可以將所產生之登入驗證資料與交易驗證資料傳送到客戶端110(步驟353),使得客戶端110將平台端150所傳送的登入驗證資料、交易驗證資料、及私鑰儲存在可信模組中。The platform 150 can generate login verification data and transaction verification data corresponding to the client terminal 110 after the client terminal 110 completes the registration, and can store the generated login verification data, transaction verification data, and the public key of the client terminal 110, and The generated login verification data and transaction verification data can be transmitted to the client terminal 110 (step 353 ), so that the client terminal 110 stores the login verification data, transaction verification data, and private key transmitted by the platform 150 in the trusted module middle.

之後,當客戶端110接收到身分驗證的要求時,客戶端110可以要求使用者進行生物特徵辨識,在使用者的生物特徵通過生物特徵辨識後,客戶端110可以由可信模組中讀出登入驗證資料,並加密所讀出之登入驗證資料以產生登入加密資料,及可以將所產生之登入加密資料傳送到平台端150(步驟361)。其中,客戶端110加密登入驗證資料的過程與上述之加密過程相同,不再贅述。Afterwards, when the client 110 receives the request for identity verification, the client 110 may request the user to perform biometric identification. After the user's biometrics pass the biometric identification, the client 110 can read the information from the trusted module. The login authentication data is encrypted, and the read login authentication data is encrypted to generate login encryption data, and the generated login encryption data can be transmitted to the platform terminal 150 (step 361 ). The process of encrypting the login authentication data by the client 110 is the same as the above-mentioned encryption process, and will not be repeated here.

在平台端150接收到客戶端110所傳送之登入加密資料後,平台端150可以解密登入加密資料以取得登入檢核資料,並可以比對登入檢核資料與所儲存之與客戶端110對應的登入驗證資料(步驟365)。其中,平台端150解密登入加密資料以取得登入檢核資料的過程與上述之解密過程相同,不再贅述。After the platform 150 receives the encrypted login data sent by the client 110 , the platform 150 can decrypt the encrypted login data to obtain the login verification data, and can compare the login verification data with the stored data corresponding to the client 110 . Login authentication data (step 365). The process of decrypting the log-in encrypted data by the platform 150 to obtain the log-in verification data is the same as the above-mentioned decryption process, and will not be repeated here.

當平台端150判斷解密取得之登入檢核資料與所讀出之登入驗證資料相符時,平台端150可以取得經金融機構端130認證之個人資料,並由平台端150或公信單位端160對平台端150所取得之個人資料進行特定運算以產生相對應之客戶認證資料並將所產生之客戶認證資料傳送到客戶端110,使得客戶端110可以將所接收到的客戶認證資料儲存在可信模組中,或金融機構端130可以透過oAuth 2.0的機制由客戶端110取得客戶認證資料(授權許可)並傳送客戶認證資料至平台端150,藉以從平台端150下載與客戶認證資料對應的個人資料(步驟370)。When the platform side 150 determines that the login verification data obtained by decryption is consistent with the read login verification data, the platform side 150 can obtain the personal data authenticated by the financial institution side 130, and the platform side 150 or the public trust unit side 160 can verify the platform The personal data obtained by the terminal 150 performs specific operations to generate the corresponding client authentication data and transmits the generated client authentication data to the client 110, so that the client 110 can store the received client authentication data in the trusted mode. The group, or the financial institution 130 can obtain the client authentication data (authorization permission) from the client 110 through the oAuth 2.0 mechanism and transmit the client authentication data to the platform 150, so as to download the personal data corresponding to the client authentication data from the platform 150 (step 370).

綜上所述,可知本創作與先前技術之間的差異在於具有透過客戶端使用線上快速認證架構以生物特徵登入金融機構端後,金融機構端於客戶端請求交易服務時,依據被請求之交易服務的風險層級選擇相對應的安全驗證方式對客戶身分進行驗證,並將能夠對驗證過程所產生的驗證資料與被請求之交易服務的交易資料進行驗證的存證資料發布到區塊鏈中之技術手段,藉由此一技術手段可以來解決先前技術所存在國內金融機構間沒有能夠互信之驗證流程與標準的問題,進而達成提高犯罪複雜度與成本、降低金融機構浪費之資源、並兼顧交易安全性及便利性的技術功效。To sum up, it can be seen that the difference between the present creation and the prior art is that after the client logs in to the financial institution end using the online quick authentication framework with biometric features, when the financial institution requests the transaction service from the client end, the requested transaction The risk level of the service selects the corresponding security verification method to verify the customer's identity, and publishes the certificate data that can verify the verification data generated during the verification process and the transaction data of the requested transaction service to the blockchain. Technical means, through this technical means, can solve the problem of the previous technology that there is no mutual trust verification process and standards between domestic financial institutions, and then achieve the goal of improving the complexity and cost of crime, reducing the waste of resources of financial institutions, and taking into account the transaction. The technical efficacy of safety and convenience.

再者,本創作之使用多安全層級驗證客戶身分與交易服務之系統,可實現於硬體或硬體與軟體之組合中,亦可在電腦系統中以集中方式實現或以不同元件散佈於若干互連之計算設備的分散方式實現。Furthermore, the system for verifying customer identity and transaction services using multiple security levels in this creation can be implemented in hardware or a combination of hardware and software, or can be implemented in a centralized manner in a computer system or distributed in several different components. Decentralized implementation of interconnected computing devices.

雖然本創作所揭露之實施方式如上,惟所述之內容並非用以直接限定本創作之專利保護範圍。任何本創作所屬技術領域中具有通常知識者,在不脫離本創作所揭露之精神和範圍的前提下,對本創作之實施的形式上及細節上作些許之更動潤飾,均屬於本創作之專利保護範圍。本創作之專利保護範圍,仍須以所附之申請專利範圍所界定者為準。Although the embodiments disclosed in this creation are as above, the contents described are not used to directly limit the scope of patent protection of this creation. Any person with ordinary knowledge in the technical field to which this creation belongs, without departing from the spirit and scope disclosed in this creation, makes slight changes in the form and details of the implementation of this creation, all belong to the patent protection of this creation Scope. The scope of patent protection for this creation is still subject to the scope of the appended patent application.

110:客戶端 120:服務端 130:金融機構端 150:平台端 160:公信單位端 170:鑑證端 190:區塊鏈 步驟210:客戶端以生物特徵登入金融機構端 步驟211:金融機構端於要求客戶端登入時傳送登入驗證請求至平台端,使平台端向客戶端要求登入驗證資料 步驟215:客戶端通過生物特徵辨識後,讀取金融機構端之機構登入資料與登入驗證資料,並傳送登入驗證資料及機構登入資料至平台端 步驟219:平台端在登入驗證資料通過驗證後,傳送機構登入資料至金融機構端,使金融機構端允許客戶端登入 步驟220:金融機構端於客戶端請求交易服務且判斷交易服務為基本交易層級時,傳送身分驗證請求至平台端,使平台端要求客戶端進行身分驗證 步驟231:客戶端加密交易驗證資料以產生交易加密資料並傳送交易加密資料給平台端 步驟235:平台端解密交易加密資料以取得身分檢核資料並傳送表示身分檢核資料與交易驗證資料是否相符之身分驗證結果至金融機構端 步驟240:平台端依據身分驗證請求及交易加密資料產生第一存證資料並發布至區塊鏈 步驟250:金融機構端於身分驗證結果表示通過驗證時,產生與交易服務對應之交易資料 步驟261:金融機構端判斷交易服務為實際交易層級時,傳送交易資料至公信單位端 步驟263:公信單位端對交易資料簽章以產生公信簽章,並傳送公信簽章至平台端 步驟265:平台端傳送公信簽章給鑑證端,鑑證端依據公信簽章產生第二存證資料並發布至區塊鏈 步驟271:金融機構端判斷交易服務為監管交易層級時,傳送模組驗證請求至平台端,使平台端向客戶端要求進行可信模組驗證 步驟273:客戶端加密可信模組所儲存之可信安全資料以產生模組加密資料,並傳送模組加密資料至平台端 步驟275:平台端解密模組加密資料以取得模組檢核資料並比對模組檢核資料與可信安全資料 步驟277:當模組檢核資料與可信安全資料相符時,金融機構端產生第一申報資料並傳送該平台端 步驟279:平台端產生包含第一申報資料之第二申報資料,並依據模組驗證請求、模組加密資料及第二申報資料產生第三存證資料並發布至區塊鏈 步驟311:客戶端向平台端或金融機構端申請實體之可信模組 步驟313:服務端線上輸入客戶端之裝置識別資料以啟用可信模組 步驟315:客戶端安裝可信模組 步驟351:客戶端在平台端以實名制驗證完成註冊 步驟353:平台端傳送登入驗證資料及交易驗證資料至客戶端 步驟361:客戶端對使用者進行生物辨識後,加密登入驗證資料以產生登入加密資料並傳送登入加密資料至平台端 步驟365:平台端解密登入加密資料以取得登入檢核資料並比對登入檢核資料與登入驗證資料 步驟370:當登入檢核資料與登入驗證資料相符時,平台端取得經金融機構端認證之個人資料,並由平台端或公信單位端對個人資料進行運算以產生對應之客戶認證資料並傳送給客戶端儲存,或金融機構端由客戶端取得客戶認證資料,並傳送客戶認證資料至平台端以從平台端下載個人資料 110: Client 120: Server 130: Financial institution side 150: Platform side 160: Public letter unit side 170: Authentication end 190: Blockchain Step 210: The client logs in to the financial institution with biometric features Step 211: The financial institution sends a login verification request to the platform when the client is required to log in, so that the platform requests the client for login verification data Step 215: After the client passes the biometric identification, it reads the institution login information and login verification information of the financial institution, and transmits the login verification information and institution login information to the platform side Step 219: After the login verification data is verified, the platform side transmits the institution login information to the financial institution side, so that the financial institution side allows the client to log in Step 220: When the financial institution requests the transaction service from the client and determines that the transaction service is at the basic transaction level, the financial institution transmits an identity verification request to the platform, so that the platform requires the client to perform identity verification Step 231: The client encrypts the transaction verification data to generate transaction encryption data and transmits the transaction encryption data to the platform Step 235: The platform decrypts the encrypted transaction data to obtain the identity verification data and transmits the identity verification result indicating whether the identity verification data and the transaction verification data match to the financial institution terminal Step 240: The platform generates the first deposit data according to the identity verification request and the encrypted transaction data and publishes it to the blockchain Step 250: When the identity verification result indicates that the verification is passed, the financial institution generates transaction data corresponding to the transaction service Step 261: When the financial institution judges that the transaction service is the actual transaction level, it transmits the transaction data to the public trust unit Step 263: The public letter unit signs the transaction data to generate the public letter seal, and transmits the public letter seal to the platform Step 265: The platform side transmits the public letter signature to the authentication terminal, and the authentication terminal generates the second certificate data according to the public letter signature and publishes it to the blockchain Step 271: When the financial institution judges that the transaction service is at the supervised transaction level, it sends a module verification request to the platform, so that the platform requests the client to perform trusted module verification Step 273: The client encrypts the trusted security data stored in the trusted module to generate module encrypted data, and transmits the module encrypted data to the platform Step 275: The platform decrypts the encrypted data of the module to obtain the module verification data and compares the module verification data with the trusted security data Step 277: When the module verification data is consistent with the trusted security data, the financial institution generates the first declaration data and transmits it to the platform Step 279: The platform generates the second declaration data including the first declaration data, and generates the third certificate data according to the module verification request, the module encryption data and the second declaration data, and publishes it to the blockchain Step 311: The client applies to the platform or the financial institution for the trusted module of the entity Step 313: The server enters the device identification data of the client online to enable the trusted module Step 315: The client installs the trusted module Step 351: The client completes the registration with real-name verification on the platform Step 353: The platform sends the login verification data and transaction verification data to the client Step 361: After the client performs biometric identification on the user, encrypts the login verification data to generate the login encrypted data and transmits the login encrypted data to the platform Step 365: The platform decrypts the login encrypted data to obtain the login verification data and compares the login verification data with the login verification data Step 370: When the log-in verification data matches the log-in verification data, the platform obtains the personal data certified by the financial institution, and the platform or the public trust unit calculates the personal data to generate the corresponding client authentication data and transmits it to the client. The client stores, or the financial institution obtains the client authentication information from the client, and sends the client authentication information to the platform to download personal information from the platform

第1圖為本創作所提之使用多安全層級驗證客戶身分與交易服務之系統架構圖。 第2A圖為本創作所提之使用多安全層級驗證客戶身分與交易服務之流程圖。 第2B圖為本創作所提之客戶端登入金融機構端之流程圖。 第2C圖為本創作所提之使用多安全層級驗證客戶身分與交易服務之附加流程圖。 第3A圖為本創作所提之客戶端安裝可信模組之流程圖。 第3B圖為本創作所提之客戶端於平台端完成註冊之流程圖。 Figure 1 is a system architecture diagram of the author's proposed use of multiple security levels to verify customer identity and transaction services. Figure 2A is a flow chart of the use of multiple security levels to verify customer identity and transaction services proposed by the author. Figure 2B is the flow chart of the client logging in to the financial institution as mentioned in the creation. Figure 2C is an additional flowchart of the author's proposed use of multiple security levels to verify customer identity and transaction services. Figure 3A is the flow chart of the client installation of the trusted module proposed by the author. Figure 3B is the flow chart of the client completing the registration on the platform as mentioned in the creation.

110:客戶端 110: Client

120:服務端 120: Server

130:金融機構端 130: Financial institution side

150:平台端 150: Platform side

160:公信單位端 160: Public letter unit side

170:鑑證端 170: Authentication end

190:區塊鏈 190: Blockchain

Claims (6)

一種使用多安全層級驗證客戶身分與交易服務之系統,該系統至少包含: 一客戶端,安裝有一可信模組,該可信模組儲存一交易驗證資料; 一金融機構端,用以提供該客戶端以生物特徵進行登入,並於該客戶端請求一交易服務時,判斷該交易服務是否符合基本交易層級,當該交易服務為基本交易層級時,產生一身分驗證請求; 一平台端,用以接收該金融機構端所傳送之該身分驗證請求,並要求該客戶端進行身分驗證,使該客戶端加密該交易驗證資料以產生一交易加密資料並傳送該交易加密資料給平台端,及用以解密該交易加密資料以取得一身分檢核資料並確認該身分檢核資料與該交易驗證資料相符後,依據該身分驗證請求及該交易加密資料產生一第一存證資料並發布該第一存證資料至一區塊鏈,並傳送一身分驗證結果至該金融機構端,使該金融機構端於該身分驗證結果表示通過驗證時,產生與被請求之該交易服務對應之一交易資料; 一公信單位端,用以接收該金融機構端判斷該交易服務為實際交易層級時所傳送之該交易資料,對該交易資料簽章以產生一公信簽章,並傳送該公信簽章至該平台端;及 一鑑證端,用以接收該平台端所傳送之該公信簽章,並依據該公信簽章產生一第二存證資料,及發布該第二存證資料至該區塊鏈。 A system for verifying customer identity and transaction services using multiple security levels, the system at least includes: a client, a trusted module is installed, and the trusted module stores a transaction verification data; A financial institution terminal, used to provide the client to log in with biometric features, and when the client requests a transaction service, determine whether the transaction service conforms to the basic transaction level, and when the transaction service is at the basic transaction level, generate a identity verification requests; a platform side, used for receiving the identity verification request sent by the financial institution side, and requesting the client to perform identity verification, so that the client side encrypts the transaction verification data to generate a transaction encryption data and transmits the transaction encryption data to The platform side is used to decrypt the encrypted transaction data to obtain an identity verification data and after confirming that the identity verification data is consistent with the transaction verification data, generate a first certificate data according to the identity verification request and the transaction encrypted data And publish the first certificate data to a blockchain, and transmit an identity verification result to the financial institution, so that the financial institution generates a transaction service corresponding to the requested transaction service when the identity verification result indicates that the verification is passed. one transaction information; A public trust unit terminal, used for receiving the transaction data sent by the financial institution terminal when judging that the transaction service is the actual transaction level, signing the transaction data to generate a public trust seal, and transmitting the public trust seal to the platform end; and an authentication terminal, used for receiving the public trust signature sent by the platform terminal, generating a second certificate deposit data according to the public letter seal, and publishing the second certificate deposit data to the blockchain. 如請求項1所述之使用多安全層級驗證客戶身分與交易服務之系統,其中該金融機構端更用以於該交易服務符合實際交易層級時,進一步判斷該交易服務為監管交易層級時,傳送一模組驗證請求至該平台端,使該平台端向該客戶端要求進行可信模組驗證,該客戶端更用以加密安裝於該客戶端上之可信模組所儲存之一可信安全資料以產生一模組加密資料並傳送該模組加密資料至該平台端,該平台端更用以解密該模組加密資料以取得一模組檢核資料並比對該模組檢核資料與該可信安全資料,當該模組檢核資料與該可信安全資料相符時,該金融機構端產生一第一申報資料並傳送給該平台端,該平台端產生包含該第一申報資料之一第二申報資料並傳送給一監管端,並依據該模組驗證請求、該模組加密資料及該第二申報資料產生一第三存證資料,及發布該第三存證資料至該區塊鏈。The system for verifying customer identity and transaction services using multiple security levels as described in claim 1, wherein the financial institution terminal is further configured to transmit the transaction service when the transaction service conforms to the actual transaction level and further determine that the transaction service is a regulated transaction level. A module verification request is sent to the platform, so that the platform requires the client to perform trusted module verification, and the client is further used to encrypt a trusted module stored in the trusted module installed on the client. secure data to generate a module encrypted data and transmit the module encrypted data to the platform, the platform is further used to decrypt the module encrypted data to obtain a module check data and compare the module check data With the trusted security data, when the module checking data is consistent with the trusted security data, the financial institution terminal generates a first declaration document and transmits it to the platform terminal, and the platform terminal generates a first declaration document containing the first declaration document A second declaration data is sent to a supervisory terminal, and a third deposit data is generated according to the module verification request, the module encrypted data and the second declaration data, and the third deposit data is released to the blockchain. 如請求項1所述之使用多安全層級驗證客戶身分與交易服務之系統,其中該平台端更用以於該客戶端以實名制驗證完成註冊時傳送一登入驗證資料及該交易驗證資料至該客戶端,該客戶端更用以對使用者進行生物辨識後,加密該登入驗證資料以產生一登入加密資料並傳送該登入加密資料至該平台端,使該平台端解密該登入加密資料以取得一登入檢核資料並比對該登入檢核資料與該登入驗證資料,當該登入檢核資料與該登入驗證資料相符時,該平台端取得經該金融機構端認證之一個人資料,並由該平台端或該公信單位端對該個人資料進行運算以產生對應之一客戶認證資料並傳送給客戶端儲存,或該金融機構端由該客戶端取得該客戶認證資料,並傳送該客戶認證資料至該平台端以從該平台端下載該個人資料。The system for verifying client identity and transaction services using multiple security levels as described in claim 1, wherein the platform is further configured to transmit a login verification data and the transaction verification data to the client when the client completes the registration through real-name verification The client is further used to perform biometric identification on the user, encrypt the login verification data to generate a login encrypted data and transmit the login encrypted data to the platform, so that the platform decrypts the login encrypted data to obtain a The login verification data is compared with the login verification data. When the login verification data is consistent with the login verification data, the platform obtains one of the personal data certified by the financial institution, and sends it to the platform. The terminal or the public trust unit performs operations on the personal data to generate a corresponding client authentication data and transmits it to the client for storage, or the financial institution obtains the client authentication data from the client and transmits the client authentication data to the client platform to download the personal data from the platform. 如請求項1所述之使用多安全層級驗證客戶身分與交易服務之系統,其中該金融機構端更用以於要求該客戶端使用線上快速認證(Fast IDentity Online, FIDO)架構登入時傳送一登入驗證請求至該平台端,使該平台端向該客戶端要求一登入驗證資料,該客戶端更用以通過生物特徵辨識後取得該金融機構端之一機構登入資料並由該可信模組讀出該登入驗證資料後,傳送該登入驗證資料及該機構登入資料至該平台端,該平台端更用以於成功驗證該客戶端所傳送之該登入驗證資料後,傳送該機構登入資料至該金融機構端,使該金融機構端允許該客戶端登入。The system for verifying client identity and transaction services using multiple security levels as described in claim 1, wherein the financial institution terminal is further configured to transmit a login when requesting the client to log in using the Fast IDentity Online (FIDO) framework A verification request is sent to the platform, so that the platform requires a login verification information from the client, and the client is further used to obtain an institution login information of the financial institution through biometric identification and read by the trusted module After outputting the login verification data, send the login verification data and the organization login data to the platform, and the platform is further configured to send the organization login data to the platform after successfully verifying the login verification data sent by the client The financial institution side enables the financial institution side to allow the client to log in. 如請求項4所述之使用多安全層級驗證客戶身分與交易服務之系統,其中該平台端更用以接收該客戶端所傳送之一聲明簽發請求,並於確認該身分檢核資料與該交易驗證資料相符時,簽發與該客戶端之使用者之分散式數位身分(Decentralized Identity, DID)識別資料及該聲明簽發請求對應之一可驗證聲明,並發布該可驗證聲明至該區塊鏈,該金融機構端更用以依據該客戶端之使用者之分散式數位身分識別資料由該區塊鏈取得並驗證該可驗證聲明,並於該可驗證聲明通過驗證時判斷該身分驗證結果表示通過驗證。The system for verifying client identity and transaction service using multiple security levels as described in claim 4, wherein the platform is further configured to receive a statement issuance request sent by the client, and to confirm the identity verification data and the transaction When the verification data is consistent, issue a verifiable statement corresponding to the user's Decentralized Identity (DID) identification data of the client and the statement issuance request, and publish the verifiable statement to the blockchain, The financial institution terminal is further used for obtaining and verifying the verifiable claim from the blockchain according to the distributed digital identity information of the user of the client terminal, and when the verifiable claim is verified, it is judged that the identity verification result indicates that the verification is passed. verify. 如請求項1所述之使用多安全層級驗證客戶身分與交易服務之系統,其中該系統更包含一服務端,用以於該客戶端向該平台端或該金融機構端申請實體之一可信模組後,提供於線上輸入該客戶端之一裝置識別資料,並傳送該裝置識別資料至該平台端或該金融機構端,使該平台端或該金融機構端啟用該可信模組。The system for verifying client identity and transaction services using multiple security levels as described in claim 1, wherein the system further comprises a server for applying to the platform or the financial institution for a trusted entity from the client After the module is installed, a device identification data of the client is provided online, and the device identification data is transmitted to the platform or the financial institution, so that the platform or the financial institution enables the trusted module.
TW110213433U 2021-11-12 2021-11-12 System for verifying client identity and transaction services using multiple security levels TWM623435U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110213433U TWM623435U (en) 2021-11-12 2021-11-12 System for verifying client identity and transaction services using multiple security levels

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110213433U TWM623435U (en) 2021-11-12 2021-11-12 System for verifying client identity and transaction services using multiple security levels

Publications (1)

Publication Number Publication Date
TWM623435U true TWM623435U (en) 2022-02-11

Family

ID=81324449

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110213433U TWM623435U (en) 2021-11-12 2021-11-12 System for verifying client identity and transaction services using multiple security levels

Country Status (1)

Country Link
TW (1) TWM623435U (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114629713A (en) * 2022-03-25 2022-06-14 阿里云计算有限公司 Identity verification method, device and system
US11695799B1 (en) 2021-06-24 2023-07-04 Airgap Networks Inc. System and method for secure user access and agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11711396B1 (en) 2021-06-24 2023-07-25 Airgap Networks Inc. Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11722519B1 (en) 2021-06-24 2023-08-08 Airgap Networks Inc. System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware
US11736520B1 (en) 2021-06-24 2023-08-22 Airgap Networks Inc. Rapid incidence agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11757933B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. System and method for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11757934B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. Extended browser monitoring inbound connection requests for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11916957B1 (en) 2021-06-24 2024-02-27 Airgap Networks Inc. System and method for utilizing DHCP relay to police DHCP address assignment in ransomware protected network
CN114629713B (en) * 2022-03-25 2024-06-04 阿里云计算有限公司 Identity verification method, device and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11695799B1 (en) 2021-06-24 2023-07-04 Airgap Networks Inc. System and method for secure user access and agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11711396B1 (en) 2021-06-24 2023-07-25 Airgap Networks Inc. Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11722519B1 (en) 2021-06-24 2023-08-08 Airgap Networks Inc. System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware
US11736520B1 (en) 2021-06-24 2023-08-22 Airgap Networks Inc. Rapid incidence agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11757933B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. System and method for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11757934B1 (en) 2021-06-24 2023-09-12 Airgap Networks Inc. Extended browser monitoring inbound connection requests for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11916957B1 (en) 2021-06-24 2024-02-27 Airgap Networks Inc. System and method for utilizing DHCP relay to police DHCP address assignment in ransomware protected network
CN114629713A (en) * 2022-03-25 2022-06-14 阿里云计算有限公司 Identity verification method, device and system
CN114629713B (en) * 2022-03-25 2024-06-04 阿里云计算有限公司 Identity verification method, device and system

Similar Documents

Publication Publication Date Title
US20210351931A1 (en) System and method for securely processing an electronic identity
US10142114B2 (en) ID system and program, and ID method
US8615663B2 (en) System and method for secure remote biometric authentication
TWM623435U (en) System for verifying client identity and transaction services using multiple security levels
US9083533B2 (en) System and methods for online authentication
US8943311B2 (en) System and methods for online authentication
KR101863953B1 (en) System and method for providing electronic signature service
US10523441B2 (en) Authentication of access request of a device and protecting confidential information
US9384338B2 (en) Architectures for privacy protection of biometric templates
US20130219481A1 (en) Cyberspace Trusted Identity (CTI) Module
US20090293111A1 (en) Third party system for biometric authentication
CN110990827A (en) Identity information verification method, server and storage medium
EP2721764B1 (en) Revocation status using other credentials
US20110289318A1 (en) System and Method for Online Digital Signature and Verification
JP2009541817A (en) Single sign-on between systems
WO2003007121A2 (en) Method and system for determining confidence in a digital transaction
US20140258718A1 (en) Method and system for secure transmission of biometric data
US8316437B2 (en) Method for protecting the access to an electronic object connected to a computer
JP2018529299A (en) Biometric protocol standard system and method
EP1092182A2 (en) Apparatus and method for end-to-end authentication using biometric data
KR101868564B1 (en) Apparatus for authenticating user in association with user-identification-registration and local-authentication and method for using the same
CN110784395B (en) Mail safety login method and system based on FIDO authentication
TWI828001B (en) System for using multiple security levels to verify customer identity and transaction services and method thereof
JP2007258789A (en) System, method, and program for authenticating agent
US20240129139A1 (en) User authentication using two independent security elements