CPC G06Q 20/3821 (2013.01) [G06Q 20/355 (2013.01); G06Q 20/3829 (2013.01); G07F 7/08 (2013.01); G07F 7/122 (2013.01); H04L 9/0869 (2013.01); H04L 2209/56 (2013.01)] | 10 Claims |
1. A method for personalizing a financial IC card with a dynamic verification code, applying for a personalized system including an upper computer and a personal device, wherein said method comprises the following steps:
s1) building, by the personal device, a security channel with the upper computer, then executing step s2) when the upper computer sends a personalized data package to the personal device via the security channel; and executing step s3) when the upper computer sends a verification request to the personal device via the security channel;
s2) parsing, by the personal device, the personalized data package so as to obtain a second personalized information, writing the second personalized information into the financial IC card, and returning the second personalized information writing result to the upper computer via the security channel; and waiting for receiving data sent from the upper computer; and
s3) reading, by the personal device, a time window and a dynamic verification code from the financial IC card, and returning the time window and the dynamic verification code to the upper computer for verification via the security channel, and receiving a verification result returned from the upper computer via the security channel, reading a personalized state from the financial IC card and storing the personalized state if the verification result is successful, and returning personalization successful information to the upper computer via the security channel; while returning personalization failure information to the upper computer via the security channel if the verification result is failure;
before the upper computer sends the personalized data package to the personal device, the method further comprises:
generating or receiving, by the upper computer, a first personalized information including a first master key; dispersing the first master key so as to obtain a second dispersed key, organizing the second personalized information including the second dispersed key, and organizing the personalized data package according to the second personalized information.
|