Current location - Quotes Website - Signature design - How to set a phone inquiry password for bank cards
How to set a phone inquiry password for bank cards

The bank card number and password are not the same as the user name login password. The bank card password is a 6-digit password that needs to be set when applying for a bank card. The password you use to log in with your username is the password you set for transactions. You don’t need to enter your bank card password during transactions, just enter the password you set. User name and password for online banking: It is the "password for logging in to online banking" that you set when you apply for a bank card at the bank counter. The bank card password generally refers to the withdrawal password of your bank card, that is, the transaction password.

1. The login password and the card password are different. The password on the card itself is only used for identity verification at self-service terminals such as counters or cash machines.

2. The login password for online banking is only used for login authentication in the online banking system. When applying for online banking, the counter staff will usually let the user set it by himself and ask him to enter it again for confirmation.

3. Bank card passwords can only be 6-digit pure numbers. Online banking passwords can be more than ten digits pure numbers, or letters and numbers.

Extended information

1. CVV password verification

This technology is closely related to the basic technical standards of bank cards, such as ISO7813 identification card standard (financial transaction card), Compatible with GB/T15120 (recording technology) etc. CVV information is stored in the second track of the magnetic stripe bank card, based on the bank card number, second track primary account number (PAN), card-issuing bank identification code, card issuer identification code, card-issuing outlet identification code, start mark, end mark, Separator (SF) and other information are calculated through the special encryption algorithm customized by each bank. After each calculation step is encrypted using CVKA technology, the bank card encryption verification code (CVN) is obtained. The encryption algorithms and confidentiality technologies of each bank are different. Therefore, after criminals use the obtained bank card information to make fake cards, they can be identified and cannot be used when the card issuer decrypts it.

2. SSL security protocol

SSL security protocol, also known as the "Secure Sockets Layer" protocol, was designed and developed by Netscape Communication Company in 1996. It is mainly used for To improve data security between applications. The SSL security protocol mainly provides three services: one is the legality authentication of users and servers, the other is encrypting data to conceal the transmitted data, and the third is protecting the integrity of the data. The SSL protocol involves all TCP/IP applications and is a protocol that ensures security between any client and server that has a Secure Socket Layer installed. However, with the rapid increase in e-commerce participation, the issue of manufacturer certification has become more and more prominent, so the SSL security protocol has gradually been replaced by the SET protocol.

3. SET Protocol

The SET protocol, also known as the Secure Electronic Transaction Specification, is a rule for security measures based on credit card electronic transactions launched by MasterCard and VISA in 1996. It is a secure electronic payment protocol that can be widely used on the Internet. Its authentication process uses RSA and DES algorithms to form a standard for secure use of bank cards for shopping on the Internet. However, the authentication process of the SET protocol is very cumbersome. Each transaction needs to verify the electronic certificate 9 times, verify the digital signature 6 times, transfer the certificate 7 times, perform 5 signatures, 4 symmetric encryptions and 4 asymmetric encryptions to complete a transaction containing SET The protocol transaction process takes a long time, so this protocol is currently not widely used.

4. Visa 3-D Authentication

Identity verification of credit card holders generally uses the method of verifying the cardholder’s signature, but in POS transactions and online transactions, merchants cannot Confirm whether the consumer is the real cardholder. To solve this problem, VISA has developed a 3-D verification standard to conduct interactive verification of card issuers, cardholders, merchants and acquirers through bank card usernames and passwords.

In the verification model, the card issuer is responsible for establishing a user-accessible system that can also interact with the merchant plug-in in 3-D Secure and the VISA directory server to use a variety of methods to authenticate cardholders. Verify; the acquirer is responsible for establishing a payment gateway to ensure the security of information flow, and also installs a 3-D Secure Merchant plug-in to interact with the VISA directory server and card issuer system; the intermediate domain provides a directory of card issuers participating in 3-D verification , to facilitate multiple parties to authenticate transactions.

Because the technology is open and VISA allows American Express and Japan's JCB to use it, magnetic stripe credit cards are secure when conducting transactions because they can be verified by multiple parties.

5. MasterCard Online Payment Standard (Master SecureCode)

MasterCard uses a hidden field UCAF (Universal Cardholder Authentication Field) to collect, transmit and display the cardholder’s authentication information. Supports multiple authentication methods including PC authentication, smart card authentication and authentication based on 3-D security technology. The technology used is different from VISA 3-D, but the bank card information verification procedures are basically the same.

6. J/Secure by JCB Japan

In 2004, JCB Japan announced the launch of J/Secure, a credit card Internet verification service. J/Secure is basically the same as Visa's 3-D authentication architecture. JCB's service also adds a cardholder password verification step before the card issuer authorizes the transaction. Due to JCB's comprehensive cooperation with Visa and Mastercard, the J/Secure architecture allows acquirers and card issuers to choose different technical solutions, and JCB can provide support for both.

7. UnionPay CPUSecure (China UnionPay Secure)

UnionPay launched CPUSecure in 2005, adopting a unified four-party operation process and service process of cardholders, card issuers, acquirers and merchants. and settlement process to provide relevant services to domestic Internet consumers.

8. EMV migration technology

EMV migration technology was launched by the Banking Association and the international organization EMV (VISA, Master, Europay), and is mainly used to ensure the safe use of chip cards.

1. Chip debit card

For traditional magnetic stripe debit cards, after the cardholder enters the password, the system uses PIN Block to send it to the card-issuing bank's host for verification; and Chip debit cards use the transaction verification code generated by the chip card itself as the basis for verification by the issuing bank. Therefore, if the magnetic stripe card is skimmed and the password is leaked, the card can easily be copied in a short period of time, and the cardholder's deposits may be stolen and the card credit may be misappropriated. The chip debit card has a CPU, memory and I/O, and almost has the most basic functions of a computer. Therefore, the chip debit card itself can safely store the logical operations and base code of the issuing bank, and the verification code generated by the card can only be stored by the issuing bank. Know. That is to say, when using a chip card for transactions, the cardholder's password does not need to be sent to the card-issuing bank for verification. Instead, the chip financial card directly verifies the correctness of the password, and only after passing the verification does a transaction verification code be generated for verification. Since criminals cannot copy the logical operations of the chip card on their own, the risk of password skimming can be effectively addressed.

2. Chip credit card

For traditional magnetic stripe credit cards, the card reader reads the data on the second track and then sends it to the card issuer through the communication network. The card issuer verifies the magnetic stripe through CVV. An authorization code is issued upon verification of the card's authenticity. Chip credit cards come with their own 3DES Key program, which can use the EMV parameters stored inside to generate ARQC (Authorisation Request Cryptogram) for verification. Counterfeit cards copied due to the leakage of the second track information cannot copy the key inside the chip card, so they cannot generate an ARQC and send it to the card issuer for authorization, which reduces the card issuer's risk of counterfeit cards.

Baidu Encyclopedia: Bank card password verification technology