Financial card with function of fingerprint verification and working method therefor

ABSTRACT

The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an c- transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of the International Application No.PCT/CN2018/112122, filed on Oct. 26, 2018, which claims priority toChinese patent application No. 201711306207.1, filed on Dec. 11, 2017,the contents of the above identified applications are incorporatedherein by reference in their entireties.

TECHNICAL FIELD

The disclosure relates to information technology field, moreparticularly, to a financial card with function of fingerprintverification and a working method therefor.

BACKGROUND

In the prior art, with rapid development of electronic informationtechnology, financial card is widely used in e-transaction in dailylife. In order to improve security of e-transaction, identity isrequired to be verified in a process of e-transaction. At present, themethod for verifying identity mostly adopts inputting an identityverification code by a user into a host computer which performs datainteraction with the financial card. The host computer can be atransaction end or a smart end, for example, the transaction end is aPOS machine.

The method for verifying identity in the prior art has followingshortcomings. At the time of verifying identification, the user of thefinancial card is required to input the identity verification code intothe host computer, which has a risk of leaking identity verificationcode and is an opportunity of illegal identity verification code theft.In real transaction, the user of financial card sometimes forgetsidentity verification code, which result in terminating transaction; iffailing times for permitting the user to input the identity verificationcode surpasses a preset value, the financial card will be locked. All ofthose bring bad experience to the user.

SUMMARY

The disclosure provides a financial card with function of fingerprintverification and a working method therefor.

The disclosure provides a working method for a financial card withfunction of fingerprint verification, which includes:

Step S1, waiting, by the financial card, to receive a command from ahost computer;

Step S2, determining, by the financial card, a type of the command uponwhen the command from the host computer is received, if the financialcard determines that the type of the command is an application selectingcommand, executing Step S3; if the financial card determines that thetype of the command is a processing option acquiring command, executingStep S4; if the financial card determines that the type of the commandis an application data reading command, executing Step S5; if thefinancial card determines that the type of the command is an applicationcryptogram acquiring command, executing Step S6;

Step S3, sending, by the financial card, application informationsupported by itself to the host computer;

Step S4, sending, by the financial card, file information to the hostcomputer;

Step S5, sending, by the financial card, application data correspondingto a file identification in the application data reading command to thehost computer;

Step S6, executing, by the financial card, card behavior analysis andgenerating application cryptogram, sending the application cryptogram tothe host computer;

The method further includes:

if the financial card determines that the type of the received commandis a verifying command and the verifying command is specifically afingerprint verifying command in the Step S2, executing, by thefinancial card, card holder verification according to a fingerprint of auser and returning information related to the card holder verificationto the host computer;

and/or, before the Step S1, the method further includes: if thefinancial card receives a boot-up event, executing, by the financialcard, boot-up verification according to a self-stored user registrationfingerprint and a fingerprint input by a user, executing the Step S1 ifthe verification is successful.

The disclosure provides a financial card with function of fingerprintverification, which includes:

a waiting and receiving module, configured to wait to receive a commandfrom a host computer;

a determining module, configured to determine a type of the command whenthe command from the host computer is received by the waiting andreceiving module;

a storing module, configured to store application information supportedby the financial card, to store file information and to storeapplication data;

a first sending module, configured to send the application informationsupported by the financial card which is stored by the storing module tothe host computer when the determining module determines that thecommand received by the waiting and receiving module is an applicationselecting command;

a second sending module, configured to send the file information storedby the storing module to the host computer when the determining moduledetermines that the type of the command received by the waiting andreceiving module is a processing option acquiring command;

a third sending module, configured to send the application datacorresponding to a file identification in an application data readingcommand which is stored by the storing module to the host computer whenthe determining module determines that the type of the command receivedby the waiting and receiving module is the application data readingcommand;

an application cryptogram generating module, configured to execute cardbehavior analysis and generate application cryptogram if the determiningmodule determines that the type of the command received by the waitingand receiving module is an application cryptogram acquiring command;

a fourth sending module, configured to send the application cryptogramgenerated by the application cryptogram generating module to the hostcomputer;

the financial card further includes: a card holder verifying moduleand/or a boot-up verifying module;

the card holder verifying module is configured to, if the determiningmodule determines that the type of the received command received by thewaiting and receiving module is a verifying command and the verifyingcommand is specifically a fingerprint verifying command, execute cardholder verification according to a fingerprint of a user and returninformation related to the card holder verification to the hostcomputer;

the storing module is further configured to store user registrationfingerprint;

the boot-up verifying module is configured to, if a boot-up event isreceived, execute boot-up verification according to the userregistration fingerprint stored by the storing module and a fingerprintinput by a user;

when the boot-up verifying module is comprised in the financial card,the waiting and receiving module is specifically configured to wait toreceive the command from the host computer after the verificationexecuted by the boot-up verifying module is successful.

The present disclosure has the advantages that in a process ofe-transaction, the financial card executes card holder verificationaccording to a fingerprint of a user and/or executes boot-upverification according to the fingerprint input by the user when thefinancial card receives a boot-up event, which does not require the userto input the identity verification code to the transaction end andguarantees that the verification information for the identityverification is not leaked and improves security of identityverification.

Meanwhile, in the present disclosure, identity verification is executedby using fingerprint verifying method, the user of the financial cardwill not stop transaction if the user forgot identity verification codeand the financial card will not be locked as well. In addition, comparedwith the way that identity verification code is used for verifying, theway that fingerprint is used for verifying makes e-transaction to bemore convenient.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1D is a flow chart of a working method for a financial cardwith function of fingerprint verification in Embodiment 2 of the presentdisclosure;

FIGS. 2A-2C is a flow chart of a working method for a financial cardwith function of fingerprint verification in Embodiment 3 of the presentdisclosure; and

FIG. 3 is a block diagram for modules of a financial card with functionof fingerprint verification in Embodiment 4 of the present disclosure.

DETAILED DESCRIPTION

The technical means of the embodiments of the disclosure are describedclearly and completely in conjunction with the accompanying drawings asfollows.

Embodiment 1

The present disclosure provides a working method for a financial cardwith function of fingerprint verification, which includes:

Step S1, the financial card waits to receive a command from a hostcomputer;

Step S2, the financial card determines a type of the command when thecommand from the host computer is received, if the financial carddetermines that the type of the command is an application selectingcommand, executes Step S3; if the financial card determines that thetype of the command is a processing option acquiring command, executesStep S4; if the financial card determines that the type of the commandis an application data reading command, executes Step S5; if thefinancial card determines that the type of the command is an applicationcryptogram acquiring command, executes Step S6;

Step S3, the financial card sends application information supported byitself to the host computer;

Step S4, the financial card sends file information to the host computer;

Step S5, the financial card sends application data corresponding to afile identification in the application data reading command to the hostcomputer;

Step S6, the financial card executes card behavior analysis andgenerates application cryptogram, sends the application cryptogram tothe host computer;

The method further includes:

if the financial card determines that the type of the received commandis a verifying command and the verifying command is specifically afingerprint verifying command in Step S2, the financial card executescard holder verification according to a fingerprint of a user andreturns information related to the card holder verification to the hostcomputer;

and/or, before the Step S1, the method further includes: if thefinancial card receives a boot-up event, the financial card executesboot-up verification according to a self-stored user registrationfingerprint and a fingerprint input by a user, executes the Step S1 ifthe verification is successful.

In the present disclosure, if the fingerprint verifying command isspecifically an online fingerprint verifying command, the financial cardexecutes card holder verification according to a fingerprint of a userand returns information related to the card holder verification to thehost computer specifically includes: the financial card waits for theuser to input a fingerprint, if the financial card obtains thefingerprint input by the user, the financial card computes onlinefingerprint feature according to the obtained fingerprint and sends theonline fingerprint feature to the host computer.

In the present disclosure, the method further includes: if the financialcard determines that the received command is the verifying command andthe verifying command is specifically an online fingerprint verifyingcommand in Step S2, the financial card waits for the user to input afingerprint; when the fingerprint input by the user is obtained by thefinancial card, the financial card verifies the fingerprint input by theuser according to a self-stored user registration fingerprint, if theverification is successful, the financial card returns a self-storedonline verification code to the host computer; otherwise, the financialcard returns information that the verification is failed to the hostcomputer.

In the present disclosure, when the fingerprint verifying command isspecifically an offline fingerprint verifying command;

the financial card executes the card holder verification according tothe fingerprint of the user and returns information related to cardholder verification to the host computer specifically includes: thefinancial card waits for the user to input a fingerprint, when thefingerprint input by the user is obtained by the financial card, thefinancial card verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, the financial card returns information that offlinefingerprint verification is successful to the host computer; otherwise,the financial card returns information that offline fingerprintverification is failed to the host computer.

The method of the present disclosure further includes:

when the financial card determines that the received command is averifying command and the verifying command is specifically an offlineverifying command in the Step S2, the financial card waits for the userto input an offline verification code, when the offline verificationcode input by the user is obtained by the financial card, the financialcard verifies the offline verification code input by the user accordingto self-stored offline verification code, if the verification issuccessful, the financial card returns information that offlineverification is successful to the host computer; otherwise, thefinancial card returns information that offline verification is failedto the host computer.

Or, when the financial card determines that the received command is averifying command and the verifying command is specifically an offlineverification code verifying command in the Step S2, the financial cardobtains an offline verification code from the offline verification codeverifying command; when the offline verification code input by the useris obtained by the financial card, the financial card verifies theoffline verification code input by the user according to self-storedoffline verification code, if the verification is successful, thefinancial card returns information that offline verification issuccessful to the host computer; otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

When the financial card determines that the received command is averifying command and the verifying command is specifically an offlineverifying command in the Step S2, the financial card executes Step S91to Step S93:

Step S91, the financial card determines whether the offline verifyingcommand includes an offline verification code, if yes, executes StepS92; otherwise, executes Step S93;

Step S92, the financial card obtains the offline verification code fromthe offline verifying command, the financial card verifies the obtainedoffline verification code according to self-stored offline verificationcode, if the verification is successful, executes Step S93; otherwise,the financial card returns information that offline verification isfailed;

Step S93, the financial card waits for the user to input a fingerprint,when the fingerprint input by the user is obtained by the financialcard, the financial card verifies the fingerprint input by the useraccording to self-stored user registration fingerprint, if theverification is successful, the financial card returns information thatthe offline fingerprint verification is successful to the host computer;otherwise, the financial card returns information that the offlinefingerprint verification is failed to the host computer.

Or, when the financial card determines that the received command is averifying command and the verifying command is specifically an offlineverifying command in Step S2, the financial card executes Step S101 toStep S103:

Step S101, the financial card determines whether the offlineverification code is included in the offline verifying command, if yes,executes Step S102; otherwise, executes Step S103;

Step S102, the financial card obtains an offline verification code fromthe offline verifying command, verifies the obtained offlineverification code according to self-stored offline verification code, ifthe verification is successful, the financial card returns informationthat the offline verification is successful to the host computer; if theverification is failed, the financial card returns information that theoffline verification is failed to the host computer;

Step S103, the financial card waits for the user to input fingerprint,when the fingerprint input by the user is obtained by the financialcard, the financial card verifies the fingerprint input by the useraccording to self-stored user registration fingerprint, if theverification is successful, the financial card returns information thatthe offline verification is successful to the host computer; otherwise,the financial card returns information that the offline verification isfailed to the host computer.

The Step S2 of the present disclosure further includes: if the financialcard determines that the received command is a transaction verifyingcommand, executes Step S0;

Step S0, the financial card prompts the user to input transactionverifying information, verifies the transaction verifying informationinput by the user after the transaction verifying information input bythe user is received, if the verification is successful, the financialcard returns information that the verification is successful to the hostcomputer; otherwise, the financial card returns information that theverification is failed to the host computer and ends transaction.

Specifically, the Step S0 specifically includes:

Step S01, the financial card prompts the user to input fingerprint;

Step S02, the financial card receives the fingerprint input by the user;

Step S03, the financial card verifies the fingerprint input by the useraccording to the self-stored user registration fingerprint, if theverification is successful, the financial card generates informationthat the verification is successful and returns information that theverification is successful to the host computer; otherwise, thefinancial card generates information that the verification is failed tothe host computer and ends transaction.

Specifically, in the Step S03, the financial card verifies thefingerprint input by the user according to the self-stored userregistration fingerprint is specifically that the financial cardcomputes fingerprint feature according to the fingerprint input by theuser, determines whether the computed fingerprint feature is consistentwith the fingerprint feature of the self-stored user registrationfingerprint, if yes, the verification is successful; otherwise, theverification is failed;

if the verification in the Step S03 is successful, the method furtherincludes: the financial card stores the fingerprint feature computedaccording to the fingerprint input by the user.

Correspondingly, if the fingerprint verifying command is specifically anonline fingerprint verifying command, the financial card executes cardholder verification according to the fingerprint of the user and returnsinformation related to the card holder verification to the host computerspecifically includes: the financial card sends the computed fingerprintfeature which is stored to the host computer.

Specifically, when the fingerprint verifying command is specifically anoffline fingerprint verifying command, the financial card executes thecard holder verification according to the fingerprint of the user andreturns information related to card holder verification to the hostcomputer specifically includes: the financial card generates a result ofsuccessful offline fingerprint verification and sends the result ofsuccessful offline fingerprint verification to the host computer.

Specifically, the Step S0 further includes:

Step L01, the financial card prompts the user to input a transactionverification code;

Step L02, the financial card obtains the transaction verification codeinput by the user;

Step L03, the financial card verifies the transaction verification codeinput by the user according to the self-stored transaction verificationcode, if the verification is successful, the financial card generatesinformation that the verification is successful and returns theinformation that the verification is successful to the host computer;otherwise, the financial card generates information that theverification is failed and returns the information that the verificationis failed to the host computer and ends transaction;

or, the Step S0 specifically includes:

Step W01, the financial card obtains the transaction verification codefrom a transaction verifying command;

Step W02, the financial card verifies the transaction verification codeobtained from the transaction verifying command according to theself-stored transaction verification code, if the verification issuccessful, the financial card generates information that theverification is successful, and returns the information that theverification is successful to the host computer; otherwise, thefinancial card generates information that the verification is failed andreturns the information that the verification is failed to the hostcomputer and ends transaction.

Further, the method further includes: when the financial card determinesthat the received command is the verifying command in the Step S2 andthe verifying command is specifically the offline verification codeverifying command, the financial card generates a result of successfuloffline verification code verification according to the information thatthe verification is successful and sends the result of successfuloffline verification code verification to the host computer.

In the present disclosure, the financial card executes boot-upverification according to the self-stored user registration fingerprintand a fingerprint input by a user specifically includes:

Step H1, the financial card prompts the user to input fingerprint;

Step H2, when the financial card obtains the fingerprint input by theuser, the financial card verifies the fingerprint input by the useraccording to the self-stored user registration fingerprint.

In the present disclosure, the financial card executes boot-upverification according to the self-stored user registration fingerprintand the fingerprint input by the user specifically includes: thefinancial card computes fingerprint feature according to the fingerprintinput by the user, determines whether the computed fingerprint featureis consistent with the fingerprint feature of the self-stored userregistration fingerprint, if yes, the verification is successful;otherwise, the verification is failed; if the verification issuccessful, the method further includes: the financial card stores thecomputed fingerprint feature.

Correspondingly, when the fingerprint verifying command is specificallythe online fingerprint verifying command, the financial card executesthe card holder verification according to the fingerprint of the userand returns information related to the card holder verification to thehost computer specifically includes: the financial card sends the storedfingerprint feature to the host computer.

In the present disclosure, when the financial card executes boot-upverification according to the registered fingerprint and the fingerprintinput by the user and the verification is successful, the method furtherincludes: the financial card stores the result of successfulverification;

Correspondingly, when the fingerprint verifying command is specificallythe offline fingerprint verifying command, the financial card executesthe card holder verification according to the fingerprint of the userand returns information related to the card holder verification to thehost computer specifically includes: the financial card generatesinformation that the offline fingerprint verification is successfulaccording to the stored result of successful verification and sends theinformation that the offline fingerprint verification is successful tothe host computer.

In the present disclosure, the financial card generates applicationcryptogram specifically includes: the financial card generatesapplication cryptogram according to the information that the offlinefingerprint verification is successful or the information that theoffline fingerprint verification is failed.

In the present disclosure, when before the Step S1, the method furtherincludes the financial card executes boot-up verification according toself-stored user registration fingerprint and the fingerprint input bythe user when the boot-up event is received, and the boot-upverification is successful;

the file information sent by the financial card to the host computer inthe Step S4 includes record information related to the onlineverification code; the application data sent by the financial card tothe host computer in the Step S5 includes the online verification codecorresponding to the recording information of the online verificationcode in the application data reading command.

In the method of present disclosure, the financial card executes boot-upverification according to the self-stored user registration fingerprintand the fingerprint input by a user specifically includes: the financialcard computes fingerprint feature according to the fingerprint input bythe user, determines whether the computed fingerprint feature isconsistent with the fingerprint feature of the self-stored userregistration fingerprint, if yes, the verification is successful;otherwise, the verification is failed; if the boot-up verification issuccessful, the method further includes: the financial card stores thecomputed fingerprint feature;

Correspondingly, the file information sent by the financial card to thehost computer in the Step S4 includes record information related to thefingerprint feature; the application data sent by the financial card tothe host computer in the Step S5 includes the fingerprint featurecorresponding to the record information of the fingerprint feature inthe read application data command.

Further, if the fingerprint verifying command is specifically theoffline fingerprint verifying command, the financial card executes thecard holder verification according to the fingerprint of the user andreturns information related to the card holder verification to the hostcomputer specifically includes: the financial card waits for the user toinput fingerprint, when the fingerprint input by the user is obtained bythe financial card, the financial card verifies the fingerprint input bythe user according to self-stored user registration fingerprint; if theverification is successful, the financial card sends the informationthat the offline fingerprint verification is successful to the hostcomputer; otherwise, the financial card sends information that theoffline fingerprint verification is failed to the host computer.

In the present disclosure, the financial card receives a boot-up eventis specifically that the financial card being powered up, or thefinancial card receives the boot-up event from a user.

Preferably, in the present disclosure, the financial card maycommunicate data with the host computer via Bluetooth, or via acontacting manner or a contactless manner.

Embodiment 2

The present embodiment provides a working method for a financial cardwith function of fingerprint verification. As shown in FIGS. 1A-1D, themethod includes:

Step 101, the financial card waits to receive a command from a hostcomputer.

Step 102, the financial card determines a type of the command when thecommand from a host computer is received, if the financial carddetermines that the received command is an application selectingcommand, executes Step 103; if the financial card determines that thereceived command is a processing option acquiring command, executes Step104; if the financial card determines that the received command is anapplication data reading command, executes Step 105; if the financialcard determines that the received command is a verifying command and theverifying command is an offline fingerprint verifying command, executesStep 106; if the financial card determines that the received command isa verifying command and the verifying command is an online fingerprintverifying command, executes Step 107; if the financial card determinesthat the received command is an application cryptogram acquiringcommand, executes Step 108.

Step 103, the financial card sends application information supported byitself to the host computer.

In the present embodiment, the application information includesparameters of card issuer, for example, application name of a selectedapplication. The application information may include a ProcessingOptions Data Object List (PDOL) that requires data element to be sent tothe financial card by the host computer.

For example, the application selecting command received by the financialcard is specifically: 00 A4 04 00 07 A0 00 00 00 04 10 10; data of thefirst byte and the second byte of the obtained command, i.e. 00 A4, istaken as an identification of the application selecting, the data of thethird byte of the obtained command, i.e. 04, is taken as anidentification selected by name; the data of the fifth byte of theobtained command, i.e. 07, is taken as length of data field; the datafrom the sixth byte to the twelfth byte of the obtained command, i.e. A000 00 00 04 10 10 is taken as name of terminal application.

The application information organized by the financial card according tothe application name identification 84, the application name A0 00 00 0004 10 10, application priority 87 and preferred language 5F 2D isspecifically: 6F 49 84 07 A0 00 00 00 04 10 10 A5 3E 50 0A 4D 61 73 7465 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D61 73 74 65 72 43 61 72 64 BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F6E 06 06 43 00 00 30 30. In this case, the data of the third byte, i.e.84 is the identification of application name, the data from the fifthbyte to the eleventh byte, i.e. A0 00 00 00 04 10 10 is the applicationname; the data from the twenty-sixth byte to the twenty-seventh byte,i.e. 5F 2D is the identification of preferred language; the data of thethirty-third byte, i.e. 87 is application priority identification; thedata of the thirty-fifth byte, i.e. 01 is priority which representshighest priority.

Step 104, the financial card sends file information to the hostcomputer.

The file information includes an application file locator and anapplication interchange profile. In this case, the application filelocator lists a short file identification, a record number, number ofrecords and a location for saving static signing data required byoffline data verification corresponding to data need to be read fortransaction; the application interchange profile lists functionsexecuted in transaction processing, for example, static offline dataverification, dynamic offline data verification, compound dynamicoffline data verification, verification of card holder, etc. Theapplication interchange profile is written into the financial card whenexecuting personalizing.

If the processing option acquiring command includes terminal dataspecified in PDOL, the Step 104 further includes: the financial cardchecks the terminal data specified in the obtained PDOL, if checking issuccessful, the financial card sends the application file locator andthe application interchange profile to the host computer; if checking isfailed, the financial card sends information that usage condition is notsatisfied to the host computer.

For example, the processing option acquiring command received by thefinancial card is specifically: 80 A8 00 00 02 83 00, the data of thefirst byte and the second byte of the obtained command, i.e. 80 A8, istaken as identification of the processing option acquiring command;

Response data which is organized by the financial card according to theidentification of application interchange profile 82, the applicationinterchange profile 38 00, the identification of the application filelocator 94 and the application file locator 10 02 02 01 18 01 01 00 2001 01 00 28 01 02 00, and returned to the host computer is specifically:77 16 82 02 38 00 94 10 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00,in which the data of the third byte, i.e. 82, is the identification ofthe application interchange profile, the data of the fifth byte and thesixth byte, i.e. 38 00, is the application interchange profile; the dataof the seventh byte, i.e. 94, is the file locator identification; thedata from the ninth byte and the twenty-fourth byte, i.e. 10 02 02 01 1801 01 00 20 01 01 00 28 01 02 00, is the application file locator.

Step 105, the financial card sends application data corresponding to thefile identification in the application data reading command to the hostcomputer.

Specifically, the file identification may include the short fileidentification and the record number.

For example, the application data reading command received by thefinancial card is specifically: 00 B2 02 2C 00; the data of the firstbyte and the second byte, i.e. 00 B2, of the obtained command is takenas the identification of the application data reading command; the dataof the third byte and the fourth byte, i.e. 02 2C, of the obtainedcommand is taken as the record number and the short file identification,which indicates that the file corresponding to the second record numberin the fifth file is to be read.

The response data which is organized by the financial card according topublic key certificate identification, i.e. 9F 46, and the public keycertificate, i.e. 59 BB 97 63 1D 8B 85 78 53 18 21 34 63 BE 71 24 FF BB23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A53 A2 E35B 0B E7 E3 19 95 89 69 77 8D D5 0A38 DC BE 78 7F DE 46A2 89 BA 08 B2 286C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D5 6C3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B3 8674 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4B5 0C12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 28 6D 61 7C 28 EF 9B74 5A ED 3A C6 49 B4 10 17 A1 96 04 46, and returned to the hostcomputer is: 70 81 BA 9F 46 81 B0 59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 2735 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E ACF0 6A DF FB B3 86 74 BB 99 8 EF4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB21 12 86 C4 B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 286D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46 9F 49 03 9F 3704, in which the data of the fourth byte and the fifth byte, i.e. 9F 46,is the public key certificate identification; the data from the seventhdata to the one hundred and eighty-third byte, i.e. 59 BB 97 63 1D 8B 8578 53 18 21 34 63 BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F250 38 4B A7 B2 27 35 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 364F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC25 C1 66 EC EC FB 21 12 86 C4B5 0C 12 8C 02 E1 43 79 32 8B 4A48 0D4C DB80 AA 40 F6 28 6D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46,is the public key certificate.

Step 106, the financial card waits for the user to input fingerprint, ifthe fingerprint input by the user is obtained by the financial card, thefinancial card verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, the financial card returns information that offlinefingerprint verification is successful to the host computer; if theverification is failed, the financial card returns information thatoffline fingerprint verification is failed to the host computer.

For example, the offline fingerprint verifying command received by thefinancial card is specifically: 00 20 01 00 00; the data of the firstbyte and the second byte of the command, i.e. 00 20, is taken as theidentification of the verifying command; the data of the third byte ofthe command “01” is the identification of offline fingerprintverification.

Or, the offline fingerprint verifying command received by the financialcard is specifically: 00 21 00 00 00; the data of the first byte and thesecond byte of the command, i.e. 00 21, is taken as the identificationof offline fingerprint verifying command.

Further, if the verification in Step 106 is failed, the method furtherincludes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 106.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

Step 107, the financial card waits for the user to input thefingerprint; when the fingerprint of the user is obtained by thefinancial card, the financial card computes online fingerprint featureaccording to the obtained fingerprint and sends the online fingerprintfeature to the host computer.

For example, the online fingerprint verifying command received by thefinancial card is specifically: 00 20 02 00 00; the data of the firstbyte and the second byte, i.e. 00 20, of the command is taken as theidentification of verifying command, the data of the third byte, i.e.02, of the command is taken as the identification of verifying onlinefingerprint.

Further, in the Step 107, the method further includes: the financialcard encrypts the online fingerprint feature to obtain encrypted onlinefingerprint feature; correspondingly, that the financial card sends theonline fingerprint feature to the host computer is specifically: thefinancial card sends the encrypted online fingerprint feature to thehost computer.

Further, after the Step 107, the method further includes: if the hostcomputer receives the encrypted online fingerprint feature, the hostcomputer sends the encrypted online fingerprint feature to a server;after the server receives the online fingerprint feature, the serververifies the received online fingerprint feature according toself-stored fingerprint feature.

Or, when the online fingerprint feature is received by the hostcomputer, the host computer encrypts the online fingerprint feature toobtain the encrypted online fingerprint feature, sends the encryptedfingerprint feature to the server; after the server receives theencrypted online fingerprint feature, the server decrypts the encryptedonline fingerprint feature to obtain the online fingerprint feature andverifies the decrypted fingerprint feature according to self-storedfingerprint feature.

Step 108, the financial card executes card behavior analysis andgenerates application cryptogram, sends the application cryptogram tothe host computer.

For example, the application cryptogram acquiring command received bythe financial card is specifically: 80 AE 80 00 42 00 00 00 00 12 00 0000 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 0000 BE 05 0D 31 37E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00; the data of the first byte and thesecond byte of the obtained command, i.e. 80 AE, is taken as theidentification of the generate application cryptogram command.

The response data which is organized by the financial card according toan identification of ciphertext information data 27, the ciphertextinformation data 80, an identification of application cryptogram 26, theapplication cryptogram 81 4E F5 A4 E9 68 37 1B and returned to the hostcomputer is specifically: 77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 814E F5 A4 E9 68 37 1B 9F 10 12 01 10 A7 80 03 02 00 00 BE 05 00 00 00 0000 00 00 FF. In this case, the data of the fourth byte, i.e. 27, is theidentification of ciphertext information data, the data of the sixthbyte, i.e. 80, is the ciphertext information data indicating that typeof the application cryptogram is an authorization request; the data ofthe thirteenth byte, i.e. 26, is the identification of the applicationcryptogram, the data from the fifteenth byte to the twenty-third byte,i.e. 81 4E F5 A4 E9 68 37 1B, is application cryptogram.

In this embodiment, the host computer may be a transaction terminal or asmart terminal. When the financial card waiting for the user to input afingerprint, the host computer may prompt the user to input fingerprint.

Optionally, the method further includes: when the financial carddetermines that received command is verifying command and the verifyingcommand is specifically online verifying command in the Step 102, thefinancial card waits for the user to input the fingerprint; when thefingerprint input by the user is obtained by the financial card, thefinancial card verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, the financial card returns a self-stored online verificationcode to the host computer; otherwise, the financial card returnsinformation that the verification is failed to the host computer.

For example, the received command is specifically: 00 20 00 00 02 00 00,the data of the first byte and the second byte, i.e. 00 20, of theobtained command is taken as the identification of the verifyingcommand; the data of the sixth byte and the seventh byte, i.e. 00 00, ofthe obtained command is taken as the identification indicating that thefingerprint need to be input by the user and the online verificationcode need to be returned to the host computer.

Preferably, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is specifically offline verification code verifyingcommand in the Step 102, executes Step 109;

Step 109, the financial card waits for the user to input offlineverification code; if the financial card obtains the offlineverification code input by the user, the financial card verifies theoffline verification code input by the user according to self-storedoffline verification code, if the verification is successful, thefinancial card returns information that offline verification issuccessful to the host computer; otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

For example, the offline verification code verifying command received bythe financial card is specifically: 00 20 00 00 02 00 00; the data ofthe first byte and the second byte, i.e. 00 20, of the obtained commandis taken as the identification of verifying command; the data from thesixth byte to the seventh byte, i.e. 00 00, of the obtained command istaken as the identification indicating that the verification code needto be input by the user.

Further, in the Step 109, if the verification is failed, the methodfurther includes that: the financial card updates the number of thefailed verification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 106.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is specifically offline verification code verifyingcommand in the Step 102, executes Step 110;

Step 110, the financial card obtains an offline verification code fromthe offline verification code verifying command and verifies theobtained offline verification code according to self-stored offlineverification code, if the verification is successful, the financial cardreturns information that offline verification is successful; otherwise,the financial card returns information that offline verification isfailed to the host computer.

For example, the offline fingerprint verifying command received by thefinancial card is specifically: 00 20 00 00 02 12 34; the data of thefirst byte and the second byte of the obtained command, i.e. 00 20, istaken as the identification of verifying command, the data of the fifthbyte of the obtained command, i.e. 02, is taken as length ofverification code, the data of the sixth byte and the seventh byte ofthe obtained command, i.e. 1234, is taken as offline verification code;the financial card determines whether the verification code in thecommand is consistent with the self-stored verification code, if yes,the financial card returns information that offline verification issuccessful to the host computer; otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

Further, in Step 110, if the verification is failed, the method furtherincludes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 106.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is offline verifying command in the Step 102, executesthe following steps:

Step R01, the financial card determines whether an offline verificationcode is included in the offline verifying command, if yes, executes StepR02; otherwise, executes Step R03;

For example, if the offline verifying command received by the financialcard is 00 20 01 00 02 12 34, executes the Step RO; the data of thefirst byte and the second byte of the command, i.e. 00 20, is taken asidentification of the verifying command; the data of the third byte ofthe command, i.e. 01, is taken as the identification indicating that thefingerprint need to be input by the user, the data of the third byte ofthe command, i.e. 00 20, is taken as the identification of the verifyingcommand, the data of the fifth byte of the command, i.e. 02, is taken aslength of verification code, data of the sixth byte and the seventh byteof the command, i.e. 12 34, is taken as verification code; if theoffline verifying command received by the financial card is 00 20 00 0002 FF FF, executes the Step R03; the data of the first byte and thesecond byte of the command, i.e. 00 20, is taken as identification ofverifying command; the data of the fifth byte of the command, i.e. 02,is taken as length of verification code, the data of the sixth byte andthe seventh byte of the command, i.e. FF FF, is taken as identificationindicating that the fingerprint input by the user need to be verified.

Step R02, the financial card obtains the offline verification code fromthe offline verifying command, verifies the obtained offlineverification code according to self-stored offline verification code, ifthe verification is successful, executes the Step R03; otherwise, returninformation that offline verification is failed to the host computer.

For example, the financial card takes the data of the sixth byte to theseventh byte, i.e. 12 34, of the offline verifying command 00 20 00 0002 12 34 as the offline verification code, compares the taken offlineverification code 12 34 with self-stored offline verification code 1234, if they are consistent, executes Step R03.

Step R03, the financial card waits for the user to input fingerprint;when the fingerprint input by the user is obtained, the financial cardverifies the fingerprint input by the user according to self-stored userregistration fingerprint, if the verification is successful, thefinancial card returns information that offline fingerprint verificationis successful to the host computer, otherwise, the financial cardreturns information that offline fingerprint verification is failed tothe host computer.

In the technical solution provided by the present embodiment, if theuser remembers the offline verification code, the user can choose toinput the offline verification code on the host computer, thetransaction would be more safer through the offline verification codeand fingerprint two-step verification; if the user forgets the offlineverification code, transaction can be executed without inputting theoffline verification code on the host computer, the financial card willnot stop executing transaction if the user forgot the offlineverification code, which brings good experience to the user.

Further, in the Step R02, if the verification is failed, the methodfurther includes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 106.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verifying times. Further, if the financial carddetermines that the number of failed verifying times does not exceed thepreset number, the method further includes: the financial card displaysthe number of remaining verification times.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is offline verifying command in Step 102, executes thefollowing steps:

Step R11, the financial card determines whether the offline verifyingcommand includes the offline verification code, if yes, executes StepR12; otherwise, executes Step R13;

For example, if the offline verifying command received by the financialcard is 00 20 01 00 02 12 34, executes the Step R12; the data of thefirst byte and the second byte of the command, i.e. 00 20, is taken asidentification of the verifying command; the data of the third byte ofthe command, i.e. 01, is taken as the identification indicating that thefingerprint input by the user need to be verified, the data of the thirdbyte of the obtained command, i.e. 00 20, is taken as the identificationof the verifying command, the data of the fifth byte of the obtainedcommand, i.e. 02, is taken as length of verification code, the data ofthe sixth byte and the seventh byte of the obtained command, i.e. 12 34,is taken as verification code; if the offline verifying command receivedby the financial card is 00 20 00 00 02 00 00, executes the Step R13;the data of the first byte and the second byte of the obtained command,i.e. 00 20, is taken as identification of verify command; the data ofthe fifth byte of the obtained command, i.e. 02, is taken as length ofverification code, the data of the sixth byte and the seventh byte ofthe obtained command, i.e. 00 00, is taken as identification indicatingthat the fingerprint input by the user need to be verified.

Step R12, the financial card obtains offline verification code from theoffline verifying command, verifies the obtained offline verificationcode according to self-stored offline verification code, if theverification is successful, the financial card returns information thatoffline verification is successful to the host computer, otherwise, thefinancial card returns information that offline verification is failedto the host computer.

For example, the financial card takes the data of the sixth byte to theseventh byte, i.e. 12 34, of the offline verifying command 00 20 00 0002 12 34 as the offline verification code, compares the taken offlineverification code 12 34 with self-stored offline verification code 1234, if they are consistent, the financial card returns information thatoffline verification is successful to the host computer.

Step R13, the financial card waits for the user to input fingerprint, ifthe fingerprint input by the user is obtained, the financial cardverifies the fingerprint input by the user according to self-stored userregistration fingerprint, if the verification is successful, thefinancial card returns information that offline verification issuccessful to the host computer, otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

Optionally, before the Step 101 of the present embodiment, the methodfurther includes: when a boot-up event is received by the financialcard, the financial card executes boot-up verification according toself-stored user registration fingerprint and the fingerprint input bythe user, if the verification is successful, executes Step 101.

Specifically, in the present embodiment, the financial card receivesboot-up event is specifically: the financial card being powered up, orthe financial card receives the boot-up event from a user. For example,the financial card being powered up is specifically: the financial cardis powered up by inserting the financial card in the card slot of acontact card reader, then the contact card reader is used to supply thefinancial card; or the financial card is powered up by enteringcontactless field of a contactless card reader, then the contactlesscard reader is used to supply the financial card; the financial cardreceives a boot-up event from the user is specifically: after the userpresses power key of the financial card, the financial card receives theboot-up event. In the present embodiment, after the user presses thepower key, the financial card is powered off automatically in a presettime, or the user presses power-off key to turn off.

Specifically, the financial card executes boot-up verification accordingto the fingerprint input by the user according to self-stored userregistration fingerprint, specifically includes:

Step T1, the financial card prompts the user to input fingerprint;

Step T2, when the fingerprint input by the user is obtained by thefinancial card, verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, executes Step 101;

Further, if the verification in the Step T2 is failed, the methodfurther includes: the financial card updates the number of the failedverification times, determines whether the number of failed verificationtimes exceeds a preset number, if yes, ends the procedure; otherwise,executes the Step T1; for example, if the preset number is 3, updatingthe number of the failed verification times is specifically adding 1 tothe number of failed verification times.

Furthermore, if the financial card determines that the number of failedverification times does not exceed the preset number, in process ofwaiting for the user to input the fingerprint or before waiting for theuser to input fingerprint, the method further includes: the financialcard updates the number of remaining verification times and displays theupdated number of remaining verification times. For example, the methodfor updating the number of the remaining verification times is: thenumber of remaining verification times=the preset number−the number offailed verification times.

In the present embodiment, the financial card executes boot-upverification according to self-stored user registration fingerprint andthe fingerprint input by the user is specifically: the financial cardcomputes fingerprint feature according to the fingerprint input by theuser, determines whether the computed fingerprint feature is consistentwith the fingerprint feature of self-stored user registrationfingerprint, if yes, the verification is successful; otherwise, theverification is failed.

If the verification is successful, the method further includes: thefinancial card stores the computed fingerprint feature;

Step 107 may also specifically include: the financial card sends thestored fingerprint feature to the host computer.

The file information sent by the financial card to the host computer inthe Step 104 includes record information related to the fingerprintfeature; specifically, the record information related to the fingerprintfeature includes a short file identification of the file included thefingerprint feature and a corresponding record number;

the application data sent by the financial card to the host in the Step105 computer includes fingerprint feature corresponding to the recordinformation of the fingerprint feature in the application data readingcommand. Specifically, the record information of the fingerprint featurespecifically includes the short file identification of the file includedthe fingerprint feature and the corresponding record number.

In the present embodiment, when the financial card executes boot-upverification according to self-registered fingerprint and thefingerprint input by the user and the verification is successful, themethod further includes: the financial card stores a result ofsuccessful verification.

Step 106 may also specifically include: the financial card generatesinformation that offline fingerprint verification is successfulaccording to the result of successful verification and sends theinformation that the offline fingerprint verification is successful tothe host computer.

In the present embodiment, when before the Step 101, the method furthercomprises: if the financial card receives a boot-up event, executing, bythe financial card, boot-up verification according to a self-stored userregistration fingerprint and a fingerprint input by a user, and if theverification is successful: the file information sent by the financialcard to the host computer in the Step 104 includes record informationrelated to the online verification code; specifically, the recordinformation related to the online verification code includes a shortfile identification of a file included the online verification and thecorresponding record number;

the application data sent by the financial card to the host computer inStep 105 includes online verification code corresponding to the recordinformation of the online verification code in the application datareading command. Specifically, the record information of the onlineverification code specifically includes a short file identification of afile included the online verification code and a corresponding recordnumber.

In the present embodiment, the financial card executes boot-upverification according to self-stored user registration fingerprint andthe fingerprint input by the user can be replaced by: the financial cardexecutes boot-up verification according to self-stored boot-upverification code and the fingerprint input by the user.

Specifically, the financial card executes boot-up verification accordingto self-stored boot-up verification code and the boot-up verificationcode input by the user specifically includes:

Step M1, the financial card prompts the user to input the boot-upverification code;

Step M2, when the boot-up verification code input by the user isobtained by the financial card, the financial card verifies the boot-upverification code input by the user according to self-stored boot-upverification code, if the verification is successful, executes Step 101;

Further, if the verification in Step M2 is failed, the method furtherincludes: the financial card updates the number of the failedverification times, determines whether the number of failed verificationtimes exceeds a preset number, if yes, ends the procedure; otherwise,executes the Step T1; for example, if the preset number is 3, updatingthe number of the failed verification times is specifically adding 1 tothe number of failed verification times.

Furthermore, if the financial card determines that the number of failedverification times does not exceed the preset number, in process ofwaiting for the user to input the fingerprint or before waiting for theuser to input fingerprint, the method further includes: the financialcard updates the number of remaining verification times and displays theupdated number of remaining verification times. For example, the methodfor updating the number of the remaining verification times is: thenumber of remaining verification times=the preset number−the number offailed verification times.

Preferably, the Step 102 further includes: if the received command istransaction verifying command, executes Step S0.

Step S0, the financial card prompts the user to input transactionverifying information; after the transaction verifying information inputby the user is received, the financial card verifies transactionverifying information input by the user, if the verification issuccessful, the financial card returns information that the verificationis successful to the host computer; otherwise, the financial cardreturns information that the verification is failed to the host computerand ends transaction.

Specifically, Step S0 specifically includes:

Step S01, the financial card prompts the user to input fingerprint;

Step S02, the financial card receives fingerprint input by the user.

Step S03, the financial card verifies the fingerprint input by the useraccording to self-stored user registration fingerprint, if theverification is successful, the financial card generates informationthat the verification is successful and returns information that theverification is successful to the host computer; otherwise, thefinancial card generates information that the verification is failed andreturns information that the verification is failed to the host computerand ends transaction.

In the present embodiment, in Step S03, the financial card verifies thefingerprint input by the user according to self-stored user registrationfingerprint is specifically: the financial card computes fingerprintfeature according to the fingerprint input by the user, determineswhether the computed fingerprint feature is consistent with thefingerprint feature of self-stored user registration fingerprint, ifyes, the verification is successful; otherwise, the verification isfailed;

if the verification in the Step S03 is successful, further includes: thefinancial card stores the fingerprint feature computed according to thefingerprint input by the user;

Correspondingly, the Step 107 in the present embodiment may also be: thefinancial card sends the stored fingerprint feature to the hostcomputer.

In the present embodiment, Step 106 may also be: the financial cardgenerates a result of successful offline fingerprint verificationaccording to information that the verification is successful and sendsthe result of successful offline fingerprint verification to the hostcomputer.

Or, the Step S0 may also specifically include:

Step L01, the financial card prompts the user to input a transactionverification code;

Step L02, the financial card obtains the transaction verification codeinput by the user;

Step L03, the financial card verifies the transaction verification codeinput by the user according to self-stored transaction verificationcode, if the verification is successful, the financial card generatesinformation that the verification is successful and returns informationthat the verification is successful to the host computer; otherwise, thefinancial card generates information that the verification is failed andreturns information that the verification is failed to the host computerand ends transaction.

Or, Step S0 may also specifically include:

Step W01, the financial card obtains the transaction verification codefrom the transaction verifying command;

Step W02, the financial card obtains the transaction verification codefrom the transaction verifying command according to self-storedverification code, if the verification is successful, the financial cardgenerates information that the verification is successful and sends theinformation that the verification is successful to the host computer;otherwise, the financial card generates information that theverification is failed and sends information that the verification isfailed to the host computer, ends transaction.

The method in the present embodiment further includes: if the commandreceived is verifying command and the verifying command is offlineverification code verifying command in Step 102, the financial cardgenerates a result of successful offline verification code verificationaccording to the offline verification code verifying command and sendsthe result of successful offline verification code verification to thehost computer.

Optionally, in the present embodiment, the financial card generatesapplication cryptogram may be specifically: the financial card generatesapplication cryptogram according to the information that offlinefingerprint verification is successful or the information that offlinefingerprint verification is failed.

In the present embodiment, when the financial card waits for the user toinput fingerprint, the method further includes that the financial cardprompts the user to input fingerprint.

Specifically, the financial card prompts the user to input fingerprintis specifically: the financial card prompts the user to inputfingerprint via a display screen, an indicator light or voice.

In the present disclosure, the method further includes an operation ofentering a fingerprint on the financial card. In the present embodiment,the self-stored user registration fingerprint of the financial card isregistered and entered during the operation of entering a fingerprint.

In the present disclosure, the operation of entering the fingerprint onthe financial card may be executed when the financial card ispersonalized, the user enters the fingerprint at the bank service desk;or when the user himself/herself enters the fingerprint on the financialcard.

Specifically, the operation of entering the fingerprint on the financialis specifically: the financial card receives a fingerprint enteringevent, waits for the user to enter the fingerprint, when the fingerprintentered by the user is received by the financial card, the financialcard stores the entered fingerprint; or the operation of entering thefingerprint on the financial is specifically: when the financial cardreceives the fingerprint entering command (the financial card ispersonalized) from the host computer, the financial card waits for theuser to enter fingerprint; when the financial card receives thefingerprint entered by the user, the financial card stores the enteredfingerprint.

Further, the financial card receives a fingerprint entering event isspecifically: the financial card receives the fingerprint entering eventfrom the user (the user enters the fingerprint by himself/herself). Forexample, the financial card receives the fingerprint entering event fromthe user is specifically: after the user presses a fingerprint enteringfunction key on the financial card, the financial card receives thefingerprint entering event from the user; or the user presses a functionkey, the financial key displays a function menu, when the user selectsfingerprint entering function in the function menu, the financial cardreceives the fingerprint entering event from the user.

In the present embodiment, after the financial card receives thefingerprint entering event or the fingerprint entering command, themethod further includes that the financial card prompts the user toenter fingerprint; specifically, the financial card prompts the user toenter fingerprint via one or more of display screen, indicator light orvoice.

The operation of entering the fingerprint on the financial may alsospecifically include: the financial card receives a fingerprint from afingerprint collector (the fingerprint entered when the financial cardis personalized), and stores the received fingerprint.

Optionally, in the method of the present embodiment, the financial cardexecutes data communication with the host computer via Bluetooth; thefinancial card may also execute data communication with the hostcomputer via contact way or contactless way.

Optionally, in the present embodiment, after the financial card executeseach step of the Step 103 to the Step 110, the method further includesthat the financial card executes operating of the Step 101.

Embodiment 3

The present embodiment provides a working method for a financial cardwith function of fingerprint verification. As shown in FIGS. 2A-2C, themethod includes:

Step 200, the financial card prompts a user to input boot-up verifyinginformation when a boot-up event is received by the financial card,executes boot-up verification according to the boot-up verifyinginformation input by a user, if the verification is successful, executesStep 201; if the verification is failed, ends procedure.

Specifically, the financial card receives boot-up event is specifically:the financial card being powered up, or the financial card receives theboot-up event from a user. For example, the financial card being poweredup is specifically: the financial card is powered up by inserting thefinancial card in the card slot of a contact card reader, then thecontact card reader is used to supply the financial card; or thefinancial card is powered up by entering contactless field of acontactless card reader, then the contactless card reader is used tosupply the financial card; the financial card receives a boot-up eventfrom the user is specifically: after the user presses power key of thefinancial card, the financial card receives the boot-up event. In thepresent embodiment, after the user presses the power key, the financialcard is powered off automatically in a preset time, or the user pressespower-off key to turn off.

In the present embodiment, the financial card prompts the user to inputboot-up verifying information and executes boot-up verificationaccording to the boot-up verifying information specifically includes:the financial card prompts the user to input fingerprint and executesboot-up verification according to self-stored user registrationfingerprint and the fingerprint input by the user; or the financial cardprompts the user to input boot-up verification code and executes boot-upverification according to self-stored boot-up verification code and theboot-up verification code input by the user.

Specifically, the financial card prompts the user to input fingerprintand executes boot-up verification according to self-stored userregistration fingerprint and the fingerprint input by the userspecifically includes:

Step T1, the financial card prompts the user to input fingerprint;

Step T2, when the fingerprint input by the user is obtained by thefinancial card, verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, executes Step 201.

Further, if the verification in the Step T2 is failed, the methodfurther includes: the financial card updates the number of the failedverification times, determines whether the number of failed verificationtimes exceeds a preset number, if yes, ends the procedure; otherwise,executes the Step T1; for example, if the preset number is 3, updatingthe number of the failed verification times is specifically adding 1 tothe number of failed verification times.

Furthermore, if the financial card determines that the number of failedverification times does not exceed the preset number, in process ofwaiting for the user to input the fingerprint or before waiting for theuser to input fingerprint, the method further includes: the financialcard updates the number of remaining verification times and displays theupdated number of remaining verification times. For example, the methodfor updating the number of the remaining verification times is: thenumber of remaining verification times=the preset number−the number offailed verification times.

Specifically, the financial card prompts the user to input the boot-upverification code, and executes boot-up verification according toself-stored boot-up verification code and the verification code input bythe user specifically includes:

Step M1, the financial card prompts the user to input boot-upverification code;

Step M2, when the boot-up verification code input by the user isobtained by the financial card, the financial card verifies the boot-upverification code input by the user according to self-stored boot-upverification code, if the verification is successful, executes Step 201;if the verification failed, goes back to the Step M1 or ends procedure.

Further, if the verification in Step M2 is failed, the method furtherincludes: the financial card updates the number of the failedverification times, determines whether the number of failed verificationtimes exceeds a preset number, if yes, ends the procedure; otherwise,executes the Step T1; for example, if the preset number is 3, updatingthe number of the failed verification times is specifically adding 1 tothe number of failed verification times.

Furthermore, if the financial card determines that the number of failedverification times does not exceed the preset number, in process ofwaiting for the user to input the fingerprint or before waiting for theuser to input fingerprint, the method further includes: the financialcard updates the number of remaining verification times and displays theupdated number of remaining verification times. For example, the methodfor updating the number of the remaining verification times is: thenumber of remaining verification times=the preset number−the number offailed verification times.

Step 201, the financial card waits to receive a command from a hostcomputer;

Step 202, the financial card determines a type of the command when thecommand from the host computer is received, if the financial carddetermines that the type of the command is an application selectingcommand, executes Step S203; if the financial card determines that thetype of the command is a processing option acquiring command, executesStep S204; if the financial card determines that the type of the commandis an application data reading command, executes Step S205; if thefinancial card determines that the type of the command is an applicationcryptogram acquiring command, executes Step S206.

Step 203, the financial card sends application information supported byitself to the host computer.

In the present embodiment, the application information includesparameters of card issuer, for example, application name of a selectedapplication. The application information may include a ProcessingOptions Data Object List (PDOL) that requires data element to be sent tothe financial card by the host computer.

For example, the application selecting command received by the financialcard is specifically: 00 A4 04 00 07 A0 00 00 00 04 10 10; data of thefirst byte and the second byte of the obtained command, i.e. 00 A4, istaken as an identification of the application selecting, the data of thethird byte of the obtained command, i.e. 04, is taken as anidentification selected by name; the data of the fifth byte of theobtained command, i.e. 07, is taken as length of data field; the datafrom the sixth byte to the twelfth byte of the obtained command, i.e. A000 00 00 04 10 10 is taken as name of terminal application.

The application information organized by the financial card according tothe application name identification 84, the application name A0 00 00 0004 10 10, application priority 87 and preferred language 5F 2D isspecifically: 6F 49 84 07 A0 00 00 00 04 10 10 A5 3E 50 0A 4D 61 73 7465 72 43 61 72 64 5F 2D 04 72 75 65 6E 87 01 01 9F 11 01 01 9F 12 0A 4D61 73 74 65 72 43 61 72 64 BF 0C 14 9F 4D 02 0B 0A 9F 5D 03 00 00 00 9F6E 06 06 43 00 00 30 30. In this case, the data of the third byte, i.e.84 is the identification of application name, the data from the fifthbyte to the eleventh byte, i.e. A0 00 00 00 04 10 10 is the applicationname; the data from the twenty-sixth byte to the twenty-seventh byte,i.e. 5F 2D is the identification of preferred language; the data of thethirty-third byte, i.e. 87 is application priority identification; thedata of the thirty-fifth byte, i.e. 01 is priority which representshighest priority.

Step 204, the financial card sends file information to the hostcomputer.

The file information includes an application file locator and anapplication interchange profile. In this case, the application filelocator lists a short file identification, a record number, number ofrecords and a location for saving static signing data required byoffline data verification corresponding to data need to be read fortransaction; the application interchange profile lists functionsexecuted in transaction processing, for example, static offline dataverification, dynamic offline data verification, compound dynamicoffline data verification, verification of card holder, etc. Theapplication interchange profile is written into the financial card whenexecuting personalizing.

If the processing option acquiring command includes terminal dataspecified in PDOL, the Step 204 further includes: the financial cardchecks the terminal data specified in the obtained PDOL, if checking issuccessful, the financial card sends the application file locator andthe application interchange profile to the host computer; if checking isfailed, the financial card sends information that usage condition is notsatisfied to the host computer.

For example, the processing option acquiring command received by thefinancial card is specifically: 80 A8 00 00 02 83 00, the data of thefirst byte and the second byte of the obtained command, i.e. 80 A8, istaken as identification of the processing option acquiring command;

Response data which is organized by the financial card according to theidentification of application interchange profile 82, the applicationinterchange profile 38 00, the identification of the application filelocator 94 and the application file locator 10 02 02 01 18 01 01 00 2001 01 00 28 01 02 00, and returned to the host computer is specifically:77 16 82 02 38 00 94 10 10 02 02 01 18 01 01 00 20 01 01 00 28 01 02 00,in which the data of the third byte, i.e. 82, is the identification ofthe application interchange profile, the data of the fifth byte and thesixth byte, i.e. 38 00, is the application interchange profile; the dataof the seventh byte, i.e. 94, is the file locator identification; thedata from the ninth byte and the twenty-fourth byte, i.e. 10 02 02 01 1801 01 00 20 01 01 00 28 01 02 00, is the application file locator.

Step 205, the financial card sends application data corresponding to thefile identification in the application data reading command to the hostcomputer.

Specifically, the file identification may include the short fileidentification and the record number.

For example, the application data reading command received by thefinancial card is specifically: 00 B2 02 2C 00; the data of the firstbyte and the second byte, i.e. 00 B2, of the obtained command is takenas the identification of the application data reading command; the dataof the third byte and the fourth byte, i.e. 02 2C, of the obtainedcommand is taken as the record number and the short file identification,which indicates that the file corresponding to the second record numberin the fifth file is to be read.

The response data which is organized by the financial card according topublic key certificate identification, i.e. 9F 46, and the public keycertificate, i.e. 59 BB 97 63 1D 8B 85 78 53 18 21 34 63 BE 71 24 FF BB23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81 CF 0A 53 A2 E35B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46 A2 89 BA 08 B228 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 27 35 3F 99 C1 D56C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E AC F0 6A DF FB B386 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB 21 12 86 C4 B50C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 28 6D 61 7C 28 EF9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46, and returned to the hostcomputer is: 70 81 BA 9F 46 81 B0 59 BB 97 63 1D 8B 85 78 53 18 21 34 63BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF 2E 21 1E CB 0C 81CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38 DC BE 78 7F DE 46A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F2 50 38 4B A7 B2 2735 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 36 4F 19 EE EC 5E ACF0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC 25 C1 66 EC EC FB21 12 86 C4 B5 0C 12 8C 02 E1 43 79 32 8B 4A 48 0D 4C DB 80 AA 40 F6 286D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46 9F 49 03 9F 3704, in which the data of the fourth byte and the fifth byte, i.e. 9F 46,is the public key certificate identification; the data from the seventhdata to the one hundred and eighty-third byte, i.e. 59 BB 97 63 1D 8B 8578 53 18 21 34 63 BE 71 24 FF BB 23 DF E5 F4 AA CA 08 3C 48 88 77 1E CF2E 21 1E CB 0C 81 CF 0A 53 A2 E3 5B 0B E7 E3 19 95 89 69 77 8D D5 0A 38DC BE 78 7F DE 46 A2 89 BA 08 B2 28 6C 97 BF 27 12 30 85 7F 2A 56 AC F250 38 4B A7 B2 2735 3F 99 C1 D5 6C 3A DD DA 53 17 3C A8 8B 63 8C 0C 364F 19 EE EC 5E AC F0 6A DF FB B3 86 74 BB 99 8E F4 1D FD B8 11 E9 4E FC25 C1 66 EC EC FB 21 12 86 C4B5 0C 12 8C 02 E1 43 79 32 8B 4A48 0D4C DB80 AA 40 F6 28 6D 61 7C 28 EF 9B 74 5A ED 3A C6 49 B4 10 17 A1 96 04 46,is the public key certificate.

Step 206, the financial card executes card behavior analysis andgenerates application cryptogram, sends the application cryptogram tothe host computer.

For example, the application cryptogram acquiring command received bythe financial card is specifically: 80 AE 80 00 42 00 00 00 00 12 00 0000 00 00 00 00 06 43 00 80 00 08 00 06 43 17 08 16 00 3A CF 3B 63 22 0000 BE 05 0D 31 37 E8 6F F6 44 03 02 14 05 30 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00; the data of the first byte and thesecond byte of the obtained command, i.e. 80 AE, is taken as theidentification of the generate application cryptogram command.

The response data which is organized by the financial card according toan identification of ciphertext information data 27, the ciphertextinformation data 80, an identification of application cryptogram 26, theapplication cryptogram 81 4E F5 A4 E9 68 37 1B and returned to the hostcomputer is specifically: 77 29 9F 27 01 80 9F 36 02 03 99 9F 26 08 814E F5 A4 E9 68 37 1B 9F 10 12 01 10 A7 80 03 02 00 00 BE 05 00 00 00 0000 00 00 FF. In this case, the data of the fourth byte, i.e. 27, is theidentification of ciphertext information data, the data of the sixthbyte, i.e. 80, is the ciphertext information data indicating that typeof the application cryptogram is an authorization request; the data ofthe thirteenth byte, i.e. 26, is the identification of the applicationcryptogram, the data from the fifteenth byte to the twenty-third byte,i.e. 81 4E F5 A4 E9 68 37 1B, is application cryptogram.

In this embodiment, the host computer may be a transaction terminal or asmart terminal. When the financial card waiting for the user to input afingerprint, the host computer may prompt the user to input fingerprint.

Optionally, the file information sent by the financial card to the hostcomputer in the Step 204 includes record information related to theonline verification code; specifically, the record information relatedto the online verification code includes a short file identification ofa file included the online verification and the corresponding recordnumber.

Correspondingly, the application data sent by the financial card to thehost computer in Step 205 includes online verification codecorresponding to the record information of the online verification codein the application data reading command. Specifically, the recordinformation of the online verification code specifically includes ashort file identification of a file included the online verificationcode and a corresponding record number.

Optionally, in the Step T2, the financial card executes boot-upverification according to self-stored user registration fingerprint andthe fingerprint input by the user is specifically: the financial cardcomputes fingerprint feature according to the fingerprint input by theuser, determines whether the computed fingerprint feature is consistentwith the fingerprint feature of self-stored user registrationfingerprint, if yes, the verification is successful; otherwise, theverification is failed.

In Step T2, if the boot-up verification is successful, the methodfurther includes: the financial card stores the computed fingerprintfeature.

Correspondingly, the file information sent by the financial card to thehost computer in the Step 204 includes record information related to thefingerprint feature; specifically, the record information related to thefingerprint feature includes a short file identification of the fileincluded the fingerprint feature and a corresponding record number.

Correspondingly, the application data sent by the financial card to thehost in the Step 205 computer includes fingerprint feature correspondingto the record information of the fingerprint feature in the applicationdata reading command. Specifically, the record information of thefingerprint feature specifically includes the short file identificationof the file included the fingerprint feature and the correspondingrecord number.

Optionally, the method further includes: if the financial carddetermines that the received command is verifying command and theverifying command is offline fingerprint verifying command in Step 202,executes Step 207.

Step 207, the financial card waits for the user to input fingerprint, ifthe fingerprint input by the user is obtained by the financial card, thefinancial card verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, the financial card returns information that offlinefingerprint verification is successful to the host computer; otherwise,the financial card returns information that offline fingerprintverification is failed to the host computer.

For example, the offline fingerprint verifying command received by thefinancial card is specifically: 00 20 01 00 00; the data of the firstbyte and the second byte of the command, i.e. 00 20, is taken as theidentification of the verifying command; the data of the third byte ofthe command “01” is the identification of offline fingerprintverification.

Or, the offline fingerprint verifying command received by the financialcard is specifically: 00 21 00 00 00; the data of the first byte and thesecond byte of the command, i.e. 00 21, is taken as the identificationof offline fingerprint verifying command.

Further, if the verification in Step 207 is failed, the method furtherincludes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 207.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

In the present embodiment, when the verification in the Step T2 issuccessful, the method further includes: the financial card stores theresult of successful verification;

The Step 207 may also specifically include: the financial card generatesinformation that offline fingerprint verification is successfulaccording to the result of successful verification and sends theinformation that the offline fingerprint verification is successful tothe host computer.

Optionally, the method further includes: if the financial carddetermines that the received command is verifying command, and theverifying command is specifically online fingerprint verifying commandin Step 202, executes Step 208.

Step 208, the financial card waits for the user to input thefingerprint; when the fingerprint of the user is obtained by thefinancial card, the financial card computes online fingerprint featureaccording to the obtained fingerprint and sends the online fingerprintfeature to the host computer.

For example, the online fingerprint verifying command received by thefinancial card is specifically: 00 20 02 00 00; the data of the firstbyte and the second byte, i.e. 00 20, of the command is taken as theidentification of verifying command, the data of the third byte, i.e.02, of the command is taken as the identification of verifying onlinefingerprint.

Further, in the Step 208, the method further includes: the financialcard encrypts the online fingerprint feature to obtain encrypted onlinefingerprint feature, correspondingly, that the financial card sends theonline fingerprint feature to the host computer is specifically: thefinancial card sends the encrypted online fingerprint feature to thehost computer.

Further, after the Step 208, the method further includes: if the hostcomputer receives the encrypted online fingerprint feature, the hostcomputer sends the encrypted online fingerprint feature to a server,when the online fingerprint feature is received by the host computer,the host computer encrypts the online fingerprint feature to obtain theencrypted online fingerprint feature, sends the encrypted fingerprintfeature to the server, after the server receives the encrypted onlinefingerprint feature, the server decrypts the encrypted onlinefingerprint feature to obtain the online fingerprint feature andverifies the decrypted fingerprint feature according to self-storedfingerprint feature.

In the present disclosure, in the Step T2, the financial card executesboot-up verification according to self-stored user registrationfingerprint and the fingerprint input by the user is specifically: thefinancial card computes fingerprint feature according to the fingerprintinput by the user, determines whether the computed fingerprint featureis consistent with the fingerprint feature of self-stored userregistration fingerprint, if yes, the verification is successful;otherwise, the verification is failed; if the verification issuccessful, the method further includes: the financial card stores thecomputed fingerprint feature.

The Step 208 may also specifically include: the financial card sends thestored fingerprint feature to the host computer.

Optionally, the method further includes: when the financial carddetermines that received command is verifying command and the verifyingcommand is specifically online verifying command in the Step 202, thefinancial card waits for the user to input the fingerprint; when thefingerprint input by the user is obtained by the financial card, thefinancial card verifies the fingerprint input by the user according toself-stored user registration fingerprint, if the verification issuccessful, the financial card returns a self-stored online verificationcode to the host computer; otherwise, the financial card returnsinformation that the verification is failed to the host computer.

For example, the received command is specifically: 00 20 00 00 02 00 00,the data of the first byte and the second byte, i.e. 00 20, of theobtained command is taken as the identification of the verifyingcommand; the data of the sixth byte and the seventh byte, i.e. 00 00, ofthe obtained command is taken as the identification indicating that thefingerprint need to be input by the user and the online verificationcode need to be returned to the host computer.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is specifically offline verification code verifyingcommand in the Step 202, executes Step 209.

Step 209, the financial card waits for the user to input offlineverification code; if the financial card obtains the offlineverification code input by the user, the financial card verifies theoffline verification code input by the user according to self-storedoffline verification code, if the verification is successful, thefinancial card returns information that offline verification issuccessful to the host computer; otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

For example, the offline verification code verifying command received bythe financial card is specifically: 00 20 00 00 02 00 00; the data ofthe first byte and the second byte, i.e. 00 20, of the obtained commandis taken as the identification of verifying command; the data from thesixth byte to the seventh byte, i.e. 00 00, of the obtained command istaken as the identification indicating that the verification code needto be input by the user.

Further, in the Step 209, if the verification is failed, the methodfurther includes that: the financial card updates the number of thefailed verification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step 209.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

In the present embodiment, if the verification in the Step M2 issuccessful, the method further includes: the financial card stores aresult of successful verification;

The Step 209 may also specifically include: the financial card generatesa result of successful offline verification according to a stored resultof successful verification and sends the result of successful offlineverification code verification to the host computer.

Optionally, the method further includes: if the financial carddetermines that the received command is verifying command and theverifying command is offline code verifying command in Step 202,executes Step 210;

Step 210, the financial card obtains an offline verification code fromthe offline verification code verifying command and verifies theobtained offline verification code according to self-stored offlineverification code, if the verification is successful, the financial cardreturns information that offline verification is successful; otherwise,the financial card returns information that offline verification isfailed to the host computer.

For example, the offline fingerprint verifying command received by thefinancial card is specifically: 00 20 00 00 02 12 34; the data of thefirst byte and the second byte of the obtained command, i.e. 00 20, istaken as the identification of verifying command, the data of the fifthbyte of the obtained command, i.e. 02, is taken as length ofverification code, the data of the sixth byte and the seventh byte ofthe obtained command, i.e. 12 34, is taken as offline verification code;the financial card determines whether the verification code in thecommand is consistent with the self-stored verification code, if yes,the financial card returns information that offline verification issuccessful to the host computer; otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

Further, in Step 210, if the verification is failed, the method furtherincludes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, goes back to execute the Step 210. Forexample, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verification times. Further, if the financial carddetermines that the number of failed verification times does not exceedthe preset number, the method further includes: the financial carddisplays the number of remaining verification times.

In the present embodiment, when the verification is successful in StepM2, the method further includes that the financial card stores a resultof successful verification.

The Step 210 may also specifically include: the financial card generatesinformation that offline fingerprint verification is successfulaccording to the result of successful verification and sends theinformation that offline fingerprint verification is successful to thehost computer.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is offline verifying command in the Step 202, executesthe following steps:

Step R01, the financial card determines whether an offline verificationcode is included in the offline verifying command, if yes, executes StepR02; otherwise, executes Step R03.

For example, if the offline verifying command received by the financialcard is 00 20 01 00 02 12 34, executes the Step RO; the data of thefirst byte and the second byte of the command, i.e. 00 20, is taken asidentification of the verifying command; the data of the third byte ofthe command, i.e. 01, is taken as the identification indicating that thefingerprint need to be input by the user, the data of the third byte ofthe command, i.e. 00 20, is taken as the identification of the verifyingcommand, the data of the fifth byte of the command, i.e. 02, is taken aslength of verification code, data of the sixth byte and the seventh byteof the command, i.e. 12 34, is taken as verification code; if theoffline verifying command received by the financial card is 00 20 00 0002 FF FF, executes the Step R03; the data of the first byte and thesecond byte of the command, i.e. 00 20, is taken as identification ofverifying command; the data of the fifth byte of the command, i.e. 02,is taken as length of verification code, the data of the sixth byte andthe seventh byte of the command, i.e. FF FF, is taken as identificationindicating that the fingerprint input by the user need to be verified.

Step R02, the financial card obtains the offline verification code fromthe offline verifying command, verifies the obtained offlineverification code according to self-stored offline verification code, ifthe verification is successful, executes the Step R03; otherwise, returninformation that offline verification is failed to the host computer.

For example, the financial card takes the data of the sixth byte to theseventh byte, i.e. 12 34, of the offline verifying command 00 20 00 0002 12 34 as the offline verification code, compares the taken offlineverification code 12 34 with self-stored offline verification code 1234, if they are consistent, executes Step R03.

Step R03, the financial card waits for the user to input fingerprint;when the fingerprint input by the user is obtained, the financial cardverifies the fingerprint input by the user according to self-stored userregistration fingerprint, if the verification is successful, thefinancial card returns information that offline fingerprint verificationis successful to the host computer, otherwise, the financial cardreturns information that offline fingerprint verification is failed tothe host computer.

In the technical solution provided by the present embodiment, if theuser remembers the offline verification code, the user can choose toinput the offline verification code on the host computer, thetransaction would be more safer through the offline verification codeand fingerprint two-step verification; if the user forgets the offlineverification code, transaction can be executed without inputting theoffline verification code on the host computer, the financial card willnot stop executing transaction if the user forgot the offlineverification code, which brings good experience to the user.

Further, in the Step R02, if the verification is failed, the methodfurther includes: the financial card updates the number of the failedverification times and determines whether the number of failedverification times exceeds a preset number, if yes, the financial cardreturns information that the fingerprint verification is failed to thehost computer, ends the procedure; otherwise, updates the number ofremaining verification times, then continues to execute the Step R02.For example, updating the number of failed verification times isspecifically adding 1 to the number of failed verification times; thepreset number is 3; updating the number of remaining verification timesis: the number of remaining verification times=the preset number−thenumber of failed verifying times. Further, if the financial carddetermines that the number of failed verifying times does not exceed thepreset number, the method further includes: the financial card displaysthe number of remaining verification times.

Optionally, the method further includes: when the financial carddetermines that the received command is verifying command and theverifying command is offline verifying command in Step 202, executes thefollowing steps:

Step R11, the financial card determines whether the offline verifyingcommand includes the offline verification code, if yes, executes StepR12; otherwise, executes Step R13;

For example, if the offline verifying command received by the financialcard is 00 20 01 00 02 12 34, executes the Step R12; the data of thefirst byte and the second byte of the command, i.e. 00 20, is taken asidentification of the verifying command; the data of the third byte ofthe command, i.e. 01, is taken as the identification indicating that thefingerprint input by the user need to be verified, the data of the thirdbyte of the obtained command, i.e. 00 20, is taken as the identificationof the verifying command, the data of the fifth byte of the obtainedcommand, i.e. 02, is taken as length of verification code, the data ofthe sixth byte and the seventh byte of the obtained command, i.e. 12 34,is taken as verification code; if the offline verifying command receivedby the financial card is 00 20 00 00 02 00 00, executes the Step R13;the data of the first byte and the second byte of the obtained command,i.e. 00 20, is taken as identification of verify command; the data ofthe fifth byte of the obtained command, i.e. 02, is taken as length ofverification code, the data of the sixth byte and the seventh byte ofthe obtained command, i.e. 00 00, is taken as identification indicatingthat the fingerprint input by the user need to be verified.

Step R12, the financial card obtains offline verification code from theoffline verifying command, verifies the obtained offline verificationcode according to self-stored offline verification code, if theverification is successful, the financial card returns information thatoffline verification is successful to the host computer, otherwise, thefinancial card returns information that offline verification is failedto the host computer.

For example, the financial card takes the data of the sixth byte to theseventh byte, i.e. 12 34, of the offline verifying command 00 20 00 0002 12 34 as the offline verification code, compares the taken offlineverification code 12 34 with self-stored offline verification code 1234, if they are consistent, the financial card returns information thatoffline verification is successful to the host computer.

Step R13, the financial card waits for the user to input fingerprint, ifthe fingerprint input by the user is obtained, the financial cardverifies the fingerprint input by the user according to self-stored userregistration fingerprint, if the verification is successful, thefinancial card returns information that offline verification issuccessful to the host computer, otherwise, the financial card returnsinformation that offline verification is failed to the host computer.

In the present embodiment, the financial card generates applicationcryptogram may be specifically: the financial card generates applicationcryptogram according to the information that offline fingerprintverification is successful or the information that offline fingerprintverification is failed.

In the present embodiment, when the financial card waits for the user toinput fingerprint, the method further includes that the financial cardprompts the user to input fingerprint.

Specifically, the financial card prompts the user to input fingerprintis specifically: the financial card prompts the user to inputfingerprint via a display screen, an indicator light or voice.

In the present disclosure, the method further includes an operation ofentering a fingerprint on the financial card. In the present embodiment,the operation of entering a fingerprint on the financial card isidentical to that of Embodiment 2. No more detail is given here.

Optionally, in the method of the present embodiment, the financial cardexecutes data communication with the host computer via Bluetooth; thefinancial card may also execute data communication with the hostcomputer via contact way or contactless way.

Optionally, in the present embodiment, after the financial card executeseach step of the Step 203 to the Step 210, the method further includesthat the financial card executes operating of the Step 201.

In the present disclosure, the manner in which the financial cardprompts the user may be one or more of the display, sound, and indicatorlight. For example, when the financial card prompts the user to input afingerprint, the financial card prompts by voice and/or display aprompt: “Please enter a fingerprint”.

Embodiment 4

The present embodiment provides a financial card with function offingerprint verification. As shown by FIG. 3, the financial cardincludes:

a waiting and receiving module 401, configured to wait to receive acommand from a host computer;

a determining module 402, configured to determine a type of the commandwhen the command from the host computer is received by the waiting andreceiving module 401;

a storing module 403, configured to store application informationsupported by the financial card, to store file information and to storeapplication data;

a first sending module 404, configured to send the applicationinformation supported by the financial card which is stored by thestoring module 403 to the host computer when the determining module 402determines that the command received by the waiting and receiving module401 is an application selecting command;

a second sending module 405, configured to send the file informationstored by the storing module 403 to the host computer when thedetermining module 402 determines that the type of the command receivedby the waiting and receiving module 401 is a processing option acquiringcommand;

a third sending module 406, configured to send the application datacorresponding to a file identification in an application data readingcommand which is stored by the storing module 403 to the host computerwhen the determining module 402 determines that the type of the commandreceived by the waiting and receiving module 401 is the application datareading command;

an application cryptogram generating module 407, configured to executecard behavior analysis and generate application cryptogram if thedetermining module 402 determines that the type of the command receivedby the waiting and receiving module 401 is an application cryptogramacquiring command;

a fourth sending module 408, configured to send the applicationcryptogram generated by the application cryptogram generating module 407to the host computer;

The financial card further includes: a card holder verifying module 409and/or a boot-up verifying module;

the card holder verifying module 409 is configured to, if thedetermining module 402 determines that the type of the received commandreceived by the waiting and receiving module 401 is a verifying commandand the verifying command is specifically a fingerprint verifyingcommand, execute card holder verification according to a fingerprint ofa user and return information related to the card holder verification tothe host computer;

a storing module 403 is further configured to store user registrationfingerprint;

the boot-up verifying module is configured to, if a boot-up event isreceived, execute boot-up verification according to the userregistration fingerprint stored by the storing module 403 and afingerprint input by a user;

when the boot-up verifying module is comprised in the financial card,the waiting and receiving module 401 is specifically configured to waitto receive the command from the host computer after the verificationexecuted by the boot-up verifying module is successful.

In the present embodiment, if the fingerprint verifying command receivedby the waiting and receiving module 401 is specifically onlinefingerprint verifying command, the card holder verifying module 409 isspecifically configured to, when the determining module 402 determinesthat the type of the received command is a verifying command and theverifying command is specifically fingerprint verifying command, waitfor the user to input fingerprint; when the fingerprint input by theuser is obtained, the card holder verifying module 409 is configured tocompute online fingerprint feature according to the obtained fingerprintand sends the online fingerprint feature to the host computer.

In the present embodiment, the storing module 403 is further configuredto store an online verification code;

Correspondingly, if the determining module 402 determines that thecommand received by the waiting and receiving module 401 is a verifyingcommand and the verifying command is specifically online verifyingcommand, the card holder verifying module 409 is further configured towait for the user to input a fingerprint, verify the fingerprint inputby the user according to the user registration fingerprint stored by thestoring module 403 if the fingerprint input by the user is obtained, andreturn a self-stored online verification code stored by the storingmodule 403 to the host computer if the verification is successful,otherwise, return information that the verification is failed to thehost computer.

In the present embodiment, the fingerprint verifying command received bythe waiting and receiving module 401 is specifically offline fingerprintverifying command; the card holder verifying module 409 is specificallyconfigured to, when the determining module 402 determines that thecommand received by the receiving module 401 is a verifying command andthe verifying command is an offline fingerprint verifying command, waitfor the user to input fingerprint and verify the fingerprint input bythe user according to the user registration fingerprint stored by thestoring module 403 when the fingerprint input by the user is received,return information that the offline fingerprint verification issuccessful to the host computer if the verification is successful,otherwise, return information that the offline fingerprint verificationis failed to the host computer.

In the present embodiment, the storing module 403 is further configuredto store the offline verification code.

Correspondingly, the card holder verifying module 409 is furtherconfigured to, when the determining module 402 determines that thecommand received by the waiting and receiving module 401 is a verifyingcommand and the verifying command is specifically the offlineverification code verifying command, verify the offline verificationcode input by the user according to the offline verification code storedby the storing module 403, return information that the offlineverification is successful to the host computer if the verification issuccessful; otherwise, return information that the offline verificationis failed to the host computer.

Or, the card holder verifying module 409 is further configured to, whenthe determining module 402 determines that the command received by thewaiting and receiving module 401 is a verifying command and theverifying command is an offline verification code verifying command,obtain offline verification code from the offline verification codeverifying command, verify the obtained offline verification codeaccording to the offline verification code stored by the storing module403, return information that the offline verification is successful tothe host computer if verifying is successful; otherwise, returninformation that the offline verification is failed.

Or, the card holder verifying module 409 includes a first determiningsub-module, a first verifying sub-module, a second verifying sub-moduleand a first sending sub-module;

the first determining sub-module is configured to, when the determiningmodule 402 determines that the command received by the waiting andreceiving module 401 is a verifying command and the verifying command isan offline verifying command, determine whether the offline verifyingcommand includes offline verification code;

the first verifying sub-module is configured to, when the firstsub-determining module determines that the offline verifying commandincludes offline verification code, obtain offline verification codefrom the offline verifying command and verify the obtained offlineverification code according to the offline verification code stored bythe storing module 403;

the first sending sub-module is configured to return information thatthe offline verification is failed to the host computer when theverification of the first verifying sub-module is failed;

the second verifying sub-module is configured to wait for the user toinput fingerprint when the verification of the first verifyingsub-module is successful, verify the fingerprint input by the useraccording to the user registration fingerprint stored by the storingmodule 403; the second verifying sub-module is further configured towait for the user to input the fingerprint when the first determiningsub-module determines that the offline verifying command does notinclude the offline verification code, verify the fingerprint input bythe user according to the user registered fingerprint stored by thestoring module 403 when the fingerprint input by the user is received;

The first sending sub-module is further configured to return informationthat the offline fingerprint verification is successful to the hostcomputer if the verification of the second verifying sub-module issuccessful, and return information that the offline fingerprintverification is failed to the host computer if the verification of thesecond verifying sub-module is failed.

Or, the card holder verifying module 409 includes a second determiningsub-module, a third verifying sub-module, a fourth verifying sub-moduleand a second sending sub-module;

the second determining sub-module is configured to, when the determiningmodule 402 determines that the command received by the waiting andreceiving module 401 is a verifying command and the verifying command isspecifically an offline verifying command, determine whether the offlineverifying command includes offline verification code;

the third verifying sub-module is configured to, when the seconddetermining sub-module determines that the offline verifying commandincludes an offline verification code, obtain the offline verificationcode from the offline verification code, verify the obtained offlineverification code according to the offline verification code stored bythe storing module 403;

the second sending sub-module is configured to return information thatthe offline fingerprint verification is successful to the host computerwhen the verification of the third verifying sub-module is successful,return information that the offline fingerprint verification is failedto the host computer when the verification of the third verifyingsub-module is failed;

the fourth verifying sub-module is configured to wait for the user toinput fingerprint when the second determining sub-module determines thatthe offline verification command does not include the offlineverification code, and verify the fingerprint input by the useraccording to the user registration fingerprint stored by the storingmodule 403 when the fingerprint input by the user is obtained;

the second sending sub-module is configured to return information thatthe offline verification is successful to the host computer when theverifying result of the fourth verifying sub-module is successful, andreturn information that the offline verification is failed to the hostcomputer when the verifying result of the fourth verifying sub-module isfailed.

In the present embodiment, the financial card further includes atransaction verifying module;

the transaction verifying module is configured to prompt the user toinput transaction verifying information when the determining module 402determines that the command received by the waiting and receiving module401 is a transaction verifying command, verify the transaction verifyinginformation input by the user after the transaction verifyinginformation input by the user is received, return information that theverification is successful to the host computer if the verification issuccessful, otherwise, return information that the verification isfailed to the host computer, and end the transaction.

Specifically, the transaction verifying module includes: a firstprompting sub-module, a first receiving sub-module, a first fingerprintverifying sub-module, and a first generating and sending sub-module;

the first prompting sub-module is configured to prompt the user to inputfingerprint when the determining module 402 determines that the commandreceived by the waiting and receiving module 401 is a transactionverifying command;

the first receiving sub-module is configured to receive the fingerprintinput by the user;

the first fingerprint sub-verifying module is configured to verify thefingerprint input by the user according to the user registeredfingerprint stored by the storing module 403;

the first generating and sending sub-module is configured to generatethe information that the verification is successful when theverification of the first fingerprint verifying sub-module issuccessful, and returns the information that the verification issuccessful to the host computer, generate the information that theverification is failed when the verification of the first fingerprintverifying sub-module is failed, and returns the information that theverification is failed to the host computer and end the transaction.

Optionally, the transaction verifying module further includes a storingsub-module;

the first fingerprint verifying sub-module is specifically configured tocompute fingerprint feature according to the fingerprint input by theuser, determine whether the computed fingerprint feature is consistentwith the fingerprint feature of the user registration fingerprint storedby the storing module 403, if yes, the verification is successful;otherwise, the verification is failed;

the storing sub-module is configured to store the fingerprint featurecomputed according to the fingerprint input by the user when theverification of the fingerprint verifying sub-module is successful.

Correspondingly, the fingerprint verifying command received by thewaiting and receiving module 401 is specifically online fingerprintverifying command; the card holder fingerprint verifying module 409 isspecifically configured to, when the determining module 402 determinesthat the command received by the waiting and receiving module 401 is averifying command and the verifying command is an online fingerprintverifying command, send the computed fingerprint feature which is storedby the storing sub-module to the host computer.

Optionally, the fingerprint verifying command received by the waitingand receiving module 401 is offline fingerprint verifying command; thecard holder verifying module 409 is specifically configured to, when thedetermining module 402 determines that the command received by thereceiving module 401 is a verifying command and the verifying command isspecifically an offline fingerprint verifying command, generate resultof successful offline fingerprint verification according to theinformation that verifying is successful generated by the firstsub-generating and sending module and send the result of successfuloffline fingerprint verification to the host computer.

Specifically, the transaction verifying module may also specificallyinclude: a second prompting sub-module, a second obtaining sub-module, asecond verification code verifying sub-module, and a second generatingand sending sub-module;

the second prompting sub-module is configured to, when the determiningmodule 402 determines that the command received by the waiting andreceiving module 401 is a verifying command, prompt the user to inputthe transaction verification code;

the second obtaining sub-module is configured to obtain the verificationcode input by the user;

the second verification code verifying sub-module is configured toverify the transaction verification code input by the user which isobtained by the second obtaining sub-module according to the transactionverification code stored by the storing module 403;

the second generating and sending sub-module is configured to generateinformation that the verification is successful and return theinformation that the verification is successful to the host computerwhen the verification of the second verification code verifyingsub-module is successful, generate information that the verification isfailed and return the information that the verification is failed to thehost computer when the verification of the second verification codeverifying sub-module is failed, and end the transaction;

or, the transaction verifying module specifically includes: a secondobtaining sub-module, a second verification code verifying sub-module, asecond generating and sending sub-module;

the second obtaining sub-module is configured to obtain a transactionverification code from the transaction verifying command;

the second verification code verifying sub-module is configured toverify the transaction verification code obtained from the transactionverifying command by the second obtaining sub-module, according to thetransaction verification code stored by the storing module 403;

the second generating and sending sub-module is configured to generateinformation that the verification is successful when the verification ofthe second verification code verifying sub-module is successful andreturn information that the verification is successful to the hostcomputer, generate information that the verification is failed when theverification of the second verification code verifying sub-module isfailed, return information that the verification is failed to the hostcomputer and end the transaction;

Optionally, the card holder verifying module 409 is further configuredto, when the determining module 402 determines that the command receivedby the waiting and receiving module 401 is a verifying command and theverifying command is specifically an offline verification code verifyingcommand, generate result of successful offline verification codeverification according to the information that the verification issuccessful generated by the second generating and sending sub-module,and send the result of successful offline verification code verificationto the host computer.

In the present embodiment, the boot-up verifying module is specificallyconfigured to prompt the user to input fingerprint when a boot-up eventis received, verify the fingerprint input by the user according to theuser registration fingerprint stored by the storing module 403 when thefingerprint input by the user is received.

Correspondingly, the waiting and receiving module 401 is specificallyconfigured to wait to receive the command sent from the host computerwhen the verification of the boot-up verifying module is successful.

In the present embodiment, the boot-up verifying module is specificallyconfigured to compute fingerprint feature according to the fingerprintinput by the user when the boot-up event is received, determine whetherthe computed fingerprint feature is consistent with the fingerprintfeature of the user registration fingerprint stored by the storingmodule 403; if yes, the verification is successful; otherwise, theverification is not failed.

the boot-up verifying module is further configured to store the computedfingerprint when the verification is successful.

Correspondingly, the fingerprint verifying command received by thewaiting and receiving module 401 is specifically an online fingerprintverifying command; the cardholder verifying module 409 is specificallyconfigured to, when the determining module 402 determines that thecommand received by the waiting and receiving module 401 is a verifyingcommand and the verifying command is specifically an online fingerprintverifying command, send the fingerprint feature stored by the boot-upverifying module to the host computer.

In the present embodiment, the boot-up verifying module is furtherconfigured to store the result of successful verification.

Correspondingly, the fingerprint verifying command received by thewaiting and receiving module 401 is specifically an offline fingerprintverifying command; the card holder module 409 is specifically configuredto, when the determining module 402 determines that the command receivedby the waiting and receiving module 401 is a verifying command and theverifying command is specifically an offline fingerprint verifyingcommand, generate information that the offline fingerprint verificationis successful according to the result of successful verification storedby the boot-up verifying module and send the information that theoffline fingerprint verification is successful.

In the present embodiment, the application cryptogram generating module407 is specifically configured to generate application cryptogramaccording to the information that the offline fingerprint verificationis successful or the information that the offline fingerprintverification is failed generated by the card holder verifying module409.

In the present embodiment, when the financial card includes the boot-upverifying module, and the verification of the boot-up verifying moduleis successful, the storing module 403 is specifically configured tostore the application information supported by the financial card, storefile information of record information related to the onlineverification code, store the application data including the onlineverification code and store the user registration fingerprint.

In the present embodiment, the boot-up verifying module is specificallyconfigured to compute fingerprint feature according to the fingerprintinput by the user, determine whether the computed fingerprint isconsistent with the fingerprint feature of the user registrationfingerprint stored by the storing module 403, if yes, the verificationis successful; otherwise, the verification is failed;

when the verification of the boot-up verifying module is successful, thestoring module 403 is specifically configured to store the applicationinformation supported by the financial card, store the file informationof the record information related to the fingerprint feature computed bythe boot-up verifying module, store the application data of thefingerprint feature computed by the boot-up verifying module and storethe user fingerprint registered fingerprint.

Optionally, the fingerprint verifying command received by the waitingand receiving module 401 is an offline fingerprint verifying command;correspondingly, the card holder verifying module 409 is specificallyconfigured to wait for the user to input fingerprint when thedetermining module 402 determines that the command received by thewaiting and receiving module 401 is a verifying command and theverifying command is specifically an offline fingerprint verifyingcommand, verify the fingerprint input by the user according to the userregistration fingerprint stored by the storing module 403 when thefingerprint input by the user is received, return information that theoffline fingerprint verification is successful to the host computer ifthe verification is successful, otherwise, return information that theoffline fingerprint verification is failed to the host computer.

In the present embodiment, the boot-up verifying module is specificallyconfigured to execute the boot-up verification according to the userregistration fingerprint stored by the storing module and thefingerprint input by the user when the financial card being powered upor the boot-up event from the user is received.

Optionally, the financial card further includes a Bluetooth module;

the Bluetooth module is configured to communicate with data the hostcomputer via Bluetooth;

Correspondingly, the waiting and receiving module waits to receive acommand from the host computer via the Bluetooth module;

The first sending module 404, the second sending module 405, the thirdsending module 406 and the fourth sending module 408 send data via theBluetooth module.

The described embodiments are only specific embodiments of the presentdisclosure, but are not to be construed as limiting the scope of thedisclosure. The variations or substitution easily obtained by thoseskilled in the art within the scope disclosed by the present disclosureshould be within the scope of the present disclosure. Therefore, thescope of the present disclosure should be determined by the scope of theappended claims.

What is claimed is:
 1. A working method for a financial card withfunction of fingerprint verification, comprising: Step S1, waiting, bythe financial card, to receive a command from a host computer; Step S2,determining, by the financial card, a type of the command when thecommand from the host computer is received, if the financial carddetermines that the type of the command is an application selectingcommand, executing Step S3; if the financial card determines that thetype of the command is a processing option acquiring command, executingStep S4; if the financial card determines that the type of the commandis an application data reading command, executing Step S5; if thefinancial card determines that the type of the command is an applicationcryptogram acquiring command, executing Step S6; Step S3, sending, bythe financial card, application information supported by itself to thehost computer; Step S4, sending, by the financial card, file informationto the host computer; Step S5, sending, by the financial card,application data corresponding to a file identification in theapplication data reading command to the host computer; Step S6,executing, by the financial card, card behavior analysis and generatingapplication cryptogram, sending the application cryptogram to the hostcomputer; and the method further comprises at least one of steps of: ifthe financial card determines that the type of the received command is averifying command and the verifying command is specifically afingerprint verifying command in the Step S2, executing, by thefinancial card, card holder verification according to a fingerprint of auser and returning information related to the card holder verificationto the host computer; and, before the Step S1, the method furthercomprises: if the financial card receives a boot-up event, executing, bythe financial card, boot-up verification according to a self-stored userregistration fingerprint and a fingerprint input by a user, executingthe Step S1 if the boot-up verification is successful.
 2. The method ofclaim 1, wherein the Step S2 further comprises: if the financial carddetermines that the received command is a transaction verifying command,executing Step S0; Step S0, prompting, by the financial card, the userto input transaction verifying information, executing transactionverification on the transaction verifying information input by the userafter receiving the transaction verifying information input by the user,if the transaction verification is successful, returning informationthat the transaction verification is successful to the host computer;otherwise, returning information that the transaction verification isfailed to the host computer and ending transaction.
 3. The method ofclaim 1, wherein the executing, by the financial card, boot-upverification according to a self-stored user registration fingerprintand a fingerprint input by a user comprises: Step H1, prompting, by thefinancial card, the user to input a fingerprint; and Step H2, verifying,by the financial card, the fingerprint input by the user according tothe self-stored user registration fingerprint when the financial cardobtains the fingerprint input by the user.
 4. The method of claim 1,wherein the executing, by the financial card, financial card boot-upverification according to a self-stored user registration fingerprintand a fingerprint input by a user comprises: computing, by the financialcard, fingerprint feature according to the fingerprint input by theuser, determining whether the computed fingerprint feature is consistentwith the fingerprint feature of the self-stored user registrationfingerprint, if yes, the boot-up verification is successful; otherwise,the boot-up verification is failed; if the boot-up verification issuccessful, the method further comprises: storing, by the financialcard, the computed fingerprint feature; wherein the fingerprintverifying command is specifically an online fingerprint verifyingcommand; wherein the executing, by the financial card, card holderverification according to a fingerprint of a user and returninginformation related to the card holder verification to the host computercomprises: sending, by the financial card, the stored fingerprintfeature to the host computer.
 5. The method of claim 1, wherein if thefinancial card executes boot-up verification according to self-storeduser registration fingerprint and the fingerprint input by the user andthe boot-up verification is successful, the method further comprises:storing, by the financial card, a result of successful verification;wherein the fingerprint verifying command is specifically an offlinefingerprint verifying command; and wherein the executing, by thefinancial card, card holder verification according to a fingerprint of auser and returning information related to the card holder verificationto the host computer comprises: generating, by the financial card,information that offline fingerprint verification is successfulaccording to the stored result of successful card holder verificationand sending the information that the offline fingerprint verification issuccessful to the host computer.
 6. The method of claim 1, wherein whenbefore the Step S1, the method further comprises: if the financial cardreceives a boot-up event, executing, by the financial card, boot-upverification according to a self-stored user registration fingerprintand a fingerprint input by a user, and if the boot-up verification issuccessful: the file information sent by the financial card to the hostcomputer in the Step S4 comprises record information related to anonline verification code; the application data sent by the financialcard to the host computer in the Step S5 comprises an onlineverification code corresponding to a recording information of an onlineverification code in the application data reading command.
 7. The methodof claim 1, wherein the executing, by the financial card, boot-upverification according to a self-stored user registration fingerprintand a fingerprint input by a user comprises: computing, by the financialcard, fingerprint feature according to the fingerprint input by theuser, determining whether the computed fingerprint feature is consistentwith the fingerprint feature of the self-stored user registrationfingerprint, if yes, the boot-up verification is successful; otherwise,the boot-up verification is failed; if the boot-up verification issuccessful, the method further comprises: storing, by the financialcard, the computed fingerprint feature; wherein the file informationsent by the financial card to the host computer in the Step S4 comprisesrecording information related to the fingerprint feature; wherein theapplication data sent by the financial card to the host computer in theStep S5 comprises fingerprint feature corresponding to the recordinginformation of the fingerprint feature in the application data readingcommand.
 8. The method of claim 6, wherein the fingerprint verifyingcommand is specifically an offline fingerprint verifying command;wherein the executing, by the financial card, card holder verificationaccording to a fingerprint of a user and returning information relatedto the card holder verification to the host computer comprises: waitingfor, by the financial card, the user to input fingerprint; executingcard holder verification on the fingerprint input by the user accordingto the self-stored user registration fingerprint when the financial cardobtains the fingerprint input by the user; if the card holderverification is successful, returning, by the financial card, theinformation that offline fingerprint verification is successful to thehost computer; otherwise, returning, by the financial card, informationthat the offline fingerprint verification is failed to the hostcomputer.
 9. The method of claim 1, wherein the receiving, by thefinancial card, a boot-up event comprises: the financial card beingpowered up, or the financial card receives the boot-up event from auser.
 10. The method of claim 1, wherein the financial card communicatesdata with the host computer via Bluetooth.
 11. A financial card withfunction of fingerprint verification, comprising a processor, atransmitter and a memory storing instructions thereon, the processorwhen executing the instructions, being configured to: wait to receive acommand from a host computer; determine a type of the command when thecommand from the host computer is received; and store applicationinformation supported by the financial card, store file information andstore application data; the transmitter is configured to send theapplication information supported by the financial card to the hostcomputer when the command is an application selecting command; thetransmitter is further configured to send the file information to thehost computer when the type of the command is a processing optionacquiring command; the transmitter is further configured to send theapplication data corresponding to a file identification in anapplication data reading command to the host computer when the type ofthe command is the application data reading command; the processor isfurther configured to execute card behavior analysis and generateapplication cryptogram if the type of the command is an applicationcryptogram acquiring command; the transmitter is further configured tosend the application cryptogram to the host computer; the processor isfurther configured to execute at least one of steps of: if the type ofthe received command is a verifying command and the verifying command isspecifically a fingerprint verifying command, executing card holderverification according to a fingerprint of a user and returninginformation related to the card holder verification to the hostcomputer; and storing user registration fingerprint, if a boot-up eventis received, executing boot-up verification according to the userregistration fingerprint and a fingerprint input by a user; waiting toreceive the command from the host computer after the boot-upverification is successful.
 12. The financial card of claim 11, theprocessor is further configured to: prompt the user to input transactionverifying information input by the user when the command is atransaction verifying command; execute transaction verification on thetransaction verifying information input by the user after receiving thetransaction verifying information input by the user; if the transactionverification is successful, return information that the transactionverification is successful to the host computer; otherwise, returninformation that the transaction verification is failed to the hostcomputer and end transaction.
 13. The financial card of claim 11,wherein the processor is further configured to: prompt the user to inputa fingerprint when the boot-up event is received, verify the fingerprintinput by the user according to the user registration fingerprint whenthe fingerprint input by the user is obtained; and wait to receive thecommand sent from the host computer when the boot-up verification issuccessful.
 14. The financial card of claim 11, wherein the processor isfurther configured to: compute fingerprint feature according to thefingerprint input by the user when the boot-up event is received,determine whether the computed fingerprint feature is consistent withthe fingerprint feature of the user registration fingerprint; if yes,the boot-up verification is successful; otherwise, the boot-upverification is failed; store the computed fingerprint when the boot-upverification is successful; and send the fingerprint feature to the hostcomputer when the command is the verifying command and the verifyingcommand is specifically the online fingerprint verifying command. 15.The financial card of claim 11, wherein the processor is furtherconfigured to: store a result of successful verification; and generateinformation that the offline fingerprint verifying is successfulaccording to the result of successful card holder verification and sendthe information that the offline fingerprint verification is successfulwhen the command is the verifying command and the verifying command isspecifically the offline fingerprint verifying command.
 16. Thefinancial card of claim 11, wherein the processor is further configuredto store the application information supported by the financial card,store file information of record information related to the onlineverification code, store the application data comprising the onlineverification code and store the user registration fingerprint when theboot-up verification is successful.
 17. The financial card of claim 11,wherein the processor is further configured to: compute fingerprintfeature according to the fingerprint input by the user, determinewhether the computed fingerprint is consistent with the fingerprintfeature of the user registration fingerprint when the boot-up event isreceived, if yes, the boot-up verification is successful; otherwise, theboot-up verification is failed; and store the application informationsupported by the financial card, store the file information of therecord information related to the fingerprint feature, store theapplication data comprising the fingerprint feature, and store the userregistered fingerprint when the boot-up verification is successful. 18.The financial card of claim 16, wherein the fingerprint verifyingcommand is an offline fingerprint verifying command; the processor isfurther configured to wait for the user to input fingerprint, executescard holder verification on the fingerprint input by the user accordingto the user registration fingerprint when the fingerprint input by theuser is obtained, when the command is the verifying command and theverifying command is specifically the offline fingerprint verifyingcommand; if the card holder verification is successful, returninformation that the offline fingerprint verification is successful tothe host computer; otherwise, return information that offlinefingerprint verification is failed to the host computer.
 19. Thefinancial card of claim 11, wherein the processor is further configuredto execute the boot-up verification according to the user registrationfingerprint and the fingerprint input by the user when the financialcard being powered up or the boot-up event from the user is received.20. The financial card of claim 11, the transmitter is furtherconfigured to communicate data with the host computer via Bluetooth.