Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

171results about How to "Safety of tradement" patented technology

Trusted power grid transaction platform based on block chain technology

The invention provides a trusted power grid transaction platform based on block chain technology. The trusted power grid transaction platform comprises the components of (1), a power chain database node module which stores electric power transaction database copies at a plurality of nodes; (2), a block module, wherein the block chain database is divided into a plurality of blocks which are related with electric power transaction, wherein each block comprises detailed information of transaction; (3) an encryption authentication module which acquires whole-network authentication through combining and encrypting transaction details and signatures of two parties or signature of one party; (4), a trust approval module which is connected with the encryption authentication module and is used for establishing a trusted power grid transaction system of the block chain; and (5), a determining module which determines a fact that the transaction is effect on the condition that encryption records that correspond with all nodes are consistent, and adds the transaction into a historical transaction chain; and if the block is ineffective, the information of a role breaking node is modified through consistent option of the nodes. The trusted power grid transaction platform safely and reliably perform various kinds of power grid transactions and furthermore improves credibility of the block chain technology.
Owner:SHENZHEN FANXI ELECTRONICS CO LTD

Digital certificate safety lock device and digital certificate authentication system and method

The invention relates to a digital certificate safety lock device and a digital certificate authentication system and method. The digital certificate safety lock device comprises a universal encryption and digital signature microcontroller, an audio plug and a first modulation and demodulation module, wherein the universal encryption and digital signature microcontroller is provided with an encryption and digital signature module and a storage for storing a digital certificate, a key of the digital certificate and encryption and decryption algorithms; and the first modulation and demodulation module is used for modulating data information from the encryption and digital signature module for transmitting through an MIC (Microphone) pole of the audio plug, demodulating a signal received from a first sound channel pole of the audio plug and transmitting the demodulated signal to the encryption and digital signature module. The digital certificate safety lock device is provided with a universal audio interface plug which has high university and adaptability and can support communication terminals such as mobile phones, tablet computers, PDAs (Personal Digital Assistants) or PCs (Personal Computers) and the like, with audio interfaces. Due to the functions of independent hardware signature, digital certificate encryption and the like, the security of application logon and transactions of Internet banks or enterprises can be ensured to the maximum extent.
Owner:吴沙林 +1

Method and system for processing network service by utilizing multifactor authentication method

The invention discloses a method and a system for processing network service by utilizing a multifactor authentication method. The method comprises the following steps that a service operation terminal sends a service operation request to a service server; after receiving the service operation request, the service server carries out local authentication; after authentication is successful, a safety authentication request is submitted to a safety platform server; after receiving the authentication request, the safety platform processes the authentication request and then sends data to a mobile terminal corresponding to a user; after receiving data, the mobile terminal calculates the data and displays the data in a clear text for the user; the user inputs and confirms a response number on the service operation terminal; the service operation terminal sends the response number to the service server; the service server sends the response number to the safety platform server; after receiving the response number, the safety platform server authenticates the response number and feeds back the authentication result to the service server; and the service server receives the feedback authentication result and carries out service processing according to the result. According to the scheme disclosed by the invention, the network service processing is safer.
Owner:TSINGHUA TONGFANG CO LTD

Visible self-service terminal

The invention relates to a visible remote interactive self-service terminal capable of processing full-service and meeting requirements of manual intervention services as well as simple self services.The visible self-help service terminal comprises a control host machine, a remote voice and video system, a remote command interactive system, an account number reading and writing system, an identity authentication system and a financial business providing system, wherein the remote voice and video system is used for performing remote voice and video interaction with a manual service terminal; the remote command interactive system is used for performing interaction with the manual service terminal and a bank service background terminal; and the account number reading and writing system, theidentity authentication system and the financial business providing system can meet service requirements. A command system of the manual service terminal is used for performing command control on theremote self-service terminal; and the account number reading and writing system and the identity authentication system perform certificate authority through the bank service background terminal. The introduction of the remote voice and video system ensures that the self-help service terminal is safer and meets more service requirements.
Owner:GRG BAKING EQUIP CO LTD

System and method for achieving transaction safety protection of financial card based on location binding

The invention relates to a system and a method for achieving transaction safety protection of financial card based on location binding, wherein the system comprises a user registration module which is used for obtaining registration information of a user and financial card information added by the user, and sending the information to a system platform for user registration and financial card addition; a location service module which is used for obtaining location information of a client terminal; the system platform comprises a user information storage module which is used for storing personal information and the financial card information of the user; a financial card using location obtaining module; a safety judgment module which is used for judging whether the transaction is safe based on that whether the using location of the financial card corresponding to the user is in accordance with the location of the client terminal at the same moment. The method and the system for achieving transaction safety protection of financial card based on location binding employing such a structure implement the safety judgment based on the location identification via binding the location of the financial card with the location of the client terminal, thus the transaction of the financial card is more safe and reliable; the method and system have a wider application range.
Owner:YINLIAN FINANCIAL INFORMATION SERVICE BEIJING CO LTD

Polymer compositions and methods for shielding radioactivity

A urethane based polymer composition is provided that exhibits superior shielding properties during and after exposure to high level radiation. The composite is formed by mixing a liquid isocyanate monomer, preferably 4,4′-diisocyanate monomer with a liquid phenolic resin, preferably phenol formaldehyde resin, and a phosphate ester flame retardant. An optional pyridine catalyst may be added to shorten the cure time. The resulting composition cures at room temperature and can be utilized in several manners, including spraying or pouring the composition prior to curing over radioactive material to prevent leakage of radiation. The uncured composite can be sprayed on the walls of a room or container to prevent leakage of radiation and can also be used to contain radiation prior to demolition. The uncured composite can also be molded into bricks or panels for use in construction. In a preferred embodiment, the polymer composition further incorporates radioactive waste, namely depleted uranium oxide, and can be used in conjunction with specially designed containers for storing radioactive material. The resulting polymer/waste composition cures at room temperature and does not deteriorate or suffer structural damage when exposed to higher levels of gamma radiation, nor do the mechanical or chemical properties undergo any detectable change. The composition is resistant to biodegradation and combustion, and does not creep or shrink during thermal cycling.
Owner:SOUNDARARAJAN RENGARAJAN

Method, device and system for transaction by mobile phone

The invention discloses a method, a device and a system for transaction by a mobile phone. The encryption method for the transaction by the mobile phone comprises the following steps: A, an operator side binds the international mobile subscriber identity (IMSI) and the mobile phone number of a terminal, and then, generates authentication information, the operator side receives a transaction message sent by the terminal, then, encrypts the transaction message and the authentication information by using pre-generated dynamic encryption keys, and sends the encrypted transaction message and authentication information to a bank side; and B, the bank side decrypts the received encrypted transaction message and authentication information, carries out authentication by using the authentication information, and executes corresponding operation according to the transaction message after the authentication is successful. With the adoption of the method, the device and the system for the transaction by the mobile phone, the transactions of users can be safer and more reliable; and the whole transaction process does not need a third-party payment platform actually, so that the transaction process can be simpler and safer and is convenient to maintain.
Owner:中国移动通信集团宁夏有限公司

Payment terminal, payment tool, payment server, payment system and payment processing method

The invention provides a payment terminal, a payment tool, a payment server, a payment system and a payment processing method, and relates to the field of mobile payment. The payment method provided by the invention comprises that the payment terminal receives a payment request which is sent by the payment tool and comprises a payment tool number, payment time and payment amount, the payment request is forwarded to the payment server, and the payment server generates a virtual card number and a dynamic key according to the payment tool number, the payment time and the payment amount; the payment terminal generates a payment confirmation message in an encrypted manner by using the virtual card number and the dynamic key, and sends the payment confirmation message to the payment tool; the payment terminal receives a payment result from the payment tool; and the payment terminal forwards the payment result to the payment server, and the payment server processes the payment according to the payment result. Through the method provided by the invention, a unique virtual card number and a unique dynamic key can be generated, so that the risk caused by circumstances that the payment terminal is intruded and data is stolen is effectively avoided, and safe payment of the payment tool at an off-line state is realized.
Owner:CHINA TELECOM CORP LTD

Method for payment with limit code

InactiveCN104657847ASafety of tradementOvercoming the problem of recharging troublePayment schemes/modelsComputer hardwareElectronic communication
The invention discloses a method for payment with a limit code. On the basis of modern electronic equipment and electronic communication, a user generates an information code with the payment limit according to the payment requirement on a certified client side, and a merchant submits the electronic limit code and payment information of the user to a transaction settlement center for decryption, certification and settlement. The method has the characteristics that the user is not required to provide real cards such as bank cards and the like, the user can set the limit code freely, account information is encrypted, the payment limit is set, password inputting can be avoided for micropayment, a payment code is invalid after used once and the like, has the advantage of convenient payment of Quick Pass cards, and solves problems that the Quick Pass cards of banks are troublesome to recharge, the bank cards are stolen easily, unauthorized swiping and excessive swiping can occur, information is copied and the like. Thus, the method has very high value in aspect of convenient transaction payment as well as protection of user account and bank card security. The method is applicable to quick financial payment and settlement for on-the-spot transactions in fields such as supermarkets, shopping malls, traffic, parking lots and the like.
Owner:吴勇

Method for consuming electronic wallet

The invention discloses a method for consuming an electronic wallet, and belongs to the field of information safety. The method comprises the following steps that: a central processing unit (CPU) card enters a non-contact induction area of a terminal, is electrified and initialized, reads data in a consumption initialization command when receiving the consumption initialization command sent by the terminal and stores the data, wherein the data comprises transaction amount; the CPU card operates the transaction amount and a value in a corresponding record in a composite application dedicated file according to a predetermined algorithm to obtain new amount, reads the balance of the electronic wallet, and judging whether the new amount exceeds the sum of the balance and limit of overdrawn account of the electronic wallet or not, if so, the CPU card stops operating, and otherwise, the CPU card generates a pseudo-random number and a process key and returns a response message of the consumption initialization command to the terminal; and the CPU card receives a consumption command sent by the terminal, deducts the new amount from the balance of the electronic wallet to obtain new balance, and returns a response message of the consumption command to the terminal.
Owner:FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products