Method for safety verifying financial business information in electronic business

A technology for business information and security authentication, which is applied in the field of financial business information security authentication in e-commerce, and can solve problems such as the impact of e-commerce

Inactive Publication Date: 2007-10-10
BEIJING YIFUJINCHUAN TECH
View PDF0 Cites 88 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the sake of information security, many consumers try to avoid using the above payment systems when possible, which affects the development of e-commerce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safety verifying financial business information in electronic business
  • Method for safety verifying financial business information in electronic business

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0116] The first financial business information security authentication method of the present invention is illustrated below in conjunction with Fig. 1, and this first embodiment is as follows:

[0117] Step 1: The user applies to the bank to bind his mobile phone number 13911111111, ID number 110100123456789 with his bank account 6666666666, and establishes an authentication database containing the user's mobile phone number, ID number, bank account and payment password 654321 in the bank payment system , agreeing with the bank that the payment password 654321 is used as the confirmation password for the bank payment system to confirm with the user through the SMS platform;

[0118] Step 2: The user applies for member registration on the third-party server, and records the user identity information and mobile phone number 13911111111 in the third-party server. The user identity information can include the ID number 110100123456789; "Encyclopedia Publishing House" provides thro...

no. 2 example

[0128] Below in conjunction with Fig. 1, illustrate the second financial business information security authentication method of the present invention, this second embodiment is as follows:

[0129] Step 1: The user applies to the bank to bind his mobile phone number 13911111111, ID number 110100123456789 with his bank account 6666666666, and establishes an authentication database containing the user's mobile phone number, ID number, bank account and payment password 654321 in the bank payment system , agreeing with the bank that the payment password 654321 is used as the confirmation password for the bank payment system to confirm with the user through the SMS platform;

[0130] Step 2: The user applies for member registration on the third-party server, and records the user identity information and mobile phone number 13911111111 in the third-party server. The user identity information can include the ID number 110100123456789; "Encyclopedia Publishing House" provides through t...

no. 3 example

[0140] Below in conjunction with Fig. 1, illustrate the third financial business information security authentication method of the present invention, this third embodiment is as follows:

[0141] Step 1: The user applies to the bank to bind his mobile phone number 13911111111, ID number 110100123456789 with his bank account 6666666666, and establishes an authentication database containing the user's mobile phone number, ID number, bank account and payment password 654321 in the bank payment system , agreeing with the bank that the payment password 654321 is used as the confirmation password for the bank payment system to confirm with the user through the SMS platform;

[0142]Step 2: The user applies for member registration on the third-party server, and records the user identity information and mobile phone number 13911111111 in the third-party server. The user identity information can include the ID number 110100123456789; "Encyclopedia Publishing House" provides through the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method capable of making financial service information undergo the process of safety authentication in the electronic business. It is characterized by that it utilizes personal identity information stored and transferred to bank payment system by third party server and combines said personal identity information with user handset short-mail authorization and acknowledgement to implement safety authentication of bank payment service. Besides, said invention also provides the concrete steps of said method.

Description

technical field [0001] The invention relates to a method for security authentication of financial service information in e-commerce, in particular to a method for security authentication of bank payment services by using personal identity information stored and transmitted by a third-party server combined with short messages on mobile phones of users. Background technique [0002] With the rapid development of the Internet and wireless communication networks, e-commerce systems with mobile communication devices such as portable computers and mobile phones as terminals have been widely used. In the payment process of e-commerce activities, the payment systems provided by banks and third-party payment companies are all seeking to provide various financial services for e-commerce enterprises. The transmission of business information, which may lead to the disclosure of core financial information of users such as bank account numbers and passwords, bringing risks to users and fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06Q20/38
Inventor 陈方张余郑毅王立
Owner BEIJING YIFUJINCHUAN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products