Data transaction processing method and apparatus

A transaction processing and data technology, applied in the field of data security, can solve the hidden problems of identity authentication and transaction data interaction security, and achieve the effect of ensuring security

Active Publication Date: 2008-07-16
BEIJING WATCH DATA SYST
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a data transaction processing method, device, SIM card and system, which are used to solve the problem of potential safety hazards in user identity authentication and transaction data interaction in the network transaction process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transaction processing method and apparatus
  • Data transaction processing method and apparatus
  • Data transaction processing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0111] Figure 7 is a schematic diagram of the implementation process of data transaction processing in Embodiment 1. In this embodiment, the client sends a network transaction command to the mobile terminal to request a security operation. As shown in the figure, the specific transaction authentication may include the following steps:

[0112] Step 701, the user logs in and determines the transaction content.

[0113] The user logs into the client program, enters the network transaction interface of the network transaction service provider, selects the specific content of the network transaction, and inputs transaction-related information.

[0114] Step 702, the client program invokes the RPC program to start the data processing program of the mobile terminal.

[0115] The client program invokes the RPC program, connects with the mobile terminal through the interface module, starts the mobile terminal processing program, and passes in authentication data.

[0116] Step 703 , ...

Embodiment 2

[0130] In the network transaction environment, assume that the client user wants to transfer 500 yuan from his bank account to the bank account designated by the power supply bureau through online banking to complete the payment of the current month's electricity fee. It can be achieved by the following steps:

[0131] First, the user logs into the online banking service on the client terminal, and after completing traditional identity authentication such as password verification, the user sends an application for transferring 500 yuan.

[0132] Then, the client uploads the user's application to the online banking server, and the online banking server generates the key data of the online transaction according to the application sent by the user, and sends these key data back to the client, requiring the user to perform a check on the key data. Digital signature confirmation.

[0133] Thirdly, the client sends the user's mobile terminal a secure operation command to digitally ...

Embodiment 3

[0137] With the enhancement of the network functions of mobile terminals, mobile terminals have become a network terminal that can replace PCs. The SIM card is encrypted and signed. It can be achieved by the following steps:

[0138] First, the user runs the online shopping mall application in the mobile terminal, logs into the online shopping mall through the GPRS (General Packet Radio Service) network, and establishes a TCP (Transmission Control Protocol, Transmission Control Protocol) connection with the shopping mall server. Commodity information is transmitted between the online mall and the mobile terminal for the mobile terminal user to browse, and the user selects the commodity to be purchased and puts it into the shopping cart.

[0139] Secondly, when the product selection is completed, the mobile terminal sends the shopping list in the shopping cart and the local IMSI number to the online mall server; after the online mall server receives the shopping list, it recor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data transaction processing method and a device thereof, including that after a service end receives a transaction request submitted by a client end through the internet, the service end sends data including identification data and transaction feed-back data, which need to be identified and fed back to a movable terminal by the client end; after the movable terminal receives data needing to be identified and fed back, the identification data are verified according to identity key in the movable terminal user identity recognition module card, which is offered in advance, after the verification is passed, the feed-back data is acquired after processing according to transaction feed-back data content; after a user identity recognition module card operating system makes a signature on the feed-back data, the feed-back data is fed back to the service end by the client end; the signature of the feed-back data is verified according to a signature key in the service end, which is offered by the movable terminal user in advance, after the verification is passed, the feed-back data is processed based on the feed-back data content. By utilizing the invention, the identity certification and the transaction certification problems in the network transaction are resolved, and the safety of the client end in the network environment is ensured.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data transaction processing method, device, SIM (Subscriber Identity Module, Subscriber Identity Module) card and system. Background technique [0002] With the vigorous development of various online transactions such as online banks and online shopping malls, the security of transactions has become an increasingly important issue. In any network transaction environment, security issues mainly exist in the server, network and client. The security of the server is the responsibility of the service provider, which can be guaranteed by means of physical control, security management, and network security software and equipment; the security of data transmission on the network can be solved by data encryption and decryption technology based on cryptography methods, such as extensive The SSL (Secure Socket Layer) protocol is adopted; the client user in the network environment ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06Q30/00H04Q7/32
Inventor 龙德帆高翔芦蓉
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products