Novel network safe transaction system and method

A secure transaction, a new type of technology, applied in the field of information security, can solve the problem of user's key attacker interception, cannot prevent repeated attacks, etc., to achieve the effect of security guarantee, prevention of malicious reading, and online transaction security.

Active Publication Date: 2009-03-25
FEITIAN TECHNOLOGIES
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To sum up, the disadvantages of the existing online banking system are: the user's key is easily intercepted by an attacker, and the attacker may use the intercepted information to impersonate the user for online transactions, and cannot prevent repeated attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel network safe transaction system and method
  • Novel network safe transaction system and method
  • Novel network safe transaction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] This embodiment provides a new type of online security transaction system, including: server 1, client host 2, USB Key3, server 1 includes a security control module 11, a digital certificate authentication module 12, and the security control module 11 includes a key Generation unit 111, first storage unit 112, second storage unit 113, first computing unit 114, client host 2 includes transfer module 21, PIN code auxiliary verification module 22, USB Key3 includes PIN code verification module 31, server authentication Module 32, smart key module 33, secure communication module 34, smart key module 33 includes a third storage unit 331, a fourth storage unit 332, and a second computing unit 333, see figure 1 .

[0067] in server 1

[0068] The security control module 11 is used to encrypt the session between the server 1 and the USB Key3;

[0069] The digital certificate authentication module 12 is used to verify whether the digital certificate stored in the fourth storag...

Embodiment 2

[0086] The following embodiments provide a method for secure online transactions. In this embodiment, the used USB Key is equipped with a liquid crystal display. The entire online banking transaction process includes three steps: PIN code verification, certificate and server verification, key acquisition and information interaction. In the entire online banking transaction process, PIN code verification, certificate and server verification, and key acquisition and information interaction are realized one by one in chronological order, see figure 2 ,Specific steps are as follows:

[0087] PIN code verification process, see image 3 :

[0088] Step 301, the USB Key establishes a connection with the client host;

[0089] Step 302, the client host sends an instruction to the USB Key to verify the PIN code;

[0090] Step 303, the USB Key generates a disordered keyboard list, and returns to the client host;

[0091] In step 303 of this embodiment, the disordered keyboard tabl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The information provides a novel internet secure transaction system and a method thereof. A client computer system and an e-currency system running on the client computer system serve as transfer systems and do not participate in interaction with key information; a safe and logic communication link is built between a service terminal and information safety equipment; and key information does not appear in the client computer system and the e-currency system in the clear form so that a user key can not be intercepted and utilized repeatedly by an attacker. In order to achieve the purpose of building the safe and logic communication link, the dynamic key technology is used in the invention, that is, in the process of internet transaction, keys used each time are different. Each time the internet transaction is conducted, the bank service terminal generates two new symmetrical keys which are encrypted and then transmitted to the information safety equipment. The information safety equipment decrypts the encrypted keys to obtain the key so as to conduct the encryption communication with the service terminal. Even if the key is intercepted by the attacker, the key can not be used next time, because the keys used each time are different.

Description

technical field [0001] The invention relates to the field of information security, in particular to a novel online security transaction system and method. Background technique [0002] With the vigorous development of the network, the online banking business has also penetrated into the Internet in every corner of the world by using the rapidly developing computer and computer network and communication technology. So far, most domestic banks have launched their own online banking business. During the development of online banking, the security of online transactions has also become the focus of attention. [0003] At present, the security measures taken by most banks are to provide users with USB Key, and to join the participation of USB Key in the process of conducting online transactions. USB Key is a hardware device with USB interface. It has a built-in single-chip microcomputer or smart card chip, has a certain storage space, can store the user's private key, and uses ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/00G06Q40/00H04L29/06G06Q20/38
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products