Method and system for enhancing security of network transactions

A network transaction and security technology, applied in transmission systems, commerce, instruments, etc., can solve problems such as illegal tampering, loss, and theft

Active Publication Date: 2010-02-17
FEITIAN TECHNOLOGIES
View PDF3 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the smart key device cannot guarantee the security of data transmission outside the interactive channel, and cyber malicious actors can easily take advantage of this weakness of the smart key device to carry out illegal activities
It is mainly manifested in that the current computer is not an isolated computer, and almost all of them are connected to the Internet, making the personal computer a relatively open computer environment. Once the user's computer is implanted with a Trojan horse program, when the user uses the smart key on this computer When the device is installed, it is easy for network hackers to steal the operation commands and data sent by the user to the smart key device through the computer, tamper with the commands and data without the user's knowledge, and use the smart key device to perform various illegal operations at will. , the consequences of doi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for enhancing security of network transactions
  • Method and system for enhancing security of network transactions
  • Method and system for enhancing security of network transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0164] This embodiment provides a method for improving the security of network transactions, including:

[0165] The client sends a service request to the first server, and sends the first information input by the user to the second server through the first server, and the information of the security device is pre-registered in the second server;

[0166] After receiving the first information, the second server generates second information according to a preset algorithm, and returns the second information to the client through the first server, and the client provides the second information to the user;

[0167] The safety device receives the first information and the second information input by the user, generates an intermediate value according to the first information and the second information, and processes the intermediate value to generate third information and provide it to the user;

[0168] The client receives the third information input by the user, and sends the t...

Embodiment 2

[0239] This embodiment provides a method for improving the security of network transactions, including:

[0240] The client sends a service request to the first server, and the first server forwards the service request to the second server, and the information of the security device is pre-registered in the second server;

[0241] After receiving the service request, the second server generates second information according to a preset algorithm, and returns the second information to the client through the first server, and the client provides the second information to the user;

[0242] The safety device receives the first information and the second information input by the user, generates an intermediate value according to the first information and the second information, and processes the intermediate value to generate third information and provide it to the user;

[0243] The client receives the third information and the first information input by the user, and sends the th...

Embodiment 3

[0263] see image 3 , the present embodiment provides a system for improving the security of network transactions, including: a client 1, a security device 2, a first server 3 and a second server 4;

[0264] Client 1 includes:

[0265] The first communication module 11 is configured to send a service request to the first server, send the first information input by the user to the first server, receive the second information returned by the first server, and send it after the user inputs the third information To the first server, receive the transaction result returned by the first server;

[0266] An output module 12, configured to provide the second information received by the first communication module to the user;

[0267] The input module 13 is configured to receive the first information and the third information input by the user;

[0268] Safety device 2 includes:

[0269] An input module 21, configured to receive first information and second information input by a u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for enhancing the security of network transactions, belonging to the field of information security. The method comprises the following steps: a client sends a service request to a first server, the first server sends first information to a second server, the second server generates second information, and the second information is returned to the client by the first server so as to be supplied to a user; a security device receives the first information and the second information input by the user and generates third information for the user; the client receives the third information input by the user, the first server sends the third information to the second server, when the second server receives the third information, the second server generates an authentication code by utilizing the same method that the security device generates the third information, the second server compares the authentication code with the third information for authentication and returns results to the first server, and the first server executes transactions when the authentication is success and returns the transaction result to the client. The system comprises the client, the security device, the first server and the second server. The invention greatly enhances the security in the transaction process.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for improving network transaction security. Background technique [0002] With the rapid development of computer technology, more and more users are accustomed to using the convenience and abundant resources of the network to complete various tasks. This saves time to a certain extent, improves work efficiency, and promotes the further development and improvement of the Internet. However, with the continuous development of high-tech means, while the Internet brings convenience and entertainment to people, there are also great potential safety hazards. Among them, the threat brought by criminals to computers connected to the Internet by taking advantage of the openness of the network and malicious attacks attracts the most attention. [0003] A dynamic password is also called a one-time password (One-time Password), which means that the user's password is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q30/00
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products