Networked transaction certification system and method

A technology for network transactions and transaction systems, applied in transmission systems, buying and selling/lease transactions, payment system structures, etc., can solve problems such as low security factor, cracking, and theft, avoiding transaction hijacking, ensuring non-tampering, and security. high intensity effect

Active Publication Date: 2013-01-09
北京信安世纪科技股份有限公司 +1
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing network transaction systems and methods have the following problems: 1. Both the mobile phone dynamic authentication code system and the dynamic token system cannot realize the non-repudiation and non-repudiation of transactions; 2. All current PKI systems based on digital certificates use RSA public key cryptography method, with the continuous improvement of cryptanalysis technology and the rapid improvement of computer performance, the RSA algorithm is facing more and more severe risks of being cracked, so the safety factor is low; 3. Digital certificates are the most secure in theory 4. How to securely and seamlessly implement ordinary signatures and double-check signatures. There are many application scenarios where public key cryptographic algorithms are used for digital signatures in network transaction authentication. Some key scenarios need to display key transaction fields and require the end user to press the button to confirm and then digitally sign. This type of signature is usually referred to as "review signature". For most scenarios, the signature that does not need to be displayed and button review is defined as "normal signature".

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networked transaction certification system and method
  • Networked transaction certification system and method
  • Networked transaction certification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0051] Such as figure 1 As shown, the network transaction authentication system of the present invention includes an encryption authentication device 11 , a networked computing device 12 and a transaction system device 13 , wherein the encryption authentication device 11 is connected to the transaction system device 13 through the networked computing device 12 .

[0052] The encryption authentication device 11 is used to establish a connection with a networked computing device 12 .

[0053] The networked computing device 12 is used to receive the requested transaction information submitted by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a networked transaction certification system which comprises an encryption authentication device, a networked computing device and a transaction system device, wherein the encryption authentication device is connected with the transaction system device through the networked computing device, the networked computing device is used for receiving request transaction information submitted by a user, and transmitting the request transaction information to a transaction system device; the transaction system device is used for generating a random code according to the request transaction information, and searching an elliptic curve password public key corresponding to the user in a user database, and the transaction system device is also used for encrypting request transaction information and a random code by using the elliptic curve password public key, transmitting the encrypted ciphertext to the networked computing device, and storing the request transaction information and the random code into a transaction information database. The invention can realize confidentiality and integrity of a message, authenticity of a transaction entity and non-repudiation of transaction, and has the characteristics of high safety, capability of avoiding transaction hijacking, transaction falsification and remote control.

Description

technical field [0001] The invention belongs to the field of information security, and more specifically relates to a network transaction authentication system and a network transaction authentication method. Background technique [0002] With the rapid development of the network and the great convenience it provides, people are increasingly relying on the network for various activities, such as online banking, online shopping, online payment, etc. These online activities are inseparable from a secure network transaction authentication system And method, at present, be used for network transaction authentication system and method include: mobile phone dynamic authentication code system, dynamic token system and public key infrastructure (Public Key Infrastructure, be called for short PKI) system based on digital certificate. [0003] However, the existing network transaction systems and methods have the following problems: 1. Both the mobile phone dynamic authentication code...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06Q30/06G06Q20/42
Inventor 王翊心胡进阳凌怡
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products