A method for realizing safe transaction of touch terminal
A touch terminal, secure transaction technology, applied in the field of secure transactions, can solve the problems of sensitive data leakage, indistinguishable input method security, leakage into the hands of criminals, etc., to achieve the effect of strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In the secure transaction method of a touch terminal provided in this embodiment, it is necessary to install an input method on a touch terminal, such as a mobile phone, a personal digital assistant, a portable computer, or a financial transaction, before conducting a transaction. Bind to the transaction program;
[0021] Such as figure 1 As shown, in order to ensure the security of the input method installed on the touch terminal, the touch terminal described in this embodiment adopts a digital signature to install the input method, and the steps are as follows:
[0022] S1: Use the private key to encrypt the installation package of the input method;
[0023] S2: The public key for decrypting the input method installation package is kept on the touch terminal;
[0024] S3: When installing an input method, use the public key on the touch terminal to decrypt the input method installation package. If the decryption is successful, mark the input method as an input method...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


