Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing safe transaction of touch terminal

A touch terminal, secure transaction technology, applied in the field of secure transactions, can solve the problems of sensitive data leakage, indistinguishable input method security, leakage into the hands of criminals, etc., to achieve the effect of strengthening security

Active Publication Date: 2017-05-17
FUJIAN LANDI COMML EQUIP CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the unsafe input method program may leak the user's information to criminals at the first time
Currently, there are many types of input methods, and it is generally difficult for users to distinguish whether the input method is safe or not, which makes some sensitive data "unknowingly" stolen by dissidents and leaked out.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing safe transaction of touch terminal
  • A method for realizing safe transaction of touch terminal
  • A method for realizing safe transaction of touch terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In the secure transaction method of a touch terminal provided in this embodiment, it is necessary to install an input method on a touch terminal, such as a mobile phone, a personal digital assistant, a portable computer, or a financial transaction, before conducting a transaction. Bind to the transaction program;

[0021] Such as figure 1 As shown, in order to ensure the security of the input method installed on the touch terminal, the touch terminal described in this embodiment adopts a digital signature to install the input method, and the steps are as follows:

[0022] S1: Use the private key to encrypt the installation package of the input method;

[0023] S2: The public key for decrypting the input method installation package is kept on the touch terminal;

[0024] S3: When installing an input method, use the public key on the touch terminal to decrypt the input method installation package. If the decryption is successful, mark the input method as an input method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for secure transaction of a touch terminal. According to the method, an input method is installed in the touch terminal, the installed input method is bound on a transaction program, and the bound input method is used in the transaction program and is prohibited from being switched to a common input method, so as to avoid that sensitive information of a user is stolen by an insecure input method, lower the possibility that data is stolen without being noticed when sensitive data is input, enhance the security during the transaction, and enable a transaction process to be more secure and reliable.

Description

technical field [0001] The present invention relates to the field of safe transactions, and more particularly relates to a method for realizing safe transactions of touch terminals by utilizing such as mobile phones, personal digital assistants, portable computers, financial transactions and the like. Background technique [0002] With the large-scale promotion of touch-type terminal equipment, financial transactions on the terminal have become more common and convenient. However, because some users lack security awareness and do not know how to protect themselves during the transaction process, many transaction sensitive data (such as bank card numbers and passwords, etc.) are easily obtained by criminals, causing certain economic losses. The input method is an important channel for touch-type terminals to interact with users. Generally, users of touch-type terminals input some sensitive data (such as bank card number and password) into the terminal through the input method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06Q40/04
CPCG06Q40/00
Inventor 王斌
Owner FUJIAN LANDI COMML EQUIP CO LTD