Mobile security financial terminal and financial transaction method

A technology for financial terminals and financial transactions, which is applied in the field of mobile security financial terminals and financial transactions, can solve the problems that users cannot be absolutely guaranteed not to be intercepted, and it is difficult to guarantee the security of the underlying I/O and display output of the system, so as to eliminate malware and Viruses threaten transaction security, improve confidence in use, and guarantee the effect of products

Inactive Publication Date: 2013-11-27
BEIJING WATCH DATA SYST
View PDF4 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, the online payment methods commonly used by ordinary consumers are all carried out on general-purpose software and hardware systems, and the existing software and hardware security protection technologies are difficult to guarantee the security of the bottom I / O and display output of the system on general-purpose operating systems, that is, It is impossible to absolutely guarantee that users will not be intercepted when inputting sensitive information, and that sensitive content is authentic and credible when outputting and displaying
Although the above-mentioned security protection technology is adopted, it can only guarantee security within a certain range, instead of comprehensively starting from information browsing, order generation, user sensitive information input, establishment of secure transactions with the bank background, and confirmation of payment. security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile security financial terminal and financial transaction method
  • Mobile security financial terminal and financial transaction method
  • Mobile security financial terminal and financial transaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0107] In this embodiment, the financial transaction of mobile payment is completed through the mobile security financial terminal, specifically the process of completing order payment.

[0108] Image 6 It shows the whole flow chart from acquiring mobile payment data (order generation, order entry) to completing mobile payment when the mobile security financial terminal of this embodiment is used for mobile payment.

[0109] First, the data transceiving module 13 acquires the mobile payment data required to complete the order payment. The mobile payment data in this embodiment mainly refers to the order number and the order amount. Depend on Image 6 It can be seen from the figure that there are many ways to obtain the above mobile payment data, which can be obtained from computer online shopping, from mobile phones, or from QR codes printed on shelves. When order payment is made, the terminal only completes the payment link, that is to say, the terminal operation starts fr...

Embodiment 2

[0111] In this embodiment, the financial transaction of the network banking service is completed through the mobile security financial terminal, specifically the process of bank transfer.

[0112] When the financial transaction is completed, the mobile security financial terminal can directly communicate with the bank background to obtain the required bank transfer data, and of course the user can also directly input the terminal. The bank transfer data in this embodiment mainly refers to the transfer account number and transfer amount, etc. After the terminal obtains the data, it selects the transaction method, and then enters the account password and other information according to the requirements of the transfer business with each bank, and the terminal actively initiates with the bank background Transfer interaction process and confirm the transaction result.

[0113] The mobile security financial terminal described in the present invention is issued through unified certif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile security financial terminal and a financial transaction method based on the terminal. The terminal comprises a power supply module and a human-computer interaction module and further comprises a data transceiving module, a service processing module and a security module, wherein the data transceiving module is used for being communicated with other financial terminals or intelligent cards to perform interaction of financial interaction data, the service processing module is connected with the data transceiving module and used for completing financial transactions according to the financial interaction data, and the security module is used for performing security management on the human-computer interaction module, the data transceiving module and the service processing module. The mobile security financial terminal can complete the financial transactions independently without relying on personal computers, mobile phones and other intelligent terminals, solves the potential threat that information can be intercepted or tampered by malicious programs when user input information and user output information are displayed in the transaction process in an existing open operation system, and security is improved.

Description

technical field [0001] The invention relates to the technical field of network banking services and mobile payment, in particular to a mobile secure financial terminal and a financial transaction method based on the terminal. Background technique [0002] At present, the latest OCL (Operation Control List) second-generation online banking key, in addition to retaining the hardware protection function of the existing online banking key for digital certificates, also enables the legal holder of the online banking key to confirm the key information in the transaction process. The physical display screen, keys and encrypted information interaction of the personal computer realize the credible display of transaction information and user feedback confirmation, which can effectively resist the threat of transaction information tampering by existing attack methods. Similar authentication devices include OTP (dynamic password), password card, and file digital certificates, etc. The p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/38
CPCG06Q40/02
Inventor 王幼君叶新
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products