Mobile payment security system with wireless data private network physically isolating the Internet
A technology of mobile payment and physical isolation, which is applied in the system field of switching network channels between Internet access channels and secure payment applications. It can solve the problems of high fraud, high terminal requirements, and large infrastructure investment, so as to improve security and ensure security. , the effect of ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Refer to figure 1 . In a preferred embodiment described below, the wireless data private network physically isolates the mobile payment security system from the Internet, which in turn includes a payment server, a mobile phone number authentication device, a password authentication device, and a mobile payment security data network including those isolated from the Internet. APN or VPDN network connected to the GSN gateway. Application systems including payment servers and authentication devices are built in a mobile payment security data network isolated from the Internet. The payment server establishes accounts, mobile phone numbers, IMSI numbers, and passwords through password authentication devices and mobile phone number authentication devices. The multi-authentication mode of all-in-one binding is connected to the mobile network gateway GSN via the mobile payment secure data network access point name APN dedicated line and / or virtual private dial-up network VPDN de...
Embodiment 2
[0042] Example 2: Mobile phone number binding account function
[0043] figure 1 In the mobile payment security system where the wireless data private network physically isolates the Internet, the system model using the mobile phone number binding function and the mobile phone number binding function system model include GSN equipment and mobile phone number authentication equipment in turn. The mobile phone shuts off the Internet access channel, connects the mobile payment security network, and establishes a communication tunnel with the mobile phone number authentication device. During the establishment of the communication tunnel, when the mobile phone sends a time domain request, the mobile phone sends a time domain session (Session refers to a terminal user The time interval for communicating with the interactive system, usually refers to the time elapsed from logging into the system to logging off the system); GGSN or SGSN first links the mobile network through the access po...
Embodiment 3
[0046] Embodiment 3: Password authentication mode
[0047] Refer to figure 1 . In the above embodiment 1, the mode of password authentication includes a digital password, or a biological password such as fingerprint, face or pupil, and so on. Password authentication can be a single form such as a number, or it can be a superposition of multiple forms. Such as numbers and fingerprints.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com