Secure network transaction method
A transaction method and network security technology, applied in instruments, payment systems, finance, etc., can solve problems such as cumbersome operations, limited number of use of scratch cards, loss of USBKey or dynamic password or being stolen by others, and achieve high security , easy operation and safe online transaction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] see figure 1 , which is a flowchart of the network security transaction method of the present invention. The method for network security transactions includes the following steps:
[0023] S1: The user uses the client host to log in to the transaction interface;
[0024] S2: Enter bank account number and password;
[0025] S3: perform transfer operation;
[0026] S4: The bank terminal randomly selects an operation mode;
[0027] S5: The bank terminal generates a set of random number strings;
[0028] S6: The bank terminal operates the number string in the operation mode of step S4;
[0029] S7: Put the operation mode number before the operation result;
[0030] S8: Send the operation result with the mode number and the user's reserved information in the bank terminal to the user's mobile phone;
[0031] S9: judging the reserved information;
[0032] S10; when the reserved information is correct, execute step S11; if it is wrong, cancel the transaction;
[0033]...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 