Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure network transaction method

A transaction method and network security technology, applied in instruments, payment systems, finance, etc., can solve problems such as cumbersome operations, limited number of use of scratch cards, loss of USBKey or dynamic password or being stolen by others, and achieve high security , easy operation and safe online transaction

Inactive Publication Date: 2014-03-26
阮桂芳
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both scratch cards and two-dimensional matrix cards are provided in the form of paper cards, but they all have inherent defects. Scratch cards have a strict limit on the number of times they can be used, generally only 30 times, while two-dimensional matrix cards Although the card can be used unlimited times, it is easy to be copied. Compared with the dynamic password, the scratch card and the two-dimensional matrix card are not time-sensitive.
[0005] However, users must use USB Key or dynamic password during transaction operations, which is cumbersome to operate
Since the USB Key or dynamic password may be lost or stolen by others, this seriously affects the security of online transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network transaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] see figure 1 , which is a flowchart of the network security transaction method of the present invention. The method for network security transactions includes the following steps:

[0023] S1: The user uses the client host to log in to the transaction interface;

[0024] S2: Enter bank account number and password;

[0025] S3: perform transfer operation;

[0026] S4: The bank terminal randomly selects an operation mode;

[0027] S5: The bank terminal generates a set of random number strings;

[0028] S6: The bank terminal operates the number string in the operation mode of step S4;

[0029] S7: Put the operation mode number before the operation result;

[0030] S8: Send the operation result with the mode number and the user's reserved information in the bank terminal to the user's mobile phone;

[0031] S9: judging the reserved information;

[0032] S10; when the reserved information is correct, execute step S11; if it is wrong, cancel the transaction;

[0033]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure network transaction method. The secure network transaction method comprises the following steps that S1, a user logs into a transaction interface of a client host computer and executes account transfer operation; S2, an operation mode is selected for a bank terminal randomly; S3, the bank terminal generates a numeric string randomly and conducts operation; S4, the bank terminal sends an operation result and the serial number of the operation mode to a mobile phone of the user; S5, the user extracts the category of the operation mode from a received message and conducts inverse operation on the operation result of the bank terminal; S6, an operation result of the mobile phone of the user is sent to the bank terminal in a short message mode; S7, the bank terminal checks information fed back by the user, a transaction is completed if the information is accurate, and the transaction is canceled if the information is inaccurate. A network and the mobile phone are simultaneously used for conducting the transaction, so that the secure network transaction method is safer and rapider to implement.

Description

technical field [0001] The invention relates to the communication field, in particular to a network security transaction method. Background technique [0002] With the vigorous development of the network, the online banking business has also penetrated into the Internet in every corner of the world by using the rapidly developing computer and computer network and communication technology. So far, most domestic banks have launched their own online banking business. During the development of online banking, the security of online transactions has also become the focus of attention. [0003] At present, the security measures taken by most banks are to provide users with USB Key or dynamic password authentication methods. Among them, the digital certificate representing the unique identity of the user and the private key of the user are stored in the USB Key. In this overall solution based on the PKI system, the user's private key is generated in a high-security USB Key, and c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/10G06Q20/32G06Q40/04
CPCG06Q20/401G06Q20/3223G06Q20/3255G06Q20/382
Inventor 阮桂芳
Owner 阮桂芳