Secure network transaction method

A transaction method and network security technology, applied in secure communication devices, payment systems, transmission systems, etc., can solve the problems of scratch card usage limit, cumbersome operation, loss of USBKey or dynamic password or being stolen by others, and achieve Safe online transactions, high security, and easy operation

Inactive Publication Date: 2014-03-26
阮桂芳
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both scratch cards and two-dimensional matrix cards are provided in the form of paper cards, but they all have inherent defects. Scratch cards have a strict limit on the number of times they can be used, generally only 30 times, while two-dimensional matrix cards Although the card can be used unlimited times, it is easy to be copied. Compared wit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network transaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] see figure 1 , which is a flow chart of the network security transaction method of the present invention. The network security transaction method includes the following steps:

[0023] S1: The user uses the client host to log in to the trading interface;

[0024] S2: Enter the bank account number and password;

[0025] S3: carry out the transfer operation;

[0026] S4: The bank terminal randomly selects an operation mode;

[0027] S5: The bank terminal generates a set of random number strings;

[0028] S6: the bank terminal operates the digital string in the operation mode of step S4, and stores the operation result in the bank terminal;

[0029] S7: Put the operation mode number before the random number string;

[0030] S8: Send the digital string with the mode number and the reservation information of the user at the bank terminal to the user's mobile phone;

[0031] S9: judge the reserved information;

[0032] S10; when the reserved information is correct inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure network transaction method. The secure network transaction method comprises the following steps that S1, a user logs into a transaction interface of a client host computer and executes account transfer operation; S2, an operation mode is selected for a bank terminal randomly; S3, the bank terminal generates a numeric string randomly and conducts operation, and a result is stored in the bank terminal; S4, the bank terminal sends the numeric string and the serial number of the operation mode to a mobile phone of the user; S5, the user extracts the category of the operation mode from a received message and conducts operation on the numeric string; S6, the user sends an operation result to the bank terminal through the mobile phone in a short message mode; S7, the bank terminal checks information fed back by the user, a transaction is completed if the information is accurate, and the transaction is canceled if the information is inaccurate. A network and the mobile phone are simultaneously used for conducting the transaction, so that the secure network transaction method is safer and rapider to implement.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 阮桂芳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products