Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure network transaction method

A transaction method and network security technology, applied in secure communication devices, payment systems, transmission systems, etc., can solve the problems of scratch card usage limit, cumbersome operation, loss of USBKey or dynamic password or being stolen by others, and achieve Safe online transactions, high security, and easy operation

Inactive Publication Date: 2014-03-26
阮桂芳
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both scratch cards and two-dimensional matrix cards are provided in the form of paper cards, but they all have inherent defects. Scratch cards have a strict limit on the number of times they can be used, generally only 30 times, while two-dimensional matrix cards Although the card can be used unlimited times, it is easy to be copied. Compared with the dynamic password, the scratch card and the two-dimensional matrix card are not time-sensitive.
[0005] However, users must use USB Key or dynamic password during transaction operations, which is cumbersome to operate
Since the USB Key or dynamic password may be lost or stolen by others, this seriously affects the security of online transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure network transaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] see figure 1 , which is a flow chart of the network security transaction method of the present invention. The network security transaction method includes the following steps:

[0023] S1: The user uses the client host to log in to the trading interface;

[0024] S2: Enter the bank account number and password;

[0025] S3: carry out the transfer operation;

[0026] S4: The bank terminal randomly selects an operation mode;

[0027] S5: The bank terminal generates a set of random number strings;

[0028] S6: the bank terminal operates the digital string in the operation mode of step S4, and stores the operation result in the bank terminal;

[0029] S7: Put the operation mode number before the random number string;

[0030] S8: Send the digital string with the mode number and the reservation information of the user at the bank terminal to the user's mobile phone;

[0031] S9: judge the reserved information;

[0032] S10; when the reserved information is correct inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure network transaction method. The secure network transaction method comprises the following steps that S1, a user logs into a transaction interface of a client host computer and executes account transfer operation; S2, an operation mode is selected for a bank terminal randomly; S3, the bank terminal generates a numeric string randomly and conducts operation, and a result is stored in the bank terminal; S4, the bank terminal sends the numeric string and the serial number of the operation mode to a mobile phone of the user; S5, the user extracts the category of the operation mode from a received message and conducts operation on the numeric string; S6, the user sends an operation result to the bank terminal through the mobile phone in a short message mode; S7, the bank terminal checks information fed back by the user, a transaction is completed if the information is accurate, and the transaction is canceled if the information is inaccurate. A network and the mobile phone are simultaneously used for conducting the transaction, so that the secure network transaction method is safer and rapider to implement.

Description

technical field [0001] The invention relates to the field of communications, in particular to a network security transaction method. Background technique [0002] With the vigorous development of the Internet, online banking has also penetrated into the Internet in every corner of the world by using the rapidly developing computer and computer network and communication technology. So far, most domestic banks have launched their own online banking services. During the development of online banking, the security of online transactions has also become the focus of attention. [0003] At present, the security measures taken by most banks are to provide users with USB Key or dynamic password authentication methods. Among them, the USB Key stores the digital certificate representing the user's unique identity and the user's private key. In this overall solution based on the PKI system, the user's private key is generated in the high-security USB Key, and cannot be exported to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40H04L29/06
CPCG06Q20/3223G06Q20/38215H04L9/3226
Inventor 阮桂芳
Owner 阮桂芳
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More