Security information interaction system, device and method
A technology of security information and interaction methods, applied in transmission systems, electrical components, user identity/authority verification, etc., can solve the problems of low convenience, low security and reliability, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] figure 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention. like figure 1 As shown, the security information interaction system disclosed in the present invention includes a security information interaction terminal 1 (such as a mobile terminal used by a user, for example, a mobile phone), a registration server 2, an access server 3 and a data processing server 4 ( Exemplary, such as transaction processing servers in the financial field). Wherein, the security information interaction terminal 1 is used to construct a registration request based on an instruction from the user, and transmit the registration request to the registration server 2 to perform a registration operation associated with the user, and the security information interaction Terminal 1 is further used to store and manage the security information interaction management table, and based on the records in the security infor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

