Security verification method, device and system for network transactions
A network transaction and security verification technology, applied in the field of devices and systems, and security verification methods for network transactions, can solve problems such as poor adaptability and obstacles to widespread use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] This embodiment provides a security verification method for network transactions, such as image 3 shown, including:
[0057] 101. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.
[0058] In this embodiment, based on the air-borne sound wave transmission method, the sound wave of a specific frequency is used to send the request message to the sound wave two-dimensional code electronic encryption key. Among them, the specific frequency can be selected and set by the operator of the client and the sound wave two-dimensional code electronic password key; specifically, the client makes a sound through its set speaker to transmit the sound wave, so that the sound wave two-dimensional code electronic password can The key receives the sound wave, and the sound wave two-dimensional code electronic password key recei...
Embodiment 2
[0075] Further, such as Figure 4 As shown, this embodiment also provides a security verification method for network transactions, including:
[0076] 201. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.
[0077] 202. Acquire a transaction password input by the user and corresponding to the request message for verifying the request message.
[0078] Specifically, a transaction password is set on the server in advance, and the password is set by the user and known only by the user. When the user uses the sound wave two-dimensional code electronic password key to confirm network transactions, the user needs to enter the transaction password on the keyboard of the sound wave two-dimensional code electronic password key before continuing to conduct network transactions, thereby enhancing the security of network transac...
Embodiment 3
[0085] An embodiment of the present invention also provides a security verification method for network transactions such as Figure 5 shown, including:
[0086] 301. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.
[0087] 302. Obtain a transaction password input by the user and corresponding to the request message for verifying the request message.
[0088] 303. Receive a verification instruction corresponding to the request message input by the user.
[0089] 304. Extract transaction information.
[0090] 305. Digitally sign the transaction information.
[0091] 306. Encrypt the transaction password to obtain the ciphertext of the transaction password.
[0092] In this embodiment, the transaction password is used to encrypt the transaction password to obtain the ciphertext of the transaction password, which ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


