Unlock instant, AI-driven research and patent intelligence for your innovation.

Security verification method, device and system for network transactions

A network transaction and security verification technology, applied in the field of devices and systems, and security verification methods for network transactions, can solve problems such as poor adaptability and obstacles to widespread use

Active Publication Date: 2017-12-19
北京云核网络技术有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the related art, the above-mentioned wired or wireless methods are widely used, so the system has poor adaptability when using the above-mentioned wired or wireless methods to send transaction information to the above-mentioned devices, which hinders the above-mentioned devices from being used on mobile devices (mobile phones, tablet computers, etc.) ) are widely used on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method, device and system for network transactions
  • Security verification method, device and system for network transactions
  • Security verification method, device and system for network transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a security verification method for network transactions, such as image 3 shown, including:

[0057] 101. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.

[0058] In this embodiment, based on the air-borne sound wave transmission method, the sound wave of a specific frequency is used to send the request message to the sound wave two-dimensional code electronic encryption key. Among them, the specific frequency can be selected and set by the operator of the client and the sound wave two-dimensional code electronic password key; specifically, the client makes a sound through its set speaker to transmit the sound wave, so that the sound wave two-dimensional code electronic password can The key receives the sound wave, and the sound wave two-dimensional code electronic password key recei...

Embodiment 2

[0075] Further, such as Figure 4 As shown, this embodiment also provides a security verification method for network transactions, including:

[0076] 201. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.

[0077] 202. Acquire a transaction password input by the user and corresponding to the request message for verifying the request message.

[0078] Specifically, a transaction password is set on the server in advance, and the password is set by the user and known only by the user. When the user uses the sound wave two-dimensional code electronic password key to confirm network transactions, the user needs to enter the transaction password on the keyboard of the sound wave two-dimensional code electronic password key before continuing to conduct network transactions, thereby enhancing the security of network transac...

Embodiment 3

[0085] An embodiment of the present invention also provides a security verification method for network transactions such as Figure 5 shown, including:

[0086] 301. Receive a request message sent by a client for requesting a network transaction, where the request message uses sound waves as a transmission medium; wherein the request message includes transaction information.

[0087] 302. Obtain a transaction password input by the user and corresponding to the request message for verifying the request message.

[0088] 303. Receive a verification instruction corresponding to the request message input by the user.

[0089] 304. Extract transaction information.

[0090] 305. Digitally sign the transaction information.

[0091] 306. Encrypt the transaction password to obtain the ciphertext of the transaction password.

[0092] In this embodiment, the transaction password is used to encrypt the transaction password to obtain the ciphertext of the transaction password, which ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security verification method, device and system of network transaction and relates to the field of communication. The method comprises the steps of receiving a request message carrying transaction information sent from a client end and acquiring a transaction password, corresponding to the request message and input by a user, for verifying the request message; after a verification command (namely, an equipment protection password) input by the user and corresponding to the request message is received, extracting the transaction information and the transaction password contained in the request message, performing digital signature on the transaction information, encrypting the transaction password and / or obtaining the basic information of the transaction information, generating a two-dimensional code and displaying according to the steps, scanning the two-dimensional code by the client end, obtaining the transaction information carried by the two-dimensional code, and sending the transaction information to a server, so the server can conveniently execute the subsequent transaction flow. According to the security verification method, device and system of network transaction, the transaction information is exchanged by taking a sound wave and the two-dimensional code as mediums, and the problems of lower compatibility and convenience caused by the fact that the transaction information is exchanged by commonly using a wired or wireless mode is solved.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a security verification method, device and system for network transactions. Background technique [0002] With the development of the mobile Internet, people generally use the client side of the mobile Internet application system to conduct network transactions. [0003] Related technologies use U-shield (USBKEY or U-KEY can also be used) for security verification of network transactions, such as figure 1 As shown, specifically: when the user needs to conduct online transactions, first log in to the service system, enter the transaction interface, and select the transaction content. At this time, the system will prompt the user to use the above-mentioned equipment for security verification. After connecting (it can be connected via wired (data cable or audio cable) or wireless (WIFI or Bluetooth)), the system will send the transaction information to the above-mentioned device,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 戴林巧罗勇
Owner 北京云核网络技术有限公司