Security information interaction system, device and method

A security information and interactive system technology, applied in the payment system, payment system structure, discount/reward, etc., can solve the problems of cumbersome operation, time consumption and high cost, and achieve the effect of simple operation, time consumption and low cost

Inactive Publication Date: 2014-10-15
CHINA UNIONPAY
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing security information interaction systems and methods have the following problems: it is necessary to manually additionally use auxiliary resources associated with specific security information interaction, so the operation is cumbersome and the time consumption and cost are high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security information interaction system, device and method
  • Security information interaction system, device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] figure 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention. Such as figure 1 As shown, the security information interaction system disclosed in the present invention includes a security information interaction terminal 1 and a data processing server 2 . Wherein, the security information interaction terminal 1 (such as a POS machine) completes the security information interaction process based on the security information interaction instruction from the user and through data interaction with an external security carrier (such as a bank card) and a data processing server 2 ( For example, a payment transaction operation), and automatically execute operations associated with the security information interaction process after the security information interaction process is completed. The data processing server 2 completes the security information interaction process and the operations associat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security information interaction system, device and method. The method comprises the following steps: a security information interaction terminal is used to complete the security information interaction process based on a security information interaction instruction from a user and thorough the data interaction with an external security carrier and a data processing server; and the security information interaction terminal is used to automatically execute operations associated with the security information interaction process through the data interaction with the data processing server after the security information interaction process is completed. The security information interaction system, device and method disclosed in the invention can use auxiliary resources associated with specific security information interaction on a real-time basis and/or automatically.

Description

technical field [0001] The present invention relates to an information interaction system, equipment and method, and more specifically, to a security information interaction system, equipment and method. Background technique [0002] At present, with the increasingly wide application of the network and the increasing variety of business types in different fields, it is becoming more and more important to implement secure information interaction (such as payment transactions) combined with auxiliary resources (such as coupons). [0003] Existing security information interaction systems and methods usually use auxiliary resources associated with specific security information interaction in the following manner: relevant parties (such as merchants) use security information interaction terminals (such as POS machines) to complete online The specific security information interaction (such as a payment transaction); then said parties additionally use paper or electronic secondary ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q30/02
CPCG06Q20/38G06Q30/02G06Q20/382G06Q20/387G06Q30/0207
Inventor 胡莹王丰肖波嵇文俊孟宏文
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products