Application method of payment encryption hardware applied to mobile equipment
A technology of mobile devices and application methods, applied in the direction of payment architecture, data processing applications, coin-free or similar appliances, etc., can solve the problems of inconvenient verification and inability to conduct transactions using SMS, and achieve shortening of the transaction process. Time-saving and easy-to-use results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0021] Embodiment 1: The application method of payment encryption hardware applied to mobile devices according to the present invention includes a chip, the chip is provided with a mobile device communication interface, and the chip stores the information of the user's corresponding bank card and its password information, and the user's corresponding The bank card information and its password information are encrypted, and the chip is connected to the communication interface on the mobile device through the communication interface of the mobile device, and the mobile device is connected to the Internet for online transactions.
Embodiment 2
[0022]Embodiment 2: on the structure basis described in embodiment 1, comprise chip, chip has stored the information of user's corresponding bank card and password information thereof, is provided with CPU, rom, ram and mobile device communication interface on the chip, and ram is used for For intermediate data caching, rom is used to store the user's corresponding bank card information, transaction password public key encryption program and response key encrypted by the public key of the PKI key system, and the rom information can only be written but not read. The confidentiality of the data in the rom is guaranteed. After the CPU receives the random data sent by the bank background system, it performs a single hash operation on the random data sent by the bank background system and the response key data stored in the rom, and passes the operation result through The communication interface of the mobile device and the Internet send back to the bank background, and send the tra...
Embodiment 3
[0023] Embodiment 3: On the basis of the structure described in Embodiment 2, when using the mobile banking platform, the communication interface of the mobile device is connected to the communication interface on the mobile phone, and the CPU will also use the above method to exchange information with the bank background system Interaction, after the bank background system uses the corresponding private key to decode the public key, it will send the information of the corresponding bank card stored in the ROM to the mobile banking platform through the Internet, and ask to enter the password, the password entered, the password entered by The CPU uses the public key to encrypt and send it to the bank background system to decode the private key. After the verification is passed, the bank background system will send a verification success message to the mobile banking platform, and the mobile banking platform will directly jump to the corresponding operation interface and transfer ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com