Unlock instant, AI-driven research and patent intelligence for your innovation.

Security information interaction system, device and method

A technology of security information and interactive methods, applied in the direction of digital data protection, user identity/authority verification, etc., can solve the problems of security carrier security information leakage, security risks, etc., and achieve the effect of avoiding malicious reading and improving security

Active Publication Date: 2018-01-12
CHINA UNIONPAY
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technical solutions have the following problems: since the security carrier can be used on any security information interaction terminal that supports the interface of the relevant standard, the security information on the security carrier may leak, resulting in potential security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security information interaction system, device and method
  • Security information interaction system, device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention. Such as figure 1 As shown, the security information interaction system disclosed in the present invention includes a security information interaction terminal 1 and a security carrier 2 . Wherein, after the first communication link is established between the security carrier 2 and the security information interaction terminal 1, the security information interaction terminal 1 executes the binding for the security carrier 2 based on the security carrier binding list An authentication operation, and then execute a related security information interaction process (such as a payment transaction process in the financial field) according to the result of the binding authentication operation.

[0030] Preferably, in the security information interaction system disclosed in the present invention, before performing the binding authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a security information interaction system, device and method. The method includes: establishing a communication link between a security carrier and a security information interaction terminal for the first time; For the binding authentication operation of the security bearer, and then execute the related security information interaction process according to the result of the binding authentication operation. Through the security information interaction system, device and method disclosed in the present invention, the internal information of the security carrier can be prevented from being maliciously read without authorization while keeping the machine card separated, thereby significantly improving the security of the system .

Description

technical field [0001] The present invention relates to an information interaction system, device and method, and more specifically, to a security information interaction system, device and method. Background technique [0002] At present, with the increasingly wide application of computers and networks and the increasing variety of businesses in different fields, systems for security information interaction (that is, information interaction with high security requirements, such as transaction processing in the financial field) , devices and methods (especially security information interaction systems based on mobile terminals) are becoming more and more important. [0003] The basic working principle of the existing technical solutions is as follows: the security carrier (on which one or more security applications can be stored and run, such as SIM card, SD card) and the security information interaction terminal (such as mobile terminal, POS machine, etc.) etc.) are physic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/60
Inventor 郭伟周钰于彬
Owner CHINA UNIONPAY