Security information interaction system, device and method
A technology of security information and interactive methods, applied in the direction of digital data protection, user identity/authority verification, etc., can solve the problems of security carrier security information leakage, security risks, etc., and achieve the effect of avoiding malicious reading and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] figure 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention. Such as figure 1 As shown, the security information interaction system disclosed in the present invention includes a security information interaction terminal 1 and a security carrier 2 . Wherein, after the first communication link is established between the security carrier 2 and the security information interaction terminal 1, the security information interaction terminal 1 executes the binding for the security carrier 2 based on the security carrier binding list An authentication operation, and then execute a related security information interaction process (such as a payment transaction process in the financial field) according to the result of the binding authentication operation.
[0030] Preferably, in the security information interaction system disclosed in the present invention, before performing the binding authenticati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

