Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted authentication system and method for network transactions

A network transaction and authentication system technology, applied in the field of network transaction trusted authentication, can solve the problems of unpredictable behavior that cannot be discovered and handled in time, and user identity credibility that infringes on the interests of users, so as to ensure reliability and security, Good scalability, flexible and convenient deployment

Active Publication Date: 2018-04-17
TONGJI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After investigation, taking a large online payment platform company in China as an example, the current solution strategy has obvious shortcomings in the application of the industry: First, when the user's account password is stolen, it is impossible to identify the hacker's use of the user's account to conduct transactions and infringe on the user. The issue of trusted user identity; the second is that it is always impossible to detect and deal with unexpected behaviors encountered during system operation
The main reason for these shortcomings is that there is still a lack of a credible authentication system for network transactions to monitor and manage the transaction parties themselves and transaction behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted authentication system and method for network transactions
  • Trusted authentication system and method for network transactions
  • Trusted authentication system and method for network transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] (case)

[0020] Network transaction trusted authentication system architecture diagram, such as figure 1 shown.

[0021] Such as figure 1 As shown, the bottom layer of the network transaction trusted authentication system supports two mainstream operating systems, Windows and Linux, so it can be deployed on both Windows and Linux systems, and has good cross-platform capabilities. Supporting technologies include .net, J2EE, SqlServer, MySql, JBoss, SPRING, and HIBERNATE, etc., providing good support for upper-layer application development. Above the supporting technology are three relatively low-level basic management modules, namely communication management module, certificate management module and database management module. The communication management module is mainly responsible for encapsulating the network communication function according to the specific requirements of this system, providing communication services such as data exchange for the upper layer, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A trusted authentication system and method for network transactions belongs to the technical field of trusted authentication for network transactions. The bottom layer of the system supports two mainstream operating systems, Windows and Linux; on top of the bottom layer support is the basic management module, which are communication management module, certificate management module and database management module; on top of the basic management module is the fourth-party authentication domain ; Also includes user domain, e-commerce domain and third-party payment domain, etc. The trusted authentication method includes steps: 1) When a network transaction occurs, the user logs in to the secure client, uploads a digital certificate for digital authentication, and e-commerce and third-party payments also upload their digital certificates for corresponding digital authentication; 2) when After the digital authentication is passed, the user downloads the behavior certificate through the user behavior certificate download module, and the three parties officially enter the transaction process; and so on. The invention has good expansibility, portability and versatility, flexible and convenient configuration and deployment, and does not need third-party software support.

Description

technical field [0001] The invention relates to the technical field of trusted authentication of network transactions. Background technique [0002] With the rapid development of the Internet and the continuous progress of computer science and technology, Internet-based network transactions are also in full swing, which not only provides a continuous impetus for the development of my country's economy, but also brings great impact to the lives of the people. Great convenience. More and more people carry out business activities through online transactions and payment methods, and the development prospects of online transactions are very broad. [0003] However, due to the recent rise of online transaction and payment platforms, the security system of online payment is not perfect, and the credibility of online transaction processes and behaviors has become more and more prominent, which has gradually become a bottleneck problem facing the development of online transactions. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06Q20/382G06Q20/401G06F21/33H04L63/0823H04L2463/102G06F16/235G06Q20/027G06Q20/3821G06Q20/405
Inventor 蒋昌俊陈闳中闫春钢丁志军于汪洋葛雍龙
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products