Security Information Interaction Method Based on Customizable Browser

A technology of security information and interactive methods, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as inconvenient use, hidden safety hazards, and high costs, and achieve the effects of convenient use, enhanced security, and low cost

Active Publication Date: 2017-11-28
CHINA UNIONPAY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technical solutions have the following problems: (1) For the first method, because some malicious Trojan horse programs may be disguised as security controls and perform illegal operations after they are installed, there are relatively large security risks; (2) For the second method, the cost is high and it is inconvenient to use due to the need for a specific physical form of safety accessories

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Information Interaction Method Based on Customizable Browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 It is a flow chart of a customizable browser-based security information interaction method according to an embodiment of the present invention. Such as figure 1 As shown, the customizable browser-based security information interaction method disclosed in the present invention includes the following steps: (A1) The user logs in to the server of the service provider via an Internet terminal (such as a computer as a network node, a mobile terminal, etc.) and Apply for a customized browser associated with one or more security carriers (such as financial IC cards) owned by the user; (A2) the service provider server generates the customized browser based on the user's application; (A3) The user downloads the generated customized browser and installs the customized browser in a trusted processor; (A4) The user passes the customized browser installed in the trusted processor to The browser performs related security information interaction process (such as payment tra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention brings forward a security information interaction method based on a customizable browser. The method comprises the steps that a user logs in a service provider server via an internet terminal and applies for a customized browser which is related to one or multiple security carriers possessed by the user; the customized browser is generated by the service provider server based on the application of the user; the user downloads the customized browser and installs the customized browser in a trusted processor; and the user performs the related security information interaction process via the customized browser installed in the trusted processor. The security information interaction method based on the customizable browser has enhanced security and is convenient to use.

Description

technical field [0001] The present invention relates to an information interaction method, more specifically, to a security information interaction method based on a customizable browser. Background technique [0002] At present, with the increasingly widespread application of computers and networks and the increasing variety of business types in different fields, the method of security information interaction (that is, information interaction with high security requirements, such as transaction processing in the financial field) has become more and more important. more and more important. [0003] The basic working principles of the two existing security information interaction methods based on Internet terminals are as follows: (1) The user downloads the security control from the server of the service provider (such as a website supporting transaction services) and installs the security control on the user's In the Internet terminal (such as a computer as a network node),...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/0876
Inventor 褚红梅张飞尹亚伟
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products