Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure connection payment method and device

A secure connection and tunneling technology, applied in the field of secure payment for smart terminal equipment, can solve problems such as difficult access to the underlying protection of the operating system, victimization of mobile terminal users, and theft of funds, etc., to achieve humanized service functions, avoid bullet box harassment, and service The function is more effective

Inactive Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme provides a detailed technical scheme for realizing terminal security, which can make relatively safe network payment, in practice, there are still a large number of security cases that further indicate that the improvement of security technology is never-ending, and the communication links involved Safety maintenance is an essential link
[0003] A large number of mobile payment applications currently exist, including well-known mobile terminals such as WeChat and Alipay, are limited by the fact that they belong to the application level, and it is difficult to touch the underlying protection of the operating system. Therefore, although a large number of protection measures have been added to the application itself, for external The security technology belonging to the system level seems powerless, so the important task of doing a good job in underlying security protection needs to be realized by third-party security applications
[0004] Third-party security applications focus on protecting the communication security of mobile payment. Specifically, a large number of Trojan horse programs can be latent by connecting to public WiFi access points. After the user accesses the access point with a mobile terminal, the mobile The terminal analyzes the communication data in the data flow sent by the access point, illegally steals security-related data such as account numbers, passwords, and verification codes involved in mobile payment, and further deciphers these data to obtain sufficient Material of account theft, desperation to steal funds, victimizing the user of this mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure connection payment method and device
  • Secure connection payment method and device
  • Secure connection payment method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0035] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the secure payment technology of intelligent terminal equipment, and discloses a secure connection payment method. The method comprises the following steps that it is determined that a specific payment scene is started; a communication tunnel based on a virtual private network protocol is established for the payment scene to carry out data transmission; when the communication tunnel does not exist any more, the payment scene is quitted. Compared with the prior art, the communication tunnel based on the virtual private network is accurately and efficiently established for the payment function of a mobile terminal in advance by intelligently recognizing the started state of the payment scene of the mobile terminal, it is ensured that data related to payment are safely transmitted through the communication tunnel, and payment safety is guaranteed.

Description

technical field [0001] The present invention relates to intelligent terminal equipment security payment technology, in particular to a secure connection payment method and a corresponding device. Background technique [0002] With the development of Internet security technology, mobile payment has become commonplace in electronic transactions. For example, CN104021467A Patent Announcement discloses a method for protecting the payment security of a mobile terminal. By applying the method, the security level of the mobile terminal for mobile payment can be greatly improved. It can be seen that the security technology of mobile payment involves not only network and system security, but also terminal security. Although this scheme provides a detailed technical scheme for realizing terminal security, which can make relatively safe network payment, in practice, there are still a large number of security cases that further indicate that the improvement of security technology is ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/16G06Q20/38
CPCG06Q20/16G06Q20/382
Inventor 高祎玮孟齐源
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products