A method to ensure the security of buyers and sellers in online transactions

A network transaction, the technology of both parties, applied in the field of network transactions, can solve the problem that the seller cannot obtain the payment, the defect, the buyer cannot use the serial number of the point card, etc.

Inactive Publication Date: 2018-05-01
乐点卡数位科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, see also figure 1 As shown, there are still some problems in the aforementioned online transaction method. First, for the point card, once the buyer receives the physical card or the serial number of the point card, most of them will directly send the transaction completion information through the second terminal device 12 , therefore, if the seller uses the serial number of the point card on the Internet immediately after selling and receiving the payment, the buyer will not be able to use the serial number of the point card
In addition, if the buyer refuses to send the transaction completion information after receiving the physical card or the serial number of the point card, the seller will not be able to obtain the payment, which will lead to many transaction disputes
[0011] To sum up, it can be seen that the existing third-party payment and network transaction methods have major defects for buyers or sellers, and they still need to rely on interpersonal trust to succeed. Therefore, how to design a A better method of online transactions has become an important topic for related network operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to ensure the security of buyers and sellers in online transactions
  • A method to ensure the security of buyers and sellers in online transactions
  • A method to ensure the security of buyers and sellers in online transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention is about a method that can guarantee the security of buyers and sellers in network transactions, please refer to figure 2 , in a first embodiment of the present invention, the method is applied to a network transaction system 2, the network transaction system 2 includes a first terminal device 21, a second terminal device 22, a third-party server 23 and a The verification unit 24, in this embodiment, the verification unit 24 is located in the third-party server 23, but, in other embodiments of the present invention, according to the business model requirements of the industry, the verification unit 24 can be located in a In the game manufacturer's server, Chen Ming first.

[0044] Inherited, see figure 2 and image 3 As shown, the third-party server 23 can be connected to the terminal devices 21 and 22 respectively through the Internet, and is provided with an account data 24 and a payment data 25. The account data 25 includes multiple accounts...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method capable of guaranteeing the network transaction security of a buyer and a seller. The method is applied to a networked transaction system. The networked transaction system comprises a first terminal device, a second terminal device, a third-party server and a verification unit, wherein the third-party server is connected with the terminal devices respectively through the internet respectively, account data and fund data are stored in the third-party server, and each account corresponds to a fund. The method comprises the following steps: the third-party server receives commodity transaction information transmitted by the first terminal device, wherein the commodity transaction information comprises first account information, a first commodity code and the sale amount; the third-party server transmits the first commodity code to the verification unit; the verification unit verifies whether a commodity corresponding to the first commodity code is unused, if yes, the first commodity code is locked in a locked state, and a locking finishing message is transmitted to the third-party server; and the third-party server displays the commodity transaction information on a transaction platform after receiving the locking finishing message.

Description

technical field [0001] The present invention relates to a network transaction method, especially a method that can ensure that "virtual goods will not be used maliciously, or software registration codes or codes or point card verification passwords will not be sold for more than one item, or sold by sellers to buyers. The online transaction method in which the buyer is pre-empted by the original seller before registration", and both the buyer and the seller can obtain the virtual goods and money respectively. Background technique [0002] With the improvement of network communication technology and the vigorous development of e-commerce, more and more enterprises and individuals will choose to conduct commodity transactions through network platforms, especially for individual consumers, as long as they use computers or mobile phones to It is undoubtedly extremely convenient to buy products from all over the world without being restricted by region and time by pressing the bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/02G06Q20/28H04L9/32
CPCG06Q20/02G06Q20/123G06Q20/382
Inventor 彭仁主韩萱颖
Owner 乐点卡数位科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products