Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-phishing third party transaction method, device and system

An anti-phishing and transaction technology, applied in the transmission system, payment system, electrical components, etc., can solve the problems of user property loss, easy client hijacking, user payment account and password leakage, and achieve the effect of avoiding leakage

Active Publication Date: 2015-06-17
JIANGSU WISEDU INFORMATION TECH
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When conducting transactions through third-party payment, the user's client terminal can easily be hijacked to other fake websites
Especially after the client is installed with a Trojan horse, after the Trojan horse program tampers with the client's Host file, the user can easily log in to a fake website, resulting in the leakage of the user's payment account and password, and ultimately resulting in the loss of the user's property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-phishing third party transaction method, device and system
  • Anti-phishing third party transaction method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0034] Such as figure 1 As shown, the present invention involves a transaction server 1 , a third-party payment server 2 and a client terminal 3 . Users log in to the transaction server 1 through the client terminal 3 to conduct transactions, such as purchasing commodities, game props, bus tickets, movie tickets, and the like. When the user conducts transactions on the transaction server 1, the currency payment service is performed by the third-party payment server 2. The user logs in to the third-party payment server 2 through the client 3, and pays the currency to the seller's account on the third-party payment. Thereby completing the currency payment transaction.

[0035] The anti-phishing third-party transaction method of the present invention is as figure 2 shown.

[0036] First, after the client submits a transaction request for purchasing goods, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-phishing third party transaction method, device and system. When a client performs payment by virtue of a payment link page of a third party payment server, a transaction server synchronously acquires a client connecting state of a payment link from the third party payment server. According to the client connecting state, the transaction server transmits a payment reliability identifier or a payment alarm identifier to the client. Therefore, the user can judge whether a third payment server connected with the client at present is safe by virtue of the payment reliability identifier or the payment alarm identifier.

Description

technical field [0001] The invention relates to online third-party payment, in particular to the security of third-party payment. Background technique [0002] At present, many transactions involving currency payment such as online stores and games are carried out through third-party payment. When conducting transactions through third-party payment, the user's client terminal can easily be hijacked to other fake websites. Especially after the client is downloaded with a Trojan horse, after the Trojan horse program tampers with the Host file of the client, the user is easy to log in to a counterfeit website, causing leakage of the user's payment account and password, and ultimately resulting in loss of the user's property. This kind of phishing scam is currently the most common means of online payment fraud. Contents of the invention [0003] The problem to be solved by the invention: third-party payment phishing fraud on the network. [0004] In order to solve the above...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L29/06
Inventor 李忻均
Owner JIANGSU WISEDU INFORMATION TECH