Security token, transaction execution system and transaction execution method
A security token and transaction execution technology, applied in computer security devices, payment systems, payment architecture, etc., can solve problems such as increasing the cost of the bill of materials and increasing the size of the token
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] According to the present specification, there is provided a security token that receives and processes transaction verification input from an external user interface device, such as a smartphone. The security token may be in the form of a secure hardware token. The token also sends the corresponding transaction verification results to the host device to which the token is connected. In an exemplary implementation, a token may include a secure element that interfaces to a host device via a USB connection and to a mobile phone via NFC. According to the present specification, a user can visually verify transaction data and securely enter a PIN or password, for example, via a mobile phone, which can serve as a trusted UI companion for the token.
[0039] Therefore, security tokens do not need to be equipped with a rich user interface. That is, for example, the functionality of a token can be reduced to a security function. The token can receive transaction verification i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 