Security Information Interaction Method Based on Internet
A technology of security information and interactive methods, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve the problems of leakage of sensitive information of background server users, improve security and convenience of use, avoid leakage, improve safety effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0026] figure 1 It is a flowchart of an Internet-based security information interaction method according to an embodiment of the present invention. Such as figure 1 As shown, the first embodiment of the Internet-based security information interaction method disclosed in the present invention includes the following steps: (A1) The security information interaction service party (such as a bank) issues and sets security information interaction information to the user according to the user's application. device and a security information carrier and associate the security information interaction device with the security information carrier, wherein the security information carrier carries the user's sensitive information related to security information interaction (such as the user's bank card account information); (A2) when the user needs to interact with security information, the user completes the security information interaction process through the Internet terminal and with ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com