Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security Information Interaction Method Based on Internet

A technology of security information and interactive methods, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve the problems of leakage of sensitive information of background server users, improve security and convenience of use, avoid leakage, improve safety effect

Active Publication Date: 2018-11-27
CHINA UNIONPAY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing technical solutions have the following problems: (1) Sensitive information entered by users related to security information interaction may be intercepted or obtained maliciously through phishing websites, thereby posing a large potential security risk; (2) ) There is a risk of leakage of user sensitive information due to poor supervision of the third-party background server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Information Interaction Method Based on Internet

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0026] figure 1 It is a flowchart of an Internet-based security information interaction method according to an embodiment of the present invention. Such as figure 1 As shown, the first embodiment of the Internet-based security information interaction method disclosed in the present invention includes the following steps: (A1) The security information interaction service party (such as a bank) issues and sets security information interaction information to the user according to the user's application. device and a security information carrier and associate the security information interaction device with the security information carrier, wherein the security information carrier carries the user's sensitive information related to security information interaction (such as the user's bank card account information); (A2) when the user needs to interact with security information, the user completes the security information interaction process through the Internet terminal and with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes an Internet-based security information interaction method, which includes: the security information interaction service party distributes and sets security information interaction equipment and security information carriers to users according to user applications, and uses the security information interaction equipment Associated with the security information carrier, wherein the security information carrier carries the user's sensitive information related to security information interaction; when the user needs to perform security information interaction The security information interaction device and the security information carrier complete the security information interaction process, wherein during the security information interaction process, the user does not need to input sensitive information. The Internet-based safety information interaction method disclosed by the invention has high safety and is convenient to use.

Description

technical field [0001] The present invention relates to an information interaction method, more specifically, to an Internet-based security information interaction method. Background technique [0002] At present, with the increasingly wide application of the network and the increasing variety of business types in different fields, online security information (that is, information with high security requirements, such as information related to financial transactions) through the network (especially the mobile network) information) interaction is becoming more and more important. [0003] Existing Internet-based security information interaction systems and methods usually require users to input sensitive information related to security information interaction on a specific user interface via an Internet terminal (for example, when using online banking, account ID and password need to be entered) or the user's Sensitive information related to security information interaction ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L9/40
Inventor 陈成钱郭伟周钰
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products