Mobile security settlement network construction system and use method thereof

A security and network technology, applied in transmission systems, payment systems, electrical components, etc., can solve the problems of low security, difficult deployment, and easy to break the defense line, and achieve the effect of ensuring security.

Inactive Publication Date: 2017-05-10
SHANGHAI CHENGYE INTELLIGENT TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the above-mentioned former is a technology widely used in public network platforms, which is more convenient, affordable, and easier to deploy, but relatively low in security and easier to be breached; the reliability of the latter is much higher than that of the former, but It is difficult to deploy, expensive, and cannot completely resist the attacks of some professional hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile security settlement network construction system and use method thereof
  • Mobile security settlement network construction system and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The invention provides a construction system of a mobile security settlement network, which is provided with an embedded system, and the embedded system is integrated with five modules, namely, a SIM card identification module, a WIFI module, a mobile communication module, a digital certificate module and a fingerprint identification module, and becomes The intermediate key is X-shield, which is an intelligent key system. Embedded systems have OTG or Lightning standard interfaces on the embedded motherboard.

[0033] The function of the digital encryption (digital certificate) module is to pair with the certificate of the designated address of the data authentication center to confirm the legitimacy of the certificate.

[0034] The function of the fingerprint identification module is: to scan the pre-stored fingerprint of the X-shield user in real time, compare it with the pre-stored fingerprint identification code of the APP and the data authentication center, and rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile security settlement network construction system. The mobile security settlement network construction system consists of an embedded system comprising an intermediate key, namely, an X shield, a mobile X shield device, a client mobile device, a mobile private network, private network base station and controller, a data authentication center platform server and a receipt and payment settlement system operation platform server, and a mobile security settlement network is constructed. An X shield APP is installed in the client mobile device, bound with the client mobile device and associated with an APP of a receipt and payment settlement system; when a client performs receipt and payment settlement, the X shield APP is actively connected to the mobile private network of mobile security settlement, transmits private encrypted data and is intelligently connected with a back-end system server platform database; after an identity is confirmed to be correct through multiple comparison, a connection permission signal is released, so that the system can be securely connected with the private network, and secure system operation is ensured; and when the identity is abnormal through comparison, the system refuses a connection and gives an alarm signal to a client APP, so that the payment settlement is refused, and the private network connection is cut off.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, in particular to a construction system and usage method of a mobile security settlement network using a smart key (or X-shield for short). Background technique [0002] As mobile devices increasingly penetrate and gradually dominate the lives of contemporary people, mobile communications have become an indispensable part of people's lives. However, the intellectualization of mobile communication has given birth to the development of the Internet on the mobile side, such as WeChat, mobile shopping malls, mobile banking, mobile games, etc. Various APP software emerge in endlessly, which greatly enriches and facilitates people's life. Study and work, but also bring security issues in mobile communications. How to ensure that users are more secure and reliable when using mobile devices has become a necessary condition for current mobile network applications. Especially for the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40H04L29/06
Inventor 邬承基邬君能厉豪方红星
Owner SHANGHAI CHENGYE INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products