Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security system for securities transactions and a security verification method for securities transactions

A security system and transaction technology, applied in the field of securities transaction security system, can solve problems such as increased implementation and management, difficulties, and inability to fundamentally guarantee data security, and achieve the effect of accurate transaction data and protection security

Active Publication Date: 2021-12-24
XIHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main defect is that all peripheral systems that need to support double identity verification functions, such as online transactions, mobile securities, and telephone entrustment, need to establish a connection with an independent verification system through a new interface method, which increases the difficulty of implementation and management.
In addition, when network delays, failures or interruptions occur, the current trading system security system generally adopts redundant settings, and one or more sets of redundant systems are set up according to the level of requirements. The redundant system is exactly the same as the normal system. In addition, when there is a problem with the network, the state and update of identity verification and transaction data are usually called by a particularly complex algorithm, regardless of the hardware The cost and software cost are very high, and data security cannot be fundamentally guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security system for securities transactions and a security verification method for securities transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] see figure 1 , is a structural block diagram of the security system for securities of the present invention, wherein the security system for securities transactions includes a client, an identity verification module, a communication service module, a transaction service module, a historical data module, and a clearing data module, wherein , the client terminal, the identity verification module, the communication service module, and the transaction service module are connected in sequence, and the historical data module and the clearing data module are respectively connected to the transaction module.

[0015] The following is a detailed description of the verification process and the specific structure of the verification module, see figure 1 , the identity verification module includes: a verification selection module, a central verification module, a verification module, a verification database, a locking module, a dynamic password module, an information module, a mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

As a widely used commercial application system at present, the securities trading system has particularly remarkable characteristics, that is, it has very high requirements for security, real-time performance, accuracy, and continuity. In the security system used for the trading system, the present invention, Through the module combination of the identity verification system and the transaction service module setting, the identity verification of the identity transaction module and the structure of the transaction service module are set, so that when the network fails, the identity verification and transaction data can still be guaranteed. Accuracy and Safety.

Description

technical field [0001] The invention belongs to the field of security systems for securities transactions, and in particular relates to a security system for securities transactions and a security checking method for securities transactions. Background technique [0002] As a widely used commercial application system at present, the securities trading system has particularly remarkable characteristics, that is, it has very high requirements for security, real-time, accuracy, and continuity. Especially as an open online transaction and service platform, its Security plays a pivotal role in the whole system, how to provide powerful security services and redundant services is one of the key issues facing the establishment of online trading systems. [0003] Technologies such as data encryption, identity verification, and permission setting have been widely used in the security design of various information systems. However, with the rapid development of the securities market, v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06F21/32G06F21/46
CPCG06F21/32G06F21/46G06Q40/04
Inventor 胡天石杜欣王博
Owner XIHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products