Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and related equipment

A data processing and data technology, applied in the field of information security, can solve the problems of transaction data password monitoring, stealing, screenshots, etc.

Active Publication Date: 2018-07-27
CHINA CONSTRUCTION BANK
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a data processing method and related equipment to solve the problem that the transaction data and the password input by the user are monitored, stolen or screen shot during the online transaction process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and related equipment
  • Data processing method and related equipment
  • Data processing method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0069] The main principles of the technical solution of the present application may include: displaying transaction information through a trusted user interface (TrustedUserInterface, TUI) to prevent the transaction information from being captured, and using the TUI to obtain the verification data input by the user to prevent the verification data from being acquired , the digital authentication authorization certificate is stored in the security element of the terminal device, and the transaction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a data processing method and related equipment. The method comprises that: in a case that identity authentication of a first application is passed, a second application in the trusted execution environment receives transaction data sent by the first application, wherein the first application is the application in the open execution environment; the second application displays the transaction information corresponding to the transaction data through a trusted user interface; the second application obtains verification data input by a user, through the trusted user interface; in the case that the identity authentication is verified by the security element, the second application sends the transaction data and the verification data to the security element; thesecond application receives signature data sent by the security element, wherein the signature data is obtained by processing the transaction data when the verification data is verified by the security element; and the second application sends the signature data to the first application. According to the technical scheme of the present application, the security and convenience of the online transaction can be guaranteed.

Description

technical field [0001] The present application relates to the field of information security, in particular to a data processing method and related equipment. Background technique [0002] The signature authentication tool is a tool used for electronic signatures in online banking. It uses asymmetric key algorithms to encrypt, decrypt and digitally sign online transaction data to ensure the confidentiality, authenticity, integrity and non-repudiation of online transactions. [0003] In some current methods, the signature verification tool is usually installed and stored in an external security hardware to ensure that key information is not read or copied. Terminal equipment for online transactions is connected to ensure the security of online transactions. The external security hardware installed and stored with signature authentication tools is usually called U-shield, K treasure, USB-key, and so on. Although these external security hardware can ensure that the key informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06F21/77
CPCG06F21/77G06Q20/38215G06Q20/40145
Inventor 朱彦张晓东杨杰张玉余挈刘丽娟何伟明周思彤马利华廖敏飞
Owner CHINA CONSTRUCTION BANK