Application-based service security system and method

A security system and business technology, applied in the field of information security, can solve problems such as low transaction security

Inactive Publication Date: 2019-09-27
武汉众邦银行股份有限公司
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide an application-based business security system and method,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application-based service security system and method
  • Application-based service security system and method
  • Application-based service security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0058] refer to figure 1 , figure 1 It is a structural block diagram of the first embodiment and the second embodiment of the application-based business security system of the present invention.

[0059] In this embodiment, the application-based business security system includes: a target terminal 10, a merchant server 20 and a user server 30;

[0060] The target terminal 10 is configured to obtain a request message and a session token, encrypt the request message and the session token according to a first preset encryption rule according to a first random key, and obtain a message token Encrypt data, and send the message token encrypted data to the merchant server 20.

[0061] It should be understood that the target terminal 10 may be an electronic device such as a smart phone, a personal computer, or a desktop co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application-based service security system and method. In the system, a target terminal is used for acquiring a request message and a session token, encrypting the request message and the session token according to a first random key and a first preset encryption rule to obtain message token encrypted data, and sending the message token encrypted data to a merchant server; a merchant server is used for carrying out signature processing on the message token encrypted data, obtaining message token signature data and feeding back the message token signature data to the target terminal; a target terminal is also used for encrypting the message token signature data again according to the second random key to obtain target signature data and sending the target signature data to the user server; and a user server is used for verifying the target signature data, and executing the corresponding business service according to the target signature data if the verification is passed. Based on the information security, the data interaction security is improved by encrypting the message, authenticating the identity and signing the data.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an application-based business security system and method. Background technique [0002] At present, many financial institutions and financial companies choose to embed a software development kit (Software Development Kit, abbreviated as SDK) in a third-party application program (Application, abbreviated as APP) when doing service output. One of the problems faced by the SDK is Transaction security. At present, many SDKs use only the security mechanism of the network protocol layer, such as https. Although this security mechanism at the network protocol layer can achieve a certain security effect, it cannot encrypt the specific content of the message. If the message is hijacked, there is a risk of transaction sensitive data leakage. In addition, it cannot be targeted at the transaction object Identity authentication and data signature, there are risks of acce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3236H04L9/3239H04L9/3249H04L63/0478H04L63/0807H04L63/108H04L2209/72
Inventor 张路路李耀田骏王永强程钰
Owner 武汉众邦银行股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products