Unlock instant, AI-driven research and patent intelligence for your innovation.

Network transaction method with safety

An online transaction and transaction technology, applied in the field of online transactions combined with digital authentication, can solve problems such as improper use, account and password theft, etc.

Inactive Publication Date: 2003-03-05
PINGSHI DIGIT
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Yet, utilize known network transaction method 10 to have following shortcoming: (1) when consumer carries out online transaction on the network, because account number and password must be transmitted on the network, if intercepted improperly, will cause a series of network transaction safety related question
(2) The account number and password of the Internet access kit are easy to be stolen and used improperly by a third party, which often causes unnecessary disputes between consumers, network service providers and third parties on consumer websites

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network transaction method with safety
  • Network transaction method with safety
  • Network transaction method with safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The network transaction method 30 of the present invention is applied in a network transaction system 32 to provide a user with an online transaction through a digital medium Dm via a network device 34 . Wherein, the digital medium Dm can be a digital transaction card or a biometric identification device, and the Internet access device 34 can be a personal computer Internet access device, a wireless communication Internet access device, or a set-top box (Set-top Box).

[0021] see figure 2 , figure 2 It is a schematic diagram of the network transaction system 32 applying the present invention. The network transaction system 32 includes a digital certificate module 38, a service providing module 40, a management module 42 and a transaction accounting module 44, wherein the service providing module 40 can be an Internet service provider (ISP) or an Internet content provider (ICP). The management module 42 has an authentication device 46 and a transaction device 48 . ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A network transition method contains that a user logs a digital certificate to generate a log data on a digital certification module via digital medium and the digital certificate module outputs the log data to a manage module certificating device with in a definite time. Users input the digit certificate in a service provided module via the digital medium to generate a digital sign to be outputted to a certificate device of a manage module to certificate the digital sign to generate a certificate identifying code outputted to a service providing module to make sure the effective state of theuser certificate and provide the user an on-line transition service to generate a related first transition data to be outputted to a transition account module to generate a second transition data outputted to a transition device of manage module which records the second transition data outputted to the service providing module displaying the

Description

technical field [0001] The invention relates to a network transaction method, especially a network transaction method combined with digital authentication. Background technique [0002] With the increasing popularity of the Internet, the number of transactions consumers conduct on the Internet has also increased. However, the security of online transactions is still quite questionable until today. [0003] So far, although many online transaction methods have been proposed one after another, the security of their transactions is still insufficient. In the past, Internet Service Providers (ISPs) often used their own Internet access kits as a basis, combined with consumer websites to provide consumers with online transaction services. For example, firstly, the consumer can purchase an Internet access kit with a predetermined denomination from the service provider, and the Internet access kit can be used for Internet transmission fees and online transac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/24H04L12/28
Inventor 宋明仲郑衍学涂根皇
Owner PINGSHI DIGIT