Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications
A technology for information input and transaction systems, applied in the field of systems, can solve problems such as excessive computing time, inability to easily apply small terminals, and difficulty in protecting keys
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0023] figure 1 The illustrated financial information input method uses a symmetric security algorithm in which financial information is input into the cellular phone through wires.
[0024] exist figure 1 In this, a financial institution such as a card company or a bank sends information D1 including customer number and valid date of the card to be issued to the card applicant, and sends information D2 obtained by encrypting the information D1 on itself to the card issuing terminal. Here, D1 is descriptive information that is printed on a receipt in the financial institution, and D2 is information encrypted on itself in the financial institution. The issuing terminal operates as an encryption base unit (BU) in which an optical transceiver module is installed. The encryption base unit (BU) receives a confidential number, ie, portable phone e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 