Unlock instant, AI-driven research and patent intelligence for your innovation.

Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications

A technology for information input and transaction systems, applied in the field of systems, can solve problems such as excessive computing time, inability to easily apply small terminals, and difficulty in protecting keys

Inactive Publication Date: 2004-09-15
HAREXINFOTECH INC
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, even in this case, the private key is established in the terminal, making it very difficult to protect the key
Also, since PKI requires a lot of computing time, this technology may not be easily applicable to small terminals
However, if PKI is applied to small terminals, a large amount of computing time will also cause inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications
  • Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications
  • Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0023] figure 1 The illustrated financial information input method uses a symmetric security algorithm in which financial information is input into the cellular phone through wires.

[0024] exist figure 1 In this, a financial institution such as a card company or a bank sends information D1 including customer number and valid date of the card to be issued to the card applicant, and sends information D2 obtained by encrypting the information D1 on itself to the card issuing terminal. Here, D1 is descriptive information that is printed on a receipt in the financial institution, and D2 is information encrypted on itself in the financial institution. The issuing terminal operates as an encryption base unit (BU) in which an optical transceiver module is installed. The encryption base unit (BU) receives a confidential number, ie, portable phone e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A financial information input method using a symmetric key security algorithm and a mobile communications commercial transaction system using the same encrypts financial information such as a customer's identification number and a valid date with a symmetric key algorithm by use of an electronic wallet administration number of a customer's terminal used as an encryption key at the time of applying an issuance of a card, and directly inputs the encrypted financial information into a customer's electronic wallet terminal or inputs the same via a communications network. In the case that a commercial transaction settlement is accomplished with a mobile communications terminal in which the encrypted financial information is stored, his or her own electronic wallet administration number is input so that the encrypted financial information and the administration number are optically transmitted to a POS terminal / card inquiry machine of an affiliated shop. The POS terminal / card inquiry machine which has received the encrypted financial information and administration number uses the received electronic wallet administration number and decodes the encrypted financial information with the administration number. Thus, although an unauthorized person knows an encryption algorithm unless a customer's electronic wallet administration number is exposed illegally, customer's financial information cannot be used. That is, an effect of fundamentally preventing customer's financial information from being illegally copied can be provided.

Description

technical field [0001] The present invention relates to a commercial transaction system using a personal portable mobile communication terminal attached with an optical transceiver, and more particularly, the present invention relates to a method for inputting financial information using a symmetric key security algorithm in which security is secured by a symmetric key The algorithm encrypts the financial information so that the financial information cannot be illegally copied, and then the encrypted financial information is installed in the mobile communication terminal, so that various transaction fees can be settled through the mobile communication terminal. Background technique [0002] In recent years, cards that are more convenient to use and easier to carry than cash have been widely used. Cards can be classified into credit cards, cash cards, direct payment cards, advance payment cards, traffic cards and the like according to settlement methods. Currently used cards...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/00G06Q20/00G06Q20/30G06Q20/32G06Q20/36G06Q50/00G07F7/10G09C1/00H04L9/32H04M17/00H04M17/02H04W12/00H04W12/04H04W28/00H04W84/10
CPCG06Q20/327H04M17/026G06Q20/3674G06Q20/341G07F7/1008G06Q20/3829G06Q20/04H04M17/00G06Q20/40975G06Q40/00G06Q20/322H04M15/48H04M2215/0156G06Q20/32G06Q40/02H04L9/06H04W12/04
Inventor 金喆起黄圭敏金程宪张光铢
Owner HAREXINFOTECH INC