Technology for improving security of accessing computer application system by mobile phone

A mobile phone and application system technology, applied in computer security devices, computing, electronic digital data processing and other directions, can solve the problems of online banking customers' lack of self-protection awareness, low storage and computing capabilities, and insecure connection to servers. Achieve the effect of preventing theft of users' online bank account transactions, a wide range of applications, and many security algorithms

Inactive Publication Date: 2006-09-27
刘亚威
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented method allows for secure storage of digital signatures when connecting to an internet-connected device like your smartphone without compromising its functionality. It does this through sending emails between them over wireless networks instead of relying solely upon physical connections. Additionally, it uses encryption techniques to protect against viruses and hackers who may have been able to access their funds during these interactions. Overall, this new way makes sure sensitive data stored remotely cannot be accessed even if they are transmitted wirelessly.

Problems solved by technology

Technological Problem addressed in this patents relating to improving the safety of internet bankings systems against cyber threat attacks. Current methods require expensive hardware devices like PC servers and web clients, but these techniques may expose sensitive individuals who could compromise themselves if connected wirelessly over an unsecured network connection. Additionally, existing secure measures only protect client identification based upon public keys and cannot prevent unauthorized access attempts at remote locations where there might exist multiple accounts.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Technology for improving security of accessing computer application system by mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0043] Taking the current online application with increasingly prominent security problems as an example, the implementation method of this technology is described.

[0044] Application 1: User authentication method for an online application:

[0045] 1. The operator (or third party) of the online application provides the key to the user;

[0046] 2. Install the key in the mobile phone (determined to be installed in its secure area according to the type and function of the SIM card and mobile phone);

[0047] 3. The user connects to the online application through the Internet browser;

[0048] 4. When the user starts the application on the mobile phone, he needs to enter the password and select the interactive online application;

[0049] 5. The user enters the user name and password to log in to the application (this step can be omitted, it is only used as a simple verification here, because the latter steps involve some complicated calculations and have some costs, without...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to computer science information technique, mobile communication, software and hardware technique of mobile phone, Internet application/ID validation, network security, and computer network principle and application. In e-bank, on-line pay and on-line work, to prevent stealing user name and password as well as the alternative attack, the USB Key and other techniques have more or less defect; This invention stores user security data (key and certificate) in mobile phone, applies phone calculation and communication ability to expands user and PC security performance as well as the security of PC access to application system.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 刘亚威
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products