Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for transaction by mobile phone

A transaction method and mobile phone technology, applied in security devices, payment system structures, instruments, etc., can solve problems such as insecurity and user bank information insecurity, and achieve the effect of ensuring legitimacy, easy maintenance, and simple transaction process

Inactive Publication Date: 2012-05-16
中国移动通信集团宁夏有限公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The encryption method depends on the operator. The personal bank information of the user using this service is open to the operator, and there are factors that the user's bank information is insecure;
[0005] 2. Adopt the method of fixed soft encryption. If the algorithm is determined, and there are information packets that have to go through the link between the operator and the bank, this method also has unsafe factors;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for transaction by mobile phone
  • Method, device and system for transaction by mobile phone
  • Method, device and system for transaction by mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Such as image 3 As shown, the embodiment of the operator management platform of the present invention includes:

[0069] A dynamic encryption key generation module 302, configured to generate a dynamic encryption key corresponding to this transaction;

[0070] An authentication information generation module 304, configured to generate authentication information after bundling the terminal's IMSI and mobile phone number;

[0071] The dynamic encryption module 306 is configured to, after receiving the transaction message sent by the terminal, use the pre-generated dynamic encryption key to encrypt the transaction message and the authentication information and send it to the bank side.

[0072] Preferably, this embodiment further includes: a static encryption module 308, wherein, when the terminal initiates a transaction, the authentication information generation module 304 receives the IMSI and mobile phone number registered by the terminal, and stores the terminal's IM...

Embodiment 2

[0076] Such as Figure 4 As shown, the banking service server embodiment of the present invention includes:

[0077] The dynamic decryption module 402 is used to decrypt the encrypted transaction message and authentication information sent by the operator side according to the dynamic decryption key, and obtain the authentication information and transaction message;

[0078] An authentication module 404, configured to perform authentication according to the authentication information;

[0079] The execution module 406 is configured to perform corresponding operations according to the transaction message after the authentication is successful.

[0080] Preferably, this embodiment further includes: a static decryption module 408, configured to decrypt the encrypted initial authentication information sent by the operator according to a preset static key; a storage module 410, configured to store the terminal's The IMSI, the mobile phone number and the serial number correspondin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for transaction by a mobile phone. The encryption method for the transaction by the mobile phone comprises the following steps: A, an operator side binds the international mobile subscriber identity (IMSI) and the mobile phone number of a terminal, and then, generates authentication information, the operator side receives a transaction message sent by the terminal, then, encrypts the transaction message and the authentication information by using pre-generated dynamic encryption keys, and sends the encrypted transaction message and authentication information to a bank side; and B, the bank side decrypts the received encrypted transaction message and authentication information, carries out authentication by using the authentication information, and executes corresponding operation according to the transaction message after the authentication is successful. With the adoption of the method, the device and the system for the transaction by the mobile phone, the transactions of users can be safer and more reliable; and the whole transaction process does not need a third-party payment platform actually, so that the transaction process can be simpler and safer and is convenient to maintain.

Description

technical field [0001] The invention relates to a business support technology, in particular to a mobile phone transaction method, device and system. Background technique [0002] At present, there are two methods of mobile phone transfer: 1. The method of direct payment by logging into the online banking center through the mobile phone. This kind of business is essentially an Internet business, and the mobile phone and mobile communication network only provide transmission channels; In the way of bank docking, the payment platform realizes the flow of money between platforms, and the flow of money between the platform and the bank is realized through fixed password verification. [0003] The existing mobile phone transfer and payment methods have the following serious problems: [0004] 1. The encryption method depends on the operator. The personal bank information of the user using this service is open to the operator, and there are factors that the user's bank informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06G06Q20/16H04W12/03H04W12/041
Inventor 彭晓川余游金宝铭王琦马玲马立建付磊江雪梅张学红张宇武建卓王磊严玮峰钟丽娜邢莉黄洪涌朱华高磊吉彩莉
Owner 中国移动通信集团宁夏有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products