Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Object property security on-line verifying method and device

A technology of object attributes and verification methods, applied in the field of information security, can solve the problems of increased business promotion cost and difficulty, and achieve the effect of reliable online verification and low cost

Active Publication Date: 2014-02-19
CHINA UNIONPAY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are two modes of real-name verification in Internet applications, but both have certain deficiencies: Mode 1 is to verify by sending the card number, ID number, and name to the issuing bank
This mode requires a certain amount of financial support (the amount of money into the account to be verified, remittance fees, etc.), if the user repeatedly verifies, unbinds, and re-authenticates, it will increase the cost of business promotion and increase the difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object property security on-line verifying method and device
  • Object property security on-line verifying method and device
  • Object property security on-line verifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Unless specifically stated otherwise, as will also be appreciated from the following discussion, throughout this specification, discussion using terms such as "filter," "screen," "determine" means using a computer or similar The action or process of a specific device, such as an electronic computing device. In the context of this specification, a computer or similar electronic computing device is capable of manipulating or transforming signals. These signals are typically represented as physical electronic or magnetic quantities in memory, registers, or other information storage, transmission, or display devices of a computer or similar electronic computing device. For example, an electronic computing device may include one or more processors that perform one or more specific functions.

[0023] Such as figure 1 As shown, the first step of the online verification method for object attribute security is to send the public attribute of the object to the object attribute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention brings forward an object property security on-line verifying method. The method comprising: sending disclosed properties of an object to an object property security verifying device through a network; sending a verifying application to the object property security verifying device; using the object through a prior safe approach and obtaining confirmation information through the safe approach after successful use; and sending the confirmation information to the object property security verifying device to finish verifying. By using the method and device provided by the invention, on-line verifying can be realized reliably at a quite low cost.

Description

technical field [0001] The present invention generally relates to information security technology, and in particular to an online verification method and equipment for object attribute security in an information exchange system. Background technique [0002] The development of network technology has brought convenience to people's information exchange. However, in the virtual world of the network, authentication of the user's identity is a problem. How to exchange information under the premise of ensuring identity certainty is a huge technical challenge. [0003] Online transactions and payments are a specific example of the above problem. In order to extend the application of the bank to the network, it is necessary to perform real-name verification on the bank card, for example, perform real-name verification on the bank card bound to the registered member on the web application. After passing the verification, bank users can enjoy various exclusive services such as poi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q20/38
Inventor 黄河
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products