Two-dimension code-based mobile terminal transaction encryption method
A technology of mobile terminals and encryption methods, applied in the network field, can solve problems such as insufficient payment security, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in further detail below with reference to the accompanying drawings and examples.
[0030] The inventive method is based on a two-dimensional code chip device, and the two-dimensional code chip device has the following functions:
[0031] (1) The two-dimensional code chip device needs to authenticate the customer when the customer is about to enter the mobile terminal payment transaction platform. After the password is encrypted, it is sent to the proxy server of the bank for password verification. Only through the password verification can it continue to be used.
[0032] (2) The two-dimensional code chip device also saves the customer's identity verification certificate, that is, the private key that uniquely confirms the customer's identity, and can automatically sign the information when the customer needs to perform identity verification.
[0033] (3) The two-dimensional code chip device can recognize two-dimensional code in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com