Data interaction method, equipment and system

A data interaction and transaction technology, applied in the field of communication, can solve problems such as harming the interests of users

Inactive Publication Date: 2015-05-20
XIAN KUPAI SOFTWARE TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the transaction password in the above process is unchanged for a long time, the transaction password is very easy to be intercepted during the transmission process, so that others can conduct transactions without the user's permission, thus damaging the user's interests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method, equipment and system
  • Data interaction method, equipment and system
  • Data interaction method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] An embodiment of the present invention provides a data interaction method, which is applied to a user terminal, and the user terminal may include a mobile phone, a tablet computer, a notebook computer, a desktop computer, etc., such as figure 1 As shown, can include:

[0052] Step 101. Obtain a stored first temporary code, which is sent by a network terminal.

[0053] Step 102, receiving the identity code input by the user.

[0054] Step 103: Calculate the first temporary code and the identity code according to a preset algorithm to obtain a transaction password.

[0055] Step 104, sending the transaction password to the network terminal, so that the network terminal can conduct transactions according to the transaction password.

[0056] Step 105, receiving the transaction success information and the second temporary code sent by the network terminal.

[0057] Step 106, updating the first temporary code to the second temporary code.

[0058]In this way, after each ...

Embodiment 2

[0062] An embodiment of the present invention provides a data interaction method, such as figure 2 As shown, can include:

[0063] Step 201: Receive the first transaction password sent by the user terminal, the first transaction password is obtained by the user terminal calculating the first temporary code and the identity code according to a preset algorithm.

[0064] Step 202: Determine the identity code corresponding to the first transaction password according to the correspondence between the stored first transaction password and the stored identity code.

[0065] Step 203, complete the transaction according to the identity code.

[0066] Step 204, sending the transaction success information and the second temporary code to the user terminal.

[0067] Step 205: Calculate the second temporary code and the identity code according to the preset algorithm to obtain the second transaction password.

[0068] Step 206, generating a correspondence between the second transactio...

Embodiment 3

[0073] An embodiment of the present invention provides a data interaction method, which is applied to a data exchange system. The system may include a user terminal and a network terminal. It is assumed that the data exchange system is a system for online payment. Assume that the user pays for an item purchased in an online shopping mall by credit card for the first time. The preset algorithm of this embodiment takes MD5 as an example, such as image 3 As shown, the method includes:

[0074] Step 301, the user terminal sends binding application information to the network terminal.

[0075] The binding application information includes the user's online banking account number, credit card number, credit card password, ID number, name corresponding to the ID number, verification code received by the user terminal, and ID code input by the user. The verification code is a credit card verification code received by the user terminal after the user enters the mobile phone number bo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data interaction method, equipment and system and relates to the field of communication. The method, the equipment and the system can be used for guaranteeing secure transaction. The method comprises the steps: acquiring a first temporary code which has been stored, wherein the first temporary code is sent by a network terminal; receiving a user input identity code; calculating the first temporary code and the identity code according to preset algorithms, so as to obtain a transaction password; sending the transaction password to the network terminal, so as to enable the network terminal to carry out transaction according to the transaction password; receiving transaction success information and a second temporary code which are sent from the network terminal; updating the first temporary code to the second temporary code. The method, the equipment and the system, provided by the invention, are applied to online payment.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data interaction method, device and system. Background technique [0002] With the rapid development of the network, online payment also rises. Online payment allows users to complete transactions without leaving home. Although there are various types of existing online payments, they all do not solve the online security problem well. Especially for credit card online payment, when the user conducts a transaction, after the user enters the transaction password of the credit card in the user terminal, the user terminal sends the transaction password to the network terminal, and the network terminal performs verification to determine whether the transaction password is correct. If it is correct, the transaction is completed. transaction, the credit card will pay the amount to complete the transaction. Since the transaction password in the above process remains unchanged for a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06Q20/42
CPCG06Q20/3829G06Q20/42G06Q20/4014
Inventor 王燕飞
Owner XIAN KUPAI SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products