CN107220829A - The method and key devices of electronic transaction audit - Google Patents

The method and key devices of electronic transaction audit Download PDF

Info

Publication number
CN107220829A
CN107220829A CN201710292068.5A CN201710292068A CN107220829A CN 107220829 A CN107220829 A CN 107220829A CN 201710292068 A CN201710292068 A CN 201710292068A CN 107220829 A CN107220829 A CN 107220829A
Authority
CN
China
Prior art keywords
electronic transaction
host computer
key devices
record
audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710292068.5A
Other languages
Chinese (zh)
Inventor
吴雪春
陈剑星
廖剑萧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Upper Hailin Fruit Industry Inc Co
Original Assignee
Upper Hailin Fruit Industry Inc Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Upper Hailin Fruit Industry Inc Co filed Critical Upper Hailin Fruit Industry Inc Co
Priority to CN201710292068.5A priority Critical patent/CN107220829A/en
Publication of CN107220829A publication Critical patent/CN107220829A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The present invention relates to field of information security technology, the method and key devices of a kind of electronic transaction audit are disclosed.The method that electronic transaction is audited in the present invention is applied to key devices, including:Receive the electronic transaction audit operation instruction from host computer;Instructed according to electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent to host computer.Embodiments of the present invention pass through when key devices receive the electronic transaction audit operation from host computer and instructed, the record of the electronic transaction in key devices is extracted to check for user, so allow user directly by key devices in time, safety check that passing electronic transaction is recorded, lift Consumer's Experience.

Description

The method and key devices of electronic transaction audit
Technical field
The present invention relates to the method and key devices of field of information security technology, more particularly to electronic transaction audit.
Background technology
One of password technology is the most commonly used safety in current network information system with secrecy provision, for example, user exists Be required for first setting during the social class website of logging in online banks, Third-party payment platform, various shopping corresponding login account and Password.With the fast development of networked information era, user is also increased in online activity.At present, intelligent cipher key equipment It can be good at the need for meeting personal identification, intelligent cipher key equipment is usually USB interface device in the prior art, is passed through The data communication interface of computer is connected with computer, because intelligent cipher key equipment has the characteristic of high safety, so a lot The higher field of security is asked all to carry out authentication using intelligent cipher key equipment, to ensure the security of operation.Such as bank System utilizes the identity of intelligent cipher key equipment certification teller and user.
Although traditional intelligent cipher key equipment realizes the authentication of user, but user directly can not be set by intelligent key It is for future reference to have seen past electronic transaction record.When needing inquiry electronic transaction record, user can pass through logging in online banks Mode checks passing transaction record;It can also be seeked advice from by dialing affiliated bank service phone;It can also be user parent From shops of affiliated bank work of consultation personnel are gone to, the electronic transaction of staff's calling and obtaining user under one's name is allowed to record.But these sides Formula can all cause user by the related transaction record situation of the audit that condition is limited and can not in time, at any time, influence user's Usage experience.
The content of the invention
The purpose of embodiment of the present invention is the method and key devices for providing a kind of electronic transaction audit so that user It directly can check that passing electronic transaction is recorded in time, safely by key devices, lift Consumer's Experience.
In order to solve the above technical problems, embodiments of the present invention provide a kind of method that electronic transaction is audited, application In key devices, including:
Receive the electronic transaction audit operation instruction from host computer;
Instructed according to electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent to upper Machine.
Embodiments of the present invention additionally provide a kind of key devices, including:Receiving module and processing module;
Receiving module, for receiving the electronic transaction audit operation instruction from host computer;
Processing module, for being instructed according to electronic transaction audit operation, extracts electronic transaction record, and electronic transaction is remembered Record is sent to host computer.
Embodiment of the present invention in terms of existing technologies, embodiments of the present invention by key devices receive come From during the electronic transaction audit operation instruction of host computer, extract the record of the electronic transaction in key devices and checked for user, so Allow user directly by key devices in time, safety check that passing electronic transaction is recorded, lift Consumer's Experience.
In addition, detection host computer whether installation key control software;It is determined that during the non-installation key control software of host computer, The installation procedure of cipher controlled software is sent to host computer;It is determined that after the completion of cipher controlled software installation, being sent out to host computer Send the control instruction for starting cipher controlled software.By installing the cipher controlled software for coordinating key devices to use in host computer, It ensure that security, the reliability of the processes such as identity validation or electronic transaction.
In addition, receiving the PIN inputted from host computer, and verify that PIN is effective.So effectively prevent The electronic transaction record leakage of user, improves the confidentiality of electronic transaction.
In addition, when confirming connection server, the historical electronic transaction record of key devices is read from server, by history Electronic transaction record is preserved into electronic transaction file.Thus the historical electronic transaction record storage of user can be arrived key In equipment, facilitate the whole electronic transactions of user's audit.
In addition, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.So Directly electronic transaction record can be just preserved to key devices, electronics is realized after each electronic transaction is completed The renewal of transaction record, it is to avoid electronic transaction record omits influence user's audit.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, and these are exemplary Illustrate not constitute the element with same reference numbers label in the restriction to embodiment, accompanying drawing and be expressed as similar element, Unless there are special statement, composition is not limited the figure in accompanying drawing.
Fig. 1 is the flow chart for the method audited according to electronic transaction in first embodiment of the invention;
Fig. 2 is the schematic diagram according to cipher controlled software control interface in first embodiment of the invention;
Fig. 3 is the flow chart for the method audited according to electronic transaction in second embodiment of the invention;
Fig. 4 is the flow chart for the method audited according to electronic transaction in third embodiment of the invention;
Fig. 5 is to record schematic diagram according to electronic transaction in third embodiment of the invention;
Fig. 6 is the structure according to key devices in four embodiment of the invention, the 5th embodiment, the 6th embodiment Schematic diagram.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with each reality of the accompanying drawing to the present invention The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the invention, In order that reader more fully understands the application and proposes many ins and outs.But, even if without these ins and outs and base Many variations and modification in following embodiment, can also realize the application technical scheme claimed.
The first embodiment of the present invention is related to a kind of method of electronic transaction audit.Idiographic flow is as shown in figure 1, it is wrapped Include:
Step 101, detection host computer whether installation key control software.
Specifically, key devices can have cipher controlled software when dispatching from the factory in the internal storage unit of key devices, Related data, information that user must be read or write in key devices by cipher controlled software.Set for the first time using key , need to be by key devices and host computer (such as when standby:The terminals such as PC, master computer) connection.Connected mode can be wired Connect, can also be wireless connection, present embodiment does not do any limitation to the connected mode of key devices and host computer.Close After key equipment and host computer successful connection, key devices can detect the installation procedure in host computer, to determine whether installation pair Should be in the cipher controlled software of key devices.
Step 102, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer Dress program.
Specifically, key devices judge host computer by detecting after the installation procedure in host computer according to testing result In the control of non-installation key it is soft when, key devices can send the installation procedure of cipher controlled software to host computer, in host computer Certification carries out the installation operation of cipher controlled software after.
Step 103, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.
Specifically, after key devices, which detect cipher controlled software, is already assembled as work(on host computer, or Key devices are detected when being mounted with cipher controlled software, and key devices can send to host computer and open cipher controlled software Control instruction.When host computer allows to open cipher controlled software, this cipher controlled software is run on host computer.
Step 104, the electronic transaction audit operation instruction from host computer is received.
Specifically, the control interface of cipher controlled software has the virtual key of correspondence different operating function, for example: " refreshing ", " PIN (the Personal Identification Number, Chinese name of modification user:PIN) code ", Outside the conventional button such as " checking certificate ", " checking facility information ", " modification remark names ", " on ", " help ", it also add Button for realizing " checking that electronic transaction is recorded " for checking e-trade function, as shown in Figure 2.If user wants to check When electronic transaction is recorded, user can click on the button of " transaction record ", and cipher controlled software is being detected " transaction record " When button is triggered, electronic transaction audit operation is sent to key devices by host computer and instructed, then key devices will connect Receive the electronic transaction audit operation instruction from host computer.
Step 105, the PIN inputted from host computer is received, and verifies that PIN is effective.
Specifically, can be close after cipher controlled software sends the instruction of electronic transaction audit operation to key devices The dialog box of " input PIN code " is ejected in the control interface of key control software, user is pointed out input PIN code.When user inputs PIN Code and after clicking on determination, cipher controlled software to key devices can send the PIN code that currently input by host computer.Key is set It is standby receive the PIN code inputted from host computer after, PIN code is tested by default one or more kinds of verification modes Card, and judge whether PIN code is effective.In the present embodiment, the verification mode to PIN code is not intended to be limited in any.
Step 106, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Specifically, after key devices checking PIN code is effective, key devices, which will be extracted, to be stored in key devices and deposits Electronic transaction record in storage unit.And storage can be encrypted to electronic transaction record in key devices, cipher mode can be with It is to be encrypted by dual key encryption technology.In the present embodiment, any limit is not done to the cipher mode that electronic transaction is recorded System.Key devices can send the electronic transaction record of encryption to host computer after the electronic transaction record of encryption is extracted.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer When audit operation is instructed, extract the record of the electronic transaction in key devices and checked for user, so that user can directly lead to Cross key devices and check passing electronic transaction record in time, safely, lift Consumer's Experience.
Second embodiment of the present invention is related to a kind of method of electronic transaction audit.Second embodiment is real to first The improvement of mode is applied, is mainly theed improvement is that:In second embodiment of the present invention, key devices, which can network, downloads clothes Business device end corresponds to the historical electronic transaction record of user, and the historical electronic transaction record storage of user is arrived into key devices In, facilitate the whole electronic transactions of user's audit.
The flow chart of present embodiment is as shown in figure 3, it includes:
Step 201, detection host computer whether installation key control software.
Step 202, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer Dress program.
Step 203, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.
Step 204, the electronic transaction audit operation instruction from host computer is received.
Step 205, the PIN inputted from host computer is received, and verifies that PIN is effective.
Step 206, when confirming connection server, the historical electronic transaction record of key devices is read from server, will Historical electronic transaction record is preserved into electronic transaction file.
Specifically, first in use, key devices need to be matched with user account, and by matching result and service Device is synchronized so that key devices correspondence unique subscriber account.Moreover, after key devices are connected with host computer, key Control software can detect whether host computer connects network and judge that network can use.After judging that network is available, cipher controlled is soft Part connection server and by the mode login service device such as user account and corresponding user account password, reads close from server The corresponding historical transaction record of key equipment, and historical transaction record is downloaded to the electronic transaction of key devices internal storage unit File.
Step 207, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer After audit operation instruction, the key devices download server end that can network corresponds to the historical transaction record of user, and will go through History electronic transaction record storage is into key devices, so that user directly can be checked in time, safely by key devices Passing whole electronic transactions record, facilitates user to audit.
Third embodiment of the present invention is related to a kind of method of electronic transaction audit, and the 3rd embodiment is real to first The improvement of mode is applied, is mainly theed improvement is that:In third embodiment of the present invention, by confirming that completing electronic transaction grasps When making, electronic transaction record is added in electronic transaction file.So it is achieved that the renewal of electronic transaction record, it is to avoid Electronic transaction record omits influence user's audit.
The flow chart of present embodiment is as shown in figure 4, it includes:
Step 301, detection host computer whether installation key control software.
Step 302, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer Dress program.
Step 303, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.
Step 304, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
Specifically, generally when electronic transaction is carried out, user can use key devices to carry out personal verification, So as to smoothly realize electronic transaction.User is when carrying out electronic transaction, and cipher controlled software can detect whether user completes electricity The operation of son transaction.Cipher controlled software can record electronic transaction when confirming that user has been completed electronic transaction operation Preserve into the electronic transaction file of key devices memory cell, it is possible to which electronic transaction file is encrypted.Electronic transaction Record can include:The electronic transaction information such as " former account ", " target account ", " time ", " type ", " amount of money ", and it is possible to Electronic transaction information is listed by the form of form, it is specific as shown in Figure 5.Present embodiment is to electronic transaction record and electronics Transaction Information does not do any limitation in the display format of control interface.
Step 305, the electronic transaction audit operation instruction from host computer is received.
Step 306, the PIN inputted from host computer is received, and verifies that PIN is effective.
Step 307, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer Before audit operation instruction, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file. Directly electronic transaction record can be thus preserved to key devices, realized after each electronic transaction is completed The renewal of electronic transaction record, it is to avoid electronic transaction record omits influence user's audit.And user can be directly by close Key equipment is timely, safety checks passing electronic transaction record, lifts Consumer's Experience.
The step of various methods are divided above, be intended merely to description it is clear, can be merged into when realizing a step or Some steps are split, multiple steps are decomposed into, as long as including identical logical relation, all protection domain in this patent It is interior;To adding inessential modification in algorithm or in flow or introducing inessential design, but its algorithm is not changed Core design with flow is all in the protection domain of the patent.
Four embodiment of the invention is related to a kind of key devices 400, as shown in fig. 6, including:Detection module 401, reception Module 402 and processing module 403;
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, according to electricity Son transaction audit operation instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer When audit operation is instructed, extract the record of the electronic transaction in key devices and checked for user, so that user can directly lead to Cross key devices and check passing electronic transaction record in time, safely, lift Consumer's Experience.
It is seen that, present embodiment is the apparatus embodiments corresponding with first embodiment, and present embodiment can be with First embodiment is worked in coordination implementation.The relevant technical details mentioned in first embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
It is noted that each module involved in present embodiment is logic module, and in actual applications, one Individual logic unit can be a part for a physical location or a physical location, can also be with multiple physics lists The combination of member is realized.In addition, will not be with solving institute of the present invention in the innovative part in order to protrude the present invention, present embodiment The technical problem relation of proposition less close unit is introduced, but this be not intended that in present embodiment be not present it is other single Member.
Fifth embodiment of the invention is related to a kind of key devices 400, referring again to shown in Fig. 6.5th embodiment is Improvement to the 4th embodiment, is mainly theed improvement is that:In the 5th embodiment of the present invention, key devices can join It is off the net to carry the historical transaction record that server end corresponds to user, and the historical electronic transaction record storage of user is set to key In standby, facilitate the whole electronic transactions of user's audit.
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, confirm to connect When connecing server, the historical electronic transaction record of key devices is read from server, historical electronic transaction record is preserved to electricity In sub- transaction file.After historical electronic transaction record is preserved into electronic transaction file, according to electronic transaction audit operation Instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer After audit operation instruction, the key devices download server end that can network corresponds to the historical transaction record of user, and will go through History electronic transaction record storage is into key devices, so that user directly can be checked in time, safely by key devices Passing whole electronic transactions record, facilitates user to audit.
It is seen that, present embodiment is the apparatus embodiments corresponding with second embodiment, and present embodiment can be with Second embodiment is worked in coordination implementation.The relevant technical details mentioned in second embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
Sixth embodiment of the invention is related to a kind of key devices 400, referring again to shown in Fig. 6.6th embodiment is Improvement to the 4th embodiment, is mainly theed improvement is that:In the 6th embodiment of the present invention, by confirming to complete When electronic transaction is operated, electronic transaction record is added in electronic transaction file.So it is achieved that electronic transaction record Update, it is to avoid electronic transaction record omits influence user's audit.
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software Control instruction.When confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, according to electricity Son transaction audit operation instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer Before when audit operation is instructed, when confirming to complete electronic transaction operation, electronic transaction record is added to electronic transaction file In.Directly electronic transaction record can be thus preserved to key devices, realized after each electronic transaction is completed The renewal of electronic transaction record, it is to avoid electronic transaction record omits influence user's audit.And user can directly pass through Key devices are timely, safety checks passing electronic transaction record, lift Consumer's Experience.
It is seen that, present embodiment is the apparatus embodiments corresponding with the 3rd embodiment, and present embodiment can be with 3rd embodiment is worked in coordination implementation.The relevant technical details mentioned in 3rd embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
It will be appreciated by those skilled in the art that realizing that all or part of step in above-described embodiment method can be by Program instructs the hardware of correlation to complete, and the program storage is in a storage medium, including some instructions are to cause one Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform each embodiment methods described of the application All or part of step.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment of the present invention, And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (10)

1. a kind of method of electronic transaction audit, it is characterised in that applied to key devices, including:
Receive the electronic transaction audit operation instruction from host computer;
Instructed according to the electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent extremely The host computer.
2. the method for electronic transaction audit according to claim 1, it is characterised in that in the reception from host computer Before the instruction of electronic transaction audit operation, including:
Detect the host computer whether installation key control software;
When it is determined that the host computer does not install the cipher controlled software, the cipher controlled software is sent to the host computer Installation procedure;
It is determined that after cipher controlled software installation completion, being sent to the host computer and starting the cipher controlled software Control instruction.
3. the method for electronic transaction audit according to claim 2, it is characterised in that in the reception from host computer After the instruction of electronic transaction audit operation, before the extraction electronic transaction record, including:
The PIN inputted from host computer is received, and verifies that the PIN is effective.
4. the method for electronic transaction audit according to claim 3, it is characterised in that receive defeated from host computer described The PIN entered, and after verifying that the PIN is effective, in addition to:
When confirming connection server, the historical electronic transaction record of the key devices is read from server, by the history Electronic transaction record is preserved into electronic transaction file.
5. the method for the electronic transaction audit according to Claims 2 or 3, it is characterised in that sent to the host computer After the control instruction for starting the cipher controlled software, it is instructed receiving the electronic transaction audit operation from host computer Before, in addition to:
When confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
6. a kind of key devices, it is characterised in that including:Receiving module and processing module;
The receiving module, for receiving the electronic transaction audit operation instruction from host computer;
The processing module, for being instructed according to the electronic transaction audit operation, extracts electronic transaction record, and by the electricity Sub- transaction record is sent to the host computer.
7. key devices according to claim 6, it is characterised in that also include:Detection module;
The detection module, for the receiving module receive from host computer electronic transaction audit operation instruction before, Detect the host computer whether installation key control software;
The processing module, is additionally operable to when it is determined that the host computer does not install the cipher controlled software, to the host computer Send the installation procedure of the cipher controlled software;After it is determined that the cipher controlled software installation completes, to described upper Machine sends the control instruction for starting the cipher controlled software.
8. the key devices according to claim 7, it is characterised in that the receiving module, are additionally operable to receiving from upper After the electronic transaction audit operation instruction of position machine, before the processing module extracts electronic transaction record, receive from upper The PIN of position machine input;
The processing module, is additionally operable to verify that the PIN is effective.
9. key devices according to claim 8, it is characterised in that the processing module, are additionally operable in the reception mould Block receives the PIN inputted from host computer, after the processing module verifies that the PIN is effective, true When recognizing connection server, the historical electronic transaction record of the key devices is read from server, the historical electronic is merchandised Record is preserved into electronic transaction file.
10. the key devices according to claim 7 or 8, it is characterised in that the processing module:It is additionally operable to the processing Module receives after the control instruction for starting the cipher controlled software is sent to the host computer in the receiving module From before the electronic transaction audit operation instruction of host computer, when confirming to complete electronic transaction operation, the electronic transaction is remembered Record is added in electronic transaction file.
CN201710292068.5A 2017-04-28 2017-04-28 The method and key devices of electronic transaction audit Pending CN107220829A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710292068.5A CN107220829A (en) 2017-04-28 2017-04-28 The method and key devices of electronic transaction audit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710292068.5A CN107220829A (en) 2017-04-28 2017-04-28 The method and key devices of electronic transaction audit

Publications (1)

Publication Number Publication Date
CN107220829A true CN107220829A (en) 2017-09-29

Family

ID=59943625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710292068.5A Pending CN107220829A (en) 2017-04-28 2017-04-28 The method and key devices of electronic transaction audit

Country Status (1)

Country Link
CN (1) CN107220829A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221073A (en) * 2021-07-08 2021-08-06 飞天诚信科技股份有限公司 Implementation method and device for increasing number of PIV application support certificates

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1361490A (en) * 2000-12-24 2002-07-31 冯振周 Safety techn for E-business system
CN101588243A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 A kind of electronic transaction historical record querying method and system
CN101826219A (en) * 2010-05-05 2010-09-08 南京熊猫信息产业有限公司 Rail transportation ticket-card processing intelligent system and data encryption auditing method
CN101059858B (en) * 2007-06-11 2012-02-15 飞天诚信科技股份有限公司 Method and device for inquiring conveniently electronic transaction history record
CN105005890A (en) * 2015-06-26 2015-10-28 郁晓东 System and method for transmitting consumption record

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1361490A (en) * 2000-12-24 2002-07-31 冯振周 Safety techn for E-business system
CN101059858B (en) * 2007-06-11 2012-02-15 飞天诚信科技股份有限公司 Method and device for inquiring conveniently electronic transaction history record
CN101588243A (en) * 2008-05-21 2009-11-25 北京飞天诚信科技有限公司 A kind of electronic transaction historical record querying method and system
CN101826219A (en) * 2010-05-05 2010-09-08 南京熊猫信息产业有限公司 Rail transportation ticket-card processing intelligent system and data encryption auditing method
CN105005890A (en) * 2015-06-26 2015-10-28 郁晓东 System and method for transmitting consumption record

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221073A (en) * 2021-07-08 2021-08-06 飞天诚信科技股份有限公司 Implementation method and device for increasing number of PIV application support certificates
CN113221073B (en) * 2021-07-08 2021-09-14 飞天诚信科技股份有限公司 Implementation method and device for increasing number of PIV application support certificates

Similar Documents

Publication Publication Date Title
CN104113549B (en) A kind of platform authorization method, platform service end and applications client and system
WO2012042262A1 (en) Mobile payment system
CN104981827A (en) Method for protecting cardholder data in a mobile device that performs secure payment transactions and which enables the mobile device to function as a secure payment terminal
US7246375B1 (en) Method for managing a secure terminal
CN106506496A (en) A kind of methods, devices and systems that withdraws the money without card
CN106897006A (en) A kind of method for processing payment information, device and user equipment
KR20130142864A (en) Method for issuing mobile credit card in portable terminal using credit card and credit card for the same
Cheng et al. A secure and practical key management mechanism for NFC read-write mode
CN106603241A (en) Unlocking method, apparatus and electronic device
KR20170133307A (en) Online financial transactions, identity authentication system and method using real cards
CN103971139B (en) IC card remote operating system and method
CN106330888B (en) The method and device of payment safety in a kind of guarantee the Internet line
CN107707356A (en) A kind of mobile device secure binding method and application system based on Quick Response Code identification
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN105913508B (en) A kind of Work attendance method based on intelligent NFC label
CN107220829A (en) The method and key devices of electronic transaction audit
CN105871840B (en) A kind of certificate management method and system
US20230185898A1 (en) Systems and methods for authentication code entry using mobile electronic devices
EP3148158B1 (en) Monitoring a transaction and apparatus for monitoring a mobile payment transaction
CN108122108A (en) Mobile device authentication system and mobile equipment authentication method
US11301840B1 (en) Systems and methods for provisioning point of sale terminals
KR20110002967A (en) Method and system for providing authentication service by using biometrics and portable memory unit therefor
CA2994833A1 (en) Systems and methods for interaction authentication using dynamic wireless beacon devices
KR20110001475A (en) Method and system for the right of using service via network and portable memory unit therefor
Kier et al. Mobile Payment Fraud: A practical view on the Technical Architecture and Starting Points for Forensic Analysis of new attack scenarios

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170929