CN107220829A - The method and key devices of electronic transaction audit - Google Patents
The method and key devices of electronic transaction audit Download PDFInfo
- Publication number
- CN107220829A CN107220829A CN201710292068.5A CN201710292068A CN107220829A CN 107220829 A CN107220829 A CN 107220829A CN 201710292068 A CN201710292068 A CN 201710292068A CN 107220829 A CN107220829 A CN 107220829A
- Authority
- CN
- China
- Prior art keywords
- electronic transaction
- host computer
- key devices
- record
- audit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The present invention relates to field of information security technology, the method and key devices of a kind of electronic transaction audit are disclosed.The method that electronic transaction is audited in the present invention is applied to key devices, including:Receive the electronic transaction audit operation instruction from host computer;Instructed according to electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent to host computer.Embodiments of the present invention pass through when key devices receive the electronic transaction audit operation from host computer and instructed, the record of the electronic transaction in key devices is extracted to check for user, so allow user directly by key devices in time, safety check that passing electronic transaction is recorded, lift Consumer's Experience.
Description
Technical field
The present invention relates to the method and key devices of field of information security technology, more particularly to electronic transaction audit.
Background technology
One of password technology is the most commonly used safety in current network information system with secrecy provision, for example, user exists
Be required for first setting during the social class website of logging in online banks, Third-party payment platform, various shopping corresponding login account and
Password.With the fast development of networked information era, user is also increased in online activity.At present, intelligent cipher key equipment
It can be good at the need for meeting personal identification, intelligent cipher key equipment is usually USB interface device in the prior art, is passed through
The data communication interface of computer is connected with computer, because intelligent cipher key equipment has the characteristic of high safety, so a lot
The higher field of security is asked all to carry out authentication using intelligent cipher key equipment, to ensure the security of operation.Such as bank
System utilizes the identity of intelligent cipher key equipment certification teller and user.
Although traditional intelligent cipher key equipment realizes the authentication of user, but user directly can not be set by intelligent key
It is for future reference to have seen past electronic transaction record.When needing inquiry electronic transaction record, user can pass through logging in online banks
Mode checks passing transaction record;It can also be seeked advice from by dialing affiliated bank service phone;It can also be user parent
From shops of affiliated bank work of consultation personnel are gone to, the electronic transaction of staff's calling and obtaining user under one's name is allowed to record.But these sides
Formula can all cause user by the related transaction record situation of the audit that condition is limited and can not in time, at any time, influence user's
Usage experience.
The content of the invention
The purpose of embodiment of the present invention is the method and key devices for providing a kind of electronic transaction audit so that user
It directly can check that passing electronic transaction is recorded in time, safely by key devices, lift Consumer's Experience.
In order to solve the above technical problems, embodiments of the present invention provide a kind of method that electronic transaction is audited, application
In key devices, including:
Receive the electronic transaction audit operation instruction from host computer;
Instructed according to electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent to upper
Machine.
Embodiments of the present invention additionally provide a kind of key devices, including:Receiving module and processing module;
Receiving module, for receiving the electronic transaction audit operation instruction from host computer;
Processing module, for being instructed according to electronic transaction audit operation, extracts electronic transaction record, and electronic transaction is remembered
Record is sent to host computer.
Embodiment of the present invention in terms of existing technologies, embodiments of the present invention by key devices receive come
From during the electronic transaction audit operation instruction of host computer, extract the record of the electronic transaction in key devices and checked for user, so
Allow user directly by key devices in time, safety check that passing electronic transaction is recorded, lift Consumer's Experience.
In addition, detection host computer whether installation key control software;It is determined that during the non-installation key control software of host computer,
The installation procedure of cipher controlled software is sent to host computer;It is determined that after the completion of cipher controlled software installation, being sent out to host computer
Send the control instruction for starting cipher controlled software.By installing the cipher controlled software for coordinating key devices to use in host computer,
It ensure that security, the reliability of the processes such as identity validation or electronic transaction.
In addition, receiving the PIN inputted from host computer, and verify that PIN is effective.So effectively prevent
The electronic transaction record leakage of user, improves the confidentiality of electronic transaction.
In addition, when confirming connection server, the historical electronic transaction record of key devices is read from server, by history
Electronic transaction record is preserved into electronic transaction file.Thus the historical electronic transaction record storage of user can be arrived key
In equipment, facilitate the whole electronic transactions of user's audit.
In addition, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.So
Directly electronic transaction record can be just preserved to key devices, electronics is realized after each electronic transaction is completed
The renewal of transaction record, it is to avoid electronic transaction record omits influence user's audit.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, and these are exemplary
Illustrate not constitute the element with same reference numbers label in the restriction to embodiment, accompanying drawing and be expressed as similar element,
Unless there are special statement, composition is not limited the figure in accompanying drawing.
Fig. 1 is the flow chart for the method audited according to electronic transaction in first embodiment of the invention;
Fig. 2 is the schematic diagram according to cipher controlled software control interface in first embodiment of the invention;
Fig. 3 is the flow chart for the method audited according to electronic transaction in second embodiment of the invention;
Fig. 4 is the flow chart for the method audited according to electronic transaction in third embodiment of the invention;
Fig. 5 is to record schematic diagram according to electronic transaction in third embodiment of the invention;
Fig. 6 is the structure according to key devices in four embodiment of the invention, the 5th embodiment, the 6th embodiment
Schematic diagram.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with each reality of the accompanying drawing to the present invention
The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the invention,
In order that reader more fully understands the application and proposes many ins and outs.But, even if without these ins and outs and base
Many variations and modification in following embodiment, can also realize the application technical scheme claimed.
The first embodiment of the present invention is related to a kind of method of electronic transaction audit.Idiographic flow is as shown in figure 1, it is wrapped
Include:
Step 101, detection host computer whether installation key control software.
Specifically, key devices can have cipher controlled software when dispatching from the factory in the internal storage unit of key devices,
Related data, information that user must be read or write in key devices by cipher controlled software.Set for the first time using key
, need to be by key devices and host computer (such as when standby:The terminals such as PC, master computer) connection.Connected mode can be wired
Connect, can also be wireless connection, present embodiment does not do any limitation to the connected mode of key devices and host computer.Close
After key equipment and host computer successful connection, key devices can detect the installation procedure in host computer, to determine whether installation pair
Should be in the cipher controlled software of key devices.
Step 102, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer
Dress program.
Specifically, key devices judge host computer by detecting after the installation procedure in host computer according to testing result
In the control of non-installation key it is soft when, key devices can send the installation procedure of cipher controlled software to host computer, in host computer
Certification carries out the installation operation of cipher controlled software after.
Step 103, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.
Specifically, after key devices, which detect cipher controlled software, is already assembled as work(on host computer, or
Key devices are detected when being mounted with cipher controlled software, and key devices can send to host computer and open cipher controlled software
Control instruction.When host computer allows to open cipher controlled software, this cipher controlled software is run on host computer.
Step 104, the electronic transaction audit operation instruction from host computer is received.
Specifically, the control interface of cipher controlled software has the virtual key of correspondence different operating function, for example:
" refreshing ", " PIN (the Personal Identification Number, Chinese name of modification user:PIN) code ",
Outside the conventional button such as " checking certificate ", " checking facility information ", " modification remark names ", " on ", " help ", it also add
Button for realizing " checking that electronic transaction is recorded " for checking e-trade function, as shown in Figure 2.If user wants to check
When electronic transaction is recorded, user can click on the button of " transaction record ", and cipher controlled software is being detected " transaction record "
When button is triggered, electronic transaction audit operation is sent to key devices by host computer and instructed, then key devices will connect
Receive the electronic transaction audit operation instruction from host computer.
Step 105, the PIN inputted from host computer is received, and verifies that PIN is effective.
Specifically, can be close after cipher controlled software sends the instruction of electronic transaction audit operation to key devices
The dialog box of " input PIN code " is ejected in the control interface of key control software, user is pointed out input PIN code.When user inputs PIN
Code and after clicking on determination, cipher controlled software to key devices can send the PIN code that currently input by host computer.Key is set
It is standby receive the PIN code inputted from host computer after, PIN code is tested by default one or more kinds of verification modes
Card, and judge whether PIN code is effective.In the present embodiment, the verification mode to PIN code is not intended to be limited in any.
Step 106, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Specifically, after key devices checking PIN code is effective, key devices, which will be extracted, to be stored in key devices and deposits
Electronic transaction record in storage unit.And storage can be encrypted to electronic transaction record in key devices, cipher mode can be with
It is to be encrypted by dual key encryption technology.In the present embodiment, any limit is not done to the cipher mode that electronic transaction is recorded
System.Key devices can send the electronic transaction record of encryption to host computer after the electronic transaction record of encryption is extracted.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
When audit operation is instructed, extract the record of the electronic transaction in key devices and checked for user, so that user can directly lead to
Cross key devices and check passing electronic transaction record in time, safely, lift Consumer's Experience.
Second embodiment of the present invention is related to a kind of method of electronic transaction audit.Second embodiment is real to first
The improvement of mode is applied, is mainly theed improvement is that:In second embodiment of the present invention, key devices, which can network, downloads clothes
Business device end corresponds to the historical electronic transaction record of user, and the historical electronic transaction record storage of user is arrived into key devices
In, facilitate the whole electronic transactions of user's audit.
The flow chart of present embodiment is as shown in figure 3, it includes:
Step 201, detection host computer whether installation key control software.
Step 202, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer
Dress program.
Step 203, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.
Step 204, the electronic transaction audit operation instruction from host computer is received.
Step 205, the PIN inputted from host computer is received, and verifies that PIN is effective.
Step 206, when confirming connection server, the historical electronic transaction record of key devices is read from server, will
Historical electronic transaction record is preserved into electronic transaction file.
Specifically, first in use, key devices need to be matched with user account, and by matching result and service
Device is synchronized so that key devices correspondence unique subscriber account.Moreover, after key devices are connected with host computer, key
Control software can detect whether host computer connects network and judge that network can use.After judging that network is available, cipher controlled is soft
Part connection server and by the mode login service device such as user account and corresponding user account password, reads close from server
The corresponding historical transaction record of key equipment, and historical transaction record is downloaded to the electronic transaction of key devices internal storage unit
File.
Step 207, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
After audit operation instruction, the key devices download server end that can network corresponds to the historical transaction record of user, and will go through
History electronic transaction record storage is into key devices, so that user directly can be checked in time, safely by key devices
Passing whole electronic transactions record, facilitates user to audit.
Third embodiment of the present invention is related to a kind of method of electronic transaction audit, and the 3rd embodiment is real to first
The improvement of mode is applied, is mainly theed improvement is that:In third embodiment of the present invention, by confirming that completing electronic transaction grasps
When making, electronic transaction record is added in electronic transaction file.So it is achieved that the renewal of electronic transaction record, it is to avoid
Electronic transaction record omits influence user's audit.
The flow chart of present embodiment is as shown in figure 4, it includes:
Step 301, detection host computer whether installation key control software.
Step 302, it is determined that during the non-installation key control software of host computer, the peace of cipher controlled software is sent to host computer
Dress program.
Step 303, it is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.
Step 304, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
Specifically, generally when electronic transaction is carried out, user can use key devices to carry out personal verification,
So as to smoothly realize electronic transaction.User is when carrying out electronic transaction, and cipher controlled software can detect whether user completes electricity
The operation of son transaction.Cipher controlled software can record electronic transaction when confirming that user has been completed electronic transaction operation
Preserve into the electronic transaction file of key devices memory cell, it is possible to which electronic transaction file is encrypted.Electronic transaction
Record can include:The electronic transaction information such as " former account ", " target account ", " time ", " type ", " amount of money ", and it is possible to
Electronic transaction information is listed by the form of form, it is specific as shown in Figure 5.Present embodiment is to electronic transaction record and electronics
Transaction Information does not do any limitation in the display format of control interface.
Step 305, the electronic transaction audit operation instruction from host computer is received.
Step 306, the PIN inputted from host computer is received, and verifies that PIN is effective.
Step 307, electronic transaction record is extracted, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
Before audit operation instruction, when confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
Directly electronic transaction record can be thus preserved to key devices, realized after each electronic transaction is completed
The renewal of electronic transaction record, it is to avoid electronic transaction record omits influence user's audit.And user can be directly by close
Key equipment is timely, safety checks passing electronic transaction record, lifts Consumer's Experience.
The step of various methods are divided above, be intended merely to description it is clear, can be merged into when realizing a step or
Some steps are split, multiple steps are decomposed into, as long as including identical logical relation, all protection domain in this patent
It is interior;To adding inessential modification in algorithm or in flow or introducing inessential design, but its algorithm is not changed
Core design with flow is all in the protection domain of the patent.
Four embodiment of the invention is related to a kind of key devices 400, as shown in fig. 6, including:Detection module 401, reception
Module 402 and processing module 403;
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining
Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer
The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving
Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated
The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, according to electricity
Son transaction audit operation instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
When audit operation is instructed, extract the record of the electronic transaction in key devices and checked for user, so that user can directly lead to
Cross key devices and check passing electronic transaction record in time, safely, lift Consumer's Experience.
It is seen that, present embodiment is the apparatus embodiments corresponding with first embodiment, and present embodiment can be with
First embodiment is worked in coordination implementation.The relevant technical details mentioned in first embodiment still have in the present embodiment
Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in
In first embodiment.
It is noted that each module involved in present embodiment is logic module, and in actual applications, one
Individual logic unit can be a part for a physical location or a physical location, can also be with multiple physics lists
The combination of member is realized.In addition, will not be with solving institute of the present invention in the innovative part in order to protrude the present invention, present embodiment
The technical problem relation of proposition less close unit is introduced, but this be not intended that in present embodiment be not present it is other single
Member.
Fifth embodiment of the invention is related to a kind of key devices 400, referring again to shown in Fig. 6.5th embodiment is
Improvement to the 4th embodiment, is mainly theed improvement is that:In the 5th embodiment of the present invention, key devices can join
It is off the net to carry the historical transaction record that server end corresponds to user, and the historical electronic transaction record storage of user is set to key
In standby, facilitate the whole electronic transactions of user's audit.
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining
Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer
The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving
Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated
The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, confirm to connect
When connecing server, the historical electronic transaction record of key devices is read from server, historical electronic transaction record is preserved to electricity
In sub- transaction file.After historical electronic transaction record is preserved into electronic transaction file, according to electronic transaction audit operation
Instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
After audit operation instruction, the key devices download server end that can network corresponds to the historical transaction record of user, and will go through
History electronic transaction record storage is into key devices, so that user directly can be checked in time, safely by key devices
Passing whole electronic transactions record, facilitates user to audit.
It is seen that, present embodiment is the apparatus embodiments corresponding with second embodiment, and present embodiment can be with
Second embodiment is worked in coordination implementation.The relevant technical details mentioned in second embodiment still have in the present embodiment
Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in
In first embodiment.
Sixth embodiment of the invention is related to a kind of key devices 400, referring again to shown in Fig. 6.6th embodiment is
Improvement to the 4th embodiment, is mainly theed improvement is that:In the 6th embodiment of the present invention, by confirming to complete
When electronic transaction is operated, electronic transaction record is added in electronic transaction file.So it is achieved that electronic transaction record
Update, it is to avoid electronic transaction record omits influence user's audit.
Detection module 401, for before electronic transaction audit operation instruction of the receiving module reception from host computer, examining
Survey host computer whether installation key control software.
Processing module 403, for it is determined that during the non-installation key control software of host computer, cipher controlled is sent to host computer
The installation procedure of software;It is determined that after the completion of cipher controlled software installation, being sent to host computer and starting cipher controlled software
Control instruction.When confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
Receiving module 402, for receiving the electronic transaction audit operation instruction from host computer.Host computer is come from receiving
Electronic transaction audit operation instruction after, processing module 403 extract electronic transaction record before, receive from host computer it is defeated
The PIN entered.
Processing module 403, is additionally operable to checking PIN effective.After checking PIN is effective, according to electricity
Son transaction audit operation instruction, extracts electronic transaction record, and electronic transaction record is sent to host computer.
Compared with prior art, embodiments of the present invention in key devices by receiving the electronic transaction from host computer
Before when audit operation is instructed, when confirming to complete electronic transaction operation, electronic transaction record is added to electronic transaction file
In.Directly electronic transaction record can be thus preserved to key devices, realized after each electronic transaction is completed
The renewal of electronic transaction record, it is to avoid electronic transaction record omits influence user's audit.And user can directly pass through
Key devices are timely, safety checks passing electronic transaction record, lift Consumer's Experience.
It is seen that, present embodiment is the apparatus embodiments corresponding with the 3rd embodiment, and present embodiment can be with
3rd embodiment is worked in coordination implementation.The relevant technical details mentioned in 3rd embodiment still have in the present embodiment
Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in
In first embodiment.
It will be appreciated by those skilled in the art that realizing that all or part of step in above-described embodiment method can be by
Program instructs the hardware of correlation to complete, and the program storage is in a storage medium, including some instructions are to cause one
Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform each embodiment methods described of the application
All or part of step.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment of the present invention,
And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.
Claims (10)
1. a kind of method of electronic transaction audit, it is characterised in that applied to key devices, including:
Receive the electronic transaction audit operation instruction from host computer;
Instructed according to the electronic transaction audit operation, extract electronic transaction record, and electronic transaction record is sent extremely
The host computer.
2. the method for electronic transaction audit according to claim 1, it is characterised in that in the reception from host computer
Before the instruction of electronic transaction audit operation, including:
Detect the host computer whether installation key control software;
When it is determined that the host computer does not install the cipher controlled software, the cipher controlled software is sent to the host computer
Installation procedure;
It is determined that after cipher controlled software installation completion, being sent to the host computer and starting the cipher controlled software
Control instruction.
3. the method for electronic transaction audit according to claim 2, it is characterised in that in the reception from host computer
After the instruction of electronic transaction audit operation, before the extraction electronic transaction record, including:
The PIN inputted from host computer is received, and verifies that the PIN is effective.
4. the method for electronic transaction audit according to claim 3, it is characterised in that receive defeated from host computer described
The PIN entered, and after verifying that the PIN is effective, in addition to:
When confirming connection server, the historical electronic transaction record of the key devices is read from server, by the history
Electronic transaction record is preserved into electronic transaction file.
5. the method for the electronic transaction audit according to Claims 2 or 3, it is characterised in that sent to the host computer
After the control instruction for starting the cipher controlled software, it is instructed receiving the electronic transaction audit operation from host computer
Before, in addition to:
When confirming to complete electronic transaction operation, electronic transaction record is added in electronic transaction file.
6. a kind of key devices, it is characterised in that including:Receiving module and processing module;
The receiving module, for receiving the electronic transaction audit operation instruction from host computer;
The processing module, for being instructed according to the electronic transaction audit operation, extracts electronic transaction record, and by the electricity
Sub- transaction record is sent to the host computer.
7. key devices according to claim 6, it is characterised in that also include:Detection module;
The detection module, for the receiving module receive from host computer electronic transaction audit operation instruction before,
Detect the host computer whether installation key control software;
The processing module, is additionally operable to when it is determined that the host computer does not install the cipher controlled software, to the host computer
Send the installation procedure of the cipher controlled software;After it is determined that the cipher controlled software installation completes, to described upper
Machine sends the control instruction for starting the cipher controlled software.
8. the key devices according to claim 7, it is characterised in that the receiving module, are additionally operable to receiving from upper
After the electronic transaction audit operation instruction of position machine, before the processing module extracts electronic transaction record, receive from upper
The PIN of position machine input;
The processing module, is additionally operable to verify that the PIN is effective.
9. key devices according to claim 8, it is characterised in that the processing module, are additionally operable in the reception mould
Block receives the PIN inputted from host computer, after the processing module verifies that the PIN is effective, true
When recognizing connection server, the historical electronic transaction record of the key devices is read from server, the historical electronic is merchandised
Record is preserved into electronic transaction file.
10. the key devices according to claim 7 or 8, it is characterised in that the processing module:It is additionally operable to the processing
Module receives after the control instruction for starting the cipher controlled software is sent to the host computer in the receiving module
From before the electronic transaction audit operation instruction of host computer, when confirming to complete electronic transaction operation, the electronic transaction is remembered
Record is added in electronic transaction file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710292068.5A CN107220829A (en) | 2017-04-28 | 2017-04-28 | The method and key devices of electronic transaction audit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710292068.5A CN107220829A (en) | 2017-04-28 | 2017-04-28 | The method and key devices of electronic transaction audit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107220829A true CN107220829A (en) | 2017-09-29 |
Family
ID=59943625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710292068.5A Pending CN107220829A (en) | 2017-04-28 | 2017-04-28 | The method and key devices of electronic transaction audit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107220829A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113221073A (en) * | 2021-07-08 | 2021-08-06 | 飞天诚信科技股份有限公司 | Implementation method and device for increasing number of PIV application support certificates |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1361490A (en) * | 2000-12-24 | 2002-07-31 | 冯振周 | Safety techn for E-business system |
CN101588243A (en) * | 2008-05-21 | 2009-11-25 | 北京飞天诚信科技有限公司 | A kind of electronic transaction historical record querying method and system |
CN101826219A (en) * | 2010-05-05 | 2010-09-08 | 南京熊猫信息产业有限公司 | Rail transportation ticket-card processing intelligent system and data encryption auditing method |
CN101059858B (en) * | 2007-06-11 | 2012-02-15 | 飞天诚信科技股份有限公司 | Method and device for inquiring conveniently electronic transaction history record |
CN105005890A (en) * | 2015-06-26 | 2015-10-28 | 郁晓东 | System and method for transmitting consumption record |
-
2017
- 2017-04-28 CN CN201710292068.5A patent/CN107220829A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1361490A (en) * | 2000-12-24 | 2002-07-31 | 冯振周 | Safety techn for E-business system |
CN101059858B (en) * | 2007-06-11 | 2012-02-15 | 飞天诚信科技股份有限公司 | Method and device for inquiring conveniently electronic transaction history record |
CN101588243A (en) * | 2008-05-21 | 2009-11-25 | 北京飞天诚信科技有限公司 | A kind of electronic transaction historical record querying method and system |
CN101826219A (en) * | 2010-05-05 | 2010-09-08 | 南京熊猫信息产业有限公司 | Rail transportation ticket-card processing intelligent system and data encryption auditing method |
CN105005890A (en) * | 2015-06-26 | 2015-10-28 | 郁晓东 | System and method for transmitting consumption record |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113221073A (en) * | 2021-07-08 | 2021-08-06 | 飞天诚信科技股份有限公司 | Implementation method and device for increasing number of PIV application support certificates |
CN113221073B (en) * | 2021-07-08 | 2021-09-14 | 飞天诚信科技股份有限公司 | Implementation method and device for increasing number of PIV application support certificates |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104113549B (en) | A kind of platform authorization method, platform service end and applications client and system | |
WO2012042262A1 (en) | Mobile payment system | |
CN104981827A (en) | Method for protecting cardholder data in a mobile device that performs secure payment transactions and which enables the mobile device to function as a secure payment terminal | |
US7246375B1 (en) | Method for managing a secure terminal | |
CN106506496A (en) | A kind of methods, devices and systems that withdraws the money without card | |
CN106897006A (en) | A kind of method for processing payment information, device and user equipment | |
KR20130142864A (en) | Method for issuing mobile credit card in portable terminal using credit card and credit card for the same | |
Cheng et al. | A secure and practical key management mechanism for NFC read-write mode | |
CN106603241A (en) | Unlocking method, apparatus and electronic device | |
KR20170133307A (en) | Online financial transactions, identity authentication system and method using real cards | |
CN103971139B (en) | IC card remote operating system and method | |
CN106330888B (en) | The method and device of payment safety in a kind of guarantee the Internet line | |
CN107707356A (en) | A kind of mobile device secure binding method and application system based on Quick Response Code identification | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN105913508B (en) | A kind of Work attendance method based on intelligent NFC label | |
CN107220829A (en) | The method and key devices of electronic transaction audit | |
CN105871840B (en) | A kind of certificate management method and system | |
US20230185898A1 (en) | Systems and methods for authentication code entry using mobile electronic devices | |
EP3148158B1 (en) | Monitoring a transaction and apparatus for monitoring a mobile payment transaction | |
CN108122108A (en) | Mobile device authentication system and mobile equipment authentication method | |
US11301840B1 (en) | Systems and methods for provisioning point of sale terminals | |
KR20110002967A (en) | Method and system for providing authentication service by using biometrics and portable memory unit therefor | |
CA2994833A1 (en) | Systems and methods for interaction authentication using dynamic wireless beacon devices | |
KR20110001475A (en) | Method and system for the right of using service via network and portable memory unit therefor | |
Kier et al. | Mobile Payment Fraud: A practical view on the Technical Architecture and Starting Points for Forensic Analysis of new attack scenarios |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |