摘要 |
The method involves inscribing recognizable data contained in an image sent from a server to a user terminal, and establishing a mark containing the recognizable data, where the mark is established such that separation of the mark from the image is difficult for a malware in the user terminal. The image incorporating the mark is sent to the user terminal, where a transaction is approved by the user terminal after recognition of the mark and input of a simple confidential code in the user terminal.
|