CN101996457A - Webpay and collection method used in webpay - Google Patents

Webpay and collection method used in webpay Download PDF

Info

Publication number
CN101996457A
CN101996457A CN2009101697430A CN200910169743A CN101996457A CN 101996457 A CN101996457 A CN 101996457A CN 2009101697430 A CN2009101697430 A CN 2009101697430A CN 200910169743 A CN200910169743 A CN 200910169743A CN 101996457 A CN101996457 A CN 101996457A
Authority
CN
China
Prior art keywords
data
gathering
client
network checkout
main frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101697430A
Other languages
Chinese (zh)
Inventor
阚鲁藻
沈雅南
洪雅铃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UNIVERSAL EXCHANGE Inc
Original Assignee
UNIVERSAL EXCHANGE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UNIVERSAL EXCHANGE Inc filed Critical UNIVERSAL EXCHANGE Inc
Priority to CN2009101697430A priority Critical patent/CN101996457A/en
Publication of CN101996457A publication Critical patent/CN101996457A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a webpay and a collection method used in the webpay. The online can be carried out on the webpay,, a client and a collection host, and the client is provided with a trading authorization code; the webpay is provided with an encryption key, and the collection host is provided with a decryption key corresponding to the encryption key. The method comprises the following steps: the webpay can receive collection data containing the trading authorization code from the client; the webpay encrypts the collection data into enciphered collection data by using the encryption key; then, the webpay transmits the enciphered collection data to the collection host, so that the collection host verifies the enciphered collection data and the trading authorization code included in the enciphered collection data by using the decryption key; and finally, the webpay can receive a trading result message form the collection host.

Description

Network checkout and the cashing method that is used for this network checkout
Technical field
The cashing method that the invention relates to a kind of network checkout and be used for this network checkout; Particularly a kind of the need also need do not disposed secure access module (SecurityAccess Module via a browser interface; SAM) can with an online network checkout of gathering main frame and the cashing method that is used for this network checkout.
Background technology
Along with developing rapidly of the network technology, shopping at network becomes the main consumption pattern of modern gradually.By the network system of today, consumer and dealer can carry out the dealing of information, product or service, and the consumer also can be online by network and bank main, to carry out the consumption gathering relevant with shopping at network.
Network ATM (Automatic Teller Machine) (automatic teller machine; ATM) be the payment mechanism that present more consumer uses.Network atm is undertaken online from a calculating punch by a browser interface and bank main.Wherein, different calculating punches all must be via bank's end authentication to guarantee transaction security.
For example, the consumer can electrically connect calculating punch and computing machine by a connecting line, opens browser interface and logins the webpage of the Internet bank via the network on-line function of computing machine.Then, the consumer can be inserted into calculating punch with credit card or fiscard, and the input password is so that the gathering data that will be correlated with are sent to bank main by browser interface in webpage.In brief, network atm will collect money data with the network encryption mode encrypt the gathering data to be sent to bank main.Yet, might not have browser interface in the residing environment of consumer, so consumer's service of enjoy network ATM surely that differs.
The mode of another kind of payment then is by point of sale management (point of sale; POS) system pays the bill.Yet point-of-sale management system must dispose secure access module (Security AccessModule; SAM), simultaneously, bank's end also must authenticate point-of-sale management system earlier, therefore quite inconvenience in practical application.
In view of the above, how to improve that the convenience of present checkout is real to be the problem of the required solution of those skilled in the art.
Summary of the invention
A purpose of the present invention is to provide a kind of network checkout.This network checkout comprises a storage module, a processing module, one first transmitting-receiving interface and one second transmitting-receiving interface.This storage module stores one and encrypts golden key; This first transmitting-receiving interface is online to a client, and this client receives gathering data certainly, and wherein these gathering data comprise a Trading Authorization sign indicating number of this client.It is one to encrypt the gathering data that this processing module utilizes this to encrypt the data encryption of should collecting money of golden key.This second transmitting-receiving interface can be online to one and have a gathering main frame that corresponds to this deciphering of encrypting golden key gold key, and should encrypt the gathering data and be sent to this gathering main frame, verify this encryption collect money this Trading Authorization sign indicating number in the data of data and this encryption of collecting money in order to do the golden key of this this deciphering of gathering host computer using.This second transmitting-receiving interface also receives a transaction results message and this first from this gathering main frame and receives and dispatches interface and will transmit this transaction results message to this client.Afterwards, the acknowledge message that this first transmitting-receiving interface receives from this client, and this second transmitting-receiving interface is sent to this acknowledge message this gathering main frame again.
Another object of the present invention is to provide a kind of cashing method that is used for a network checkout.This network checkout is suitable can be online to a client and a gathering main frame, and wherein, this client has a Trading Authorization sign indicating number, and this network checkout has one and encrypts golden key, and this gathering main frame has one and corresponds to this deciphering of encrypting golden key gold key.
This cashing method comprises the following step: (a) make this network checkout receive gathering data from this client, wherein these gathering data comprise this Trading Authorization sign indicating number; (b) make this network checkout utilize this to encrypt golden key, the data encryption of should collecting money is encryption gathering data; (c) make this network checkout should encrypt the gathering data and be sent to this gathering main frame, verify collect money data and verify collect money this Trading Authorization sign indicating number in data of this encryption of this encryption in order to do the golden key of this this deciphering of gathering host computer using; (d) make this network checkout after this step (c), this gathering main frame receives a transaction results message certainly; (e) make this network checkout transmit this transaction results message to this client; (f) make this network checkout receive an acknowledge message from this client; And (g) make this network checkout transmit this to confirm message to this gathering main frame.
Network checkout of the present invention and the cashing method that is used for this network checkout do not need also need not dispose the secure access module by the browser interface with safety certification effect, can be online with the gathering main frame.In addition, by the network checkout, it is online that different clients can use golden key of same encryption and gathering main frame to obtain, and do not need to obtain the golden key of different encryptions separately with the gathering main frame separately.By this, the present invention promotes the convenience that the consumer uses.
After consulting embodiment graphic and that describe subsequently, those skilled in the art just can understand other purpose of the present invention, advantage and technological means of the present invention and implement aspect.
Description of drawings
Fig. 1 is the synoptic diagram of the first embodiment of the present invention; And
Fig. 2 is the process flow diagram of the second embodiment of the present invention.
[main element label declaration]
11: client 11a: calculating punch
11b: handset 12: network checkout
12a: the first transmitting-receiving interface 12b: processing module
12c: storage module 12d: the second transmitting-receiving interface
12e: Data Format Transform module 12f: communications protocol modular converter
13: gathering main frame 101,101 ': verification msg
102,102 ': authentication failed message 103,103 ': the gathering data
104: encrypt gathering data 105,105 ': transaction results message
106,106 ', 106 ": acknowledge message
Embodiment
Below will explain content of the present invention, and the invention relates to and a kind ofly must also need not dispose secure access module (Security Access Module via a browser interface by embodiment; SAM), can with online network checkout of gathering main frame and the cashing method that is used for this network checkout.Need the expositor, following examples and graphic in, all omit and do not illustrate with the non-directly related element of the present invention.Each interelement size relationship is only for asking easy understanding in graphic, and is non-in order to the restriction actual ratio.
Fig. 1 is the synoptic diagram according to the first embodiment of the present invention.Network checkout 12 of the present invention comprises one first transmitting-receiving interface 12a, a processing module 12b, a storage module 12c, one second transmitting-receiving interface 12d, a Data Format Transform module 12e and a communications protocol modular converter 12f.11 of clients comprise a calculating punch 11a and a handset 11b.Network checkout 12 is online to client 11 by the first transmitting-receiving interface 12a, and is online to gathering main frame 13 by the second transmitting-receiving interface 12d.
Network checkout 12 can be handled the consumption payment of different businessmans (for example: transport column, online store, department store or the like), and each businessman can be considered aforesaid client 11.In other words, network checkout 12 can be connected to a plurality of clients, and so for ease of understanding, present embodiment is only with client 11 explanations.For example, if network checkout 12 is applied to the taxi consumption service, then client 11 can be a taxi, and calculating punch 11a that client 11 comprised and handset 11b then are the device that is placed in the taxi, and gathering main frame 13 can be a bank main.In addition, the present invention does not also limit client 11 and whether has the mobile communication ability, and for example, when being applied to the taxi consumption service, client 11 can be a taxi, and then the handset 11b that it comprised has the ability of mobile communication; When being applied to department store's service, client 11 can be the special counter in the department store, so the handset 11b that it comprised can not need to have the mobile communication ability.
Handset 11b is the device with calculation process and ability to communicate, for example car machine, personal digital assistant (Personal Digital Assistant; PDA), personal computer, notebook computer or the like.Handset 11b has a user code, and this user code is unique, in other words, if network checkout 12 is connected to a plurality of clients, these clients each self-contained handset have different user codes.
When a consumer desired payment client terminal 11 (for example taxi) consumption amount of money, client 11 was connected to handset 11b with calculating punch 11a, and fiscard/credit card is inserted into calculating punch 11a.Implementing in the aspect in other, can be that calculating punch 11a is connected to handset 11b in advance.Afterwards, calculating punch 11a reads an account data of fiscard/credit card and it is sent to handset 11b.Handset 11b is integrated into a verification msg 101 with the user code and the consumption amount of money of account data, handset 11b, again verification msg 101 is sent to network checkout 12.12 of network checkouts pass through the first transmitting-receiving interface 12a Receipt Validation data 101.
In present embodiment, client 11 adopts one first communications protocol, for example: user data communications protocol (user datagram protocol; UDP), and the data that transmitted of client 11 have one first data layout.Yet, network checkout 12 employed communications protocol are not necessarily identical with client 11 with data layout, therefore after the network checkout 12 Receipt Validation data 101, must confirm whether the communications protocol of verification msg 101 is consistent with employed communications protocol own and data layout with data layout.
Particularly, if Data Format Transform module 12e judges that first data layout of verification msg 101 is different with second data layout that network checkout 12 is suitable for, be second data layout by first Data Format Transform then with verification msg 101.Similarly, if communications protocol modular converter 12f is according to verification msg 101, first communications protocol of judging client 11 uses is different with second communications protocol that network checkout 12 and gathering main frame 13 use, and then first communications protocol with verification msg 101 is converted to second communications protocol.
It should be understood that the not sequence of operations of restricting data format converting module 12e and communications protocol modular converter 12f of the present invention.Moreover verification msg 101 also may be consistent with communications protocol with the data layout that network checkout 12 is suitable for and need not change.In addition, implement aspect in other, the computer hardware of Data Format Transform module 12e and communications protocol modular converter 12f also can be independent, and be not contained in network checkout 12.In other words, the present invention storing position of restricting data format converting module 12e and communications protocol modular converter 12f computer hardware not.
The storage module 12c of network checkout 12 stores a plurality of identification codes, a plurality of favor information, a plurality of membership information, path information and the golden key of an encryption.Implement in the aspect in other, storage module 12c can only store an identification code or Pen Association person's information.Further, each identification code can a corresponding favor information (for example: discount), and each membership information is an information relevant with the member of network checkout 12, and for example cumulative bonus is counted.Path information then be client 11 businessman's path (for example: relevant information taxi fleet).
The stored identification code of storage module 12c is in order to checking client 11, encrypts golden key and then be the faith mechanism of 13 in network checkout 12 and gathering main frame.Be stressed that gathering main frame 13 has the golden key of a deciphering, this deciphers golden key can correspond to the encryption gold key that network checkout 12 is had.Gathering main frame 13 can upgrade the golden key of deciphering at set intervals, and the golden key of the golden pairing encryption of key of the deciphering after will upgrading offers network checkout 12, to guarantee both sides' transaction security.In the present embodiment, encrypting golden key is authorization of messages sign indicating number gold key (message authentication code key; MAC key).
After Data Format Transform module 12e and communications protocol modular converter 12f are converted to the verification msg 101 ' with second data layout and second communications protocol with verification msg 101, processing module 12b judge user code that verification msg 101 ' comprises whether be the stored identification code of storage module 12c one of them.If the stored identification code of user code and storage module 12c is neither identical, represent authentication failed, that is client 11 do not have due authority to client 11.At this moment, processing module 12b produces an authentication failed message 102 ', and convert it to authentication failed message 102 with first data layout and first communications protocol by communication modular converter 12f and Data Format Transform module 12e, transmit authentication failed message 102 to client 11 by the first transmitting-receiving interface 12a again, the expression consumer can't pay in network checkout 12 by client 11.
On the contrary, if processing module 12b judge user code that verification msg 101 ' comprised really for the stored identification code of storage module 12c one of them, then represent the handset 11b of client 11 is proved to be successful, that is client 11 has due authority.At this moment, processing module 12b will capture the pairing favor information of the identification code identical with user code.One of them is identical with the stored membership information of storage module 12c for the account data that processing module 12b further judges verification msg 101 ' again and comprised (being the account data of fiscard/credit card of being read of calculating punch 11a), if then the processing module 12b acquisition membership information pairing bonus identical with account data counted.Then, processing module 12b counts (if having) and the consumption amount of money according to favor information, bonus, calculate a preferential amount of money (not illustrating), and the information of this preferential amount of money done stylistic conversion by communications protocol modular converter 12f and Data Format Transform module 12e, be sent to client 11 by the first transmitting-receiving interface 12a again, 11 information that show this preferential amount of money of client are given consumer's reference.
If the consumer also agrees to pay this preferential amount of money, then the consumer is in the password of calculating punch 11a input fiscard/credit card, so that the password of checking input.On the other hand, calculating punch 11a produces a Trading Authorization sign indicating number according to this transaction content and exchange hour.Be stressed that the Trading Authorization sign indicating number that the each exchange of calculating punch 11a produces is relevant with this time transaction content and exchange hour, the Trading Authorization sign indicating number that therefore each exchange produces is not necessarily identical.Trading Authorization sign indicating number in the present embodiment is two generations chip fiscard Trading Authorization sign indicating number (Transaction Authentication Code; TAC), implement in the aspect in other, the Trading Authorization sign indicating number can be other form.
Afterwards, handset 11b is sent to network checkout 12 with gathering data 103.Particularly, gathering data 103 have a data length, in present embodiment, gathering data 103 comprise consumer's account data, Trading Authorization sign indicating number and the transaction on line data (for example: fiscard/credit card remarks, fiscard/credit card trade time, fiscard/credit card sequence number) that calculating punch 11a is produced.Network checkout 12 receives this gathering data 103 by the first transmitting-receiving interface 12a.
Similarly, Data Format Transform module 12e and communications protocol modular converter 12f will judge whether first data layout and first communications protocol that client 11 is used be identical with the data layout and the communications protocol of 12 uses of network checkout according to gathering data 103.Tentation data format converting module 12e judges that first data layout of client 11 uses is different with second data layout that network checkout 12 uses, and judge that one first communications protocol that client 11 uses is different with second communications protocol of gathering main frame 13 uses, the data 103 of then will collecting money respectively are second data layout by first Data Format Transform and are converted to second communications protocol to obtain the data 103 ' of collecting money by first communications protocol.Then, treating apparatus 12b can receive gathering data 103 ' by communications protocol modular converter 12f.
Processing module 12b utilizes the stored encryption of the storage module 12c gold key data 103 ' of will collect money to be encrypted as one and to encrypt the data of collecting money.Similarly, if gathering main frame 13 employed one the 3rd data layouts and network checkout 12 employed second data layouts are inequality, then the processing module 12b encryption gathering data that will have second data layout are converted to the enciphered data form 104 with the 3rd data layout, and will encrypt gathering data 104 by the second transmitting-receiving interface 12d and be sent to the main frame 13 of collecting money.
Gathering main frame 13 utilizes the golden key checking of deciphering encryption gathering data 104 and encrypts the Trading Authorization sign indicating number of gathering data 104 after receiving encryption gathering data 104.Whether in detail, gathering main frame 13 will utilize the data length of the golden key of deciphering checking exchange hour, the data 103 of collecting money and Trading Authorization sign indicating number or the like correct.At last, gathering main frame 13 will transmit a transaction results message 105 to second transmitting-receiving interface 12d according to the result of checking.
Particularly, if above-mentioned being proved to be successful, then transaction results message 105 is a Transaction Success message; If above-mentioned authentication failed, then transaction results message 105 is a Fail Transaction message.In present embodiment, if be proved to be successful, the main frame 13 of then collecting money will be collected money to account data according to the preferential amount of money, and transmit transaction results message 105 to client 11 via the second transmitting-receiving interface 12d and the first transmitting-receiving interface 12a.Similarly, transaction message result 105 will be converted to the transaction message result 105 ' with first data layout and first communications protocol so that be sent to client 11 via processing module 12b, Data Format Transform module 12e and communications protocol modular converter 12f.
Client 11 transmits an acknowledge message 106 immediately to network checkout 12 after receiving transaction results message 105 '.Similarly, network checkout 12 is by the first transmitting-receiving interface 12a confirmation of receipt message 106, Data Format Transform module 12e and communications protocol modular converter 12f are converted to acknowledge message 106 the affirmation message 106 ' with second data layout and second communications protocol, and acknowledge message 106 ' is converted to affirmation message 106 with the 3rd data layout by processing module 12b ", again by the second transmitting-receiving interface 12d with acknowledge message 106 " be sent to gathering main frame 13.So far, network checkout 12 is finished a consumption gathering.
By above-mentioned configuration, first embodiment does not need also need not dispose the secure access module by the browser interface with safety certification effect, can be online with the gathering main frame, promote convenience and security that the consumer uses.
The second embodiment of the present invention is according to cashing method of the present invention.This cashing method can be used for a network checkout, for example the described network checkout 12 of first embodiment.Network checkout 12 is fitted and can be online to a client 11 and a gathering main frame 13, and client 11 has a Trading Authorization sign indicating number, and network checkout 12 has one and encrypts golden key, and gathering main frame 13 has one and corresponds to the golden key of the deciphering of encrypting golden key.
See also Fig. 2, it is the flow chart of steps according to cashing method of the present invention.At first, in step 201, client 11 transmits a verification msg, and wherein, verification msg comprises a user code and a consumption amount of money of an account data, client 11.In step 202a, after suitable one second data layout of one first data layout of judging verification msg and network checkout 12 is different, verification msg is converted into second data layout by first data layout.In step 202b, according to verification msg, judge that one second communications protocol of one first communications protocol that client 11 uses and network checkout 12 and 13 uses of gathering main frame is different after, verification msg is converted into second communications protocol by first communications protocol.Need the expositor, the execution sequence of step 202a and step 202b can be exchanged.In addition, implement in the aspect,, then need not carry out Data Format Transform if the data layout of verification msg is identical with the data layout that network checkout 12 is suitable in other.Similarly, if the communications protocol that client is used is identical with the communications protocol that network checkout 12 and gathering main frame 13 use, then need not carry out the communications protocol conversion.
Then, network checkout 12 has due authority in step 203 according to the user code checking client that verification msg comprised.Particularly, network checkout 12 stores a plurality of identification codes, a plurality of favor information and a plurality of membership information.Wherein, implement in the aspect in other, network checkout 12 can only store an identification code or Pen Association person's information.Furthermore, each identification code can correspond to a favor information (for example: discount), and each membership information is an information relevant with the member of network checkout 12, and for example cumulative bonus is counted.In the step 203, network checkout 12 judge the user code of client whether be identification code one of them.The result who judges in this hypothesis step 203 for the user code of client 11 be identification code one of them, and according to this favor information with and/or bonus count and obtain a preferential amount of money.In other situation, if network checkout 12 judge the user code of clients be not identification code one of them, then transmit an authentication failed message to client.
In step 204, network checkout 12 is the message with preferential amount of money of first data layout and first communications protocol with the message conversion of the preferential amount of money.In step 205, network checkout 12 is sent to client 11 with the preferential amount of money.After client 11 received the message of the preferential amount of money in step 206, the input password also transmitted gathering data, and the data of wherein collecting money comprise account data, a Trading Authorization sign indicating number and an exchange hour.
In step 207, after second data layout that first data layout that network checkout 12 is judged the gathering data and this network checkout 12 are suitable for was different, the data of collecting money were converted into second data layout by first data layout.Simultaneously, according to the gathering data, judge that second communications protocol that first communications protocol that client 11 uses and network checkout 12 and gathering main frame 13 use is different after, the data of collecting money are converted into second communications protocol by first communications protocol.The gathering data have a data length.
Then, network checkout 12 is encrypted golden key in step 208 utilization, the data encryption of will collecting money is one to encrypt the gathering data, and the encryption gathering data that will have second data layout are converted to the encryption gathering data with the 3rd data layout, and it is sent to gathering main frame 13.Gathering main frame 13 utilizes the golden key checking of deciphering to encrypt the gathering data, encrypt Trading Authorization sign indicating number, exchange hour and data length in the gathering data in step 209.Then, gathering main frame 13 will transmit a transaction results message according to the checking result of step 209 to network checkout 12 in step 210.
In step 211, the 3rd data layout of transaction results message is converted into second data layout.Second data layout of transaction results message and second communications protocol are converted into first data layout and first communications protocol in step 212.Then, client 11 receives the transaction results message after changing and passes an acknowledge message back in step 213.In step 214, first data layout of acknowledge message and first communications protocol are converted into second data layout and second communications protocol, and second data layout of acknowledge message also is converted into the 3rd data layout in step 215.At last, when collecting money main frame 13 after step 216 confirmation of receipt message, closing the transaction.
Except aforesaid step, second embodiment also can carry out all operations and the function of first embodiment.Under technical field have know usually the knowledgeable can be directly acquainted with second embodiment how based on above-mentioned first embodiment to carry out these operations and function.So do not give unnecessary details.
Based on above-mentioned, network checkout of the present invention and be used for this network checkout cashing method and need can be online not as prior art with the main frame of collecting money by browser interface.In addition, by the network checkout, it is online that different clients can use golden key of same encryption and gathering main frame to obtain, and do not need to obtain the golden key of different encryptions separately with the gathering main frame separately.By this, the present invention promotes the convenience that the consumer uses.
The above embodiments only are used for exemplifying enforcement aspect of the present invention, and explain technical characterictic of the present invention, are not to be used for limiting protection category of the present invention.Any those skilled in the art can unlabored change or the arrangement of the isotropism scope that all belongs to the present invention and advocated, and the scope of the present invention should be as the criterion with the claim scope.

Claims (16)

1. cashing method that is used for a network checkout, this network checkout is suitable can be online to a client and a gathering main frame, this client has a Trading Authorization sign indicating number, this network checkout has one and encrypts golden key, this gathering main frame has one and corresponds to this deciphering of encrypting golden key gold key, and this cashing method comprises the following step:
(a) make this network checkout receive gathering data from this client, these gathering data comprise this Trading Authorization sign indicating number;
(b) make this network checkout utilize this to encrypt golden key, the data encryption of should collecting money is encryption gathering data;
(c) make this network checkout should encrypt the gathering data and be sent to this gathering main frame, verify collect money data and verify collect money this Trading Authorization sign indicating number in data of this encryption of this encryption in order to do the golden key of this this deciphering of gathering host computer using;
(d) make this network checkout after this step (c), this gathering main frame receives a transaction results message certainly;
(e) make this network checkout transmit this transaction results message to this client;
(f) make this network checkout receive an acknowledge message from this client; And
(g) make this network checkout transmit this and confirm message to this gathering main frame.
2. cashing method according to claim 1 also comprises the following step:
Make this network checkout preceding, judge that one first data layout of these gathering data is different with one second data layout that this network checkout is suitable in this step (b); And
Make this network checkout preceding in this step (b), the data of should collecting money are this second data layout by this first Data Format Transform.
3. cashing method according to claim 2 also comprises the following step:
Make this network checkout preceding, judge that second data layout of these gathering data is different with one the 3rd data layout that this gathering main frame is suitable in this step (c); And
Make this network checkout preceding in this step (c), the data of should collecting money are the 3rd data layout by this second Data Format Transform.
4. cashing method according to claim 1 also comprises the following step:
Make this network checkout preceding,, judge that one first communications protocol of this client use is different with one second communications protocol that this gathering main frame uses according to these gathering data in this step (b); And
Make this network checkout preceding in this step (b), the data of should collecting money are converted to this second communications protocol by this first communications protocol.
5. cashing method according to claim 1, wherein these gathering data also comprise an account data and an exchange hour, and these gathering data have a data length, more verify this exchange hour and this data length in order to do this gathering main frame.
6. cashing method according to claim 1, wherein this network checkout stores at least one identification code, and this client also has a user code, and it is preceding in this step (a) that this cashing method also comprises the following step:
Make this network checkout receive this user code from this client;
Make this network checkout judge this user code for this at least one identification code one of them.
7. cashing method according to claim 1, wherein this network checkout stores at least one identification code, and this client also has a user code, and it is preceding in this step (a) that this cashing method also comprises the following step:
Make this network checkout receive this user code from this client;
Make this network checkout judge that at least one identification code of this user code and this is different; And
Make this network checkout transmit an authentication failed message to this client.
8. cashing method according to claim 1, wherein the golden key of this encryption is an authorization of messages sign indicating number gold key, and this Trading Authorization sign indicating number is two a generations chip fiscard Trading Authorization sign indicating number.
9. network checkout comprises:
One storage module stores one and encrypts golden key;
One first transmitting-receiving interface is online to a client, and this client receives gathering data certainly, and wherein these gathering data comprise a Trading Authorization sign indicating number of this client;
One processing module, utilizing this to encrypt the data encryption of should collecting money of golden key is one to encrypt the gathering data; And
One second transmitting-receiving interface, be online to one and have the gathering main frame that corresponds to this deciphering of encrypting golden key gold key, should encrypt the gathering data and be sent to this gathering main frame, verify this encryption collect money this Trading Authorization sign indicating number in the data of data and this encryption of collecting money in order to do the golden key of this this deciphering of gathering host computer using;
Wherein, this second transmitting-receiving interface also receives a transaction results message from this gathering main frame, this first transmitting-receiving interface also transmits this transaction results message to this client, the acknowledge message that this first transmitting-receiving interface also receives from this client, and this second transmitting-receiving interface also transmits this and confirms message to this gathering main frame.
10. network checkout according to claim 9 also comprises:
One Data Format Transform module judge that one first data layout of these gathering data is different with one second data layout that this network checkout is suitable for, and the data of should collecting money is this second data layout by this first Data Format Transform.
11. network checkout according to claim 10, wherein this processing module judges that also second data layout of these gathering data is different with one the 3rd data layout that this gathering main frame is suitable for, and the data of should collecting money are the 3rd data layout by this second Data Format Transform.
12. network checkout according to claim 9 also comprises:
One communications protocol modular converter according to these gathering data, judge that one first communications protocol of this client use is different with one second communications protocol that this gathering main frame uses, and the data of should collecting money is converted to this second communications protocol by this first communications protocol.
13. network checkout according to claim 9, wherein these gathering data also comprise an account data and an exchange hour, and these gathering data have a data length, more verify this exchange hour and this data length in order to do this gathering main frame.
14. network checkout according to claim 9, wherein this storage module also stores at least one identification code, this client also has a user code, this first the transmitting-receiving interface also receive this user code from this client, this processing module also judge this user code for this at least one identification code one of them.
15. network checkout according to claim 9, wherein this storage module also stores at least one identification code, this client also has a user code, this first transmitting-receiving interface also receives this user code from this client, this processing module judges that also at least one identification code of this user code and this is different, and this first transmitting-receiving interface also transmits an authentication failed message to this client.
16. network checkout according to claim 9, wherein the golden key of this encryption is an authorization of messages sign indicating number gold key, and this Trading Authorization sign indicating number is two a generations chip fiscard Trading Authorization sign indicating number.
CN2009101697430A 2009-08-31 2009-08-31 Webpay and collection method used in webpay Pending CN101996457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101697430A CN101996457A (en) 2009-08-31 2009-08-31 Webpay and collection method used in webpay

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101697430A CN101996457A (en) 2009-08-31 2009-08-31 Webpay and collection method used in webpay

Publications (1)

Publication Number Publication Date
CN101996457A true CN101996457A (en) 2011-03-30

Family

ID=43786561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101697430A Pending CN101996457A (en) 2009-08-31 2009-08-31 Webpay and collection method used in webpay

Country Status (1)

Country Link
CN (1) CN101996457A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104447874A (en) * 2014-12-24 2015-03-25 南京中电熊猫液晶显示科技有限公司 Preparation method and application method of metal complex
CN105225369A (en) * 2014-06-04 2016-01-06 中国银联股份有限公司 A kind of mother and sons' POS system
CN114038132A (en) * 2021-11-11 2022-02-11 武汉天喻信息产业股份有限公司 Offline collection terminal, system and collection and cash withdrawal method based on internet access

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105225369A (en) * 2014-06-04 2016-01-06 中国银联股份有限公司 A kind of mother and sons' POS system
CN104447874A (en) * 2014-12-24 2015-03-25 南京中电熊猫液晶显示科技有限公司 Preparation method and application method of metal complex
CN114038132A (en) * 2021-11-11 2022-02-11 武汉天喻信息产业股份有限公司 Offline collection terminal, system and collection and cash withdrawal method based on internet access

Similar Documents

Publication Publication Date Title
CN102804682B (en) Use the system of the mutual mobile authentication of KMC, method and server computer
KR100641824B1 (en) A payment information input method and mobile commerce system using symmetric cipher system
CN100511290C (en) Method for supporting cashless payment
US10528940B2 (en) PIN servicing
CN103873244B (en) Identity authentication method and system in mobile payment based on fingerprint identification
US20110103586A1 (en) System, Method and Device To Authenticate Relationships By Electronic Means
CN101686225A (en) Methods of data encryption and key generation for on-line payment
CN104054098A (en) Systems, methods, and computer program products providing payment in cooperation with EMV card readers
CN103123708A (en) Secure payment method, mobile device and secure payment system
CN105308898B (en) For executing system, the method and apparatus of password authentification
KR20010075291A (en) Method and system for paying for goods or services
EP1623388B1 (en) Value holding system, value holding method, value holding program, and transaction system
US20120166344A1 (en) Secure wireless payment system and method thereof
EP1142194B1 (en) Method and system for implementing a digital signature
CN103377429A (en) Payment method and payment system carried out by using two-dimension code
JP2011034556A (en) Information system, processing station, credit card payment method
CN102891842A (en) Security authentication method and system
CN101694736A (en) Mobile webpay system and realization method thereof
CN103077460A (en) System and method for financial certificate transaction by mobile device
CN104182875A (en) Payment method and payment system
CN101223729B (en) Updating a mobile payment device
CN113628352A (en) Subway ticket business system based on secondary selling and subway ticket secondary selling method
CN101996457A (en) Webpay and collection method used in webpay
CN111052671A (en) System for secure authentication of user identity in an electronic system for banking transactions
CN115315924A (en) User authentication at an access control server using a mobile device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110330