CN105407079A - Novel terminal safety soft secret key management method - Google Patents

Novel terminal safety soft secret key management method Download PDF

Info

Publication number
CN105407079A
CN105407079A CN201510690811.3A CN201510690811A CN105407079A CN 105407079 A CN105407079 A CN 105407079A CN 201510690811 A CN201510690811 A CN 201510690811A CN 105407079 A CN105407079 A CN 105407079A
Authority
CN
China
Prior art keywords
information
soft
beneficiary
payment
paying party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510690811.3A
Other languages
Chinese (zh)
Inventor
聂明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA SMARTCITY TECHNOLOGY Co Ltd
Original Assignee
CHINA SMARTCITY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA SMARTCITY TECHNOLOGY Co Ltd filed Critical CHINA SMARTCITY TECHNOLOGY Co Ltd
Priority to CN201510690811.3A priority Critical patent/CN105407079A/en
Publication of CN105407079A publication Critical patent/CN105407079A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a novel terminal safety soft secret key management method. According to the method, information of two transaction parties are selected by a soft secret key system as identification ID, public and private key pairs are formed through mapping on the basis of business subdomain identification; for online payment, a two-dimensional code is generated at a receiving party; after the two-dimensional code is scanned by a payment party, signature is carried out by utilizing a private key pair randomized number, and information is sent to a background management system; signature verification is realized by the background management system through utilizing public key pair signature information; if signature verification succeeds, transaction is processed; for offline payment, signature is carried out by the receiving party through utilizing the private key pair randomized number, and a two-dimensional code is generated; the two-dimensional code is scanned by the payment party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is carried out by the payment party according to transaction information; signature is carried out by the payment party through utilizing the private key pair randomized number, a two-dimensional code is generated; the two-dimensional code is scanned by the receiving party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is successfully realized for the receiving party. Through the method, system safety is not only improved, system disposition cost is further reduced, transaction validness is fully guaranteed, and invalid information tampering and information steganography can be avoided.

Description

The soft key management method of a kind of novel terminal security
Technical field
The present invention relates to key management field, particularly the soft key management method of a kind of terminal based on key authentication.
Background technology
Universal along with Internet, people carry out by internet communications and get more and more, and being carried on business by network is accordingly that ecommerce have also been obtained and develops widely.Ecommerce is Chinese Enterprises developing domestic and international market, make good use of domestic and international various resource provides a good opportunity very rare.Ecommerce really embodies fair competition, high efficiency, low cost, high-quality advantage concerning enterprise, and enterprise can be allowed to grasp the commercial chances in the market competition of fierceness, show one's talent.Developed country is using the growth emphasis of ecommerce as 21 century national economy, and the relevant department of China is also carrying forward vigorously Chinese Enterprises develop electronic commerce.But also cause some Internet safety problems accordingly along with the develop rapidly of ecommerce.
Sum up, the safety problem that the Internet user carrying out electronic transaction faces has:
One, confidentiality: how to ensure that a large amount of security informations related in ecommerce are not stolen in the transmitting procedure of open network;
Two, integrality: how to ensure that the Transaction Information transmitted in ecommerce is not distorted and carries out wash sale by repeating transmission halfway;
Three, how authentication and authorization: in the process of exchange of ecommerce, carry out certification to both sides, to ensure the correctness of both parties' identity;
Four, resisting denying: after the transaction of ecommerce completes, how to ensure to conclude the business either party cannot deny the transaction that occurred.These safety problems will limit further developing of ecommerce to a great extent, therefore how to ensure the safety of information transmission in Internet, have become the important step of develop electronic commerce.
PKI (PKIX) technology adopts certificate management PKI, by third-party trusted authorities--authentication center CA (CertificateAuthority), other identification informations (as title, e-mail, identification card number etc.) of the PKI of user and user are bundled, the identity of authentication of users in Internet.
PKI is the Public Key Infrastructure based on Third Party Authentication, CA center can only be relied on to carry out on-line authentication, need the support of online database.Once CA is trustless, so all trusting relationships all lost efficacy; After the stolen hearer of key obtains in PKI authentication system, easily cause information leakage and distort; Moreover, when multiple people communicates simultaneously, every two correspondents share a key, then N number of people communicates between two, need N* (N-1) to key, for KMC, the distribution of key and management become complicated, and user also expends great workload for the management of key.
CPK authentication system---Conbined public or double key technology is with the public affairs of some, based on private key factor, the public affairs that quantity is extremely huge can be produced, private key pair, key management scale and the key i.e. problem of provable mark itself is solved from technical system itself, do not need the proof of trusted third party, there is SYSTEM SUMMARY efficient, the advantage that feasibility is good, can the centralized management problem of extensive key of the multiple Distributed Application of effectively low solution, simple and direct as one, efficiently, economic key managing project, Conbined public or double key technology can comprise e-bank as security infrastructure support, ecommerce, email authentication, mobile phone certification, the transaction security of the large-scale distributed application such as security certification.
In the application of CPK and implementation process, user is needed to dispose CPK key management system, the key management system version of different editions is disposed according to different business demands, key management system is disposed with the form of hardware server, in formal implementation process, leave in U-key after the key download of user, increase hardware cost for user, and in use U-key likely loses, cause the trouble in use to user.
Summary of the invention
In order to solve the problem, the present invention proposes the soft key management method of a kind of novel terminal security, soft key management system is built in executable file, when there is payment transaction, using a certain item or multinomial information as mark ID, both parties by the soft cipher key system of terminal built-in based on mark ID, carry out mutual certification and the encryption and decryption of both parties, realize Secure Transaction.
Technical scheme of the present invention is as follows:
The soft key management method of novel terminal security, comprises the steps:
Step 1, is placed in executable file by soft cipher key system, encrypting storing, is integrated in terminal and background management system, and management and the generation of key are all carried out in soft cipher key system; Soft cipher key system chooses one of both parties or multinomial information as mark ID, goes out public affairs, private key pair based on business subdomain identity map;
Step 2, during online consumption payment, is comprised the payment information of the amount of money by beneficiary input, beneficiary terminal generates the first gathering Quick Response Code according to beneficiary information and payment information; After paying party scanning first gathering Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key; Beneficiary information, payment information, paying party information, paying party signing messages are mail to background management system together;
After background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages; If sign test failure, then termination of concluding the business; If sign test success, then background management system carries out trading processing, and after process, background management system returns corresponding data to paying party and beneficiary;
Step 3, during offline electronic payment, in beneficiary terminal, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated the second gathering Quick Response Code together;
Paying party scanning second gathering Quick Response Code, the soft cipher key system in payer terminal goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages; If sign test failure, then termination of concluding the business, flow process terminates; If sign test success, paying party is paid the bill according to Transaction Information;
Soft cipher key system private key after payment in payer terminal is signed to this random number, and payment information, paying party information, paying party signing messages are generated successful Quick Response Code of withholing together;
Beneficiary scans successful Quick Response Code of withholing, and mark ID and the business subdomain identity map of the soft cipher key system paying party in beneficiary terminal go out PKI, carry out sign test to paying party signing messages; If sign test failure, then flow process terminates; If sign test success, then beneficiary successfully keeps accounts.
Its further technical scheme is: described soft cipher key system performs in the memory headroom temporarily opened up or safety zone.
Its further technical scheme is: described soft cipher key system is integrated in electronic money cell-phone customer terminal and electronic money background management system.
Its further technical scheme is: using the account of paying party and beneficiary as mark ID.
Advantageous Effects of the present invention is:
1, soft cipher key system is no longer dependent on the deployment of hardware service system, mobile device executable file can be implanted, this soft cipher key system can only be performed in specific region, not only increase system safety, reduce system lower deployment cost, for keeper simultaneously, the management of key and distribution become and are simple and easy to management, for user, the private key link of payment process need not adopt the mode of hardware, the delivery operation had great convenience for the user.
Soft key leaves in software security container, cannot obtain easily, and software security container, have the file of certain implication to be kept in internal memory normally with certain, its content represented is one section of common information having other implications, cannot tracked or crack general information cover up under other information.
2, the both sides communicated in payment process have employed the mutual authentication process based on mark, fully ensure that the legitimacy of transaction, prevent illegally distorting and information disguising of information.
3, soft cipher key system is at terminal special area, therefore can realize concluding the business without network payment.
4, the difference of the present invention and other means of payment is: during transaction, without the need to secondary handshake procedure, only needs once signed, sign test process can realize payment function; Meanwhile, in offline electronic payment link, compared with existing offline electronic payment scheme, the payment that the present invention more focuses on both parties is experienced, and can cancel payment in payment link, stop transaction, this does not have in other offline electronic payment scheme.
Accompanying drawing explanation
Fig. 1 is the flow chart of the online course of payment of the present invention.
Fig. 2 is the flow chart of offline electronic payment process of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described further.
Soft cipher key system is placed in executable file by the present invention, encrypting storing, this soft cipher key system can only be performed at specific region (memory headroom such as opened up or safety zone in) temporarily, can be integrated in terminal (such as mobile phone or POS) and background management system, be be integrated in electronic money cell-phone customer terminal and electronic money background management system in following examples, management and the generation of key are all carried out in soft cipher key system.Soft cipher key system chooses a certain item of both parties or multinomial information as mark ID, and going out public affairs, private key pair based on business subdomain identity map, is using the account of both parties as mark ID in following examples.
Fig. 1 is the flow chart of online course of payment.As shown in Figure 1, during online consumption payment, input the amount of money by beneficiary, electronic money cell-phone customer terminal generates Quick Response Code according to beneficiary information and payment information (amount of money).After paying party scans this Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key.Beneficiary information, payment information, paying party information, paying party signing messages are mail to electronic money background management system together.
After electronic money background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages.If sign test failure, then termination of concluding the business.If sign test success, then trading processing is carried out on electronic money backstage, and after process, electronic money backstage returns corresponding data to paying party and beneficiary.
Fig. 2 is the flow chart of offline electronic payment process.As shown in Figure 2, during offline electronic payment, at the electronic money cell-phone customer terminal of beneficiary, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated Quick Response Code together.
Paying party scanning Quick Response Code, the soft cipher key system in paying party mobile phone goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages.If sign test failure, then termination of concluding the business, flow process terminates.If sign test success, paying party is paid the bill according to payment information.
Soft cipher key system private key after payment on paying party mobile phone is signed to this random number, and payment information, paying party information, paying party signing messages are generated Quick Response Code together.
Beneficiary scans this Quick Response Code, and the soft cipher key system in beneficiary mobile phone utilizes the mark ID of paying party and business subdomain identity map to go out PKI, carries out sign test to paying party signing messages.If sign test failure, then flow process terminates.If sign test success, then beneficiary successfully keeps accounts.
Below by way of two embodiments, flow process of the present invention is described in detail.
[embodiment one] client Zhang San pay the bill online to client Li Si.
As shown in Figure 1, paying party Zhang San wants to pay the bill online to beneficiary Li Si, and the two all uses mobile phone electronic wallet client end to operate, and soft cipher key system all has installation and operation at Zhang San's mobile phone, Li Si's mobile phone, background management system.Li Si inputs the amount of money at mobile phone terminal, and beneficiary information, payment information are generated Quick Response Code by electronic wallet client end.
Zhang San is scanned Quick Response Code, and the soft cipher key system in Zhang San's mobile phone chooses random number R, signs to this random number R with Zhang San's private key, and beneficiary information, payment information, paying party information, signing messages are mail to background management system together.
After background management system receives above-mentioned information, soft cipher key system carries out sign test to signing messages: namely go out PKI with the Zhang San ID in paying party information and corresponding business subdomain identity map, carry out sign test with PKI to signing messages, if sign test failure, then flow process terminates.If sign test success, then background management system carries out trading processing according to beneficiary information, payment information, paying party information.Information feed back after process is to paying party Zhang San and beneficiary Li Si.
[embodiment two] client Zhang San is to client Li Si offline electronic payment.
As shown in Figure 2, paying party Zhang San wants to beneficiary Li Si offline electronic payment, and the two all uses mobile phone electronic wallet client end to operate, and soft cipher key system all has installation and operation at Zhang San's mobile phone, Li Si's mobile phone.Li Si inputs the amount of money at mobile phone terminal, and soft cipher key system chooses random number R, signs to random number R with private key, and Transaction Information, Li Si's id information, signing messages are generated Quick Response Code together.
Zhang San is scanned Quick Response Code, and soft cipher key system Li Si ID and business subdomain identity map go out PKI, if carry out the failure of sign test sign test with PKI to the signing messages of Li Si, then flow process terminates.
If sign test success, whether the cell-phone customer terminal inquiry of Zhang San agrees to this payment operation, if Zhang San's refusal, then flow process terminates.If Zhang San agrees to, then successfully withhold in the account of Zhang San, successfully pay to Li Si.
Zhang San signs to this random number R with private key, and payment information, Zhang San's id information, signing messages are generated Quick Response Code together.
Li Si scans this Quick Response Code, and soft cipher key system Zhang San ID and business subdomain identity map go out PKI, carry out sign test with PKI to the signing messages of Zhang San.If sign test failure, then flow process terminates.
If sign test success, Payment Amount successfully keeps accounts by Li Si.
Said process is not limited to the two-way sign test and the encryption and decryption that pay link, adopts the mode of soft key to carry out the scene of signature sign test, be suitable for too at other.Comprise the encryption and decryption of the sensitive information in such as parking lot APP, signature sign test, the contents such as transmission, be imbedded in by safe control and can not take out, executable safety zone, carry out encryption and decryption to sensitive information, sign test of signing.
Note: above embodiment is all described using mobile phone as terminal, the present invention also can be applicable to other mobile terminals.
Above-described is only the preferred embodiment of the present invention, the invention is not restricted to above embodiment.Be appreciated that the oher improvements and changes that those skilled in the art directly derive without departing from the spirit and concept in the present invention or associate, all should think and be included within protection scope of the present invention.

Claims (4)

1. the soft key management method of novel terminal security, is characterized in that, comprise the steps:
Step 1, is placed in executable file by soft cipher key system, encrypting storing, is integrated in terminal and background management system, and management and the generation of key are all carried out in soft cipher key system; Soft cipher key system chooses one of both parties or multinomial information as mark ID, goes out public affairs, private key pair based on business subdomain identity map;
Step 2, during online consumption payment, is comprised the payment information of the amount of money by beneficiary input, beneficiary terminal generates the first gathering Quick Response Code according to beneficiary information and payment information; After paying party scanning first gathering Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key; Beneficiary information, payment information, paying party information, paying party signing messages are mail to background management system together;
After background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages; If sign test failure, then termination of concluding the business; If sign test success, then background management system carries out trading processing, and after process, background management system returns corresponding data to paying party and beneficiary;
Step 3, during offline electronic payment, in beneficiary terminal, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated the second gathering Quick Response Code together;
Paying party scanning second gathering Quick Response Code, the soft cipher key system in payer terminal goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages; If sign test failure, then termination of concluding the business, flow process terminates; If sign test success, paying party is paid the bill according to Transaction Information;
Soft cipher key system private key after payment in payer terminal is signed to this random number, and payment information, paying party information, paying party signing messages are generated successful Quick Response Code of withholing together;
Beneficiary scans successful Quick Response Code of withholing, and mark ID and the business subdomain identity map of the soft cipher key system paying party in beneficiary terminal go out PKI, carry out sign test to paying party signing messages; If sign test failure, then flow process terminates; If sign test success, then beneficiary successfully keeps accounts.
2. the soft key management method of novel terminal security according to claim 1, is characterized in that: described soft cipher key system performs in the memory headroom temporarily opened up or safety zone.
3. the soft key management method of novel terminal security according to claim 1, is characterized in that: described soft cipher key system is integrated in electronic money cell-phone customer terminal and electronic money background management system.
4. the soft key management method of novel terminal security according to claim 1, is characterized in that: using the account of paying party and beneficiary as mark ID.
CN201510690811.3A 2015-09-25 2015-10-22 Novel terminal safety soft secret key management method Pending CN105407079A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510690811.3A CN105407079A (en) 2015-09-25 2015-10-22 Novel terminal safety soft secret key management method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2015106249402 2015-09-25
CN201510624940 2015-09-25
CN201510690811.3A CN105407079A (en) 2015-09-25 2015-10-22 Novel terminal safety soft secret key management method

Publications (1)

Publication Number Publication Date
CN105407079A true CN105407079A (en) 2016-03-16

Family

ID=55472334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510690811.3A Pending CN105407079A (en) 2015-09-25 2015-10-22 Novel terminal safety soft secret key management method

Country Status (1)

Country Link
CN (1) CN105407079A (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600274A (en) * 2017-02-07 2017-04-26 桂林理工大学 Multi-algorithm multi-key optical authentication offline payment apparatus
CN106651364A (en) * 2017-02-07 2017-05-10 桂林理工大学 Online payment device for authentication through visible light and barcode two-way public-key system
CN106682904A (en) * 2017-02-07 2017-05-17 桂林理工大学 Offline payment apparatus with visible light and bar code bidirectional authentication
CN106779696A (en) * 2016-11-29 2017-05-31 南相浩 A kind of digital bank and digital cash and method of payment based on CPK
CN106779684A (en) * 2016-12-02 2017-05-31 北京博文广成信息安全技术有限公司 The soft black box safe electronic method of mobile payment of CFL based on Quick Response Code
CN106875179A (en) * 2017-02-03 2017-06-20 杭州小步科技有限公司 A kind of offline Quick Response Code method of payment and its system
CN107454038A (en) * 2016-05-30 2017-12-08 北京军源合众科技发展有限责任公司 A kind of method that Data Encryption Transmission is carried out by Quick Response Code
CN107491955A (en) * 2016-06-13 2017-12-19 邓斌涛 Encryption method, authentication and the electronic fare payment system and method for mobile terminal
CN108564370A (en) * 2018-04-20 2018-09-21 九江学院 A kind of electronic account payment protection method of multi-key cipher
CN108712383A (en) * 2018-04-17 2018-10-26 新大陆(福建)公共服务有限公司 A kind of generation method and computer readable storage medium of offline secure Quick Response Code
CN109766973A (en) * 2018-12-17 2019-05-17 南京熊猫电子股份有限公司 The two dimensional code of public transport AFC system mobile payment
CN109993532A (en) * 2019-04-03 2019-07-09 安庆师范大学 A kind of intelligent Service information-pushing method, device and terminal
CN110544087A (en) * 2019-07-22 2019-12-06 深圳壹账通智能科技有限公司 Mobile payment method, device, equipment and computer readable storage medium
CN110659987A (en) * 2018-06-28 2020-01-07 厦门本能管家科技有限公司 Offline transaction method and system based on block chain
WO2020024710A1 (en) * 2018-08-02 2020-02-06 阿里巴巴集团控股有限公司 Method and apparatus for generating payment two-dimensional code
CN110766383A (en) * 2018-07-27 2020-02-07 中城智慧科技有限公司 Digital wallet supporting anonymous or real-name offline transaction and use method
CN110930147A (en) * 2019-11-01 2020-03-27 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN110942301A (en) * 2019-11-22 2020-03-31 腾讯科技(深圳)有限公司 Data processing method and device based on block chain, computer and storage medium
CN111523869A (en) * 2020-04-09 2020-08-11 天地融科技股份有限公司 Off-line transaction method and system for digital currency
CN111612459A (en) * 2018-08-15 2020-09-01 阿里巴巴集团控股有限公司 Security control method and device for two-dimensional code payment
CN112070493A (en) * 2020-08-20 2020-12-11 郑州信大捷安信息技术股份有限公司 Off-line POS machine transaction method and system based on two-dimensional code
CN112861109A (en) * 2021-02-07 2021-05-28 新大陆(福建)公共服务有限公司 Digital identity code generated based on CTID platform and front-end system and interaction method
CN113129005A (en) * 2021-05-18 2021-07-16 中国银行股份有限公司 Offline payment method and system, payment terminal and collection terminal
CN113191759A (en) * 2021-04-16 2021-07-30 西安艾润物联网技术服务有限责任公司 Parking fee payment method of digital currency, terminal device and readable storage medium
CN113222600A (en) * 2021-05-18 2021-08-06 中国银行股份有限公司 Offline payment method and system, payment terminal and collection terminal
CN115484224A (en) * 2022-09-16 2022-12-16 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012151163A1 (en) * 2011-05-05 2012-11-08 Ebay Inc. Barcode checkout at point of sale
CN103198403A (en) * 2013-03-12 2013-07-10 中国地质大学(武汉) Safe mobile payment method based on two-dimension code
CN104579689A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Soft secret key system and implementation method
CN104836776A (en) * 2014-02-10 2015-08-12 阿里巴巴集团控股有限公司 Data interaction method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012151163A1 (en) * 2011-05-05 2012-11-08 Ebay Inc. Barcode checkout at point of sale
CN103198403A (en) * 2013-03-12 2013-07-10 中国地质大学(武汉) Safe mobile payment method based on two-dimension code
CN104836776A (en) * 2014-02-10 2015-08-12 阿里巴巴集团控股有限公司 Data interaction method and device
CN104579689A (en) * 2015-01-20 2015-04-29 中城智慧科技有限公司 Soft secret key system and implementation method

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454038B (en) * 2016-05-30 2021-06-29 北京军源合众科技发展有限责任公司 Method for encrypting and transmitting data through two-dimensional code
CN107454038A (en) * 2016-05-30 2017-12-08 北京军源合众科技发展有限责任公司 A kind of method that Data Encryption Transmission is carried out by Quick Response Code
CN107491955B (en) * 2016-06-13 2022-01-11 邓斌涛 Encryption method of mobile terminal, identity authentication and electronic payment system and method
CN107491955A (en) * 2016-06-13 2017-12-19 邓斌涛 Encryption method, authentication and the electronic fare payment system and method for mobile terminal
CN106779696B (en) * 2016-11-29 2020-09-29 晋商博创(北京)科技有限公司 CPK-based digital bank and digital currency and payment method
US11301842B2 (en) 2016-11-29 2022-04-12 Js Bochtec Co., Ltd. CPK-based digital bank, digital currency, and payment method
CN106779696A (en) * 2016-11-29 2017-05-31 南相浩 A kind of digital bank and digital cash and method of payment based on CPK
CN106779684A (en) * 2016-12-02 2017-05-31 北京博文广成信息安全技术有限公司 The soft black box safe electronic method of mobile payment of CFL based on Quick Response Code
CN106875179B (en) * 2017-02-03 2020-12-08 杭州小步科技有限公司 Offline two-dimensional code payment method and system thereof
CN106875179A (en) * 2017-02-03 2017-06-20 杭州小步科技有限公司 A kind of offline Quick Response Code method of payment and its system
CN106600274A (en) * 2017-02-07 2017-04-26 桂林理工大学 Multi-algorithm multi-key optical authentication offline payment apparatus
CN106651364A (en) * 2017-02-07 2017-05-10 桂林理工大学 Online payment device for authentication through visible light and barcode two-way public-key system
CN106682904A (en) * 2017-02-07 2017-05-17 桂林理工大学 Offline payment apparatus with visible light and bar code bidirectional authentication
CN106600274B (en) * 2017-02-07 2023-08-11 桂林理工大学 Multi-algorithm multi-key optical authentication offline payment device
CN106651364B (en) * 2017-02-07 2023-09-01 桂林理工大学 Online payment device with visible light and bar code bidirectional public key system authentication
CN106682904B (en) * 2017-02-07 2023-08-15 桂林理工大学 Off-line payment device with visible light and bar code bidirectional authentication
CN108712383A (en) * 2018-04-17 2018-10-26 新大陆(福建)公共服务有限公司 A kind of generation method and computer readable storage medium of offline secure Quick Response Code
CN108564370A (en) * 2018-04-20 2018-09-21 九江学院 A kind of electronic account payment protection method of multi-key cipher
CN108564370B (en) * 2018-04-20 2021-10-01 九江学院 Multi-key electronic account payment protection method
CN110659987A (en) * 2018-06-28 2020-01-07 厦门本能管家科技有限公司 Offline transaction method and system based on block chain
CN110766383A (en) * 2018-07-27 2020-02-07 中城智慧科技有限公司 Digital wallet supporting anonymous or real-name offline transaction and use method
CN110766383B (en) * 2018-07-27 2024-04-09 中城智慧科技有限公司 Digital wallet supporting anonymous or real-name offline transaction and use method
US11107062B2 (en) 2018-08-02 2021-08-31 Advanced New Technologies Co., Ltd. Method and apparatus for generating two-dimensional payment code
US11836703B2 (en) 2018-08-02 2023-12-05 Advanced New Technologies Co., Ltd. Method and apparatus for generating two-dimensional payment code
WO2020024710A1 (en) * 2018-08-02 2020-02-06 阿里巴巴集团控股有限公司 Method and apparatus for generating payment two-dimensional code
CN111612459A (en) * 2018-08-15 2020-09-01 阿里巴巴集团控股有限公司 Security control method and device for two-dimensional code payment
CN111612459B (en) * 2018-08-15 2023-06-02 创新先进技术有限公司 Safety control method and device for two-dimension code payment
CN109766973A (en) * 2018-12-17 2019-05-17 南京熊猫电子股份有限公司 The two dimensional code of public transport AFC system mobile payment
CN109993532A (en) * 2019-04-03 2019-07-09 安庆师范大学 A kind of intelligent Service information-pushing method, device and terminal
CN109993532B (en) * 2019-04-03 2022-12-09 安庆师范大学 Intelligent service information pushing method and device and terminal
CN110544087A (en) * 2019-07-22 2019-12-06 深圳壹账通智能科技有限公司 Mobile payment method, device, equipment and computer readable storage medium
CN110930147A (en) * 2019-11-01 2020-03-27 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN110930147B (en) * 2019-11-01 2021-12-03 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN110942301B (en) * 2019-11-22 2022-07-12 腾讯科技(深圳)有限公司 Data processing method and device based on block chain, computer and storage medium
CN110942301A (en) * 2019-11-22 2020-03-31 腾讯科技(深圳)有限公司 Data processing method and device based on block chain, computer and storage medium
CN111523869B (en) * 2020-04-09 2024-05-24 天地融科技股份有限公司 Off-line transaction method and system for digital currency
CN111523869A (en) * 2020-04-09 2020-08-11 天地融科技股份有限公司 Off-line transaction method and system for digital currency
CN112070493B (en) * 2020-08-20 2022-04-08 郑州信大捷安信息技术股份有限公司 Off-line POS machine transaction method and system based on two-dimensional code
CN112070493A (en) * 2020-08-20 2020-12-11 郑州信大捷安信息技术股份有限公司 Off-line POS machine transaction method and system based on two-dimensional code
CN112861109A (en) * 2021-02-07 2021-05-28 新大陆(福建)公共服务有限公司 Digital identity code generated based on CTID platform and front-end system and interaction method
CN113191759A (en) * 2021-04-16 2021-07-30 西安艾润物联网技术服务有限责任公司 Parking fee payment method of digital currency, terminal device and readable storage medium
CN113129005A (en) * 2021-05-18 2021-07-16 中国银行股份有限公司 Offline payment method and system, payment terminal and collection terminal
CN113222600A (en) * 2021-05-18 2021-08-06 中国银行股份有限公司 Offline payment method and system, payment terminal and collection terminal
CN115484224B (en) * 2022-09-16 2023-09-29 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium
CN115484224A (en) * 2022-09-16 2022-12-16 北京奇艺世纪科技有限公司 Information association method, two-dimensional code generation method, device, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN105407079A (en) Novel terminal safety soft secret key management method
CN102202300B (en) A kind of based on twin-channel dynamic cipher authentication system and method
CN109447647A (en) A kind of safety payment system based on block chain
CA2491049C (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
CN103020825B (en) A kind of secure payment authentication method based on software client
US20190005470A1 (en) Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same
CN111179067A (en) Block chain-based customer information exchange system between banks
US20120101951A1 (en) Method and System for Secure Financial Transactions Using Mobile Communications Devices
CN1697379B (en) Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification
CN106027501B (en) A kind of system and method for being traded safety certification in a mobile device
Nambiar et al. Analysis of payment transaction security in mobile commerce
CN109039652B (en) Digital certificate generation and application method
CN101216923A (en) A system and method to enhance the data security of e-bank dealings
KR100926153B1 (en) System For Wireless Public Certification Service Using Electronic Signature With Mobile Terminal and Method For Providing said Service
Rattan et al. E-Commerce Security using PKI approach
Kisore et al. A secure SMS protocol for implementing digital cash system
KR100349888B1 (en) PKI system for and method of using micro explorer on mobile terminals
CN101867894A (en) Short message consumption method and server thereof
CN111914308B (en) Method for signing mobile data by using CA certificate in smart card
KR20140125299A (en) Method for providing direct debit service through electronic signature authentication based by mobile messaging
Li et al. Secure remote mobile payment architecture and application
CN104318432A (en) Trade information transmission method and system and mobile terminal
Dai et al. Notice of Retraction: Research on Security Payment Technology Based on Mobile E-Commerce
KR20020020135A (en) End-to-end security system and method for wireless internet
Hu The study of E-commerce security protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160316