CN105407079A - Novel terminal safety soft secret key management method - Google Patents
Novel terminal safety soft secret key management method Download PDFInfo
- Publication number
- CN105407079A CN105407079A CN201510690811.3A CN201510690811A CN105407079A CN 105407079 A CN105407079 A CN 105407079A CN 201510690811 A CN201510690811 A CN 201510690811A CN 105407079 A CN105407079 A CN 105407079A
- Authority
- CN
- China
- Prior art keywords
- information
- soft
- beneficiary
- payment
- paying party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a novel terminal safety soft secret key management method. According to the method, information of two transaction parties are selected by a soft secret key system as identification ID, public and private key pairs are formed through mapping on the basis of business subdomain identification; for online payment, a two-dimensional code is generated at a receiving party; after the two-dimensional code is scanned by a payment party, signature is carried out by utilizing a private key pair randomized number, and information is sent to a background management system; signature verification is realized by the background management system through utilizing public key pair signature information; if signature verification succeeds, transaction is processed; for offline payment, signature is carried out by the receiving party through utilizing the private key pair randomized number, and a two-dimensional code is generated; the two-dimensional code is scanned by the payment party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is carried out by the payment party according to transaction information; signature is carried out by the payment party through utilizing the private key pair randomized number, a two-dimensional code is generated; the two-dimensional code is scanned by the receiving party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is successfully realized for the receiving party. Through the method, system safety is not only improved, system disposition cost is further reduced, transaction validness is fully guaranteed, and invalid information tampering and information steganography can be avoided.
Description
Technical field
The present invention relates to key management field, particularly the soft key management method of a kind of terminal based on key authentication.
Background technology
Universal along with Internet, people carry out by internet communications and get more and more, and being carried on business by network is accordingly that ecommerce have also been obtained and develops widely.Ecommerce is Chinese Enterprises developing domestic and international market, make good use of domestic and international various resource provides a good opportunity very rare.Ecommerce really embodies fair competition, high efficiency, low cost, high-quality advantage concerning enterprise, and enterprise can be allowed to grasp the commercial chances in the market competition of fierceness, show one's talent.Developed country is using the growth emphasis of ecommerce as 21 century national economy, and the relevant department of China is also carrying forward vigorously Chinese Enterprises develop electronic commerce.But also cause some Internet safety problems accordingly along with the develop rapidly of ecommerce.
Sum up, the safety problem that the Internet user carrying out electronic transaction faces has:
One, confidentiality: how to ensure that a large amount of security informations related in ecommerce are not stolen in the transmitting procedure of open network;
Two, integrality: how to ensure that the Transaction Information transmitted in ecommerce is not distorted and carries out wash sale by repeating transmission halfway;
Three, how authentication and authorization: in the process of exchange of ecommerce, carry out certification to both sides, to ensure the correctness of both parties' identity;
Four, resisting denying: after the transaction of ecommerce completes, how to ensure to conclude the business either party cannot deny the transaction that occurred.These safety problems will limit further developing of ecommerce to a great extent, therefore how to ensure the safety of information transmission in Internet, have become the important step of develop electronic commerce.
PKI (PKIX) technology adopts certificate management PKI, by third-party trusted authorities--authentication center CA (CertificateAuthority), other identification informations (as title, e-mail, identification card number etc.) of the PKI of user and user are bundled, the identity of authentication of users in Internet.
PKI is the Public Key Infrastructure based on Third Party Authentication, CA center can only be relied on to carry out on-line authentication, need the support of online database.Once CA is trustless, so all trusting relationships all lost efficacy; After the stolen hearer of key obtains in PKI authentication system, easily cause information leakage and distort; Moreover, when multiple people communicates simultaneously, every two correspondents share a key, then N number of people communicates between two, need N* (N-1) to key, for KMC, the distribution of key and management become complicated, and user also expends great workload for the management of key.
CPK authentication system---Conbined public or double key technology is with the public affairs of some, based on private key factor, the public affairs that quantity is extremely huge can be produced, private key pair, key management scale and the key i.e. problem of provable mark itself is solved from technical system itself, do not need the proof of trusted third party, there is SYSTEM SUMMARY efficient, the advantage that feasibility is good, can the centralized management problem of extensive key of the multiple Distributed Application of effectively low solution, simple and direct as one, efficiently, economic key managing project, Conbined public or double key technology can comprise e-bank as security infrastructure support, ecommerce, email authentication, mobile phone certification, the transaction security of the large-scale distributed application such as security certification.
In the application of CPK and implementation process, user is needed to dispose CPK key management system, the key management system version of different editions is disposed according to different business demands, key management system is disposed with the form of hardware server, in formal implementation process, leave in U-key after the key download of user, increase hardware cost for user, and in use U-key likely loses, cause the trouble in use to user.
Summary of the invention
In order to solve the problem, the present invention proposes the soft key management method of a kind of novel terminal security, soft key management system is built in executable file, when there is payment transaction, using a certain item or multinomial information as mark ID, both parties by the soft cipher key system of terminal built-in based on mark ID, carry out mutual certification and the encryption and decryption of both parties, realize Secure Transaction.
Technical scheme of the present invention is as follows:
The soft key management method of novel terminal security, comprises the steps:
Step 1, is placed in executable file by soft cipher key system, encrypting storing, is integrated in terminal and background management system, and management and the generation of key are all carried out in soft cipher key system; Soft cipher key system chooses one of both parties or multinomial information as mark ID, goes out public affairs, private key pair based on business subdomain identity map;
Step 2, during online consumption payment, is comprised the payment information of the amount of money by beneficiary input, beneficiary terminal generates the first gathering Quick Response Code according to beneficiary information and payment information; After paying party scanning first gathering Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key; Beneficiary information, payment information, paying party information, paying party signing messages are mail to background management system together;
After background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages; If sign test failure, then termination of concluding the business; If sign test success, then background management system carries out trading processing, and after process, background management system returns corresponding data to paying party and beneficiary;
Step 3, during offline electronic payment, in beneficiary terminal, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated the second gathering Quick Response Code together;
Paying party scanning second gathering Quick Response Code, the soft cipher key system in payer terminal goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages; If sign test failure, then termination of concluding the business, flow process terminates; If sign test success, paying party is paid the bill according to Transaction Information;
Soft cipher key system private key after payment in payer terminal is signed to this random number, and payment information, paying party information, paying party signing messages are generated successful Quick Response Code of withholing together;
Beneficiary scans successful Quick Response Code of withholing, and mark ID and the business subdomain identity map of the soft cipher key system paying party in beneficiary terminal go out PKI, carry out sign test to paying party signing messages; If sign test failure, then flow process terminates; If sign test success, then beneficiary successfully keeps accounts.
Its further technical scheme is: described soft cipher key system performs in the memory headroom temporarily opened up or safety zone.
Its further technical scheme is: described soft cipher key system is integrated in electronic money cell-phone customer terminal and electronic money background management system.
Its further technical scheme is: using the account of paying party and beneficiary as mark ID.
Advantageous Effects of the present invention is:
1, soft cipher key system is no longer dependent on the deployment of hardware service system, mobile device executable file can be implanted, this soft cipher key system can only be performed in specific region, not only increase system safety, reduce system lower deployment cost, for keeper simultaneously, the management of key and distribution become and are simple and easy to management, for user, the private key link of payment process need not adopt the mode of hardware, the delivery operation had great convenience for the user.
Soft key leaves in software security container, cannot obtain easily, and software security container, have the file of certain implication to be kept in internal memory normally with certain, its content represented is one section of common information having other implications, cannot tracked or crack general information cover up under other information.
2, the both sides communicated in payment process have employed the mutual authentication process based on mark, fully ensure that the legitimacy of transaction, prevent illegally distorting and information disguising of information.
3, soft cipher key system is at terminal special area, therefore can realize concluding the business without network payment.
4, the difference of the present invention and other means of payment is: during transaction, without the need to secondary handshake procedure, only needs once signed, sign test process can realize payment function; Meanwhile, in offline electronic payment link, compared with existing offline electronic payment scheme, the payment that the present invention more focuses on both parties is experienced, and can cancel payment in payment link, stop transaction, this does not have in other offline electronic payment scheme.
Accompanying drawing explanation
Fig. 1 is the flow chart of the online course of payment of the present invention.
Fig. 2 is the flow chart of offline electronic payment process of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described further.
Soft cipher key system is placed in executable file by the present invention, encrypting storing, this soft cipher key system can only be performed at specific region (memory headroom such as opened up or safety zone in) temporarily, can be integrated in terminal (such as mobile phone or POS) and background management system, be be integrated in electronic money cell-phone customer terminal and electronic money background management system in following examples, management and the generation of key are all carried out in soft cipher key system.Soft cipher key system chooses a certain item of both parties or multinomial information as mark ID, and going out public affairs, private key pair based on business subdomain identity map, is using the account of both parties as mark ID in following examples.
Fig. 1 is the flow chart of online course of payment.As shown in Figure 1, during online consumption payment, input the amount of money by beneficiary, electronic money cell-phone customer terminal generates Quick Response Code according to beneficiary information and payment information (amount of money).After paying party scans this Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key.Beneficiary information, payment information, paying party information, paying party signing messages are mail to electronic money background management system together.
After electronic money background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages.If sign test failure, then termination of concluding the business.If sign test success, then trading processing is carried out on electronic money backstage, and after process, electronic money backstage returns corresponding data to paying party and beneficiary.
Fig. 2 is the flow chart of offline electronic payment process.As shown in Figure 2, during offline electronic payment, at the electronic money cell-phone customer terminal of beneficiary, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated Quick Response Code together.
Paying party scanning Quick Response Code, the soft cipher key system in paying party mobile phone goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages.If sign test failure, then termination of concluding the business, flow process terminates.If sign test success, paying party is paid the bill according to payment information.
Soft cipher key system private key after payment on paying party mobile phone is signed to this random number, and payment information, paying party information, paying party signing messages are generated Quick Response Code together.
Beneficiary scans this Quick Response Code, and the soft cipher key system in beneficiary mobile phone utilizes the mark ID of paying party and business subdomain identity map to go out PKI, carries out sign test to paying party signing messages.If sign test failure, then flow process terminates.If sign test success, then beneficiary successfully keeps accounts.
Below by way of two embodiments, flow process of the present invention is described in detail.
[embodiment one] client Zhang San pay the bill online to client Li Si.
As shown in Figure 1, paying party Zhang San wants to pay the bill online to beneficiary Li Si, and the two all uses mobile phone electronic wallet client end to operate, and soft cipher key system all has installation and operation at Zhang San's mobile phone, Li Si's mobile phone, background management system.Li Si inputs the amount of money at mobile phone terminal, and beneficiary information, payment information are generated Quick Response Code by electronic wallet client end.
Zhang San is scanned Quick Response Code, and the soft cipher key system in Zhang San's mobile phone chooses random number R, signs to this random number R with Zhang San's private key, and beneficiary information, payment information, paying party information, signing messages are mail to background management system together.
After background management system receives above-mentioned information, soft cipher key system carries out sign test to signing messages: namely go out PKI with the Zhang San ID in paying party information and corresponding business subdomain identity map, carry out sign test with PKI to signing messages, if sign test failure, then flow process terminates.If sign test success, then background management system carries out trading processing according to beneficiary information, payment information, paying party information.Information feed back after process is to paying party Zhang San and beneficiary Li Si.
[embodiment two] client Zhang San is to client Li Si offline electronic payment.
As shown in Figure 2, paying party Zhang San wants to beneficiary Li Si offline electronic payment, and the two all uses mobile phone electronic wallet client end to operate, and soft cipher key system all has installation and operation at Zhang San's mobile phone, Li Si's mobile phone.Li Si inputs the amount of money at mobile phone terminal, and soft cipher key system chooses random number R, signs to random number R with private key, and Transaction Information, Li Si's id information, signing messages are generated Quick Response Code together.
Zhang San is scanned Quick Response Code, and soft cipher key system Li Si ID and business subdomain identity map go out PKI, if carry out the failure of sign test sign test with PKI to the signing messages of Li Si, then flow process terminates.
If sign test success, whether the cell-phone customer terminal inquiry of Zhang San agrees to this payment operation, if Zhang San's refusal, then flow process terminates.If Zhang San agrees to, then successfully withhold in the account of Zhang San, successfully pay to Li Si.
Zhang San signs to this random number R with private key, and payment information, Zhang San's id information, signing messages are generated Quick Response Code together.
Li Si scans this Quick Response Code, and soft cipher key system Zhang San ID and business subdomain identity map go out PKI, carry out sign test with PKI to the signing messages of Zhang San.If sign test failure, then flow process terminates.
If sign test success, Payment Amount successfully keeps accounts by Li Si.
Said process is not limited to the two-way sign test and the encryption and decryption that pay link, adopts the mode of soft key to carry out the scene of signature sign test, be suitable for too at other.Comprise the encryption and decryption of the sensitive information in such as parking lot APP, signature sign test, the contents such as transmission, be imbedded in by safe control and can not take out, executable safety zone, carry out encryption and decryption to sensitive information, sign test of signing.
Note: above embodiment is all described using mobile phone as terminal, the present invention also can be applicable to other mobile terminals.
Above-described is only the preferred embodiment of the present invention, the invention is not restricted to above embodiment.Be appreciated that the oher improvements and changes that those skilled in the art directly derive without departing from the spirit and concept in the present invention or associate, all should think and be included within protection scope of the present invention.
Claims (4)
1. the soft key management method of novel terminal security, is characterized in that, comprise the steps:
Step 1, is placed in executable file by soft cipher key system, encrypting storing, is integrated in terminal and background management system, and management and the generation of key are all carried out in soft cipher key system; Soft cipher key system chooses one of both parties or multinomial information as mark ID, goes out public affairs, private key pair based on business subdomain identity map;
Step 2, during online consumption payment, is comprised the payment information of the amount of money by beneficiary input, beneficiary terminal generates the first gathering Quick Response Code according to beneficiary information and payment information; After paying party scanning first gathering Quick Response Code, soft cipher key system chooses random number, and the mark ID according to paying party maps out private key, signs to this random number with private key; Beneficiary information, payment information, paying party information, paying party signing messages are mail to background management system together;
After background management system receives the information that paying party sends, soft cipher key system, according to the mark ID of paying party and corresponding business subdomain mark, maps out PKI, carries out sign test with PKI to paying party signing messages; If sign test failure, then termination of concluding the business; If sign test success, then background management system carries out trading processing, and after process, background management system returns corresponding data to paying party and beneficiary;
Step 3, during offline electronic payment, in beneficiary terminal, input collection amount, soft cipher key system chooses random number, signs to this random number with private key, and Transaction Information, beneficiary information, beneficiary signing messages are generated the second gathering Quick Response Code together;
Paying party scanning second gathering Quick Response Code, the soft cipher key system in payer terminal goes out PKI according to the mark ID of beneficiary and business subdomain identity map, carries out sign test with PKI to beneficiary signing messages; If sign test failure, then termination of concluding the business, flow process terminates; If sign test success, paying party is paid the bill according to Transaction Information;
Soft cipher key system private key after payment in payer terminal is signed to this random number, and payment information, paying party information, paying party signing messages are generated successful Quick Response Code of withholing together;
Beneficiary scans successful Quick Response Code of withholing, and mark ID and the business subdomain identity map of the soft cipher key system paying party in beneficiary terminal go out PKI, carry out sign test to paying party signing messages; If sign test failure, then flow process terminates; If sign test success, then beneficiary successfully keeps accounts.
2. the soft key management method of novel terminal security according to claim 1, is characterized in that: described soft cipher key system performs in the memory headroom temporarily opened up or safety zone.
3. the soft key management method of novel terminal security according to claim 1, is characterized in that: described soft cipher key system is integrated in electronic money cell-phone customer terminal and electronic money background management system.
4. the soft key management method of novel terminal security according to claim 1, is characterized in that: using the account of paying party and beneficiary as mark ID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510690811.3A CN105407079A (en) | 2015-09-25 | 2015-10-22 | Novel terminal safety soft secret key management method |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2015106249402 | 2015-09-25 | ||
CN201510624940 | 2015-09-25 | ||
CN201510690811.3A CN105407079A (en) | 2015-09-25 | 2015-10-22 | Novel terminal safety soft secret key management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105407079A true CN105407079A (en) | 2016-03-16 |
Family
ID=55472334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510690811.3A Pending CN105407079A (en) | 2015-09-25 | 2015-10-22 | Novel terminal safety soft secret key management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105407079A (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600274A (en) * | 2017-02-07 | 2017-04-26 | 桂林理工大学 | Multi-algorithm multi-key optical authentication offline payment apparatus |
CN106651364A (en) * | 2017-02-07 | 2017-05-10 | 桂林理工大学 | Online payment device for authentication through visible light and barcode two-way public-key system |
CN106682904A (en) * | 2017-02-07 | 2017-05-17 | 桂林理工大学 | Offline payment apparatus with visible light and bar code bidirectional authentication |
CN106779696A (en) * | 2016-11-29 | 2017-05-31 | 南相浩 | A kind of digital bank and digital cash and method of payment based on CPK |
CN106779684A (en) * | 2016-12-02 | 2017-05-31 | 北京博文广成信息安全技术有限公司 | The soft black box safe electronic method of mobile payment of CFL based on Quick Response Code |
CN106875179A (en) * | 2017-02-03 | 2017-06-20 | 杭州小步科技有限公司 | A kind of offline Quick Response Code method of payment and its system |
CN107454038A (en) * | 2016-05-30 | 2017-12-08 | 北京军源合众科技发展有限责任公司 | A kind of method that Data Encryption Transmission is carried out by Quick Response Code |
CN107491955A (en) * | 2016-06-13 | 2017-12-19 | 邓斌涛 | Encryption method, authentication and the electronic fare payment system and method for mobile terminal |
CN108564370A (en) * | 2018-04-20 | 2018-09-21 | 九江学院 | A kind of electronic account payment protection method of multi-key cipher |
CN108712383A (en) * | 2018-04-17 | 2018-10-26 | 新大陆(福建)公共服务有限公司 | A kind of generation method and computer readable storage medium of offline secure Quick Response Code |
CN109766973A (en) * | 2018-12-17 | 2019-05-17 | 南京熊猫电子股份有限公司 | The two dimensional code of public transport AFC system mobile payment |
CN109993532A (en) * | 2019-04-03 | 2019-07-09 | 安庆师范大学 | A kind of intelligent Service information-pushing method, device and terminal |
CN110544087A (en) * | 2019-07-22 | 2019-12-06 | 深圳壹账通智能科技有限公司 | Mobile payment method, device, equipment and computer readable storage medium |
CN110659987A (en) * | 2018-06-28 | 2020-01-07 | 厦门本能管家科技有限公司 | Offline transaction method and system based on block chain |
WO2020024710A1 (en) * | 2018-08-02 | 2020-02-06 | 阿里巴巴集团控股有限公司 | Method and apparatus for generating payment two-dimensional code |
CN110766383A (en) * | 2018-07-27 | 2020-02-07 | 中城智慧科技有限公司 | Digital wallet supporting anonymous or real-name offline transaction and use method |
CN110930147A (en) * | 2019-11-01 | 2020-03-27 | 北京三快在线科技有限公司 | Offline payment method and device, electronic equipment and computer-readable storage medium |
CN110942301A (en) * | 2019-11-22 | 2020-03-31 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain, computer and storage medium |
CN111523869A (en) * | 2020-04-09 | 2020-08-11 | 天地融科技股份有限公司 | Off-line transaction method and system for digital currency |
CN111612459A (en) * | 2018-08-15 | 2020-09-01 | 阿里巴巴集团控股有限公司 | Security control method and device for two-dimensional code payment |
CN112070493A (en) * | 2020-08-20 | 2020-12-11 | 郑州信大捷安信息技术股份有限公司 | Off-line POS machine transaction method and system based on two-dimensional code |
CN112861109A (en) * | 2021-02-07 | 2021-05-28 | 新大陆(福建)公共服务有限公司 | Digital identity code generated based on CTID platform and front-end system and interaction method |
CN113129005A (en) * | 2021-05-18 | 2021-07-16 | 中国银行股份有限公司 | Offline payment method and system, payment terminal and collection terminal |
CN113191759A (en) * | 2021-04-16 | 2021-07-30 | 西安艾润物联网技术服务有限责任公司 | Parking fee payment method of digital currency, terminal device and readable storage medium |
CN113222600A (en) * | 2021-05-18 | 2021-08-06 | 中国银行股份有限公司 | Offline payment method and system, payment terminal and collection terminal |
CN115484224A (en) * | 2022-09-16 | 2022-12-16 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012151163A1 (en) * | 2011-05-05 | 2012-11-08 | Ebay Inc. | Barcode checkout at point of sale |
CN103198403A (en) * | 2013-03-12 | 2013-07-10 | 中国地质大学(武汉) | Safe mobile payment method based on two-dimension code |
CN104579689A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Soft secret key system and implementation method |
CN104836776A (en) * | 2014-02-10 | 2015-08-12 | 阿里巴巴集团控股有限公司 | Data interaction method and device |
-
2015
- 2015-10-22 CN CN201510690811.3A patent/CN105407079A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012151163A1 (en) * | 2011-05-05 | 2012-11-08 | Ebay Inc. | Barcode checkout at point of sale |
CN103198403A (en) * | 2013-03-12 | 2013-07-10 | 中国地质大学(武汉) | Safe mobile payment method based on two-dimension code |
CN104836776A (en) * | 2014-02-10 | 2015-08-12 | 阿里巴巴集团控股有限公司 | Data interaction method and device |
CN104579689A (en) * | 2015-01-20 | 2015-04-29 | 中城智慧科技有限公司 | Soft secret key system and implementation method |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107454038B (en) * | 2016-05-30 | 2021-06-29 | 北京军源合众科技发展有限责任公司 | Method for encrypting and transmitting data through two-dimensional code |
CN107454038A (en) * | 2016-05-30 | 2017-12-08 | 北京军源合众科技发展有限责任公司 | A kind of method that Data Encryption Transmission is carried out by Quick Response Code |
CN107491955B (en) * | 2016-06-13 | 2022-01-11 | 邓斌涛 | Encryption method of mobile terminal, identity authentication and electronic payment system and method |
CN107491955A (en) * | 2016-06-13 | 2017-12-19 | 邓斌涛 | Encryption method, authentication and the electronic fare payment system and method for mobile terminal |
CN106779696B (en) * | 2016-11-29 | 2020-09-29 | 晋商博创(北京)科技有限公司 | CPK-based digital bank and digital currency and payment method |
US11301842B2 (en) | 2016-11-29 | 2022-04-12 | Js Bochtec Co., Ltd. | CPK-based digital bank, digital currency, and payment method |
CN106779696A (en) * | 2016-11-29 | 2017-05-31 | 南相浩 | A kind of digital bank and digital cash and method of payment based on CPK |
CN106779684A (en) * | 2016-12-02 | 2017-05-31 | 北京博文广成信息安全技术有限公司 | The soft black box safe electronic method of mobile payment of CFL based on Quick Response Code |
CN106875179B (en) * | 2017-02-03 | 2020-12-08 | 杭州小步科技有限公司 | Offline two-dimensional code payment method and system thereof |
CN106875179A (en) * | 2017-02-03 | 2017-06-20 | 杭州小步科技有限公司 | A kind of offline Quick Response Code method of payment and its system |
CN106600274A (en) * | 2017-02-07 | 2017-04-26 | 桂林理工大学 | Multi-algorithm multi-key optical authentication offline payment apparatus |
CN106651364A (en) * | 2017-02-07 | 2017-05-10 | 桂林理工大学 | Online payment device for authentication through visible light and barcode two-way public-key system |
CN106682904A (en) * | 2017-02-07 | 2017-05-17 | 桂林理工大学 | Offline payment apparatus with visible light and bar code bidirectional authentication |
CN106600274B (en) * | 2017-02-07 | 2023-08-11 | 桂林理工大学 | Multi-algorithm multi-key optical authentication offline payment device |
CN106651364B (en) * | 2017-02-07 | 2023-09-01 | 桂林理工大学 | Online payment device with visible light and bar code bidirectional public key system authentication |
CN106682904B (en) * | 2017-02-07 | 2023-08-15 | 桂林理工大学 | Off-line payment device with visible light and bar code bidirectional authentication |
CN108712383A (en) * | 2018-04-17 | 2018-10-26 | 新大陆(福建)公共服务有限公司 | A kind of generation method and computer readable storage medium of offline secure Quick Response Code |
CN108564370A (en) * | 2018-04-20 | 2018-09-21 | 九江学院 | A kind of electronic account payment protection method of multi-key cipher |
CN108564370B (en) * | 2018-04-20 | 2021-10-01 | 九江学院 | Multi-key electronic account payment protection method |
CN110659987A (en) * | 2018-06-28 | 2020-01-07 | 厦门本能管家科技有限公司 | Offline transaction method and system based on block chain |
CN110766383A (en) * | 2018-07-27 | 2020-02-07 | 中城智慧科技有限公司 | Digital wallet supporting anonymous or real-name offline transaction and use method |
CN110766383B (en) * | 2018-07-27 | 2024-04-09 | 中城智慧科技有限公司 | Digital wallet supporting anonymous or real-name offline transaction and use method |
US11107062B2 (en) | 2018-08-02 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Method and apparatus for generating two-dimensional payment code |
US11836703B2 (en) | 2018-08-02 | 2023-12-05 | Advanced New Technologies Co., Ltd. | Method and apparatus for generating two-dimensional payment code |
WO2020024710A1 (en) * | 2018-08-02 | 2020-02-06 | 阿里巴巴集团控股有限公司 | Method and apparatus for generating payment two-dimensional code |
CN111612459A (en) * | 2018-08-15 | 2020-09-01 | 阿里巴巴集团控股有限公司 | Security control method and device for two-dimensional code payment |
CN111612459B (en) * | 2018-08-15 | 2023-06-02 | 创新先进技术有限公司 | Safety control method and device for two-dimension code payment |
CN109766973A (en) * | 2018-12-17 | 2019-05-17 | 南京熊猫电子股份有限公司 | The two dimensional code of public transport AFC system mobile payment |
CN109993532A (en) * | 2019-04-03 | 2019-07-09 | 安庆师范大学 | A kind of intelligent Service information-pushing method, device and terminal |
CN109993532B (en) * | 2019-04-03 | 2022-12-09 | 安庆师范大学 | Intelligent service information pushing method and device and terminal |
CN110544087A (en) * | 2019-07-22 | 2019-12-06 | 深圳壹账通智能科技有限公司 | Mobile payment method, device, equipment and computer readable storage medium |
CN110930147A (en) * | 2019-11-01 | 2020-03-27 | 北京三快在线科技有限公司 | Offline payment method and device, electronic equipment and computer-readable storage medium |
CN110930147B (en) * | 2019-11-01 | 2021-12-03 | 北京三快在线科技有限公司 | Offline payment method and device, electronic equipment and computer-readable storage medium |
CN110942301B (en) * | 2019-11-22 | 2022-07-12 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain, computer and storage medium |
CN110942301A (en) * | 2019-11-22 | 2020-03-31 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain, computer and storage medium |
CN111523869B (en) * | 2020-04-09 | 2024-05-24 | 天地融科技股份有限公司 | Off-line transaction method and system for digital currency |
CN111523869A (en) * | 2020-04-09 | 2020-08-11 | 天地融科技股份有限公司 | Off-line transaction method and system for digital currency |
CN112070493B (en) * | 2020-08-20 | 2022-04-08 | 郑州信大捷安信息技术股份有限公司 | Off-line POS machine transaction method and system based on two-dimensional code |
CN112070493A (en) * | 2020-08-20 | 2020-12-11 | 郑州信大捷安信息技术股份有限公司 | Off-line POS machine transaction method and system based on two-dimensional code |
CN112861109A (en) * | 2021-02-07 | 2021-05-28 | 新大陆(福建)公共服务有限公司 | Digital identity code generated based on CTID platform and front-end system and interaction method |
CN113191759A (en) * | 2021-04-16 | 2021-07-30 | 西安艾润物联网技术服务有限责任公司 | Parking fee payment method of digital currency, terminal device and readable storage medium |
CN113129005A (en) * | 2021-05-18 | 2021-07-16 | 中国银行股份有限公司 | Offline payment method and system, payment terminal and collection terminal |
CN113222600A (en) * | 2021-05-18 | 2021-08-06 | 中国银行股份有限公司 | Offline payment method and system, payment terminal and collection terminal |
CN115484224B (en) * | 2022-09-16 | 2023-09-29 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
CN115484224A (en) * | 2022-09-16 | 2022-12-16 | 北京奇艺世纪科技有限公司 | Information association method, two-dimensional code generation method, device, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105407079A (en) | Novel terminal safety soft secret key management method | |
CN102202300B (en) | A kind of based on twin-channel dynamic cipher authentication system and method | |
CN109447647A (en) | A kind of safety payment system based on block chain | |
CA2491049C (en) | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |
CN103020825B (en) | A kind of secure payment authentication method based on software client | |
US20190005470A1 (en) | Accredited certificate issuance system based on block chain and accredited certificate issuance method based on block chain using same, and accredited certificate authentication system based on block chain and accredited certificate authentication method based on block chain using same | |
CN111179067A (en) | Block chain-based customer information exchange system between banks | |
US20120101951A1 (en) | Method and System for Secure Financial Transactions Using Mobile Communications Devices | |
CN1697379B (en) | Method for authenticating user's ID in safety communication service of public network based on cryptotechnique of identification | |
CN106027501B (en) | A kind of system and method for being traded safety certification in a mobile device | |
Nambiar et al. | Analysis of payment transaction security in mobile commerce | |
CN109039652B (en) | Digital certificate generation and application method | |
CN101216923A (en) | A system and method to enhance the data security of e-bank dealings | |
KR100926153B1 (en) | System For Wireless Public Certification Service Using Electronic Signature With Mobile Terminal and Method For Providing said Service | |
Rattan et al. | E-Commerce Security using PKI approach | |
Kisore et al. | A secure SMS protocol for implementing digital cash system | |
KR100349888B1 (en) | PKI system for and method of using micro explorer on mobile terminals | |
CN101867894A (en) | Short message consumption method and server thereof | |
CN111914308B (en) | Method for signing mobile data by using CA certificate in smart card | |
KR20140125299A (en) | Method for providing direct debit service through electronic signature authentication based by mobile messaging | |
Li et al. | Secure remote mobile payment architecture and application | |
CN104318432A (en) | Trade information transmission method and system and mobile terminal | |
Dai et al. | Notice of Retraction: Research on Security Payment Technology Based on Mobile E-Commerce | |
KR20020020135A (en) | End-to-end security system and method for wireless internet | |
Hu | The study of E-commerce security protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160316 |