CN108564367B - Payment encryption algorithm - Google Patents

Payment encryption algorithm Download PDF

Info

Publication number
CN108564367B
CN108564367B CN201810320616.5A CN201810320616A CN108564367B CN 108564367 B CN108564367 B CN 108564367B CN 201810320616 A CN201810320616 A CN 201810320616A CN 108564367 B CN108564367 B CN 108564367B
Authority
CN
China
Prior art keywords
payment
verification
key
terminal
key carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810320616.5A
Other languages
Chinese (zh)
Other versions
CN108564367A (en
Inventor
郑鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feihu Infinite Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810320616.5A priority Critical patent/CN108564367B/en
Publication of CN108564367A publication Critical patent/CN108564367A/en
Application granted granted Critical
Publication of CN108564367B publication Critical patent/CN108564367B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

一种支付加密的算法,包括支付端、验证端及验证服务端,用户向支付端及验证服务端上传图像文件做为密钥载体;取图像文件的哈希值插入加密程序,做为加密程序一段代码,根据时间种子通过代码随机生成动态数字,再经转换程序转成平面二维像素点,在密钥载体文件像素范围内生成密钥像素点并叠加于密钥载体上;用户支付时,验证服务端通过验证端读取支付端显示内容,得出是否放行支付结果。本发明所述密钥载体可自定义,具有较强的灵活性;支付端在验证时无须联网或上传及下传任何信息,验证服务端经验证端从支付端获得的内容中获取密钥像素点,经验证后实现支付放行,具有极强的安全性;支付端体积可做得很小,待机时间长,具有极佳的便捷性。

Figure 201810320616

A payment encryption algorithm, including a payment terminal, a verification terminal and a verification server, the user uploads an image file to the payment terminal and the verification server as a key carrier; takes the hash value of the image file and inserts it into an encryption program as an encryption program A piece of code, according to the time seed, the dynamic number is randomly generated through the code, and then converted into a plane two-dimensional pixel point by the conversion program, and the key pixel point is generated within the pixel range of the key carrier file and superimposed on the key carrier; when the user pays, The verification server reads the content displayed on the payment terminal through the verification terminal, and obtains the result of whether to release the payment. The key carrier of the present invention can be customized and has strong flexibility; the payment terminal does not need to connect to the Internet or upload and download any information during verification, and the verification server obtains the key pixel from the content obtained by the payment terminal through the verification terminal. Point, after verification, the payment is released, which has strong security; the size of the payment terminal can be made small, the standby time is long, and it has excellent convenience.

Figure 201810320616

Description

Payment encryption algorithm
Technical Field
The invention relates to an algorithm, in particular to an algorithm for payment encryption, and belongs to the technical field of IPC classification G06 and G09.
Background
The payment system is composed of an intermediary institution providing payment clearing service and professional technical means for realizing payment instruction transmission and fund clearing, and is a financial arrangement for realizing debt and debt payment and fund transfer, which is sometimes called as clearing system.
At present, when payment is carried out, a payment carrier of a payment system comprises a magnetic stripe card and a mobile device (including bar code scanning, two-dimensional code scanning and NFC near field payment). Magnetic stripe cards have the potential to be copied and are therefore now upgraded to chip cards. When the code is scanned, the two-dimensional code is possibly stolen, so that the code scanning tends to provide a dynamically-changed bar code by a mobile device or the two-dimensional code is scanned safely. And the near-field payment is more troublesome to use than code scanning, and the popularization range is limited.
In addition, the bank card needs to be carried by swiping the card, the code scanning and near-field payment all need to provide and carry mobile equipment, and the mobile equipment is more convenient to carry for the young people who advocate light travel at present, but the mobile equipment is limited by a battery and a network, so that at present, no more convenient payment carrier exists, the system or the method can be operated independently by separating from the network, and the system or the method has safety to achieve real convenience.
Disclosure of Invention
The present invention is directed to solving the above-mentioned problems, and provides an algorithm for payment encryption, which can be operated independently from the network, and also has security and convenience in selection of attached carriers.
The technical scheme for solving the problems of the invention is as follows:
an algorithm for payment encryption, comprising:
the system comprises a payment end, a verification end and a verification server end, wherein a user uploads image files with the same attribute to the payment end and the verification server end regularly or irregularly as a key carrier;
inserting the hash value of the image file into an encryption program of a payment terminal and a verification server terminal, taking the hash value as a section of code when the encryption program runs, randomly generating a dynamic number through the whole section of code according to a time seed, converting the dynamic number into a planar two-dimensional pixel point through a conversion program, generating a key pixel point within a range based on the range of the pixel size of a key carrier file, and overlapping the key pixel point on a key carrier;
when the user pays, the verification server reads the key carrier displaying the superposed key pixel points through the verification end, and obtains the result of whether to pass the payment or not by comparing the pixel positions of the key pixel points.
When the dynamic number is converted into the planar two-dimensional pixel point through the conversion program, the conversion program reads partial numerical value of the hash value of the image file according to the time seed to be used as a section of code of the conversion program.
When the conversion program converts the dynamic digit into a planar two-dimensional pixel point, the range of the pixel size of the key carrier file is a partial area with light color or blank pixel points of the image file.
When the conversion program converts the dynamic number into the planar two-dimensional pixel point, the generated planar two-dimensional pixel point is different from the region color of the pixel point of the key carrier in designation.
The invention has the following beneficial effects:
the key carrier can be self-defined, and has stronger flexibility; the payment end does not need to be networked or upload and download any information during verification, the verification server obtains key pixel points from the content obtained by the payment end through the verification end, and payment release is realized after verification, so that the payment system has extremely high safety; the payment terminal can be made very small in size, long in standby time and excellent in convenience.
Description of the drawings:
FIG. 1 is a schematic diagram of the frame construction of the present invention;
FIG. 2 is a schematic diagram of a process from an image file to a key pixel according to the present invention.
The specific implementation mode is as follows:
the invention is explained in further detail below with reference to the drawings.
Referring to fig. 1 and 2, a payment encryption algorithm includes a payment terminal 1, a verification terminal 2 and a verification server terminal 3, wherein a user 4 uploads an image file 5 with the same attribute to the payment terminal and the verification server terminal regularly or irregularly as a key carrier 6;
the hash value of the image file 5 is inserted into the encryption programs of the payment terminal 1 and the verification server terminal 3 and is used as a section of code when the encryption program runs, a dynamic number 8 is randomly generated through the whole section of code according to a time seed, the dynamic number 8 is converted into a plane two-dimensional pixel point through a conversion program, and a key pixel point 7 is generated in a range and is superposed on a key carrier based on the range of the pixel size of the key carrier file;
when the user 4 pays, the verification server 3 reads the key carrier of the payment terminal 1 displaying the superposed key pixel point 7 through the verification terminal 2, and obtains the result of whether to pass the payment or not by comparing the pixel positions of the key pixel points.
When the invention is used, the time seed is in the unit of the day, so that the dynamic number 8 generated by the payment terminal 1 and the verification service terminal 3 can keep consistency. That is, the period of the dynamic change of the key pixel point is 1 day. For security reasons, there may be limits for each payment and a limit for the total amount paid per day, which minimizes losses even if the payment terminal 1 is lost or stolen.
When the hash value is inserted into the encryption programs of the payment terminal 1 and the verification server terminal 3 again, a part of digital strings of the hash value can be selected and extracted, and the selection of the part of digital strings can select the digit of the hash value according to the time unit uploaded by the image file 5 and the time seed. Therefore, the time of uploading the image file 5 to the payment terminal 1 and the authentication server 3 needs to be kept in the same time unit.
Based on the improvement of the implementation mode, when the dynamic number 8 is converted into the planar two-dimensional pixel point through the conversion program, the conversion program reads a part of numerical values of the hash value of the image file according to the time seed to be used as a section of codes of the conversion program.
Further, based on the improvement of the embodiment, when the conversion program converts the dynamic number 8 into the planar two-dimensional pixel point, the range of the pixel size of the key carrier file is a partial area where the pixel point of the image file is lighter in color or blank.
Therefore, the situation that one or more points of the converted planar two-dimensional pixel points are superposed on the pixel points with darker colors of the image file 5 can be eliminated, and the problem of identification can be caused.
In addition, based on the improvement of the embodiment, when the conversion program converts the dynamic number into the planar two-dimensional pixel point, the generated planar two-dimensional pixel point is specified to be different from the area color of the pixel point of the key carrier.

Claims (4)

1.一种支付加密的算法,其特征在于:1. an algorithm for payment encryption, characterized in that: 包括支付端、验证端及验证服务端,用户定期或不定期向支付端及验证服务端上传相同属性的图像文件做为密钥载体;Including the payment terminal, the verification terminal and the verification server, the user regularly or irregularly uploads image files with the same attributes to the payment terminal and the verification server as the key carrier; 取图像文件的哈希值插入支付端及验证服务端的加密程序,做为加密程序运行时的一段代码,并根据时间种子通过整段代码随机生成动态数字,由动态数字经转换程序转成平面二维像素点,基于密钥载体文件像素大小的范围,在范围内生成密钥像素点并叠加于密钥载体上;Take the hash value of the image file and insert it into the encryption program of the payment terminal and the verification server as a piece of code when the encryption program is running, and generate a dynamic number randomly through the entire code according to the time seed, and the dynamic number is converted into a plane 2 by the conversion program. Dimensional pixel points, based on the range of the pixel size of the key carrier file, generate key pixel points within the range and superimpose it on the key carrier; 用户支付时,验证服务端通过验证端读取支付端显示叠加密钥像素点的密钥载体,通过对比密钥像素点的像素位置得出是否放行支付的结果。When the user pays, the verification server reads the key carrier on which the payment terminal displays the superimposed key pixels through the verification terminal, and obtains the result of whether to release the payment by comparing the pixel positions of the key pixels. 2.根据权利要求1所述的一种支付加密的算法,其特征在于:动态数字经转换程序转成平面二维像素点时,转换程序根据时间种子读取图像文件的哈希值的部分数值做为转换程序的一段代码。2. the algorithm of a kind of payment encryption according to claim 1, is characterized in that: when dynamic number is converted into plane two-dimensional pixel point through conversion program, conversion program reads the partial numerical value of the hash value of image file according to time seed A piece of code as a conversion program. 3.根据权利要求1所述的一种支付加密的算法,其特征在于:转换程序在将动态数字转成平面二维像素点时,所基于的密钥载体文件像素大小的范围为图像文件相素点颜色较淡或空白的部分区域。3. the algorithm of a kind of payment encryption according to claim 1, is characterized in that: conversion program is when dynamic digital is converted into plane two-dimensional pixel point, the scope of the key carrier file pixel size based on is the image file phase. Part of the area where the pixel color is lighter or blank. 4.根据权利要求1所述的一种支付加密的算法,其特征在于:转换程序在将动态数字转成平面二维像素点时,所生成的平面二维像素点为指定与密钥载体的像素点的区域颜色不同。4. the algorithm of a kind of payment encryption according to claim 1, is characterized in that: conversion program is when dynamic number is converted into plane two-dimensional pixel point, and the plane two-dimensional pixel point that is generated is designated and key carrier Regions of pixels have different colors.
CN201810320616.5A 2018-04-11 2018-04-11 Payment encryption algorithm Expired - Fee Related CN108564367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810320616.5A CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810320616.5A CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Publications (2)

Publication Number Publication Date
CN108564367A CN108564367A (en) 2018-09-21
CN108564367B true CN108564367B (en) 2022-08-16

Family

ID=63534482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810320616.5A Expired - Fee Related CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Country Status (1)

Country Link
CN (1) CN108564367B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742611B (en) * 2021-01-06 2025-03-18 北京沃东天骏信息技术有限公司 A method and device for processing data request

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657855A (en) * 2015-03-10 2015-05-27 王清斌 Mobile payment identity verification device with NFC interface
CN106960344A (en) * 2017-03-27 2017-07-18 上海与德科技有限公司 A kind of method of payment and system based on mobile terminal
CN107835332A (en) * 2017-11-15 2018-03-23 深圳大学 It is superimposed the two-dimensional code generation method and device of man made noise's information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7089213B2 (en) * 2002-06-04 2006-08-08 Bottomline Technologies System and method for producing and verifying secure negotiable instruments
CN101729256B (en) * 2008-10-24 2012-08-08 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
TW201032160A (en) * 2009-02-19 2010-09-01 Simpleact Inc System and method for mobile trade
KR101831404B1 (en) * 2011-08-11 2018-02-22 엘지전자 주식회사 Mobile terminal and payment method for mobile terminal
CN107798531B (en) * 2017-08-14 2022-07-15 中国银联股份有限公司 Electronic payment method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657855A (en) * 2015-03-10 2015-05-27 王清斌 Mobile payment identity verification device with NFC interface
CN106960344A (en) * 2017-03-27 2017-07-18 上海与德科技有限公司 A kind of method of payment and system based on mobile terminal
CN107835332A (en) * 2017-11-15 2018-03-23 深圳大学 It is superimposed the two-dimensional code generation method and device of man made noise's information

Also Published As

Publication number Publication date
CN108564367A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
CN109741056B (en) Method and device for uploading electronic certificate
US9406063B2 (en) Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token
KR102423989B1 (en) System and method for recombining digital clothes based on blockchain
DE69629134T2 (en) Counterfeit-proof documents with images that transmit secret data, as well as procedures therefor
US10102385B2 (en) Steganographic image on portable device
EP3413506B1 (en) Secure paper-free bills in workflow applications
AU2012345478B2 (en) A method of generation and transmission of secure tokens based on tokens generated by TRNG and split into shares and the system thereof
US10453105B2 (en) Encrypted payment image
KR20200106510A (en) Complex code pattern, generating device, reading device, method and program
US20110231270A1 (en) Payment systems and methodologies
US20210374734A1 (en) Artwork transaction method and artwork transaction apparatus and computer program therefor
AU2015267335A1 (en) Encrypted electronic gaming ticket
CN107230072B (en) Method and system for online payment using digital currency chip card
CN105827612B (en) Salary payment system based on mobile internet service application
US20230334827A1 (en) Methods and systems for providing images for facilitating communication
SE1551523A1 (en) Method and scanner for verifying an authenticity of an identity document and extracting textual information there from
EP2216742A1 (en) Mobile payment method and devices
CN107995104A (en) A kind of system and method based on instant message push service message
CN108564367B (en) Payment encryption algorithm
JP2004102883A (en) Electronic money settlement system, communication terminal, and server device
EP4583031A1 (en) Money transaction system, information terminal, computer program, and money transaction method
CN208061253U (en) A kind of intelligent terminal, payment mechanism and the cloud payment system of supporting cloud to pay
WO2012168946A1 (en) A system and method for displaying user's signature on pos terminals
CN109426718A (en) For authenticating method, input equipment and the computer-readable medium of user
CN110858360A (en) Scanning payment method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220727

Address after: 317500 No. 97, Muyu Youth Road, Zeguo Town, Wenling City, Taizhou City, Zhejiang Province

Applicant after: Song Weijie

Address before: 317100 Room 308, building 14, No. 2 Qiushui Avenue, Haiyou street, Sanmen County, Taizhou City, Zhejiang Province

Applicant before: Zheng Hong

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230426

Address after: Room 0022, Room 201, 2nd Floor, Building 1, Yard 1, Xinfang Road, Chaoyang District, Beijing, 100000

Patentee after: Beijing Feihu Infinite Technology Co.,Ltd.

Address before: 317500 No. 97, Muyu Youth Road, Zeguo Town, Wenling City, Taizhou City, Zhejiang Province

Patentee before: Song Weijie

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220816