CN108564367B - Payment encryption algorithm - Google Patents

Payment encryption algorithm Download PDF

Info

Publication number
CN108564367B
CN108564367B CN201810320616.5A CN201810320616A CN108564367B CN 108564367 B CN108564367 B CN 108564367B CN 201810320616 A CN201810320616 A CN 201810320616A CN 108564367 B CN108564367 B CN 108564367B
Authority
CN
China
Prior art keywords
payment
verification
key
pixel point
planar
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810320616.5A
Other languages
Chinese (zh)
Other versions
CN108564367A (en
Inventor
郑鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feihu Infinite Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810320616.5A priority Critical patent/CN108564367B/en
Publication of CN108564367A publication Critical patent/CN108564367A/en
Application granted granted Critical
Publication of CN108564367B publication Critical patent/CN108564367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A payment encryption algorithm comprises a payment end, a verification end and a verification service end, wherein a user uploads an image file to the payment end and the verification service end to be used as a key carrier; inserting the hash value of the image file into an encryption program as a section of code of the encryption program, randomly generating dynamic numbers through the code according to time seeds, converting the dynamic numbers into planar two-dimensional pixel points through a conversion program, generating key pixel points in the pixel range of the key carrier file and overlapping the key pixel points on a key carrier; when the user pays, the verification server reads the display content of the payment terminal through the verification terminal to obtain whether the payment result is released. The key carrier can be self-defined and has stronger flexibility; the payment end does not need to be networked or upload and download any information during verification, the verification server end obtains key pixel points from the content obtained by the payment end through the verification end, and payment release is realized after verification, so that the payment server has extremely high safety; the payment terminal can be made very small in size, long in standby time and excellent in convenience.

Description

Payment encryption algorithm
Technical Field
The invention relates to an algorithm, in particular to an algorithm for payment encryption, and belongs to the technical field of IPC classification G06 and G09.
Background
The payment system is composed of an intermediary institution providing payment clearing service and professional technical means for realizing payment instruction transmission and fund clearing, and is a financial arrangement for realizing debt and debt payment and fund transfer, which is sometimes called as clearing system.
At present, when payment is carried out, a payment carrier of a payment system comprises a magnetic stripe card and a mobile device (including bar code scanning, two-dimensional code scanning and NFC near field payment). Magnetic stripe cards have the potential to be copied and are therefore now upgraded to chip cards. When the code is scanned, the two-dimensional code is possibly stolen, so that the code scanning tends to provide a dynamically-changed bar code by a mobile device or the two-dimensional code is scanned safely. And the near-field payment is more troublesome to use than code scanning, and the popularization range is limited.
In addition, the bank card needs to be carried by swiping the card, the code scanning and near-field payment all need to provide and carry mobile equipment, and the mobile equipment is more convenient to carry for the young people who advocate light travel at present, but the mobile equipment is limited by a battery and a network, so that at present, no more convenient payment carrier exists, the system or the method can be operated independently by separating from the network, and the system or the method has safety to achieve real convenience.
Disclosure of Invention
The present invention is directed to solving the above-mentioned problems, and provides an algorithm for payment encryption, which can be operated independently from the network, and also has security and convenience in selection of attached carriers.
The technical scheme for solving the problems of the invention is as follows:
an algorithm for payment encryption, comprising:
the system comprises a payment end, a verification end and a verification server end, wherein a user uploads image files with the same attribute to the payment end and the verification server end regularly or irregularly as a key carrier;
inserting the hash value of the image file into an encryption program of a payment terminal and a verification server terminal, taking the hash value as a section of code when the encryption program runs, randomly generating a dynamic number through the whole section of code according to a time seed, converting the dynamic number into a planar two-dimensional pixel point through a conversion program, generating a key pixel point within a range based on the range of the pixel size of a key carrier file, and overlapping the key pixel point on a key carrier;
when the user pays, the verification server reads the key carrier displaying the superposed key pixel points through the verification end, and obtains the result of whether to pass the payment or not by comparing the pixel positions of the key pixel points.
When the dynamic number is converted into the planar two-dimensional pixel point through the conversion program, the conversion program reads partial numerical value of the hash value of the image file according to the time seed to be used as a section of code of the conversion program.
When the conversion program converts the dynamic digit into a planar two-dimensional pixel point, the range of the pixel size of the key carrier file is a partial area with light color or blank pixel points of the image file.
When the conversion program converts the dynamic number into the planar two-dimensional pixel point, the generated planar two-dimensional pixel point is different from the region color of the pixel point of the key carrier in designation.
The invention has the following beneficial effects:
the key carrier can be self-defined, and has stronger flexibility; the payment end does not need to be networked or upload and download any information during verification, the verification server obtains key pixel points from the content obtained by the payment end through the verification end, and payment release is realized after verification, so that the payment system has extremely high safety; the payment terminal can be made very small in size, long in standby time and excellent in convenience.
Description of the drawings:
FIG. 1 is a schematic diagram of the frame construction of the present invention;
FIG. 2 is a schematic diagram of a process from an image file to a key pixel according to the present invention.
The specific implementation mode is as follows:
the invention is explained in further detail below with reference to the drawings.
Referring to fig. 1 and 2, a payment encryption algorithm includes a payment terminal 1, a verification terminal 2 and a verification server terminal 3, wherein a user 4 uploads an image file 5 with the same attribute to the payment terminal and the verification server terminal regularly or irregularly as a key carrier 6;
the hash value of the image file 5 is inserted into the encryption programs of the payment terminal 1 and the verification server terminal 3 and is used as a section of code when the encryption program runs, a dynamic number 8 is randomly generated through the whole section of code according to a time seed, the dynamic number 8 is converted into a plane two-dimensional pixel point through a conversion program, and a key pixel point 7 is generated in a range and is superposed on a key carrier based on the range of the pixel size of the key carrier file;
when the user 4 pays, the verification server 3 reads the key carrier of the payment terminal 1 displaying the superposed key pixel point 7 through the verification terminal 2, and obtains the result of whether to pass the payment or not by comparing the pixel positions of the key pixel points.
When the invention is used, the time seed is in the unit of the day, so that the dynamic number 8 generated by the payment terminal 1 and the verification service terminal 3 can keep consistency. That is, the period of the dynamic change of the key pixel point is 1 day. For security reasons, there may be limits for each payment and a limit for the total amount paid per day, which minimizes losses even if the payment terminal 1 is lost or stolen.
When the hash value is inserted into the encryption programs of the payment terminal 1 and the verification server terminal 3 again, a part of digital strings of the hash value can be selected and extracted, and the selection of the part of digital strings can select the digit of the hash value according to the time unit uploaded by the image file 5 and the time seed. Therefore, the time of uploading the image file 5 to the payment terminal 1 and the authentication server 3 needs to be kept in the same time unit.
Based on the improvement of the implementation mode, when the dynamic number 8 is converted into the planar two-dimensional pixel point through the conversion program, the conversion program reads a part of numerical values of the hash value of the image file according to the time seed to be used as a section of codes of the conversion program.
Further, based on the improvement of the embodiment, when the conversion program converts the dynamic number 8 into the planar two-dimensional pixel point, the range of the pixel size of the key carrier file is a partial area where the pixel point of the image file is lighter in color or blank.
Therefore, the situation that one or more points of the converted planar two-dimensional pixel points are superposed on the pixel points with darker colors of the image file 5 can be eliminated, and the problem of identification can be caused.
In addition, based on the improvement of the embodiment, when the conversion program converts the dynamic number into the planar two-dimensional pixel point, the generated planar two-dimensional pixel point is specified to be different from the area color of the pixel point of the key carrier.

Claims (4)

1. An algorithm for payment encryption, comprising:
the system comprises a payment end, a verification end and a verification server end, wherein a user uploads image files with the same attribute to the payment end and the verification server end regularly or irregularly as a key carrier;
inserting the hash value of the image file into an encryption program of a payment terminal and a verification server terminal, taking the hash value as a section of code when the encryption program runs, randomly generating a dynamic number through the whole section of code according to a time seed, converting the dynamic number into a planar two-dimensional pixel point through a conversion program, generating a key pixel point within a range based on the range of the pixel size of a key carrier file, and overlapping the key pixel point on a key carrier;
when the user pays, the verification server reads the key carrier displaying the superposed key pixel points through the verification end, and obtains the result of whether to pass the payment or not by comparing the pixel positions of the key pixel points.
2. The payment encryption algorithm of claim 1, wherein: when the dynamic number is converted into the planar two-dimensional pixel point through the conversion program, the conversion program reads partial numerical value of the hash value of the image file according to the time seed to be used as a section of code of the conversion program.
3. The payment encryption algorithm of claim 1, wherein: when the conversion program converts the dynamic digit into a planar two-dimensional pixel point, the range of the pixel size of the key carrier file is a partial area with light color or blank pixel points of the image file.
4. The payment encryption algorithm of claim 1, wherein: when the conversion program converts the dynamic number into the planar two-dimensional pixel point, the generated planar two-dimensional pixel point is different from the region color of the pixel point of the key carrier in designation.
CN201810320616.5A 2018-04-11 2018-04-11 Payment encryption algorithm Active CN108564367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810320616.5A CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810320616.5A CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Publications (2)

Publication Number Publication Date
CN108564367A CN108564367A (en) 2018-09-21
CN108564367B true CN108564367B (en) 2022-08-16

Family

ID=63534482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810320616.5A Active CN108564367B (en) 2018-04-11 2018-04-11 Payment encryption algorithm

Country Status (1)

Country Link
CN (1) CN108564367B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742611B (en) * 2021-01-06 2025-03-18 北京沃东天骏信息技术有限公司 A method and device for processing data request

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657855A (en) * 2015-03-10 2015-05-27 王清斌 Mobile payment identity verification device with NFC interface
CN106960344A (en) * 2017-03-27 2017-07-18 上海与德科技有限公司 A kind of method of payment and system based on mobile terminal
CN107835332A (en) * 2017-11-15 2018-03-23 深圳大学 It is superimposed the two-dimensional code generation method and device of man made noise's information

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7089213B2 (en) * 2002-06-04 2006-08-08 Bottomline Technologies System and method for producing and verifying secure negotiable instruments
CN101729256B (en) * 2008-10-24 2012-08-08 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
TW201032160A (en) * 2009-02-19 2010-09-01 Simpleact Inc System and method for mobile trade
KR101831404B1 (en) * 2011-08-11 2018-02-22 엘지전자 주식회사 Mobile terminal and payment method for mobile terminal
CN107798531B (en) * 2017-08-14 2022-07-15 中国银联股份有限公司 Electronic payment method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657855A (en) * 2015-03-10 2015-05-27 王清斌 Mobile payment identity verification device with NFC interface
CN106960344A (en) * 2017-03-27 2017-07-18 上海与德科技有限公司 A kind of method of payment and system based on mobile terminal
CN107835332A (en) * 2017-11-15 2018-03-23 深圳大学 It is superimposed the two-dimensional code generation method and device of man made noise's information

Also Published As

Publication number Publication date
CN108564367A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
DE69620751T2 (en) Steganographic embedding of additional data and calibration data in image data
US5214699A (en) System for decoding and displaying personalized indentification stored on memory storage device
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
CN112352245A (en) Composite code pattern, generation device, reading device, method, and program
US20190385157A1 (en) Systems and methods for distributed-ledger based intercompany netting
CN104166912B (en) Photon method of payment and payment system
CN108090761A (en) Block chain token method of payment based on credible two-dimension code
DE19739488A1 (en) Process for conducting secure financial transactions using fax transmissions
US20220036358A1 (en) Digital currency settlement system and settlement method and payment device
CN105827612B (en) Salary payment system based on mobile internet service application
CN107230072B (en) Method and system for online payment using digital currency chip card
CN105225155A (en) A kind of insurance risk management-control method based on biological identification technology
SE1551523A1 (en) Method and scanner for verifying an authenticity of an identity document and extracting textual information there from
CN108564367B (en) Payment encryption algorithm
JP2004102883A (en) Electronic money settlement system, communication terminal, and server device
CN104182868B (en) Method of payment and payment system
US20160026995A1 (en) Time Lmited Code
US20230107705A1 (en) Coordination and Management of Digital Asset Endorsements
CN104166911A (en) Photonic payment method and system
CN107622396B (en) Self-service transaction method, system and terminal equipment
CN105205427A (en) Identity card information storage and recognition method
KR20200010761A (en) System and method for generating security code or virtual account
CN105741111A (en) Mobile payment method, system and device
CN118014813B (en) Social information collection method and system based on image robust steganography
CN106910068A (en) The light certification offline electronic payment method of many algorithm multi-key ciphers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220727

Address after: 317500 No. 97, Muyu Youth Road, Zeguo Town, Wenling City, Taizhou City, Zhejiang Province

Applicant after: Song Weijie

Address before: 317100 Room 308, building 14, No. 2 Qiushui Avenue, Haiyou street, Sanmen County, Taizhou City, Zhejiang Province

Applicant before: Zheng Hong

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230426

Address after: Room 0022, Room 201, 2nd Floor, Building 1, Yard 1, Xinfang Road, Chaoyang District, Beijing, 100000

Patentee after: Beijing Feihu Infinite Technology Co.,Ltd.

Address before: 317500 No. 97, Muyu Youth Road, Zeguo Town, Wenling City, Taizhou City, Zhejiang Province

Patentee before: Song Weijie