CN109447623A - One kind being based on two dimensional code safety of payment authentication method - Google Patents
One kind being based on two dimensional code safety of payment authentication method Download PDFInfo
- Publication number
- CN109447623A CN109447623A CN201811091476.5A CN201811091476A CN109447623A CN 109447623 A CN109447623 A CN 109447623A CN 201811091476 A CN201811091476 A CN 201811091476A CN 109447623 A CN109447623 A CN 109447623A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- mobile phone
- code
- safety
- pos machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3274—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
Abstract
The invention discloses one kind to be based on two dimensional code safety of payment authentication method, its payment step is as follows: access mobile phone cloud first, authenticate the two dimensional code on mobile phone, compare verification in two dimensional code cloud, determine the accuracy of two dimensional code, authorization message is returned after two-dimensional barcode information is checked in mobile phone cloud, the token information after authorization message, the verification of information ensures the safety of two dimensional code, then two dimensional code is encrypted, it is according to symmetry algorithm and asymmetric arithmetic that two-dimentional code encryption, which is shown, this cipher mode improves the safety of two dimensional code, after being shown by two-dimentional code encryption, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps the two dimensional code on mobile phone, it is just sweeping and is sweeping with counter so that the two dimensional code in POS machine and mobile phone becomes card system, it is easy to use and improves safety, POS machine is sweeping hand Machine two dimensional code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses the consumption of backstage on-line authentication or local credit.
Description
Technical field
The present invention relates to a kind of safety certifying methods, specially a kind of to be based on two dimensional code safety of payment authentication method, belong to
Network payment applied technical field.
Background technique
With the fast development of science and technology, two dimensional code payment is a kind of new generation of wireless payment built based on system of account
Scheme.Under the payment scheme, businessman can be assembled into the Transaction Informations such as account, commodity price one two dimensional code, and be printed on
It is issued on the carriers such as various newspapers, magazine, advertisement, books, user sweeps bat two dimensional code by cell phone client, can realize and quotient
The payment and settlement of family's Alipay account.Finally, businessman receives according to the user in payment transaction information, connection data, so that it may
Commodity distribution is carried out, transaction is completed.Simultaneously as many two dimensional code barcode scanning tools do not have the identification of malice network address and interception
The data of ability, Tencent mobile phone manager show that give the great communication spaces of mobile phone viruses, for online malice network address, branch
Scanning and the detection of environment are paid to avoid two-dimensional code scanning channel from contaminating.
However there is very big safety in traditional two dimensional code payment there are many deficiencies place, such as traditional two dimensional code payment
Hidden danger, traditional two dimensional code payment is simply by simple certification, and the processing Jing Guo authorization message, does not be easy to cause two dimensional code
Payment is stolen by other people.
Summary of the invention
The object of the invention is that provide a kind of based on two dimensional code safety of payment authenticating party to solve the above-mentioned problems
Method realizes online transaction mechanism by two dimensional code, and in terms of information data and safety of payment, system uses multiple-enciphered safe machine
System ensures the safety of data information and fund.
The present invention is achieved through the following technical solutions above-mentioned purpose, and one kind being based on two dimensional code safety of payment authentication method,
The following steps are included:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
Preferably, for the accuracy of two dimensional code, in S1, mobile phone two-dimension code certification and authorization are terminated according to mobile phone cloud
The two-dimensional barcode information sent by mobile phone compares verification in two dimensional code cloud, determines the accuracy of two dimensional code.
Preferably, two dimensional code is used in order to more convenient, in S2, returning to authorization message is to check two dimensional code in mobile phone cloud
After information, and token information is after authorization message.
Preferably, for the safety of two dimensional code, in S3, two-dimentional code encryption show be according to symmetry algorithm with it is asymmetric
Algorithm, after being shown by two-dimentional code encryption, just sweeping is that mobile phone sweeps two dimensional code in POS machine, and counter sweep is that POS machine is swept on mobile phone
Two dimensional code.
Preferably, it is preferred that in order to ensure the stability of card system, in S4, POS machine sweep mobile phone two-dimension code it
Afterwards, the consumption of POS machine access backstage on-line authentication or local credit.
The beneficial effects of the present invention are: this kind is based on two dimensional code safety of payment authentication method accesses mobile phone cloud first, recognize
The two dimensional code on mobile phone is demonstrate,proved, compares verification in two dimensional code cloud, determines the accuracy of two dimensional code, checks two dimensional code in mobile phone cloud
Authorization message is returned after information, the token information after authorization message, the verification of information ensures the safety of two dimensional code,
Then two dimensional code is encrypted, it is according to symmetry algorithm and asymmetric arithmetic that two-dimentional code encryption, which is shown, and this cipher mode mentions
The high safety of two dimensional code, after being shown by two-dimentional code encryption, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps mobile phone
On two dimensional code, just sweeping and it is counter sweep so that the two dimensional code in POS machine and mobile phone becomes card system, be easy to use and improve
Safety, POS machine sweep mobile phone two-dimension code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses backstage on-line authentication
Consumption or local credit.
Detailed description of the invention
Fig. 1 is payment flow figure of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment:
One kind being based on two dimensional code safety of payment authentication method, comprising the following steps:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
In S1, mobile phone two-dimension code certification and authorization are to terminate the two-dimensional barcode information sent by mobile phone according to mobile phone cloud,
Verification is compared in two dimensional code cloud, determines the accuracy of two dimensional code.
In S2, returning to authorization message is after two-dimensional barcode information is checked in mobile phone cloud, and token information is to authorize
After information.
In S3, it is to show according to symmetry algorithm and asymmetric arithmetic by two-dimentional code encryption that two-dimentional code encryption, which is shown,
Afterwards, just sweeping is that mobile phone sweeps two dimensional code in POS machine, and counter sweep is that POS machine sweeps two dimensional code on mobile phone.
In S4, for POS machine after sweeping mobile phone two-dimension code, POS machine accesses the consumption of backstage on-line authentication or local credit.
The present invention is as follows in verification process: access mobile phone cloud first authenticates the two dimensional code on mobile phone, in two dimensional code cloud
Compare verification, determine the accuracy of two dimensional code, return to authorization message after two-dimensional barcode information is checked in mobile phone cloud, believes in authorization
Token information after breath, the verification of information ensure the safety of two dimensional code, then encrypt to two dimensional code, two dimensional code adds
Close display is according to symmetry algorithm and asymmetric arithmetic, and this cipher mode improves the safety of two dimensional code, passing through two dimension
After code encryption is shown, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps the two dimensional code on mobile phone, is just sweeping and counter is sweeping so that POS machine
Become card system with the two dimensional code on mobile phone, be easy to use and improve safety, last POS machine is sweeping mobile phone two dimension
Code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses the consumption of backstage on-line authentication or local credit.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (5)
1. one kind is based on two dimensional code safety of payment authentication method, it is characterised in that: the following steps are included:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
2. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S1, hand
Machine two dimension code authentication and authorization are to terminate the two-dimensional barcode information sent by mobile phone according to mobile phone cloud, compare core in two dimensional code cloud
It is right, so that it is determined that the accuracy of two dimensional code.
3. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S2, return
Returning authorization message is after two-dimensional barcode information is checked in mobile phone cloud, and token information is after authorization message.
4. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S3, two
It is according to symmetry algorithm and asymmetric arithmetic that dimension code encryption, which is shown, and after being shown by two-dimentional code encryption, just sweeping is that mobile phone sweeps POS
Two dimensional code on machine, counter sweep is that POS machine sweeps two dimensional code on mobile phone.
5. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S4, POS
For machine after sweeping mobile phone two-dimension code, POS machine accesses the consumption of backstage on-line authentication or local credit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811091476.5A CN109447623A (en) | 2018-09-19 | 2018-09-19 | One kind being based on two dimensional code safety of payment authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811091476.5A CN109447623A (en) | 2018-09-19 | 2018-09-19 | One kind being based on two dimensional code safety of payment authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109447623A true CN109447623A (en) | 2019-03-08 |
Family
ID=65530512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811091476.5A Pending CN109447623A (en) | 2018-09-19 | 2018-09-19 | One kind being based on two dimensional code safety of payment authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109447623A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414982A (en) * | 2019-07-10 | 2019-11-05 | 武汉城市一卡通有限公司 | A kind of all-purpose card method of commerce and system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202150125U (en) * | 2011-05-30 | 2012-02-22 | 杭州在信科技有限公司 | Two-dimensional bar code safety certification device |
CN102842081A (en) * | 2011-06-23 | 2012-12-26 | 上海易悠通信息科技有限公司 | Method for generating two-dimensional code and implementing mobile payment by mobile phone |
KR20130016145A (en) * | 2012-12-17 | 2013-02-14 | 변동삼 | The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN103559526A (en) * | 2013-10-31 | 2014-02-05 | 北京天威诚信电子商务服务有限公司 | Method and system for generation and verification of two-dimensional code |
CN103617531A (en) * | 2013-12-16 | 2014-03-05 | 信雅达系统工程股份有限公司 | Safety payment method and device based on credible two-dimension code |
CN105590199A (en) * | 2014-11-14 | 2016-05-18 | 中国银联股份有限公司 | Payment method and payment system based on dynamic two-dimensional code |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
-
2018
- 2018-09-19 CN CN201811091476.5A patent/CN109447623A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202150125U (en) * | 2011-05-30 | 2012-02-22 | 杭州在信科技有限公司 | Two-dimensional bar code safety certification device |
CN102842081A (en) * | 2011-06-23 | 2012-12-26 | 上海易悠通信息科技有限公司 | Method for generating two-dimensional code and implementing mobile payment by mobile phone |
KR20130016145A (en) * | 2012-12-17 | 2013-02-14 | 변동삼 | The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information |
CN103295046A (en) * | 2013-06-13 | 2013-09-11 | 北京网秦天下科技有限公司 | Method and device for generating and using safe two-dimensional codes |
CN103559526A (en) * | 2013-10-31 | 2014-02-05 | 北京天威诚信电子商务服务有限公司 | Method and system for generation and verification of two-dimensional code |
CN103617531A (en) * | 2013-12-16 | 2014-03-05 | 信雅达系统工程股份有限公司 | Safety payment method and device based on credible two-dimension code |
CN105590199A (en) * | 2014-11-14 | 2016-05-18 | 中国银联股份有限公司 | Payment method and payment system based on dynamic two-dimensional code |
CN106452756A (en) * | 2016-11-08 | 2017-02-22 | 王栋 | Construction verification method and device capable of verifying security two-dimensional code offline |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414982A (en) * | 2019-07-10 | 2019-11-05 | 武汉城市一卡通有限公司 | A kind of all-purpose card method of commerce and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2648944C2 (en) | Methods, devices, and systems for secure provisioning, transmission and authentication of payment data | |
CN201910100U (en) | Bus one-card business system, bus one-card business platform and POS (point-of-sale) machine | |
CN103443813B (en) | System and method by mobile device authenticating transactions | |
CN104134142B (en) | A kind of subway booking recognized based on Quick Response Code, ticket checking method | |
KR101451214B1 (en) | Payment method, server performing the same, storage media storing the same and system performing the same | |
CN101978646B (en) | For performing the system and method for file distributing and purchase | |
US20140279558A1 (en) | Two-Way, Token-Based Validation for NFC-Enabled Transactions | |
US20120203663A1 (en) | Method and apparatus for authentication utilizing location | |
KR101138283B1 (en) | Method and system of mobile payment | |
US20130275308A1 (en) | System for verifying electronic transactions | |
US20090172402A1 (en) | Multi-factor authentication and certification system for electronic transactions | |
CN102722816B (en) | A kind of method, system and device of mobile payment | |
EP2301269A2 (en) | System, method and device to authenticate relationships by electronic means | |
CN106688004A (en) | Transaction authentication method, device, mobile terminal, POS terminal and server | |
WO2012014231A4 (en) | System and method for generating a strong multi factor personalized server key from a simple user password | |
CN102202300A (en) | System and method for dynamic password authentication based on dual channels | |
CN104899747B (en) | Virtual tickets generation, verification method, apparatus and system | |
CN102238193A (en) | Data authentication method and system using same | |
CN101790166A (en) | Digital signing method based on mobile phone intelligent card | |
CN103345703A (en) | Banking transaction authentication method and system based on image authentication | |
CN104282091A (en) | Bill data generating/transmitting/storing/authenticating method | |
TW201417010A (en) | System and method for performing financial certificate transaction through mobile device | |
CN108416400A (en) | A kind of method of payment and payment system based on dynamic two-dimension code | |
CN107240010A (en) | The method and system of digital cash is transferred to digital cash chip card | |
TWM589842U (en) | Mobile trading desk with real-name phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190308 |