CN109447623A - One kind being based on two dimensional code safety of payment authentication method - Google Patents

One kind being based on two dimensional code safety of payment authentication method Download PDF

Info

Publication number
CN109447623A
CN109447623A CN201811091476.5A CN201811091476A CN109447623A CN 109447623 A CN109447623 A CN 109447623A CN 201811091476 A CN201811091476 A CN 201811091476A CN 109447623 A CN109447623 A CN 109447623A
Authority
CN
China
Prior art keywords
dimensional code
mobile phone
code
safety
pos machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811091476.5A
Other languages
Chinese (zh)
Inventor
赵利宾
王予明
李冰
卢涛
崔永刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Newcapec Electronics Co Ltd
Original Assignee
Newcapec Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newcapec Electronics Co Ltd filed Critical Newcapec Electronics Co Ltd
Priority to CN201811091476.5A priority Critical patent/CN109447623A/en
Publication of CN109447623A publication Critical patent/CN109447623A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated

Abstract

The invention discloses one kind to be based on two dimensional code safety of payment authentication method, its payment step is as follows: access mobile phone cloud first, authenticate the two dimensional code on mobile phone, compare verification in two dimensional code cloud, determine the accuracy of two dimensional code, authorization message is returned after two-dimensional barcode information is checked in mobile phone cloud, the token information after authorization message, the verification of information ensures the safety of two dimensional code, then two dimensional code is encrypted, it is according to symmetry algorithm and asymmetric arithmetic that two-dimentional code encryption, which is shown, this cipher mode improves the safety of two dimensional code, after being shown by two-dimentional code encryption, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps the two dimensional code on mobile phone, it is just sweeping and is sweeping with counter so that the two dimensional code in POS machine and mobile phone becomes card system, it is easy to use and improves safety, POS machine is sweeping hand Machine two dimensional code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses the consumption of backstage on-line authentication or local credit.

Description

One kind being based on two dimensional code safety of payment authentication method
Technical field
The present invention relates to a kind of safety certifying methods, specially a kind of to be based on two dimensional code safety of payment authentication method, belong to Network payment applied technical field.
Background technique
With the fast development of science and technology, two dimensional code payment is a kind of new generation of wireless payment built based on system of account Scheme.Under the payment scheme, businessman can be assembled into the Transaction Informations such as account, commodity price one two dimensional code, and be printed on It is issued on the carriers such as various newspapers, magazine, advertisement, books, user sweeps bat two dimensional code by cell phone client, can realize and quotient The payment and settlement of family's Alipay account.Finally, businessman receives according to the user in payment transaction information, connection data, so that it may Commodity distribution is carried out, transaction is completed.Simultaneously as many two dimensional code barcode scanning tools do not have the identification of malice network address and interception The data of ability, Tencent mobile phone manager show that give the great communication spaces of mobile phone viruses, for online malice network address, branch Scanning and the detection of environment are paid to avoid two-dimensional code scanning channel from contaminating.
However there is very big safety in traditional two dimensional code payment there are many deficiencies place, such as traditional two dimensional code payment Hidden danger, traditional two dimensional code payment is simply by simple certification, and the processing Jing Guo authorization message, does not be easy to cause two dimensional code Payment is stolen by other people.
Summary of the invention
The object of the invention is that provide a kind of based on two dimensional code safety of payment authenticating party to solve the above-mentioned problems Method realizes online transaction mechanism by two dimensional code, and in terms of information data and safety of payment, system uses multiple-enciphered safe machine System ensures the safety of data information and fund.
The present invention is achieved through the following technical solutions above-mentioned purpose, and one kind being based on two dimensional code safety of payment authentication method, The following steps are included:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
Preferably, for the accuracy of two dimensional code, in S1, mobile phone two-dimension code certification and authorization are terminated according to mobile phone cloud The two-dimensional barcode information sent by mobile phone compares verification in two dimensional code cloud, determines the accuracy of two dimensional code.
Preferably, two dimensional code is used in order to more convenient, in S2, returning to authorization message is to check two dimensional code in mobile phone cloud After information, and token information is after authorization message.
Preferably, for the safety of two dimensional code, in S3, two-dimentional code encryption show be according to symmetry algorithm with it is asymmetric Algorithm, after being shown by two-dimentional code encryption, just sweeping is that mobile phone sweeps two dimensional code in POS machine, and counter sweep is that POS machine is swept on mobile phone Two dimensional code.
Preferably, it is preferred that in order to ensure the stability of card system, in S4, POS machine sweep mobile phone two-dimension code it Afterwards, the consumption of POS machine access backstage on-line authentication or local credit.
The beneficial effects of the present invention are: this kind is based on two dimensional code safety of payment authentication method accesses mobile phone cloud first, recognize The two dimensional code on mobile phone is demonstrate,proved, compares verification in two dimensional code cloud, determines the accuracy of two dimensional code, checks two dimensional code in mobile phone cloud Authorization message is returned after information, the token information after authorization message, the verification of information ensures the safety of two dimensional code, Then two dimensional code is encrypted, it is according to symmetry algorithm and asymmetric arithmetic that two-dimentional code encryption, which is shown, and this cipher mode mentions The high safety of two dimensional code, after being shown by two-dimentional code encryption, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps mobile phone On two dimensional code, just sweeping and it is counter sweep so that the two dimensional code in POS machine and mobile phone becomes card system, be easy to use and improve Safety, POS machine sweep mobile phone two-dimension code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses backstage on-line authentication Consumption or local credit.
Detailed description of the invention
Fig. 1 is payment flow figure of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment:
One kind being based on two dimensional code safety of payment authentication method, comprising the following steps:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
In S1, mobile phone two-dimension code certification and authorization are to terminate the two-dimensional barcode information sent by mobile phone according to mobile phone cloud, Verification is compared in two dimensional code cloud, determines the accuracy of two dimensional code.
In S2, returning to authorization message is after two-dimensional barcode information is checked in mobile phone cloud, and token information is to authorize After information.
In S3, it is to show according to symmetry algorithm and asymmetric arithmetic by two-dimentional code encryption that two-dimentional code encryption, which is shown, Afterwards, just sweeping is that mobile phone sweeps two dimensional code in POS machine, and counter sweep is that POS machine sweeps two dimensional code on mobile phone.
In S4, for POS machine after sweeping mobile phone two-dimension code, POS machine accesses the consumption of backstage on-line authentication or local credit.
The present invention is as follows in verification process: access mobile phone cloud first authenticates the two dimensional code on mobile phone, in two dimensional code cloud Compare verification, determine the accuracy of two dimensional code, return to authorization message after two-dimensional barcode information is checked in mobile phone cloud, believes in authorization Token information after breath, the verification of information ensure the safety of two dimensional code, then encrypt to two dimensional code, two dimensional code adds Close display is according to symmetry algorithm and asymmetric arithmetic, and this cipher mode improves the safety of two dimensional code, passing through two dimension After code encryption is shown, mobile phone sweeps two dimensional code in POS machine or POS machine sweeps the two dimensional code on mobile phone, is just sweeping and counter is sweeping so that POS machine Become card system with the two dimensional code on mobile phone, be easy to use and improve safety, last POS machine is sweeping mobile phone two dimension Code mobile phone sweep or POS machine on two dimensional code after, POS machine accesses the consumption of backstage on-line authentication or local credit.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (5)

1. one kind is based on two dimensional code safety of payment authentication method, it is characterised in that: the following steps are included:
S1, mobile phone two-dimension code certification and authorization;
S2, authorization message and token information are returned to;
S3, it is shown, just swept or counter swept by two-dimentional code encryption;
S4, POS machine pass through the online certification consumption in all-purpose card backstage or local credit.
2. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S1, hand Machine two dimension code authentication and authorization are to terminate the two-dimensional barcode information sent by mobile phone according to mobile phone cloud, compare core in two dimensional code cloud It is right, so that it is determined that the accuracy of two dimensional code.
3. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S2, return Returning authorization message is after two-dimensional barcode information is checked in mobile phone cloud, and token information is after authorization message.
4. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S3, two It is according to symmetry algorithm and asymmetric arithmetic that dimension code encryption, which is shown, and after being shown by two-dimentional code encryption, just sweeping is that mobile phone sweeps POS Two dimensional code on machine, counter sweep is that POS machine sweeps two dimensional code on mobile phone.
5. according to claim 1 a kind of based on two dimensional code safety of payment authentication method, it is characterised in that: in S4, POS For machine after sweeping mobile phone two-dimension code, POS machine accesses the consumption of backstage on-line authentication or local credit.
CN201811091476.5A 2018-09-19 2018-09-19 One kind being based on two dimensional code safety of payment authentication method Pending CN109447623A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811091476.5A CN109447623A (en) 2018-09-19 2018-09-19 One kind being based on two dimensional code safety of payment authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811091476.5A CN109447623A (en) 2018-09-19 2018-09-19 One kind being based on two dimensional code safety of payment authentication method

Publications (1)

Publication Number Publication Date
CN109447623A true CN109447623A (en) 2019-03-08

Family

ID=65530512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811091476.5A Pending CN109447623A (en) 2018-09-19 2018-09-19 One kind being based on two dimensional code safety of payment authentication method

Country Status (1)

Country Link
CN (1) CN109447623A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414982A (en) * 2019-07-10 2019-11-05 武汉城市一卡通有限公司 A kind of all-purpose card method of commerce and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202150125U (en) * 2011-05-30 2012-02-22 杭州在信科技有限公司 Two-dimensional bar code safety certification device
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
KR20130016145A (en) * 2012-12-17 2013-02-14 변동삼 The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information
CN103295046A (en) * 2013-06-13 2013-09-11 北京网秦天下科技有限公司 Method and device for generating and using safe two-dimensional codes
CN103559526A (en) * 2013-10-31 2014-02-05 北京天威诚信电子商务服务有限公司 Method and system for generation and verification of two-dimensional code
CN103617531A (en) * 2013-12-16 2014-03-05 信雅达系统工程股份有限公司 Safety payment method and device based on credible two-dimension code
CN105590199A (en) * 2014-11-14 2016-05-18 中国银联股份有限公司 Payment method and payment system based on dynamic two-dimensional code
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202150125U (en) * 2011-05-30 2012-02-22 杭州在信科技有限公司 Two-dimensional bar code safety certification device
CN102842081A (en) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 Method for generating two-dimensional code and implementing mobile payment by mobile phone
KR20130016145A (en) * 2012-12-17 2013-02-14 변동삼 The security online payment system and those methods based on two dimensions code scanning with a device containing encrypted payment authentication information
CN103295046A (en) * 2013-06-13 2013-09-11 北京网秦天下科技有限公司 Method and device for generating and using safe two-dimensional codes
CN103559526A (en) * 2013-10-31 2014-02-05 北京天威诚信电子商务服务有限公司 Method and system for generation and verification of two-dimensional code
CN103617531A (en) * 2013-12-16 2014-03-05 信雅达系统工程股份有限公司 Safety payment method and device based on credible two-dimension code
CN105590199A (en) * 2014-11-14 2016-05-18 中国银联股份有限公司 Payment method and payment system based on dynamic two-dimensional code
CN106452756A (en) * 2016-11-08 2017-02-22 王栋 Construction verification method and device capable of verifying security two-dimensional code offline

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414982A (en) * 2019-07-10 2019-11-05 武汉城市一卡通有限公司 A kind of all-purpose card method of commerce and system

Similar Documents

Publication Publication Date Title
RU2648944C2 (en) Methods, devices, and systems for secure provisioning, transmission and authentication of payment data
CN201910100U (en) Bus one-card business system, bus one-card business platform and POS (point-of-sale) machine
CN103443813B (en) System and method by mobile device authenticating transactions
CN104134142B (en) A kind of subway booking recognized based on Quick Response Code, ticket checking method
KR101451214B1 (en) Payment method, server performing the same, storage media storing the same and system performing the same
CN101978646B (en) For performing the system and method for file distributing and purchase
US20140279558A1 (en) Two-Way, Token-Based Validation for NFC-Enabled Transactions
US20120203663A1 (en) Method and apparatus for authentication utilizing location
KR101138283B1 (en) Method and system of mobile payment
US20130275308A1 (en) System for verifying electronic transactions
US20090172402A1 (en) Multi-factor authentication and certification system for electronic transactions
CN102722816B (en) A kind of method, system and device of mobile payment
EP2301269A2 (en) System, method and device to authenticate relationships by electronic means
CN106688004A (en) Transaction authentication method, device, mobile terminal, POS terminal and server
WO2012014231A4 (en) System and method for generating a strong multi factor personalized server key from a simple user password
CN102202300A (en) System and method for dynamic password authentication based on dual channels
CN104899747B (en) Virtual tickets generation, verification method, apparatus and system
CN102238193A (en) Data authentication method and system using same
CN101790166A (en) Digital signing method based on mobile phone intelligent card
CN103345703A (en) Banking transaction authentication method and system based on image authentication
CN104282091A (en) Bill data generating/transmitting/storing/authenticating method
TW201417010A (en) System and method for performing financial certificate transaction through mobile device
CN108416400A (en) A kind of method of payment and payment system based on dynamic two-dimension code
CN107240010A (en) The method and system of digital cash is transferred to digital cash chip card
TWM589842U (en) Mobile trading desk with real-name phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190308