CN217213739U - Device for on-site payment - Google Patents

Device for on-site payment Download PDF

Info

Publication number
CN217213739U
CN217213739U CN202121944291.1U CN202121944291U CN217213739U CN 217213739 U CN217213739 U CN 217213739U CN 202121944291 U CN202121944291 U CN 202121944291U CN 217213739 U CN217213739 U CN 217213739U
Authority
CN
China
Prior art keywords
payment
belongs
payee
communication
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202121944291.1U
Other languages
Chinese (zh)
Inventor
褚万青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202121944291.1U priority Critical patent/CN217213739U/en
Application granted granted Critical
Publication of CN217213739U publication Critical patent/CN217213739U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention aims to provide a device for on-site payment; the device is positioned on a payment site and belongs to a payee; the device at least comprises an electronic wearable device A, wherein the electronic wearable device A is provided with a receiving module V and a scrambler U; the device is provided with a communication module S which can be temporarily connected with a communication device C which is positioned on a payment site, belongs to a payer and is networked with a third-party electronic payment platform D; the device collects the payment "it is networked in series with C, D" and, itself, can confirm the collection; the device can solve the problem of money receiving pain points (if a smart phone is not used) faced by a payee (especially a person with a younger age), and is even beneficial to the popularization of digital currency.

Description

Device for on-site payment
Technical Field
The invention relates to electronic wearable equipment, a scrambler and electronic payment, wherein the electronic payment relates to on-site payment and off-line payment.
Background
At present, mobile phone payment is more and more common, and cash payment is less and less; the main way to pay on site, for example, at a first consumer location (e.g., a small bouquet, a snack, a marinade, a barber shop, a farmer market, etc.) beyond business, is to pay by scanning the two-dimensional code of the payee with a "scan" in a payment APP (e.g., "WeChat" or "Taobao") downloaded by the payer's mobile phone; but the defects are that: the payee needs to have at least own communication equipment (such as a mobile phone for on-site collection) on site to be networked with a third party payment platform D (such as 'WeChat') so as to obtain a downloaded payment APP (such as 'WeChat payment') of the D in the mobile phone, wherein the 'voice broadcast or screen display text notification' (namely 'how many elements to collect') is sent out by the payee, and the payee can confirm that the on-site collection is successful, namely 'parallel networking' payment (namely, the mobile phone networking of the payer and the mobile phone networking of the payee are equivalent to parallel and parallel networking); in addition, the payee needs to pay the traffic fee of the mobile phone networking or "the broadband fee related to the wireless router providing wifi signal for the mobile phone" (hereinafter, the traffic fee or the broadband fee is referred to as "networking fee"). The most important function of the downloaded payment APP for the D in the mobile phone is to deal with Trojan horse viruses and ensure the safety of payment.
In addition, whether in the suburb junction of a large city or in a small and medium city or a rural town and town, a second consumer place (such as a roadside stall for selling a large amount of things, including dishes such as grandma, vintage grandmother, grandma and grandfather, which are older, is a stall person YYYYYY) beyond the business, but YYY has no mobile phone or dares to use the mobile phone (such as unfamiliar with the use of a smart phone, for example, fear of telecommunication fraud), namely, a payee has no mobile phone on site, faces the problem of collection (pain point) of 1, because many people consume cash (such as buying dishes) outside at present and YYYY has to require cash, so that the collection of YYY is troublesome, such as people have to find other things for collecting the two-dimensional code of the mobile phone once at the left and once at the right, and even have to help other things for collecting the YYYY with mobile phone after the cash (the other things need to find out to pay for YYYYY), the selling of YYY is slow (for example, a buyer does not pay for YYYY in cash and has to buy other dishes), and the YYYY waits for a long time even crouches in the sun and rain in a stall and cannot sell the YYY at the due price (for example, the YYY is sold at a discount); or 2, YYY has a two-dimensional code for collection, but does not carry a mobile phone (on one hand, it may be because a smart phone is not used, on the other hand, if a user collects money with a mobile phone, the mobile phone needs to pay internet fee, and does not conform to the frugal principle that YYY "can save one and one in one", the mobile phone for collection bound to the two-dimensional code is in the hands of its relatives (such as adult son, daughter, grandson, or grandson), and after the mobile phone of the buyer scans the two-dimensional code and pays, YYY only sees the payment record on the page of the payment APP in the mobile phone of the buyer, but the payment record cannot be guaranteed to be true, that is, the buyer cannot be excluded from actually not paying, making a fake, and making a fake payment record (causing YYY to be suspicious on site, cannot be paid on-site, cannot be guaranteed to receive a payment, and can only ask for the good care of the buyer), also, YYY sometimes complains that money to sell something is being taken by its relatives (because the phone for collecting money is in the hands of the relatives and bound to their bank account numbers), and the money to sell something is not much at one time, but the money to sell money is often a large amount of money to add up in a long-term and accumulated time, i.e., the hard money that one has made is not mastered by one and makes one happy.
In addition, it is assumed that an existing smart bracelet (with a password algorithm in the bracelet) belonging to the electronic wearable device can be used for "offline payment", for example, in a business surpass, a pattern (such as a password type two-dimensional code) containing a password displayed on a screen of the bracelet is scanned by a communication device (such as a scanning gun of a cash register) of a payee and then payment is performed, that is, the bracelet is connected with a cash register of the payee and further networked with a third-party payment platform, and payment is performed (that is, "offline payment", that is, the bracelet itself of the payer for field payment cannot be networked with the third-party payment platform, and the bracelet itself is networked with the third-party payment platform through the communication device of the payee and such as through the cash register of the payee); secondly, in a place outside the business trip, on the premise that the payer pays online, the bracelet is supposed to be capable of being used for 'offline collection' (i.e. the communication device of the payee for on-site collection cannot be networked with the third-party payment platform, and the communication device 'is networked with the third-party payment platform through the communication device of the payer' for collection, such as through the mobile phone of the payer), but the communication device for on-site collection of money of the payee (such as the wristband) cannot confirm collection of money by itself, and the wearer of the wristband (i.e. the payee) is required to confirm collection of money on the payment APP of the third-party electronic payment platform (i.e. D) downloaded from the self-contained mobile phone (the mobile phone and the wristband are in bluetooth pairing), that is, at least the bracelet confirms that the payment has not been received from a communication device, such as a mobile phone, that the wearer is self-contained (belonging to the "parallel networking" payment mentioned above).
Disclosure of Invention
The invention aims to: in view of the above-mentioned shortcomings and problems of the prior art, it is an object of the present invention to provide a device for field payment, which is capable of at least "networking" in series "collection, i.e., which is capable of resolving the pain point of collection faced by the above-mentioned payee (especially a person of a younger age), and which also enables the payee to at least" not require a communication device for field collection which is networked by itself, and further not to pay a networking fee ", and which is capable of confirming collection by itself. The invention also provides a method for on-site payment.
The technical scheme is as follows: in order to achieve the above purpose, the first technical solution adopted by the present invention is: an apparatus for on-site payment, characterized by: the device W can at least collect money in a series connection type network; w at least comprises electronic wearable equipment A, A at least comprises a receiving module V, A comprises a mm device U, and W comprises a communication module S capable of being temporarily connected with communication equipment C of a payer positioned at a payment site; wherein when W and C are temporarily connected and C is networked with a third party electronic payment platform D, then two-way communication is carried out between W and C/between C and D to help D take charge of executing 'C transfer to W'/D at least 'providing W with password information relating to whether or not the information has been collected'; wherein V at least receives the password message; wherein U at least performs ' decryption and/or verification ' of the password message ', and then a itself at least confirms ' information relating to whether or not payment has been received ' and informs the payee.
The device for on-site payment W1 is at least capable of "in-line" collection of payments; the W1 at least comprises an electronic wearable device A1 and a communication device B, wherein the A1 at least comprises a receiving module V1, the A1 comprises a mm device U1, the A1 is connected with the B in a non-temporary mode, the W1 comprises a communication module S1 capable of being connected with the C in a temporary mode, and the S1 belongs to the B, namely the B can be connected with the C in a temporary mode; wherein when B is temporarily connected to C and C is networked to D, then two-way communication is between W1 and C/between C and D to facilitate D being responsible for performing "C transfers to W1"/D at least "providing W1 with cryptographic information relating to whether or not information has been collected"; v1 at least receives the cipher message that C transfers first and B transfers later; wherein, the U1 at least performs ' decryption and/or verification ' of the password message ', and then the A1 confirms at least ' information related to whether or not the money has been collected ' and informs the payee; a1 belongs to A, V1 belongs to V, U1 belongs to U, and W1 belongs to W.
The device for on-site payment W2 is at least capable of "in-line" collection; the system comprises a W2, an electronic wearable device A2, an A2, a receiving module V2, an A2 and a mm device U2, wherein the W3578 is located at a payment site and belongs to a payee, the A2 is an electronic wearable device A2, the A2 is at least provided with the receiving module V2, the A2 is provided with the mm device U2, the W2 is provided with a communication module S2 capable of being temporarily connected with a C, and the S2 is at least V2, namely, the A2 can be temporarily connected with the C; wherein when a2 is temporarily connected to C and C is networked to D, then two-way communication is made between W2 and C/between C and D to help D take charge of performing "C transfers to W2"/D at least "providing password information to W2 regarding whether information has been collected"; wherein V2 receives at least the secret code transferred by C; wherein U2 at least performs ' decryption and/or verification ' the password message ', and then a2 itself at least confirms ' information concerning whether or not it has been collected ' and informs the collection party; a2 belongs to A, V2 belongs to V, U2 belongs to U, and W2 belongs to W.
A is wrist type.
The temporary connection between the W and the C means that the W and the C are connected in an NFC read-write mode, a shooting and scanning image mode or an infrared mode.
The non-temporary connection between A1 and B means that A1 and B perform non-temporary Bluetooth connection.
The second technical scheme adopted by the invention is as follows: a method of on-site payment comprising the steps of:
(1) w and C, D as in any of the preceding claims, participating in a "transfer of X-bits to W by C";
(2) d, knowing that A participates in 'transferring X elements to W' by C according to 'information of customs collection' F; d, encrypting 'information related to whether X elements are collected' into a password E by using a password related to A; d at least performs ' providing E to C ', C at least performs ' providing E to W ', U at least performs ' decryption and/or verification ' E ', and then A confirms whether X yuan has been collected and informs the receiver.
The "transfer X element from C to W" means: when W is temporarily connected with C, W provides 'information of collection related to affairs' F to C; c providing F or ' F and ' information on the payment of affairs ' G ' to D, wherein ' F comprises and/or G at least comprises ' information related to X element ' H; d is responsible for performing "C transfers X-element to W", i.e., D knows the financial account of the payee from F, D "knows the financial account of the payer from and/or G, and D knows H from" F and/or G ", D is responsible for transferring X-element in the financial account of the payer to the financial account of the payee through the associated financial settlement system.
F is at least "the archival information related to W previously registered in D" J, or F is at least "J, H", or F is at least "J, the password Y associated with said password", or F is at least "J, H, Y".
G is one or more of "file information concerning C registered in advance in D, H".
Has the advantages that:
1, W is at least able to collect money "networked in series", i.e. W is at least able to collect money "networked in series" by connection of W and C "with" C and D; this "in-line" collection originates from: (1) w comprises at least A, A has at least V, A has U, W has S; wherein "W has S" to enable W to make a temporary connection with a communication device C of a payer located at a payment site (which is one of important technical features of W), i.e., to enable bidirectional communication between W and C; (2) "two-way communication between W and C (i.e. W is connected to C)/two-way communication between C and D (i.e. C is networked) to help" D is responsible for performing 'C transfers to W'/D at least for 'providing W with a secret message' relating to whether or not information has been collected, 'V in W at least receives the secret message, U in W at least performs' decryption and/or verification of 'the secret message', and then a in W itself can at least confirm "information relating to whether or not information has been collected" and inform the recipient.
The information related to whether the payment is received or not (the information is simply called ' whether the payment is received or not ', the same below) "can be confirmed by the A, and the U in the A can perform ' decryption and/or verification ' of the password information ', namely the U can enable the A to confirm whether the payment is received or not (enable a payee to confirm whether the payment is received or not), namely the U can guarantee the safety of the on-site payment (namely guarantee the safety of the on-site payment); the U can replace the existing and commonly used technology for guaranteeing the safety of on-site payment, and the technology is that a payment APP of a third-party payment platform D (such as WeChat) is downloaded in a mobile phone of a payee (the most important function of the payment APP is to ensure whether the payee collects money or not on the basis of dealing with Trojan viruses and guaranteeing the safety of payment); the U ensures that the payee can confirm whether to collect the money without the 'self-contained mobile phone and the payment APP downloaded from the mobile phone', namely the U can replace the traditional 'mobile phone for collecting the money on site and the payment APP downloaded from the mobile phone'.
In contrast to the "parallel networking" payment in the background art, the "serial networking" payment collection of the present invention includes "W itself (from 'a itself') can at least confirm whether or not the payment is collected" (this is one of the important technical features of W).
The networking of W and C at least comprises communication between W and C about collection, and the networking of C and D at least comprises communication between C and D about collection and payment, namely the networking in series at least comprises communication between W and D about collection and communication between C and D about payment.
2, A is an electronic wearable device; if A is worn on the wrist habitually (namely A is wrist type), A is not easy to forget to take out of the home (not easy to forget) or lose or be stolen; correspondingly, the mobile phone used for on-site collection at the first consumption place outside the business is easy to be forgotten or lost or stolen.
3, because C is the communication equipment owned by the payer and capable of being networked with D, and because W of the payee is connected with C, W and D can be connected in series for networking, and the payee does not need the communication equipment networked by self and used for on-site payment, and further does not need to pay networking fees, and further does not need to download the payment APP of the third-party electronic payment platform in the communication equipment networked by self and used for on-site payment; in addition, because the paying party is required to pay the networking fee of the communication equipment (such as a mobile phone) and the D network no matter the paying party is at the first consumption place outside the business surpass in the background technology, the second consumption place related to other sellers with two-dimensional codes or the paying place in the invention, the application of the W in the invention basically does not cause the paying party to additionally increase the expenditure of the networking fee.
4, the payee can sell things or provide services (and at the due price) quickly and without asking for people, or the payee can collect money on site at least, completely ensure to receive the money, and master the hard money earned by the payee, thereby eliminating the pain point of money collection faced by the payee (especially people of older age) in the background art.
5. Failing to reject or inconvenient to return to "field collection". When a person has a wedding, holds a banquet and asks for guests, the guests (payers) who ask for guests transfer (i.e. pay a plurality of elements as gift) to the person through 'WeChat payment' in the mobile phone of the person and express congratulatory messages, the person (payee) is often not sure to click "accept" (i.e., "reject") on the page of the "WeChat Payment" in his handset, or, when the guest transfers the money to the person through the 'Taobao payment' in the mobile phone of the guest and represents congratulatory information, the person usually returns the elements to the guest through the 'Taobao payment' in the mobile phone of the person, if the "rejection" or "return" is not for a true-good will, but for a "guest set" or "show" (i.e., for "false-meaning), then the guest is bothered or bothered (e.g., the guest also wants to have the option to resend the elements to the person); however, since W (representing the payee) and C (representing the payer) of the present invention make a temporary connection, and the temporary connection is also a field connection (or a close connection if wireless), therefore, when the communication device (such as a mobile phone) of the guest approaches a, … … (refer to example 2 below) worn on the wrist of the person, D is responsible for executing "C transfers a number of elements to W (a stands for W)", … … (refer to example 2 below), after a2 confirms "information related to the collection" by itself and informs the collection party, the person has actually received the number of elements, i.e., the number of elements has been paid out, there is no such "rejection", or there is no such "return" (i.e., it is inconvenient for the person to return the number of elements), that is, "collection of money on site that cannot be rejected or is inconvenient to return" is one of the important technical features of W. The transfer (payment) belongs to an electronic red envelope, namely, a person who receives the electronic red envelope is a payee, so that the payee is explained to be a broad concept; for example, a person who provides a physical good (e.g., a sale) belongs to a payee; for example, a service provider (e.g., a hair clipper service provider, such as a hair clipper service provider) belongs to the payee.
6. The invention W has wide application. If YYY (such as grandma, grandpa, grandma and grandpa) does not have a mobile phone or dares not to use the mobile phone to carry out electronic payment, so as to cause a digital gap, W can be used in the second consumption place to eliminate the digital gap; w can also be used in the first consumer location; w can also be used for digital currency to be pushed out at the center row, for the reasons: firstly, the 'online application' of the digital currency is the main application of the digital currency (the invention belongs to the 'online application'), and the point-to-point 'off-line payment of a payer and off-line collection of a payee (namely double off-line payment') of the digital currency is only the auxiliary application of the digital currency; second, the existence of the "digital gap" is at least detrimental to the destruction of cash (W is beneficial to the destruction of cash), thereby hindering the large-scale use of digital currency. In addition, the application of the electronic wearable device a in other consumer places (such as business surpasses) is solved by other invention patents.
Description of the drawings:
FIG. 1 is an outline view A1; in fig. 1, the main body portion; 2. a wrist band.
FIG. 2 is a partial constitutional structural view of A1; in fig. 2, 1, a receiving module V1; 2. a cipher device U1; 3. a signalling module R1.
FIG. 3 is a partial constitutional structure view of B; in fig. 3, 1, an NFC module; 2. a signaling module Rb; 2. and a receiving module Vb.
FIG. 4 is a drawing of a "tandem type" collection work of W1, FIG. 5 is a drawing of a first constituent structure of W1, and FIG. 6 is a drawing of a second constituent structure of W1; in fig. 4 to 6, 1, a 1; 2. b; 3. c; 4. d; 5. w1.
FIG. 7 is a partial constitutional view of A2; in fig. 7, 1, a receiving module V2; 2. and an encryptor U2.
FIG. 8 is a workfigure of a W2 (i.e., A2) "cascading Web" collection; in fig. 8, 1, a 2; 2. c; 3. and D, performing the following steps.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and specific examples, which are intended to be illustrative only and not limiting to the scope of the invention, wherein various equivalent modifications or changes, such as changes in the details and arrangement of the parts of the invention or those skilled in the art, after reading the disclosure herein, may be made by those skilled in the art without departing from the scope of the invention as set forth in the appended claims.
Example 1, the device for on-site payment W1 enables "in-line" collection of payments; the system comprises a W1, a W1, an electronic wearable device A1 and a communication device B, wherein the W1 is located at a payment site and belongs to a payee, the A1 comprises an electronic wearable device A1 and a communication device B, the A1 at least comprises a receiving module V1, the A1 comprises a coder U1, the A1 is in non-temporary connection with the B, the W1 comprises a communication module S1 capable of being in temporary connection with a communication device C of the payer located at the payment site, and the S1 belongs to the B, namely the B can be in temporary connection with the C; wherein when B is temporarily connected to C and C is networked to a third party electronic payment platform D, bidirectional communication is made between W1 and C/between C and D to facilitate D being responsible for performing "transfer of C to W1"/D is made "providing password information concerning whether information has been collected to W1"; v1 receives the cipher message that C transfers first and B transfers later; among them, U1 performs "decrypt the password", and a1 itself confirms "information on whether or not the money has been collected" and notifies the receiver; a1 belongs to A, V1 belongs to V, U1 belongs to U, and W1 belongs to W.
The first step is as follows: a stall is arranged at a stall of a street vendor, the stall sells vegetables without a mobile phone or two-dimensional codes, but the left wrist of the stall sells vegetables with a1 (namely A1 is electronic wearing equipment and A1 is wrist type), and as shown in figure 1, A1 is equivalent to a special watch (wristwatch); a1 is composed of a main body part (1) and a wrist strap (2); the main body part (1) is an approximate cylinder (corresponding to the watch body of the wristwatch); the main body portion (1) has a display screen, but is not shown in fig. 1. As shown in fig. 2, a1 has a reception module V1(1), V1(1) is a bluetooth module (the "bluetooth" is bluetooth, the same applies below), a1 has a cipher U1(2), U1(2) has one AES cipher body, and correspondingly, D has another AES cipher body, and the one AES cipher body and the another AES cipher body belong to a symmetric AES; a1 also has a signaling module R1(3), R1(3) is also Bluetooth module; a1 has a battery; a1 has a screen display module, i.e. a1 has a "screen display" function, so that a1 displays (i.e. a1 informs the payee) "information on whether or not the payee has been paid"; here, since the components of the switch circuit of a1, the battery, the on-screen display module, and the like are not shown in fig. 2, fig. 2 is a partial structural diagram of a 1. Here, a1 includes not only the receiving module V1(1) (the term "a 1 at least has the meaning of" at least "in the receiving module V1"), but also the transmitting module R1 (3).
A small electronic sound box (namely B) is also arranged at the outer side of the stand of the Zhanglaotai, and a battery is arranged in the sound box; the sound box is provided with a sound production module, so that the message about whether the money is collected or not, which is confirmed and provided by the A1, is broadcast to the payee by the B (namely, the A1 informs the payee by the B', namely, the A1 indirectly informs the payee); as shown in fig. 3, the sound box has an NFC (near field communication) module (1), where the NFC module (1) is a reader; as shown in fig. 3, the sound box has a transmitting module Rb (2) and a receiving module Vb (3), Rb (2) and Vb (3) are bluetooth modules, and since a1 has V1(1) and R1(3) as shown in fig. 2, it can be considered that a1 and B are already paired (the pairing belongs to wireless connection), that is, "a 1 and B are connected in a non-temporary manner, which means that a1 and B are connected in a non-temporary manner by bluetooth", which corresponds to a1 and B being integrated; FIG. 3 is a partial block diagram of B (not shown), including the switch circuit, the battery, and the "sound" module of B; w1 is a device for collecting money on the spot of the zhaotai booth, and of course, W1 is one of the devices for paying on the spot of the person (payer) who buys a dish on the zhaotai booth (the handset of the buyer is the second device for paying on the spot of the buyer). However, for a1 to make a non-temporary (i.e. not temporary) connection with B, it is preferable that the bluetooth connection, i.e. the first connection between a1 and B requires a manual operation related to "bluetooth pairing between a1 and B", which is no longer required for the second and subsequent connections (i.e. as long as a1 is turned on and B is turned on, a1 and B immediately automatically make a bluetooth connection).
In fig. 4, the dashed line of the rectangle is W1(5), and W1(5) includes a1(1) and B (2) within the dashed line; the dotted line and a1(1) and B (2) therein correspond to the constitutional structural diagram of W1 (5).
The buyer (i.e. the payer) buys the dish in the booth of Zhanglao, and the payment is 15 yuan; a small handheld mobile phone (the mobile phone is a communication device C of a payer on a payment site), wherein the mobile phone is internally provided with an NFC module; the mobile phone also downloads APP of the D (assuming that the D is a third-party electronic payment platform 'grand-launch' network); this cell-phone networking (promptly online), when little bright fingerprint unblock, open this cell-phone to touch screen and click the APP of D in this cell-phone after, then the APP of D is online, promptly C and third party electronic payment platform D network.
The second step: the first action of minuscule is to enter "15" on APP of D in his handset (i.e. the payment amount is 15 dollars, because it is a micropayment, a privacy-free payment may be used); in this example, the input "15" is 15 yuan, i.e., "information on payment for affairs" G, "i.e.," information on X yuan "H, i.e.," G is H "; "G is H" embodies the meaning that "G" includes at least "in" information concerning X element "H".
The third step: the second action of xiaoming is to bring its handset (i.e., C) close to the small speaker (i.e., B) and to temporarily connect B and C at the point of payment (the connection is a wireless connection), and then a beep of "tic" indicates that the reader/writer in the speaker has "written" 320123197704880088 (i.e., "information on collection of matter" F, J) "stored in advance in the speaker onto the NFC module in the handset, i.e.," the W and C are temporarily connected, which means that the W and C are connected by NFC reading/writing ", i.e., B provides F to C, as shown in fig. 4," B (2) → C (3) ", i.e., W1 provides F to C, which means that the W provides information on collection of matter" F to C, which is part of the communication between W1 and C. Wherein 320123197704880088 represents F and J, i.e., in this example, F represents J, and J represents "archive information concerning W1 registered in advance in D"; specifically, if the "archive information concerning W1" is "a 1 number", F (i.e., 320123197704880088, J) is "a 1 number registered in advance in D".
Wherein, assuming that the DFC module in C is a "reader/writer" (the reader/writer has "read" and "write" functions), the DFC module in B is not a reader/writer, i.e., the DFC module in B only has "write" functions.
Among them, since a1 belongs to W1, "the number of a 1" belongs to "archival information related to W1".
Wherein, because the NFC module in the small sound box (i.e. B) belongs to B, and because B belongs to W1, the NFC module is the communication module S1 that the W1 has and can be temporarily connected to C, i.e. the NFC module (i.e. S1) is temporarily connected to the NFC module in the small mobile phone (i.e. C); since S1 belongs to B, B can be temporarily connected to C.
Among them, since B belongs to W1, "B provides F to C" is "W1 provides F to C".
The fourth step: the smart phone (i.e. C) sends 320123197704880088 (i.e. F) and 15 ' (i.e. G, H) to D, i.e. C provides F and information on the payment of affairs ' G ' to D, as shown in fig. 4 as "C (3) → D (4)", which belongs to the communication between C and D.
The fifth step: d is responsible for performing "C transfers 15 elements to W1":
when B and C are temporarily connected at a payment site (hereinafter referred to as 'when B and C are connected'), D receives F, and D searches '320123197704880088' in the stored related data (such as data related to 'number of electronic wearable device'), namely 320123197704880088 (namely F) is the number of A1 registered in D in advance, and D knows that A1 is participating in the payment, namely D knows that A participates in 'C transfers X elements to W' according to F; and because the account number of 320123197704880088 (namely the number of A1 registered in the step D in advance) and the bank account of a certain bank of the Zhang Gaoshao are bound in the step D (the binding belongs to the prior related agreement) in advance (such as when the step A1 is used), when the step B is connected with the step C, the step D knows the account number of the bank account of the certain bank of the Zhang Gaoshao, namely the step D knows the financial account of the receiver according to the step F.
Wherein, because C and D are networked, when B is connected with C, D knows the mobile phone number of the mobile phone (namely C), D knows that the mobile phone is participating in the payment in the spot payment; and because the Xiaoming has been bound with the account number of the bank account of the Xiaoming in another bank on the APP of the D in the mobile phone in advance (the binding belongs to 'related advance agreement'), when the B is connected with the C, the D knows the account number of the bank account of the Xiaoming in the other bank, namely, the D 'knows' the financial account of the payer. Wherein, the "related prior appointment" in the previous paragraph and the "related prior appointment" in the present paragraph have the same meaning; because it is used in different scenarios, different expressions are used in order to avoid confusion.
Where H is known from G, D.
Wherein, D transfers 15 yuan in Mingming bank accounts to Zhang Lao Tai bank accounts through related bank settlement systems (such as China UnionPay center, one bank and the other bank), namely 'W1 and C, D in any item, participates in' C transfers X yuan to W1 ', namely' W and C, D in any item, participates in 'C transfers X yuan to W'.
And a sixth step: because everything is normal, C successfully transferred a 15-tuple to W1; the Chinese Unionpay center replies the information of 'the 15 yuan of transfer operation is completed' to the D; d, encrypting the information of 'relating to the received X element' into a password E1 by using a password related to A1; d proceeds to "provide E1 to C", C proceeds to "provide E1 to W1", U1 proceeds to "decrypt E1", and a1 confirms "X dollars received" itself and notifies the payee. That is, D knows that A1 is involved in the collection of payments based on the received F (i.e., the number of A1 previously registered with D); since one AES cipher body in the cipher device U1 of a1 is a symmetric cipher with another AES cipher body owned by D, D encrypts plaintext "collected 15 yuan" (i.e., "information relating to collected X yuan") with the other AES cipher body owned by D (i.e., D with the cipher related to a1) to cipher letter E1; d proceeds "provide E1 (i.e. the cryptogram whose plain text content is 'cash received 15 yuan') to C", as shown in fig. 4, "C (3) ← D (4)", which belongs to the communication between C and D; the reader-writer in the small sound box (i.e. B) "reads" E1 on the NFC module of the mobile phone (i.e. C provides E1 to B), as shown in fig. 4 "B (2) ← C (3)"; as shown in "fig. 5 or fig. 6," a1(1) ← B (2) ", B (2) automatically provides E1 to a1(1) through a bluetooth connection, that is, the transmitting module Rb of B (2) transmits to the receiving module V1 of a1(1), that is, the V1 receives the cipher that is transferred after C and after B.
Wherein, since a1(1) and B (2) belong to W1(5) and a1(1) and B (2) have bluetooth connection, which is equivalent to a1(1) and B (2) being integrated, the operation "B (2) automatically provides E1 to a1(1) through the bluetooth connection" after C (3) provides E1 to B (2) "belongs to the internal operation of W1 (5); since this operation belongs to the internal operation of W1(5), "C (3) provides E1 to B (2)" is equivalent to "C (3) provides E1 to a1 (1)"; since a1(1) belongs to W1(5) and a1(1) is dominant in W1(5), "C (3) provides E1 to B (1)" means "C (3) provides E1 to W1 (5)", i.e., "communication is performed between W1(5) and C (3)", i.e., "C performs" provides E to W ".
The seventh step: the A1 decrypts E1 by using an AES cipher in U1 (i.e. the U1 performs "decrypt the cipher"), and if the decryption is successful, the A1 knows and confirms the plaintext "15 yuan received". In the present example, "15 yuan received" is hereinafter simply referred to as "15 yuan received" because "already" is omitted as usual in order to adapt to the language usage habits of both the buyer and the seller.
Among them, since U1 belongs to a1, "U1 decrypt E1" is "a 1 decrypt E1"; because "a 1 decrypts E1", a1 knows, and itself confirms, the plaintext "15 dollars received".
Eighth step: as shown in fig. 5, since a1 has a "screen display" function, the screen of a1 immediately displays "collection 15 yuan", and a1 immediately informs a little of the "collection 15 yuan" as long as the little of the user immediately looks at the screen of a1 (i.e., the first kind of notification, namely, the a1 and informs the collection party, which relates to fig. 5); or, because a1 immediately sends a message of "collect 15 yuan" to a small speaker (i.e. B) through bluetooth connection (i.e. the sending module R1 of a1 sends a signal to the receiving module Vb of B), "a 1(1) → B (2)" shown in fig. 6, and because the speaker has a "sound" function, the speaker of the speaker immediately sends a sound of "collect 15 yuan" (i.e. broadcasts "collect 15 yuan"), and because zhanglaotai may be busy selling things, there is no time or does not want to see a screen of a1, zhanglaotai immediately hears the sound, and B immediately informs zhanglaotai "collect 15 yuan" (i.e. the second kind of announcement, i.e. said a1 and informs the collection party, because the announcement is indirect through B); alternatively, the screen of a1 immediately displays "15 yuan to collect," zhanglao immediately sees "15 yuan to the screen of a1 and is notified of" 15 yuan to collect, "and a1 immediately gives" 15 yuan to collect "information to the speaker, and the speaker of the speaker immediately gives" 15 yuan to collect, "zhanglao immediately hears the sound, and is notified of" 15 yuan to collect "(i.e., double notification, i.e., third notification).
If only the first type of notification is available, the signaling module R1 of A1 is indicated to not provide '15 yuan' information for receiving the message to the receiving module Vb of B, that is, B is not required to immediately notify Zhang Lao Tai of '15 yuan' or the second type of notification and the third type of notification do not exist; it is also indicated that a1 may have no signaling module R1 but a receiving module V1 (the term "a 1 at least has the meaning of" at least "of the receiving modules V1" in the transceiver module).
The ninth step: the Xiaoming takes the mobile phone (namely C) away, namely the mobile phone is not close to the sound box (namely B); the spot payment is finished, namely the transaction is finished, and Zhang Lao Tai allows the Xiaoming to take the dish to walk away.
Combining the first step to the ninth step, as shown in fig. 4, W1 includes a1(1) and a B (2), and a bluetooth connection is formed between a1(1) and the B (2); because B (2) in W1 provides F to C (3), i.e., W1 provides F to C (3), C (3) provides F to D (4), i.e., W1 "communicates upstream with D (4) through C (3)"; as shown in fig. 4, since D (4) provides the cryptogram E1 to C (3), C (3) provides E1 to W1, i.e., W1 "communicates downstream with D (4) via C (3)". Wherein "C (3) provides E1 to W1" includes "B (2) of W1 provides E1 to a1(1) of W1"; wherein the upstream communication helps D (4) to perform "C (3) transfer 15 yuan to W1", the downstream communication helps D (4) to perform "cipher letter E1 providing information related to the collected amount to W1" (the "information related to the collected amount" is "15 yuan received" in this example), that is, helps D (4) to perform "cipher letter E1 providing 15 yuan received to W1", further "decrypt E1" by U1 ", a1(1) itself confirms" 15 yuan received "and informs the receiver; where D (4) is responsible for performing the "transfer of 15 Yuan by C (3) to W1", not only is this upstream communication required, but C (3) is also required to communicate with D (4) on behalf of the payer (involving the fourth step described above).
This example also needs to be explained as follows:
1, the process from the step "the second action of small and clear" approaching the mobile phone to the small sound box (i.e. the third step) "to the step eight of collecting 15 yuan (i.e. double notification) of" screen display and/or sound production "is completed instantly (e.g. one second is consumed); the total time consumption after the 'one second consumed time' is added with the time consumption of the first action (namely secret-free input '15' on APP of D in the mobile phone) is very short, which indicates that the on-site payment participated by the invention W1 is rapid payment; i.e. the temporary connection of W with C (in this case B with C) is a shortcut connection.
2, when B and C are connected at a payment site, if a small and clear mobile phone (namely C) sends ' 320123197704880088 (namely F, J), the mobile phone number of the mobile phone (namely the file information which is registered in advance in D and relates to C, and is assumed to be 189189189189) and ' 15 ' (namely H) to D, G comprises the mobile phone number of the mobile phone and 15 (namely H), namely the G is the file information which is registered in advance in D and relates to C, and is H, namely the G at least comprises H, namely the C sends ' F and G ' to D; since xiaoming has bound the cell phone number (189189189189) and xiaoming to the account number of the bank account of the other bank on the APP of D in the cell phone in advance, when B is connected to C and D receives G (G includes the cell phone number and H of the cell phone), including D receives "189189189189" (the cell phone number), D searches 189189189189 in the stored related data (such as data related to "cell phone number"); since xiao ming has previously bound "189189189189 (the mobile phone number) to the bank account of the payer represented by C, which is registered in D in advance," at D, "D" knows "the bank account of the payer from the mobile phone number; and because the mobile phone number belongs to G, D 'knows' the bank account of the payer according to G. In addition, suppose that C is networked with D, when B is connected with C, D knows the mobile phone number of the mobile phone (namely C), and D knows that the mobile phone is participating in the payment in the spot payment; … …, so that as soon as B connects to C, D knows the account number of the bank account that is mindful at the other bank, i.e. D "knows" the financial account of the payer (cf. fifth step), D "knows and knows" the bank account of the payer from G; if D 'knows' that the bank account of the payer is the first knowledge and D 'knows' that the bank account of the payer is the second knowledge according to G, the first knowledge and the second knowledge are mutually confirmed to ensure that the bank account of the payer cannot be mistaken.
In addition, if F includes "information relating to X element" H, G may be "the mobile phone number of the mobile phone" (i.e., G does not include "H"), i.e., G is "the profile information relating to C registered in D in advance", and D may also "know" the bank account of the payer from G.
In addition, assuming that F includes "information relating to X-element" H (first inclusion), and assuming that G also includes H (second inclusion), D knows H from "F and G"; the first inclusion is mutually validated against the second inclusion to ensure that H is not mistaken.
3, "F is a financial account of a payer" belongs to the fact that F is "profile information concerning W registered in advance at D" J. Assuming that F is the bank account of the payee (not the third step where F is "a number a1 previously registered at D"), the relevant part in the fifth step of example 1 is instead: "when B and C are temporarily connected at the payment site, D receives F (F is the bank account of the payee, if F is 111222333444555666), and D knows the financial account of the payee according to F; and D searches for "111222333444555666" in the data about the bank account of the payee stored by D, that is, 111222333444555666 is the bank account of the payee registered in advance in D, and since zhanglao has bound "111222333444555666" (i.e., the bank account of the payee registered in advance in D) and the number of a1 (i.e., 320123197704880088) registered in D in advance in D, D knows that a1 is participating in the collection in the payment, that is, D knows that a participates in "transfer X to W from C" according to F, and further can encrypt "15 yuan received" into the cryptogram E1 by using another AES cipher owned by D (the cipher and one AES cipher owned by U1 of a1 are symmetric ciphers) as described in the sixth step.
4, "F is the number of B registered in advance in D" pertains to the fact that F is "archival information concerning W registered in advance in D" J. Let F be "number of B registered in advance in D" (not the third step, F is "number of A1 registered in advance in D"), because this "number of B registered in advance in D" is bound in advance with "number of A1 registered in advance in D" at D, … … (refer to the fifth step), D knows the bank account of the transferee from F, and D knows that A1 participates in "C transfers X-ary elements to W1" from F).
5, "G is a financial account of a payer" belongs to the fact that G is "profile information concerning C registered in advance at D". If G is the bank account of the payer, D 'knows' the bank account of the payer according to G, but not the fifth step, D knows the mobile phone number of the mobile phone (namely C) when B is connected with C because C and D are networked, and D knows that the mobile phone is participating in the payment in the spot payment; and because the Xiaoming is previously bound with the account number of the bank account of the Xiaoming in another bank on the APP of the D in the mobile phone, the D knows the account number of the bank account of the Xiaoming in the other bank as soon as the B is connected with the C, namely the D 'knows the financial account of the payer'.
6, about F is "J, H". Assuming that F is "J, H", the fifth step is changed to: when B and C are temporarily connected at the payment site, D receives F, F includes J (J is 320123197704880088, namely number of A1 registered in D in advance), H (H is '15', for example, H is inputted into B by 'related operation involving B' by payer Xiaoming), D searches '320123197704880088' in the stored related data, namely 320123197704880088 (namely J in F) is number of A1 registered in D in advance, D knows that A1 is participating in the payment, namely D knows that A participates in 'C transfers X element to W' according to F; and because the account number of 320123197704880088 (namely the number of A1 registered in D in advance) and the bank account of a certain bank of Zhang Gao are bound in D in advance by Zhang Gao, when B is connected with C, D knows the account number of the bank account of the certain bank of Zhang Gao, namely D knows the financial account of the payee according to F. Wherein, because F includes H (i.e., "15" element, i.e., H is the amount of money being collected), the second step can be omitted where the "minty first action is to enter '15'" on APP of D in his handset, i.e., the payer minty does not need to provide H (by B of the payee providing H); although the "related operation concerning B" is performed by the payer novice (input "15"), since the operation is performed on B and since B belongs to W1, H (i.e., "15" element) belongs to F (i.e., "F includes" information concerning X element "H), and is provided by W1.
7, the description of the first step and the eighth step A1 in this example only has the function of "screen display" (for example, the description of the eighth step A shows "15 yuan money collection"); however, after a1 confirms "15 yuan of collection" (which relates to the fifth step), it may also be assumed that a1 immediately sounds "15 yuan of collection" (i.e., a1 has only the "sounding function"), or that a1 immediately emits green light (i.e., a1 has only the "lighting function" which represents "15 yuan" but preferably matches with the "15 yuan" of B-phoning or on-screen display), or that a1 immediately displays "15 yuan of collection", sounds "15 yuan" of collection "(i.e., a1 has the" on-screen display function, sounding function), or that a1 immediately sounds "15 yuan", green light (i.e., a1 has the "phoning function, lighting function"), or that a1 immediately displays "15 yuan" of collection ", green light (i.e., a1 has the" on-screen display function, lighting function "), or that a1 immediately displays" 15 yuan ", sounds" 15 yuan "of collection", or "collection", and "collection 15 yuan", or "is sounded, Green light is emitted (i.e. a1 has "screen display function, sound production function, light emission function").
8, immediately after the a1 sends the "collect 15 yuan" message to the small speaker (i.e. B) in the eighth step, B may have more than one function (refer to a1 in the above paragraph) of "sounding" collect 15 yuan ", screen display" collect 15 yuan ", and green light (representing" collect 15 yuan ", preferably matching with a1 screen display or sounding" collect 15 yuan "); of course, the first step and the eighth step of this example only illustrate that B has the "sound" function (e.g., the eighth step illustrates that B sounds "collect 15 yuan").
9, assuming that there is no NFC module in the mobile phone of xiaoming originally, in order to enable the mobile phone to participate in the field payment (especially for the convenience of "background technology" for collection of a slightly older placer), and also for the convenience of buying things on the spot of xiaoming, xiaoming can find related after-sale points, and the mobile phone is externally connected with the NFC module through an audio interface in the mobile phone; or, if there is no NFC module in a small mobile phone (but the mobile phone can perform scanning payment), and if there is no NFC module in B (but B can perform scanning payment), then a scanning image connection is performed between B and C, for example, if C photographs or scans a barcode label attached to B (data represented by a barcode on the label is F), … …, and B photographs or scans a two-dimensional code displayed on C screen (data represented by the two-dimensional code is the password E1), then the term "the W and C perform temporary connection" refers to "performing scanning image connection between W and C.
10, B and C can also be connected by a wire; for example, a front cover of B has one metal piece, and a back cover or bezel of C (e.g., a mobile phone) has another metal piece, and when the two metal pieces touch (e.g., B provides F to C), B makes a "wired connection" with C. For example, on the basis of this "wired connection", B and C make "wireless connection and wired connection" assuming that B and C also make wireless connection (refer to the third step).
Generally, since W "represents a payee" selling things or providing services or receiving an "electronic red envelope" for an unspecified object (e.g., different person, i.e., different payer), i.e., connection of a communication device (e.g., a mobile phone) owned by any one of the payers to B is temporary, B and C are temporarily connected.
12, regarding non-temporary connections. Because a1 is worn on the wrist of the payee, a1 is often moved with the movement of the payee, i.e., a1 is often not relatively fixed in terms of spatial position, but because the wireless connection between a1 and B is a bluetooth connection, i.e., the connection is relatively fixed in terms of communication protocol therebetween, it is not stated that "a 1 and B are relatively fixed" to avoid ambiguity; because "connection between a1 and B" is different from "connection between B and C" (B and C are temporarily connected), the expression "a 1 and B are non-temporarily connected" (i.e., the connection is not temporary, non-temporary).
13, a1 and B may also be wired. For example, communication device B may also be worn, but it is convenient to have C wired to B. For example, A1 is worn on the wrist of the payee, B is tied to the waist of the payee, and A1 is connected with B through a lead; if the payee has only a1 and no B (which is equivalent to the payee has only a2 as described in example 2 below), the two hands of zhanglao are always busy and busy in the west and east, i.e., the a1 worn on the wrist of zhanglao is inconvenient to stop and is connected with C in a short distance (i.e., temporary connection), i.e., the payee and payer cannot pay on site conveniently and quickly, and the B tied to the waist of the payee is equivalent to replace the a1 and is connected with C in a short distance (i.e., temporary connection), thereby providing convenience and rapidness for the payee and also for the payer. In addition, if a1 is also wirelessly connected to B (as described in the first step), a1 is "wirelessly connected and wired" to B.
14, information on "collection of matters" F is provided to C with respect to W1. In the first option (as described in the second step), F is stored in advance in B, B transfers F to C, belonging to the communication between B and C; there is also the second option that F is stored a1 in advance, a1 transfers F to C via B as soon as C and B are connected at the payspot, i.e. a1 communicates with C; there is also a third option of "F stored A1 in advance, A1 transfers F to B by B, and F is also stored B in advance, B transfers F to B", or "a portion of F stored A1 in advance, A1 transfers a portion of F to B by B, and another portion of F is also stored B in advance, B transfers another portion of F to B", i.e., "A1 and B" communicate with C (where "A1 communicates with C by B"). Among them, "a 1 and/or B" communicate with C because "a 1 and/or B" belongs to W1, that is, W1 communicates with C.
15, the communication between the W1 and C in the third step and the communication between C and D in the fourth step form the above "upstream communication"; the communication between C and D and the communication between W1 and C (including the communication between B and a1) described in the sixth step constitute the above-described "downstream communication".
16, since the "communication between W1 and C" in the third step and the "communication between W1 and C" in the sixth step constitute the "two-way communication between W1 and C", and since the "communication between C and D" in the fourth step and the "communication between C and D" in the sixth step constitute the "two-way communication between C and D", the two-way communication between W1 and D is performed, and the two-way communication involves 15 yuan.
17, the communication between C and D described in the fourth step includes not only the communication related to payment collection between C and D (e.g. C forwards F provided by W1 to D) but also the communication related to payment between C (C stands for payer) and D, e.g. C sends "320123197004180088 (i.e. F) and" 15 '(i.e. G, i.e. H) "to D, and C sends" 15' (i.e. G, i.e. H) to D, i.e. the communication related to payment. In addition, "the communication related to collection between C and D is bidirectional (e.g., C forwards F provided by W1 to D, e.g., D provides E1 to C requiring C to be forwarded to W1), but the communication related to payment between C (C stands for payer) and D is unidirectional in this example; if D provides C with "paid 15 dollars" at the same time as D provides E1 to C, e.g., D has a text on the APP of D in the xiaoming handset (i.e., C) telling it how many dollars "the balance was paid 15 dollars and/or (of the payer's bank account), then the communication between C (C stands for payer) and D involving payment is bidirectional. Wherein D performs not only "providing W with a password letter relating to whether or not information has been collected" (the meaning of "at least" in said D at least "providing W with a password letter relating to whether or not information has been collected") but also "providing C with information of' 15-yuan paid"; wherein C does not only "provide E to W" (subject to the meaning indicated by "at least" in said C at least "providing E to W"), but also "provide D' 15-dollar paid information provided by D to C to APP of D in C".
18, W1 enables the payee to securely collect money. In a first consumption place (such as a restaurant) beyond the business, the conventional payment device comprises a two-dimensional code label for collection of the restaurant (the label is pasted at a certain outer position of the restaurant), a small sound box and a networking mobile phone, and when a consumer scans the two-dimensional code label and pays, the small sound box sounds a collection X unit; however, if a lawbreaker secretly pastes a two-dimensional code label for collection belonging to the same party to another position close to the snack bar, and after an unknown consumer scans the two-dimensional code label for collection of the same party and pays, the lawbreaker portable and matched with the mobile phone of the lawbreaker (positioned near the small sound box of the restaurant) sounds a "collection X unit", the cashier of the restaurant mistakenly thinks that the small sound box of the restaurant sounds the "collection X unit", namely, the two-dimensional code label and the small sound box of the restaurant are secretly replaced by the lawbreaker, and the account of the lawbreaker can be successfully entered illegally; in order to prevent similar cheating, a cashier of a restaurant preferably looks at the characters 'X yuan' on the APP downloaded from the mobile phone of D, and the problem is that the user needs to scratch or fingerprint the mobile phone firstly, and then needs to touch the APP to see the 'X yuan', so that the problem is troublesome. In contrast, in the second notification of the eighth step of this example, if B is stolen by a lawless person to "false B", it is difficult for a1 to perform the first bluetooth pairing with "false B" (because the first bluetooth pairing requires manual operation on a1 by the payee), and the theft is meaningless, i.e., after C of the payer is connected to "false B", a1 cannot receive the true password related to a1 sent by D or cannot "decrypt and/or verify" the received false password.
19, W1 allows the payee to easily collect the money. Because the payee is always busy at hands and feet, busy at east and west (such as selling dishes), namely A1 normally worn on the wrist of the payee is not fixed, or because the distance between the payee and the payer can be several meters far, namely A1 is inconvenient to be directly connected with C of the payer, and B is fixedly arranged at a place close to the payer, B can be conveniently connected with C of the payer, the payer can conveniently pay and the payee can conveniently collect the money, namely W1 enables the payee to conveniently collect the money; among them, the maximum purpose of "C is to provide a password information concerning information whether or not the user has received the information" to a1 through B "(further, U performs" decryption and/or verification of "the password information", and a itself confirms "information concerning whether or not the user has received the information" and notifies the user to the user), so that a1 is dominant in W1, B is only a communication device associated with a1, and B has the maximum effect of "C is easily connected to B" through "and provides the password information to a 1".
Example 2 this example refers to example 1. The main differences between this example and example 1 are: first, the advantage of this embodiment is that the payee is equipped with a few B, so that no signaling module is needed in a2 to provide "information related to whether or not a payee has been received" to a communication device like B; example 1 has the advantage that B is adapted to be placed close to the payer (e.g., outside the booth) so that C can be connected to a1 by "connecting easily to B", i.e., B at least enables the payee to collect money easily, and, if B is stolen by a lawbreaker, it is meaningless, i.e., W1 enables the payee to collect money safely. Second, a2 in this example verifies the cryptogram E2, and a1 in example 1 decrypts the cryptogram E1.
The device for on-site payment W2 enables "in-line" collection of payments; the system comprises a payment site, a payment receiver, a W2, an electronic wearable device A2, an A2, a receiving module V2, an A2, a coder U2, a communication module S2 and a communication module S2, wherein the W2 is located at the payment site and belongs to the payment receiver, the W2 is an electronic wearable device A2, the A2 is provided with a receiving module V2, the A2 is provided with a coder U2, the W2 is provided with a communication module S2 capable of being temporarily connected with a communication device C of the payment receiver located at the payment site, and the S2 is a communication module V2, namely, the A2 can be temporarily and wirelessly connected with the C; wherein, when a2 is temporarily wirelessly connected to C and C is networked to D, then two-way communication is between W2 and C/two-way communication is between C and D to help D take charge of "C transfers to W2" (this example assumes that C successfully transfers to W2/D "provides password information to W2 concerning the information that has been collected"; wherein V2 receives the password information transferred by C; wherein, U2 carries out "verify the password letter", and further A2 confirms "relate to the information collected" and informs the collection party; a2 belongs to A, V2 belongs to V, U2 belongs to U, and W2 belongs to W.
The first step, Zhang Lao is over sixty years old, a hotel is at a birthday feast, the Zhang Lao has no mobile phone and no collection two-dimensional code, but the left wrist of the Zhang Lao is worn with A2 (namely A2 is electronic wearing equipment, A2 is wrist type), and W2 is A2; the outline of a2 refers to the outline of a1 (see fig. 1), i.e., a2 corresponds to a special watch (wristwatch), and a2 is composed of two parts, namely, a body part and a wrist band, wherein the body part is approximately cylindrical (corresponding to the watch body of the wristwatch), and the body part is provided with a display screen. As shown in fig. 7, a2 (i.e., W2) has a letter receiving module V2(1), and since V2(1) is S2, W2 (i.e., a2) has a communication module S2 capable of temporary connection with a "communication device of payer located at a payment site" C; v2(1) is also an NFC module; referring to FIG. 7, A2 has cipher U2(2), and U2(2) has an AII bit cipher system, and D has an AI bit cipher system, and AI and AII are symmetric ciphers; a2 has a battery; a2 has a screen display module, that is, A2 has a screen display function, so that A2 informs the payee of the "information related to the collection". Here, since the switch circuit of a2, the battery, the on-screen display module, and other structural components are not shown in fig. 7, fig. 7 is a partial structural diagram of a 2; of these, a2 (i.e., W2) is a device for collecting money at the site of zhanglaotai, and a2 is also one of devices for paying (i.e., transferring money) at the site of birthday banquet of zhanglaotai to a person (i.e., a payer) giving a congratulatory gift.
The god of the old and the young is happy before the young and the young, and the god of money (namely 'portion money') is sent by electronic payment for 500 yuan without cash; the method comprises the following steps that (1) a Xiaoming (a payer) holds a mobile phone (the mobile phone is communication equipment C of the payer on a payment site), wherein an NFC module is arranged in the mobile phone, and the module is a reader-writer; the mobile phone also downloads the APP of the D; the APP of the D in the mobile phone is online, namely C and D are networked.
The second step is that: the first action of minuscule is to enter "500" on APP of D in his handset; in this example, the "500" of the input is 500 yuan, G, and H.
The third step: the second action, just a mingmy, is to bring his cell phone (i.e., C) close to a2 on the left wrist of the old man, i.e., a2 connects C at the payment site, and a beep indicates that the reader/writer in the cell phone has "read" 320123197704880088 (i.e., F, J, i.e., a number of a2 registered in D in advance) stored in a2 in advance, as shown in fig. 8 as "a 2(1) → C (2)"; i.e., W2 (i.e., a2) provides F to C, which is the communication between W2 and C.
The fourth step: the cell phone (i.e. C) sends "320123197704880088 (i.e. F) and '500' (i.e. G, i.e. H)" to D as shown in fig. 8 as "C (2) → D (3)", i.e. C provides "F and G" to D, which belong to the communication between C and D.
The fifth step: d is responsible for performing "C transfers 500 dollars to W2 (i.e., a 2)" (C represents the bank account of the payer, and W2 represents the bank account of the payee).
Wherein when a2 is connected to C at the payspot one, … … (the fifth step of reference example 1), D knows the bank account of the payee according to F.
Wherein, since C is networked with D, when a2 is connected to C at the payspot, … … (the fifth step of reference example 1), "D knows" the bank account of the payer.
In the fifth step of reference example 1, H is known from G (G is H) and D.
And D, transferring 500 yuan in the Mingming bank account to the old-aged bank account through the related bank settlement system.
And a sixth step: since everything is normal, C successfully transferred 500 dollars to W2; the Chinese Unionpay center replies the information of 'the transfer operation of 500 yuan has been completed' to the D; d knows that A2 is involved in the collection of this collection based on the received F (i.e., 320123197704880088, the number of A2 previously registered with D); because AI and AII are symmetric ciphers, D encrypts the plaintext "paid 500 yuan" (i.e., "information related to paid X yuan") with AI (i.e., D with the cipher associated with a2) into cipher letter E2(E2 is a semi-cipher text); d performs "provide E2 and 'payer xianzhang' to C", as shown in fig. 8, "C (2) ← D (3)", i.e., D performs at least "provide E2 to C", belonging to the communication between C and D; the reader in C "writes" E2 and 'payer Xiaoming' "on the addressee module V2 (i.e. NFC module) of a2, as shown in fig. 8 as" a2(1) ← C (2) ", i.e. C provides" E2 and 'payer Xiaoming' "to a2, i.e. C performs at least" provides E2 to W2 (i.e. a2) ", i.e. V2 receives at least the C-forwarded secret E2, belonging to the communication between said W2 and C.
Among them, "payer xiaoming" in "E2 and" payer xiaoming "is a" supplementary explanation "provided by D to a2 (i.e., W2); since zhanglaotai can turn over the "supplementary note" at a2 after the fact, the "supplementary note" is mainly to prevent "the payee (zhanglaotai) from receiving many gift money (xiaoming is one of the many people) at his birthday banquet place, through a2 worn on his wrist, and forgetting after the fact 'who sent how much gift money'.
The seventh step: a2 verifies E2 with the AII in U2 inside it (i.e. said U2 "verifies the secret"), which passes a2 confirming "500 yuan had been collected".
The eighth step: since a2 has a "screen display" function, the screen of a2 immediately displays "500 yuan collected, mingming payers" (as long as zhaotai immediately looks at a screen of a2, a2 immediately informs zhaotai "500 yuan collected" (i.e., the payee is said and informed of "X yuan collected")) wherein a2 does not have the signaling module R1 as described in example 1, but has a receiving module V2 (the "a 2 at least has the meaning indicated by" at least "in the receiving module V2" in the transceiver module).
The ninth step: xiaoming takes his cell phone (i.e., C) away, i.e., the cell phone is no longer near a 2; the present spot payment is completed, that is, 500 yuan of the birthday congratulatory gift given to the old Zhang Tai by Xiaoming is paid, that is, 500 yuan of the Mingmen bank account is transferred to the old Zhang Tai bank account, that is, C successfully transfers 500 yuan to W2 (i.e., A2).
Combining the first step to the ninth step, as shown in fig. 8, since a2(1) provides F to C (2), i.e., W2 provides F to C (2), and C (2) provides F to D (3), i.e., W2 "performs upstream communication with D (3) through C (2)"; as in fig. 8, since D (3) provides crypto-trust E2 to C (2), C (2) provides E2 to a2(1), i.e., C (2) provides E2 to W2, i.e., downstream communication between W2 and D (3); among them, the upstream communication helps D (3) to perform "C (2) transfer 500 yuan to W2", the downstream communication helps D (3) to perform "cipher letter E2 providing information on having received money to W2" (the "information on having received money" is "500 yuan received" in this example), that is, helps D (3) to perform "cipher letter E2 providing 500 yuan received to W2", and further U2 performs "verify E2", a2(1) confirms "500 yuan received" by itself and informs the receiving party. Where D (3) is responsible for performing the "transfer of 500 dollars by C (2) to W2," not only is this upstream communication required, but C (2) is also required to communicate with D (3) on behalf of the payer.
The present example also needs to be supplemented by:
1, in this example, "AII, AI" in the first step of the cipher system, "AII and AI" in the sixth step, E2 is a semi-cipher text, and "AII verification E2 in the seventh step, refer to" ZI encryption and ZII encryption verification "in example 4 of the specification of" wrist cipher and cipher communication "patent No. ZL 201811336197.0, which is an issued patent; the method comprises the following specific steps:
in the example 4, the ZII of the para-cipher systems ZI and TT in a is a symmetric cipher, ZI encrypts plaintext "10599103101" (plaintext L) to "21593928154" (ciphertext Mk), and "10599103101/21593928154" (L + Mk ", plaintext + ciphertext", or semi-ciphertext) is sent to TT by a, and the ZII of TT encrypts 10599103101 (L) in a synchronized and symmetric para-cipher to obtain 21593928154 (ciphertext N), because N is Mk, ZII is verified by encryption, ZII (note: ZII2 in the original text is a mistake, and should be ZII) confirms L, i.e., ZII confirmation: during transmission, "10599103101/21593928154" (i.e., the semi-ciphertext) is not attacked, wherein 10599103101 (plaintext) is sent by a, is true, and has not been tampered with.
In this example, the cipher device U2 of a2 has a bit cipher system AII (corresponding to ZII described in example 4), and correspondingly, D has a bit cipher system AI (corresponding to ZI described in example 4), and AI and AII are symmetric ciphers; the AI owned by D (i.e., D encrypts plaintext "500 yuan charged" (i.e., the "information concerning X yuan charged", i.e., plaintext L) with a password associated with a2) into ciphertext MMM (equivalent to the above-mentioned ciphertext Mk), and "500 yuan charged/MMM" (i.e., the above-mentioned "L + Mk", i.e., "plaintext + ciphertext", i.e., half ciphertext, i.e., ciphertext e., ciphertext E2) is provided by D to a2 via C; the AII in U2 performs synchronous, symmetric bit-wise encryption of "500 yuan received" (i.e., L) to obtain MMM (corresponding to ciphertext N described above), and since N ═ Mk, the AII is authenticated by encryption, and the AII confirms L, i.e., AII confirms: during the transmission, the '500 m collected' (i.e. half cipher text, E2) is not attacked, wherein the '500 m collected' (i.e. plaintext L) is sent out by D, is real and is not tampered; that is, U2 performs "verify the password letter E2", and the verification is passed, and a2 confirms "500 yuan received" (i.e., L) and notifies the receiver (as described in the eighth step, a2 immediately notifies zhaotai "500 yuan received").
Suppose a has a cipher device U, one AES cipher body in U, and correspondingly D has another AES cipher body, the one AES cipher body and the another AES cipher body belong to a symmetric cipher AES "(refer to example 1), and" para-cipher system AII is in U, and correspondingly D has para-cipher system AI, AI and AII are symmetric ciphers "(refer to example 2), and D encrypts plaintext" 500 yuan received "with the another AES cipher body owned by D into cipher message E1 (refer to example 1), and AI owned by D encrypts plaintext" 500 yuan received "into cipher message MMM, thereby forming" 500 yuan received "/MMM" (i.e. semi-ciphertext, i.e. cipher message E2, refer to example 2 "supplementary note" 1); a secret E (E — E1+ E2) is provided to a by D via C; one AES cipher body in U decrypts E1, and the bit cipher system AII in U verifies E2, i.e. U performs "decrypt E1 and verify E2", i.e. said U performs "decrypt and verify" the cipher trust ".
3. Assuming that the NFC module in the small and clear mobile phone (i.e., C) is not a reader-writer, and the NFC module in a2 is a reader-writer, a2 has not only V2 (which belongs to the meaning of "at least" in the "a 2 at least having a receiving module V2") but also a transmitting module R2, and S2 is V2 (which belongs to the meaning of "at least" in the "S2 at least V2"), S2 or R2; where R2 "writes" F on NFC module in C and V2 "reads" E2 on NFC module in C.
4. Assuming that a2 has no NFC module (but can perform code scanning), and assuming that C has no NFC module (but can perform code scanning), C photographs or scans a barcode or two-dimensional code label provided by a payee (the barcode or two-dimensional code represents the F), i.e., a2 provides F to C (i.e., "W provides F to C"), … …, a2 photographs or scans a two-dimensional code displayed on C (the data represented by the two-dimensional code is the password E2), i.e., C provides E2 to a2 (i.e., "C provides E to W"); then C scans the label and a2 scans the two-dimensional code, respectively belonging to "the temporary connection between W and C, which means the connection between W and C is in the form of a scanned image".
5, assuming that a2 has no NFC module (but a2 has an infrared receiving module), and assuming that C has no NFC module (but C can scan codes and also has an infrared transmitting module), C scans a barcode or two-dimensional code label provided by a payee (the barcode or two-dimensional code represents the F), i.e., a2 provides F to C (i.e., "W provides F to C"), … …, the infrared transmitting module provided by C transmits an infrared signal to a2 (the infrared signal represents data of the password E2), and the infrared receiving module provided by a2 receives the infrared signal (i.e., C provides E2 to a2), which belongs to the phrase "the W is temporarily connected to C, i.e., the W is connected to C in an infrared manner).
6, in a first consumption place (such as a restaurant) beyond the business, the conventional payment device comprises a two-dimensional code label for collection of the restaurant, a small sound box and a networking mobile phone, and if the two-dimensional code label and the small sound box of the restaurant are stolen by a lawbreaker, the account of the lawbreaker can be successfully and illegally paid (reference example 1); in order to prevent similar cheating, a cashier of a restaurant preferably looks at the characters 'X yuan' on the APP downloaded from the mobile phone of D, and the problem is that the user needs to scratch or use a fingerprint to open the mobile phone firstly, and then needs to click the APP on a touch screen to see the 'X yuan', which is troublesome. Compared with the prior art, the A2 can display the 'X element of collection' immediately after the A2 confirms the 'X element of collection', and the A2 is worn on the wrist, so that the collection party can see the '500 element of collection' displayed on the A2 screen conveniently (namely, the collection party is informed conveniently), so the A2 not only ensures that the collection party does not need a communication device for field collection of self-contained networking and further does not need to pay the Internet fee (the device belongs to the 'purpose of the invention', ensures that the collection party at least 'does not need the communication device for field collection of self-contained networking and further does not need the meaning of the' at least 'in the Internet fee', but also ensures that the collection party can collect the collection safely.
The following is a supplementary description of the technical solution and embodiments of the present invention:
with respect to asymmetric cryptography. In addition to the symmetric passwords used in D in examples 1 and 2 to encrypt the information on whether X elements have been collected into the passwords E1 and E2, the asymmetric passwords can be used to encrypt the passwords E3 and E3; for example, there is an AES cipher body (belonging to the symmetric cipher AES, refer to example 1) in U, and an asymmetric cipher body (belonging to the RSA cipher in the asymmetric cipher) in U, the asymmetric cipher body generates a key pair including a public key and a private key, and when B is temporarily connected to C, a public key PPP in the key pair (i.e., a cipher Y associated with the cipher letter "E1, E3") is provided to B by a1, and then F provided to D by B "through C" includes J, PPP (J is the "number of a1 registered in D in advance" in example 1, i.e., the F is "J, a cipher Y associated with the cipher letter"), then PPP is received by D; … … (ref.1), D encrypts the plaintext "15 yuan received" with another AES cipher (belonging to the symmetric AES cipher) to form the cipher E1 (ref.1, the "key" used for this encryption is ZZZ), D encrypts ZZZ with the public key (i.e. PPP) of the key pair to form the cipher E3; d "provide" E1, E3 "to a1 via C, B"; a1 then decrypts E3 to ZZZ using the private key of the key pair, and subsequently decrypts E1 using ZZZ (i.e., the "key") to learn and confirm the plaintext "15 dollars received". Here, "the public key PPP in the key pair is provided (distributed) to D through' B, C", which means that U performs not only "decrypt the encrypted message" (which means that U performs at least "in" decrypt the encrypted message "), but also" provide PPP to D ". In addition, if B "F provided to D through C" includes J, Y, H ", it is said that F is" J, H, Y ".
With respect to Y, symmetric ciphers are referred to. For example, the bit cipher system AII in the cipher device U2 of a2 described in example 2 further includes a cipher command QQQ (the QQQ is the cipher Y associated with the cipher letter E2); when a2 is temporarily connected to C, then QQQ is provided to C by a2, then F provided to D by C includes J, QQQ (J is "number of a2 registered in advance at D" in example 2, i.e., F is "J, password Y associated with the password"), then D receives QQQ; d, according to QQQ, selecting a certain password in AI to encrypt the plaintext '10599103101' (namely, the plaintext L) described in example 2 into '21593928154' (namely, the ciphertext Mk); that is, U2 performs "verify password letter E2" described in example 2 (meaning of "at least" in "verify the password letter" is performed by U), and also performs "supply of QQQ to D" (QQQ refers to a symmetric password).
The "/" in "bidirectional communication between W and C/bidirectional communication between C and D". One purpose of "/" is to indicate that "two-way communication between C and D" can also occur before "two-way communication between W and C"; for example, an asymmetric cipher body (belonging to RSA cipher) owned by D generates a pair of keys including a public key and a private key, and when B and C are temporarily connected, D provides (distributes) the public key of the pair of keys "through C, B" to a1, a1 encrypts plaintext F (F is J, J is the "number of a1 registered in D in advance" described in example 1) with the public key of the pair of keys into a cipher letter E ', and then a1 provides E ' ″ through B "to C, C" provides "E ', G" (E ' is the cipher letter of F, E ' may represent F) through B "to D; d decrypts E' to plaintext F using the private key of the key pair (i.e., "number a1 registered in advance at D"), then D knows plaintext F, … … (refer to example 1), at least so that after D encrypts "received 15-tuple" to ciphertext E1, E1 is provided to a1 via "C, B".
With respect to "F is at least" at least of. Taking the third step of example 1 as an example, "F is J", that is, F (i.e., 320123197704880088, i.e., J) is "the number of a1 previously registered at D"; if F is "320123197704880088 (i.e. J), Rainbow road barrage, F includes not only J (meaning of" at least "in" F is at least ") but also" Rainbow road barrage "; wherein, the rainbow road-dam vegetable field is used for explaining the geographical position of the W1.
The term "at least" in the electronic wearable device a is included as W. For example, in example 2, W2 is a2 (to the extent that W includes at least the meaning indicated by "at least" in electronic wearable device a).
At least "at" of the "networked in series" collections can be made with respect to W. For example, not only can W1 or W2(W2 is a2) be able to "in-line" collect each transaction (within the meaning of "at least" in W capable of "in-line" collection), but a1 or a2 in W1 can also be able to count (e.g., "add") the transaction amounts for several transactions conducted during a certain hour or a certain half day or a certain week or a certain month, etc., and screen the results of the statistics to the recipient. Here, "a 1 itself or a2 itself" not only confirms "information on whether or not a collection has been collected" and informs of collection (it means that "at least" in collection "is confirmed by a itself), but also can count the transaction amounts of several transactions performed for a certain period of time such as a certain hour or a certain half day or a certain week or a certain month.
To help with the first. Because W is at least capable of "tandem networking" collection, it is desirable that not only does it include at least a, a having at least V, a having U, W having S, "but also that" C is networked with D, "etc., so" W includes at least a, a having at least V, a having U, W having S "to facilitate (i.e., the first" to facilitate, "rather than" enable ") W is at least capable of" tandem networking "collection.
Information relating to whether or not a charge has been collected. If D informs W of ' X yuan collected or X yuan collected ' through C, the ' X yuan collected or X yuan collected ' belongs to the ' information related to ' being collected '; if D informs W of ' no collection or reason of no collection (such as communication failure, for example, insufficient balance of the payer, for example, failure of China Unionpay system ') through C, the ' no collection or reason of no collection ' belongs to the ' information related to ' no ' collection.
Regarding D encryption. In example 1, it is assumed that D does not have the other AES cipher body, but a certain cipher center owns the other AES cipher body, and D links the cipher center; when D transmits '15 yuan of received money' to the cipher center, the cipher center encrypts the '15 yuan of received money' into a cipher letter E1 by using the other AES cipher body, and then transmits E1 to D, D 'transmits E1 to B through C', and B transmits E1 to A1; the cryptographic center is considered D in the present invention.
And D is passed through a related financial settlement system. The financial settlement system is not necessarily the chinese union of bank center and a certain bank, another bank (i.e. bank settlement system) as described in the fifth step of example 1, and may be APP of D; for example, after D transfers the X element on the "wallet" or "change" on the APP of D in the payer's mobile phone (i.e. C) to the "wallet" or "change" on the APP of D that the payee registered in advance, D provides W with a password information relating to the information that has been collected. In addition, if D links a platform and the platform is responsible for "C transfers X elements to W" through the financial settlement system, then because the platform is linked with D, it is considered as: d, performing 'transfer X element from C to W' through the financial settlement system. In addition, the financial account "is not necessarily or not entirely a" bank account, and the financial settlement system "is not necessarily or not entirely a" bank settlement system; for example, "W and C, D" participate in "C for xiaoming account and transfer X dollars to W for zhanglao account, or" W and C, D "participate in" C for xiaoming account and transfer X dollars to W for zhanglao account, or "W and C, D" participate in "C for xiaoming account and transfer X dollars to W for zhanglao account.
F is provided to D with respect to C. If C provides F to D, rather than C providing "F and G" to D, F is at least "J, H," and D is also required to "know" the payer's financial account (as described in step five of example 1, since C does not provide "G" to D, there is no "D knows" the payer's financial account from G).
It is responsible for performing "D is responsible" in "C transfers to W" with respect to D. For example, as described in example 1, the payer has input "15" on APP of D in his mobile phone (i.e. the payer has paid 15), and if for some reason a1 does not receive E1, the payee cannot confirm "15" paid, or if E1 received by a1 is decrypted, "no payment", the payee will not leave the payer who has "bought something or accepted the service", and the payer must contact D to ask D to solve or take charge.
About the second "to help". Because "D is responsible for performing a 'C to W transfer'/D and at least 'providing the W with a cryptographic letter' relating to whether or not information has been collected", not only is said "two-way communication between W and C/two-way communication between C and D" required, but also some other condition (such as the "prior association convention" described in the fifth step of example 1), then "two-way communication between W and C/two-way communication between C and D" facilitates (i.e. the second "to facilitate", rather than "causing") "D is responsible for performing a 'C to W transfer'/D and at least 'providing the W with a cryptographic letter' relating to whether or not information has been collected.
The outline with A1 and the outline without B. To illustrate that a1 is an electronic wearable device and is wrist-mounted, there is an outline drawing of a1 (i.e., fig. 1); since the partial configuration diagram of W1 can be described by including the partial configuration diagram of a1 and the partial configuration diagram of B, the external view of B is omitted.
F was previously stored in B with respect to example 1, and B provided F to C ". Because B is the communication device that first mates with a1 (i.e., a1 first makes a bluetooth connection with B, equivalent to a1 being integral with B), and because the cryptographic information must be "decrypted and/or verified" by a1 (i.e., a1 dominates W1), it can be said that "B replaces a1 to communicate with C"; also, because "F is stored in B in advance" is for convenience and quickness of the field payment, "F is stored in B in advance," B provides F to C "is equivalent to" F is stored in a1 in advance, "a 1 provides F to C (then" communication between B and C "is equivalent to" communication between a1 and C ").
Temporary connections are made with respect to W and C. If the temporary connection is a wireless connection, the wireless connection is a close range connection.
"providing a password letter to W concerning whether or not information has been collected" is made with respect to D. Said "D does at least 'provide E to C', C does at least 'provide E to W'" belongs to "D does 'provide a cryptographic letter'" to W relating to whether or not information has been collected.

Claims (6)

1. An apparatus for on-site payment, characterized by: the device W can at least collect money in a series connection type network; the system comprises a payment site, a payee, W and a communication module, wherein W is located at the payment site and belongs to the payee, W at least comprises electronic wearable equipment A, A at least comprises a receiving module V, A comprises a scrambler U, and W is provided with the communication module S which can be temporarily connected with communication equipment C of the payer located at the payment site; wherein when W and C are temporarily connected and C is networked with a third party electronic payment platform D, then two-way communication is carried out between W and C/between C and D to help D take charge of executing 'C transfer to W'/D at least 'providing W with password information relating to whether or not the information has been collected'; wherein V at least receives the password message; wherein U at least performs ' decryption and/or verification ' of the password message ', and then a itself at least confirms ' information relating to whether or not payment has been received ' and informs the payee.
2. The apparatus of claim 1, wherein: the device for on-site payment W1 is at least capable of "in-line" collection; the system comprises a W1, an electronic wearable device A1, a communication device B, a receiving module V1, a cipher device U1, a communication module S1, a communication module S1, a communication module B1, a communication module B1, a communication module S1 and a communication module C, wherein the W1 is located at a payment site and belongs to a payee, the W1 at least comprises the electronic wearable device A1 and the communication device B, the A1 at least comprises the receiving module V1, the A1 is provided with the cipher device U1, the A1 is in non-temporary connection with the B, the W1 is provided with the communication module S1 capable of being in temporary connection with the C, and the S1 belongs to the B, namely the B can be in temporary connection with the C; wherein when B is temporarily connected to C and C is networked to D, then two-way communication is made between W1 and C/between C and D to facilitate D being responsible for performing "C transfers to W1"/D at least "providing a cryptographic token to W1 relating to whether or not information has been collected"; v1 at least receives the cipher information transferred before C and after B; wherein, the U1 at least performs ' decryption and/or verification ' of the password message ', and then the A1 confirms at least ' information related to whether or not the money has been collected ' and informs the payee; a1 belongs to A, V1 belongs to V, U1 belongs to U, and W1 belongs to W.
3. The apparatus of claim 1, wherein: the device for on-site payment W2 is at least capable of "in-line" collection; w2 is an electronic wearable device a2, a2 at least has a receiving module V2, a2 has a scrambler U2, W2 has a communication module S2 capable of being temporarily connected with C, S2 is at least V2, that is, a2 can be temporarily connected with C, so as to help W2 at least to collect money in a "serial networking" manner; wherein, when a2 is temporarily connected to C and C is networked to D, then two-way communication is made between W2 and C/between C and D to facilitate D being responsible for performing "C transfers to W2"/D at least for "providing password information to W2 regarding whether information has been collected"; wherein V2 receives at least the secret code transferred by C; wherein U2 at least performs ' decryption and/or verification ' the password message ', and then a2 itself at least confirms ' information concerning whether or not it has been collected ' and informs the collection party; a2 belongs to A, V2 belongs to V, U2 belongs to U, and W2 belongs to W.
4. The apparatus of claim 1, wherein: a is wrist type.
5. The apparatus of claim 1, wherein: the temporary connection between the W and the C means that the W and the C are connected in an NFC read-write mode, a shooting and scanning image mode or an infrared mode.
6. The apparatus of claim 2, wherein: the non-temporary connection between A1 and B means that A1 and B perform non-temporary Bluetooth connection.
CN202121944291.1U 2021-08-18 2021-08-18 Device for on-site payment Active CN217213739U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202121944291.1U CN217213739U (en) 2021-08-18 2021-08-18 Device for on-site payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202121944291.1U CN217213739U (en) 2021-08-18 2021-08-18 Device for on-site payment

Publications (1)

Publication Number Publication Date
CN217213739U true CN217213739U (en) 2022-08-16

Family

ID=82751953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202121944291.1U Active CN217213739U (en) 2021-08-18 2021-08-18 Device for on-site payment

Country Status (1)

Country Link
CN (1) CN217213739U (en)

Similar Documents

Publication Publication Date Title
US9990625B2 (en) Establishing trust for conducting direct secure electronic transactions between a user and service providers
CN217213739U (en) Device for on-site payment
CN113554430A (en) Device and method for on-site payment

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant