WO2011137558A1 - 网络金融装置和方法 - Google Patents

网络金融装置和方法 Download PDF

Info

Publication number
WO2011137558A1
WO2011137558A1 PCT/CN2010/000622 CN2010000622W WO2011137558A1 WO 2011137558 A1 WO2011137558 A1 WO 2011137558A1 CN 2010000622 W CN2010000622 W CN 2010000622W WO 2011137558 A1 WO2011137558 A1 WO 2011137558A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic
network
bank
securities
business
Prior art date
Application number
PCT/CN2010/000622
Other languages
English (en)
French (fr)
Inventor
刘文祥
Original Assignee
Liu Wenxiang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu Wenxiang filed Critical Liu Wenxiang
Priority to PCT/CN2010/000622 priority Critical patent/WO2011137558A1/zh
Publication of WO2011137558A1 publication Critical patent/WO2011137558A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Definitions

  • the present invention relates to network technology (Network Technology), information technology (Information Technology, IT), computer technology (Database Technology), Internet (Internet), Radio Frequency Identification (RFID) technology, Integrated Circuit (IC) technology, information display technology, banking technology, securities technology, insurance technology, electronic money technology, etc.
  • Internet finance is also known as auto finance, smart finance, technology finance, and modern finance.
  • Internet finance will be widely used in financial fields such as banking, securities (including stocks and futures), insurance (including life and property); they are online banking, online securities, and online insurance.
  • Internet finance will be widely used in various modern financial payment and clearing systems; providing various financial information value-added services; providing different financial risk warning functions; making banking, securities, insurance and other financial institutions versatile, international, intensive and Diversified development.
  • the electronic reader/writer can also be applied to other industries such as sales, manufacturing, institutions, library management, and warehouse automation management.
  • IC cards or optical storage cards do not display the messages or information contained in the paper documents of the financial system they represent, and are not true credentials.
  • the electronicization of various businesses of the financial system is mainly based on the internal private networks of financial enterprises.
  • This kind of financial business based on private networks is called e-finance business, referred to as e-finance.
  • e-finance For example, electronic payment, electronic check, electronic credit card, electronic cash, etc.
  • the electronic payment schemes introduced by various financial units are different.
  • the Secure Electronic Transaction (SET) mechanism the electronic non-secure payment system and the electronic secure payment system scheme, which are directly involved in the bank, are used by banks. Not only is the waste repeated, but the credit card processing is not uniform.
  • SET Secure Electronic Transaction
  • the electronic non-secure payment system and the electronic secure payment system scheme which are directly involved in the bank, are used by banks. Not only is the waste repeated, but the credit card processing is not uniform.
  • each financial card is self-contained and can only be used for settlement in the same financial private network. It cannot be used for settlement between different financial private networks, which brings inconvenience to users.
  • Pure e-banking is "a bank with only one site”; using telematics; all financial services can only be carried out at one site.
  • This pure e-banking is an auxiliary service for other non-online branches, such as financial inquiries, transfer, etc.
  • the automated financial service site of a certain unit scattered in each place can establish an internal dedicated unit by renting an expensive dedicated line or a virtual private network (VPN) technology.
  • Computer system wide area network
  • Virtual private network VPN technology after application processor and Virtual Local Area Network (VLAN) technology, actually turns into peer-to-peer communication. It has two network layout structures: central radiation layout and full network cloth Bureau.
  • the central radiation layout is connected to many remote sites by a central site.
  • the user-side router at the central site location is very expensive and its price is related to the number of remote sites connected.
  • its delay time greatly exceeds the packet delay time when two stations are in direct communication between points.
  • the number of tunnels that the full network layout needs to support increases geometrically as the number of sites increases. It is unrealistic for a site with a lot more sites.
  • Every user edge router connected to the Internet must take security measures such as a firewall to ensure the security of each site. But each firewall must be open to the vendor to access the device, which is itself a security risk. When the network is large, managing the firewall will become difficult.
  • SSL Secure Socket Layer
  • the "Cloud Security” system needs to solve four major difficulties: it requires a large number of clients, requires professional anti-virus technology and experience, requires a lot of capital and technology investment, must be an open system and requires a large number of partners to join. .
  • Wireless terminals access stations, wireless computer equipment, wireless switches, or wireless routers all contain wireless transceivers.
  • the public network referred to below is generally the Internet (Internet) or / and wireless public network.
  • the object of the present invention is to implement a heterogeneous network or a homogeneous network by using a network and grid technology to connect a local area network (LAN) or a private network of a financial unit through a public network.
  • a smart display of the financial system manufactured by the combination of an information display (Information Display) and an integrated circuit domain optical storage card is called a financial electronic smart display, or simply an electronic display.
  • Financial networks, electronic displays and electronic readers together constitute online finance.
  • Internet finance draws on the technology of a “high-reliability” financial interoperability between the internal networks of financial institutions through the Internet.
  • the automatic financial business jointly carried out by financial networks, electronic displays and electronic readers is online finance.
  • Internet finance is an inevitable trend of modern development and plays an important role in promoting economic development. Financial reform must rely on online finance to be successful. Internet finance will be an incalculable revolution for the whole society.
  • the Internet can be used anytime, anywhere, convenient, instant interaction, etc. These provide good technical support for the interaction and sharing of various network finance information flows, transaction flows, capital flows, logistics, etc., all-weather cross-regional and low-cost processing. .
  • a general-purpose computer that has the most complete external service function of the financial unit or that is designated by the financial unit according to the needs of the external service is called a general-purpose computer of the network's advantageous function, and is referred to as a superior machine.
  • This network is called a good machine network.
  • the server is a server-class computer; it is also a host computer with a Network Address Translation (NAT) program module in the U-machine network.
  • NAT Network Address Translation
  • a general-purpose computer that is interconnected with a good machine (or its network) and another public network (including the Internet) and controls the interoperability of the two networks is called a general-purpose computer that identifies the identity (referred to as the identification machine (Fig. 1).
  • Another public network (not including the machine) that is connected to the machine is called a network.
  • the discriminator is equipped with standard program modules such as "Program for Checking Programs", “Source Encryption Program” and “Stop Decryption Program”. Because the machine is equipped with the "Programs for Checking Programs” module, it can clear and defend against the "virus” of the computer and protect the network of the connected machines connected to it; therefore, the machine becomes the “doctor” of the network of the machine. The doctor is called the doctor of the network of the machine, referred to as the "doctor".
  • the machine is a client-class computer or a peer (Peer); it has a computer in a network of a financial unit sent to (or receives) a computer in another network of the financial unit. After the information is encrypted (or decrypted), it is forwarded to the Internet (or forwarded to the receiving USB network) and the program that the financial unit can externally (or the browser).
  • the discriminator can also have a program for processing various information streams and the like, and can concurrently run a plurality of clients (clients) and servers (servers).
  • the machine can also contain anti-virus software or programs that handle various forms of information flow.
  • the machine can also contain router functions. It can be connected directly to the Internet line.
  • the machine contains "high-trust” security software. It is correct, reliable, friendly, maintainable, and expandable.
  • the firewalls (including hardware devices, related software codes, and security policies) set up between the inline network and the public network of the existing financial institution are easily attacked by the hacker (HACK) using "anti-port” technology, and invaded behind the firewall.
  • the internal network of computers can pose a serious threat to the internal network.
  • Businesses carried out by enterprises and other units through a dedicated computer network are called electronic services. For example, electronic securities, electronics agriculture, electronics factories, electronic schools, electronic hospitals, etc.
  • e-finance For example, e-banking, e-insurance, e-securities, etc.
  • Network services For example, network securities business, network agriculture business, network factory business, network school business, network hospital business, etc.
  • a unit that can perform network services is called a network unit.
  • a network unit For example, online financial institutions, network factories, network schools, network hospitals, network business units, online banking, network insurance, network securities, etc.
  • Each of the high-performance networks of a financial unit or one of the other dedicated networks in the other private network is connected to an output/input interface circuit of a separate machine through an input/output interface circuit; each of the detectors passes through the router.
  • the group established the financial institution's proprietary wide area network, called the financial network's proprietary network, referred to as the financial network ( Figure 1).
  • financial network financial services using electronic displays and/or electronic readers are online finance.
  • the information sent by the high-performance network of the financial unit or a computer of the private network is sent to the identification machine connected to the superior machine of the network for encryption, and then transmitted through the public network (generally referred to as the Internet), and then at the receiving end.
  • the other machine network or the private network is decrypted on the machine, restored to the original information, and after being checked by the virus, forwarded to the receiving computer of the network.
  • the information sent by the Internet to the computers in each of the high-performance network is decrypted by the receiver to be restored to the original information, and after checking the virus to confirm its security, it is forwarded to the receiving computer to ensure information security.
  • "Security" protection Every node on the network (discrimination machine) contains security standard software in the machine.
  • Every node on the network has the same importance as all other nodes, and has the right to send, transmit and receive information; each data packet indicates the originating node address and the terminating node address.
  • Each of the high-performance networks of a financial enterprise records the status of each financial business separately, and performs a final summary on a daily basis. The result informs the important high-performance network of the financial enterprise; it is summarized and saved.
  • the existing virtual private network technology cannot avoid hackers from bypassing the identity authentication and authentication mechanism, and disguising the identity to illegally access the internal resources of the financial unit.
  • the system backup automation of the financial network is composed of the backup system in the U-machine network.
  • Its structure ( Figure 3) can consist of a backup client, a backup server, a media server, a backup storage unit, and backup management software.
  • the electronic display (Fig. 2) has a microprocessor (Microprocessor Unit, CPU for short), an input button, a small display, and the like. Its integrated circuit also has circuits for data memory (EEPR0M), working memory (RAM), and program memory (EPR0M).
  • EEPR0M data memory
  • RAM working memory
  • EPR0M program memory
  • the electronic display program contains standard procedures for the identification of the machine and a complete information check program that addresses key technical issues such as security, confidentiality, authenticity, anonymity and integrity.
  • Electronic displays can also add hardware and software such as identity authentication as needed; ensure the separability of their information transmission.
  • Each electronic display has an input interface circuit and/or an output interface circuit that match each other. They are located at different locations on the electronic display; they are typically located on either side of the electronic display; and the output plug (or slot) interface circuit can be inserted into the interface circuit of the input slot (or plug). They can communicate financially directly through information exchange.
  • Electronic displays require both online information processing and online authorization processing. So allow it to be used offline.
  • the electronic display is high enough to hold the user's record of each financial transaction in its memory.
  • the electronic display can not only replace various IC cards such as credit cards, debit cards, composite cards and cash cards; but also can directly exchange financial business or electronic money with each other.
  • the electronic display can also be written to the holder's deposit balance.
  • the existing paper coins not only need to use special paper made by anti-counterfeiting technology, but also can not eliminate fake coins.
  • the electronic display can also have: 1. 1 Electronic display can access electronic money through the payment of the financial browser's network. It can also input or output electronic money to other electronic displays. Electronic readers can also store electronic money for electronic displays.
  • the electronic display can be used on the market as a coin with all functions of electronic money or paper money.
  • the electronic display CPU can use a new method for encrypting, completing, and authenticating information.
  • the electronic display is protected by a password, and the holder's real money is stored in the financial account. It can also be used as a debit card. If the electronic display is lost or damaged, the holder's money is not lost.
  • the second-generation ID card can be swiped through the ID card on the browser of the financial unit.
  • the browser can enter information such as the number of the user's ID card and his or her own photo into the electronic display. These materials can be swiped once. When you repeat the financial business with the electronic display later, you don't have to re-brush it.
  • the two electronic displays and/or electronic readers operate independently of the software in their memory. They can be connected directly to the output interface via their different input interfaces.
  • This electronic display has all the logic functions of reading and translating, and can independently check the legality of the respective electronic display and the identity of the holder.
  • the output (or input) plug of the electronic display can also be inserted into the input (or output) slot of the electronic reader to directly exchange information.
  • the built-in electronic display is plugged into a dedicated plug on a financial browser or electronic reader.
  • the browser or electronic reader/writer can be directly connected to the financial network through a dedicated line, telephone line, and the like.
  • Each financial business is transmitted by the electronic display to the financial superior network for processing in real time, and the files can be updated in real time.
  • the electronic display recognizes the identity of its holder and can also use biometric techniques such as fingerprint scanning, voice confirmation and iris authentication.
  • 6 electronic displays can also use programs such as digital signatures and access control policies; and use the application layer to implement security level management of various information transmitted. For some parts of a message, it can be securely encrypted according to its different security level.
  • the security control software stored in the electronic display may also have the function of verifying the personal identification number of the electronic display holder and determining the legality of the holder. It can contain and display personal second-generation ID number and personal photos, and implement real-name system.
  • the existing IC card certificate can not only display the information of the certificate, but also can not eliminate the phenomenon of forging the IC card.
  • Electronic displays are easy to manufacture, low in cost, long in service life, and can be reused. If it is lost, it can be reissued.
  • the electronic reader/writer (Fig. 2) consists of a memory, controller, reading and writing device, display, etc. with identification and control software. Its controller is capable of encoding, encrypting, modulating and demodulating, decrypting, decoding, etc. the information. Electronic readers can pay for electronic money through online payment. It can also recharge electronic money for electronic displays.
  • the electronic reader program contains a standard program for the identification machine, and has an information encryption system and software for preventing computer viruses.
  • the electronic reader/writer has all the logic functions of reading and translating electronic displays, and can also have the function of independently verifying the legality of the electronic display and the identity of the holder. When a legitimate electronic display passes, the electronic reader/writer gives a prompt sound and is indicated by text on the liquid crystal display. If a real-name electronic display is used, the electronic reader/writer can also display the upper body photo of the holder's ID card. When a forged or failed electronic display passes, the electronic read/write machine generates an alarm sound as a reminder and displays "forgery or invalidation" on its liquid crystal display.
  • the electronic reader/writer solves four key technical problems of information security, authenticity, anonymity and separability.
  • Electronic readers can be made in a variety of shapes and sizes; they are typically made in a fixed, smart shape or portable electronic reader.
  • the electronic reader can also have:
  • the security control software stored in the electronic reader/writer may also have the function of verifying the personal identification number and determining the legality of the holder. It can contain and display the personal second-generation ID number and personal photos, and implement the real name system.
  • Non-contact electronic readers without high-energy batteries can be powered wirelessly by electronic displays, and then generated by the voltage regulator circuit in the electronic reader to generate the DC voltage required for the operation of the integrated circuit chip.
  • the electronic display does not need to be equipped with a battery, and can be powered by the electronic reader/writer wirelessly.
  • the electronic controller system of the electronic reader/writer fully utilizes the standardized, convenient and efficient information operation function.
  • the electronic display can be recognized by the electronic reader and the electronic reader can be activated.
  • the financial business system uses an electronic reader/writer as an unmanned automatic and self-service cashier device; the user can use the electronic display to directly access the electronic money and the online or offline mode on the electronic reader/writer. Financial transactions such as transfers.
  • the electronic readers working alone are not connected to the financial network (generally the network of excellent machines). Electronic readers rely on software in their memory to run independently. It interacts with the host of the service by periodically swapping floppy disks. This electronic reader has all the logic functions of reading and translating its electronic display, and can independently verify the legality of the electronic display and the identity of the holder.
  • the electronic reader/writer operating online is directly connected to the financial network through special lines and telephone lines. Each business is transmitted to the financial network in real time by an electronic reader for authentication and processing, and the files can be updated in real time.
  • the electronic reader/writer can identify the electronic display holders, and can also use biometric technologies such as fingerprint scanning, voice confirmation and iris authentication.
  • E-readers can be used to avoid fraudulent fraud, either alone or online.
  • 6 electronic readers can also use programs such as digital signatures and access control policies; and use the application layer to implement security level management for all kinds of information transmitted.
  • Electronic readers can also be applied to the field of sales, production, institutions, library management, warehouse automation management.
  • electronic readers can have a variety of standard interface circuits, but also some dedicated interface circuits, such as interface circuits with magnetic cards and IC card readers, bar code readers and electronic scales.
  • the existing electronic system of electronic readers is built on a closed computer network dedicated to financial services and cannot be run on an open Internet.
  • a browser with banking functions called a bank browser.
  • Bank of a certain bank browser cash dispenser (CashDispenser, CD), Automated Teller Machine (ATM), Automatic Cash Dispenser, Automatic Depositor (AD), Account Inquiry Terminal (Public Utility Terminal), Telephone Banking System, Multi-Media Service Inquiry system, electronic reader, server, server and database server Etc.
  • cash dispenser CashDispenser, CD
  • ATM Automated Teller Machine
  • ATM Automatic Cash Dispenser
  • AD Automatic Depositor
  • Account Inquiry Terminal Public Utility Terminal
  • Telephone Banking System Multi-Media Service Inquiry system
  • electronic reader server
  • server and database server Etc. using the network topology technology, the network of the media (which can be wired or wireless) is connected, which is called the electronic service network of the bank's branch office, referred to as e-banking.
  • the excellent machine or a host in the e-banking including the banking system "expert think tank software"; can provide a variety of banking business services. It can also provide a variety of banking information value-added services; it can also provide different bank risk warning functions. E-banking can develop in the direction of versatility, internationalization, intensification and diversification.
  • the bank browser can directly access electronic money in the electronic bank.
  • E-banking uses wireless networks to support e-banking's business development and service convenience.
  • e-banking can also offer three new banking services: public information services, investment advisory services and integrated business services.
  • a bank browser is a workstation that provides a memory and a liquid crystal display (such as a touch screen) with browser software and deposit and withdrawal software for people to use. It contains a computer program that accesses and displays information (containing multiple applications and uses the program identified by the object name to resolve the object).
  • the automatic teller machine pays through the Internet and can carry out the savings business of paper money.
  • E-banking can also have:
  • E-banking can be a local area network, a metropolitan area network or a wide area network. It can be a wired network or a wireless network.
  • AD Automatic deposit machine
  • a terminal for deposit only It can be combined with a browser to form a bank browser with deposit and payment capabilities. It can also store and retrieve electronic money for electronic displays.
  • Each electronic bank can independently undertake the various businesses of the corresponding branch bank.
  • E-banking can integrate the market of e-banking, e-banking, e-banking and other industries, reduce the duplication of labor for all kinds of financial enterprises, expand the innovation space of bank companies, and provide more tailor-made banking services to customers.
  • Cash dispensers and deposit machines are terminal terminals for withdrawal and deposit, respectively. They can be combined with a bank browser into a bank browser with a deposit and deposit function. That is, they can also be combined into an automatic teller machine (ie access to paper money).
  • the payment method of the electronic banking system of the existing commercial banking system is established on a closed computer-specific computer network and cannot be operated on an open Internet.
  • a business browser with insurance and security system functions called an insurance browser.
  • An insurance browser Several insurance browsers, cash dispensers, ATMs, automatic teller machines, automatic teller machines, superior machines, electronic readers and database servers of an insurance institution, using network topology technology, through the medium (can be wired or wireless) a network of connected machines, called the electronic service network of the branch of the insurance institution, referred to as electronic insurance.
  • the superior machine or a host in the electronic insurance can provide various insurance business services.
  • E-insurance also provides a variety of insurance information value-added services; it also provides different insurance risk warning functions; e-insurance can be developed in the direction of versatility, internationalization, intensification and diversification.
  • the insurance browser is a workstation that provides people with a browser software and a deposit/withdrawal software, a liquid crystal display (such as a touch screen). It contains a computer program that accesses and displays information (containing multiple applications and uses the program identified by the object name to resolve the object).
  • E-insurance uses a wireless network to support the e-insurance business and service convenience.
  • the automatic teller machine pays through the network, and the automatic money machine can be used to access the insurance premium of paper money.
  • Electronic Insurance “Expert Think Tank Software” can execute insurance plans for thousands of businesses and millions of people. This means that every employee's salary or personal situation changes, and e-insurance has to update its data. The process of this smart insurance business:
  • the insured or its client informs the electronic insurance of the data that needs to be changed by electronic means, e-mail or electronic facsimile. After receiving this data, e-insurance enters this data into the database. Such a process creates a solid process between e-insurance and customers. Since the necessary information is stored in the insured or its principal and the electronic insurance system, new data can be re-formed by replacing the original data with electronic insurance.
  • Electronic insurance can also have:
  • Electronic insurance can be a local area network, a metropolitan area network or a wide area network. It can be a wired network or a wireless network.
  • the automatic teller machine can be used as a terminal for deposit and withdrawal. It can be combined with a browser to form an insurance browser with deposit and payment functions. It can also store electronic money for electronic displays.
  • Each electronic insurance can independently assume the business of a branch insurance institution.
  • E-insurance can integrate the market of e-banking, e-securities, e-insurance and other industries, reduce the duplication of labor for all kinds of financial enterprises, expand the innovation space of insurance companies, and provide more tailor-made insurance services to customers.
  • Cash dispensers and deposit machines can be used only for withdrawals and deposits. They can be combined with an insurance browser to form an insurance browser with a deposit and deposit function. That is, they can also be combined into an insurance deposit and withdrawal machine (ie access to paper money).
  • the Insurance Browser can also access electronic money from other electronic insurance through the Internet. 4. 8 The Insurance Browser can also store electronic money for electronic displays.
  • the existing insurance institution system payment method is established on a closed computer network dedicated to insurance business and cannot be operated on an open Internet.
  • a business browser with a securities system function called a securities browser.
  • a securities browser a number of securities browsers, cash dispensers, ATMs, automatic teller machines, automatic teller machines, superior machines, electronic readers and database servers of a securities company, using network topology technology, through the medium
  • the network of connected computers (which can be wired or wireless) is called the company's branch electronic business network, referred to as electronic securities.
  • the superior machine or a host in the electronic securities can provide various securities business services. It can also provide various securities information value-added services; provide different securities risk warning functions; and enable securities companies to develop in the direction of versatility, internationalization, intensification and diversification.
  • the securities browser is a workstation that provides people with a browser software and a deposit/withdrawal software, a liquid crystal display (such as a touch screen). It contains a computer program that accesses and displays information (containing multiple applications and uses the program identified by the object name to resolve the object).
  • the Securities Browser can use the Automated Teller Machine (ATM) software to access paper money for securities payments.
  • ATM Automated Teller Machine
  • the securities browser can pay through the network and use the ATM to access the securities of the paper money.
  • the "Expert Think Tank Software” in e-securities can execute securities plans for thousands of businesses and millions of people. This means that every member of the securities investment situation changes, electronic securities can update its data.
  • the securities investor or its principal informs the electronic securities of the data that needs to be changed by electronic means, e-mail or electronic facsimile. After the electronic securities receive the data, they enter the data into the database. Such a process creates a solid process between e-mail and customers. Since the necessary information is stored in the securities investor or its client and electronic securities system, new data can be re-formed by replacing the original data with electronic securities.
  • Electronic securities can also have:
  • Electronic securities can be local area networks, metropolitan area networks or wide area networks. It can be a wired network or a wireless network.
  • the automatic teller machine can be used as a terminal for deposit and withdrawal. It can be combined with a browser to form a securities browser with deposit and payment functions. It can also store electronic money for electronic displays.
  • Each electronic securities can independently assume the business of a branch securities company.
  • Electronic securities can integrate the market of e-banking, electronic securities, electronic securities and other industries, reduce the duplication of labor of various financial enterprises to the same customers, broaden the innovation space of securities companies, and provide more tailor-made securities services to customers.
  • the Securities Browser can directly access electronic money from electronic securities. 5. 7 The Securities Browser can access electronic money from other electronic securities via the Internet.
  • Cash dispensers and depositing and dispensing machines are terminal machines for withdrawal and deposit only. They can be combined with a securities browser to form a securities browser with a deposit and deposit function. That is, they can also be combined into a securities deposit and withdrawal machine (ie access to paper money).
  • the existing securities company system payment method is based on a closed computer network dedicated to securities business and cannot be operated on an open Internet.
  • Each bank's electronic bank (or its superior machine) is connected to the identification machine.
  • the identification machine is connected to the router on the public network through the medium (which can be wired or wireless), and is constructed as the bank's "high”. "Trusted" banking proprietary WAN, known as the banking network ( Figure 1).
  • the banking business using electronic displays and/or electronic readers on this network is online banking.
  • Each electronic bank is logically isolated from the public network through the interface circuit of the discriminating machine; and through the control function of the discriminating machine, each electronic bank interoperates through the public network. All e-banking can ensure the security of the banking business and the authenticity, reliability and confidentiality of the information; fundamentally prevent some people from using the network to implement frauds such as banking.
  • the customer plugs the plug of the electronic display of the online bank (also the power switch of the browser) into the dedicated slot of the electronic display of the business browser of the electronic bank, and clicks the webpage on the business browser to enter the webpage of the business station. According to the page prompt, after entering the information for conducting business business, select the relevant information you need.
  • the customer deposits on the online bank's cash deposit machine, goes to item 5 to write the content of the electronic display; or selects the electronic payment settlement tool, such as electronic display, electronic wallet, electronic cash, electronic check or electronic bank account number, etc. And get authorized use by the bank, on the page of the business browser, according to the prompt of the web page, enter the bank account number and password, and encrypt the bank payment information.
  • the electronic payment settlement tool such as electronic display, electronic wallet, electronic cash, electronic check or electronic bank account number, etc.
  • the electronic bank in the electronic bank checks and confirms the customer's business information, and forwards the relevant encrypted customer payment information to the payment gateway, until the bank's back-end business server of the bank-specific network confirms, in order to obtain electronic information from the bank.
  • the currency issuer verifies that the customer is authorized to pay the funds.
  • the confirmation service and the payment settlement success information are sent to the browser and the superior machine of the electronic bank through the established encrypted channel communication via the payment gateway.
  • the electronic bank's superior machine confirms the business; the customer has input the business information to the customer's electronic display after the payment of the deposit machine or the settlement success information sent by the bank, and sends the customer a payment to the service browser; or the network payment is successful. And business completion information; notify the customer to unplug the electronic display.
  • the method must have a certain deposit in the account of the account bank (hereinafter referred to as the customer bank).
  • the merchant has an account at the deposit bank (hereinafter referred to as the merchant bank) and knows the public key of the bank.
  • the merchant bank knows the customer's bank's public key and the merchant's public key and merchant password.
  • the customer bank knows the merchant bank's public key and the customer's public key and customer password.
  • the merchant bank has a settlement account at the customer bank.
  • the client connects to the Internet with a client (or browser), enters the merchant's web page with a web browser, and selects the relevant information, such as the product name and price or service price, according to the page prompt. Then choose the electronic payment settlement tool, such as electronic display, credit card, e-wallet, e-check or electronic money.
  • the customer communicates this information with their home address or mailing address; to the merchant via the Internet.
  • the merchant's identification machine checks and confirms the customer's business information, and transfers it to the server (supercomputer).
  • the superior machine encrypts the merchant's account and password with the merchant's private key, and the ciphertext is used as the merchant's digital signature. , with the price information of the business and the name of the merchant bank, transmitted to the customer via the Internet.
  • the customer bank decrypts the ciphertext with its own private key, and obtains the plaintext, the merchant digital signature and the customer digital signature sent by the client; and then decrypts the customer digital signature with the customer public key.
  • the customer bank checks the decrypted customer account number and password with the data retained by the customer, and confirms that it is the information sent by the customer after it is correct.
  • the customer bank encrypts the settlement account and password of the merchant bank in the customer bank with its own private key as the digital signature of the customer bank; then encrypts the payment amount, the customer bank digital signature and the digital signature of the merchant with the merchant bank public key. Send to merchant bank.
  • the merchant bank After receiving the ciphertext of the customer's bank, the merchant bank decrypts the ciphertext with its own private key, obtains the plaintext information sent by the customer's bank and its digital signature, and then decrypts the digital signature of the customer's bank with the customer's bank public key. , the confirmation is issued by the customer bank. The merchant bank then uses the merchant's public key to decrypt the merchant's digital signature. If successful, the confirmation is issued by the merchant.
  • the customer receives the goods or services, encrypts the payment confirmation information and password with his private key as his digital signature, and sends it to the customer bank.
  • the customer bank decrypts the ciphertext with the customer's public key and obtains the information of the confirmed payment sent by the customer.
  • the customer bank subtracts the purchase money or service payment from the customer's account in the bank account, adds the merchant bank to the settlement account of the customer bank, and informs the merchant bank to add the payment to the merchant account.
  • the conditions required for a customer to use the telephone line for business and network services are the same. That is, the customer (or merchant) and its bank of deposit, each has a pair of keys (public key and private key); the customer has a certain deposit and password in the account bank (hereinafter referred to as the customer bank); and knows the bank's public Key, etc.
  • the general process of using the telephone line for business is: The customer uses a modem to connect the computer to the telephone line, and transmits the browser page of the network merchant to the screen of the computer through the telephone line; and then according to his own business or commodity demand , follow the instructions on this page and decide to choose the information you need.
  • Network transactions are the network payment methods used by enterprises and individuals to conduct online transactions. That is, the B2C type network payment method. A slight modification can be applied to network payment methods such as B2B, C2C, B2G, G2G, and C2G.
  • Some electronic payment settlement methods based on dedicated financial communication network platforms can all be attributed to B2B type network payment methods.
  • the existing pure online banking is unable to collect cash; it changes the way in which transaction records are kept, and it requires legal and customer confirmation; it also needs to cultivate the trust and loyalty of bank customers.
  • the electronic insurance (or its superior machine) of an insurance company is connected to the identification machine.
  • the identification machine is connected to the router on the public network through the medium (which can be wired or wireless), and is constructed into the company's " The highly trusted "insurance business proprietary wide area network, called the insurance network ( Figure 1).
  • the insurance business that uses electronic displays and/or electronic readers on this network is network insurance.
  • Each electronic insurance is logically isolated from the public network through the interface circuit of the discriminating machine; and the electronic insurance is interoperable through the public network through the control function of the discriminating machine. All electronic insurance can ensure the security of the insurance business and the authenticity, reliability and confidentiality of the information; fundamentally prevent some people from using the network to implement insurance business and other fraud.
  • the general flow of the user's electronic insurance business at the business station of a certain unit is the same as the business transaction process ( Figure 4) of the customer on the business station browser of a certain unit; the difference is the insurance premium paid by the insurance company's electronic insurance.
  • the process of paying premiums for cyber insurance services and network payments over the public network is basically the same as that for customers and merchants to conduct network services (Figure 5); the difference is that insurance premiums are paid in the insurance company's cyber insurance.
  • the existing private network consisting of various high-performance network interconnections of an insurance company located at a long distance must use expensive dedicated lines or virtual private networks.
  • Each electronic securities of a securities company (or its superior machine) is connected to the identification machine.
  • the identification machine is connected to the router on the public network through the medium (which can be wired or wireless), and is constructed into the company's " Highly credible" securities business proprietary wide area network, known as the securities network ( Figure 1).
  • the securities business that uses electronic displays and/or electronic readers on this network is online securities.
  • Each electronic security is separated from the public network logic through the interface circuit of the discriminating machine; and the electronic securities are interoperated through the public network through the function of the discriminating machine. All electronic securities ensure the security of the securities business And the authenticity, reliability and confidentiality of the information; fundamentally put an end to some people using the network to implement securities business and other fraud.
  • the general process of the user's electronic securities trading at the securities company's business station is basically the same as the customer's business transaction process on the business station browser of a certain unit (Fig. 4); the difference is that the securities company's electronic securities pay the securities fee.
  • the process of conducting securities transactions by the user through the public network for network securities transactions and network payments is basically the same as the network business between the customer and the merchant (Fig. 5); the difference is that the securities or transaction fees are paid in the securities of the securities company.
  • the existing securities company's firewall or virtual private network is not suitable for virus detection; it cannot protect against data-driven attacks; it cannot completely defend against various new attacks; it is its main defect.
  • the remote client of the financial unit can connect to the router on the public network through the medium (which can be wired or wireless), and can log in to the network of the financial unit of the financial unit to achieve "high The letter "interoperates with information.”
  • These systems consisting of a remote client, a high-performance network, and a public network are called financial unit access internet systems, referred to as access networks ( Figure 1). It is a system that is equipped with a standard operating program of a financial unit and, after connecting to a public network, is able to interoperate with the high-confidence information of the financial institution's superior network.
  • the information stream transmitted by the access network on the public network is encrypted information.
  • the access network can be used to provide remote users with "highly trusted” access to the financial network's superior network.
  • the information of the U-machine network in the access network needs to be encrypted by the modem, and then enters the remote client through the public network and undergoes decryption and computer virus check before entering the application area of the remote client; ensuring the confidentiality of the information. Sex, integrity and authenticity; and the ability to resist hackers and viruses attacking remote clients.
  • the access network of the Internet can handle the allocation of funds, exchange settlement, check balance, securities investment and financial market information for remote clients through the public network; it can also be used with commercial organizations, public utilities, electronic display issuers. Carry out various settlements; provide 24 hours of various financial services; achieve personalized and quality services.
  • the access network can also perform information processing in the following different ways:
  • the method of authorized access to be implemented refers to the access information on the public network, which is authenticated and authorized by the access machine to the client. That is, the access machine's discriminator must have a control list or control software that authenticates and authorizes the remote client.
  • the method of authorized access to be authenticated by the computer authentication means that the access information on the public network is authenticated and authorized by the client to authenticate the access network. That is, the remote client must have a control list or control software that authenticates and authorizes access to the network.
  • the information of the remote client needs to be checked or authenticated before entering the network of the machine; ensuring the confidentiality, integrity or authenticity of the information; and having the ability to resist hackers and viruses attacking the network. .
  • the information of the machine needs to pass the remote client's information integrity check or identity authentication before entering the remote client; ensuring the confidentiality, integrity or authenticity of the information; and resisting hackers and viruses attacking the client. Ability.
  • Access Network also provides more advanced services, including online shopping, purchase of travel tickets, travel tickets and other third-party services; online bill payment services; financial information services; content services for various investment tools related to bonds and securities, etc. .
  • Users or enterprises can also connect multimedia devices (including the identification program) such as mobile phones, fixed telephones, televisions, computers, etc., through the medium to the router of the public network, and then can log in to the network of the financial unit of the financial unit to realize " Highly trusted" information interoperability.
  • multimedia devices including the identification program
  • Remote multimedia equipment the combination of the superior machine network of the financial unit and the public network, also known as the financial unit remote access network system, also referred to as the access network. It is a multimedia device equipped with a standard program for the identification of financial units. After connecting to the public network, it can communicate with the high-performance network of the financial unit to perform "high-reliability" information interoperability.
  • the existing remote access virtual private network technology is incapable of many address spoofings for illegal internal resource access by masquerading remote access addresses; it is impossible to avoid hackers circumventing identity authentication and authentication mechanisms and destroying existing connections.
  • the input interface circuit and the output interface circuit of the electronic display are respectively located at different positions of the electronic display (generally located on two sides of the electronic display); and the output plug (or slot) interface circuit can be inserted into the input. Interface circuit for the slot (or plug). Then they can communicate directly through information exchange.
  • Electronic display can contain smart coin software. At this time, the electronic display can be used as an electronic coin or a paper coin. It is also known as an electronic coin hopper.
  • the electronic coin machine not only contains electronic money, but also can trade coins.
  • the electronic coin can be used as a coin, paid for and used and distributed in the market.
  • Electronic coin hoppers make "transactionless paperless” and “reduced cash flow” a reality. It has all the features of a paper coin.
  • the securities browser can pay through the network and use the ATM to access the securities of the paper money.
  • Electronic coin can replace paper money and financial cards. After the electronic money in the electronic money machine is used up, the electronic money can be charged into the electronic money machine through a financial browser or an electronic reader.
  • the electronic money in the electronic coin After the electronic money in the electronic coin has reached a certain amount, it can be stored in the account of the bank of the legal owner of the coin through a financial browser or an electronic reader.
  • Electronic coin hoppers can accept electronic money payment directly through dialogue, without the authorization of financial units.
  • Electronic coin dispensers electronic displays
  • Electronic coin dispensers can work in an independent or online manner:
  • the two electronic money registers operate independently of the software in their memory.
  • the input interface of one electronic coin device is directly connected to the output interface of another electronic money machine.
  • the output (or input) plug of one of the electronic coin registers is inserted into the input (or output) slot of another electronic coin machine, and the electronic money can be directly exchanged.
  • Each electronic coin hopper has the function of reading and translating all the logic of the other party, and can independently check the legality of the other party's electronic money hopper and the identity of the holder.
  • the electronic coin machine working online can be inserted into a dedicated plug (or slot) on a financial browser or an electronic reader/writer; the electronic reader can be directly connected to the financial line through a dedicated line, radio, telephone line, etc.
  • the unit's high-performance network is connected.
  • Each financial business is transmitted by the electronic money machine to the financial network for processing in real time, and the documents can be updated in real time.
  • the electronic coin can identify its holder, and biometric techniques such as fingerprint scanning, voice confirmation and iris authentication can also be used.
  • the electronic coin can completely replace all the functions of paper coins (including circulation function), and is a paperless coin.
  • FIG. 1 Schematic diagram of a proprietary WAN structure for financial units (banks, insurance, securities).
  • the high-performance machines in the internal network of the financial headquarters and its several financial branches, which are located in different geographical locations and cross-regions, are connected to the public network to establish a "high-reliability".
  • Information interoperable financial business proprietary network is also known as a proprietary WAN structure for financial units (banks, insurance, securities).
  • FIG. 2 Schematic diagram of the electronic display (or electronic reader). It consists of a memory with a recognition and control software, a microprocessor, and a read and write device as well as a liquid crystal display. Electronic displays can also have smart coin software.
  • Figure 3 Schematic diagram of the automation of the database system backup of the financial headquarters or important financial branches. Its structure can be composed of a backup client, a backup server, a media server, a backup storage unit, and backup management software.
  • Figure 4 Flowchart of the user performing business in an organization's electronic service station (the unit's high-performance network).
  • FIG. 5 The basic flow chart of the user's business through the financial network (including the bank network, insurance network, and securities network).
  • DETAILED DESCRIPTION OF THE INVENTION A number of high-performance networks (or their superiors) of a financial unit are connected to Internet routers by means of a computer, and the Internet is a financial network (Fig. 1). Its network services (such as network transactions and payments) are a form of financial business operation.
  • the financial unit can inherit the resources of the existing e-finance, ensure the utilization of existing resources and the normal operation of the existing internal private network; at the same time, it can formulate unified standards for network finance, ensure the standardization of software, hardware and communication, and There is room for future expansion of financial units.
  • the identification machines of the respective financial superior machine networks are equipped with the same standard procedures of "procedures for checking procedures", “source encryption programs” and “sink decryption programs”. In this way, each computer monitors the information coming in and out of the financial network and rejects illegal access to the various financial network.
  • the financial network meets interactive application and stability requirements for systems with numerous financially superior machine networks; interoperability; can distinguish different security requirements for each part of a specific file; can use public key infrastructure for authentication and confidentiality Key assignment.
  • each computer can also be equipped with the same "Encryption and Authorization Procedure for Financial Unit Identity Authentication" program, and each machine contains the IP address table of each other machine and the connected machine. An access control list for each computer name (or address) in the network. In this way, each computer monitors all information entering and leaving the financial network and rejects illegal access to the financial network.
  • Check program program Function: After receiving the plaintext information, the source end machine checks the information, finds the programs, arranges them together, and sequentially stores them in the external memory, and simultaneously presents them on the computer. On the display. If these programs are legitimate programs that are allowed to access them, the user will select the "Allow all” option when prompted for the first time. When the computer encounters these programs, it will not ask again and allow access. When the user is at If there is no reply within a certain period of time or if you select the "Do not allow” option, the machine will discard the program. When the "program” in the external memory is full, the oldest “program” is automatically discarded. The terminal computer runs this program separately.
  • Source Encryption Program The source end machine adds the symmetric encryption key after the plaintext information to be sent through the public network; input the combined data into the one-way hash function (Message Digest) to obtain the hash ( Hash) value (source hash value); Then add the source hash value after the plaintext information (excluding the key), encrypt it with the key, and change it into ciphertext; finally send the ciphertext to the sink .
  • Message Digest Message Digest
  • Hash hash value
  • source hash value source hash value
  • the sink-side discriminator decrypts the received ciphertext into plaintext with the shared key negotiated in advance, and obtains the plaintext information and the source-side hash value; the plaintext information (excluding the hash value) Adding a key later; inputting the combined data into a pre-agreed one-way hash function to obtain a hash value (sink-end hash value); the sink-side hash value is compared with the received source-side hash value; If the two hash values are the same; then it is confirmed that the information is sent from the legitimate source end, and the information is accepted; sent to the receiving computer in the sinking network, otherwise the information is discarded.
  • ACL Access Control List
  • Authentication controls who can access the internal proprietary network of the financial unit. Authorization defines what a user can do after gaining access to the network.
  • a new approach to authentication and authorization is to create a library of user or financial unit names, IP addresses, passwords, and authorization rights.
  • the financial unit uses the access control list in the discriminator to authenticate the user (referring to other financial business units, partner business units or remote users).
  • This list identifies different types of source (username) modem IP addresses and user passwords. Address-based authentication is guaranteed to take effect only if the username, IP address, and user's password are the same as the access control list.
  • the online financial backup system ( Figure 3) provides complete data protection.
  • Veritas NetBackup software uses a four-level hierarchy that is centrally managed to accommodate multiple application structures. Its technical features are flexible setup, disaster recovery, parallel processing, data reliability, ease of use, monitoring capabilities and system data recovery.
  • the ongoing business data is placed in the online storage (OnStore) device to ensure that the business data is read at any time.
  • OnStore online storage
  • Off Store offline storage
  • Storage Virtualization backup management software used by Internet Finance to provide a transparent storage system. It automatically backs up the inactive data in the archive backup directory to the near-line storage (NearStore) device according to the instructions of the main UF network, and automatically archives the historical data to the offline storage device.
  • NearStore near-line storage
  • the electronic display contains a microcontroller, an input button and a small liquid crystal display (Fig. 2), etc., which is essentially a monolithic microcomputer (referred to as a single chip microcomputer). It can also have RF transceivers and their associated circuitry.
  • the microcontroller has general-purpose computer functions such as reading and writing and processing information. Small LCDs typically range in size from 4 inches to 8 inches.
  • the financial network and the electronic display together form the online financial business system hardware.
  • the software of financial browsers and electronic displays all have software such as overwriting, encryption, modulation and demodulation, decryption, and decoding.
  • the financial browser also has identification software for secure encryption algorithms for electronic displays.
  • the electronic display uses a personal identification number (PIN) to identify the identity of the holder.
  • the important data in the electronic display is encrypted and the information identification code AC is added.
  • the online financial services system verifies the identification code to identify whether the electronic display has been tampered with and displayed on the display of the browser.
  • the integrated circuit of the electronic display includes basic components and circuits of a main microcomputer such as a microprocessor, a random access memory, a read only memory, an interrupt system, a timer/counter, and an input/output.
  • the circuits of all components are connected together by an address bus, a data bus and a control bus, and then communicated with the circuit of the external computer through the input/output interface circuit.
  • Microcontrollers on electronic displays have an important role in controlling the display of characters and images on the liquid crystal display. They are responsible not only for the overall coordination and control of the electronic display, but also for the control of reading and storing the digital and parameters of the electronic display.
  • the electronic display is in read-write mode and is different from the external data of the browser; it can be divided into two categories: contact and non-contact.
  • the contact electronic display On the surface of the contact electronic display, there are several gold-plated contacts.
  • the electronic display will communicate with the financial browser through these contacts for identification and authenticity.
  • the integrated circuit chip of the microcontroller in the contact electronic display (or financial browser read head) is connected to a metal contact chip containing the circuit board. When in use, it contacts the read head on the power-providing browser (or the electronic display that provides the power) through eight (or six) touch points on the chip. After the financial browser reads the data on the electronic display, its microprocessor determines whether the electronic display is valid. After the corresponding program processing, the microprocessor issues a read (write) command to the electronic display; after receiving the command, the electronic display passes its own central processor operation to determine whether it is an illegal financial unit. If it is not an illegal financial unit, the financial browser reads (writes) the electronic display. Otherwise, the electronic display rejects the read (write) command of the financial browser and sounds an alarm, and an "illegal financial unit" or the like appears on the liquid crystal display. The plug of the contact electronic display is inserted in the slot of the financial browser.
  • the electronic display of the financial network has a storage capacity of up to 64 to 256 KB, which is sufficient to store all the information required for the software, a financial transaction, and multiple financial transactions.
  • Its hardware has voltage and clock detectors, automatic freeze logic, anti-anatomy and other encryption measures; software has password protection, security encryption algorithms and other encryption methods. It can display the information needed for financial network financial services.
  • TDS Transition Minimized Differential Signaling
  • DVI digital signal interface
  • a display data channel (DDC) memory circuit is set.
  • the memory is an erasable and programmable read-only memory (EEPR0M) that stores display identification data, ie, electronic data of the display, such as a line/field frequency range, manufacturer, date, product serial number, Model, standard display mode and its parameters, device data and data required for operation.
  • the DDC memory of the network financial electronic display performs information exchange through the DDC serial data pin, the DDC serial clock pin and the external computer to complete the identification of the liquid crystal display. Only the external computer recognizes the liquid crystal display, and the two can work synchronously, coordinately, and stably.
  • the digital input interface circuit of the liquid crystal display in the electronic display of the network finance receives the TMDS digital signal outputted by the TMDS transmitter in the external computer; sends it to the TMDS receiver in the main board; and outputs the clock signal to the clock generator.
  • the digital signal is decoded and sent to the image scaling processor (SCALER) of the main control circuit for processing.
  • the main control circuit performs format determination on the input image signal, and performs operations such as scaling processing and image positioning on the image.
  • the processed line sync signal in the liquid crystal display main control circuit of the electronic display is sent to the phase locked loop type clock generator circuit to lock the generated clock pulse and the input line sync signal; the other circuit is sent to the screen display circuit (On Screen Display, 0SD:).
  • the line/field sync signal (HS, VS) required by the display circuit is not taken directly from the external input line/field sync signal, but is taken from the line/field sync signal output by the auto-control circuit.
  • the main control circuit sends the line/field sync signal to the display circuit, and the line/field sync signal generated in the image scaling processor (SCALER) according to the pre-programmed timing data, It can ensure that the LCD display can have normal on-screen display and menu display when there is no signal input.
  • SCALER image scaling processor
  • the digital signal of the electronic display of the network finance is processed by the image scaling processor (SCALER) of the main control circuit of the liquid crystal display, so that it can be adapted to the digital signal of the physical resolution of the liquid crystal panel, together with the digital line/field sync signal, sent to the liquid crystal panel.
  • the interface circuit converts the digital video signal into a digital video signal that meets the requirements of the LCD panel interface circuit.
  • the liquid crystal panel interface circuit of the electronic display transmits the converted digital video signal separately (if itself includes the display line/field sync signal) or together with the display line/field sync signal to the timing circuit and the drive control circuit of the liquid crystal panel; Characters and images are displayed on the LCD screen of the monitor.
  • the line/field sync signal received by the digital input interface circuit of the electronic display is sent to the microcontroller for energy saving management of the liquid crystal display, and the liquid crystal display is controlled to enter a normal operation, standby, suspend, and off state.
  • the liquid crystal display in the electronic display uses the DisplayPort interface circuit to realize a low-cost direct-drive liquid crystal display, and all signals can be input to the video processor of the main board with only one connection line.
  • the non-contact electronic display mainly consists of an RF antenna, a wireless transceiver module, an input button, and a liquid crystal display including a single chip microcomputer.
  • a non-contact electronic display without a high-energy battery can be powered wirelessly by an electronic reader/writer, and then generated by a voltage regulator circuit in the electronic display to generate a DC voltage (2 to 3 volts) required for the operation of the chip; Received (or sent to) the wireless signal of the electronic reader.
  • a non-contact electronic display with a high-energy battery the electronic reader can be powered wirelessly by an electronic display without a battery.
  • the circuit in the RF chip consists of three modules: interface circuit, access control and memory.
  • Electronic displays are truly reusable paperless vouchers; they can replace a wide variety of paper vouchers and various integrated circuit cards such as cash, checks, electronic cash, electronic credit cards, electronic checks, and more.
  • the electronic reader/writer program in network finance like the electronic display software, has the same software of adding, encrypting, modulating and demodulating, decrypting and decoding.
  • the electronic reader/writer also has encryption and decryption software for the secure encryption algorithm of the electronic display. It uses a personal identification number (PIN) to identify the identity of the holder.
  • PIN personal identification number
  • the important data in the electronic display is encrypted to add the information identification code AC.
  • the electronic reader/writer checks the identification code to identify whether the electronic display has been tampered with and displayed on the display of the electronic reader/writer.
  • the electronic reader/writer can be made into a fixed or mobile shape and different sizes; it is generally made into a fixed smart shape or a portable electronic reader/writer; the portable electronic reader is generally 8 inches to 14 inches in size; You can display photos of several users at the same time.
  • a microcontroller for an electronic reader/writer that contains basic components and circuits of a main microcomputer such as a microprocessor, a random access memory, a read only memory, an interrupt system, a timer/counter, and an input/output. Their circuits are connected by an address bus, a data bus, and a control bus, and then communicate with the circuits of the external computer through the input/output interface circuit. It is also a microcontroller. It has the important function of controlling the display of characters and images on the liquid crystal display on the electronic reader/writer, and is not only responsible for the coordination and control of the whole machine, but also for reading and writing and storing numbers and parameters.
  • TMDS Minimized Differential Signaling
  • DVI digital signal interface
  • a Display Data Chnnel (DDC) memory circuit is set.
  • the memory is an erasable and programmable read-only memory (EEPR0M) that stores extended display identification data, ie, electronic data of the display, such as a line/field frequency range, manufacturer, date, product serial number, Model, standard display mode and its parameters, device data and data required for operation.
  • extended display identification data ie, electronic data of the display, such as a line/field frequency range, manufacturer, date, product serial number, Model, standard display mode and its parameters, device data and data required for operation.
  • the DDC memory of the electronic financial reader of the network finance exchanges information through the DDC serial data pin, the DDC serial clock pin and the external computer to complete the identification of the liquid crystal display. Only when the external computer recognizes the liquid crystal display can the two work synchronously, coordinately and stably.
  • the digital input interface circuit of the liquid crystal display in the electronic financial reader of the network finance receives the TMDS digital signal outputted by the TMDS transmitter in the external computer; the TMDS receiver sent to the liquid crystal display main board; the clock signal of the output is sent to the clock generator.
  • the digital signal is decoded and sent to the image scaling processor (SCALER) of the main control circuit for processing.
  • the main control circuit performs format determination on the input image signal, and performs operations such as scaling processing and image positioning on the image.
  • the processed line sync signal in the liquid crystal display main control circuit of the electronic reader/writer is sent to the phase-locked loop type clock generator circuit to lock the generated clock pulse and the input line sync signal; the other circuit is sent to the screen display circuit (On Screen Display, 0SD).
  • the line/field sync signal (HS, VS) required by the display circuit is not taken directly from the external input line/field sync signal, but is taken from the line/field sync signal output by the auto-control circuit. Even if the liquid crystal display has no signal input, its main control circuit sends the line/field sync signal to the display circuit, according to the pre-programmed timing data, in the image scaling process.
  • the line/field sync signal generated in the SCALER ensures that the LCD display has normal on-screen display and menu display when there is no signal input.
  • the digital signal is processed by the image scaling processor (SCALER) of the main control circuit of the liquid crystal display to enable it to adapt to the digital signal of the physical resolution of the liquid crystal panel, together with the digital line/field sync signal, sent to the liquid crystal panel interface circuit, and the digital video
  • the signal is converted to a digital video signal that meets the requirements of the LCD panel interface circuit.
  • the liquid crystal panel interface circuit of the electronic reader/writer converts the converted digital video signal, alone (if it contains a digital display line/field sync signal) or together with the display line/field sync signal, to the timing circuit and the drive control circuit of the liquid crystal panel.
  • the line/field sync signal received by the digital input interface circuit of the liquid crystal display is sent to the microcontroller for energy saving management of the liquid crystal display, and the liquid crystal display is controlled to enter a normal operation, standby, suspend, and off state.
  • the LCD display of the electronic reader/writer uses the DisplayPort interface circuit to realize a low-cost direct-drive liquid crystal display, and all signals can be input to the video processor of the main board with only one connection line.
  • the contact type electronic reading and writing machine is mainly composed of an input button and a liquid crystal display including a single chip microcomputer.
  • the integrated circuit chip in the contact electronic reader is connected to a metal contact piece containing a circuit board. It is in contact with the read head on an electronic display that provides power through eight (or six) contact points on the chip.
  • the microprocessor determines whether the electronic display is valid. It is processed by the corresponding program, and the microprocessor issues a read (write) command to the electronic display; after receiving the command, the electronic display passes its own central processor operation to determine whether it is an illegal electronic reader/writer. If it is not an illegal electronic reader/writer, the electronic reader/writer will read (write); otherwise, the electronic display will refuse to read (write) the command and sound an alarm, and the words "illegal financial unit" appear on the liquid crystal display.
  • Non-contact electronic readers add RFID technology.
  • the electronic reader/writer and the electronic display perform information interaction processing through radio.
  • the contactless electronic reader is mainly composed of an RF antenna, a wireless transceiver module, an input button, and a liquid crystal display including a single chip microcomputer.
  • a non-contact electronic reader/writer without a high-energy battery can be powered wirelessly by an electronic display, and then generated by a voltage regulator circuit in the electronic reader/writer to generate a DC voltage (2 to 3 volts) required for the operation of the chip;
  • the interface circuit receives (or sends to) a wireless signal from the electronic display.
  • a non-contact electronic reader/writer with a high-energy battery the electronic display can be powered by an electronic reader without a battery.
  • the circuit in the RF chip consists of three modules: interface circuit, access control and memory.
  • RFID technology wireless communication between electronic display devices with distances of 10 cm to tens of meters through electronic readers; automatic information reading, no human intervention in the whole process; can work in a variety of harsh environments; and generally dirt covered in electronics On the display, it does not affect the reading of the information stored therein.
  • the electronic reader/writer can recognize high-speed moving objects and can recognize multiple electronic displays at the same time.
  • the operation is quick and convenient. Strong confidentiality.
  • the signal to be transmitted by the electronic reader/writer is encrypted and modulated on the carrier information of a certain frequency, and transmitted through the antenna.
  • An electronic display that enters the working area of the electronic reader/writer receives this pulse signal.
  • the circuitry in the electronic display modulates, decrypts, and decodes the signal and determines to be a read command.
  • the electronic display reads the relevant information from the memory, encodes, encrypts, modulates it, and transmits it to the electronic reader/writer via the antenna.
  • the electronic reader/writer demodulates, decrypts, and decodes the received information, and sends it to its microcomputer for processing.
  • the microprocessor in the electronic reader/writer performs a read (write) command to the electronic display; after receiving the command, the electronic display passes through its own central processor operation to determine whether it is an illegal electronic reader/writer. If it is not an illegal electronic reader, the electronic reader reads (writes); otherwise it rejects the read (write) command of the electronic reader and the alarm sound, and the "illegal electronic reader" appears on the LCD. Wait for the text. If the electronic reader/writer determines that the corresponding electronic display password and information authority do not match, various error messages are returned; and an alarm is issued on the electronic reader/writer to display the alarm content.
  • E-banking system "Expert think tank software” is a variety of business software, financial management software, bank risk warning software for banking systems.
  • Electronic money is a representative of the value of goods.
  • the circulation of electronic money in online finance is very flexible.
  • the application of electronic money as a payment instrument for goods can make people's idle funds continually flow to high-yield fields or links, thus bringing more wealth to people.
  • integrated financial management includes securities, insurance and fund business.
  • online finance makes electronic displays (ie, electronic money) a true "one currency pass.”
  • Market function Internet finance accelerates the process of financial market integration and the speed of electronic money circulation; financial institutions face more investment fields and more investment opportunities; small changes in the market may form a step-by-step investment structure The change; it is conducive to the bank's head office to adjust the total amount of electronic money and asset prices.
  • Discount rate function The discount rate is based on the re-lending cost and quantity of the bank's headquarters, and adjusts the liquidity of commercial banks to play a role by adjusting the price and quantity of re-lending.
  • the issuance of electronic money by a commercial bank can balance the net income generated by the issuance of electronic money to zero.
  • Value-added information On the basis of providing financial information consultation, with fund custody and account custody as a means to provide customers with thoughtful financial advice and consulting programs. Establish and improve the credit rating system for enterprises and individuals, realize the sharing of social resources, and provide information value-added services.
  • Public information services Provide financial market information such as interest rates, exchange rates, stock indices, insurance quality, and financial and economic news to all customers; and provide customized information for their customers.
  • Investment consulting services Targeting bank customers, using e-banking to act as a real-time agent for customer payment and settlement, For investment consulting, planning professional financial management, etc.
  • the comprehensive consultation includes consultation on securities, insurance and fund business; the internal financial management business of the agency, the agency's personal income and expenditure planning, and the provision of online financial supermarkets.
  • Operating services include direct or indirect control of online stores, provision of commodity trading services (including the issuance of electronic coins, and the provision of electronic wallets).
  • the e-banking system can also take measures to prevent the occurrence of payment risks: Effectively prevent regulatory risks, strengthen management of liquidity risks, effectively avoid credit risks, strictly prevent fraud risks, and prevent operational risks.
  • E-banking can carry out intelligent and personalized services for different customers' needs; for example, enterprise groups can query the accounts and transaction records of each subsidiary through online banking, and realize the internal fund scheduling based on the signing of multilateral agreements. And allocation, improve the overall use of funds of the Group, and provide strong support for customers to improve internal management and financial management.
  • the openness, all-weather and borderless restrictions of online financial transactions and market platforms can make the network economy global.
  • the open technologies and software used by online banking can reduce the cost of system development and maintenance of banking software.
  • the client of Internet Banking consists of a standard PC and browser software, mainly in a browser/server application mode for easy maintenance.
  • the maintenance and upgrade of the online banking system is also simple. For example, when upgrading an application or installing a new product, simply update or upgrade the server application without any changes to the client.
  • Internet banking makes it easy for customers to collect information and facilitates interaction between banks and customers, making both parties more aware.
  • the network bank can automatically collect, analyze, and mine various information; the results help to strengthen the bank's financial management.
  • E-banking can introduce businesses in the electronic securities, e-insurance and other industries, broaden the bank's new business, and provide more integrated financial services to customers.
  • Electronic insurance can provide customers with premium account enquiries, electronic transactions (instant transactions), payment details, etc.
  • the e-insurance can provide information and consultation information about the relevant materials and insurance business procedures (procedures) required by the group company's total (mother) company for insurance business.
  • E-insurance can introduce the business of e-banking, e-securities and other industries, broaden the new business of insurance companies, and provide more integrated financial services to customers.
  • Securities bookkeeping function It is convenient and quick to realize the purchase and sale of various government bonds, providing an effective means for the central bank to achieve its monetary policy objectives. It can transfer account funds at the same time as the completion of securities trading, ensuring security, reliability and real-time.
  • E-securities can provide clients with bond account enquiries, electronic transactions (instant transactions), transaction details, and inquiry of bond prices and bond market information.
  • the electronic securities can provide information and consulting information about the relevant materials and securities business procedures required for the general (mother) company of the group enterprise to handle the securities business.
  • Electronic securities can introduce businesses in industries such as e-banking and e-insurance, broaden the new business of securities companies, and provide more integrated financial services to customers.
  • Each e-bank (or its superior) of a banking institution is connected to a router on the Internet through a discriminator to construct a "high-confidence" banking-specific WAN of the bank, which is a banking network. 1 ).
  • the banking business using electronic displays and/or electronic readers on this network is online banking.
  • the general process of the customer's transaction and business at the business unit of the business unit ( Figure 4): The customer clicks on the business browser at the business station, enters the web page of the business station, enters the information of the business, and selects the relevant information that he needs.
  • the customer pays the cash deposit machine at the business station or selects the settlement tool for electronic payment; when the customer has paid the deposit machine or the bank sends the electronic settlement success information, the business information is input to the customer's electronic display, and
  • the service browser sends information that the customer has paid; or electronic payment success or business success; notifies the customer to unplug the electronic display.
  • the process of business transactions and electronic payment through the public network ( Figure 5):
  • the client connects to the public network through a browser to enter the service station web page in a network service; wherein the service station uses the private key to place the service on its network
  • the bank account number and password in the bank are encrypted, and the ciphertext is digitally signed as the service station;
  • the customer encrypts the bank account number and password in the customer bank with the private key, and the ciphertext is digitally signed as the customer;
  • the customer bank will bank the business station at the customer bank
  • the settlement account and password are encrypted with their own private key, as the customer's bank digital signature;
  • the service station bank uses the service station public key to encrypt the service station account number, password and service station receivable amount;
  • the customer receives the goods or services, using it
  • the private key encrypts the payment information and password as its digital signature; it is settled between banks.
  • the process of the customer performing the insurance business at the business unit of the business unit (Fig. 4) is basically the same as the process of the customer performing the business at the business unit of the business unit; the difference is that the insurance company pays the insurance deposit at the bank where the insurance company is located.
  • the process of the customer's insurance business and network payment through the Internet ( Figure 5) is basically the same as the process of the customer's network business transaction and network payment through the public network; the difference is that the insurance company's account opening bank pays the insurance premium.
  • Each electronic securities (or its superior) of a securities company is connected to a router on the Internet through a computer to construct a securities network ( Figure 1).
  • the securities business carried out on this network using electronic displays and/or electronic readers is a network security.
  • the process in which the customer conducts the securities business at the business unit of the business unit (Fig. 4) is basically the same as the process in which the customer conducts business at the business unit of the business unit; the difference is that the securities company pays the securities at the bank where the securities company is located.
  • the process of securities business and network payment through the Internet ( Figure 5) is basically the same as the process of network business transactions and network payment by customers through the public network; the difference is that the securities company's account opening bank pays securities fees or transaction fees.
  • the remote client of the financial unit after connecting to the router on the public network through the medium (which can be wired or wireless), can access the top machine network of the financial unit, which is the access network ( Figure 1). It is a remote client with a standard program for the identification of financial units. After connecting to the public network, it can be connected to the network of the financial institution.
  • the customer or the enterprise can also connect multimedia devices (including the identification program) such as mobile phones, fixed telephones, televisions, computers, etc., through the medium to the router of the public network, and then can log in to the network of the financial institution, which is also the access network.
  • multimedia devices including the identification program
  • high-encryption data encryption and authentication methods can also be used.
  • the public key cryptography algorithm Public-Key Crypto-graphic Algorithms
  • the symmetric encryption and decryption technology is used for information encryption and decryption.
  • the remote client is equipped with the function of “Encryption and Authorization Procedure for Unit Identity Authentication”; the machine of the unit-university network is equipped with the function of “Authentication and Authorization for Users” and the identification of remote clients and units.
  • the function of the user's remote client and the unit intranet discriminating machine enables the information sent or received by the user to be transmitted in the ciphertext on the Internet, ensuring the security and reliability of the information transmission, and preventing the important data from being stolen on the Internet.
  • the remote client and the network of the access network in the access network are authenticated by the Internet.
  • the security and precise communication through the Internet are as follows (Fig. 4):
  • the "Authentication and Authorization Procedure for User Authentication” is installed in connection with the unit's network. Machine, or equipped with the "Authentication Encryption and Authorization Procedure for the Unit” remote client, able to encrypt various information, and only allow the information of the source network and remote client of the unit, after encryption, enter the Internet.
  • the identification machine connected to the unit's excellent machine network is equipped with the "Authentication and Encryption and Authorization Procedure for Users" function, which can recognize various information coming in from the Internet, and only allows the information of the remote client, after decryption, Enter the receiving computer in the sink network.
  • the remote client is equipped with the "Authentication and Encryption and Authorization Procedure for Units" function, which can recognize various information coming in from the Internet. It only allows information about the computers in the source network of the unit, and after decryption, enters the remote client.
  • a private network Used to provide remote mobile users with secure access to the unit intranet, a private network that is not a fixed line; Formal access technology, as long as the access policy of the private network is updated, the technology can be implemented.
  • the input interface circuit and output interface circuit that match the electronic display (or electronic money machine) are located at different positions of the electronic display (or electronic money machine); the interface circuit of the output plug (or slot) can be just right. Plug in the interface circuit of the input slot (or plug). Electronic displays (or electronic money hoppers) can communicate directly with each other through information exchange, replacing the use of existing paper coins.
  • the structure of the electronic display (or electronic money hopper) and the software equipped with the "check program,” “source encryption program” and “sink decryption program” are the basis for realizing the security of electronic displays with different functions.
  • the electronic display (or electronic coin) installs some standard function programs. At the same time, it can also add programs to install some other functions according to the needs of different functions.
  • the software of the electronic display (or electronic money machine) has software for adding, encrypting, modulating and demodulating, decrypting, decoding, and depositing and dispensing software. It also has identification software for secure encryption algorithms for electronic money machines.
  • the electronic coin device uses a personal identification number (PIN) to identify the identity of the holder. The important data in the electronic coin device is encrypted and the information identifier MAC is added. It can check the identification code to identify whether the other party's electronic coin tamper has been tampered with and displayed on the LCD.
  • the electronic money controller's microcontroller contains basic components and circuits of main microcomputers such as microprocessors, random memories, read-only memories, interrupt systems, timers/counters, and input/output.
  • the microcontroller has an important function of controlling the display of characters and images on the liquid crystal display on the electronic money hopper, and is responsible not only for the overall coordination and control of the electronic money hopper but also for the reading and storage control of the numbers and parameters of the electronic money hopper.
  • the electronic display (or electronic coin) has a storage capacity of up to 64 to 256 KB, enough to store all the information required for the software, ID card, and all records for multiple deposits and charges.
  • Its hardware has voltage and clock detectors, exposure auto-dead logic, anti-anatomy and other encryption measures; software has password protection, security encryption algorithms and other encryption methods.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Description

网络金融装置和方法
技术领域 本发明涉及网络技术 (Network Technology )、 信息技术 (Information Technology, IT)、计算机技术 Computer Technology) 数据库技术(Database Technology), 互联网 ( Internet ), 无线射频识别(Radio Frequency Identification, RFID)技术、 集成 电路(Integrated Circuit, IC)技术、信息显示技术、 银行技术、 证券技术、 保险技术、 电子钱币技术等。 网络金融也称为自动金融、 智能金融、 科技金融、 现代金融。
网络金融将广泛应用于银行、 证券 (包括股票、 期货)、 保险 (包括人寿、 财产) 等金 融领域; 它们分别为网络银行、 网络证券、 网络保险等。 网络金融将广泛应用于各种现代 化的金融支付与清算系统; 提供各种金融信息增值服务; 提供不同金融风险预警功能; 使 银行、 证券、 保险等金融机构向全能化、 国际化、 集约化和多元化的方向发展。 其中的电 子读写机还可以应用于另售业、 生产企业、 事业单位、 图书管理、 仓库自动化管理等领域。
背景技术 各种各样的集成电路 (IC) 卡或者光储卡, 没有将其所代表的金融系统 的纸质凭证中所包含的消息或者信息显示出来, 不是真正意义上的凭证。
金融系统的各种业务的电子化 (包括电子金融、 电子银行、 电子证券、 电子保险等) 系统, 主要基于金融企业的内部专用网开展。 这种基于专用网进行的各种金融业务, 称为 电子金融业务, 简称电子金融。 例如电子支付、 电子支票、 电子信用卡、 电子现金等。
金融系统的各种结算方式不能充分满足网络化资金流的发展需求。 现金、 纸质支票等 不但应用范围有限, 结算速度慢, 而且不太安全。 即使一些现代化的电子支付结算方式, 如信用卡支付、 电子资金转账 (Electronic Funds Transfer) 等, 目前也只是应用在专用 金融网络上, 不但应用不方便, 而且由于交易系统和支付系统的分离, 给交易的运作增加 了很多不确定性与经营风险, 也影响效率, 增加成本。
各个金融单位推出的电子支付方案各不相同, 例如, 银行直接参与的信用卡安全电子 交易规范 (Secure Electronic Transaction, SET) 机制, 电子非安全支付系统和电子安全 支付系统方案, 都有银行在使用, 不但重复浪费, 而且对信用卡处理也不统一。
目前各个金融卡自成体系, 只能用于同一个金融专用网中的结算, 不能用于不同金融 专用网之间的结算, 给用户带来不便。
纯电子银行是 "只有一个站点的银行"; 采用远程通信方式; 全部金融业务只能在一个 站点进行。 这种纯电子银行是为其他非网上分支机构提供辅助服务, 如财务査询、 划转等。
与 IC卡读写器相连的计算机系统技术中, 分散于各地的某个单位的自动化金融业务站 点, 通过租用昂贵的专线或者虚拟专用网 (Virtual Private Network, VPN) 技术, 可以 建立该单位内部专用计算机系统 (广域网)。
虚拟专用网 VPN技术, 应用处理器和虚拟局域网 (Virtual Local Area Network, VLAN) 技术后, 实际上转变为点对点通信。 它存在两种网络布局结构: 中心辐射布局和全网络布 局。 中心辐射布局由一个中心站点同许多远程站点相连。 位于中心站点位置的用户边 路 由器非常昂贵, 其价格同相连的远程站点的数目有关。 同时, 其延迟时间大大超过两个站. 点之间直接通信时的数据包延迟时间。 全网络布局需要支持的隧道 (Tunnel ) 的数量, 随 着站点的数目呈几何级数增加。 对于站点稍微多的单位是不现实的。
安全性是 VPN另一个重大问题。 每个连接到互联网的用户边缘路由器, 都必须采取诸 如防火墙这样的安全措施, 以便确保每个站点的安全。 但每个防火墙必须对供应商开放, 以便访问有关设备, 这本身将是安全隐患。 当网络规模较大时, 管理防火墙将变得很困难。
安全套接字层 (Secure Socket Layer, SSL) VPN只适合站点对网络的连接, 无法实现 多个网络之间的安全互操作。
IC卡无法通过公用网络 (例如互联网) 开展 "可靠性"和 "安全性"的金融业务。 现有的信息读写器和与之相连的计算机系统技术, 都或多或少存在以上问题或不足。 "云安全 (Cloud Security)"系统需要解决四大难点: 需要海量的客户端、 需要专业 的反病毒技术和经验、 需要大量的资金和技术投入、 必须是开放的系统而且需要大量合作 伙伴的加入。
无线终端、 访问台、 无线计算机类设备、 无线交换机或无线路由器等, 都自含有无线 收发装置。
以下所指 "高可信", 涵盖 "可靠性"和 "安全性"两个方面。
以下所指公用网络一般是互联网 (Internet ) 或 /和无线公用网络。
发明内容 本发明任务是通过采用网络和网格 (grid) 技术, 将某个金融单位的各 个局域网 (Local Area Network, LAN) 或者专用网络, 通过公用网络, 以实现这些异构网 络或者同构网络之间的 "高可信"互操作 (Interoperability), 组建一个金融专有广域网 (Wide Area Network, WAN),是该单位的金融网络。采用信息显示器 (Information Display) 和集成电路 域者光储卡) 相结合的技术,制造的金融系统的智能显示器 (Smart Display), 称为金融电子智能显示器, 简称电子显示器。 采用信息显示技术和集成电路(或者光储卡) 相结合的技术, 制成的金融系统的智能读写 (包括电子钱币充值) 显示机, 称为金融电子 智能读写机, 简称电子读写机。 金融网络、 电子显示器和电子读写机共同构成网络金融。
网络金融釆取一种金融机构的内部网络之间通过互联网可以进行 "高可信"金融互操 作的技术。 金融网络、 电子显示器和电子读写机共同进行的自动金融业务, 就是网络金融。
网络金融是现代化发展的必然趋势, 对于经济的发展起着重要的推动作用。 金融改革 必须借助网络金融; 才能取得成功。 网络金融对于整个社会将是一场不可估量的革命。
互联网可以随时随地、 方便易用、 即时交互等, 这些为各种网络金融的信息流、 交易 流、 资金流、 物流等的交互与共享、 全天候跨地区与低成本处理提供了很好的技术支撑。
金融单位的一个内部网络中, 具有该金融单位对外服务功能最完善的或者该金融单位 根据对外服务的需要而指定的通用计算机, 称为该网络优势功能的通用计算机, 简称优机。 这个网络称为优机网络。
优机是服务器类计算机(server— class computer); 也是优机网络中的含有网络地址 转换 (Network Address Translation, NAT) 程序模块的一台主机 (host computer )„ 优机网络, 可以是局域网、 城域网或者广域网。 优机网络也可以只有一台通用计算机, 则该台计算机就是优机。 这是优机网络的特例。
分别与优机 (或者其网络) 和另一个公用网络 (包括互联网) 互相连接的并且控制这 两个网络互操作的通用计算机, 称为辨别身份的通用计算机, 简称辨机 (图 1 )。
辨机连接的另一个公用网络 (不包括辨机), 称为辨机网络。
辨机装有《检查程序的程序》、 《源端加密程序》和 《宿端解密程序》等标准程序模块。 由于辨机装有《检查程序的程序》模块, 能清除和防御计算机 "病毒", 保护与其相连 的优机网络; 所以辨机成为优机网络的 "医生"。 辨机称为优机网络的医生, 简称 "医生"。
辨机是客户机类计算机 (client— class computer) 或者对等机 (Peer); 它具有将金 融单位的一个优机网络中计算机送往 (或者接收) 该金融单位另一个优机网络中计算机的 信息加密 (或解密) 后, 转发给互联网 (或者转发给接收优机网络) 的程序和该金融单位 可以对外的客户机 (或者浏览器) 的程序等。
辨机还可以具有处理各种信息流等的程序, 可以并发 (concurrency) 运行多个客户 (client) 和服务器 (server)。
辨机还可以含有防毒软件或者处理各种不同形式信息流等的程序。
辨机还可以含有路由器功能。 它就可以直接与互联网线路相连接。
辨机含有 "高可信"安全软件。 它具有正确性、 可靠性、 友善性、 维护性、 扩充性等。 现有的金融机构的内联网络与公用网络之间所设置的防火墙 (包括硬件设备、 相关的 软件代码和安全策略), 容易被黑客 (HACK)采用 "反端口"技术攻克, 入侵到防火墙后面 的内部网络的计算机, 就会对内部网络造成严重的威胁。
企事业等单位通过专用计算机网络进行的业务, 称为电子业务。 例如电子证券、 电子 农业、 电子工厂、 电子学校、 电子医院等。
金融单位通过专用计算机网络进行金融业务, 称为电子金融。 例如电子银行、 电子保 险、 电子证券等。
企事业等单位通过公用计算机网络进行 "高可信" 的业务, 称为网络业务。 例如网络 证券业务、 网络农业业务、 网络工厂业务、 网络学校业务、 网络医院业务等。
能够进行网络业务的单位, 称为网络单位。 例如网络金融机构、 网络工厂、 网络学校、 网络医院、 网络商务单位、 网络银行、 网络保险、 网络证券等。
某个金融单位的各个优机网络或者其他专用网络中的一台优机, 各自都通过输入 /输出 接口电路, 分别与一台辨机的输出 /输入接口电路相连接; 各个辨机都通过路由器, 与互联 网连接,组建成该金融单位专有的广域网,称为该金融单位的专有网,简称金融网络(图 1 )。 在金融网络上, 利用电子显示器和 /或电子读写机所进行的金融业务, 就是网络金融。
金融单位的优机网络或者专用网络的某台计算机发送的信息, 都送往与该网的优机相 连接的辨机加密处理后, 通过公用网络 (一般指互联网) 进行传输, 然后在接收端的另一 个优机网络或者专用网络的辨机上解密, 还原成原来的信息并经过病毒査检后, 转发到该 网络的接收计算机。 互联网给各个优机网络中的计算机发送的信息, 通过接收方辨机解密 还原成原来的信息和经过检査病毒确认其安全后, 转发给接收计算机, 保证了信息安全性。 "安全性"保障: 网络上每一个节点 (辨机) 都含有辨机中的安全标准软件。
金融网络 "可靠性"保障: 网络上每一个节点 (辨机) 都与其他所有节点享有同等的 重要性, 都有权发出、 传递和接受信息; 每一个数据包注明发出节点地址和终止节点地址。
现有金融业务的网上支付方法, 在具体操作上存在较大困难, 金融业务信息没有保密 措施; 电子支付手续复杂, 需要第三方的认证中心; 无法防范支付不安全等。
某个金融企业的各个优机网络都单独记录每笔金融业务的情况, 每日进行最后汇总, 结果告知该金融企业中重要的优机网络; 由其汇总和保存。
现有的虚拟专用网技术, 也无法避免黑客绕开身份认证和鉴别机制, 伪装身份对金融 单位的内部资源进行非法的访问。
金融网络的系统备份自动化是由优机网络中的备份系统组成的。其结构(图 3)可以由 备份客户端、 备份服务器、 介质服务器、 备份存储单元和备份管理软件等组成。
1、 电子显示器 (图 2) 具有微处理器 (Microprocessor Unit, 简称 CPU)、 输入按键、 小型显示器等。 其集成电路还具有数据存储器 (EEPR0M)、 工作存储器 (RAM) 和程序存储 器 (EPR0M) 的电路。
电子显示器程序包含辨机的标准程序和信息完整检査程序, 解决了信息的安全性、 保 密性、 真实性、 匿名性和完整性等关键的技术问题。
电子显示器还可根据需要, 增加身份认证等的硬件和软件; 保证其信息传输的可分性。 每个电子显示器都有互相匹配的输入接口电路和 /或输出接口电路。它们分别位于电子 显示器的不同位置; 一般是分别位于电子显示器的两边; 而且输出插头 (或者插槽) 接口 电路, 可以恰好插入输入插槽 (或者插头) 的接口电路。 它们之间可以直接通过信息交互, 进行金融业务交流。
电子显示器既需要联机进行信息处理, 又不需要联机授权处理。 因此允许它脱机使用。 电子显示器存储量高, 足以将用户每次金融业务的记录, 都保存在其存储器中。 电子显示 器不但能代替信用卡、 借记卡、 复合卡和现金卡等各种 IC卡; 而且相互之间能够直接进行 金融业务或电子钱币的交换。 电子显示器除了具有记录持有人的个人资料和密码信息外; 还可以写入持有人的存款余额。
现有的纸质钱币不但需要釆用防伪工艺制作的特殊纸张, 而且不能杜绝假钱币现象。 电子显示器还可以具有: 1. 1电子显示器可以通过金融浏览器的网络支付,存取电子钱币。它也可以给其他电子 显示器输入或输出电子钱币。 电子读写机也可以给电子显示器存储电子钱币。
电子显示器可以作为具有电子钱币或者纸质钱币的一切功能的钱币在市场上使用。
1. 2电子显示器的 CPU对信息的加密处理、 完整检验和身份认证可以采用新方法。 1. 3电子显示器由密码方式保护,持有人的真正的钱是存储在金融账户上。它也可以作 为借记卡。 如果电子显示器丢失或者受损坏, 持有人的钱并没有丢失。
1. 4用户采用实名制电子显示器时,只要将第二代身份证刷过金融单位的浏览器上的身 份证刷槽即可。浏览器可将用户身份证的号码和其个人本身相片等资料输入电子显示器中。 这些资料只要刷一次即可。 以后再用该电子显示器重复金融业务时, 就不用重新再刷。
1. 5电子显示器能够以独立方式或者联机方式进行工作:
1. 5. 1独立工作的电子显示器, 不与金融浏览器相接触。 两个电子显示器和 /或电子读 写机之间依靠其存储器中的软件独立运行。 它们可以通过其不同的输入接口与输出接口直 接进行连接。 这种电子显示器具有读、 译其所有的逻辑功能, 能独立检验各自电子显示器 的合法性和持有人的身份。 电子显示器的输出 (或者输入)插头,也可以插入电子读写机的 输入(或者输出)插槽中, 直接进行交互信息。
1. 5. 2联机 Ϊ作的电子显示器,插进金融浏览器或电子读写机上的专用插头上。浏览器 或电子读写机通过专线、 电话线路等直接与金融优机网络相连。 每笔金融业务均由电子显 示器实时传输到金融优机网络进行处理, 文件可以实时更新。 电子显示器对其持有人的身 份识别, 还可以采用指紋扫描、 声音确认和虹膜认证等生物测定技术。
1. 6电子显示器还可以采用数字签名和访问控制策略等程序;并且借助应用层,对传输 的各种信息实行安全性等级管理。 它对于一个信息中的某些部分段落, 可以根据其不同的 安全等级, 进行相应的安全加密。
1. 7电子显示器内存储的安全控制软件,也可以具有对电子显示器持有人进行检验个人 身份证识别号 (personal identification number), 而确定持有人合法性的功能。 它可以 含有并且显示个人二代身份证号和其中个人相片, 实行实名制。
1. 8电子显示器的存储容量高达 64〜256KB, 足以存储所需的软件、 身份证的全部信息 和多次存取款和收费的所有记录。 它的硬件有电压和时钟检测器、 曝光自动死机逻辑、 防 解剖等加密措施; 软件有密码保护、 安全加密算法等加密方法。
现有的 IC卡凭证不但不能显示凭证的信息, 而且也不能杜绝伪造 IC卡等现象。
电子显示器制作容易、 成本低、 使用寿命长, 可以重复使用。 若它丢失可以补发。
2、 电子读写机(图 2 ) 由装有识别和控制软件的存储器、 控制器、 读写设备、 显示器 等组成。 其控制器能够对信息进行加码、 加密、 调制和解调、 解密、 解码等。 电子读写机 可以通过网络支付, 存取电子钱币。 它也可以给电子显示器充值电子钱币。
电子读写机程序含有辨机的标准程序, 具有信息加密体制和防止计算机病毒的软件。 电子读写机具有读、 译电子显示器的所有逻辑功能, 还可以具有独立检验电子显示器 的合法性和持有人的身份的功能。 合法的电子显示器通过时, 电子读写机会发出一种提示 声音, 并在液晶显示器上用文字表明。 如果使用实名制的电子显示器, 电子读写机还可以 显示持有人的身份证上半身相片。 伪造的或者失效的电子显示器通过时, 电子读写机会发 生警报声音作为提示, 并在其液晶显示器上显示 "伪造或失效"等文字。
电子读写机解决了信息的安全性、 真实性、 匿名性和可分性四个关键的技术问题。 电子读写机可以制成各种形状和不同尺寸; 一般制成固定式的灵巧形状或者手提式电 子读写机。
电子读写机还可以具有:
2. 1电子显示器对于一个信息中的某些部分段落,还可以根据其不同的安全等级,进行 相应的安全加密。 电子读写机内存储的安全控制软件, 也可以具有检验个人身份证识别号 (personal identification number), 而确定持有人合法性的功能。 它可以含有并且显示 个人二代身份证号和其中个人相片, 实行实名制。
2. 2不带高能电池的非接触式电子读写机,可由电子显示器通过无线方式供电,再经过 电子读写机内的稳压电路产生集成电路芯片工作所需的直流电压。
2. 3内装高能电池的非接触式电子读写机工作时, 电子显示器不用配备电池,可由电子 读写机通过无线方式向其供电。
2. 4电子读写机的微控制器系统, 充分发挥规范、方便和高效的信息运行功能。 电子显 示器能够被电子读写机所识别, 同时可以启动电子读写机。 例如金融业务系统利用电子读 写机, 作为无人管理的自动、 自助的出纳装置; 用户利用电子显示器, 可直接在电子读写 机上, 以联机或者脱机方式, 自行完成存取电子钱币款和转账等金融业务交易。
2. 5电子读写机能够以单独方式或者联机方式工作:
2. 5. 1单独工作的电子读写机不与金融网络 (一般为优机网络)相连。电子读写机依靠其 存储器中的软件独立运行。 它与业务的主机之间通过定时交换软盘来交互信息。 这种电子 读写机具有读、 译其电子显示器的所有逻辑功能, 能独立检验电子显示器的合法性和持有 人的身份。
2. 5. 2联机工作的电子读写机,通过专线、 电话线路等直接与金融网络相连。每笔业务 均由电子读写机实时传输到金融网络进行认证和处理, 文件可以实时更新。 电子读写机对 电子显示器持有人的身份识别, 还可以采用指纹扫描、 声音确认和虹膜认证等生物技术。
电子读写机无论采用单独或者采用联机, 这两种工作方式都可以避免骗子诈骗。
2. 6电子读写机还可以采用数字签名和访问控制策略等程序;并且借助应用层,对传输 的各种信息实行安全性等级管理。
2. 7采用条码(Bar Code)技术, 电子读写机还可以应用于另售业、 生产企业、 事业单 位、 图书管理、 仓库自动化管理等领域。 2. 8电子读写机可以有各种标准接口电路, 还可以有一些专用接口电路, 如与磁卡和 IC卡阅读器、 条码阅读器和电子秤等的接口电路。
现有的金融系统的电子读写机, 建立于封闭的金融业务专用计算机网络上, 无法在开 放的互联网上运行。
3、 具有银行业务功能的浏览器(Browser), 称为银行浏览器。 某个银行的若干个银行 浏览器、 现金配出器 (CashDispenser, CD)、 自动柜员机 (Automated Teller Machine, ATM)、 自动出钞机 (Automatic Cash Dispenser)、 自动存款机 (Automatic Depositor, AD)、账户查询服务终端 Account Inquiry Terminal )、公共事务缴费服务机 Public Utility Terminal ) 电话银行系统 (Telephone Banking System)、多媒体査询 Multi- Media Service Inquiry) 系统、 电子读写机、 服务器、 优机和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可以是有线的或无线的) 相连接所组成的优机网络, 称为该银行的分行机构的 电子业务网络, 简称电子银行。
电子银行中的优机或者某个主机, 含有银行系统 "专家智囊团软件"; 可以提供各种银 行业务服务。 它还可以提供各种银行信息增值服务; 还可以提供不同银行风险预警功能等。 电子银行可以向全能化、 国际化、 集约化和多元化的方向发展。
银行浏览器可以在电子银行中可以直接存取电子钱币。
电子银行釆用无线网络, 可以有力地支持电子银行的业务开展和服务的便利。
电子银行除了可以提供传统银行业务之外, 还可以提供三种新的银行业务: 公共信息 服务、 投资咨询服务和综合经营服务。
银行浏览器是提供给人们使用的装有浏览器软件和存取款软件的存储器和液晶显示器 (例如触摸液晶屏) 等的工作站。 其中装有存取和显示信息的计算机程序 (包含多个应用 程序, 并利用对象名所确定的程序来解决该对象)。
自动存取款机通过互联网支付, 可以进行纸质钱币的储蓄业务。
电子银行还可以具有:
3. 1电子银行可以是局域网、城域网或广域网。它可以是有线网络;也可以是无线网络。 3. 2自动存款机(AD)是只作存款用的终端机。 它可以与浏览器, 合并成具有存款和付 款功能的银行浏览器。 它也可以给电子显示器存储和取出电子钱币。
3. 3各个电子银行可以独立承担相对应分支银行的各种业务。
3. 4人们可以通过电子银行的浏览器或者自动存款机, 直接办理银行业务。
3. 5电子银行能够融合电子银行、 电子证券、 电子银行等行业市场, 减少各类金融企业 对同样客户的劳动重复, 拓宽银行公司创新空间, 向客户提供更多量体裁衣式的银行服务。
3. 6现金配出器和存款机分别是只作取款、存款用的终端机。它们可以与银行浏览器合 并成具有取、存款功能的银行浏览器。即它们也可合并为自动存取款机(即存取纸质钱币)。
3. 7银行浏览器还可以通过互联网, 从其他电子银行中存取电子钱币。 3. 8银行浏览器还可以给电子显示器存储电子钱币。
现有的商业银行系统的电子银行系统的支付方式, 建立于封闭的银行业务专用计算机 网络, 无法在开放的互联网上运行。
4、 具有保险和保障系统功能的业务浏览器, 称为保险浏览器。 某个保险机构的若干个 保险浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存取款机、 优机、 电子读写机 和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可以是有线的或无线的) 相连接 所组成的优机网络, 称为该保险机构的分支机构的电子业务网络, 简称电子保险。
电子保险中的优机或者某个主机, 含有保险系统 "专家智囊团软件", 可以提供各种保 险业务服务。
电子保险还提供各种保险信息增值服务; 还提供不同保险风险预警功能; 电子保险可 以向全能化、 国际化、 集约化和多元化的方向发展。
保险浏览器是提供给人们使用的装有浏览器软件和存取款机软件的存储器、 液晶显示 器 (例如触摸液晶屏) 等的工作站。 其中装有存取和显示信息的计算机程序 (包含多个应 用程序, 并利用对象名所确定的程序来解决该对象)。
电子保险采用无线网络, 可以有力地支持电子保险的业务开展和服务的便利。
自动存取款机通过网络支付, 利用自动柜员机,可以进行纸质钱币的保险费的存取。 电子保险 "专家智囊团软件", 可以为成千上万的企业和数百万的人员执行保险计划。 这意味每一个人员的薪水或者个人情况发生任何变化, 电子保险都得更新它的数据。 这种 智能保险业务的流程:
被保险人或者其委托人, 通过电子文件、 电子邮件或电子传真, 将需要改变的数据通 知电子保险。 电子保险收到这些数据之后, 将这些数据输入到数据库。 这样的程序在电子 保险与客户之间形成了稳固的流程。 由于必要的信息在被保险人或者其委托人和电子保险 的系统中都有保存, 所以可以通过电子保险, 替换原来的数据重新形成新的数据。
电子保险还可以具有:
4. 1电子保险可以是局域网、城域网或广域网。它可以是有线网络;也可以是无线网络。
4. 2自动存取款机可以作存款、取款的终端机。它可以与浏览器, 合并成具有存款和付 款功能的保险浏览器。 它也可以给电子显示器存储电子钱币。
4. 3各个电子保险可以独立承担分支保险机构的业务。
4. 4人们可以通过保险浏览器或者自动存取款机, 直接交纳保险费用。
4. 5电子保险能够融合电子银行、 电子证券、 电子保险等行业市场, 减少各类金融企业 对同样客户的劳动重复, 拓宽保险公司创新空间, 向客户提供更多量体裁衣式的保险服务。
4. 6现金配出器和存取款机可以是只作取款、存款用的终端机。它们可与保险浏览器合 并成具有取、存款功能的保险浏览器。即它们也可合并为保险存取款机(即存取纸质钱币)。
4. 7保险浏览器还可以通过瓦联网, 从其他电子保险中存取电子钱币。 4. 8保险浏览器还可以给电子显示器存储电子钱币。
现有的保险机构系统支付方式, 建立于封闭的保险业务专用计算机网络, 无法在开放 的互联网上运行。
5、 具有证券系统功能的业务浏览器, 称为证券浏览器。 某个证券公司的若干个证券浏 览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存取款机、 优机、 电子读写机和数据 库服务器等, 采用网络拓扑结构技术, 通过介质 (可以是有线的或无线的) 相连接所组成 的优机网络, 称为该公司的分公司电子业务网络, 简称电子证券。
电子证券中的优机或者某个主机, 含有证券系统 "专家智囊团软件", 可以提供各种证 券业务服务。 它还可以提供各种证券信息增值服务; 提供不同证券风险预警功能; 使证券 公司向全能化、 国际化、 集约化和多元化的方向发展。
证券浏览器是提供给人们使用的装有浏览器软件和存取款机软件的存储器、 液晶显示 器 (例如触摸液晶屏) 等的工作站。 其中装有存取和显示信息的计算机程序 (包含多个应 用程序, 并利用对象名所确定的程序来解决该对象)。 证券浏览器可以通过互联网, 利用自 动柜员机 (ATM) 软件,进行纸质钱币交纳证券费的存取。
电子证券采用无线网络, 可以有力地支持电子证券的业务开展和服务的便利。
证券浏览器可以通过网络支付, 利用自动柜员机,进行纸质钱币的证券费的存取。 电子证券中的 "专家智囊团软件", 可以为成千上万的企业和数百万的人员执行证券计 划。 这意味每一个人员的证券投资情况发生任何变化, 电子证券都可以更新它的数据。
智能证券业务的流程:
证券投资人或者其委托人, 通过电子文件、 电子邮件或电子传真, 将需要改变的数据 通知电子证券。 电子证券收到这些数据之后, 将这些数据输入到数据库。 这样的程序在电 子证券与客户之间形成了稳固的流程。 由于必要的信息在证券投资人或者其委托人和电子 证券的系统中都有保存, 所以可以通过电子证券, 替换原来的数据重新形成新的数据。
电子证券采用无线网络, 可以有力地支持电子证券业务的开展和服务的便利。
电子证券还可以具有:
5. 1电子证券可以是局域网、城域网或广域网。它可以是有线网络;也可以是无线网络。
5. 2自动存取款机可以作存款、取款的终端机。它可以与浏览器, 合并成具有存款和付 款功能的证券浏览器。 它也可以给电子显示器存储电子钱币。
5. 3各个电子证券可以独立承担分支证券公司的业务。
5. 4人们可以通过证券浏览器或者自动存取款机, 直接交纳证券费用。
5. 5电子证券能够融合电子银行、 电子证券、 电子证券等行业市场, 减少各类金融企业 对同样客户的劳动重复, 拓宽证券公司的创新空间, 向客户提供更多量体裁衣式证券服务。
5. 6证券浏览器可以从电子证券中直接存取电子钱币。 5. 7证券浏览器通过互联网, 可以从其他电子证券中存取电子钱币。
5. 8现金配出器和存取款机是只作取款、存款用的终端机。它们可以与证券浏览器合并 成具有取、 存款功能的证券浏览器。 即它们也可合并为证券存取款机 (即存取纸质钱币)。
现有的证券公司系统支付方式, 建立于封闭的证券业务专用计算机网络, 无法在开放 的互联网上运行。
6、 某个银行的各个电子银行 (或者其优机) 与辨机相连接, 辨机通过介质 (可以是有 线的或无线的) 与公用网络上的路由器相连接, 构建成该银行的 "高可信" 的银行业务专 有广域网, 称为银行网络(图 1 )。在这个网络上利用电子显示器和 /或电子读写机所进行的 银行业务, 就是网络银行。
每一个电子银行都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的控制功 能, 使各个电子银行之间通过公用网络互操作。 所有电子银行都能确保银行业务的安全性 和信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施银行业务等诈骗。
6. 1在没有网络的农村, 计算机可以利用电话线进行金融业务处理。 无论 PC机、 工作 站、 小型机、 主机等均可作为金融业务计算机。 由于使用电话 (或者手机)进行金融业务, 需要通过电话通信网络。 因此调制解调器 (Moden) 是必备的硬件设备。 Moden的功能与传 输速度, 应根据实际的金融业务需求来决定选择。 一般常用的通信线路是电话线路。
6. 2网络银行可以釆用以下的方式 (B2C型网络支付方式) 进行业务等:
6. 2. 1客户在某个单位的业务站浏览器上, 进行商务交易流程 (图 4):
①客户将网络银行的电子显示器的插头(也是浏览器的电源开关), 插在电子银行的业 务浏览器的电子显示器专用插槽上, 并且点击业务浏览器上的网页, 进入业务站的网页, 根据页面提示, 输入进行商务业务的信息后, 选择自己需要的有关信息。
②客户在网络银行的现金存款机上存款, 转到第⑤项进行电子显示器的内容写入; 或 者选择电子支付的结算工具, 如电子显示器、 电子钱包、 电子现金、 电子支票或电子银行 账号等, 并且得到银行的授权使用, 在业务浏览器的页面上, 依照网页的提示, 输入银行 账号和密码, 并对银行支付信息进行加密。
③电子银行中优机对客户的业务信息进行检査、 确认, 并把相关的经过加密的客户支 付信息等转发给支付网关, .直到银行专用网络的银行后台业务服务器确认, 以期从银行等 电子货币发行机构, 验证客户得到支付资金的授权。
④银行验证确认后, 通过建立起来的经由支付网关的加密通道通信, 给电子银行的浏 览器和优机发送确认业务及支付结算成功信息。
⑤电子银行的优机进行业务确认; 客户已经在存款机交款或者银行发来的结算成功信 息后, 给客户的电子显示器输入业务信息, 并且给业务浏览器发送客户已经付款; 或者网 络付款成功和业务完毕信息; 通知客户拔掉电子显示器。
至此, 一次典型的商务交易过程结束。 6. 2. 2客户与商家进行网络交易和支付的方法, 采用商家、客户及其开户银行, 各自都 有一对密钥 (公钥和私钥) 并且公钥和私钥都不公开的新方法。 该方法必须具备客户在开 户银行 (下称客户银行) 账号中, 有一定的存款。 商家在开户银行 (下称商家银行) 有账 号, 并知道该银行的公钥。 商家银行知道客户银行的公钥和商家的公钥以及商家密码。 客 户银行知道商家银行的公钥和客户的公钥以及客户密码。商家银行在客户银行有结算账号。
客户与商家进行网络业务 (图 5), 业务交易和电子支付基本流程:
①客户用客户机 (或者浏览器) 连接因特网, 用 Web浏览器进入商家的网页, 根据页 面提示, 选择自己需要的有关信息, 例如商品名称和价格或者服务价格等。 然后再选择电 子支付的结算工具, 如电子显示器、 信用卡、 电子钱包、 电子支票或电子钱币等。 客户将 这些信息和自己的居住地址或者通讯地址; 通过因特网传给商家。
②商家的辨机对客户的业务信息, 进行检査、 确认, 并且转给服务器(优机), 优机用 商家的私钥把商家在商家银行的帐号和密码加密, 密文作为商家数字签名, 与业务的价格 信息和商家银行名称, 通过因特网传给客户。
③客户核对无误后, 用私钥对其在客户银行的帐号和密码加密, 密文作为客户数字签 名, 将客户数字签名和商家数字签名、 付款金额和商家银行名称等, 用客户银行的公钥加 密, 并将这些密文传给客户银行。
④客户银行用自己的私钥将密文解密, 得到客户发送的明文、 商家数字签名和客户数 字签名; 然后用客户公钥对客户数字签名进行解密。 客户银行将解密后的客户账号、 密码 与客户留存的资料核对, 无误后就确认是客户发出的信息。
⑤客户银行将商家银行在客户银行的结算账号和密码, 用自己的私钥加密, 作为客户 银行数字签名; 然后将收款金额、 客户银行数字签名和商家的数字签名用商家银行公钥加 密, 发送给商家银行。
⑥商家银行收到客户银行的密文后, 用自己的私钥将密文解密, 得到客户银行发送的 明文信息及其数字签名, 然后用客户银行公钥对客户银行数字签名进行解密, 如果成功, 则确认是客户银行发出的。 商家银行再用商家的公钥对商家数字签名进行解密, 如果成功, 则确认是商家发出的。
⑦商家银行用商家公钥对商家账号、 密码和商家应收金额, 一起加密之后传送给商家。 商家收到信息后, 用自己的私钥解密。 若商家确认自己应收金额和商家账号、 密码正确; 则按照客户居住地址或者通讯地址, 通过快速邮递系统或者配送中心给客户送达商品或者 服务。
⑧客户收到商品或者服务, 用其私钥将确认付款的信息和密码加密作为其数字签名, 发送给客户银行。 客户银行用客户的公钥将密文解密, 得到客户发送的确认付款的信息。 客户银行将客户在该银行的帐户中减去购物款或服务款, 将商家银行在客户银行的结算帐 户中增加该笔款, 并告知商家银行在其商家帐户上增加该笔款。
商家银行和客户银行在约定时间, 进行结账。 至此, 一次典型的业务交易和网络支付过程结束。
6. 2. 3客户利用电话线进行业务和网络业务所需的条件是一样的。 即客户 (或商家)及 其开户银行, 各自有一对密钥 (公钥和私钥); 客户在开户银行 (下称客户银行) 账号中, 有一定的存款和密码; 并且知道该银行的公钥等。 其利用电话线进行业务的一般流程为: 客户利用调制解调器, 将计算机与电话线相连接, 通过电话线, 将网络商家的浏览器 页面传输到自己的计算机屏幕上; 然后根据自己的业务或商品需求, 按照该页面提示进行 操作, 决定选择自己需要的有关信息。 客户再选择电子支付的结算工具, 如电子显示器、 电子钱包、 电子现金、 电子支票或网络银行等。 客户还输入自己的居住地址或者通讯地址; 核对自己居住地址或者通讯地址信息。 其余步骤和以上的网络业务是一样的。
6. 3网络交易是企业与个人进行网络交易时采用的网络支付方式。即 B2C型网络支付方 式。 稍微修改就可以适用于 B2B型、 C2C型、 B2G型、 G2G型、 C2G型等网络支付方式。
6、 4—些基于专用金融通信网络平台的电子支付结算方式, 如电子汇票系统、 SWIFT、 CHIPS, CNAPS和金融 EDI等都可以归结为 B2B型网络支付方式。
现有的纯网上银行无法收付现金; 它改变保存交易记录的方式, 需要法律和客户不断 确认; 还需要培养银行客户的信任度和忠诚度等。
7、 某个保险公司的各个电子保险 (或者其优机) 与辨机相连接, 辨机通过介质(可以 是有线的或无线的) 与公用网络上的路由器相连接, 构建成该公司的 "高可信" 的保险业 务专有广域网, 称为保险网络(图 1 )。在这个网络上利用电子显示器和 /或电子读写机所进 行的保险业务, 就是网络保险。
每一个电子保险都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的控制功 能, 使各个电子保险之间通过公用网络互操作。 所有电子保险都能确保保险业务的安全性 和信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施保险业务等诈骗。
用户在某个单位的业务站进行电子保险业务的一般流程, 与客户在某个单位的业务站 浏览器上进行商务交易流程 (图 4) 相同; 不同是在保险公司的电子保险交纳保险费。
用户通过公用网络进行网络保险业务和网络支付交纳保险费的流程, 与客户与商家进 行网络业务 (图 5) 基本相同; 不同是在保险公司的网络保险中交纳保险费。
现有的分布于远距离的某个保险公司的各个优机网络互联组成的专用网络, 必须采用 昂贵的专用线路或者虚拟专用网。
8、 某个证券公司的各个电子证券 (或者其优机) 与辨机相连接, 辨机通过介质 (可以 是有线的或无线的) 与公用网络上的路由器相连接, 构建成该公司的 "高可信" 的证券业 务专有广域网, 称为证券网络(图 1 )。在这个网络上利用电子显示器和 /或电子读写机所进 行的证券业务, 就是网络证券。
每一个电子证券都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的^^制功 能, 使各个电子证券之间通过公用网络互操作。 所有电子证券都能确保证券业务的安全性 和信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施证券业务等诈骗。 用户在证券公司的业务站进行电子证券交易的一般流程, 与客户在某个单位的业务站 浏览器上进行商务交易流程 (图 4 ) 基本相同; 不同是在证券公司的电子证券交纳证券费。
用户通过公用网络进行网络证券交易和网络支付进行证券业务的流程, 与客户与商家 进行网络业务 (图 5 ) 基本相同; 不同是在证券公司的网络证券中交纳证券费或交易费。
现有的证券公司的防火墙或者虚拟专用网, 不适合进行病毒检测; 无法防范数据驱动 型攻击; 无法完全防御各种新的攻击行为; 都是其主要缺陷。
9、 金融单位的远程客户机(含有辨机标准程序), 通过介质(可以是有线的或无线的) 与公用网络上的路由器相连接后, 能够登录金融单位的优机网络, 实现 "高可信" 的信息 互操作。 这些远程客户机、 优机网络和公用网络共同组成的系统, 称为金融单位远程访问 网络 (access internet ) 系统, 简称访问网 (图 1)。 它是由装有金融单位的辨机标准程序 的远程客户机, 连接到公用网络之后, 能够与该金融单位的优机网络, 进行 "高可信" 的 信息互操作的系统。
访问网在公用网络上传输的信息流是经过加密处理的信息。 访问网可以用于提供远程 用户对金融单位的优机网络的 "高可信"的信息访问。
访问网中的优机网络的信息需要经过辨机加密之后, 通过公用网络进入远程客户机并 经过其解密和计算机病毒检査之后, 才能进入远程客户机的应用区域之中; 保证了信息的 保密性、 完整性和真实性; 并具有抵抗黑客和病毒攻击远程客户机的能力。
访问网的优机网络可以通过公用网络, 为远程客户机办理划拨款项、 汇兑结算、 査询 余额、 证券投资和提供金融市场信息等业务; 还可以同商业机构、 公用事业机构、 电子显 示器发行机构进行各种结算; 提供 24小时的各种金融服务; 实现个性化的优质服务等。
访问网还可以采用以下不同的方式进行信息处理等:
9. 1远程客户机身份验证要实现的授权访问的方法; 就是指公用网络上的访问信息,要 经过访问网的辨机对客户机的身份认证和授权。 即访问网的辨机必须装有对远程客户机的 身份验证和授权的控制列表或控制软件。
9. 2辨机身份验证要实现的授权访问的方法;就是指公用网络上的访问信息,要经过客 户机对访问网的辨机的身份认证和授权。 即远程客户机必须装有对访问网辨机的身份验证 和授权的控制列表或控制软件。
9. 3远程客户机的信息需要经过辨机的信息完整检查或身份认证之后,才能进入优机网 络; 保证了信息的保密性、 完整性或真实性; 并具有抵抗黑客和病毒攻击网络的能力。
9. 4辨机的信息需要经过远程客户机的信息完整检査或身份认证之后,才能进入远程客 户机; 保证了信息的保密性、 完整性或真实性; 并具有抵抗黑客和病毒攻击客户机的能力。
9. 5访问网还提供更高级服务,包括网络购物、购买旅行客票、旅游门票等第三方服务; 网络账单支付服务; 金融信息服务; 与债券和证券等相关的各种投资工具的内容服务等。 9. 6用户或企业还可以将移动电话、 固定电话、 电视、 计算机等多媒体设备(含有辨机 程序), 通过介质与公用网络的路由器相连接后, 能够登录金融单位的优机网络, 实现 "高 可信" 的信息互操作。
9. 7远程多媒体设备、金融单位的优机网络和公用网络共同组成的系统,也称为金融单 位远程访问网络系统, 也简称访问网。 它是由装有金融单位的辨机标准程序的多媒体设备, 连接到公用网络后, 能够与该金融单位的优机网络, 进行 "高可信 "的信息互操作的系统。
现有的远程访问虚拟专用网技术, 对于许多通过伪装远程访问地址进行非法的内部资 源访问的地址欺骗, 无能为力; 无法避免黑客绕开身份认证和鉴别机制, 破坏已有连接。
10、 将电子显示器的互相匹配的输入接口电路和输出接口电路, 分别位于电子显示器 的不同位置 (一般是分别位于电子显示器的两边); 而且输出插头 (或者插槽) 接口电路, 可以恰好插入输入插槽 (或者插头) 的接口电路。 则它们之间可直接通过信息交互, 进行 业务交流。
10. 1电子显示器可以含有智能钱币软件。 此时电子显示器可以作为电子钱币或者纸质 钱币使用。 它也称为电子钱币器。 电子钱币器不但含有电子钱币, 而且可以进行钱币交易。 电子钱币器可以作为钱币, 进行货款支付并在市场使用和流通等。 电子钱币器使 "交易无 纸化"和 "减少现金流量"变为现实。 它具有纸质钱币的一切功能。
10. 2证券浏览器可以通过网络支付, 利用自动柜员机,进行纸质钱币的证券费的存取。
10. 3电子钱币器能够取代纸质钱币和金融卡。 电子钱币器中的电子钱币用完之后, 可 以通过金融浏览器或者电子读写机向电子钱币器里充加电子钱币。
10. 4电子钱币器中的电子钱币达到一定数量之后, 可以通过金融浏览器或者电子读写 机, 存储在该钱币器的合法拥有人的开户银行的账户之中。
10. 5电子钱币器之间, 可以直接通过对话方式接受电子钱币支付, 无需金融单位的授 权。 电子钱币器 (电子显示器) 能够以独立方式或者联机方式进行工作:
10. 5. 1独立工作的电子钱币器, 不与金融浏览器或电子读写机相接触。 两个电子钱币 器之间依靠其存储器中的软件独立运行。 某个电子钱币器的输入接口与另一个电子钱币器 的输出接口直接进行连接。 其中一个电子钱币器的输出 (或者输入) 插头插入另一个电子 钱币器的输入 (或者输出) 插槽中, 可以直接进行交互电子钱币。 各个电子钱币器都具有 读、 译对方所有逻辑的功能, 能独立检验对方电子钱币器的合法性和持有人的身份。
10. 5. 2联机工作的电子钱币器, 能够插进金融浏览器或电子读写机上的专用插头 (或 者插槽) 上; 电子读写机可以通过专线、 无线电、 电话线路等, 直接与金融单位的优机网 络相连。 每笔金融业务均由电子钱币器实时传输到金融网络进行处理, 文件可以实时更新。 电子钱币器对其持有人的身份识别, 还可以采用指纹扫描、 声音确认和虹膜认证等生物测 定技术。
电子钱币器完全可以代替纸质钱币的所有功能(包括流通功能),是一种无纸化的钱币。 附图说明
图 1 金融单位(银行、 保险、 证券)业务专有广域网结构图。 金融总部和其分布于不 同地理位置跨地区的若干个金融分支机构等的各个内部网络 (即优机网络) 中的优机, 分 别通过辨机与公用网络连接起来, 构建一个 "高可信"的信息互操作的金融业务专有网络。
图 2 电子显示器 (或电子读写机) 原理示意图。 它由装有识别和控制软件的存储器、 微处理器, 并装有读、 写设备以及液晶显示器等组成。 电子显示器还可以有智能钱币软件。
图 3 金融总部或者重要金融分支机构的数据库系统备份自动化示意图。它的结构可以 由备份客户端、 备份服务器、 介质服务器、 备份存储单元和备份管理软件等组成。
图 4 用户在某个单位的电子业务站 (该单位优机网络) 进行业务的流程图。
图 5 用户通过金融网络(包括银行网络、保险网络、证券网络)进行业务基本流程图。 具体实施方式 某个金融单位的若干个优机网络 (或者其优机), 分别通过辨机, 与 互联网的路由器连接起来, 构建的互联网络, 就是金融网络 (图 1 )。 它的网络业务 (如网 络交易和支付) 是一种金融业务运营模式。 该金融单位既能够继承现有的电子金融的资源, 保证现有资源的利用和现有内部专用网络的正常运转; 同时又能够制定网络金融的统一标 准, 确保软件、 硬件、 通信的标准化, 并为金融单位将来的拓展留有余地。
金融单位 (包括金融总公司和重要金融分公司等) 的不同金融优机网络中, 两台主机 之间通过公用网络 (包括互联网)的 "高可信" 的通信 (图 1 ) 如下:
从金融优机网络中的源计算机发送的信息; 经源端优机, 到达源端的装有 《源端加密 程序》 的源端辨机; 经过加密后; 通过互联网; 到装有 《宿端解密程序》和 《检查程序的 程序》等的宿端辨机; 经过解密和检査病毒后; 转到宿端优机; 最后到达宿端目的计算机。
在金融优机网络系统中,各个金融优机网络的辨机装有相同的《检查程序的程序》、《源 端加密程序》 和 《宿端解密程序》 标准程序。 这样, 每台辨机都会对进出金融优机网络的 信息进行监控, 并且拒绝非法对各个金融优机网络的访问。
金融网络对于拥有众多金融优机网络的系统, 满足交互式应用和稳定性要求; 具有互 操作性; 可以区分一个具体文件的各部分不同安全性要求; 可以使用公钥基础结构, 进行 认证和密钥分配。
在金融网络系统中, 各个辨机也可以装有相同的 《对金融单位身份认证加密和授权程 序》程序, 并且每个辨机都含有其他各个辨机的 IP地址表和与其相连接的优机网络中各个 计算机名称 (或者地址) 的访问控制列表。 这样, 每台辨机都会对进出金融优机网络的所 有信息进行监控, 并且拒绝非法对金融优机网络的访问。
《检査程序的程序》 功能: 源端辨机接收到明文信息后, 对信息进行检査, 发现其中 的程序之后, 把它们排列在一起, 并且依次循环存储在外存储器中, 同时呈现在计算机的 显示屏上。如果这些程序是允许其访问的合法程序; 则用户在第一次出现提示时, 选择"以 后都允许"复选项, 辨机以后碰到这些程序时, 不会再次询问, 并允许其访问。 当用户在 一定时间内没有答复或者选择 "不允许"复选项, 辨机就丢弃该程序。 当外存储器中 "程 序"装满之后, 最早的 "程序"被自动丢弃。 宿端辨机单独运行这个程序。
辨机安装上 《检査程序的程序》之后, 就可以防止病毒攻击辨机保护的优机网络。
《源端加密程序》 功能: 源端辨机把欲通过公用网络发送的明文信息后面, 添加对称 加密的秘钥; 将此组合数据输入单向散列函数 (Message Digest ), 得出散列 (Hash) 值 (源 端散列值); 然后将明文信息 (不包含密钥)后面添加源端散列值, 用密钥进行加密, 变成 密文; 最后将该密文送行宿端辨机。
《宿端解密程序》 功能: 宿端辨机用事先协商的共享的密钥将接收的密文解密变成明 文, 得到明文信息和源端散列值; 把明文信息 (不包含散列值) 后面添加密钥; 将此组合 数据, 输入事先约定的单向散列函数, 得到散列值(宿端散列值); 该宿端散列值与接收到 的源端散列值相比较; 如果这两个散列值相同; 则确认该信息是从合法源端辨机发出的, 接受该信息; 发送到该宿端优机网络中的接收计算机上, 否则丢弃该信息。
身份验证 (Authentication) 最简单办法, 是各个辨机中建立一个用户名和密码库。 金融单位的辨机通过访问控制列表 (Access Control List , ACL) 来进行身份验证。 该列表简单地对不同类型的源端内部网络 (以辨机 IP地址为代表) 身份进行识别。
身份验证控制着谁可以访问金融单位的内部专有网络。 授权(Authorization)则规定 了用户在获得访问该网络资格后, 能做什么。
身份验证和授权新办法, 是建立一个用户或金融单位名、 IP地址、密码和授权权限库。 金融单位利用辨机中访问控制列表来进行用户 (指其他金融业务单位、 合作伙伴业务 单位或者远程用户) 身份验证。 该列表对不同类型的源端 (用户名)辨机 IP地址和用户的 密码进行身份识别。 只有用户名、 IP地址和用户的密码与该访问控制列表相同时, 基于地 址的身份验证才能保证生效。
网络金融的备份系统 (图 3 ) 软件提供完整的数据保护。 例如 Veritas NetBackup 软 件采用四级层次结构, 集中管理, 适应多种应用结构。 其技术特点为灵活设置、 灾难恢复、 并行处理、 数据可靠、 使用简便、 监控能力和系统数据恢复等。
网络金融的主要优机网络中, 正在进行的业务数据, 放在在线存储 (OnStore)设备中, 保证随时读取这些业务数据。 为防范可能发生的数据灾难, 使用离线存储 (Off Store)设备 对这些业务数据进行备份存储。
网络金融使用的虚拟存储 (Storage Virtualization) 备份管理软件, 提供一个透明 的存储系统。 它按照主要优机网络的指令, 自动将归档备份目录下的非活动数据归档备份 到近线存储 (NearStore)设备中, 将历史数据自动归档备份到离线存储设备。
1、 电子显示器含有微控制器、 输入按键和小型液晶显示器 (图 2) 等, 其实质是单片 式微型计算机(简称单片机)。 它还可以具有射频收发及其相关电路。 单片机具有读写和处 理信息等通用计算机功能。 小型液晶显示器的尺寸一般为 4英寸至 8英寸。 金融网络和电子显示器共同组成联机金融业务系统硬件。 金融浏览器和电子显示器的 软件, 都具有加码、 加密、 调制和解调、 解密、 解码等软件。 金融浏览器还具有对电子显 示器的安全加密算法的识别软件。电子显示器采用个人标识码(PIN)来识别持有人的身份。 电子显示器中的重要数据,经加密后还增加信息识别码 AC。联机金融业务系统检验识别码, 可辨认电子显示器是否被篡改, 并在浏览器的显示器上显示。
电子显示器的集成电路中含有微处理器、 随机存贮器、 只读存储器、 中断系统、 定时 器 /计数器和输入 /输出等主要微型计算机的基本部件和电路等。 所有部件的电路之间通过 地址总线、 数据总线和控制总线连接在一起, 再通过输入 /输出接口电路与外界计算机的电 路联络。 电子显示器上的微控制器具有控制液晶显示器显示字符和图像的重要作用, 不但 负责对电子显示器整体的协调与控制, 而且负担电子显示器的数字和参数的读入和存储的 控制。
电子显示器按读写方式, 与浏览器的外界数据交面不同; 可分为接触式和非接触式两 大类别。
接触式电子显示器的表面上, 有若干镀金的触点。 电子显示器将通过这些触点与金融 浏览器进行信息交流和真伪的辨认。
接触式电子显示器 (或者金融浏览器读头) 中的微控制器的集成电路芯片, 被连接到 一块含有电路板的金属接触芯片上。 它在使用时, 通过芯片上的八个 (或六个) 接触点, 与提供电源的浏览器 (或者提供电源的电子显示器) 上读头接触。 金融浏览器读入电子显 示器上的数据后, 其微处理器判断电子显示器是否有效。 经过相应的程序处理, 微处理器 对电子显示器发出读 (写) 指令; 电子显示器收到指令后, 经过自身的中央处理器运算, 判断是否为非法金融单位。若不是非法金融单位,金融浏览器则对电子显示器进行读(写)。 否则电子显示器拒绝金融浏览器的读 (写) 指令, 并发出警报声音, 在其液晶显示器上出 现 "非法金融单位"等文字。 接触式电子显示器的插头插在金融浏览器的插槽上。
金融网络的电子显示器的存储容量高达 64〜256KB,足以存储所需的软件、一次金融业 务的全部信息和多次金融业务的所有记录。 它的硬件有电压和时钟检测器、 曝光自动死机 逻辑、 防解剖等加密措施; 软件有密码保护、 安全加密算法等加密方法。 它可以显示金融 网络金融业务的所需信息。
浏览器和电子显示器的最小化传输差分信号 (Transition Minimized Differential Signaling, T DS ) 不仅适应液晶显示器主板的数字信号接口电路 (Digital Visual Interface, DVI ) ,而且进行数字传输时也需要一个发送器和一个接收器。
电子显示器需要和外界计算机互通。 它需要提供其身份识别信号, 给外界计算机检测 识别。 在其液晶显示器的输入 /输出接口电路中, 设置显示器数据通道 (Display Data Chnnel , DDC) 存储器电路。 该存储器是一片可擦除及可编程式只读存储器 (EEPR0M), 存 储了显示器识别数据, 即显示器的电子档案资料信息,例如可接收行 /场频范围、生产厂商、 日期、 产品序列号、 型号、 标准显示器模式及其参数、 设备数据和运行中所需要数据等。 网络金融电子显示器的 DDC存储器通过 DDC串行数据脚、 DDC串行时钟脚和外界计算机 进行信息互通, 完成液晶显示器的身份识别。 只有外界计算机识别液晶显示器, 两者才能 同步、 协调、 稳定地工作。
网络金融的电子显示器中的液晶显示器的数字输入接口电路, 接收到外界计算机中 TMDS发送器输出的 TMDS数字信号; 送到主板中的 TMDS接收器; 其输出的时钟信号送到时 钟发生器。 数字信号经解码送往主控电路的图像缩放处理器 (SCALER) 进行处理。 主控电 路对输入图像信号进行格式判断, 对图像进行缩放处理、 图像定位等操作。
在电子显示器的液晶显示器主控电路中经过处理的行同步信号, 送往锁相环式时钟发 生器电路, 使其产生的时钟脉冲与输入行同步信号锁定; 另一路送往屏显电路 (On Screen Display,0SD:)。 屏显电路需要的行 /场同步信号 (HS、 VS ), 不是直接取自外部输入的行 / 场同步信号,而是取自主控电路输出的行 /场同步信号。即使液晶显示器在没有信号输入时, 其主控电路送往屏显电路的行 /场同步信号, 根据预先编程好的定时数据, 在图像缩放处理 器(SCALER) 中产生的行 /场同步信号, 可以确保液晶显示器在没有信号输入时, 也能有正 常的屏显和菜单显示。
网络金融的电子显示器的数字信号经过液晶显示器的主控电路的图像缩放处理器 (SCALER) 处理, 使之能够适合液晶板物理分辨率的数字信号, 连同数字行 /场同步信号, 送往液晶板接口电路, 将数字视频信号转换为符合液晶板接口电路要求的数字视频信号。
电子显示器的液晶板接口电路将转换后的数字视频信号, 单独(如果本身包含显示行 / 场同步信号)或者连同显示行 /场同步信号, 送往液晶板的定时电路和驱动控制电路; 驱动 液晶显示器的液晶显屏上显示字符、 图像。
电子显示器的数字输入接口电路接收到的行 /场同步信号, 还有一路送往微控制器, 对 液晶显示器进行节能管理, 并且控制液晶显示器进入正常工作、 待机、 挂起、 关闭状态等。
电子显示器中的液晶显示器使用 DisplayPort接口电路, 可以实现低成本的直接驱动 式液晶显示器, 同时仅需要一条连接线就可以把所有信号都输入到主板的视频处理器中。
非接触式电子显示器主要由射频天线、 无线收发模块、 输入按键和含有单片机的液晶 显示器等组成。
不带高能电池的非接触式电子显示器, 可由电子读写机通过无线方式供电, 再经过电 子显示器内的稳压电路产生芯片工作所需的直流电压(2〜3伏特); 并通过射频接口电路接 收到 (或发送至) 电子读写机的无线信号。
内装高能电池的非接触式电子显示器, 电子读写机可以不用配备电池, 可由电子显示 器通过无线方式供电。
射频芯片中的电路由接口电路、 存取控制和存储器三个模块组成。
电子显示器才是真正的可重复使用的无纸化凭证; 其可以替代各种各样的纸质凭证和 各种集成电路卡, 例如现金、 支票、 电子现金、 电子信用卡、 电子支票等。 2、 网络金融中的电子读写机程序, 与电子显示器软件一样, 都具有加码、 加密、 调制 和解调、 解密、 解码等相同软件。 电子读写机还具有对电子显示器的安全加密算法的加密 和解密软件。 它采用个人标识码 (PIN) 来识别持有人的身份。 电子显示器中的重要数据, 经加密后还增加信息识别码 AC。 电子读写机检验识别码, 可辨认电子显示器是否被篡改, 并在电子读写机的显示器上显示。
电子读写机可以制成固定式的或者移动式的形状和不同尺寸; 一般制成固定式的灵巧 形状或者手提式电子读写机; 手提式电子读写机一般尺寸为 8英寸至 14英寸; 可以同时显 示几个用户的相片。
电子读写机的微控制器, 含有微处理器、 随机存贮器、 只读存储器、 中断系统、 定时 器 /计数器和输入 /输出等主要微型计算机基本部件和电路等。 它们的电路之间通过地址总 线、数据总线和控制总线连接在一起,再通过输入 /输出接口电路与外界计算机的电路联络。 它实质也是单片机。 其具有控制电子读写机上的液晶显示器显示字符和图像的重要作用, 不但负责对整机的协调与控制, 而且负担数字和参数的读写和存储。
网络金融的电子读写机的液晶显示器(图 2)采用的最小化传输差分信号(Transition Minimized Differential Signaling, TMDS ), 不仅适应液晶显示器上主板的数字信号接口 电路 (Digital Visual Interface, DVI ) ,而且进行数字传输时也需要一个发送器和一个接 收器。
由于电子读写机的液晶显示器需要和外界计算机互通, 所以需要提供其身份识别信号, 给外界计算机检测识别。 在液晶显示器的输入 /输出接口电路中, 设置显示器数据通道 (Display Data Chnnel , DDC) 存储器电路。 该存储器是一片可擦除及可编程式只读存储 器 (EEPR0M), 存储扩展显示器识别数据, 即显示器的电子档案资料信息, 例如可接收行 / 场频范围、 生产厂商、 日期、 产品序列号、 型号、 标准显示器模式及其参数、 设备数据和 运行中所需要数据等。
网络金融的电子读写机的 DDC存储器通过 DDC串行数据脚、 DDC串行时钟脚和外界计算 机进行信息互通, 完成液晶显示器的身份识别。 只有外界计算机识别液晶显示器, 两者才 能同步、 协调、 稳定地工作。
网络金融的电子读写机中的液晶显示器的数字输入接口电路, 接收到外界计算机中 TMDS发送器输出的 TMDS数字信号; 送到液晶显示器主板中的 TMDS接收器; 其输出的时钟 信号送到时钟发生器。 数字信号经解码送往主控电路的图像缩放处理器 (SCALER) 进行处 理。 主控电路对输入图像信号进行格式判断, 对图像进行缩放处理、 图像定位等操作。
在电子读写机的液晶显示器主控电路中经过处理的行同步信号, 送往锁相环式时钟发 生器电路, 使其产生的时钟脉冲与输入行同步信号锁定; 另一路送往屏显电路 (On Screen Display , 0SD)。 屏显电路需要的行 /场同步信号 (HS、 VS), 不是直接取自外部输入的行 / 场同步信号,而是取自主控电路输出的行 /场同步信号。即使液晶显示器在没有信号输入时, 其主控电路送往屏显电路的行 /场同步信号, 根据预先编程好的定时数据, 在图像缩放处理 器(SCALER) 中产生的行 /场同步信号, 可以确保液晶显示器在没有信号输入时, 也能有正 常的屏显和菜单显示。
数字信号经过液晶显示器的主控电路的图像缩放处理器 (SCALER) 处理, 使之能够适 合液晶板物理分辨率的数字信号, 连同数字行 /场同步信号, 送往液晶板接口电路, 将数字 视频信号转换为符合液晶板接口电路要求的数字视频信号。
电子读写机的液晶板接口电路将转换后的数字视频信号, 单独 (如果本身包含数字显 示行 /场同步信号)或者连同显示行 /场同步信号, 送往液晶板的定时电路和驱动控制电路; 驱动液晶显示器; 在液晶显屏上显示字符、 图像。
液晶显示器的数字输入接口电路接收到的行 /场同步信号, 还有一路送往微控制器, 对 液晶显示器进行节能管理, 并且控制液晶显示器进入正常工作、 待机、 挂起、 关闭状态等。
电子读写机的液晶显示器使用 DisplayPort接口电路, 可以实现低成本的直接驱动式 液晶显示器, 同时仅需要一条连接线就可以把所有信号都输入到主板的视频处理器中。
接触式电子读写机主要由输入按键和含有单片机的液晶显示器等组成。
接触式电子读写机中的集成电路芯片, 被连接到一块含有电路板的金属接触片上。 它 在使用时, 通过芯片上的八个 (或六个) 接触点, 与提供电源的电子显示器上读头接触。 电子读写机读入电子显示器上的数据后, 由其微处理器判断电子显示器是否有效。 它经过 相应的程序处理, 其微处理器对电子显示器发出读 (写) 指令; 电子显示器收到指令后, 经过自身的中央处理器运算, 判断是否为非法电子读写机。 若不是非法电子读写机, 电子 读写机则进行读 (写); 否则电子显示器拒绝读 (写)指令, 并发出警报声音, 在液晶显示 器上出现 "非法金融单位"等文字。
非接触式电子读写机增加无线射频识别 RFID技术。 电子读写机与电子显示器通过无线 电进行信息交互处理。
非接触式电子读写机主要由射频天线、 无线收发模块、 输入按键和含有单片机的液晶 显示器等组成。
不带高能电池的非接触式电子读写机, 可由电子显示器通过无线方式供电, 再经过电 子读写机内的稳压电路产生芯片工作所需的直流电压(2〜3伏特); 并通过射频接口电路接 收到 (或发送至) 电子显示器的无线信号。
内装高能电池的非接触式电子读写机, 电子显示器可以不用配备电池, 可由电子读写 机通过无线方式供电。
射频芯片中的电路由接口电路、 存取控制和存储器三个模块组成。
RFID技术通过电子读写机与相距十厘米至几十米的电子显示器间的无线通信; 自动化 进行信息读取, 整个过程无需人工干预; 可工作在各种恶劣环境中; 并且一般污垢覆盖在 电子显示器上,.也不影响其中存储信息的识读。
电子读写机可以识别高速运动物体, 可以同时识别多个电子显示器; 操作快捷方便, 保密性强。
在电子显示器脱机独立进行金融业务时, 电子读写机将要发送的信号, 经加密后调制 在某一频率的载波信息上, 通过天线向外发送。 进入该电子读写机工作区域的电子显示器 接收此脉冲信号。 电子显示器中的有关电路对此信号进行调制、 解密和解码, 并且判断为 读命令。 电子显示器从存储器中读取有关信息, 经编码、 加密、 调制后, 通过天线再发送 给电子读写机。 电子读写机对接收到的信息进行解调、 解密、 解码后, 送至其微型计算机 进行处理。 经过相应的程序处理, 电子读写机中微处理器对电子显示器发出读 (写)指令; 电子显示器收到指令后, 经过自身的中央处理器运算, 判断是否为非法电子读写机。 若不 是非法电子读写机, 电子读写机则进行读 (写); 否则它拒绝电子读写机的读 (写) 指令, 并发出警报声音, 在液晶显示器上出现 "非法电子读写机"等文字。 如果电子读写机经判 断对应的电子显示器密码和信息权限不符, 则返回各种出错信息; 并且在电子读写机上发 出警报, 显示警报内容。
3、 某个银行的若干个银行浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存款 机、 账户查询服务终端、 公共事务缴费服务机、 电话银行系统、 多媒体査询系统、 电子读 写机、 服务器、 优机和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可以是有线 的或无线的) 相连接所组成的优机网络, 是该银行的一个电子银行。 实际上该银行现有的 每个地方的局域网或内联网, 都是一个电子银行。
电子银行系统 "专家智囊团软件"是银行系统的各种业务软件、 理财软件、 银行风险 预警软件等。
投资理财功能: 电子钱币是商品价值形式的代表。 在网络金融中电子钱币的流通具有 很大的灵活性。 应用电子钱币作为商品的支付工具, 可以使人们手中的闲置资金不断地向 高收益的领域或环节流通, 从而为人们带来更多的财富。 其中综合理财包括证券、 保险、 基金业务。 总之网络金融使电子显示器 (即电子钱币) 成为真正意义上的 "一币通"。
市场功能: 网络金融加快了金融市场一体化的进程和电子钱币的流通速度; 金融机构 面对的投资领域更广、 投资机会也更多; 市场上的微小变化都可能形成逐级增强的投资结 构的变化; 有利于银行总行对投放的电子钱币总量和资产价格进行调节。
贴现率功能: 贴现率是以银行总部的再贷款成本和数量为基础, 通过再贷款的价格和 数量的变动, 调整商业银行的流动性来发挥其作用。 商业银行发行电子钱币, 可以使发行 电子钱币所产生的净收益为零的均衡。
信息增值: 在提供金融信息咨询的基础上, 以资金托管、 账户托管为手段, 为客户的 资金使用安排提供周到的专业化的理财建议和顾问方案。 建立健全企业和个人的信用等级 评定制度, 实现社会资源的共享, 提供信息增值服务。
公共信息服务: 为所有客户提供利率、 汇率、 股票指数、 保险品质等金融市场信息, 以及金融、 经济等新闻; 同时为其客户提供所定制的专门信息。
投资咨询服务: 以银行客户为对象, 利用电子银行的方式实时代理客户支付清算, 提 供投资咨询、 策划专业理财等。 其中综合咨询包括证券、 保险、 基金业务的咨询; 代理企 业内部财务管理业务, 代理个人收支规划, 提供网络金融超市等。
综合经营服务: 经营服务既包括直接或者间接控制网络商店, 提供商品交易服务 (包 括发行电子钱币、 提供电子钱包) 等。
电子银行系统中还可以釆取防范支付风险发生的措施: 切实防止法规性风险、 加强管 理流动性风险、 切实规避信用风险、 严格防止欺诈风险、 防范发生操作风险等。
电子银行可以针对不同客户的需求开展智能化、 个性化的服务; 例如让企业集团可以 通过网络银行査询各个子公司的账户和交易记录, 并在签订多边协议的基础上实现集团内 部的资金调度与划拨, 提高集团整体的资金使用效益, 为客户改善内部经营管理、 财务管 理提供有力的支持。
网络金融交易和市场平台的开放性、 全天候和无疆界限制, 可使网络经济趋于全球化。 网络银行采用的开放技术和软件, 能够降低银行软件硬件的系统开发和维护的费用。 网络银行的客户端由标准的 PC机与浏览器软件组成, 主要采取浏览器 /服务器应用模式, 便于维护。 同时网络银行系统的维护升级也变得简单, 如在升级应用系统或者安装新产品 时, 只需简单地更新或升级服务器应用程序即可, 无需对客户端进行任何变动。
网络银行使客户的信息容易收集, 也便于银行和客户之间互动, 使双方更加了解。 网 络银行可以自动对各种信息进行统计、 分析、 挖掘; 其结果有助于强化银行的金融管理。
电子银行能够引入电子证券、 电子保险等行业的业务, 拓宽银行的新业务, 向客户提 供更多的一体化的金融服务。
4、 某个保险机构的若干个保险和保障系统的保险浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存取款机、 优机、 电子读写机和数据库服务器等, 采用网络拓扑结构技 术, 通过介质 (可以是有线的或无线的) 相连接所组成的优机网络, 是该保险机构的一个 电子保险。 该保险机构的现有的每个地方的局域网或内联网, 都是一个电子保险。
保险系统 "专家智囊团软件"是各种保险业务软件、 信息增值服务软件、 不同保险风 险预警软件。 保险公司现有的每台主机, 都是一个电子保险的 "专家智囊团软件"。
电子保险可以为客户提供保费账户査询、 电子交易 (即时交易)、 缴费明细等。
电子保险可以提供集团企业总 (母) 公司办理保险业务所需要的有关资料、 保险业务 办理手续 (程序) 等信息和咨询信息。
电子保险能够引入电子银行、 电子证券等行业的业务, 拓宽保险公司的新业务, 向客 户提供更多的一体化的金融服务。
5、 某个证券公司的若干个证券浏览器、 现金配出器、 自动柜员机、 自动出鈔机、 自动 存取款机、 优机、 电子读写机和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可 以是有线的或无线的) 相连接所组成的优机网络, 是该证券公司的一个电子证券。 该证券 公司的现有的每个地方的局域网或内联网, 都是一个电子证券。 证券系统 "专家智囊团软件", 是证券系统的各种证券业务软件、 各种证券信息增值软 件、 不同证券风险预警软件等。
证券簿记功能: 可以方便、 快捷地实现各类政府债券的买入和卖出的交易, 为中央银 行实现其货币政策目标提供有效的手段。 它可以在进行证券交易交割的同时就能实现账户 资金的转移, 确保安全性、 可靠性和实时性。
通过电子证券可以实现基金的认购、 申购以及基本信息査询等功能。
电子证券可以为客户提供债券账户査询、 电子交易 (即时交易)、 成交明细; 査询债券 价格以及债市信息等。
电子证券可以提供集团企业总 (母) 公司办理证券业务所需要的有关资料、 证券业务 办理程序等信息和咨询信息。
电子证券能够引入电子银行、 电子保险等行业的业务, 拓宽证券公司的新业务, 向客 户提供更多的一体化的金融服务。
6、 某个银行机构的各个电子银行 (或者其优机), 通过辨机与互联网上的路由器相连 接, 构建成该银行的 "高可信"的银行业务专有广域网, 就是银行网络 (图 1 )。 在这个网 络上利用电子显示器和 /或电子读写机所进行的银行业务, 就是网络银行。
客户在业务单位的业务站进行交易、 业务的一般流程 (图 4): 客户在业务站点击业务 浏览器, 进入业务站的网页, 输入业务的信息后, 选择自己需要的有关信息。 客户在该业 务站的现金存款机上交款或者选择电子支付的结算工具; 当客户已经在该存款机上交款或 者银行发来电子结算成功的信息后, 给客户的电子显示器输入业务信息, 并且给该业务浏 览器发送客户已经付款; 或电子付款成功或业务成功等信息; 通知客户拔掉电子显示器。
客户通过公用网络进行业务交易和电子支付的流程 (图 5): 客户用浏览器连接公用网 络进入某个网络业务中的业务站网页; 其中业务站优机用私钥把该业务站在其网络银行中 的银行帐号和密码加密, 密文作为业务站数字签名; 客户用私钥对其在客户银行中的银行 帐号和密码加密, 密文作为客户数字签名; 客户银行将业务站银行在客户银行的结算账号 和密码, 用自己的私钥加密, 作为客户银行数字签名; 业务站银行用业务站公钥对业务站 账号、 密码和业务站应收金额加密; 客户收到商品或者服务, 用其私钥将确认付款的信息 和密码加密作为其数字签名; 由银行之间进行结算。
7、 '某个保险公司的各个电子保险 (或者其优机), 通过辨机与互联网上的路由器相连 接, 构建成该公司的保险网络(图 1 )。在这个网络上利用电子显示器和 /或电子读写机所进 行的保险业务, 就是网络保险。
客户在业务单位的业务站进行保险业务的流程 (图 4), 与客户在业务单位的业务站进 行业务的流程基本相同; 不同是在保险公司的开户银行交纳保险费。
客户通过互联网进行保险业务和网络支付的流程 (图 5 ), 与客户通过公用网络进行网 络业务交易和网络支付的流程基本相同; 不同是在保险公司的开户银行交纳保险费。 8、 某个证券公司的各个电子证券 (或者其优机), 通过辨机与互联网上的路由器相连 接, 构建成证券网络(图 1 )。在这个网络上利用电子显示器和 /或电子读写机所进行的证券 业务, 就是网络证券。
客户在业务单位的业务站进行证券业务的流程 (图 4), 与客户在业务单位的业务站进 行业务的流程基本相同; 不同是在证券公司的开户银行交纳证券费。
客户通过互联网进行证券业务和网络支付的流程 (图 5 ), 与客户通过公用网络进行网 络业务交易和网络支付的流程基本相同; 不同是在证券公司的开户银行交纳证券费或交易 费。
9、 金融单位的远程客户机, 通过介质 (可以是有线的或无线的) 与公用网络上的路由 器相连接后, 能够登录金融单位的优机网络, 就是访问网 (图 1)。 它是由装有金融单位的 辨机标准程序的远程客户机, 连接到公用网络之后, 能够与该金融单位的优机网络, 进行
"高可信" 的信息互操作的系统。
客户或企业也可将移动电话、 固定电话、 电视、计算机等多媒体设备(含有辨机程序), 通过介质与公用网络的路由器相连接后, 能够登录金融单位的优机网络, 也是访问网。
为了确保远程客户机和单位专有网之间, 通过互联网进行安全和精确的信息互操作, 也可以采用加密强度高的数据加密和身份认证方法。 一般采用公钥密码算法 (Public-Key Crypto-graphic Algorithms) 技术进行身份认证和密钥交换; 采用对称加密解密技术进行 信息的加密和解密。
远程客户机装有 《对单位身份认证加密和授权程序》 功能; 单位优机网络的辨机装有 《对用户的身份认证加密和授权程序》 功能之后, 并且远程客户机和单位的各个辨机中都 有这些远程客户机和辨机的 IP地址表和被允许访问的优机网络中的每个主机名称(或者地 址) 的访问控制列表。 用户的远程客户机和单位内联网辨机的功能, 使用户发送或接收的 信息在互联网上被密文传送, 保证信息传输的安全可靠性, 防止重要数据在互联网上被窃。
访问网的远程客户机和优机网络中辨机,通过互联网的安全和精确的通信如下(图 4): 与单位优机网络相连接的装有 《对用户的身份认证加密和授权程序》 辨机, 或者装有 《对单位的身份认证加密和授权程序》 远程客户机, 能够加密各种信息, 并且只允许该单 位的源端优机网络和远程客户机的信息, 经过加密之后, 进入到互联网。
与单位优机网络相连接的辨机, 装有 《对用户的身份认证加密和授权程序》 功能等, 能够识别从互联网进来的各种信息, 并且只允许远程客户机的信息, 经过解密之后, 进入 到该宿端优机网络中的接收计算机。
远程客户机装有 《对单位的身份认证加密和授权程序》 功能等, 能够识别从互联网进 来的各种信息。 它只允许该单位的源端优机网络中的计算机的信息, 经过解密之后, 进入 到远程客户机。
用于提供远程移动用户对单位内联网的安全访问, 是非固定线路的专用网; 对于不同 形式的访问技术, 只要更新专用网络的访问策略, 就可以实现该技术。
10、 将电子显示器 (或者电子钱币器) 的互相匹配的输入接口电路和输出接口电路, 分 别位于电子显示器 (或者电子钱币器) 的不同位置; 输出插头 (或者插槽) 的接口电路, 可 以恰好插入输入插槽 (或者插头) 的接口电路。 则电子显示器 (或者电子钱币器)之间可直 接通过信息交互, 进行电子钱币的交流, 代替现有纸质钱币的使用。
电子显示器 (或者电子钱币器) 的结构和装有 《检查程序的程序》、 《源端加密程序》与 《宿端解密程序》 等辨机的软件, 是实现各个不同功能的电子显示器安全的基础。 电子显 示器 (或者电子钱币器) 安装一些标准的功能程序。 同时它根据不同功能的需要, 还可以增 加安装一些其他功能的程序。
电子显示器 (或者电子钱币器) 的软件, 都具有加码、 加密、 调制和解调、 解密、 解码 等软件以及存取款软件。 它还具有对电子钱币器的安全加密算法的识别软件。 电子钱币器 采用个人标识码 (PIN)来识别持有人的身份。 电子钱币器中的重要数据, 经加密后还增加 信息识别码 MAC。它可以检验识别码, 可辨认对方的电子钱币器是否被篡改, 并在液晶显示 器上显示。 电子钱币器的微控制器含有微处理器、 随机存贮器、 只读存储器、 中断系统、 定时器 /计数器和输入 /输出等主要微型计算机基本部件和电路等。 它们的电路之间通过地 址总线、 数据总线和控制总线连接在一起, 再通过输入 /输出接口, 与外界计算机或者微控 制器的电路联络。 微控制器具有控制电子钱币器上的液晶显示器显示字符和图像的重要作 用, 不但负责对电子钱币器整体的协调与控制, 而且负担电子钱币器的数字和参数的读入 和存储的控制。
电子显示器 (或者电子钱币器) 的存储容量高达 64〜256KB, 足以存储所需的软件、 身 份证的全部信息和多次存取款和收费的所有记录。 它的硬件有电压和时钟检测器、 曝光自 动死机逻辑、 防解剖等加密措施; 软件有密码保护、 安全加密算法等加密方法。

Claims

1、电子显示器具有微处理器、输入按键、小型显示器等;其集成电路具有数据存储器、 工作存储器和程序存储器的电路;
电子显示器程序包含辨机的标准程序和信息完整检査程序;
电子显示器还可以根据需要, 增加身份认证等的硬件和软件;
每个电子显示器都有互相匹配的输入接口电路和 /或输出接口电路; 它们分别位于电子 显示器的不同位置; 输出插头(或者插槽)接口电路, 可以恰好插入输入插槽(或者插头) 的接口电路; 它们之间可以直接通过信息交互, 进行金融业务交流;
电子显示器既需要联机进行信息处理, 又不需要联机授权处理; 因此允许它脱机使用; 电子显示器还可以具有:
1. 1电子显示器可以通过金融浏览器的网络支付,存取电子钱币;它也可以给其他电子 显示器输入或输出电子钱币; 电子读写机也可以给电子显示器存储电子钱币;
电子显示器可以作为具有电子钱币或者纸质钱币的一切功能的钱币在市场上使用;
1. 2电子显示器的 CPU对信息的加密处理、 完整检验和身份认证可以采用新方法; 1. 3电子显示器由密码方式保护,持有人的真正的钱是存储在金融账户上;它也可以作 为借记卡; 如果电子显示器丢失或者受损坏, 持有人的钱并没有丢失;
1. 4用户采用实名制电子显示器时,只要将第二代身份证刷过金融单位的浏览器上的身 份证刷槽即可; 浏览器可将用户身份证的号码和其个人本身相片等资料输入电子显示器中; 这些资料只要刷一次即可; 以后再用该电子显示器重复金融业务时, 就不用重新再刷;
1. 5电子显示器能够以独立方式或者联机方式进行工作:
1. 5. 1独立工作的电子显示器, 不与金融浏览器相接触; 两个电子显示器和 /或电子读 写机之间依靠其存储器中的软件独立运行; 它们可以通过其不同的输入接口与输出接口直 接进行连接; 这种电子显示器具有读、 译其所有的逻辑功能, 能独立检验各自电子显示器 的合法性和持有人的身份; 电子显示器的输出 (或者输入)插头,也可以插入电子读写机的 输入(或者输出)插槽中, 直接进行交互信息;
1. 5. 2联机工作的电子显示器,插进金融浏览器或电子读写机上的专用插头上;浏览器 或电子读写机通过专线、 电话线路等直接与金融优机网络相连; 每笔金融业务均由电子显 示器实时传输到金融优机网络进行处理, 文件可以实时更新; 电子显示器对其持有人的身 份识别, 还可以采用指纹扫描、 声音确认和虹膜认证等生物测定技术;
1. 6电子显示器还可以采用数字签名和访问控制策略等程序;并且借助应用层,对传输 的各种信息实行安全性等级管理; 它对于一个信息中的某些部分段落, 可以根据其不同的 安全等级, 进行相应的安全加密;
1. 7电子显示器内存储的安全控制软件,也可以具有对电子显示器持有人进行检验个人 身份证识别号, 而确定持有人合法性的功能; 它可以含有并且显示个人二代身份证号和其 中个人相片, 实行实名制;
1. 8电子显示器的存储容量高达 64〜256KB, 足以存储所需的软件、 身份证的全部倩裒. 和多次存取款和收费的所有记录; 它的硬件有电压和时钟检测器、 曝光自动死机逻辑、 防 解剖等加密措施; 软件有密码保护、 安全加密算法等加密方法。
2、 电子读写器装有识别和控制软件的存储器、 读写设备、 显示器等; 其控制器能够对 信息进行加码、 加密、 调制和解调、 解密、 解码等;
电子读写器程序含有辨机的标准程序, 具有信息加密体制和防止计算机病毒的软件; 电子读写机还可以具有:
2. 1电子显示器对于一个信息中的某些部分段落,还可以根据其不同的安全等级,进行 相应的安全加密; 电子读写机内存储的安全控制软件, 也可以具有检验个人身份证识别号, 而确定持有人合法性的功能; 它可以含有并且显示个人二代身份证号和其中个人相片, 实 行实名制;
2. 2不带高能电池的非接触式电子读写机,可由电子显示器通过无线方式供电,再经过 电子读写机内的稳压电路产生集成电路芯片工作所需的直流电压;
2. 3内装高能电池的非接触式电子读写机工作时, 电子显示器不用配备电池,可由电子 读写机通过无线方式向其供电;
2. 4电子读写机的微控制器系统, 充分发挥规范、方便和高效的信息运行功能; 电子显 示器能够被电子读写机所识别, 同时可以启动电子读写机;
用户利用电子显示器, 可直接在电子读写机上, 以联机或者脱机方式, 自行完成存取 电子钱币款和转账等金融业务交易;
2. 5电子读写机能够以单独方式或者联机方式工作:
2. 5. 1单独工作的电子读写机不与金融网络 (一般为优机网络)相连;
电子读写机依靠其存储器中的软件独立运行; 它与业务的主机之间通过定时交换软盘 来交互信息;
这种电子读写机具有读、 译其电子显示器的所有逻辑功能, 能独立检验电子显示器的 合法性和持有人的身份;
2. 5. 2联机工作的电子读写机, 通过专线、 电话线路等直接与金融网络相连; 每笔业务均由电子读写机实时传输到金融网络进行认证和处理, 文件可以实时更新; 电子读写机对电子显示器持有人的身份识别, 还可以采用指纹扫描、 声音确认和虹膜 认证等生物技术;
2. 6电子读写机还可以采用数字签名和访问控制策略等程序;并且借助应用层,对传输 的各种信息实行安全性等级管理;
2. 7采用条码技术,电子读写机还可以应用于另售业、生产企业、事业单位、图书管理、 仓库自动化管理等领域;
2. 8电子读写机可以有各种标准接口电路, 还可以有一些专用接口电路, 如与磁卡和 IC卡阅读器、 条码阅读器和电子秤等的接口电路。
3、 某个银行的若干个银行浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存款 机、 账户查询服务终端、 公共事务缴费服务机、 电话银行系统、 多媒体査询系统、 电子读 写器、 服务器、 优机和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可以是有线 的或无线的) 相连接组成电子银行;
电子银行中的优机或者某个主机, 含有银行系统 "专家智囊团软件", 可以提供各种银 行业务服务; 还可以提供各种银行信息增值服务; 还可以提供不同银行风险预警功能; 电子银行除了可以提供传统银行业务之外, 还可以提供三种新的银行业务: 公共信息 服务、 投资咨询服务和综合经营服务;
电子银行采用无线网络, 可以有力地支持电子银行的业务开展和服务的便利; 电子银行还可以具有:
3. 1电子银行可以是局域网、城域网或广域网;它可以是有线网络;也可以是无线网络;
3. 2自动存款机(AD)是只作存款用的终端机; 它可以与浏览器, 合并成具有存款和付 款功能的银行浏览器; 它也可以给电子显示器存储和取出电子钱币;
3. 3各个电子银行可以独立承担相对应分支银行的各种业务;
3. 4人们可以通过电子银行的浏览器或者自动存款机, 直接办理银行业务;
3. 5电子银行能够融合电子银行、 电子证券、 电子银行等行业市场, 减少各类金融企业 对同样客户的劳动重复, 拓宽银行公司创新空间, 向客户提供更多量体裁衣式的银行服务;
3. 6现金配出器和存款机分别是只作取款、存款用的终端机; 它们可以与银行浏览器合 并成具有取、存款功能的银行浏览器; 即它们也可合并为自动存取款机(即存取纸质钱币);
3. 7银行浏览器还可以通过互联网, 从其他电子银行中存取电子钱币;
3. 8银行浏览器还可以给电子显示器存储电子钱币。
4、 某个保险机构的若干个保险浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动 存取款机、 优机、 电子读写器和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可 以是有线的或无线的) 相连接组成电子保险;
电子保险中的优机或者某个主机, 含有保险系统 "专家智囊团软件", 可以提供各种保 险业务服务; 它还可以提供各种保险信息增值服务; 提供不同保险风险预警功能;
保险浏览器是提供给人们使用的装有浏览器软件和存取款机软件的工作站;
自动存取款机通过网络支付, 利用自动柜员机,可以进行纸质钱币的保险费的存取; 电子保险可以为成千上万的企业和数百万的人员执行保险计划; 这意味每一个人员的 薪水或者个人情况发生任何变化, 电子保险都得更新它的数据; 这种智能保险业务的流程- 被保险人或者其委托人, 通过电子文件、 电子邮件或电子传真, 将需要改变的数据通 知电子保险; 电子保险收到这些数据之后, 将这些数据输入到数据库; 这样的程序在电子 保险与客户之间形成了稳固的流程; 由于必要的信息在被保险人或者其委托人和电子保险 的系统中都有保存, 所以可以通过电子保险, 替换原来的数据重新形成新的数据;
电子保险采用无线网络, 可以有力地支持电子保险的业务开展和服务的便利; 电子保险还可以具有:
4. 1电子保险可以是局域网、城域网或广域网;它可以是有线网络;也可以是无线网络;
4. 2自动存取款机可以作存款、取款的终端机; 它可以与浏览器, 合并成具有存款和付 款功能的保险浏览器; 它也可以给电子显示器存储电子钱币;
4. 3各个电子保险可以独立承担分支保险机构的业务;
4. 4人们可以通过保险浏览器或者自动存取款机, 直接交纳保险费用;
4. 5电子保险能够融合电子银行、 电子证券、 电子保险等行业市场;
4. 6现金配出器和存取款机可以是只作取款、存款用的终端机; 它们可与保险浏览器合 并成具有取、存款功能的保险浏览器; 即它们也可合并为自动存取款机(即存取纸质钱币); 4. 7保险浏览器还可以通过互联网, 从其他电子保险中存取电子钱币;
4. 8保险浏览器还可以给电子显示器存储电子钱币。
5、 某个证券公司若干个证券浏览器、 现金配出器、 自动柜员机、 自动出钞机、 自动存 取款机、 优机、 电子读写器和数据库服务器等, 采用网络拓扑结构技术, 通过介质 (可以 是有线的或无线的) 相连接组成电子证券;
电子证券中的优机或者某个主机, 含有证券系统 "专家智囊团软件", 可以提供各种证 券业务服务; 提供各种证券信息增值服务; 提供不同证券风险预警功能; 使证券公司向全 能化、 国际化、 集约化和多元化的方向发展;
证券浏览器是提供给人们使用的装有浏览器软件和存取款机软件的工作站;
证券浏览器可以通过网络支付, 利用自动柜员机,进行纸质钱币的证券费的存取; 电子证券可以为成千上万的企业和数百万的人员执行证券计划; 这意味每一个人员的 证券投资情况发生任何变化, 电子证券都得更新它的数据; 这种智能证券业务的流程: 证券投资人或者其委托人, 通过电子文件、 电子邮件或电子传真, 将需要改变的数据 通知电子证券; 电子证券收到这些数据之后, 将这些数据输入到数据库; 这样的程序在电 子证券与客户之间形成了稳固的流程; 由于必要的信息在证券投资人或者其委托人和电子 证券的系统中都有保存, 所以可以通过电子证券, 替换原来的数据重新形成新的数据; 电子证券采用无线网络, 可以有力地支持电子证券的业务开展和服务的便利; 电子证券还可以具有:
5. 1电子证券可以是局域网、城域网或广域网;它可以是有线网络;也可以是无线网络;
5. 2自动存取款机可以作存款、取款的终端机; 它可以与浏览器, 合并成具有存款和付 款功能的证券浏览器; 它也可以给电子显示器存储电子钱币;
5. 3各个电子证券可以独立承担分支证券公司的业务;
5. 4人们可以通过证券浏览器或者自动存取款机, 直接交纳证券费用;
5. 5电子证券能够融合电子银行、 电子证券、 电子证券等行业市场, 减少各类金融企业 对同样客户的劳动重复, 拓宽证券公司的创新空间, 向客户提供更多量体裁衣式证券服务; 5. 6证券浏览器可以从电子证券中直接存取电子钱币;
5. 7证券浏览器通过互联网, 可以从其他电子证券中存取电子钱币;
5. 8现金配出器和存取款机是只作取款、存款用的终端机; 它们可以与证券浏览器合并 成具有取、 存款功能的证券浏览器; 即它们也可合并为证券存取款机 (即存取纸质钱币)。
6、 某个银行的各个电子银行(或者其优机) 与辨机相连接, 辨机通过介质 (可以是有 线的或无线的) 与互联网或 /和无线公用网络的路由器相连接, 构建成银行网络; 在这个网 络上利用电子显示器和 /或电子读写器所进行的银行业务, 就是网络银行;
每一个电子银行都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的控制功 能, 使各个电子银行之间通过公用网络互通; 所有电子银行都能确保银行业务的安全性和 信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施银行业务等诈骗;
6. 1在没有网络的农村, 计算机可以利用电话线进行金融业务处理; 无论 PC机、 工作 站、 小型机、 主机等均可作为金融业务计算机; 由于使用电话 (或者手机)进行金融业务, 需要通过电话通信网络; 因此调制解调器是必备的硬件设备; 调制解调器的功能与传输速 度, 应根据实际的金融业务需求来决定选择; 一般常用的通信线路是电话线路;
6. 2网络银行可以采用以下的方式 (B2C型网络支付方式) 进行业务等:
6. 2. 1客户通过互联网在业务站浏览器上, 进行商务交易流程:
①客户将网络银行的电子显示器的插头(也是浏览器的电源开关), 插在电子银行的业 务浏览器的电子显示器专用插槽上, 并且点击业务浏览器上的网页, 进入业务站的网页, 根据页面提示, 输入进行商务业务的信息后, 选择自己需要的有关信息;
②客户在网络银行的现金存款机上存款, 转到第⑤项进行电子显示器的内容写入; 或 者选择电子支付的结算工具, 并且得到银行的授权使用, 在业务浏览器的页面上, 依照网 页的提示, 输入银行账号和密码, 并对银行支付信息进行加密;
③电子银行中优机对客户的业务信息进行检査、 确认, 并把相关的经过加密的客户支 付信息等转发给支付网关, 直到银行专用网络的银行后台业务服务器确认, 以期从银行等 电子货币发行机构, 验证客户得到支付资金的授权;
④银行验证确认后, 通过建立起来的经由支付网关的加密通道通信, 给电子银行的浏 览器和优机发送确认业务及支付结算成功信息; ⑤电子银行的优机进行业务确认; 客户已经在存款机交款或者银行发来的结算成功信 息后, 给客户的电子显示器输入业务信息, 并且给业务浏览器发送客户已经付款; 或者网 络付款成功和业务完毕信息; 通知客户拔掉电子显示器;
6. 2. 2客户与商家进行网络交易和支付的方法, 采用商家、客户及其开户银行, 各自都 有一对密钥 (公钥和私钥) 并且公钥和私钥都不公开的新方法; 该方法必须具备客户在开 户银行 (下称客户银行) 账号中, 有一定的存款; 商家在开户银行 (下称商家银行) 有账 号, 并知道该银行的公钥; 商家银行知道客户银行的公钥和商家的公钥以及商家密码; 客 户银行知道商家银行的公钥和客户的公钥以及客户密码; 商家银行在客户银行有结算账号; 客户与商家进行网络业务, 业务交易和电子支付基本流程:
①客户用客户机 (或者浏览器) 连接因特网, 用 Web浏览器进入商家的网页, 根据页 面提示, 选择自己需要的有关信息, 例如商品名称和价格或者服务价格等; 然后再选择网 上支付的结算工具; 客户将这些信息和自己的居住地址或通讯地址; 通过因特网传给商家;
②商家的辨机对客户的业务信息, 进行检查、 确认, 并且转给服务器(优机), 优机用 商家的私钥把商家在商家银行的帐号和密码加密, 密文作为商家数字签名, 与业务的价格 信息和商家银行名称, 通过因特网传给客户;
③客户核对无误后, 用私钥对其在客户银行的帐号和密码加密, 密文作为客户数字签 名, 将客户数字签名和商家数字签名、 付款金额和商家银行名称等, 用客户银行的公钥加 密, 并将这些密文传给客户银行;
④客户银行用自己的私钥将密文解密, 得到客户发送的明文、 商家数字签名和客户数 字签名; 然后用客户公钥对客户数字签名进行解密; 客户银行将解密后的客户账号、 密码 与客户留存的资料核对, 无误后就确认是客户发出的信息;
⑤客户银行将商家银行在客户银行的结算账号和密码, 用自己的私钥加密, 作为客户 银行数字签名; 然后将收款金额、 客户银行数字签名和商家的数字签名用商家银行公钥加 密, 发送给商家银行;
⑥商家银行收到客户银行的密文后, 用自己的私钥将密文解密, 得到客户银行发送的 明文信息及其数字签名, 然后用客户银行公钥对客户银行数字签名进行解密, 如果成功, 则确认是客户银行发出的; 商家银行再用商家的公钥对商家数字签名进行解密, 如果成功, 则确认是商家发出的;
⑦商家银行用商家公钥对商家账号、 密码和商家应收金额, 一起加密之后传送给商家; 商家收到信息后, 用自己的私钥解密; 若商家确认自己应收金额和商家账号、 密码正确; 则按照客户居住地址或者通讯地址, 通过快速邮递系统或者配送中心给客户送达商品或者 服务;
⑧客户收到商品或者服务, 用其私钥将确认付款的信息和密码加密作为其数字签名, 发送给客户银行; 客户银行用客户的公钥将密文解密, 得到客户发送的确认付款的信息; 客户银行将客户在该银行的帐户中减去购物款或服务款, 将商家银行在客户银行的结算帐 户中增加该笔款, 并告知商家银行在其商家帐户上增加该笔款;
商家银行和客户银行在约定时间, 进行结账;
6. 2. 3客户利用电话线进行业务和网络业务所需的条件是一样的; 即客户 (或商家)及 其开户银行, 各自有一对密钥 (公钥和私钥); 客户在开户银行 (下称客户银行) 账号中, 有一定的存款和密码; 并且知道该银行的公钥等; 其利用电话线进行业务的一般流程为- 客户利用调制解调器, 将计算机与电话线相连接, 通过电话线, 将网络商家的浏览器 页面传输到自己的计算机屏幕上; 然后根据自己的业务或商品需求, 按照该页面提示进行 操作, 决定选择自己需要的有关信息; 客户再选择网上支付的结算工具, 如电子显示器、 电子钱包、 电子现金、 电子支票或网络银行等; 客户还输入自己的居住地址或者通讯地址; 核对自己居住地址或者通讯地址信息; 其余步骤和以上的网络业务是一样的;
6. 3网络交易是企业与个人进行网络交易时采用的网络支付方式;即 B2C型网络支付方 式; 稍微修改就可以适用于 B2B型、 C2C型、 B2G型、 G2G型、 C2G型等网络支付方式;
6、 4—些基于专用金融通信网络平台的电子支付结算方式, 如电子汇票系统、 SWIFT、 CHIPS, CNAPS和金融 EDI等都可以归结为 B2B型网络支付方式。
7、 某个保险公司的各个电子保险 (或者其优机) 与辨机相连接, 辨机通过介质 (可以 是有线的或无线的)与互联网或 /和无线公用网络的路由器相连接, 构建成保险网络; 在这 个网络上利用电子显示器和 /或电子读写器所进行的保险业务, 就是网络保险;
每一个电子保险都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的控制功 能, 使各个电子保险之间通过公用网络互操作; 所有电子保险都能确保保险业务的安全性 和信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施保险业务等诈骗; 用户在某个单位的业务站进行电子保险业务的一般流程, 与客户在某个单位的业务站 浏览器上进行商务交易流程 (图 4) 相同; 不同是在保险公司的电子保险交纳保险费; 用户通过公用网络进行网络保险业务和网络支付交纳保险费的流程, 与客户与商家进 行网络业务 (图 5) 基本相同; 不同是在保险公司的网络保险中交纳保险费。
8、 某个证券公司的各个电子证券 (或者其优机) 与辨机相连接, 辨机通过介质 (可以 是有线的或无线的) 与互联网或 /和无线公用网络的路由器相连接, 构建成证券网络; 在这 个网络上利用电子显示器和 /或电子读写器所进行的证券业务, 就是网络证券;
每一个电子证券都通过辨机的接口电路, 与公用网络逻辑隔离; 又通过辨机的控制功 能, 使各个电子证券之间通过公用网络互操作; 所有电子证券都能确保证券业务的安全性 和信息的真实性、 可靠性与保密性; 从根本上杜绝有些人借助网络实施证券业务等诈骗; 用户在证券公司的业务站进行电子证券交易的一般流程, 与客户在某个单位的业务站 浏览器上进行商务交易流程 (图 4) 基本相同; 不同是在证券公司的电子证券交纳证券费; 用户通过公用网络进行网络证券交易和网络支付进行证券业务的流程, 与客户与商家 进行网络业务 (图 5 ) 基本相同; 不同是在证券公司的网络证券中交纳证券费或交易费。
9、 金融单位的远程客户机 (含有辨机程序), 通过介质 (可以是有线的或无线的) 与 互联网或 /和无线公用网络的路由器相连接后, 能够登录金融单位的优机网络, 实现 "高可 信"的信息互操作; 这些远程客户机、 优机网络和公用网络共同组成的系统, 就是访问网; 访问网的优机网络可以通过公用网络, 为远程客户机办理划拨款项、 汇兑结算、 查询 余额、 证券投资和提供金融市场信息等业务; 还可以同商业机构、 公用事业机构、 电子显 示器发行机构进行各种结算; 提供 24小时的各种金融服务; 实现个性化的优质服务等; 访问网还可以采用以下不同的方式进行信息处理等:
9. 1远程客户机身份验证要实现的授权访问的方法; 就是指公用网络上的访问信息,要 经过访问网的辨机对客户机的身份认证和授权; 即访问网的辨机必须装有对远程客户机的 身份验证和授权的控制列表或控制软件;
9. 2辨机身份验证要实现的授权访问的方法; 就是指公用网络上的访问信息,要经过客 户机对访问网的辨机的身份认证和授权; 即远程客户机必须装有对访问网辨机的身份验证 和授权的控制列表或控制软件;
9. 3远程客户机的信息需要经过辨机的信息完整检査或身份认证之后,才能进入优机网 络; 保证了信息的保密性、 完整性或真实性; 并具有抵抗黑客和病毒攻击网络的能力;
9. 4辨机的信息需要经过远程客户机的信息完整检査或身份认证之后,才能进入远程客 户机; 保证了信息的保密性、 完整性或真实性; 并具有抵抗黑客和病毒攻击客户机的能力;
9. 5访问网还提供更高级服务,包括网络购物、购买旅行客票、旅游门票等第三方服务; 网络账单支付服务; 金融信息服务; 与债券和证券等相关的各种投资工具的内容服务等;
9. 6用户或企业还可以将移动电话、 固定电话、 电视、 计算机等多媒体设备(含有辨机 程序), 通过介质与公用网络的路由器相连接后, 能够登录金融单位的优机网络, 实现 "高 可信"的信息互操作;
9. 7远程多媒体设备、金融单位的优机网络和公用网络共同组成的系统,也称为金融单 位远程访问网络系统, 也简称访问网; 它是由装有金融单位的辨机标准程序的多媒体设备, 连接到公用网络后, 能够与该金融单位的优机网络, 进行 "高可信 "的信息互操作的系统。
10、 电子显示器的互相匹配的输入接口电路和输出接口电路, 分别位于电子显示器的 不同位置; 一般是分别位于电子显示器的两边; 而且输出插头 (或者插槽) 接口电路, 可 以恰好插入输入插槽 (或者插头) 的接口电路; 它们之间可直接通过信息交互, 进行业务 交添;
10. 1电子显示器可以含有智能钱币软件; 此时电子显示器可以作为电子钱币或者纸质 钱币使用; 它也称为电子钱币器; 电子钱币器不但含有电子钱币, 而且可以进行钱币交易; 电子钱币器可以作为钱币, 进行货款支付并在市场使用和流通等; 电子钱币器使 "交易无 纸化"和 "减少现金流量"变为现实; 它具有纸质钱币的一切功能;
10. 2证券浏览器可以通过网络支付, 利用自动柜员机,进行纸质钱币的证券费的存取;
10. 3电子钱币器能够取代纸质钱币和金融卡; 电子钱币器中的电子钱币用完之后, 可 以通过金融浏览器或者电子读写机向电子钱币器里充加电子钱币;
10. 4电子钱币器中的电子钱币达到一定数量之后, 可以通过金融浏览器或者电子读写 机, 存储在该钱币器的合法拥有人的开户银行的账户之中;
10. 5电子钱币器之间, 可以直接通过对话方式接受电子钱币支付, 无需金融单位的授 权; 电子钱币器 (电子显示器) 能够以独立方式或者联机方式进行工作:
10. 5. 1独立工作的电子钱币器, 不与金融浏览器或电子读写机相接触; 两个电子钱币 器之间依靠其存储器中的软件独立运行; 某个电子钱币器的输入接口与另一个电子钱币器 的输出接口直接进行连接; 其中一个电子钱币器的输出 (或者输入) 插头插入另一个电子 钱币器的输入 (或者输出) 插槽中, 可以直接进行交互电子钱币; 各个电子钱币器都具有 读、 译对方所有逻辑的功能, 能独立检验对方电子钱币器的合法性和持有人的身份;
10. 5. 2联机工作的电子钱币器, 能够插进金融浏览器或电子读写机上的专用插头 (或 者插槽) 上; 电子读写机可以通过专线、 无线电、 电话线路等, 直接与金融单位的优机网 络相连; 每笔金融业务均由电子钱币器实时传输到金融网络进行处理, 文件可以实时更新; 电子钱币器对其持有人的身份识别, 还可以采用指纹扫描、 声音确认和虹膜认证等生物测 定技术。
PCT/CN2010/000622 2010-05-04 2010-05-04 网络金融装置和方法 WO2011137558A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/000622 WO2011137558A1 (zh) 2010-05-04 2010-05-04 网络金融装置和方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/000622 WO2011137558A1 (zh) 2010-05-04 2010-05-04 网络金融装置和方法

Publications (1)

Publication Number Publication Date
WO2011137558A1 true WO2011137558A1 (zh) 2011-11-10

Family

ID=44903556

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/000622 WO2011137558A1 (zh) 2010-05-04 2010-05-04 网络金融装置和方法

Country Status (1)

Country Link
WO (1) WO2011137558A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245938A (zh) * 2019-06-06 2019-09-17 深圳市维京城信息技术有限公司 一种基于物联网的电子商务平台交易安全支付方法
US11765052B1 (en) 2022-03-11 2023-09-19 T-Mobile Usa, Inc. User equipment hosting for customizable 5G services

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2833728A1 (fr) * 2001-12-14 2003-06-20 David Carrere Machine universelle pour la simulation d'une architecture informatique a vocation generaliste
CN101533504A (zh) * 2009-04-27 2009-09-16 刘文祥 电子医务系统及其装置
CN101577656A (zh) * 2009-05-19 2009-11-11 刘文祥 取代集成电路卡的控显器和网络系统
CN101615318A (zh) * 2009-05-11 2009-12-30 刘文祥 电子收费系统及其装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2833728A1 (fr) * 2001-12-14 2003-06-20 David Carrere Machine universelle pour la simulation d'une architecture informatique a vocation generaliste
CN101533504A (zh) * 2009-04-27 2009-09-16 刘文祥 电子医务系统及其装置
CN101615318A (zh) * 2009-05-11 2009-12-30 刘文祥 电子收费系统及其装置
CN101577656A (zh) * 2009-05-19 2009-11-11 刘文祥 取代集成电路卡的控显器和网络系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245938A (zh) * 2019-06-06 2019-09-17 深圳市维京城信息技术有限公司 一种基于物联网的电子商务平台交易安全支付方法
US11765052B1 (en) 2022-03-11 2023-09-19 T-Mobile Usa, Inc. User equipment hosting for customizable 5G services

Similar Documents

Publication Publication Date Title
US11908030B2 (en) Secure transaction system
CN201910100U (zh) 一种公交一卡通业务系统和业务平台及pos机
US7475045B2 (en) Transaction system and transaction terminal equipment
US20060136332A1 (en) System and method for electronic check verification over a network
WO2011091558A1 (zh) 网络业务
CA2305249A1 (en) Virtual safe
WO2010066020A1 (en) Systems and methods for authenticating financial transactions involving financial cards
CN102129650A (zh) 网络金融
CN109716373A (zh) 密码认证和令牌化的交易
CN105117963A (zh) 基于数字签名的装置和方法
KR20200037490A (ko) 디지털통화를 이용한 운용방법 및 운영시스템
CN101615318A (zh) 电子收费系统及其装置
CN101577656B (zh) 取代集成电路卡的控显器和网络系统
CN112970234B (zh) 账户断言
WO2011137558A1 (zh) 网络金融装置和方法
WO2011137559A1 (zh) 网络收费系统
Sharma Electronic Cash over the Internet and Security Solutions.
KR100873352B1 (ko) 온라인 계좌 자금이체 처리 방법 및 시스템과 이를 위한기록매체
KR100857739B1 (ko) 온라인 계좌 예치 금액 출금 방법 및 시스템과 이를 위한기록매체
KR100738207B1 (ko) 현금지급 처리 시스템과 이를 위한 금융 자동화 기기와 프로그램 기록매체
Xu et al. Electronic check system design based on NFC
Doggett Electronic checks-a detailed preview
KR100869133B1 (ko) 가변적 계좌(또는 카드) 인증 수단 운용방법 및 시스템과이를 위한 프로그램 기록매체
Zheng et al. Payment Technologies for E-commerce
BREACHES Online Payment Systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10850928

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10850928

Country of ref document: EP

Kind code of ref document: A1