WO2018040651A1 - 一种基于安全认证机制的支付方法及支付系统 - Google Patents
一种基于安全认证机制的支付方法及支付系统 Download PDFInfo
- Publication number
- WO2018040651A1 WO2018040651A1 PCT/CN2017/087190 CN2017087190W WO2018040651A1 WO 2018040651 A1 WO2018040651 A1 WO 2018040651A1 CN 2017087190 W CN2017087190 W CN 2017087190W WO 2018040651 A1 WO2018040651 A1 WO 2018040651A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- payment
- signature
- built
- security
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Definitions
- the invention belongs to the field of mobile payment technologies, and in particular relates to a payment method and a payment system.
- Mobile payment also known as mobile payment
- mobile payment is a service that allows users to use their mobile terminals (usually mobile phones) to pay for goods or services they consume.
- the unit or individual sends the payment instruction directly or indirectly to the banking financial institution through the mobile device, the Internet or proximity sensing to generate the money payment and the fund transfer behavior, thereby realizing the mobile payment function.
- Mobile payment combines terminal equipment, the Internet, application providers, and financial institutions to provide users with financial services such as money payment and payment.
- Mobile payment is mainly divided into two types: near-field payment and remote payment.
- the so-called near-field payment is to use the mobile phone to swipe the card to buy a car, to buy things, etc., which is very convenient.
- Remote payment means by sending payment instructions (such as online banking, telephone banking, mobile payment, etc.) or by means of payment tools (such as by mail, remittance), such as the palm of the e-commerce launched by the palm of the hand, palm recharge, palm video Waiting for remote payment.
- the authentication is generally performed by using a dynamic password, and the security performance is insufficient.
- the present invention aims to provide a payment method based on a secure authentication mechanism to improve security performance in a payment process.
- Still another object of the present invention is to provide a payment system based on a secure authentication mechanism.
- a payment method based on a secure authentication mechanism comprising:
- the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal;
- S3 The first mobile terminal acquires payment information and sends the signature to the second mobile terminal;
- the S4 first mobile terminal receives the payment success feedback sent by the second mobile terminal.
- step S1 the method specifically includes:
- S11 The first mobile terminal acquires a payment request
- the first mobile terminal encrypts the payment request by using a built-in first security plug-in and a second public key;
- S13 The first mobile terminal signs the encrypted payment request by using the built-in first security plug-in and the first private key;
- S14 The first mobile terminal sends the signed payment request to the second mobile terminal.
- step S2 the method specifically includes:
- S21 The second mobile terminal receives the signed payment request sent by the first mobile terminal
- S22 The second mobile terminal verifies the signature of the first mobile terminal by using the built-in second security plug-in and the first public key, and generates checksum feedback;
- S23 The second mobile terminal decrypts the encrypted payment request by using the built-in second security plug-in and the second private key;
- the S24 second mobile terminal encrypts the check-in feedback by using the built-in second security plug-in and the first public key;
- the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted check-in feedback;
- S26 The second mobile terminal sends the signed checksum feedback to the first mobile terminal
- the first mobile terminal uses the built-in first security plug-in and the second public key to verify the signature of the second mobile terminal;
- the S28 first mobile terminal decrypts the encrypted check-in feedback using the built-in first security plug-in and the first private key.
- step S3 the method specifically includes:
- the first mobile terminal acquires payment information, where the payment information includes a payment amount;
- the first mobile terminal encrypts the payment information by using a built-in first security plug-in and a second public key;
- S33 The first mobile terminal signs the encrypted payment information by using the built-in first security plug-in and the first private key;
- S34 The first mobile terminal sends the signed payment information to the second mobile terminal.
- the step S4 specifically includes:
- the second mobile terminal receives the signed payment information sent by the first mobile terminal
- S42 The second mobile terminal verifies the signature of the first mobile terminal by using the built-in second security plug-in and the first public key;
- S43 The second mobile terminal decrypts the encrypted payment information by using the built-in second security plug-in and the second private key;
- S45 The second mobile terminal encrypts the payment success feedback by using the built-in second security plug-in and the first public key;
- S46 The second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted payment success feedback. name;
- S47 The second mobile terminal sends the signed payment success feedback to the first mobile terminal.
- step S4 the method further comprises:
- S51 The first mobile terminal verifies the signature of the second mobile terminal by using the built-in first security plug-in and the second public key;
- S52 The first mobile terminal decrypts the encrypted payment success feedback by using the built-in first security plug-in and the first private key;
- the S53 first mobile terminal logs in to the payment wallet to complete the deduction and completes the payment.
- step S1 the method further includes:
- the S02 server generates a first public key and a first private key of the first mobile terminal, and generates a second public key and a second private key of the second mobile terminal;
- the S03 server generates the first security plugin based on the registration information and the operation algorithm of the first mobile terminal, and sends the first security plugin to the first mobile terminal together with the second public key of the second mobile terminal and the first private key of the first mobile terminal;
- the S04 server generates a second security plugin based on the registration information and the operation algorithm of the second mobile terminal, and sends the second security plugin to the second mobile terminal together with the second private key of the second mobile terminal and the first public key of the first mobile terminal.
- the present invention further provides a payment system based on the security authentication mechanism, including a first mobile terminal and a second mobile terminal that are in communication with each other, wherein
- the first mobile terminal is configured to obtain a payment request and send a signature to the second mobile terminal; receive the verification and signature sent by the second mobile terminal, and verify the signature of the second mobile terminal; And sending the information to the second mobile terminal; and receiving the payment success feedback sent by the second mobile terminal and verifying the payment, and then logging in the payment wallet to complete the deduction and completing the payment;
- the second mobile terminal is configured to receive the signed payment request, and perform verification on the signature of the first mobile terminal to generate checksum feedback; the signature is sent to the first mobile terminal for receiving the signature; And the payment information is verified, and the signature of the first mobile terminal is verified, and then the payment wallet is logged in and the amount is increased accordingly; and the payment success feedback is sent to the first mobile terminal.
- the payment system further includes a server end that is respectively connected to the first mobile terminal and the second mobile terminal, and the server end obtains a corresponding first security plug-in based on the first mobile terminal, and the first public Key and first a private key, and obtaining a corresponding second security plugin, a second public key, and a second private key based on the second mobile terminal; and delivering the first security plugin, the second public key, and the first private key to the first mobile And sending, by the terminal, the second security plug-in, the first public key, and the second private key to the second mobile terminal.
- the server In the payment method and the payment system provided by the present invention, the server generates a corresponding first security plug-in and a second security plug-in, and delivers them to the first mobile terminal and the second mobile terminal respectively, so that the payment is made.
- local signature and local verification operation are performed in each step, which can be performed without a network, which is simple, convenient, and safe and reliable.
- the two mobile terminals authenticate each other and restrict each other, which greatly improves the security performance in the process of data exchange (for example, sending payment requests and payment information, etc.), and is not easily cracked by others.
- the payment system provided by the invention is simple and easy, and does not increase the redundant hardware cost.
- FIG. 1 is a schematic flowchart of a payment method based on a security authentication mechanism
- FIG. 2 is a hardware block diagram of an embodiment of a payment system applied to the above payment method provided by the present invention
- FIG. 3 is a hardware block diagram of another embodiment of a payment system applied to the above payment method according to the present invention.
- FIG. 1 is a schematic flowchart of a payment method based on a security authentication mechanism according to the present invention.
- the payment method includes: S1: the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal.
- the S2 first mobile terminal receives the verification feedback and signature sent by the second mobile terminal, and verifies the signature of the second mobile terminal;
- S3 the first mobile terminal acquires the payment information and sends the signature to the second mobile terminal;
- S4 first The mobile terminal receives the payment success feedback sent by the second mobile terminal.
- the step S1 specifically includes: S11: the first mobile terminal acquires a payment request; S12: the first mobile terminal encrypts the payment request by using the built-in first security plug-in and the second public key; and S13 uses the built-in mobile terminal to use The first security plug-in and the first private key sign the encrypted payment request; S14 first mobile terminal will sign the payment after the request The request is sent to the second mobile terminal.
- the step S2 includes: S21: the second mobile terminal receives the signed payment request sent by the first mobile terminal; and S22: the second mobile terminal uses the built-in second security plug-in and the first public key to perform the signature of the first mobile terminal. Verifying and generating the check-in feedback; S23: the second mobile terminal decrypts the encrypted payment request using the built-in second security plug-in and the second private key; S24, the second mobile terminal uses the built-in second security plug-in and the first public key Encrypting the check-in feedback; S25, the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted check-in feedback; S26, the second mobile terminal sends the signed check-in feedback to the first a mobile terminal; S27: the first mobile terminal uses the built-in first security plug-in and the second public key to verify the signature of the second mobile terminal; and the S28 first mobile terminal uses the built-in first security plug-in and the first private key pair to encrypt Check the feedback for decryption
- step S2 only the check-in feedback received by the first mobile terminal is successful, and the process proceeds to the subsequent step S3. If the check-in feedback received by the first mobile terminal fails, the first mobile terminal does not pass the verification of the second mobile terminal, and immediately stops the payment. It can be seen from the content described in step S1 and step S2 that the first private key and the first public key are a key pair, the second private key and the second public key are a key pair, and the first private key and The first public key is a key pair of the first mobile terminal, and the second private key and the second public key are key pairs of the second mobile terminal.
- the step S3 includes: S31: the first mobile terminal acquires payment information, where the payment information includes a payment amount; S32: the first mobile terminal encrypts the payment information by using the built-in first security plug-in and the second public key; The terminal signs the encrypted payment information by using the built-in first security plug-in and the first private key; S34: The first mobile terminal sends the signed payment information to the second mobile terminal.
- the above payment information includes, but is not limited to, payment time, payee account name and the like in addition to the payment amount, such that the second mobile terminal confirms and pays after receiving the payment information.
- the step S4 includes: S41: the second mobile terminal receives the signed payment information sent by the first mobile terminal; and the second mobile terminal uses the built-in second security plug-in and the first public key to perform the signature of the first mobile terminal. Verifying; S43, the second mobile terminal decrypts the encrypted payment information by using the built-in second security plug-in and the second private key; S44: the second mobile terminal logs in the payment wallet based on the obtained payment information and increases the amount thereof accordingly; S45: The second mobile terminal encrypts the payment success feedback by using the built-in second security plug-in and the first public key; and the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted payment success feedback.
- the second mobile terminal sends the signed payment success feedback to the first mobile terminal. More specifically, in the process, when the second mobile terminal authenticates and decrypts the signature of the first mobile terminal, the payment information is obtained, and then the payment wallet is logged into the user name and password, and the payment amount is displayed according to the payment amount displayed in the payment information. In the third-party payment platform, the corresponding amount is added to the payment wallet to generate Payment success feedback. Of course, if the first mobile terminal does not pass the verification of the second mobile terminal, the payment is stopped immediately, and the feedback verification fails to the first mobile terminal, and the re-inspection is required.
- the method further includes: S51: the first mobile terminal verifies the signature of the second mobile terminal by using the built-in first security plug-in and the second public key; and S52, the first mobile terminal uses the built-in first security The plug-in and the first private key decrypt the encrypted payment success feedback; S53, the first mobile terminal logs in to the payment wallet to complete the deduction, and completes the payment.
- the first mobile terminal receives the payment success feedback of the second mobile terminal, and after verifying the signature of the second mobile terminal, the mobile wallet is then logged in to complete the payment, and it is noted that the payment wallet is logged in here.
- the payment wallet registered with the second mobile terminal is the same, that is, the amount of the deduction is actually the amount of money recharged by the second mobile terminal.
- the built-in security plug-in is used to verify the identity of the other party (verification signature). Only if the verification is successful, will the next step be taken. Once the verification fails, the payment is stopped and the payment process is safe and reliable.
- the method further includes: S01: the first mobile terminal and the second mobile terminal send the registration information to the server; the S02 server generates the first public key and the first private key of the first mobile terminal, and generates the second a second public key and a second private key of the mobile terminal; the S03 server generates a first security plugin based on the registration information and the operation algorithm of the first mobile terminal, and together with the second public key of the second mobile terminal and the first mobile terminal The first private key is sent to the first mobile terminal together; the S04 server generates a second security plugin based on the registration information and the operation algorithm of the second mobile terminal, and together with the second private key of the second mobile terminal and the first mobile terminal The first public key is delivered to the second mobile terminal together.
- the registration information herein includes a user name, a login password, and identification information of the terminal that uniquely identifies the terminal, and the generated operation algorithms in the first security plug-in and the second security plug-in are the same.
- FIG. 2 is a hardware block diagram of an embodiment of a payment system applied to the above payment method provided by the present invention.
- the first mobile terminal 1 and the second connected to each other are included in the payment system.
- Mobile terminal 2 In the working process, first, the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal; the second mobile terminal receives the signed payment request, and then uses the built-in second security plug-in to perform the verification. If the verification is successful, the verification feedback is returned and signed, and the verification feedback after the signature is sent to the first mobile terminal. Afterwards, the first mobile terminal receives the checksum feedback and the signature sent by the second mobile terminal, and then uses the built-in first security plug-in to verify the signature of the second mobile terminal.
- the first payment terminal includes the payment amount.
- the payment information is signed and sent to the second mobile terminal; the second mobile terminal receives the signed payment information, and also uses the built-in second security plug-in to perform the verification.
- the payment payment wallet is logged in and The corresponding amount is added to the three-party payment platform; after that, the payment success feedback after returning the signature is returned.
- the authentication operation is also performed using its built-in first security plug-in, and after the verification is completed, the login payment wallet completes the deduction from the payment and completes the payment.
- the first mobile terminal includes: an information acquiring module for acquiring a payment request and payment information, and a first storage module for storing the first security plug-in, the first private key, and the second public key, a first encryption module for encrypting the payment request and the payment information, a first decryption module for decrypting the verification feedback and the payment success feedback returned by the second mobile terminal, for the encrypted payment request and the payment information a first signature module for signing, a first verification module for verifying the received signature verification and payment success feedback, and for transmitting the signed payment request and payment information to the second movement a first information sending module of the terminal, wherein the information acquiring module is connected to the first encryption module, and the first storage module is respectively connected to the first encryption module, the first decryption module, the first signature module, and the first verification module, and the first The encryption module is connected to the first signature module, the first decryption module is connected to the first verification module, and the first information transmission module is connected to the first signature module.
- the second mobile terminal includes: an information receiving module, configured to receive the signed payment request and the signed payment information sent by the first mobile terminal, and configured to store the second security plug, the second private key, and the first public key
- the second storage module the first encryption module for verifying the feedback and the payment success feedback for encryption, the first decryption module for decrypting the payment request and the payment information sent by the first mobile terminal, for encrypting
- the second signature module for signing the feedback and the payment success feedback
- the second verification module for checking the received payment request and the payment information feedback, and the feedback for the signature after the signature
- the second information sending module sent to the first mobile terminal by the payment success feedback
- the information receiving module is connected to the second verification module
- the second storage module is respectively associated with the second encryption module, the second decryption module, and the second signature module
- the second verification module is connected, the second encryption module is connected to the second signature module, the second decryption module is connected to the second verification module, and the second information is sent.
- Signature module and the second module
- FIG. 3 is a hardware block diagram of another embodiment of a payment system applied to the above payment method according to the present invention.
- the payment system further includes a first mobile terminal and a second mobile, respectively.
- the server end 3 of the terminal communication connection, the server side obtains the corresponding first security plug-in, the first public key and the first private key based on the first mobile terminal, and obtains the corresponding second security plug-in according to the second mobile terminal, and the second public
- the first security plug-in, the second public key, and the first private key are delivered to the first mobile terminal, and the second security plug-in, the first public key, and the second private key are delivered together To the second mobile terminal.
- the registration information herein includes a user name, a login password, and identification information of the terminal that uniquely identifies the terminal, and the generated operation algorithms in the first security plug-in and the second security plug-in are the same.
- the first mobile terminal and the second mobile terminal are both mobile phone terminals, which are a first mobile phone and a second mobile phone, respectively.
- the first mobile phone initiates a signature and a payment request; the second mobile phone receives the signature, and performs the verification by the built-in second security control. If the verification is passed, the second mobile phone's signature is fed back. If not, the payment is stopped, and the payment is checked. The sign failed.
- the signature verification of the second mobile phone is performed, and if the verification is signed, the payment amount application is initiated; if not, the payment is stopped, and the feedback verification fails. .
- the second mobile phone receives the application for the payment amount of the first mobile phone
- the first mobile phone is also checked first. If the verification is passed, the feedback is successful, and the payment amount in the payment wallet is increased by the corresponding payment amount. If the verification is not passed, the payment is stopped and the feedback verification fails. Finally, after receiving the feedback from the second mobile phone, the first mobile phone deducts the payment from the payment wallet to complete the payment.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (9)
- 一种基于安全认证机制的支付方法,其特征在于,所述支付方法包括:S1第一移动终端获取支付请求并签名发送至第二移动终端;S2第一移动终端接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;S3第一移动终端获取支付信息并签名发送至第二移动终端;S4第一移动终端接收第二移动终端发送的支付成功反馈。
- 如权利要求1所述的支付方法,其特征在于,在步骤S1中具体包括:S11第一移动终端获取支付请求;S12第一移动终端使用内置的第一安全插件和第二公钥对所述支付请求进行加密;S13第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付请求进行签名;S14第一移动终端将签名后的支付请求发送至第二移动终端。
- 如权利要求1所述的支付方法,其特征在于,在步骤S2中具体包括:S21第二移动终端接收第一移动终端发送的签名后的支付请求;S22第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证,并生成验签反馈;S23第二移动终端使用内置的第二安全插件和第二私钥对加密的支付请求进行解密;S24第二移动终端使用内置的第二安全插件和第一公钥对验签反馈进行加密;S25第二移动终端使用内置的第二安全插件和第二私钥对加密后的验签反馈进行签名;S26第二移动终端将签名后的验签反馈发送至第一移动终端;S27第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;S28第一移动终端使用内置的第一安全插件和第一私钥对加密的验签反馈进行解密。
- 如权利要求1所述的支付方法,其特征在于,在步骤S3中具体包括:S31第一移动终端获取支付信息,所述支付信息中包括支付金额;S32第一移动终端使用内置的第一安全插件和第二公钥对所述支付信息进行加密;S33第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付信息进行签名;S34第一移动终端将签名后的支付信息发送至第二移动终端。
- 如权利要求4所述的支付方法,其特征在于,在步骤S4中具体包括:S41第二移动终端接收第一移动终端发送的签名后的支付信息;S42第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证;S43第二移动终端使用内置的第二安全插件和第二私钥对加密的支付信息进行解密;S44第二移动终端基于获取的支付信息登录支付钱包并将其中的金额进行相应的增加;S45第二移动终端使用内置的第二安全插件和第一公钥对支付成功反馈进行加密;S46第二移动终端使用内置的第二安全插件和第二私钥对加密后的支付成功反馈进行签名;S47第二移动终端将签名后的支付成功反馈发送至第一移动终端。
- 如权利要求1至5任意一项所述的支付方法,其特征在于,在步骤S4之后还包括:S51第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;S52第一移动终端使用内置的第一安全插件和第一私钥对加密的支付成功反馈进行解密;S53第一移动终端登录支付钱包从中完成扣款,完成支付。
- 如权利要求1至5任意一项所述的支付方法,其特征在于,在步骤S1之前还包括:S01第一移动终端和第二移动终端将注册信息发送至服务器端;S02服务器端生成第一移动终端的第一公钥和第一私钥、及生成第二移动终端的第二公钥和第二私钥;S03服务器端基于第一移动终端的注册信息和运算算法生成第一安全插件,并连同第二移动终端的第二公钥以及第一移动终端的第一私钥一起下发至第一移动终端;S04服务器端基于第二移动终端的注册信息和运算算法生成第二安全插件,并连同第二移动终端的第二私钥以及第一移动终端的第一公钥一起下发至第二移动终端。
- 一种基于安全认证机制的支付系统,其特征在于,所述支付系统中包括相互通信连接的第一移动终端和第二移动终端,其中,所述第一移动终端用于获取支付请求并签名发送至第二移动终端;用于接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;用于获取支付信息并签名发送至第二移动终端;以及用于接收第二移动终端发送的支付成功反馈并对其进行验签,之后登录支付钱包从中完成扣款,完成支付;所述第二移动终端用于接收签名后的支付请求,并对第一移动终端的签名进行验证生成验签反馈;用于对验签反馈进行签名发送至第一移动终端;用于接收签名后的支付信息,并对第一移动终端的签名进行验证,之后登录支付钱包并将其中的金额进行相应的增加;以及用于对支付成功反馈进行签名发送至第一移动终端。
- 如权利要求8所述的支付系统,其特征在于,所述支付系统中还包括分别与所述第一移动终端和第二移动终端通信连接的服务器端,所述服务器端基于第一移动终端得到相应的第一安全插件、第一公钥和第一私钥,以及基于第二移动终端得到相应的第二安全插件、第二公钥和第二私钥;并将第一安全插件、第二公钥和第一私钥一起下发至第一移动终端,将第二安全插件、第一公钥和第二私钥一起下发至第二移动终端。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2017319373A AU2017319373A1 (en) | 2016-08-31 | 2017-06-05 | Payment method and payment system based on security authentication mechanism |
NZ751163A NZ751163B2 (en) | 2016-08-31 | 2017-06-05 | A payment method and payment system based on security authentication mechanism |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610783530.7 | 2016-08-31 | ||
CN201610783530.7A CN106372942B (zh) | 2016-08-31 | 2016-08-31 | 一种基于安全认证机制的支付方法及支付系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018040651A1 true WO2018040651A1 (zh) | 2018-03-08 |
Family
ID=57900525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/087190 WO2018040651A1 (zh) | 2016-08-31 | 2017-06-05 | 一种基于安全认证机制的支付方法及支付系统 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN106372942B (zh) |
AU (1) | AU2017319373A1 (zh) |
WO (1) | WO2018040651A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106372942B (zh) * | 2016-08-31 | 2018-09-21 | 中城智慧科技有限公司 | 一种基于安全认证机制的支付方法及支付系统 |
CN107633399B (zh) * | 2017-09-15 | 2021-04-30 | 北京红枣科技有限公司 | 一种网络支付账户的线下支付方法和系统 |
CN108764912B (zh) * | 2018-06-21 | 2021-09-17 | 广东工业大学 | 一种基于短信验证码的支付方法及装置 |
CN111260359A (zh) * | 2018-11-30 | 2020-06-09 | 航天信息股份有限公司 | 一种移动支付方法、装置及系统 |
CN112101937A (zh) * | 2020-09-01 | 2020-12-18 | 武汉华盛美业科技有限公司 | 一种订单安全支付方法及其系统 |
CN115689559A (zh) * | 2021-07-28 | 2023-02-03 | 聂明 | 数字钱包设备及其双离线交易方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102468960A (zh) * | 2010-11-16 | 2012-05-23 | 卓望数码技术(深圳)有限公司 | 一种离线模式身份与交易认证方法及终端 |
CN103903130A (zh) * | 2014-03-21 | 2014-07-02 | 金硕澳门离岸商业服务有限公司 | 通过近距离通信实现的支付系统及支付方法 |
CN104850996A (zh) * | 2015-05-04 | 2015-08-19 | 苏州海博智能系统有限公司 | 基于外部安全设备的交易方法、系统和服务器 |
CN106372942A (zh) * | 2016-08-31 | 2017-02-01 | 中城智慧科技有限公司 | 一种基于安全认证机制的支付方法及支付系统 |
-
2016
- 2016-08-31 CN CN201610783530.7A patent/CN106372942B/zh active Active
-
2017
- 2017-06-05 WO PCT/CN2017/087190 patent/WO2018040651A1/zh active Application Filing
- 2017-06-05 AU AU2017319373A patent/AU2017319373A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102468960A (zh) * | 2010-11-16 | 2012-05-23 | 卓望数码技术(深圳)有限公司 | 一种离线模式身份与交易认证方法及终端 |
CN103903130A (zh) * | 2014-03-21 | 2014-07-02 | 金硕澳门离岸商业服务有限公司 | 通过近距离通信实现的支付系统及支付方法 |
CN104850996A (zh) * | 2015-05-04 | 2015-08-19 | 苏州海博智能系统有限公司 | 基于外部安全设备的交易方法、系统和服务器 |
CN106372942A (zh) * | 2016-08-31 | 2017-02-01 | 中城智慧科技有限公司 | 一种基于安全认证机制的支付方法及支付系统 |
Also Published As
Publication number | Publication date |
---|---|
NZ751163A (en) | 2021-11-26 |
CN106372942A (zh) | 2017-02-01 |
AU2017319373A1 (en) | 2019-03-21 |
CN106372942B (zh) | 2018-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12039525B2 (en) | Validating online access to secure device functionality | |
US10826702B2 (en) | Secure authentication of user and mobile device | |
US10129020B2 (en) | Efficient methods for protecting identity in authenticated transmissions | |
WO2018040651A1 (zh) | 一种基于安全认证机制的支付方法及支付系统 | |
US9704160B2 (en) | Trusted execution environment for transport layer security key pair associated with electronic commerce and card not present transactions | |
KR101957840B1 (ko) | 신뢰된 실행 환경을 갖춘 이동 결제 단말 및 방법 | |
US20230008793A1 (en) | Managing secure transactions between electronic devices and service providers | |
JP5407104B2 (ja) | 物理的posトランザクションのための方法及び装置 | |
WO2017190633A1 (zh) | 验证金融卡用户身份可靠性的方法及装置 | |
US20230062507A1 (en) | User authentication at access control server using mobile device | |
US11960581B2 (en) | Mobile device secret protection system and method | |
JP2013187698A (ja) | 端末から各事業者サーバへ別々の秘匿情報を送信する秘匿情報送信方法及びシステム | |
KR100792163B1 (ko) | 통신망을 이용한 온라인 금융거래 인증시스템과 이를 위한사용자 단말기 | |
TW201131490A (en) | Payment data processing method, system, payment terminal and payment server | |
TWI626606B (zh) | Electronic card establishment system and method thereof | |
TW201101215A (en) | Two-factor authentication method and system for securing online transactions | |
KR101302947B1 (ko) | 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법 | |
CN105228088B (zh) | 移动支付近场通信的自更新公钥密钥交换方法 | |
NZ751163B2 (en) | A payment method and payment system based on security authentication mechanism | |
JP4148465B2 (ja) | 電子価値流通システムおよび電子価値流通方法 | |
Abdulridha | Online Security Protocols for NFC Mobile Payment Applications | |
KR101306415B1 (ko) | 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법 | |
Sudheer et al. | Secure Ciphering based QR Pay System for Mobile Devices | |
KR20120108664A (ko) | 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17844958 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2017319373 Country of ref document: AU Date of ref document: 20170605 Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17844958 Country of ref document: EP Kind code of ref document: A1 |