WO2018040651A1 - 一种基于安全认证机制的支付方法及支付系统 - Google Patents

一种基于安全认证机制的支付方法及支付系统 Download PDF

Info

Publication number
WO2018040651A1
WO2018040651A1 PCT/CN2017/087190 CN2017087190W WO2018040651A1 WO 2018040651 A1 WO2018040651 A1 WO 2018040651A1 CN 2017087190 W CN2017087190 W CN 2017087190W WO 2018040651 A1 WO2018040651 A1 WO 2018040651A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
payment
signature
built
security
Prior art date
Application number
PCT/CN2017/087190
Other languages
English (en)
French (fr)
Inventor
聂明
Original Assignee
中城智慧科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中城智慧科技有限公司 filed Critical 中城智慧科技有限公司
Priority to AU2017319373A priority Critical patent/AU2017319373A1/en
Priority to NZ751163A priority patent/NZ751163B2/en
Publication of WO2018040651A1 publication Critical patent/WO2018040651A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Definitions

  • the invention belongs to the field of mobile payment technologies, and in particular relates to a payment method and a payment system.
  • Mobile payment also known as mobile payment
  • mobile payment is a service that allows users to use their mobile terminals (usually mobile phones) to pay for goods or services they consume.
  • the unit or individual sends the payment instruction directly or indirectly to the banking financial institution through the mobile device, the Internet or proximity sensing to generate the money payment and the fund transfer behavior, thereby realizing the mobile payment function.
  • Mobile payment combines terminal equipment, the Internet, application providers, and financial institutions to provide users with financial services such as money payment and payment.
  • Mobile payment is mainly divided into two types: near-field payment and remote payment.
  • the so-called near-field payment is to use the mobile phone to swipe the card to buy a car, to buy things, etc., which is very convenient.
  • Remote payment means by sending payment instructions (such as online banking, telephone banking, mobile payment, etc.) or by means of payment tools (such as by mail, remittance), such as the palm of the e-commerce launched by the palm of the hand, palm recharge, palm video Waiting for remote payment.
  • the authentication is generally performed by using a dynamic password, and the security performance is insufficient.
  • the present invention aims to provide a payment method based on a secure authentication mechanism to improve security performance in a payment process.
  • Still another object of the present invention is to provide a payment system based on a secure authentication mechanism.
  • a payment method based on a secure authentication mechanism comprising:
  • the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal;
  • S3 The first mobile terminal acquires payment information and sends the signature to the second mobile terminal;
  • the S4 first mobile terminal receives the payment success feedback sent by the second mobile terminal.
  • step S1 the method specifically includes:
  • S11 The first mobile terminal acquires a payment request
  • the first mobile terminal encrypts the payment request by using a built-in first security plug-in and a second public key;
  • S13 The first mobile terminal signs the encrypted payment request by using the built-in first security plug-in and the first private key;
  • S14 The first mobile terminal sends the signed payment request to the second mobile terminal.
  • step S2 the method specifically includes:
  • S21 The second mobile terminal receives the signed payment request sent by the first mobile terminal
  • S22 The second mobile terminal verifies the signature of the first mobile terminal by using the built-in second security plug-in and the first public key, and generates checksum feedback;
  • S23 The second mobile terminal decrypts the encrypted payment request by using the built-in second security plug-in and the second private key;
  • the S24 second mobile terminal encrypts the check-in feedback by using the built-in second security plug-in and the first public key;
  • the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted check-in feedback;
  • S26 The second mobile terminal sends the signed checksum feedback to the first mobile terminal
  • the first mobile terminal uses the built-in first security plug-in and the second public key to verify the signature of the second mobile terminal;
  • the S28 first mobile terminal decrypts the encrypted check-in feedback using the built-in first security plug-in and the first private key.
  • step S3 the method specifically includes:
  • the first mobile terminal acquires payment information, where the payment information includes a payment amount;
  • the first mobile terminal encrypts the payment information by using a built-in first security plug-in and a second public key;
  • S33 The first mobile terminal signs the encrypted payment information by using the built-in first security plug-in and the first private key;
  • S34 The first mobile terminal sends the signed payment information to the second mobile terminal.
  • the step S4 specifically includes:
  • the second mobile terminal receives the signed payment information sent by the first mobile terminal
  • S42 The second mobile terminal verifies the signature of the first mobile terminal by using the built-in second security plug-in and the first public key;
  • S43 The second mobile terminal decrypts the encrypted payment information by using the built-in second security plug-in and the second private key;
  • S45 The second mobile terminal encrypts the payment success feedback by using the built-in second security plug-in and the first public key;
  • S46 The second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted payment success feedback. name;
  • S47 The second mobile terminal sends the signed payment success feedback to the first mobile terminal.
  • step S4 the method further comprises:
  • S51 The first mobile terminal verifies the signature of the second mobile terminal by using the built-in first security plug-in and the second public key;
  • S52 The first mobile terminal decrypts the encrypted payment success feedback by using the built-in first security plug-in and the first private key;
  • the S53 first mobile terminal logs in to the payment wallet to complete the deduction and completes the payment.
  • step S1 the method further includes:
  • the S02 server generates a first public key and a first private key of the first mobile terminal, and generates a second public key and a second private key of the second mobile terminal;
  • the S03 server generates the first security plugin based on the registration information and the operation algorithm of the first mobile terminal, and sends the first security plugin to the first mobile terminal together with the second public key of the second mobile terminal and the first private key of the first mobile terminal;
  • the S04 server generates a second security plugin based on the registration information and the operation algorithm of the second mobile terminal, and sends the second security plugin to the second mobile terminal together with the second private key of the second mobile terminal and the first public key of the first mobile terminal.
  • the present invention further provides a payment system based on the security authentication mechanism, including a first mobile terminal and a second mobile terminal that are in communication with each other, wherein
  • the first mobile terminal is configured to obtain a payment request and send a signature to the second mobile terminal; receive the verification and signature sent by the second mobile terminal, and verify the signature of the second mobile terminal; And sending the information to the second mobile terminal; and receiving the payment success feedback sent by the second mobile terminal and verifying the payment, and then logging in the payment wallet to complete the deduction and completing the payment;
  • the second mobile terminal is configured to receive the signed payment request, and perform verification on the signature of the first mobile terminal to generate checksum feedback; the signature is sent to the first mobile terminal for receiving the signature; And the payment information is verified, and the signature of the first mobile terminal is verified, and then the payment wallet is logged in and the amount is increased accordingly; and the payment success feedback is sent to the first mobile terminal.
  • the payment system further includes a server end that is respectively connected to the first mobile terminal and the second mobile terminal, and the server end obtains a corresponding first security plug-in based on the first mobile terminal, and the first public Key and first a private key, and obtaining a corresponding second security plugin, a second public key, and a second private key based on the second mobile terminal; and delivering the first security plugin, the second public key, and the first private key to the first mobile And sending, by the terminal, the second security plug-in, the first public key, and the second private key to the second mobile terminal.
  • the server In the payment method and the payment system provided by the present invention, the server generates a corresponding first security plug-in and a second security plug-in, and delivers them to the first mobile terminal and the second mobile terminal respectively, so that the payment is made.
  • local signature and local verification operation are performed in each step, which can be performed without a network, which is simple, convenient, and safe and reliable.
  • the two mobile terminals authenticate each other and restrict each other, which greatly improves the security performance in the process of data exchange (for example, sending payment requests and payment information, etc.), and is not easily cracked by others.
  • the payment system provided by the invention is simple and easy, and does not increase the redundant hardware cost.
  • FIG. 1 is a schematic flowchart of a payment method based on a security authentication mechanism
  • FIG. 2 is a hardware block diagram of an embodiment of a payment system applied to the above payment method provided by the present invention
  • FIG. 3 is a hardware block diagram of another embodiment of a payment system applied to the above payment method according to the present invention.
  • FIG. 1 is a schematic flowchart of a payment method based on a security authentication mechanism according to the present invention.
  • the payment method includes: S1: the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal.
  • the S2 first mobile terminal receives the verification feedback and signature sent by the second mobile terminal, and verifies the signature of the second mobile terminal;
  • S3 the first mobile terminal acquires the payment information and sends the signature to the second mobile terminal;
  • S4 first The mobile terminal receives the payment success feedback sent by the second mobile terminal.
  • the step S1 specifically includes: S11: the first mobile terminal acquires a payment request; S12: the first mobile terminal encrypts the payment request by using the built-in first security plug-in and the second public key; and S13 uses the built-in mobile terminal to use The first security plug-in and the first private key sign the encrypted payment request; S14 first mobile terminal will sign the payment after the request The request is sent to the second mobile terminal.
  • the step S2 includes: S21: the second mobile terminal receives the signed payment request sent by the first mobile terminal; and S22: the second mobile terminal uses the built-in second security plug-in and the first public key to perform the signature of the first mobile terminal. Verifying and generating the check-in feedback; S23: the second mobile terminal decrypts the encrypted payment request using the built-in second security plug-in and the second private key; S24, the second mobile terminal uses the built-in second security plug-in and the first public key Encrypting the check-in feedback; S25, the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted check-in feedback; S26, the second mobile terminal sends the signed check-in feedback to the first a mobile terminal; S27: the first mobile terminal uses the built-in first security plug-in and the second public key to verify the signature of the second mobile terminal; and the S28 first mobile terminal uses the built-in first security plug-in and the first private key pair to encrypt Check the feedback for decryption
  • step S2 only the check-in feedback received by the first mobile terminal is successful, and the process proceeds to the subsequent step S3. If the check-in feedback received by the first mobile terminal fails, the first mobile terminal does not pass the verification of the second mobile terminal, and immediately stops the payment. It can be seen from the content described in step S1 and step S2 that the first private key and the first public key are a key pair, the second private key and the second public key are a key pair, and the first private key and The first public key is a key pair of the first mobile terminal, and the second private key and the second public key are key pairs of the second mobile terminal.
  • the step S3 includes: S31: the first mobile terminal acquires payment information, where the payment information includes a payment amount; S32: the first mobile terminal encrypts the payment information by using the built-in first security plug-in and the second public key; The terminal signs the encrypted payment information by using the built-in first security plug-in and the first private key; S34: The first mobile terminal sends the signed payment information to the second mobile terminal.
  • the above payment information includes, but is not limited to, payment time, payee account name and the like in addition to the payment amount, such that the second mobile terminal confirms and pays after receiving the payment information.
  • the step S4 includes: S41: the second mobile terminal receives the signed payment information sent by the first mobile terminal; and the second mobile terminal uses the built-in second security plug-in and the first public key to perform the signature of the first mobile terminal. Verifying; S43, the second mobile terminal decrypts the encrypted payment information by using the built-in second security plug-in and the second private key; S44: the second mobile terminal logs in the payment wallet based on the obtained payment information and increases the amount thereof accordingly; S45: The second mobile terminal encrypts the payment success feedback by using the built-in second security plug-in and the first public key; and the second mobile terminal uses the built-in second security plug-in and the second private key to sign the encrypted payment success feedback.
  • the second mobile terminal sends the signed payment success feedback to the first mobile terminal. More specifically, in the process, when the second mobile terminal authenticates and decrypts the signature of the first mobile terminal, the payment information is obtained, and then the payment wallet is logged into the user name and password, and the payment amount is displayed according to the payment amount displayed in the payment information. In the third-party payment platform, the corresponding amount is added to the payment wallet to generate Payment success feedback. Of course, if the first mobile terminal does not pass the verification of the second mobile terminal, the payment is stopped immediately, and the feedback verification fails to the first mobile terminal, and the re-inspection is required.
  • the method further includes: S51: the first mobile terminal verifies the signature of the second mobile terminal by using the built-in first security plug-in and the second public key; and S52, the first mobile terminal uses the built-in first security The plug-in and the first private key decrypt the encrypted payment success feedback; S53, the first mobile terminal logs in to the payment wallet to complete the deduction, and completes the payment.
  • the first mobile terminal receives the payment success feedback of the second mobile terminal, and after verifying the signature of the second mobile terminal, the mobile wallet is then logged in to complete the payment, and it is noted that the payment wallet is logged in here.
  • the payment wallet registered with the second mobile terminal is the same, that is, the amount of the deduction is actually the amount of money recharged by the second mobile terminal.
  • the built-in security plug-in is used to verify the identity of the other party (verification signature). Only if the verification is successful, will the next step be taken. Once the verification fails, the payment is stopped and the payment process is safe and reliable.
  • the method further includes: S01: the first mobile terminal and the second mobile terminal send the registration information to the server; the S02 server generates the first public key and the first private key of the first mobile terminal, and generates the second a second public key and a second private key of the mobile terminal; the S03 server generates a first security plugin based on the registration information and the operation algorithm of the first mobile terminal, and together with the second public key of the second mobile terminal and the first mobile terminal The first private key is sent to the first mobile terminal together; the S04 server generates a second security plugin based on the registration information and the operation algorithm of the second mobile terminal, and together with the second private key of the second mobile terminal and the first mobile terminal The first public key is delivered to the second mobile terminal together.
  • the registration information herein includes a user name, a login password, and identification information of the terminal that uniquely identifies the terminal, and the generated operation algorithms in the first security plug-in and the second security plug-in are the same.
  • FIG. 2 is a hardware block diagram of an embodiment of a payment system applied to the above payment method provided by the present invention.
  • the first mobile terminal 1 and the second connected to each other are included in the payment system.
  • Mobile terminal 2 In the working process, first, the first mobile terminal acquires a payment request and sends a signature to the second mobile terminal; the second mobile terminal receives the signed payment request, and then uses the built-in second security plug-in to perform the verification. If the verification is successful, the verification feedback is returned and signed, and the verification feedback after the signature is sent to the first mobile terminal. Afterwards, the first mobile terminal receives the checksum feedback and the signature sent by the second mobile terminal, and then uses the built-in first security plug-in to verify the signature of the second mobile terminal.
  • the first payment terminal includes the payment amount.
  • the payment information is signed and sent to the second mobile terminal; the second mobile terminal receives the signed payment information, and also uses the built-in second security plug-in to perform the verification.
  • the payment payment wallet is logged in and The corresponding amount is added to the three-party payment platform; after that, the payment success feedback after returning the signature is returned.
  • the authentication operation is also performed using its built-in first security plug-in, and after the verification is completed, the login payment wallet completes the deduction from the payment and completes the payment.
  • the first mobile terminal includes: an information acquiring module for acquiring a payment request and payment information, and a first storage module for storing the first security plug-in, the first private key, and the second public key, a first encryption module for encrypting the payment request and the payment information, a first decryption module for decrypting the verification feedback and the payment success feedback returned by the second mobile terminal, for the encrypted payment request and the payment information a first signature module for signing, a first verification module for verifying the received signature verification and payment success feedback, and for transmitting the signed payment request and payment information to the second movement a first information sending module of the terminal, wherein the information acquiring module is connected to the first encryption module, and the first storage module is respectively connected to the first encryption module, the first decryption module, the first signature module, and the first verification module, and the first The encryption module is connected to the first signature module, the first decryption module is connected to the first verification module, and the first information transmission module is connected to the first signature module.
  • the second mobile terminal includes: an information receiving module, configured to receive the signed payment request and the signed payment information sent by the first mobile terminal, and configured to store the second security plug, the second private key, and the first public key
  • the second storage module the first encryption module for verifying the feedback and the payment success feedback for encryption, the first decryption module for decrypting the payment request and the payment information sent by the first mobile terminal, for encrypting
  • the second signature module for signing the feedback and the payment success feedback
  • the second verification module for checking the received payment request and the payment information feedback, and the feedback for the signature after the signature
  • the second information sending module sent to the first mobile terminal by the payment success feedback
  • the information receiving module is connected to the second verification module
  • the second storage module is respectively associated with the second encryption module, the second decryption module, and the second signature module
  • the second verification module is connected, the second encryption module is connected to the second signature module, the second decryption module is connected to the second verification module, and the second information is sent.
  • Signature module and the second module
  • FIG. 3 is a hardware block diagram of another embodiment of a payment system applied to the above payment method according to the present invention.
  • the payment system further includes a first mobile terminal and a second mobile, respectively.
  • the server end 3 of the terminal communication connection, the server side obtains the corresponding first security plug-in, the first public key and the first private key based on the first mobile terminal, and obtains the corresponding second security plug-in according to the second mobile terminal, and the second public
  • the first security plug-in, the second public key, and the first private key are delivered to the first mobile terminal, and the second security plug-in, the first public key, and the second private key are delivered together To the second mobile terminal.
  • the registration information herein includes a user name, a login password, and identification information of the terminal that uniquely identifies the terminal, and the generated operation algorithms in the first security plug-in and the second security plug-in are the same.
  • the first mobile terminal and the second mobile terminal are both mobile phone terminals, which are a first mobile phone and a second mobile phone, respectively.
  • the first mobile phone initiates a signature and a payment request; the second mobile phone receives the signature, and performs the verification by the built-in second security control. If the verification is passed, the second mobile phone's signature is fed back. If not, the payment is stopped, and the payment is checked. The sign failed.
  • the signature verification of the second mobile phone is performed, and if the verification is signed, the payment amount application is initiated; if not, the payment is stopped, and the feedback verification fails. .
  • the second mobile phone receives the application for the payment amount of the first mobile phone
  • the first mobile phone is also checked first. If the verification is passed, the feedback is successful, and the payment amount in the payment wallet is increased by the corresponding payment amount. If the verification is not passed, the payment is stopped and the feedback verification fails. Finally, after receiving the feedback from the second mobile phone, the first mobile phone deducts the payment from the payment wallet to complete the payment.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种基于安全认证机制的支付方法及支付系统,属于移动支付技术领域,其中,在该支付方法中包括:第一移动终端获取支付请求并签名发送至第二移动终端(S1);第一移动终端接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证(S2);第一移动终端获取支付信息并签名发送至第二移动终端(S3);第一移动终端接收第二移动终端发送的支付成功反馈(S4)。在进行支付的过程中,每个步骤中都进行了本地签名和本地验签操作,无需网络即可进行,简单方便,且安全可靠。

Description

一种基于安全认证机制的支付方法及支付系统 技术领域
本发明属于移动支付技术领域,尤其涉及一种支付方法及支付系统。
背景技术
随着科技的不断发展,移动支付越来越受到用户和商户的欢迎。移动支付也称为手机支付,就是允许用户使用其移动终端(通常是手机)对所消费的商品或服务进行账务支付的一种服务方式。单位或个人通过移动设备、互联网或者近距离传感直接或间接向银行金融机构发送支付指令产生货币支付与资金转移行为,从而实现移动支付功能。移动支付将终端设备、互联网、应用提供商以及金融机构相融合,为用户提供货币支付、缴费等金融业务。
移动支付主要分为近场支付和远程支付两种,所谓近场支付,就是用手机刷卡的方式坐车、买东西等,很便利。远程支付是指:通过发送支付指令(如网银、电话银行、手机支付等)或借助支付工具(如通过邮寄、汇款)进行的支付方式,如掌中付推出的掌中电商,掌中充值,掌中视频等属于远程支付。
由于移动支付的强大功能,它给人们的日常生活带来了极大的便利。但是,在目前的移动支付方式中,一般都是通过动态密码的进行身份验证,安全性能不够。
发明内容
针对上述问题,本发明旨在提供一种基于安全认证机制的支付方法,以提高支付过程中的安全性能。
本发明的再一目的旨在提供一种基于安全认证机制的支付系统。
本发明提供的技术方案如下:
一种基于安全认证机制的支付方法,包括:
S1第一移动终端获取支付请求并签名发送至第二移动终端;
S2第一移动终端接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;
S3第一移动终端获取支付信息并签名发送至第二移动终端;
S4第一移动终端接收第二移动终端发送的支付成功反馈。
进一步优选地,在步骤S1中具体包括:
S11第一移动终端获取支付请求;
S12第一移动终端使用内置的第一安全插件和第二公钥对所述支付请求进行加密;
S13第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付请求进行签名;
S14第一移动终端将签名后的支付请求发送至第二移动终端。
进一步优选地,在步骤S2中具体包括:
S21第二移动终端接收第一移动终端发送的签名后的支付请求;
S22第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证,并生成验签反馈;
S23第二移动终端使用内置的第二安全插件和第二私钥对加密的支付请求进行解密;
S24第二移动终端使用内置的第二安全插件和第一公钥对验签反馈进行加密;
S25第二移动终端使用内置的第二安全插件和第二私钥对加密后的验签反馈进行签名;
S26第二移动终端将签名后的验签反馈发送至第一移动终端;
S27第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;
S28第一移动终端使用内置的第一安全插件和第一私钥对加密的验签反馈进行解密。
进一步优选地,在步骤S3中具体包括:
S31第一移动终端获取支付信息,所述支付信息中包括支付金额;
S32第一移动终端使用内置的第一安全插件和第二公钥对所述支付信息进行加密;
S33第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付信息进行签名;
S34第一移动终端将签名后的支付信息发送至第二移动终端。
进一步优选地,在完成步骤S3后,步骤S4中具体包括:
S41第二移动终端接收第一移动终端发送的签名后的支付信息;
S42第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证;
S43第二移动终端使用内置的第二安全插件和第二私钥对加密的支付信息进行解密;
S44第二移动终端基于获取的支付信息登录支付钱包并将其中的金额进行相应的增加;
S45第二移动终端使用内置的第二安全插件和第一公钥对支付成功反馈进行加密;
S46第二移动终端使用内置的第二安全插件和第二私钥对加密后的支付成功反馈进行签 名;
S47第二移动终端将签名后的支付成功反馈发送至第一移动终端。
进一步优选地,在步骤S4之后还包括:
S51第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;
S52第一移动终端使用内置的第一安全插件和第一私钥对加密的支付成功反馈进行解密;
S53第一移动终端登录支付钱包从中完成扣款,完成支付。
进一步优选地,在步骤S1之前还包括:
S01第一移动终端和第二移动终端将注册信息发送至服务器端;
S02服务器端生成第一移动终端的第一公钥和第一私钥、及生成第二移动终端的第二公钥和第二私钥;
S03服务器端基于第一移动终端的注册信息和运算算法生成第一安全插件,并连同第二移动终端的第二公钥以及第一移动终端的第一私钥一起下发至第一移动终端;
S04服务器端基于第二移动终端的注册信息和运算算法生成第二安全插件,并连同第二移动终端的第二私钥以及第一移动终端的第一公钥一起下发至第二移动终端。
针对上述支付方法,本发明还提供了一种基于安全认证机制的支付系统,包括相互通信连接的第一移动终端和第二移动终端,其中,
所述第一移动终端用于获取支付请求并签名发送至第二移动终端;用于接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;用于获取支付信息并签名发送至第二移动终端;以及用于接收第二移动终端发送的支付成功反馈并对其进行验签,之后登录支付钱包从中完成扣款,完成支付;
所述第二移动终端用于接收签名后的支付请求,并对第一移动终端的签名进行验证生成验签反馈;用于对验签反馈进行签名发送至第一移动终端;用于接收签名后的支付信息,并对第一移动终端的签名进行验证,之后登录支付钱包并将其中的金额进行相应的增加;以及用于对支付成功反馈进行签名发送至第一移动终端。
进一步优选地,所述支付系统中还包括分别与所述第一移动终端和第二移动终端通信连接的服务器端,所述服务器端基于第一移动终端得到相应的第一安全插件、第一公钥和第一 私钥,以及基于第二移动终端得到相应的第二安全插件、第二公钥和第二私钥;并将第一安全插件、第二公钥和第一私钥一起下发至第一移动终端,将第二安全插件、第一公钥和第二私钥一起下发至第二移动终端。
本发明提供的基于安全认证机制的支付方法及支付系统,其有益效果在于:
在本发明提供的支付方法和支付系统中,服务器端生成相应的第一安全插件和第二安全插件,并将其分别下发至第一移动终端和第二移动终端,这样,在进行支付的过程中,每个步骤中都进行了本地签名和本地验签操作,无需网络即可进行,简单方便,且安全可靠。
在支付过程中,两个移动终端相互认证,相互制约,大大提高了数据交换(如,发送支付请求和支付信息等)过程中的安全性能,不易被他人破解。且本发明提供的支付系统简单易行,没有增加多余的硬件成本。
附图说明
图1为基于安全认证机制的支付方法的流程示意图;
图2为本发明提供的应用于上述支付方法的支付系统一种实施方式硬件框图;
图3为本发明提供的应用于上述支付方法的支付系统另一种实施方式硬件框图。
附图标记:
1——第一移动终端;2——第二移动终端;3——服务器端。
具体实施方式
下面结合附图和具体实施方式,对本发明作进一步详细说明。需要说明的是,下面描述的本发明的特定细节仅为说明本发明用,并不构成对本发明的限制。根据所描述的本发明的教导做出的任何修改和变型也在本发明的范围内。
如图1所示为本发明提供的基于安全认证机制的支付方法的流程示意图,从图中可以看出,在该支付方法包括:S1第一移动终端获取支付请求并签名发送至第二移动终端;S2第一移动终端接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;S3第一移动终端获取支付信息并签名发送至第二移动终端;S4第一移动终端接收第二移动终端发送的支付成功反馈。
具体来说,在步骤S1中具体包括:S11第一移动终端获取支付请求;S12第一移动终端使用内置的第一安全插件和第二公钥对支付请求进行加密;S13第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付请求进行签名;S14第一移动终端将签名后的支付请 求发送至第二移动终端。
在步骤S2中具体包括:S21第二移动终端接收第一移动终端发送的签名后的支付请求;S22第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证,并生成验签反馈;S23第二移动终端使用内置的第二安全插件和第二私钥对加密的支付请求进行解密;S24第二移动终端使用内置的第二安全插件和第一公钥对验签反馈进行加密;S25第二移动终端使用内置的第二安全插件和第二私钥对加密后的验签反馈进行签名;S26第二移动终端将签名后的验签反馈发送至第一移动终端;S27第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;S28第一移动终端使用内置的第一安全插件和第一私钥对加密的验签反馈进行解密。更具体来说,在步骤S2中,只有第一移动终端接收到的验签反馈为验签成功,才会进入后续的步骤S3。假若第一移动终端接收到的验签反馈为验签失败,则说明第一移动终端没有通过第二移动终端的验证,即刻停止支付。由步骤S1和步骤S2中描述的内容可以看出,第一私钥和第一公钥为一密钥对,第二私钥和第二公钥为一密钥对,且第一私钥和第一公钥为第一移动终端的密钥对,第二私钥和第二公钥为第二移动终端的密钥对。
在步骤S3中具体包括:S31第一移动终端获取支付信息,支付信息中包括支付金额;S32第一移动终端使用内置的第一安全插件和第二公钥对支付信息进行加密;S33第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付信息进行签名;S34第一移动终端将签名后的支付信息发送至第二移动终端。更具体来说,上述支付信息中除了包括支付金额之外,还包括但不限于支付时间、收款方账户名等信息,这样,当第二移动终端接收到支付信息之后进行确认并支付。
在步骤S4中具体包括:S41第二移动终端接收第一移动终端发送的签名后的支付信息;S42第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证;S43第二移动终端使用内置的第二安全插件和第二私钥对加密的支付信息进行解密;S44第二移动终端基于获取的支付信息登录支付钱包并将其中的金额进行相应的增加;S45第二移动终端使用内置的第二安全插件和第一公钥对支付成功反馈进行加密;S46第二移动终端使用内置的第二安全插件和第二私钥对加密后的支付成功反馈进行签名;S47第二移动终端将签名后的支付成功反馈发送至第一移动终端。更具体来说,在该过程中,当第二移动终端对第一移动终端的签名进行认证和解密之后得到支付信息,随即使用用户名和密码登录支付钱包,并根据支付信息中显示的支付金额从第三方支付平台中将相应金额增加到支付钱包中,生成 支付成功反馈。当然,若第一移动终端没有通过第二移动终端的验证,即刻停止支付,反馈验签失败给第一移动终端,要求重新验签。
更进一步来说,在步骤S4之后还包括:S51第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;S52第一移动终端使用内置的第一安全插件和第一私钥对加密的支付成功反馈进行解密;S53第一移动终端登录支付钱包从中完成扣款,完成支付。在该过程中,第一移动终端收到第二移动终端的支付成功反馈,且对第二移动终端的签名进行验证了之后,随即登录支付钱包完成付款,要注意的是,这里登录的支付钱包和第二移动终端登录的支付钱包是同一个,即这里扣款的金额实为第二移动终端充值的款项。
从中可以看出,在本发明中,整个付款过程中,第一移动终端和第二移动终端之间每进行一次数据通信,都会使用其内置的安全插件对对方的身份进行验证(验证签名),且只有验签成功了才会进入下一步骤,一旦验签失败则停止支付,支付过程安全可靠。
另外,在步骤S1之前还包括:S01第一移动终端和第二移动终端将注册信息发送至服务器端;S02服务器端生成第一移动终端的第一公钥和第一私钥、及生成第二移动终端的第二公钥和第二私钥;S03服务器端基于第一移动终端的注册信息和运算算法生成第一安全插件,并连同第二移动终端的第二公钥以及第一移动终端的第一私钥一起下发至第一移动终端;S04服务器端基于第二移动终端的注册信息和运算算法生成第二安全插件,并连同第二移动终端的第二私钥以及第一移动终端的第一公钥一起下发至第二移动终端。具体来说,这里的注册信息包括用户名、登录密码、唯一标识终端的标识信息等,且生成的第一安全插件和第二安全插件中的运算算法相同。
如图2所示为本发明提供的应用于上述支付方法的支付系统一种实施方式硬件框图,从图中可以看出,在该支付系统中包括相互通信连接的第一移动终端1和第二移动终端2。在工作过程中,首先,第一移动终端获取支付请求并签名发送至第二移动终端;第二移动终端接收到该签名后的支付请求,随即使用内置的第二安全插件对其进行验签,若验签成功,则返回验签反馈并进行签名,并将签名之后的验签反馈发送至第一移动终端。之后,第一移动终端接收到第二移动终端发送的验签反馈和签名,随即使用内置的第一安全插件对第二移动终端的签名进行验证,若验签成功,则随即获取包括支付金额的支付信息并进行签名、发送至第二移动终端;第二移动终端接收到签名的支付信息,同样使用内置的第二安全插件对其进行验签,若验签成功,则登录支付钱包并从第三方支付平台中增加相应的金额;之后返回签名之后的支付成功反馈。第一移动终端接收到接收第二移动终端发送的支付成功反馈之后, 同样使用其内置的第一安全插件对其进行验证操作,且在验证完成之后,登录支付钱包从中完成扣款,完成支付。
更进一步来说,在第一移动终端中包括:用于获取支付请求和支付信息的信息获取模块,用于存储第一安全插件、第一私钥和第二公钥的第一存储模块,用于对支付请求和支付信息进行加密的第一加密模块、用于对第二移动终端返回的验签反馈和支付成功反馈进行解密的第一解密模块、用于对加密后的支付请求和支付信息进行签名的第一签名模块、用于对接收到的签名后的验签反馈和支付成功反馈进行验签的第一验签模块以及用于将签名后的支付请求和支付信息发送至第二移动终端的第一信息发送模块,其中,信息获取模块与第一加密模块连接,第一存储模块分别与第一加密模块、第一解密模块、第一签名模块以及第一验签模块连接,第一加密模块与第一签名模块连接,第一解密模块与第一验签模块连接,第一信息发送模块与第一签名模块连接。
在第二移动终端中包括:用于接收第一移动终端发送的签名后的支付请求和签名后的支付信息的信息接收模块,用于存储第二安全插件、第二私钥和第一公钥的第二存储模块,用于验签反馈和支付成功反馈进行加密的第而加密模块、用于对第一移动终端发送的支付请求和支付信息进行解密的第而解密模块、用于对加密后的验签反馈和支付成功反馈进行签名的第二签名模块、用于对接收到的签名后的支付请求和支付信息反馈进行验签的第二验签模块以及用于将签名后的验签反馈和支付成功反馈发送至第一移动终端的第二信息发送模块,其中,信息接收模块与第二验签模块连接,第二存储模块分别与第二加密模块、第二解密模块、第二签名模块以及第二验签模块连接,第二加密模块与第二签名模块连接,第二解密模块与第二验签模块连接,第二信息发送模块与第二签名模块连接。
如图3所示为本发明提供的应用于上述支付方法的支付系统另一种实施方式硬件框图,从图中可以看出,在该支付系统中还包括分别与第一移动终端和第二移动终端通信连接的服务器端3,服务器端基于第一移动终端得到相应的第一安全插件、第一公钥和第一私钥,以及基于第二移动终端得到相应的第二安全插件、第二公钥和第二私钥;并将第一安全插件、第二公钥和第一私钥一起下发至第一移动终端,将第二安全插件、第一公钥和第二私钥一起下发至第二移动终端。具体来说,这里的注册信息包括用户名、登录密码、唯一标识终端的标识信息等,且生成的第一安全插件和第二安全插件中的运算算法相同。
在一个具体实施例中,上述第一移动终端和第二移动终端都为手机终端,分别为第一手机和第二手机。以在集贸市场的无网络支付为例,整个支付过程如下:
第一手机发起签名和支付请求;第二手机收到签名,通过内置的第二安全控件进行验签,如果验签通过,则反馈第二手机的签名,如果没有通过,则支付停止,反馈验签失败。之后,第一手机收到第二手机的签名反馈和签名后,进行第二手机的签名验签,若通过验签后,则发起支付金额申请;若没有通过,则支付停止,反馈验签失败。之后,第二手机收到第一手机的支付金额申请后,同样先对第一手机进行验签,若通过验签,则反馈支付成功,且将支付钱包中的支付金额增加对应的支付金额数,如果验签没有通过,则支付停止,反馈验签失败。最后,第一手机收到第二手机的反馈后,从支付钱包中扣款,以此完成支付。
以上通过分别描述每个过程的实施场景案例,详细描述了本发明,本领域的技术人员应能理解。在不脱离本发明实质的范围内,可以作修改和变形,比如部分模块的剥离使用和将系统嵌入于其他应用系统中。

Claims (9)

  1. 一种基于安全认证机制的支付方法,其特征在于,所述支付方法包括:
    S1第一移动终端获取支付请求并签名发送至第二移动终端;
    S2第一移动终端接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;
    S3第一移动终端获取支付信息并签名发送至第二移动终端;
    S4第一移动终端接收第二移动终端发送的支付成功反馈。
  2. 如权利要求1所述的支付方法,其特征在于,在步骤S1中具体包括:
    S11第一移动终端获取支付请求;
    S12第一移动终端使用内置的第一安全插件和第二公钥对所述支付请求进行加密;
    S13第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付请求进行签名;
    S14第一移动终端将签名后的支付请求发送至第二移动终端。
  3. 如权利要求1所述的支付方法,其特征在于,在步骤S2中具体包括:
    S21第二移动终端接收第一移动终端发送的签名后的支付请求;
    S22第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证,并生成验签反馈;
    S23第二移动终端使用内置的第二安全插件和第二私钥对加密的支付请求进行解密;
    S24第二移动终端使用内置的第二安全插件和第一公钥对验签反馈进行加密;
    S25第二移动终端使用内置的第二安全插件和第二私钥对加密后的验签反馈进行签名;
    S26第二移动终端将签名后的验签反馈发送至第一移动终端;
    S27第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;
    S28第一移动终端使用内置的第一安全插件和第一私钥对加密的验签反馈进行解密。
  4. 如权利要求1所述的支付方法,其特征在于,在步骤S3中具体包括:
    S31第一移动终端获取支付信息,所述支付信息中包括支付金额;
    S32第一移动终端使用内置的第一安全插件和第二公钥对所述支付信息进行加密;
    S33第一移动终端使用内置的第一安全插件和第一私钥对加密后的支付信息进行签名;
    S34第一移动终端将签名后的支付信息发送至第二移动终端。
  5. 如权利要求4所述的支付方法,其特征在于,在步骤S4中具体包括:
    S41第二移动终端接收第一移动终端发送的签名后的支付信息;
    S42第二移动终端使用内置的第二安全插件和第一公钥对第一移动终端的签名进行验证;
    S43第二移动终端使用内置的第二安全插件和第二私钥对加密的支付信息进行解密;
    S44第二移动终端基于获取的支付信息登录支付钱包并将其中的金额进行相应的增加;
    S45第二移动终端使用内置的第二安全插件和第一公钥对支付成功反馈进行加密;
    S46第二移动终端使用内置的第二安全插件和第二私钥对加密后的支付成功反馈进行签名;
    S47第二移动终端将签名后的支付成功反馈发送至第一移动终端。
  6. 如权利要求1至5任意一项所述的支付方法,其特征在于,在步骤S4之后还包括:
    S51第一移动终端使用内置的第一安全插件和第二公钥对第二移动终端的签名进行验证;
    S52第一移动终端使用内置的第一安全插件和第一私钥对加密的支付成功反馈进行解密;
    S53第一移动终端登录支付钱包从中完成扣款,完成支付。
  7. 如权利要求1至5任意一项所述的支付方法,其特征在于,在步骤S1之前还包括:
    S01第一移动终端和第二移动终端将注册信息发送至服务器端;
    S02服务器端生成第一移动终端的第一公钥和第一私钥、及生成第二移动终端的第二公钥和第二私钥;
    S03服务器端基于第一移动终端的注册信息和运算算法生成第一安全插件,并连同第二移动终端的第二公钥以及第一移动终端的第一私钥一起下发至第一移动终端;
    S04服务器端基于第二移动终端的注册信息和运算算法生成第二安全插件,并连同第二移动终端的第二私钥以及第一移动终端的第一公钥一起下发至第二移动终端。
  8. 一种基于安全认证机制的支付系统,其特征在于,所述支付系统中包括相互通信连接的第一移动终端和第二移动终端,其中,
    所述第一移动终端用于获取支付请求并签名发送至第二移动终端;用于接收第二移动终端发送的验签反馈和签名,并对第二移动终端的签名进行验证;用于获取支付信息并签名发送至第二移动终端;以及用于接收第二移动终端发送的支付成功反馈并对其进行验签,之后登录支付钱包从中完成扣款,完成支付;
    所述第二移动终端用于接收签名后的支付请求,并对第一移动终端的签名进行验证生成验签反馈;用于对验签反馈进行签名发送至第一移动终端;用于接收签名后的支付信息,并对第一移动终端的签名进行验证,之后登录支付钱包并将其中的金额进行相应的增加;以及用于对支付成功反馈进行签名发送至第一移动终端。
  9. 如权利要求8所述的支付系统,其特征在于,所述支付系统中还包括分别与所述第一移动终端和第二移动终端通信连接的服务器端,所述服务器端基于第一移动终端得到相应的第一安全插件、第一公钥和第一私钥,以及基于第二移动终端得到相应的第二安全插件、第二公钥和第二私钥;并将第一安全插件、第二公钥和第一私钥一起下发至第一移动终端,将第二安全插件、第一公钥和第二私钥一起下发至第二移动终端。
PCT/CN2017/087190 2016-08-31 2017-06-05 一种基于安全认证机制的支付方法及支付系统 WO2018040651A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2017319373A AU2017319373A1 (en) 2016-08-31 2017-06-05 Payment method and payment system based on security authentication mechanism
NZ751163A NZ751163B2 (en) 2016-08-31 2017-06-05 A payment method and payment system based on security authentication mechanism

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610783530.7 2016-08-31
CN201610783530.7A CN106372942B (zh) 2016-08-31 2016-08-31 一种基于安全认证机制的支付方法及支付系统

Publications (1)

Publication Number Publication Date
WO2018040651A1 true WO2018040651A1 (zh) 2018-03-08

Family

ID=57900525

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/087190 WO2018040651A1 (zh) 2016-08-31 2017-06-05 一种基于安全认证机制的支付方法及支付系统

Country Status (3)

Country Link
CN (1) CN106372942B (zh)
AU (1) AU2017319373A1 (zh)
WO (1) WO2018040651A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372942B (zh) * 2016-08-31 2018-09-21 中城智慧科技有限公司 一种基于安全认证机制的支付方法及支付系统
CN107633399B (zh) * 2017-09-15 2021-04-30 北京红枣科技有限公司 一种网络支付账户的线下支付方法和系统
CN108764912B (zh) * 2018-06-21 2021-09-17 广东工业大学 一种基于短信验证码的支付方法及装置
CN111260359A (zh) * 2018-11-30 2020-06-09 航天信息股份有限公司 一种移动支付方法、装置及系统
CN112101937A (zh) * 2020-09-01 2020-12-18 武汉华盛美业科技有限公司 一种订单安全支付方法及其系统
CN115689559A (zh) * 2021-07-28 2023-02-03 聂明 数字钱包设备及其双离线交易方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102468960A (zh) * 2010-11-16 2012-05-23 卓望数码技术(深圳)有限公司 一种离线模式身份与交易认证方法及终端
CN103903130A (zh) * 2014-03-21 2014-07-02 金硕澳门离岸商业服务有限公司 通过近距离通信实现的支付系统及支付方法
CN104850996A (zh) * 2015-05-04 2015-08-19 苏州海博智能系统有限公司 基于外部安全设备的交易方法、系统和服务器
CN106372942A (zh) * 2016-08-31 2017-02-01 中城智慧科技有限公司 一种基于安全认证机制的支付方法及支付系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102468960A (zh) * 2010-11-16 2012-05-23 卓望数码技术(深圳)有限公司 一种离线模式身份与交易认证方法及终端
CN103903130A (zh) * 2014-03-21 2014-07-02 金硕澳门离岸商业服务有限公司 通过近距离通信实现的支付系统及支付方法
CN104850996A (zh) * 2015-05-04 2015-08-19 苏州海博智能系统有限公司 基于外部安全设备的交易方法、系统和服务器
CN106372942A (zh) * 2016-08-31 2017-02-01 中城智慧科技有限公司 一种基于安全认证机制的支付方法及支付系统

Also Published As

Publication number Publication date
NZ751163A (en) 2021-11-26
CN106372942A (zh) 2017-02-01
AU2017319373A1 (en) 2019-03-21
CN106372942B (zh) 2018-09-21

Similar Documents

Publication Publication Date Title
US12039525B2 (en) Validating online access to secure device functionality
US10826702B2 (en) Secure authentication of user and mobile device
US10129020B2 (en) Efficient methods for protecting identity in authenticated transmissions
WO2018040651A1 (zh) 一种基于安全认证机制的支付方法及支付系统
US9704160B2 (en) Trusted execution environment for transport layer security key pair associated with electronic commerce and card not present transactions
KR101957840B1 (ko) 신뢰된 실행 환경을 갖춘 이동 결제 단말 및 방법
US20230008793A1 (en) Managing secure transactions between electronic devices and service providers
JP5407104B2 (ja) 物理的posトランザクションのための方法及び装置
WO2017190633A1 (zh) 验证金融卡用户身份可靠性的方法及装置
US20230062507A1 (en) User authentication at access control server using mobile device
US11960581B2 (en) Mobile device secret protection system and method
JP2013187698A (ja) 端末から各事業者サーバへ別々の秘匿情報を送信する秘匿情報送信方法及びシステム
KR100792163B1 (ko) 통신망을 이용한 온라인 금융거래 인증시스템과 이를 위한사용자 단말기
TW201131490A (en) Payment data processing method, system, payment terminal and payment server
TWI626606B (zh) Electronic card establishment system and method thereof
TW201101215A (en) Two-factor authentication method and system for securing online transactions
KR101302947B1 (ko) 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법
CN105228088B (zh) 移动支付近场通信的自更新公钥密钥交换方法
NZ751163B2 (en) A payment method and payment system based on security authentication mechanism
JP4148465B2 (ja) 電子価値流通システムおよび電子価値流通方法
Abdulridha Online Security Protocols for NFC Mobile Payment Applications
KR101306415B1 (ko) 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법
Sudheer et al. Secure Ciphering based QR Pay System for Mobile Devices
KR20120108664A (ko) 금융거래 정보를 안전하게 전송하기 위한 금융 시스템 및 금융거래 데이터 전송 방법 그리고 데이터 해독 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17844958

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017319373

Country of ref document: AU

Date of ref document: 20170605

Kind code of ref document: A

122 Ep: pct application non-entry in european phase

Ref document number: 17844958

Country of ref document: EP

Kind code of ref document: A1