Method, system and platform for securing safety of payment based on internet

A payment platform and payment security technology, applied in the payment system structure, transmission system, platform integrity maintenance and other directions, can solve problems such as unsatisfactory effect, weak security awareness, and inability to prevent Trojan programs, so as to inhibit theft of consumption and prevent The effect of stealing consumption and easy installation

Active Publication Date: 2007-08-01
CHINA TELECOM CORP LTD
View PDF2 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that most users currently have weak awareness of security precautions, and it is not ideal to rely solely on users to take security measures
In addition, all Trojan horse killing tools can only i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and platform for securing safety of payment based on internet
  • Method, system and platform for securing safety of payment based on internet
  • Method, system and platform for securing safety of payment based on internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Fig. 2A and Fig. 2B respectively schematically show the block diagrams of the client side and the broadband application platform side of the payment system according to the present invention.

[0024] As shown in FIG. 2A, the client 201 includes a browser 211, such as Microsoft's IE browser, for communicating with the broadband application platform and downloading a security plug-in 212 from the platform. During the payment process, the security plug-in 212 detects and processes the Trojan horse program on the client 201 side through the interaction with the security plug-in background (to be described later) on the platform side. The security plug-in 212 includes the following components: a host information acquisition module 241 and a Trojan horse program identification processing module 242 . The functions of each component module and its submodules (not shown in the figure) of the security plug-in 212 will be described in more detail below.

[0025] As shown in FIG...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to one payoff method based on internet, which comprises the following steps: customer visit payoff platform downloading safe plug; safe plug gets customer host information and connects contract require to platform; the back of plug tests its validity and records its machine information; safe plug judges whether the customer machine uses agent or remote control; if yes, thendenying the payoff requires. This invention also provides one payoff system and platform.

Description

technical field [0001] The present invention relates to methods, systems and platforms for use in Internet-based payments. More specifically, it relates to methods, systems and platforms for securing payments when making payments over the Internet. Background technique [0002] In recent years, with the continuous development of Internet broadband applications, broadband charging platforms provided by banks, telecommunications and other departments have provided users with great convenience. However, due to account theft and the use of Trojan horse (Trojan horse) programs for misappropriation and consumption, it has seriously threatened the security of Internet payment and brought great hidden dangers to the healthy development of subsequent broadband services. For account theft, you can use the method of binding the account with the physical line to deal with it. And for the situation of "Trojan horse program" misappropriation and consumption, there is no fundamental way ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/00G06F21/00H04L29/06G06F21/57G06Q20/16
Inventor 杨可可王爱宝齐秋生王刚刘伟卢燕青徐雄吴恒章
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products