Method, system and platform for securing safety of payment based on internet

A payment platform and payment security technology, applied in the payment system, payment system structure, transmission system, etc., can solve the problems of unsatisfactory effect, inability to prevent Trojan programs, weak awareness of security prevention, etc. The effect of preventing fraudulent consumption

Active Publication Date: 2013-03-20
CHINA TELECOM CORP LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that most users currently have weak awareness of security precautions, and it is not ideal to rely solely on users to take security measures
In addition, all Trojan horse killing tools can only identify common known Trojan horse programs, but cannot prevent unknown Trojan horse programs, so they cannot fundamentally suppress the phenomenon of using Trojan horse programs for fraudulent consumption in broadband applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and platform for securing safety of payment based on internet
  • Method, system and platform for securing safety of payment based on internet
  • Method, system and platform for securing safety of payment based on internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Figure 2A and Figure 2B The block diagrams of the client side and the broadband application platform side of the payment system according to the present invention are schematically shown respectively.

[0024] Such as Figure 2A As shown in , the client 201 includes a browser 211, such as Microsoft's IE browser, for communicating with the broadband application platform and downloading a security plug-in 212 from the platform. During the payment process, the security plug-in 212 detects and processes the Trojan horse program on the client 201 side through the interaction with the security plug-in background (to be described later) on the platform side. The security plug-in 212 includes the following components: a host information acquisition module 241 and a Trojan horse program identification processing module 242 . The functions of each component module and its submodules (not shown in the figure) of the security plug-in 212 will be described in more detail below....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to one payoff method based on internet, which comprises the following steps: customer visit payoff platform downloading safe plug; safe plug gets customer host information and connects contract require to platform; the back of plug tests its validity and records its machine information; safe plug judges whether the customer machine uses agent or remote control; if yes, then denying the payoff requires. This invention also provides one payoff system and platform.

Description

technical field [0001] The present invention relates to methods, systems and platforms for use in Internet-based payments. More specifically, it relates to methods, systems and platforms for securing payments when making payments over the Internet. Background technique [0002] In recent years, with the continuous development of Internet broadband applications, broadband charging platforms provided by banks, telecommunications and other departments have provided users with great convenience. However, due to account theft and the use of Trojan horse (Trojan horse) programs for misappropriation and consumption, it has seriously threatened the security of Internet payment and brought great hidden dangers to the healthy development of subsequent broadband services. For account theft, you can use the method of binding the account with the physical line to deal with it. And for the situation of "Trojan horse program" misappropriation and consumption, there is no fundamental way ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40H04L29/06G06F21/57G06Q20/16
Inventor 杨可可王爱宝齐秋生王刚刘伟卢燕青徐雄吴恒章
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products