Method for charging using IC card
A charging system and user technology, applied in the direction of code identification card or credit card activation, etc., can solve the problems of third party interception, illegal use, credit card overdraft and leakage of information, etc., to prevent free access to information and strong confidentiality Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment
[0006] Embodiment: a kind of method that carries out charging with IC card, its toll system front-end encryptor encrypts the non-encrypted data information flow that information source transmits, adds and contains legal user identity, authority and illegal user list, After billing rate and other system information, use the key stored in the IC card to encrypt the information. This information flow uses the two-way network for transmitting information to the back-end information recipient. After receiving the information, the information recipient , in the data authentication and decryption module or in the IC card storing the key and decryption module, the legal identity of the user is first confirmed, and the confirmation information in the two-way network will be sent back to the sender for verification. When it is confirmed that the user has When receiving the information, the key stored in the IC card is used to decrypt the data flow and restore the data information flow. A...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com