Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for charging using IC card

A charging system and user technology, applied in the direction of code identification card or credit card activation, etc., can solve the problems of third party interception, illegal use, credit card overdraft and leakage of information, etc., to prevent free access to information and strong confidentiality Effect

Inactive Publication Date: 2008-02-13
TIANJIN JINNAN KAIDA ELECTRONIC CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Cash, checks, and bank transfers in the existing payment methods lack immediacy, and credit cards are prone to overdrafts and leaks. At the same time, the service information is easily intercepted and illegally used by a third party during transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0006] Embodiment: a kind of method that carries out charging with IC card, its toll system front-end encryptor encrypts the non-encrypted data information flow that information source transmits, adds and contains legal user identity, authority and illegal user list, After billing rate and other system information, use the key stored in the IC card to encrypt the information. This information flow uses the two-way network for transmitting information to the back-end information recipient. After receiving the information, the information recipient , in the data authentication and decryption module or in the IC card storing the key and decryption module, the legal identity of the user is first confirmed, and the confirmation information in the two-way network will be sent back to the sender for verification. When it is confirmed that the user has When receiving the information, the key stored in the IC card is used to decrypt the data flow and restore the data information flow. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IC card toll method, wherein a front encryptor is used for adding system information including valid user identification, authority and illegal user list to the non-encrypted data information flow from an information source, and then the key of the IC card is used for information encrypting. The information flow is sent to the back information receiving party via an information transmitting bidirectional network. The information receiving party receives the information and confirms valid identification of the user in a data certification and decrypting module. The information is confirmed in the bidirectional network and then transmitted back to the sending party for verification. When the user is confirmed authorized in receiving the information, the key stored in the IC card is used for decrypting the data flow and recovering the data information flow, and the IC card calculates the cost in accordance with the information toll rate stipulated in the information, and deducts the cost. Advantages of the invention are: the invention can be used for certificating user identity, encrypting a data flow, real-time tolling and preventing illegal users from freely acquiring information.

Description

technical field [0001] The invention relates to a method for charging with an IC card. Background technique [0002] Cash, checks, and bank transfers in the existing charging methods lack immediacy, and credit cards are prone to overdrafts and leaks. At the same time, the service information is easily intercepted and illegally used by a third party during transmission. Contents of the invention [0003] The purpose of the present invention is to overcome above-mentioned deficiency, provide a kind of method that uses IC card to charge. [0004] The technical solution of the present invention is: a method for charging with an IC card, characterized in that: it consists of a front end and a back end, the front end has an information source, an encryptor, an IC card for storing encryption keys and performing encryption, and the back end has an IC card A two-way network for transmitting information, a data authentication and decryption module and an IC card or an IC card for s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/08
Inventor 崔连凯
Owner TIANJIN JINNAN KAIDA ELECTRONIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products