Safe authorization method and system
A security and authorization code technology, applied in the field of security authorization, can solve the problems of troublesome implementation and deployment of payment systems, low work efficiency, and high cost, and achieve the effects of convenience, work efficiency, and security enhancement.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0073] Embodiment 1 of the present invention provides a method for security authorization. In this method, the authorization terminal generates a dynamic password, and the payment terminal judges the correctness of the dynamic password, which enhances transaction security, reduces costs, and improves work efficiency. The technical solution of this embodiment includes the steps of binding the dynamic tokens of the payment terminal and the authorization terminal and the steps of security authorization:
[0074] The binding steps are as follows: figure 1 Shown:
[0075] 101: Import dynamic token information, operation terminal information and authorization terminal information to the payment terminal.
[0076] The dynamic token information includes a dynamic token ID and a dynamic password generation algorithm corresponding to the dynamic token ID. Importing dynamic token information refers to importing the dynamic token identification and the corresponding dynamic password gen...
Embodiment 2
[0106] The present invention also provides a security authorization system, including: an operation terminal 301, a payment terminal 302 and an authorization terminal 302;
[0107] see image 3 , the payment terminal 302 includes: a first acquisition module 3021, a control module 3022, a judgment module 3023, a transaction processing module 3024, a request information generation module 3025, a first output module 3026, a password generation and verification module 3027;
[0108] The first obtaining module 3021 is used to obtain the operation terminal information and transaction application information sent by the operation terminal 301; it is also used to obtain the authorization code sent by the operation terminal 301 or the authorization terminal 303;
[0109] The control module 3022 is used to start the password generation and verification module 3027 after the information obtained by the first obtaining module 3021 is the operation terminal information; it is also used to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 