Computer, payment system and method thereof for realizing on-line payment

A payment system and online payment technology, applied in the direction of payment system structure, calculation, data processing applications, etc., can solve the problems of high cost, cumbersome operation steps, and business changes can only be handled at the bank counter, so as to improve the security level and facilitate Internet User Effects

Inactive Publication Date: 2010-03-31
CHINA UNIONPAY
7 Cites 31 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Although, in the prior art, the card issuing bank has launched online banking services for the development of e-commerce, and uses a hardware security chip as the carrier of the transaction certificate to improve the security of the transaction, by binding the bank card and the transaction certificate...
View more

Method used

Password keyboard is guaranteed not to be changed before the security chip of main board by MAC guarantee sensitive data; By terminal certificate signature and HTTP communication protocol, guarantee the integrity of transaction transmission on...
View more

Abstract

The invention discloses a payment system for realizing on-line payment, which comprises a computer, a payment gateway and a card issuance bank, wherein a user carries out on-line payment by utilizinga payment special module on a keyboard; the payment gateway is used for receiving the sensitive data and the transaction data of a bank card; and the card issuance bank is used for receiving the transaction data. The invention also discloses a payment method which comprises the following steps: ordering a merchandise by a user and selecting a financing computer payment mode; redirecting a web pageto a unitive payment page; brushing a card by the user and inputting a password; and matching a transaction result and an order by a businessman and searching and affirming a payment result by the user. By the payment system and the method of the invention, the convenience of electronic commerce and the safety of a financing computer are integrated into a whole, the traditional card-brushing transaction is introduced into the payment link of on-line transaction, on-line ordering and card-brushing payment are realized, and the invention enhances the safety grade of the on-line payment and is also convenient for a network user greatly.

Application Domain

Payment architectureBuying/selling/leasing transactions

Technology Topic

NetizenWeb page +5

Image

  • Computer, payment system and method thereof for realizing on-line payment
  • Computer, payment system and method thereof for realizing on-line payment
  • Computer, payment system and method thereof for realizing on-line payment

Examples

  • Experimental program(1)

Example Embodiment

[0060] The specific embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
[0061] figure 1 It shows a schematic flow diagram of the present invention based on a wealth management computer to realize online payment. Here, financial management computer refers to a home computer with online payment function. Those skilled in the art should understand that figure 1 It can not only show the structural composition of the payment system of the present invention, but also explain the specific flow diagram of the payment system for online payment.
[0062] Reference figure 1 , The payment system includes: a wealth management computer 10 of a network user, a payment gateway 20, a clearing transfer agency 30, a card issuing bank 40, and an online merchant 50. Among them, network users are users of card issuing banks and China UnionPay, who hold UnionPay cards and are the owners of wealth management computers, and are responsible for the card swiping behaviors that occur on the wealth management computers; payment gateway 20 (also known as the acquiring service agency) expands the use of wealth management Computer-based Internet B2C merchants provide online merchants with fund settlement, error request submission and other acquiring services; the clearing transfer agency 30 is a network that operates wealth management computers to access the front-end and exchange network, and provides inter-bank payment clearing services; card issuing bank 40 It is the issuing institution of the bank card held by the network user; and the network merchant 50 is a unit or institution that provides business services to the cardholder via the Internet. It should be pointed out that the card issuing bank may directly receive sensitive data and transaction data from the payment gateway without transiting through the clearing transfer agency, and return response information to the payment gateway. More specifically, the wealth management computer 10 at least includes a motherboard 104 and a keyboard 102.
[0063] When using the above payment system for online payment, it mainly includes the following steps:
[0064] Step S1, the network user as the cardholder accesses the online network merchant 50 through the wealth management computer 10, orders goods and selects the wealth management computer payment method to make payment;
[0065] Step S2, accept the payment method of wealth management computer, and redirect the webpage to the unified payment page of China UnionPay;
[0066] Step S3, the wealth management computer 10 of the network user detects the waiting payment information from the payment gateway 20, and the special indicator light on the keyboard of the wealth management computer 10 lights up to prompt the user to swipe the card and enter the password;
[0067] Step S4, the cardholder swipes the card through the keyboard integrated with the card reader, and after the transaction password is entered, the magnetic track information and transaction password are encrypted and sent to the security chip on the main board of the wealth management computer 10;
[0068] Step S5, the security chip receives the track information and transaction password from the keyboard, and sends it to the payment gateway 20 together with the transaction data after being encrypted again;
[0069] Step S6: The payment gateway 20 judges whether the received information is legal, and if it is legal, it sends the transaction information to the clearing transfer agency 30; if it is illegal, it ends and returns;
[0070] Step S7, the clearing transfer institution 30 forwards the transaction information to the issuing bank 40;
[0071] Step S8, the card issuing bank 40 returns a response to the clearing transfer institution 30;
[0072] Step S9, the clearing transfer institution 30 forwards the return response of the issuing bank to the payment gateway 20;
[0073] Step S10, the payment gateway 20 notifies the online network merchant 50 of the transaction result;
[0074] Step S11, the online network merchant 50 matches the transaction result with the order, and returns the transaction result notification response;
[0075] Step S12, the payment gateway 20 returns a payment result page to the wealth management computer 10, and the user returns to the online merchant website through the link in the payment result page to check and confirm the payment result; and
[0076] Step S13, the online network merchant 50 sends the corresponding goods to the cardholder.
[0077] Among them, in the above steps, the payment gateway refers to the payment gateway of China UnionPay, which is mainly used to expand Internet B2C merchants based on wealth management computer payment methods, and provide merchants with fund settlement, error request submission and other acquiring services.
[0078] Among them, in the above steps, the cardholder makes a payment by swiping the card on the wealth management computer. However, the card holder and the card holder can be the same person or different people.
[0079] figure 2 It shows the structure diagram of the financial management computer used for online payment of the present invention. Reference figure 2 The wealth management computer 10 at least includes a main board 104 and a keyboard 102. The main board 104 has a security chip 1041, and the keyboard 102 has an encryption chip 1021, a card reader, a payment indicator, and the like. Such as figure 1 As mentioned, when the payment system of the present invention performs online secure payment, the web page is first redirected to the unified payment page of UnionPay. When the special indicator light of the keyboard lights up, the cardholder uses the card reader to swipe the card and enter the transaction password. The encryption chip 1021 encrypts the track information and transaction password entered by the cardholder to the security chip 1041 on the motherboard, and the security chip 1041 decrypts the encrypted information to organize the transaction message, and then encrypts the transaction message through the security chip The sensitive transaction data is sent to the background. The key mechanism and negotiation between the security chip 1041 and the encryption chip 1021 will be described in detail in the subsequent drawings.
[0080] Preferably, the small keyboard for inputting the transaction password adopts a password keyboard, or at least a PIN input device that reaches the security level of a password keyboard. Among them, the keyboard is equipped with a dedicated switching key, and only when switching to an online payment method based on a wealth management computer, the card reader will receive the track information of the bank card, and the encryption chip built in the keyboard will encrypt the transaction password entered by the user.
[0081] Among them, the keyboard is also equipped with a dedicated indicator light and its driver. When a network user submits a payment request at the payment gateway, the computer will receive a message waiting for payment, and the dedicated indicator light of the keyboard will light up to remind the user that the card can be swiped. Further, waiting for the payment setting timeout processing, when the cardholder has not swiped the card for more than a certain period of time, the special indicator light of the keyboard will go out, and the cardholder must re-submit the payment request on the unified payment page of the payment gateway. This prevents counterfeiting of the card swiping keyboard, because the counterfeit card swiping keyboard cannot respond to the waiting payment information in real time.
[0082] image 3 The schematic diagram showing the principle of activating the wealth management computer before using the online payment service of the present invention. Reference image 3 In the present invention, a home computer with a security chip on its mainboard and an encryption chip on its keyboard must be activated before using the financial management function. The specific activation process is:
[0083] First, the network user enters the corresponding menu item in the basic input output system (BIOS) settings and chooses to activate the computer's financial management function;
[0084] Next, the BIOS sends instructions to the keyboard to query the keyboard status and confirm that the keyboard is equipped with an encryption chip; sends instructions to the motherboard to query the motherboard status and confirms that the motherboard is equipped with a security chip; at this time, both the keyboard and the motherboard receive the corresponding query instructions and return status information;
[0085] Step S3, the BIOS sends an initialization activation command and receives response information from the motherboard; and the motherboard returns unique response information;
[0086] Step S4, analyzing the response information and sending the new transmission key to the keyboard, receiving the response information of the keyboard; and writing the new key to the keyboard, locking the communication mechanism between the encryption chip of the keyboard and the security chip of the motherboard;
[0087] Step S5, the BIOS sends an activation keyboard command to activate the financial management function of the computer; the motherboard sets a new transmission key, records the keyboard serial number and activates the financial management function.
[0088] Figure 4 It shows a schematic diagram of data encryption in the process of swiping the card from the cardholder to receiving the message from the third-party payment gateway when the wealth management computer of the present invention is used for online payment. Reference Figure 4 , The encryption chip of the keyboard, the security chip of the motherboard and the third-party payment gateway are mainly involved in the transmission process of the encrypted data. In addition, data encryption mainly exists from the cardholder using the keyboard integrated with the card reader to swipe the card to the security chip of the motherboard, from the security chip of the motherboard to the third-party payment gateway. Hereinafter, the nodes (1), (2), (3), (4) and (5) in the process are respectively used for detailed description.
[0089] It should be pointed out that Figure 4 The track information ciphertext, transaction password ciphertext, transaction data ciphertext, and digital signature in the ciphertext all represent encrypted data, while the track information plaintext, transaction password plaintext, transaction data plaintext and security chip number all indicate unencrypted data or encrypted data decryption After the data.
[0090] At node (1), the network user swipes the card through the keyboard and enters the transaction password to generate the track information plaintext corresponding to the track information and the transaction password plaintext corresponding to the transaction password. The encryption chip of the keyboard uses the encryption process key and the MAC process key to convert The plaintext of track information and transaction password are converted into ciphertext of track information, ciphertext of transaction information and MAC data;
[0091] At node (2), after the security chip of the motherboard receives the track information ciphertext, transaction information ciphertext and MAC data from the encryption chip, it first uses the MAC process key to verify that the data has not been changed, and then uses the encryption process key to decrypt the track The information ciphertext and transaction password ciphertext are converted into track information plaintext, transaction password plaintext, transaction data plaintext and security chip number. Here, the communication between the keyboard encryption chip and the motherboard security chip adopts a symmetric encryption mechanism. The encryption chip uses the encryption master key to negotiate the encryption process key with the security chip of the motherboard, and uses the encryption process key to decrypt the track information ciphertext and transaction password ciphertext; and the keyboard encryption chip uses the MAC master key to negotiate the MAC process Key, then use the MAC process key to calculate the message verification code of the cipher text to ensure that the data has not been changed;
[0092] At node (3), the security chip of the main board negotiates the process key with the third-party payment gateway through the terminal master key, and uses the process key and 3DES algorithm to encrypt to generate track information ciphertext and transaction password ciphertext, of which the 3DES algorithm uses 128 bits Long key, and add plain text of transaction data such as order information and security chip number in the message;
[0093] Node (4), the security chip of the main board digitally signs the message data through the terminal private key, and then uses the payment gateway public key in the terminal certificate to encrypt the digital signature and the transaction data in the node (3) and the negotiation process key Random factor. Among them, asymmetric encryption and digital signature algorithms use 1024-bit long key RSA algorithm; and
[0094] At node (5), the web browser sends all messages to the third-party payment gateway through the SSL protocol. After the third-party payment gateway receives the message, it first distributes the public key corresponding to the terminal through the security chip number, and uses its own private key Decrypt the transaction data ciphertext, random factor and digital signature, and use the terminal public key to verify the digital signature, then use the random factor and terminal master key to calculate the process key, and finally use the process key to decrypt the track information and the transaction password Plaintext. After obtaining all the data in plaintext, the third-party payment gateway uses the working key negotiated with the clearing transfer agency to encrypt the transaction password, and forwards it to the clearing transfer agency through the financial network together with the track information and transaction data.
[0095] It can be known from the above data transmission process that the payment system of the present invention has the following characteristics compared with the online payment method in the prior art:
[0096] The magnetic track information generated by the user's card swiping and the input transaction password are encrypted by the encryption chip of the keyboard to be transmitted to the security chip of the mainboard;
[0097] When data is transmitted on the Internet, symmetric encryption, asymmetric encryption and triple encryption of SSL channels are used to achieve "one device, one encryption" and "one time encryption"; here, one device and one encryption means that each financial management computer is unique One time one key means that different encryption keys are used on each transmission node;
[0098] The track information and transaction password are encrypted transmission on any node of the network;
[0099] The password keyboard uses MAC to ensure that sensitive data is not changed before it reaches the security chip of the motherboard; it uses terminal certificate signatures and HTTP communication protocols to ensure the integrity of transactions transmitted on the Internet; and uses terminal certificate signatures to ensure the non-repudiation of transactions and save financial transactions The original message (including signature) to ensure that there is evidence to check in the event of a dispute.
[0100] Figure 5 It shows a schematic diagram of the storage of various keys used for online payment according to the present invention. Such as Figure 5 As shown, the encryption chip 1021 of the keyboard has an encryption master key and a MAC master key, and the security chip 1041 of the main board has an encryption master key, a MAC master key, a terminal master key, and a terminal certificate. Among them, the terminal certificate includes its own public key and private key and the third-party payment gateway public key, which is used for asymmetric encryption with the third-party payment gateway; the encryption master key is used for symmetric encryption between the security chip and the encryption chip, and negotiated The encryption process key; and the MAC master key are used to negotiate the MAC process key. In addition, the terminal master key is used for symmetric encryption between the security chip of the motherboard and the third-party payment gateway.
[0101] Image 6 It shows a schematic diagram of generating the terminal master key and the terminal public key stored on the main board of the wealth management computer of the present invention. As mentioned above, the terminal master key is used for symmetric encryption between the security chip of the main board and the third-party payment gateway. In more detail, the security chip on the main board negotiates the process key with the third-party payment gateway through the terminal master key, and uses this The process key and 3DES algorithm encrypt the plaintext of transaction password and the plaintext of track information. Reference Image 6 , Generating terminal master key and terminal public key includes:
[0102] Step 600: Send a request to a third-party payment gateway to apply for downloading the terminal master key;
[0103] Step 602: Retrieve the root key in the third-party payment gateway encryption machine;
[0104] Step 604: Generate a terminal master key from the root key according to the security chip number; and
[0105] Step 606: Obtain the terminal public key according to the security chip number.
[0106] Among them, the obtained terminal convention is used to verify the digital signature.
[0107] Among them, the encryption machine of the third-party payment gateway is mainly used for encryption and decryption operations, including: using the payment gateway's own private key to decrypt the transaction data ciphertext, random factor and digital signature; a process calculated based on the random factor and the terminal master key Key, decrypt the plaintext of the track information and the plaintext of the transaction password; use the working key negotiated with the clearing transfer agency to encrypt the transaction password.
[0108] Figure 7 It shows a schematic diagram of the principle that the security chip on the main board of the financial management computer of the present invention and the encryption chip on the keyboard negotiate the encryption process key based on the encryption master key. As mentioned above, the encryption chip of the keyboard and the security chip of the motherboard adopt a symmetric encryption communication mechanism. Specifically, the encryption chip of the keyboard uses the encryption master key to negotiate the encryption process key with the security chip of the motherboard, and uses the encryption process to encrypt The key encrypts the track information plaintext and the transaction password plaintext; on the other hand, the security chip uses the same encryption process key to decrypt the track information ciphertext and transaction password ciphertext after receiving the track information ciphertext and transaction password ciphertext. The key for the negotiated encryption process includes:
[0109] Step 700: The encryption chip presets a key generation algorithm;
[0110] Step 702: The security chip presets the same key generation algorithm as the encryption chip;
[0111] Step 704, the encryption chip randomly generates a random factor, and calculates the encryption process key according to the encryption master key and the random factor;
[0112] Step 706: The encryption chip of the keyboard sends a connection request and a random factor to the security chip of the main board;
[0113] Step 708, the security chip calculates the encryption process key according to the encryption master key and the random factor; and
[0114] Step 710: Complete the process key agreement based on the symmetric root key.
[0115] Those skilled in the art should understand that the encryption chip of the keyboard can use the MAC master key to negotiate the MAC process key in a similar way to the above process. Similarly, the security chip of the motherboard can use the terminal master key to negotiate the process with the third-party payment gateway. Key; and the third-party payment gateway can negotiate a working key with the clearing transfer agency.
[0116] Figure 8 It shows the principle block diagram of the key synchronization between the security chip and the encryption chip in the present invention. Reference Figure 8 , The encryption chip of the keyboard and the security chip of the motherboard use the encryption master key and the MAC master key for data transmission, and the encryption master key and the MAC master key are only used to ensure the integrity of the data transmitted from the keyboard to the security chip. Nothing to do with third-party payment gateways. The key synchronization between the security chip and the encryption chip includes:
[0117] Step 800, setting the encryption master key and the MAC master key;
[0118] Step 802: Send a request for a key to the security chip through the BIOS;
[0119] Step 804, using the keyboard driver to automatically inject the applied key into the encryption chip by the BIOS; and
[0120] Step 806: Complete the key synchronization between the security chip and the encryption chip.
[0121] Picture 9 It shows a schematic diagram of the initialization process of the security chip on the motherboard of the wealth management computer of the present invention. When a network user uses a bank card for online payment on a wealth management computer, he must first register the bank card with a third-party payment gateway before using it, that is, the third-party payment gateway can identify the cardholder's bank card. For this reason, a program for managing registered bank cards is specially set up on the wealth management computer, which is mainly to safely transmit the user's bank card information to a third-party payment gateway for registration. Only bank cards registered at the payment gateway can be used for online payment services. Since the process of registering a bank card is similar to the function of a wallet, we might as well call it a wallet program. The wallet program can be a separate application program or a program running on a web page to initialize the security chip on the motherboard, manage registered bank cards and set the default payment card.
[0122] From the perspective of safe payment, the user's bank card information will be encrypted by the security chip before being transmitted on the Internet every time a transaction is made. The initialization process includes:
[0123] The wallet program checks the validity of the certificate;
[0124] The security chip returns the certificate status to the wallet program. If the certificate is valid, the initialization process is ended; if the certificate is invalid, the certificate initialization command is sent to the security chip;
[0125] After receiving the initialization command, the security chip generates an RSA key pair, saves the private key of the security chip, and returns the public key of the security chip to the wallet program;
[0126] The wallet program receives the public key of the security chip, obtains personal information and sends it to the payment gateway for digital signature;
[0127] Send the information to be signed to the CA for signature, and return the digital certificate to the wallet program; and
[0128] The wallet program receives the certificate and sends the command STORE_CERT to save it to the security chip.
[0129] Among them, the digital certificate stored on the security chip can be used to encrypt or sign during transactions. If the certificate is invalid or does not exist, the online payment behavior will not be completed.
[0130] Such as Picture 9 As mentioned, the cardholder's bank card can only be used after being registered on a third-party payment gateway. thus, Picture 10 It shows a schematic diagram of the registration process of the bank card used for online payment in the payment gateway of the present invention. The registration process includes:
[0131] The user opens the wallet program and selects the function of registering a bank card;
[0132] The wealth management computer prompts the user to swipe the card and enter the PIN;
[0133] The user swipes the card and enters the PIN;
[0134] The wealth management computer encrypts the magnetic track information and transaction password of the card and sends it to the third-party payment gateway;
[0135] The third-party payment gateway decrypts the magnetic track information and transaction password of the received bank card, sends it to the corresponding card issuing bank for verification, and returns response information to the wealth management computer according to the verification result of the card issuing bank; and
[0136] The wealth management computer receives the response message and prompts the bank card registration success or failure.
[0137] The above briefly describes the main steps of registering the bank card used for online payment on the payment gateway. Here, in order to introduce the registration process in more detail, we might as well divide it into four nodes, specifically: the wallet program prompts the user to swipe the card and enter the PIN, and the security chip on the motherboard encrypts the track information ciphertext and transaction password from the encryption chip. The document is processed, the wallet program sends data to the third-party payment gateway, and the third-party payment gateway binds the bank card. The detailed operation steps of the four nodes are described as follows:
[0138] (1) The wallet program prompts the user to swipe the card and enter the PIN
[0139] a. The wallet program of the wealth management computer sends a card swiping signal to the keyboard, and the dedicated indicator light of the keyboard lights up to prompt the user to swipe the card;
[0140] b. The user swipes the card, the keyboard encrypts the magnetic track information of the bank card and waits for reading;
[0141] c. The wallet program reads the cipher text of the track information and sends it to the security chip;
[0142] d. The wallet program prompts the user to enter a PIN; and
[0143] e. The user enters the PIN, the keyboard encrypts the transaction password and waits for it to be read.
[0144] (2) The security chip on the motherboard processes the ciphertext of the track information and the ciphertext of the transaction password from the encryption chip
[0145] a. The security chip only replaces the ciphertext and signature after receiving the ciphertext of the track information and the ciphertext of the transaction password;
[0146] b. After the security chip receives the ciphertext of the track information, it decrypts it, checks whether the format is correct, and if it succeeds, sets the flag bit to indicate that the track information is ready;
[0147] c. After the security chip receives the ciphertext of the transaction password, it decrypts it, checks whether the format is correct, and if successful, sets the flag bit to indicate that the transaction password is ready;
[0148] d. After each flag bit is set, check whether the track information and transaction password are available, if so, proceed to the next step, otherwise wait for the flag bit to be set;
[0149] e. The security chip generates a 16-bit random symmetric key SK, and encrypts the transaction password and track information with SK;
[0150] f. The information obtained by encrypting SK with the public key of the third-party payment gateway is called the envelope, and the ciphertext of the transaction password and the ciphertext of the track information are signed in a certain format with the private key of the security chip to obtain the signature information;
[0151] g. Return transaction password ciphertext and track information ciphertext; and
[0152] h. Return the envelope and signature information.
[0153] (3) The wallet program sends data to a third-party payment gateway
[0154] a. Prompt to enter information such as bank card name and email; and
[0155] b. The personalized information, envelope, signature information, and ciphertext of track information and transaction password ciphertext together form a message and send it to a third-party payment gateway.
[0156] (4) Third-party payment gateway binding bank card
[0157] a. After receiving the message, the third-party payment gateway uses the private key to unlock the envelope and obtain the SK;
[0158] b. Use the SK track information ciphertext to decrypt the PIN, and use the bank's terminal key to re-encrypt the track information;
[0159] c. Send the track information and transaction password to the issuing bank for verification; and
[0160] d. Return a successful response message to the wallet program
[0161] Among them, if the verification is successful, the bank card number and the hardware serial number of the wealth management computer are bound to form a corresponding relationship and stored in the security chip; if the verification fails, a response message is returned to prompt the user that the registration is unsuccessful.
[0162] Picture 11 It shows a schematic diagram of the payment process of the online payment system based on the wealth management computer of the present invention. The payment process includes:
[0163] Internet users browse the website, purchase goods and specify the use of financial management computer payment methods;
[0164] The user selects the bank card for payment and confirms it;
[0165] The wealth management computer activates the wallet program and prompts the user to swipe the card and enter the PIN;
[0166] The user performs the card swiping operation on the keyboard and enters the PIN;
[0167] The wealth management computer receives encrypted track information and encrypted PIN;
[0168] Check whether the current bank card is in the authentication card list of the security chip. If it is not, the user is prompted that the payment cannot be made. If it exists, the order information and bank card information are obtained and the message is organized and sent to the payment gateway;
[0169] The payment gateway receives the message, checks the binding relationship, and after confirming that the transaction is possible, forwards the message to the clearing transfer agency, and obtains the response information from the clearing transfer agency;
[0170] The payment gateway sends a payment success message to the merchant and gets the order query URL;
[0171] The merchant receives the payment success message, matches the order, and prepares to ship;
[0172] The payment gateway returns a response message to the wealth management computer, and the wealth management computer receives the response information and prompts the transaction to end; and
[0173] The user chooses to continue shopping or exit.
[0174] Among them, activating the wallet program for online payment can be divided into two types, one is to automatically jump to the unified payment page of the payment gateway when you choose to pay on the shopping website, and the wallet program is called from the payment page through the wallet interface; the other is to click When paying the page, the target page is automatically directed to a shopping information file in a certain format that is automatically generated by the merchant website, and the file type is associated with the wallet program on the wealth management computer.
[0175] Picture 12 It shows a schematic diagram of the collection process of the online payment system based on the wealth management computer of the present invention. versus Picture 11 The payment process shown is similar, the collection process includes:
[0176] Internet users purchase goods and specify the use of financial management computer payment methods;
[0177] The merchant activates the wealth management computer to collect and transfer funds, requiring the user to swipe the card and enter the PIN;
[0178] The wealth management computer activates the collection procedure;
[0179] The user swipes the card and enters the PIN;
[0180] The wealth management computer receives encrypted track information and encrypted PIN, and organizes messages to be sent to the payment gateway;
[0181] The payment gateway receives the message, checks the binding relationship, and after confirming that the transaction is possible, forwards the message to the clearing transfer agency, and obtains the response information from the clearing transfer agency;
[0182] The payment gateway sends a payment success message to the merchant and gets the order query URL;
[0183] The merchant receives the transfer notification and confirms that the payment is successful;
[0184] The payment gateway returns the response information to the wealth management computer, and the wealth management computer receives the response information and prompts the transaction to end; and
[0185] The merchant delivers the goods to the user.
[0186] In the foregoing, specific embodiments of the present invention have been described with reference to the drawings. However, those of ordinary skill in the art can understand that various changes and substitutions can be made to the specific embodiments of the present invention without departing from the spirit and scope of the present invention. These changes and replacements fall within the scope defined by the claims of the present invention.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Identity authentication method based on power distribution

ActiveCN111541708AIncreased security level
Owner:WEIDE GUANGDONG INFORMATION TECH CO LTD

Fuse box with double fuses and LED (light emitting diode) assembly

InactiveCN106848767AIncreased security levelReduce electromagnetic interference
Owner:SHANGHAI AEROSPACE SCI & IND ELECTRIC APPLIANCE RES INST +1

JAVA WEB dynamic configuration security defense method

PendingCN114422206AImprove judgment efficiencyIncreased security level
Owner:BEIJING SEEYON INTERNET SOFTWARE CORP

Optical coded electronic encryption lock

InactiveCN109215175AIncreased security levelimprove security
Owner:HANGZHOU ZHIHUI TECH CO LTD

Classification and recommendation of technical efficacy words

  • Increased security level

Unified authentication method and system based on subscriber identity module card

InactiveCN106453199AIncreased security level
Owner:CHINA TELECOM CORP LTD

Generation and check methods and devices for bank card passwords, and system

ActiveCN106411523AIncreased security level
Owner:BANK OF CHINA

Mechanical unlocking device of electromagnetic lock

InactiveCN105756438Aimprove securityIncreased security level
Owner:ZHENJIANG HUAYUAN JINCHANG ELECTRICAL APPLIANCES

System and control method based on STO (Safe Torque Off)

InactiveCN109412468Aquick responseIncreased security level
Owner:SHANGHAI SIGRINER STEP ELECTRIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products