Method for consuming electronic wallet

An electronic wallet and algorithm technology, applied in the field of information security, can solve the problems of insufficiency of electronic wallet transfer operation and consumption operation, and achieve the effect of convenient management, simplified implementation, and safe transaction process.

Active Publication Date: 2011-05-04
FEITIAN TECHNOLOGIES
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the electronic wallet in the CPU card can realize basic transaction functions such as ordinary transfer, consumption / withdrawal, transfer, and update of overdraft limit. For promotional applications where the amount is graded and discounted, such as membership cards of shopping malls, supermarkets, restaurants, fitness clubs, etc., the ordinary loading and consumption operations of existing electronic wallets cannot meet this application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for consuming electronic wallet
  • Method for consuming electronic wallet
  • Method for consuming electronic wallet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] The embodiment of the present invention provides a method for consuming electronic wallets. In this embodiment, the electronic wallet in the CPU card not only has all the transaction functions of wallets that support composite applications, but also supports composite loading and consumption functions. , and the compound loading operation of the electronic wallet in the CPU card is carried out at the CPU terminal. When performing the compound loading operation in this embodiment, the transaction amount is directly added to the balance of the electronic wallet. Correspondingly, when consuming, According to the pre-agreed algorithm, the transaction amount and the value in the corresponding record of the composite special file are calculated to obtain the new amount, and then the new amount is deducted from the balance of the electronic wallet to obtain the new balance of the electronic wallet, and the consumption operation is completed .

[0031] see figure 2 , a method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for consuming an electronic wallet, and belongs to the field of information safety. The method comprises the following steps that: a central processing unit (CPU) card enters a non-contact induction area of a terminal, is electrified and initialized, reads data in a consumption initialization command when receiving the consumption initialization command sent by the terminal and stores the data, wherein the data comprises transaction amount; the CPU card operates the transaction amount and a value in a corresponding record in a composite application dedicated file according to a predetermined algorithm to obtain new amount, reads the balance of the electronic wallet, and judging whether the new amount exceeds the sum of the balance and limit of overdrawn account of the electronic wallet or not, if so, the CPU card stops operating, and otherwise, the CPU card generates a pseudo-random number and a process key and returns a response message of the consumption initialization command to the terminal; and the CPU card receives a consumption command sent by the terminal, deducts the new amount from the balance of the electronic wallet to obtain new balance, and returns a response message of the consumption command to the terminal.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for consuming electronic wallets. Background technique [0002] The chip of the CPU card contains a microprocessor, its function is equivalent to a microcomputer, and the CPU card includes a central processing unit (CPU), a read-only memory (ROM), a random access memory (RAM), a computer Erasing programmable read-only memory (EEPROM), etc., has the advantages of large amount of information, high anti-counterfeiting security, offline operation, and multi-functional development. The CPU card adopts a powerful and stable security controller, which enhances the security of the card, and the unique internal and external authentication mechanism of the CPU card and the special authentication mechanism represented by the financial IC card specification can completely guarantee the legality and security of the transaction The application firewall function of the CPU card can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07F19/00G07F7/08
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products