Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure payment method based on rfid intelligent payment system

A technology for secure payment and smart payment, applied in the payment system structure, transmission system, payment involving neutral parties, etc., can solve the problems of low security, slow encryption and decryption, and low security of encryption algorithm, so as to prevent privacy The effect of leakage and safety improvement

Inactive Publication Date: 2016-02-24
HUIZHOU DESAY IND RES INST CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When consumers use credit cards for consumption, the bank card account password is easily obtained, or it is made into a bank clone card, which brings economic losses to consumers.
When the consumer adopts the network payment based on the RFID intelligent payment system, the communication process of the shopping software only encrypts the data with a key during the payment process. The key encryption algorithm is a reversible encryption algorithm. The security of this encryption algorithm is not high. Technical personnel can easily decrypt, resulting in the handshake information of the shopping software, namely the security certificate and key, being easily obtained illegally by personnel who understand the relevant technology, and the security is not high, and the encryption algorithm in the payment process is a mixture of symmetric and asymmetric algorithms , such as using an asymmetric key system to transfer session keys, and using a symmetric cryptosystem to transmit messages
Although the encryption and decryption speed of the symmetric cryptosystem is fast, the key management is inconvenient, and the key management of the asymmetric cryptosystem is convenient, but the encryption and decryption speed is relatively slow.
In addition, phishing websites and computer viruses have seriously endangered the security of consumers' online transactions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure payment method based on rfid intelligent payment system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] Such as figure 1 As shown, a secure payment method based on the RFID payment system, writes the RFID payment ciphertext corresponding to the bank card into the user's mobile phone when handling the bank card business, and sets the login verification information when registering on the third-party platform WEB client, The login verification information includes: questions and answers thereof, mobile phone number, mobile phone IMEI number and valid area, and the safe payment method includes the following steps:

[0052] S101, start the third-party platform WEB client, detect whether the local client has installed the corresponding security control, if not installed, then install the corresponding security control, if installed, then detect whether it is the latest security control, if not the latest security control , the upgrade is performed.

[0053] S102. The user enters the user name on the third-party platform WEB client interface, and the third-party platform WEB c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safe payment pattern based on a radio frequency identification device (RFID) intelligent payment system. An RFID payment cipher text is written into a mobile phone, corresponding to a bank card, of a user when the user handles bank card business and login checking information is arranged when a third-party platform website (WEB) client terminal is registered. The method includes the steps that a relative safety control unit is tested and installed or updated; a user name received by the third-party platform WEB client terminal is transmitted to a third-party platform; the login checking information is received by the third-party platform and tested; after the login checking information is tested, the user chooses to buy commodities, confirms an order and a payment pattern, submits the order and the payment pattern to the third-party platform and appoints a trading bank through the third-party platform WEB client terminal; after authentication of the third-party platform and the designated bank of the user are passed, the bank appointed by the user transfers accounts to the third-party platform; and the user confirms to receive the commodities, and the accounts are transferred to a commercial tenant after being tested by the third-party platform. Due to the facts that double testing that the login testing information is tested by the third-party platform and authentication is conducted by the designated bank of the user, safety in the online payment process is improved.

Description

technical field [0001] The invention relates to the technical field of secure payment, in particular to a secure payment method based on an RFID intelligent payment system. Background technique [0002] With the continuous development of network technology, people carry out various activities such as work, study and life through the network. When consumers use credit cards for consumption, the bank card account passwords are easily obtained, or made into bank clone cards, which bring economic losses to consumers. When the consumer adopts the network payment based on the RFID intelligent payment system, the communication process of the shopping software only encrypts the data with a key during the payment process. The key encryption algorithm is a reversible encryption algorithm. The security of this encryption algorithm is not high. Technical personnel can easily decrypt, resulting in the handshake information of the shopping software, namely the security certificate and ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q20/02G06Q20/32G06Q20/42
Inventor 孔庆佐祖兆新
Owner HUIZHOU DESAY IND RES INST CO LTD