Two-dimension code-based mobile terminal transaction encryption method

A technology of mobile terminals and encryption methods, applied in the network field, can solve problems such as insufficient payment security, and achieve the effect of ensuring security

Active Publication Date: 2014-04-09
JIANGSU UNIV
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a mobile terminal transaction encryption method based on a two-dimensional code for the problem of insufficient security of transaction payment using a mobile terminal in the prior art. The protocol is combined, and the two-dimensional code is used to encrypt relevant information during the process of identity verification, order confirmation and payment to ensure transaction security, thereby ensuring the security, confidentiality and non-repudiation of mobile online transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-dimension code-based mobile terminal transaction encryption method
  • Two-dimension code-based mobile terminal transaction encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0030] The inventive method is based on a two-dimensional code chip device, and the two-dimensional code chip device has the following functions:

[0031] (1) The two-dimensional code chip device needs to authenticate the customer when the customer is about to enter the mobile terminal payment transaction platform. After the password is encrypted, it is sent to the proxy server of the bank for password verification. Only through the password verification can it continue to be used.

[0032] (2) The two-dimensional code chip device also saves the customer's identity verification certificate, that is, the private key that uniquely confirms the customer's identity, and can automatically sign the information when the customer needs to perform identity verification.

[0033] (3) The two-dimensional code chip device can recognize two-dimensional code in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimension code-based mobile terminal transaction encryption method and belongs to the network technical field. According to the two-dimension code-based mobile terminal transaction encryption method of the invention, based on the combination of a two-dimensional code technology and an existing mobile transaction protocol, related information can be encrypted through two-dimension codes in identity authentication of two transaction parties, order confirmation and payment, such that transaction security can be ensured. With the two-dimension code-based mobile terminal transaction encryption method of the invention adopted, safer and more reliable online transactions can be realized without too much burden brought to a mobile terminal device, and the safety, confidentiality and non-repudiation performance of the online transactions of the mobile terminal can be ensured.

Description

technical field [0001] The invention belongs to the field of network technology, and more precisely, the invention relates to a two-dimensional code-based mobile terminal transaction encryption method. Background technique [0002] With the advancement of mobile communication and network technology, mobile terminal applications have penetrated into every corner of daily life. However, due to the problems of security and privacy protection in mobile terminal payment, its application encounters bottlenecks. At present, in the field of mobile terminal payment, most schemes only use encryption and decryption algorithms to achieve information confidentiality and user identity authentication, but do not take into account the insecurity of mobile terminals themselves and the efficiency of information transmission. [0003] Two-dimensional code is a new generation of barcode technology that records data symbol information in a black and white rectangular matrix distributed on a pla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/02G06Q30/06H04L9/32
CPCG06Q20/02G06Q20/32G06Q20/401G06Q30/0609H04L9/3226
Inventor 韩牟詹洋马世典孔令晶王松浩
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products