Visible-code-based payment method and system with multiple security combination mechanisms

A safe and mechanism-based technology, applied in the payment and system fields based on multiple security combination mechanisms of visible codes, can solve problems such as the impossibility of holding a large amount of payment certificates, the inability to use high-security mechanisms, and the short effective period of use, etc., to achieve Reduce roaming charges, reduce operation and maintenance costs, and improve security

Inactive Publication Date: 2014-06-25
闻进
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Traditionally, due to the limitation of communication technology, the focus of secure payment was on the encryption of software and hardware of the payment certificate held by the payer (magnetic card, IC card, sound wave, NFC, SIM card, etc.) and the binding of payment equipment , but these payment vouchers ultimately need to be read by the payment terminal device to complete the payment process. In theory, there is an inevitable possibility of being read and copied. The difference is only in the cost of reading and copying.
At the same time, due to the cost (production, distribution, replacement, etc.) of such payment certificates (magnetic cards, IC cards, sound waves, NFC, SIM cards, etc.) that rely on software and hardware encryption, the validity period of such payment certificates cannot be too short. The amount of payment vouchers held by each person cannot be very large. The result is that the amount of funds involved in a single payment voucher account is large. Once the payment voucher is copied and stolen, it will lead to a large amount of loss.
At the same time, due to communication considerations at the beginning of the design of the POS payment system, the mode of setting the conditions for one-time packaging and uploading to seek the authorization of the host is adopted. The payer cannot intuitively and visually judge whether the payment terminal is legally certified before entering the security information. Therefore, it is possible for illegal payment terminals to copy and steal the payment credential information of the payer, and at the same time, it is impossible to use high security mechanisms such as dynamic verification codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visible-code-based payment method and system with multiple security combination mechanisms
  • Visible-code-based payment method and system with multiple security combination mechanisms
  • Visible-code-based payment method and system with multiple security combination mechanisms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0027] The cardholder uses the master account to log in to the card issuing bank / issuer system (100) of the master account online through a terminal (200) device (net banking, mobile banking, mobile smart client, etc.), and self-generates payment card information for transaction payment ( Including but not limited to the following: payment card number, personalized welcome message, acquiring bank identification code, merchant name, merchant number, terminal identification code of card accepting machine, actual validity period, single-use card / multi-use card, service code / service Constraints, card verification code (CVN), personal identification code, dynamic verification code receiving number, allowable re-entry times, transaction currency code, credit amount, cardholder identity authentication information (cardholder ID number, fingerprint, digital cert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a visible-code-based payment method and system with multiple security combination mechanisms, wherein the visible code is a two-dimension code or a bar code or a character code or combination of the two-dimension code, the bar code and the character code. The visible-code-based payment method and system with the multiple security combination mechanisms is characterized in that on the basis of an existing transaction payment system (such as an Internet channel, a mobile intelligent client terminal, an ATM, a POS and a counter), payment card information used for authentication during transaction payment is generated in a self-service mode in a card issuing bank/card issuing mechanism system by a cardholder, the payment card information at least comprises a payment card number, personalized welcomes, an acquiring bank identification code, a commercial tenant name, a commercial tenant code, a card acceptor terminal identification code, an actual validity period, a one-time/multi-time card, a service code/service constraint, a CVN, a personal identification code, a dynamic verification code receiving number, the allowed retyping frequency, a transaction money code, limit amount, cardholder identity authentication information (such as the cardholder identification numbers, fingerprints, a digital certificate and a seal impression) and the like, the payment card information is used as the basis of the multiple security combination authorization mechanisms, and the payment card numbers can be applied to the transaction payment method and system through the visible code (such as the two-dimension code, the bar code, the character code and the combination of the two-dimension code, the bar code and the character code).

Description

technical field [0001] The present invention relates to a payment system (Internet channel, mobile smart client, ATM, POS, counter, etc.) based on the existing payment system (Internet channel, mobile smart client, ATM, POS, counter, etc.) Payment methods and systems for secure combination mechanisms. Background technique [0002] Traditionally, due to the limitation of communication technology, the focus of secure payment was on the encryption of software and hardware of the payment certificate held by the payer (magnetic card, IC card, sound wave, NFC, SIM card, etc.) and the binding of payment equipment , but these payment vouchers ultimately need to be read by the payment terminal device to complete the payment process. In theory, there is an inevitable possibility of being read and copied. The difference is only in the cost of reading and copying. At the same time, due to the cost (production, distribution, replacement, etc.) of such payment certificates (magnetic card...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/02G06Q20/40
CPCG06Q20/02G06Q20/40G06Q20/401
Inventor 闻进
Owner 闻进
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products