Payment method and payment system by sensitive information identification

A sensitive information and identification technology, which is applied in the field of network security, can solve problems such as information leakage, encryption difficulties, and easy loopholes, and achieve excellent technical effects, save key storage, and simple processes

Active Publication Date: 2015-02-18
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of information leakage, various encryption measures and algorithms are generally used in the online payment link, including symmetric encryption, asymmetric encryption and other measures. However, due to the large number of online payment links, including merchants, payment channel parties, banks, etc. Use, protection and management have become the short board of online information protection, especially to achieve end-to-end encryption of sensitive information such as personal account information is particularly difficult
[0004] Taking the more sensitive bank card number information as an example, in the actual online shopping environment: 1. Bank card information needs to go through at least several links such as e-commerce, payment companies, acquiring banks, and card issuing banks. For commercial considerations, such as possible refunds etc. E-commerce and payment companies often also need to keep bank card information. 2. If point-to-point encryption is used to achieve end-to-end effects throughout the process, the storage and use of keys will become very complicated and expensive, and it will be extremely easy to There is a loophole

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Payment method and payment system by sensitive information identification
  • Payment method and payment system by sensitive information identification
  • Payment method and payment system by sensitive information identification

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0053] Such as figure 1Shown is a schematic flow chart of the steps of the payment method for marking sensitive information of the present invention. As a specific embodiment 1 of the present invention, the present invention provides a payment method for marking sensitive information, including:

[0054] S1 registers sensitive information and identification information on the identification server and establishes a corresponding relationship;

[0055] S2 trading platform obtains sensitive information and generates payment information;

[0056] S3, the transaction platform sends the sensitive information to the identification server to obtain the identification information;

[0057] S4, the transaction platform sends the identification information and the payment information to the payment platform;

[0058] S5 The payment platform sends the identification information to the identification server to obtain the sensitive information;

[0059] S6 The payment platform completes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a payment method by sensitive information identification. The payment method includes: S1, registering sensitive information and identification information on an identification server and establishing a corresponding relation between the sensitive information and identification information; S2, enabling a transaction platform to acquire the sensitive information and generate payment information; S3, enabling the transaction platform to send the sensitive information to the identification server so as to acquire the identification information; S4, enabling the transaction platform to send the identification information and the payment information to a payment platform; S5, enabling the payment platform to send the identification information to the identification server so as to acquire card number information; S6, enabling the payment platform to complete transaction according to the payment information and the card number information and return a transaction result. The payment method has better technical advantages that network security payment is performed by sensitive information identification, an adopted identification is compatible with a data structure of an existing bank card number, and band card payment process identification can be achieved by existing merchant systems and payment systems only by changing a few ports.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security payment method and system. Background technique [0002] Online payment is the foundation of e-commerce. The widespread application of electronic payment has promoted the rapid development of e-commerce, but it has also brought about the leakage of personal sensitive information, especially bank card information. [0003] In order to solve the problem of information leakage, various encryption measures and algorithms are generally used in the online payment link, including symmetric encryption, asymmetric encryption and other measures. Use, protection, and management have become the short boards of online information protection, especially to achieve end-to-end encryption of sensitive information such as personal account information. [0004] Taking the more sensitive bank card number information as an example, in the actual online shopping environment: 1. Bank...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/16G06Q20/38G06Q20/40
CPCG06Q20/16G06Q20/385G06Q20/401
Inventor 谈剑锋梅庆杨党团尤磊
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products