Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Credit card encryption method and device

An encryption method and encryption device technology, applied in the field of information security, can solve problems such as potential safety hazards, malicious consumption, and consumer losses, and achieve the effect of convenience and security

Inactive Publication Date: 2015-07-22
TVMINING BEIJING MEDIA TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have potential safety hazards. For example, only using the signature method, the merchant did not carefully check whether the signature matches the handwriting reserved on the credit card. When the credit card is lost, it is easy to imitate the handwriting for malicious consumption.
There are certain security risks when the signature and password are transmitted between the POS machine and the bank through the communication line by using the signature encryption method. Once criminals use high-tech means to intercept this information, it will bring great losses to consumers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credit card encryption method and device
  • Credit card encryption method and device
  • Credit card encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] Figure 4 It is a flowchart of a credit card encryption method in Embodiment 1 of the present invention. Such as Figure 4 As shown, the following steps S401-S409 are included:

[0089] Step S401, sampling the voice password entered by the cardholder, extracting the sampling point and obtaining the feature value of the sampling point;

[0090] Step S402, generate a two-dimensional code according to the characteristic value of the sampling point and the information of the payment account, and reserve the two-dimensional code in the payment terminal;

[0091] Step S403, during the payment process, obtain the two-dimensional code information by scanning the two-dimensional code;

[0092] Step S404, analyzing the two-dimensional code information to obtain the characteristic value of the voice password and the information of the payment account;

[0093] Step S405, obtaining the input speech, and obtaining the feature value of the speech;

[0094] Step S406, matching th...

Embodiment 2

[0122] like Figure 8 As shown, the credit card encryption device provided by the embodiment of the present invention includes:

[0123] Generating unit 11; The generating unit 11 includes:

[0124] The sampling module 111 is used to sample the voice password entered by the cardholder, extract the sampling point and obtain the feature value of the sampling point;

[0125] The generating module 112 is configured to generate a two-dimensional code according to the characteristic value of the sampling point and the information of the payment account, and reserve the two-dimensional code in the payment terminal.

[0126] A payment unit 12; the payment unit 12 includes:

[0127] The scanning module 121 is used to obtain the two-dimensional code information by scanning the two-dimensional code during the payment process;

[0128] The analysis module 122 is used to analyze the two-dimensional code information to obtain the feature value of the voice password and the information of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credit card encryption method and device, applied to generate a QR (quick response) code according to a voice password recorded by a card owner and information of a payment account so as to encrypt an information card. The method includes: generating the QR code; sampling the voice password recorded by the card owner, and extracting a sampling point, and acquiring a feature value of the sampling point; according to the feature value of the sampling point and the information of the payment account, reserving the QR code in a payment terminal. The existing traditional password-signature payment mode of the credit card is changed, and greater convenience, safety and reliability is achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a credit card encryption method and device. Background technique [0002] With the development of society, the credit card business of banks continues to develop, and credit cards are more and more widely used in people's lives. According to the common practice of international banks, when consumers use their credit cards, they use their own signatures as evidence to confirm the consumption, and banks and merchants also use this signature as a basis for settlement. At present, in order to ensure the consumption safety of credit cards, most of them adopt the method of signing and adding passwords. However, these methods all have potential safety hazards. For example, only the signature method is used, and the merchant does not carefully check whether the signature matches the handwriting reserved on the credit card. When the credit card is lost, it is easy to imitate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/34G06Q20/40G06F21/32G06K7/10
Inventor 王兰莎
Owner TVMINING BEIJING MEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products