Secure electronic payment method based on four parties

An electronic payment and four-way technology, applied in the payment system, payment system structure, logistics, etc., can solve problems such as repeated identity authentication, low algorithm efficiency, and inability to guarantee the atomicity of commodities

Inactive Publication Date: 2016-10-26
GUANGDONG UNIV OF TECH
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the research found that the protocol also has some shortcomings. For example, Shen Zhihao, Brilek S and others found that the efficiency of the protocol algorithm is low, and the parties to the transaction need to perform identity authentication repeatedly (Brlek S, Hamadou S, Mullis J.A flaw in the electronic commerce protocol SET[J] .Information Processing Letters,2006,97(3):104-108), (Shen Z H, Wang H.An improved SET protocol payment system[C] / / Proc.ofInternational Conf.on Computer and Communication Technologie in AgricultureEngineering.Chengdu, China, June 2010:400-403); Zhang Ruoyan found that the protocol is for western credit card payment, but most people in China use debit cards, so it cannot meet the needs of the domestic market well (Zhang Ruoyan. Mobile payment system based on SET protocol Research and implementation of [D]. Northwest University, 2008); Yan Tingting found that the agreement cannot guarantee the atomicity of goods that must be met in online payment (Yan Tingting. Research on the unified payment platform and its protocol based on fourth-party e-commerce [D]. South China University of Technology, 2012); Ren Lili and others ensured the atomicity principle of electronic transactions by adding a payment gateway as a trusted third party to supervise the data flow of all parties to the transaction, but there is no reasonable principle for dispute resolution ( Ren Lili, Wang Chengjun, Fang Yuankang.Application Research of SET Protocol in Online Payment[J].Computer Application and Software,2010,27(10):105-107)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure electronic payment method based on four parties
  • Secure electronic payment method based on four parties
  • Secure electronic payment method based on four parties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Firstly, the meaning of the symbols used in the protocol is given, as shown in Table 2.

[0011] Table 2 Description of protocol symbols

[0012]

[0013]

[0014] ① Payment Agreement Master Agreement Description

[0015] In this agreement, the participants are customer C, merchant M, payment institution P and the fourth party W. The main agreement process of the payment agreement is as follows: figure 1 shown. The detailed process of numbering in the figure is as follows:

[0016] (1) C→M: {(OI′||CerC)}[OI′=D IVC (OI)]

[0017] Customer C browses the products sold by merchant M, agrees to the quotation, and digitally signs the order OI: OI′=D RKC (OI). Merge OI' and client certificate message: OI'||CerC, and send the merged message to merchant M.

[0018] (2) M→C: {Y}[E PKC (OI')=OI, OI"=D RKM (OI'),OI"=D PKW (OI″),

[0019] y=D SKM (Num||CerP||CerM||CerW||Pay||OI″′)

[0020] Merchant M decrypts after receiving OI': E PKC (OI')=OI, confirm that the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of secure electronic payment, in particular to a secure electronic payment method based on four parties for an SET protocol. The electronic commerce payment refers to the activity of sending data to a bank to realize electronic payment in a secure manner by adopting a novel payment means, including a credit card, a debit card, an intelligent card and the like, among a consumer, a merchant and a financial institution, and is the core of realizing electronic commerce. The establishment of an SET-protocol-based secure electronic payment protocol which satisfies atomic transaction and comprises dispute handling rules is crucial. According to the secure electronic payment method, participants of the secure electronic payment protocol based on four parties include a client, a merchant, a payment institution and a fourth party; and in the secure electronic payment protocol, 3 dispute handling protocols are designed in consideration of possible dispute cases in transactions on the basis of a principle protocol of an electronic commerce payment protocol, and the 3 dispute handling protocols are a goods returning protocol when the client requires goods returning, a goods exchange protocol when the client requires goods exchange, and a dispute handling protocol when the goods received by the client is inconsistent with that of a client order.

Description

technical field [0001] The invention relates to the field of secure electronic payment, in particular to a four-party-based secure electronic payment method aiming at the SET protocol. Background technique [0002] E-commerce payment refers to the use of new payment means between consumers, merchants and financial institutions, including credit cards, debit cards, smart cards, etc., to be sent to banks through secure means to realize electronic payment, which is the core of realizing e-commerce. Secure Electronic Transaction Protocol SET (Secure Electronic Transaction) is an electronic payment model launched in June 1997 by Master Card and Visa in conjunction with Microsoft and other companies. Since SET provides mutual authentication between customers, merchants and banks, and adopts data encryption, digital signature and other technologies to ensure data authentication, confidentiality, integrity and non-repudiation, the protocol has been widely used. . The technical mea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/08G06Q20/40G06Q30/00G06Q10/08
CPCG06Q20/0855G06Q10/083G06Q20/4012G06Q20/4037G06Q30/016
Inventor 柳毅秦靖辉凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products