Unlock instant, AI-driven research and patent intelligence for your innovation.

Distribution of payment marks and its safe payment method, system and device

A secure payment and marking technology, applied in the field of information security, to achieve the effect of ensuring payment security

Active Publication Date: 2021-01-26
FEITIAN TECHNOLOGIES
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect users' sensitive information, improve payment security, and prevent information leakage and fraudulent transactions, the industry currently adopts data encryption, regular system penetration testing, end-to-end encryption and other protection methods, but there are certain limitations and cannot be completely solved. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distribution of payment marks and its safe payment method, system and device
  • Distribution of payment marks and its safe payment method, system and device
  • Distribution of payment marks and its safe payment method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Embodiment 1 of the present invention provides a distribution of payment tokens and a secure payment method thereof;

[0073] Among them, the distribution method of the payment mark includes:

[0074] Step 101: The payment token management server receives the payment token application request from the client, generates a payment token according to the received payment token application request, converts the payment account number in the payment token application request and saves it correspondingly to the generated payment token, and stores The generated payment token is sent to the client;

[0075] Step 102: the client binds the received payment token with the user terminal, and saves the payment token in the user terminal;

[0076] Payment Token Secure payment methods, including:

[0077] Step 103: The merchant payment terminal organizes the first payment request according to the received payment token from the user terminal, and sends the first payment request to t...

Embodiment 2

[0095] Embodiment 2 of the present invention provides a method for distributing payment tokens; in the present invention, the client must register with the payment token management server, and the payment token management server collects information provided by the client (such as domain control elements of payment tokens, etc.), And after the client registers successfully, assign a unique identifier (hereinafter referred to as: client identifier) ​​to the client, and the payment mark management server will collect the information provided by the client and other transaction control strategies agreed during the client registration process ( For example: payment amount, etc.) and the unique client identifier are stored in the tag library correspondingly.

[0096] Specifically, such as figure 1 shown, including:

[0097] Step 201: The client waits for and receives the account information and device information submitted by the user, saves the device information, generates a pay...

Embodiment 3

[0157] Embodiment 3 of the present invention provides a secure payment method for a payment token, which is applied to a payment system composed of a merchant payment terminal, an acquiring server, and a payment token management server;

[0158] When the user submits the transaction data to be paid (hereinafter referred to as "transaction data"), and the merchant's payment terminal receives the payment mark and the auxiliary information of the payment mark from the user terminal held by the user through the NFC function or by scanning the QR code (Payment Token Expiry Date, Client ID, etc.) After that, if figure 2 shown, do the following:

[0159] Step 301: The merchant's payment terminal generates a first payment request according to the received payment token, the validity period of the payment token, the client identifier, and the current payment domain control elements and transaction data, and sends the first payment request to the acquiring server;

[0160] For example...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, system and device for distributing payment tokens and its safe payment, and relates to the field of information security. The method includes: the payment token management server generates the payment token according to the received payment token application request from the client and sends it to the client; the client binds the received payment token to the user terminal, and saves the payment token to the user In the terminal; the merchant payment terminal organizes the first payment request according to the payment token received from the user terminal, and sends the first payment request to the payment token management server through the acquiring server; the payment token management server sends the payment in the first payment request Restore the mark to get the corresponding payment account number, organize the second payment request according to the obtained payment account number and return it to the acquiring server; the acquiring server performs the collection operation according to the payment account number in the received second payment request, generates a payment response and returns To the merchant payment terminal.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method, system and device for distributing payment marks and its safe payment. Background technique [0002] While mobile payment brings convenience to users, it also brings new challenges and opportunities to the payment industry. More and more criminals regard payment card information as the target of attack, and leaks of sensitive information such as user account information have occurred one after another. In order to protect users' sensitive information, improve payment security, and prevent information leakage and fraudulent transactions, the industry currently adopts data encryption, regular system penetration testing, end-to-end encryption and other protection methods, but there are certain limitations and cannot be completely solved. question. Contents of the invention [0003] In order to solve the deficiencies of the prior art, the present invention pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/40G06Q20/32
CPCG06Q20/3274G06Q20/3278G06Q20/382G06Q20/401G06Q20/4016
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES