Visual intelligent card and authentication and payment method based on visual intelligent card
A smart card and authentication information technology, applied in the field of visual smart cards, can solve the problems of lack of writing and authentication, inconvenient use, etc., and achieve the effect of complete functions and convenient use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] see figure 1 , the present invention provides a visual smart card, the visual smart card includes: a financial chip 1; a display processing system 2, the display processing system 2 includes a display module 21 and a writing processing module 22; the writing processing module 21 Connected to the financial chip 1, suitable for writing the authentication information (private key) required for information exchange when the financial chip 1 interacts with the outside world, and binding and encrypting the authentication information and operation information Send to the authentication system (not shown) to use the public key for authentication, and when the authentication is passed, the authentication passing information is fed back to the financial chip 1 to complete information interaction.
[0047] As an example, the financial chip 1 is a security chip with functions of one card and quick payment.
[0048] As an example, the authentication system may be, but not limited ...
Embodiment 2
[0060] Please combine Figure 1 to Figure 3 refer to Figure 4 , the present invention also provides an authentication payment method based on the visual smart card described in Embodiment 1, the authentication payment method comprising the following steps:
[0061] 1) Send an authentication request when the financial chip interacts with the outside world;
[0062] 2) writing authentication information required for information interaction in the writing processing module according to the authentication request;
[0063] 3) Binding and encrypting the authentication information and operation information and sending them to the authentication system for authentication;
[0064] 4) When the authentication is passed, the authentication pass information is fed back to the financial chip, and the financial chip completes the information interaction with the outside world.
[0065] As an example, in step 1), the financial chip 1 sends an authentication request to the display process...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


