Certification pattern determination method and payment method using same

A payment method and pattern technology, applied in the payment system, payment system structure, user identity/authority verification, etc., can solve security weaknesses, interception and other problems

Inactive Publication Date: 2017-10-13
李显鉐
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using services such as NATE ON, you can view text messages on your mobile phone on your personal computer (PC). If your personal computer is attacked by hackers, the SMS verification code will be intercepted and may be maliciously paid by a third party. , so there is a weakness in security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certification pattern determination method and payment method using same
  • Certification pattern determination method and payment method using same
  • Certification pattern determination method and payment method using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Hereinafter, preferred embodiments of the present invention will be described with reference to the drawings. In the following description, the order of description of the flow charts should be construed as non-limiting, except for the case where a preceding step should be a theoretically preceding, necessarily preceding step of a subsequent step. That is, it should not be interpreted as excluding the possibility that subsequent steps are performed before preceding steps.

[0021] figure 1 Shown are the server 10 and the user terminal 20 and their internal operations under the environment in which the present invention is executed. figure 1 The content contained in the image 11 may vary according to the action. refer to figure 2 , the verification pattern storage method of the present invention will be described.

[0022] Before executing the present invention, the user sets the application software on the user terminal 20 that can perform the verification pattern ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A certification pattern storage method according to the present invention comprises: (1) a first step of receiving, by a user terminal, an image including a random number table which is encoded into a one-time key generated on the basis of first information and sent by a server; (2) a second step of generating, by the user terminal, the one-time key on the basis of the first information and decoding the encoded image; (3) a third step of receiving, by the user terminal, characters arranged according to a predetermined pattern in the random number table; and (4) a fourth step of sending, by the user terminal, the pattern determined by means of the inputted characters to the server, and storing the pattern in the server.

Description

technical field [0001] The present invention relates to a method for determining a verification pattern and a payment method using the method. Background technique [0002] The process of purchasing goods or services and making payment online in online shopping malls is actually all carried out online, rather than face-to-face payment, so it needs to go through the process of verifying whether it is a normal payment. [0003] As an example of such verification, there is a verification method by inputting a text message (SMS) verification code disclosed in Korean Patent Application Publication No. 10-2009-0091051 published on August 26, 2009. Using services such as NATE ON, you can view text messages on your mobile phone on your personal computer (PC). If your personal computer is attacked by hackers, the SMS verification code will be intercepted and may be maliciously paid by a third party. , so there is a weakness in security. Contents of the invention [0004] problem ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40H04L9/32
CPCG06Q20/40G06Q20/401H04L9/32H04L9/3226G06Q20/20G06Q20/3223G06Q20/389G06Q20/4012G06Q20/4014G07F7/1041H04L9/0863H04L9/0869H04L9/0872G06F3/04886H04L9/0861H04L9/3228H04L2209/56H04L63/067G06Q20/385
Inventor 李显鉐
Owner 李显鉐
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products