Timestamp-based transaction verification method

A verification method and timestamp technology, applied in the field of timestamp-based transaction verification, can solve problems such as issuer loss and lack of issuer verification, and achieve the effect of preventing forged transaction orders and improving security and effectiveness.

Active Publication Date: 2017-10-27
广州羊城通有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Payment verification requires safety and effectiveness. At present, most of the verification methods use the unilateral verification method of the operator, lacking the verification of the issuer, and the operator's falsified transaction will cause the issuer to suffer losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Timestamp-based transaction verification method
  • Timestamp-based transaction verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] Such as figure 1 As shown, the present invention proposes a timestamp-based transaction verification method to realize double verification of the operator and the issuer. The method includes the following steps:

[0019] 1), the system is initialized, the issuer obtains the system clock from the operator to complete time synchronization, the operator generates the operator's timestamp master key, and the issuer generates the issuer's timestamp master key;

[0020] 2) The operator's timestamp sub-key distributed by the operator's timestamp master key is issued to the issuer, and the user obtains the distribution of the operator's timestamp sub-key and the issuer's timestamp master key from the issuer party timestamp subkey;

[0021] 3) During the transaction, the user completes the operation and submits the order to the operator, and the order ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a timestamp-based transaction verification method. The method comprises the steps that a system is initialized, an issuer acquires a system clock from an operator to complete time synchronization, the operator generates an operator timestamp main key, and the issuer generates an issuer timestamp main key; operator timestamp sub-keys obtained after dispersion of the operator timestamp main key are released to the issuer, and a user acquires the operator timestamp sub-keys from the issuer and issuer timestamp sub-keys obtained after dispersion of the issuer timestamp main key; in the transaction process, the user performs operation to complete an order and submits the order to the operator, the order is dually encrypted with the operator timestamp sub-keys and the account issuer timestamp sub-keys; the operator verifies the order through the operator timestamp main key, and the order is submitted to the issuer after passing the verification; and the issuer verifies the order through an issuer timestamp, and payment is completed if the order passes the verification. Through the method, dual verification can be realized, and therefore the security and validity of payment verification are further improved.

Description

technical field [0001] The invention relates to the technical field of transaction verification, in particular to a transaction verification method based on time stamps. Background technique [0002] With the development of mobile payment methods, higher requirements are put forward for payment verification. Payment verification requires safety and effectiveness. At present, most of the verification methods use the unilateral verification method of the operator, lacking the verification of the issuer, and the operator's falsified transaction will cause the issuer to suffer losses. Contents of the invention [0003] Aiming at the above problems, the present invention proposes a transaction verification method based on time stamps, which adopts a dual time stamp mechanism, wherein one time stamp key is controlled by the terminal operator to prevent copying and retransmission, and the other is controlled by the account issuer , used to prevent the terminal operator from forg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40H04L9/08H04L9/32
CPCG06Q20/3829G06Q20/401H04L9/0819H04L9/3297
Inventor 谢振东苏浩伟陈欢温晓丽袁勇邹大毕陈君郭峰宋秉麟
Owner 广州羊城通有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products