Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety transaction method and system based on policy identity

A secure transaction and identification technology, applied in the field of mobile transactions and information security, can solve the problems of insufficient security, NFC transaction technology is easy to be stolen, inconvenient operation, etc., and achieve the effect of preventing counterfeiting

Pending Publication Date: 2018-09-14
咪付(广西)网络技术有限公司
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a security transaction method and system based on policy identification to solve the problems of NFC transaction technology and its tokenization technology in the prior art, which are easy to be stolen, not high enough in security, and inconvenient to operate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety transaction method and system based on policy identity
  • Safety transaction method and system based on policy identity
  • Safety transaction method and system based on policy identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with the accompanying drawings and embodiments, but the protection scope of the present invention is not limited to the following specific embodiments.

[0032] In this embodiment, in order to further clearly understand the technical solution of this embodiment, the following takes a subway station as an example to provide a specific transaction process of a secure transaction method based on the policy identification. Whether it is mileage billing or one-ticket billing, the technical solution of this embodiment can be applied. In this specific implementation, the wireless data transmission device 10 is mapped to a mobile phone, and the wireless data transmission device 20 is mapped to be installed in a gate The BLE device in the machine, the transaction registration device is mapped to an entry gate, the transaction settlement device is mapped to an outbound gate, the security server 30 is mapped to a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a safety transaction method and system based on policy identity. The method comprises the steps that: a wireless data transmission device 10 accesses a safety server toobtain Token, transaction documents and police identity; a wireless data transmission device 20 performs encryption and broadcast of information of a transaction device; the wireless data transmissiondevice 10 performs scanning to obtain a data packet, decodes the Token to obtain a secret key Key1 and perform decoding verification of the broadcasted data packet through adoption of the Key1; afterverification is passed, the wireless data transmission device 10 performs encryption of data formed by the transaction documents, the police identity and the information of the transaction device byemploying the secret key Key1, modulate ciphertext to wireless orienteering data and send the wireless orienteering data to the wireless data transmission device 20; and the wireless data transmissiondevice 20 receives the wireless orienteering data, then calculate a secret key Key2 to perform decoding verification of the ciphertext, perform decoding verification of the transaction documents after the verification is passed, and performs transaction processing logic after the verification is passed. The safety transaction method and system based on policy identity achieves wireless both-way identity verification of the safety transaction data so as to avoid that the transaction documents are counterfeited and the fun is stolen and improve the safety.

Description

technical field [0001] The invention belongs to the field of mobile transactions and information security, and in particular relates to a method and system for secure transactions based on policy identification. Background technique [0002] In today's daily life, UnionPay Cloud QuickPass, ApplePay and SamsungPay are typical standard NFC technology solutions. Smart terminals with NFC transaction modules can be used as bank cards to realize POS machine swiping, recharging bus cards, paying fees, and balance inquiries. You can complete the transaction without entering the transaction password, as long as you are close to the receiving device. However, since the NFC transmission range is only within 0.1m, which is smaller than other wireless transmission technologies including but not limited to Bluetooth technology, it cannot meet the transaction needs of users whose distance exceeds 0.1m; The terminal is placed close to or near the NFC card reader, and the user cannot view t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/32G06Q20/38G06Q20/40
CPCG06Q20/327G06Q20/3821G06Q20/3829G06Q20/4014
Inventor 代豪梁安宁黄紫丞梁景策
Owner 咪付(广西)网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products