Unlock instant, AI-driven research and patent intelligence for your innovation.

Payment verification method and device and electronic equipment

A verification method and technology of electronic equipment, applied in the direction of payment system structure, cooperating devices, instruments, etc., can solve the problems of copying and use, user account theft, stealing two-dimensional code information, etc., to improve security and avoid malicious The effect of stealing and tampering

Inactive Publication Date: 2019-06-21
广州佳都数据服务有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Two-dimensional code payment is divided into online payment and offline payment. Generally, offline payment mainly occurs in the scene of taking a bus or subway. Because the physical location keeps moving and is below the surface, the network signal is not smooth. Offline processing solves the problem of receiving terminals. Network conditions are required, but because the verification stage is offline, each electronic device is directly irrelevant, and it is easy for criminals to steal the QR code information and copy it, resulting in the user account being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Payment verification method and device and electronic equipment
  • Payment verification method and device and electronic equipment
  • Payment verification method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0024] It should be noted that like numerals and let...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a payment verification method and device and electronic equipment, and relates to the field of payment security, and the method comprises the steps: determining the acquired current time as two-dimensional code generation time; obtaining signature information according to a pre-stored user certificate, the two-dimensional code generation time and a pre-stored first secret key;and generating a current two-dimensional code according to the signature information, the user certificate and the two-dimensional code generation time. The two-dimensional code generation time is used for signing and generating the two-dimensional code, whether the two-dimensional code generation time is within effective time can be verified to prevent the two-dimensional code used by a user for payment from being copied and used, meanwhile, signature authentication is carried out to prevent the two-dimensional code from being maliciously stolen and tampered, and the safety of the user forpayment by using the two-dimensional code is improved.

Description

technical field [0001] The present invention relates to the field of payment security, in particular to a payment verification method, device and electronic equipment. Background technique [0002] A two-dimensional code is a set of black and white symbols distributed on a geometric plane according to a certain rule. Since the geometric figures correspond to the calculated data information, they can be automatically read by image input devices or photoelectric scanning devices to realize automatic processing of information. It has the advantages of carrying a large amount of data and being easy to identify. It is widely used in business cards, websites, WIFI passwords, website jumps, shopping orders, anti-counterfeiting inquiries, etc. Among them, it is most commonly used in payment. [0003] Two-dimensional code payment is divided into online payment and offline payment. Generally, offline payment mainly occurs in the scene of taking a bus or subway. Because the physical lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/32G06K17/00
Inventor 谭宁江卫周剑
Owner 广州佳都数据服务有限公司