Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing secured electronic charging

An electronic payment and security technology, applied in payment architecture, instruments, data processing applications, etc., can solve the problems of being stolen and lost, and achieve the effect of increasing security and easy operation

Inactive Publication Date: 2008-11-19
祁勇
View PDF1 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, during the identification process of transaction card users, the encrypted link must ensure that no third party can eavesdrop or steal the card number or password; second, the generated anonymous card number already has the function of electronic money , therefore, there is a risk of loss and theft when the anonymous card number is transmitted between the bank server and the payer, the payer and the merchant, and the merchant and the bank server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing secured electronic charging
  • Method for implementing secured electronic charging
  • Method for implementing secured electronic charging

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Such as figure 1 It is a flow chart of an embodiment of transfer based on the second transaction code;

[0082] In the payment platform, store the payer identification code and the payer verification code and establish an association between them;

[0083] When the payer makes payment to the payee, the following steps are included:

[0084] 1. On the payment platform, receive a signal from the first terminal of the payer, including the payer identification code, password, payee identification code and payment amount;

[0085] 2. In the payment platform, generate the first transaction code for the payment; and store the association between the payer identification code and the first transaction code;

[0086] 3. In the payment platform, send the first transaction code to the first terminal of the payer or the second terminal of the payer;

[0087] 3a. If the payment platform sends the first transaction code to the first terminal of the payer, then input the first tran...

Embodiment 2

[0093] Such as figure 2 It is a flow chart of the transfer embodiment based on the first transaction code and the payer verification code;

[0094] In the payment platform, store the payer identification code and the payer verification code and establish an association between them;

[0095] When the payer makes payment to the payee, the following steps are included:

[0096] 1. On the payment platform, receive a signal from the first terminal of the payer, including the payer identification code, password, payee identification code and payment amount;

[0097] 2. In the payment platform, generate the first transaction code for the payment; store the association between the payer identification code and the first transaction code;

[0098] 3. In the payment platform, send the first transaction code to the first terminal of the payer or the second terminal of the payer;

[0099] 3a. If the payment platform sends the first transaction code to the first terminal of the payer,...

Embodiment 3

[0105] image 3 It is a flow chart of an embodiment of a payment method based on the second transaction code with the participation of merchants;

[0106] In the payment platform, store the payer identification code and the payer verification code and establish an association between them;

[0107] 1. On the payment platform, receive a signal from the first terminal of the payer, including the payer identification code, password, payee identification code and payment amount;

[0108] 2. In the payment platform, generate the first transaction code for the payment; store the association between the payer identification code and the first transaction code;

[0109] 3. In the payment platform, send the first transaction code to the first terminal of the payer or the second terminal of the payer;

[0110] 3a. If the payment platform sends the first transaction code to the first terminal of the payer, you need to input the first transaction code into the second terminal of the pay...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing secure electronic payment. First of all, after the user information of the payer is received and identified in a payment platform and verified, the payment platform generates a first transaction code for the payment; then, the payment platform sends the first transaction code to the payer terminal; finally, the payer uses a payer verification code and the first transaction code to approve the transaction, or the payer uses a second transaction code to approve the transaction, wherein, the second transaction code is generated by the payer verification code and the first transaction code through operation. The method can be widely used in the e-commerce field.

Description

technical field [0001] The invention relates to the field of electronic payment, in particular to a method for online safe payment. Background technique [0002] In recent years, e-commerce has gradually become the mainstream of Internet development, and online shopping and payment have gradually become a fashionable way of life. However, while online shopping and payment bring convenience to consumers, they also bring new security risks. Since transaction data needs to be transmitted on the Internet, and the Internet is an open network, transaction data is easily intercepted, stolen and changed. [0003] In the prior art, online payment often needs to use the payer's bank account number as the payment credential. Therefore, the transfer of the bank account number between the payer, the payee and the bank server is inevitable. This increases the possibility of the payer's account information being maliciously used by others during transmission and storage, and increases co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/00G06Q20/42
Inventor 祁勇
Owner 祁勇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products