Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile payment security protection method, mobile payment security protection device and cloud server

A mobile payment and security technology, applied in the payment system, payment system structure, equipment, etc., can solve problems such as user loss, user privacy, traffic, phone bill theft, poor protection, etc.

Active Publication Date: 2014-11-05
北京奇付通科技有限公司
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In terms of mobile terminals, some counterfeit clients pretend to be genuine payment clients, or some Trojan horses and virus programs are repackaged to payment clients, resulting in low security of payment clients on mobile terminals. Poor protection against malicious attacks such as viruses and Trojan horses, which in turn makes user privacy, traffic, phone charges, etc. stolen, causing serious losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile payment security protection method, mobile payment security protection device and cloud server
  • Mobile payment security protection method, mobile payment security protection device and cloud server
  • Mobile payment security protection method, mobile payment security protection device and cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0128] image 3 It shows another flow chart of the mobile payment security protection method at the mobile terminal side according to an embodiment of the present invention. In this embodiment, the similarity of the icons is used to effectively identify the counterfeit clients that counterfeit the names of genuine payment clients and highly emulate the icons of genuine payment clients, and deal with them in a timely manner. like image 3 As shown, the method includes the following steps S302 to S316.

[0129] Step S302, when an event of starting the payment client of the mobile terminal is detected, acquire the name and icon of the payment client.

[0130] Step S304, searching for the icon corresponding to the obtained name in the white list through the pre-established name index.

[0131] Step S306, calculating the similarity between the acquired icon and the icon found in the white list.

[0132] Step S308, judging whether the similarity calculated in step S306 is greate...

Embodiment 2

[0140] Figure 4 A third flow chart of a method for protecting mobile payment security at the mobile terminal side according to an embodiment of the present invention is shown. In this embodiment, the signature information is used to effectively identify the payment client whose name remains unchanged but whose signature is changed and which has been packaged with a Trojan horse or a virus program twice, and handle it in a timely manner. like Figure 4 As shown, the method includes the following steps S402 to S414.

[0141] Step S402, when an event of installing a payment client on a mobile terminal is detected, acquire the name and signature of the payment client.

[0142] Step S404, searching for the signature corresponding to the obtained name in the white list through the name index established in advance.

[0143] Step S406, judging whether the acquired signature is the same as the signature found in the whitelist, if yes, proceed to step S408; otherwise, proceed to st...

Embodiment 3

[0150] Figure 5 A flow chart of a mobile payment security protection method combining a mobile terminal and a cloud server according to an embodiment of the present invention is shown. As shown in 5, the method includes the following steps S502 to S518.

[0151] Step S502, when an event of starting the payment client of the mobile terminal is detected, obtain the package name, MD5 and SHA1 of the payment client.

[0152] Step S504 , sending an inquiry request to the cloud server for inquiring whether the payment client is a malicious client, wherein the inquiry request carries the package name, MD5 and SHA1 of the payment client.

[0153] Step S506, the cloud server receives an inquiry request from the mobile terminal to inquire whether the payment client of the mobile terminal is a malicious client, and the inquiry request carries the package name, MD5 and SHA1 of the payment client.

[0154] Step S508, the cloud server finds the MD5 and SHA1 corresponding to the obtained ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile payment security protection method, a mobile payment security protection device and a cloud server. The method comprises the following steps that: when a trigger event of a mobile terminal payment type client is monitored, the feature information of the payment type client is obtained, wherein the feature information refers to a unique identify label of the payment type client; the obtained feature information is matched with the feature information preset in a white list, and a matching result is obtained, wherein the white list comprises the feature information of the mobile terminal payment type client capable of securely completing payment type operation; whether the payment type client is a malicious client or not is judged according to the matching result; and the payment type client is processed according to the judging result. The technical scheme provided by the invention has the advantages that the security of the payment type client on a mobile terminal can be improved, and the protection performance on hostile attack of viruses, Trojan horses and the like is enhanced, so that a secure and clean mobile pavement environment is provided for users.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a mobile payment security protection method, device and cloud server. Background technique [0002] Mobile payment refers to a service method that allows users to use their mobile terminals (such as mobile phones, etc.) to pay for the goods or services they consume. Users send payment instructions directly or indirectly to banking financial institutions through mobile terminals, the Internet or proximity sensing to generate currency payment and fund transfer behaviors, thereby realizing the mobile payment function. With the rapid development of mobile e-commerce, third-party payment, banks, etc. are scrambling to launch mobile payment clients, and transaction clients such as shopping, wealth management, and life services are also emerging, which greatly enriches the market application environment of mobile payment. [0003] The security of mobile payment is a key factor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38
CPCG06Q20/382
Inventor 孟齐源路轶李常坤
Owner 北京奇付通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products