CN101064033A - System and method for action payment - Google Patents
System and method for action payment Download PDFInfo
- Publication number
- CN101064033A CN101064033A CNA2006100781069A CN200610078106A CN101064033A CN 101064033 A CN101064033 A CN 101064033A CN A2006100781069 A CNA2006100781069 A CN A2006100781069A CN 200610078106 A CN200610078106 A CN 200610078106A CN 101064033 A CN101064033 A CN 101064033A
- Authority
- CN
- China
- Prior art keywords
- network
- client
- consumption client
- server
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
This invention relates to one movable payment mechanism, which provides service onto movable device for all trade type by network payment mechanism, wherein along with information technique development, people tends to use some novel types to buy any product and services; most service producer only provide cash or credit card payment which will not satisfy the current market needs.
Description
Technical field
The present invention relates to a kind of transaction method and system, especially a kind of method of commerce and system that is applied to running gear.
Background technology
Paper (Mi-Ae Kim Han-Ki Lee Seong-Whan KimWon-Hyoung Lee at Kim, " Implementation of anonymity-basede-payment system for M-commerce ", Eung-Kwan Kang Dept.of Image Eng., Chung-Ang Univ., Seoul, South Korea) reality that proposes a kind of action payment mechanism system in conjunction with e-Payment in is made method.Here the e-Payment system that is mentioned is a kind of system that wants advance payment.First figure describes the transaction transmitting step that Kim proposes, and its code name of the step that the following describes conforms to step code name during Fig. 1 marks.
Illustrate:
Transmit h (T by businessman; Value); Value gives consumer (Consumer), and wherein T is the transaction sequence number, and value is for needing the amount of money of payment, and h () is a hash function, "; " for linking character string (shown in step 100).
Transmit C_ID by the consumer; PassWord; H (T; Value); Value gives e-Payment, and wherein C_ID is consumer's a customer identification, and PassWord is a trading password.And must see through a secured channels and send Password to e-Payment (mode that proposes is to adopt the mode of WTLS to transmit) (shown in step 120) in this paper.
Transmit B_ID by e-Payment; { h (T; Value) SKB} gives the consumer, wherein with { h (T; Value) SKB} represents e-Cash.B_ID is the customer identification of e-Payment.SKB is the private key of e-Payment, hands over volume to carry out digital signature (shown in step 130) with the private key of e-Payment so e-Cash is the transaction that businessman sent here in fact.
The consumer transmits T; B_ID; { h (T; Value) SKB} gives businessman, and businessman also uses the PKI of e-Payment to verify whether e-Cash is effective, and checks whether the T that sends back was for reusing (shown in step 140).
Businessman transmits V_ID; { h (T; Value) SKB} gives e-Payment to convert back the amount of money, and e-Payment finds out previous storage record then, and payment businessman fund.Wherein V_ID is the customer identification (shown in step 150) of businessman.
This system can reach with following points:
Anonymity and confidentiality are provided: and the neither personal information that uses of all data transmissions between businessman.
Possesses the function that prevents double-spending and forgery: see through the repeated use that the transaction sequence number is avoided e-Cash.
There is not complicated a large amount of calculating in action on the device.
Third party can't counterfeit e-Cash (because correct private key must be arranged) arbitrarily for other.
Yet following point may take place in this system when actual operation:
Most of running gear is not supported the transmission mode of WTLS (Wireless TransportLayer Security).
Transmitting C_ID; PassWord; H (T; Value); When value gives e-Payment, may take place to suffer the malice third party to revise herein value value, cause two Value inconsistent.
Businessman need possess enough hardware resources and could verify and those e-Cash of safe storage, so be necessary for fixedly businessman.
Most of running gear does not possess the ability with contiguous (Proximity) device talk, and the data sending and receiving between businessman and consumer but may spend the plenty of time.
Summary of the invention
In above-mentioned background of invention, in order to meet the demand of some interests on the industry, the invention provides a kind of method and system of online trading, the target that it can fail to reach in order to the method and system that solves above-mentioned traditional online trading.
A kind of online trading method of the present invention is characterized in that, comprises:
Import a Transaction Information to consumption client, this consumption client transmits and receives via a network and a server-side;
This consumption client transmits a transaction code by this network;
This server-side is received by this network and verifies this transaction code producing a transaction sequence number, and transmits this transaction sequence number by this network;
This consumption client is received this transaction sequence number and is encrypted this Transaction Information to produce a ciphertext by this network;
This consumption client transmits this transaction sequence number and this ciphertext by this network; And
This server-side receives this transaction sequence number and this ciphertext by this network, and deciphers this ciphertext to carry out one first trading function.
The corresponding account of wherein above-mentioned consumption client, this first trading function is to another account by the pairing account's account transfer of this consumption client.
Wherein also comprise:
This server-side responds this consumption client one password by this network, and wherein this server-side is carried out this first trading function and produced this password;
One businessman's client transmits this password by this network; And
This server-side receives this password to carry out one second trading function by this network.
Wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this second trading function are to the pairing account of this businessman's client by the pairing account's account transfer of this consumption client.
Wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this first trading function is by the pairing account of this consumption client amount of money of withholding, and this second trading function is to the pairing account of this businessman's client with this amount of money account transfer.
Wherein above-mentioned businessman's client is another consumption client.
Wherein above-mentioned consumption client is an action communication device, and this action communication device is to connect this network with a communications protocol, and this network is to be selected from GSM, GPRS, 3G, Wireless LAN, WiMax, PHS.
Wherein also comprise this consumption client and downloaded by this server-side and a software is installed, this software comprises at least one this transaction code, and wherein this consumption client is with this software this server-side to be transmitted and receives after this software installation.
Wherein also comprise:
This software is with a public key encryption one first close speech, and transmits this first close speech by this network, and wherein this software comprises this PKI when being downloaded;
This server-side receives this first close speech and encrypts one second close speech with this first close speech, and transmits this second close speech by this network; And
This software receives this second close speech, and the data that wherein transmit between this consumption client and this server-side and receive are to carry out encrypt and decrypt with this first close speech and this second close speech.
A kind of on-line trade system of the present invention is characterized in that, comprises:
One consumption client, this consumption client transmits and receives via a network and a server-side, and this consumption client has following function:
Accept the input of a Transaction Information;
Transmit a transaction code by this network; And
Receive a transaction sequence number and encrypt this Transaction Information producing a ciphertext by this network, and transmit this transaction sequence number and this ciphertext by this network; And
One server-side, this server-side has following function:
Receive and verify this transaction code producing a transaction sequence number by this network, and transmit this transaction sequence number by this network; And
Receive this transaction sequence number and this ciphertext by this network, and decipher this ciphertext to carry out one first trading function.
The corresponding account of wherein above-mentioned consumption client, this first trading function is to another account by the pairing account's account transfer of this consumption client.
Wherein above-mentioned server-side also has following function:
Respond this consumption client one password by this network, wherein this server-side is carried out this first trading function and is produced this password; And
Accept businessman's client by this network and transmit this password to carry out one second trading function.
Wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this second trading function are to the pairing account of this businessman's client by the pairing account's account transfer of this consumption client.
Wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this first trading function is by the pairing account of this consumption client amount of money of withholding, and this second trading function is to the pairing account of this businessman's client with this amount of money account transfer.
Wherein above-mentioned businessman's client is another consumption client.
Wherein above-mentioned consumption client is an action communication device, and this action communication device is to connect this network with a communications protocol, and this network is to be selected from GSM, GPRS, 3G, Wireless LAN, WiMax, PHS.
Wherein above-mentioned consumption client also has following function: download and install a software by this server-side, this software comprises at least one this transaction code, and wherein this consumption client is with this software this server-side to be transmitted and receives after this software is installed.
Wherein also comprise:
This consumption client has more following function:
Utilize this software with a public key encryption one first close speech, and transmit this first close speech by this network, wherein this software comprises this PKI when being downloaded; And
Utilize this software to receive this encrypted second close speech, and with this second encrypted close speech of this first close speech deciphering, to draw this second close speech; And
This server-side also has following function:
Receive this encrypted first close speech and with the deciphering of a private key of this PKI correspondence with must this first close speech; And
Utilize this first close speech to encrypt one second close speech, and transmit this second close speech by this network.
Description of drawings
For further specifying concrete technology contents of the present invention, below in conjunction with embodiment and accompanying drawing describes in detail as after, wherein:
Fig. 1 describes the transaction transmitting step that Kim proposes;
Fig. 2 describes the data transmission content and the step of convenient type Trading Model of the present invention; And
Fig. 3 describes the detailed content step of trust formula Trading Model of the present invention.
Embodiment
The method and system that the present invention is a kind of online trading in this direction of inquiring into.In order to understand the present invention up hill and dale, detailed step and composition thereof will be proposed in following description.Apparently, execution of the present invention is not defined in the specific details that skill person had the knack of of the method and system of online trading.On the other hand, well-known composition or step are not described in the details, with the restriction of avoiding causing the present invention unnecessary.Preferred embodiment meeting of the present invention is described in detail as follows, yet except these detailed descriptions, the present invention can also implement in other embodiments widely, and scope of the present invention do not limited, its with after claim be as the criterion.
The description of network payment mechanism e-Payment
Network payment mechanism of the present invention is called for short e-Payment, is the website that gathering, payment, account transfer and every financial service are provided on world-wide web.E-Payment of the present invention is account form (Account based), and any consumer or businessman can all can see through world-wide web and apply for adding the member to the website of e-Payment.Just the service that can use e-Payment to provide behind the member is provided.E-Payment of the present invention is Stored Value (prepaid) formula in advance, that is to say all member of the e-Payment amount of money that his account balance must be desired to pay greater than him before payment.All transaction funds (Transaction Amount) are all settled accounts (completion) (just note income (debit) or note expenditure (credit) immediately immediately) immediately when transaction.The service that e-Payment provided is as follows:
Simple with anonymous adding mode: application adds secret (Privacy) data of the member of e-Payment without any need for the individual, and the service that all e-Payment provided all only needs to use the member from name of account (Account ID) and the password ordered.
Gathering functions: use this function member can inquire the fund that all are received easily.
Payment function: use this function member to pay the bill easily to any one member.
The basic definition of action payment mechanism
The action payment mechanism of this research definition is as follows: the participant of two transaction can use running gear to carry out pecuniary exchange to obtain commodity or service.Other related definition is:
Running gear comprises: mobile phone, PDAs, wireless Tablet PCs and brain machine ... Deng wireless telecommunications system.
The transaction of an action payment has following four participators: consumer, businessman, e-Payment (financial institution) and telecommunications company.
Be applicable to that mainly micropayment is to middle denomination payment (for example: the amount of money is US$ 0.001-US$500).
Action payment mechanism of the present invention is to adopt wide area payment formula.And the data transmission of transaction can be divided into following two classes: the equipment that near-end transmission (Proximity Transfer) is adopted has infrared ray, blue bud, Bar Code, RFID and contactless modes such as chip.The equipment that wide-area transmission (Over The Air Transfer) adopts has wireless network (for example: 802.11), modes such as GPRS, 3G or SMS.
The definition of code name and parameter
Below table 1 and 2 are meanings of some code names in the explanation action payment mechanism proposed by the invention, the present invention then directly describes action payment mechanism proposed by the invention with code name in ensuing explanation.
The rule of all symbol definitions is:
" meaning role is other ", for example: the sequence number at random that SeqC produces for the consumer.
The expression mode of transmission data is:
" participator 1 " → " participator 2 "; " data item 1 of transmission "; " data item 2 of transmission " ...For example: on behalf of the consumer, C → E:TransactionNo transmit the transaction sequence number and gives e-Payment.
When the participator 1 of transaction produced identical one time key with participator's 2 desires, the hash function form that produces key was as follows:
H (" secret speech of the participator 1 "; " secret speech of the participator 2 "; " transaction sequence number "; " dynamic transaction code ").For example: H (SPC; SPE; TransactionNo; DTnoC[n]) be the hash function of generation one time key common between consumer and e-Payment.
The expression mode of encryption and decryption function is:
E " be used for encrypted secret key " (" desiring encrypted data 1 "; " desire encrypted data 2 "; " desire encrypted data 3 " ...).For example: ESPc (DtnoC; Tstamp) the secret speech that is to use of its meaning is that key is encrypted dynamic transaction code (DTnoC) and time stamp (Tstamp).
Form 1: the definition (1) of relevant code name
Project | Code name |
The transaction sequence number | TransactionNo |
The transaction total charge | Amount |
Transaction data | TransactionData |
Payment information | PaymentInfo |
Account information | AccountInfo |
The time stamp random number | Tstamp |
Transmit the PKI of secret speech | PuKeysp |
Decipher the private key of secret speech | PriKeysp |
Encrypt job function | Ekey(data) |
The deciphering job function | Dkey(Encrypted data) |
One time key | OneTimeKey |
Transaction processing result | Tresult |
The clearing password | CompletionPassword |
The factor of Chan Shenging at random | RandomSeqNo |
Up-to-date gathering data | LastestReceiveMoney |
The symbol of serial connection meaning | ; |
Produce the hash function of key | H( ) |
Form 2: the definition (2) of relevant code name
Title | The consumer | Businessman | e-Payment |
Code name | C | M | E |
Status code (not repeating) | IDC | IDM | |
Sequence number at random | SeqC | SeqM | SeqE |
Secret speech | SPC | SPM | SPE |
The dynamic transaction code | DTnoC | DTnoM | |
Receipts of transactions | TReceiptC | TReceiptM | |
The Trading Authorization password | TPWDC | TPWDM | |
Account balance information | AccountInfoC | AccountInfoM |
The reality that satisfies intercommunity explains
In the present invention in order to satisfy the key element of intercommunity (Interoperability), the present invention adopts the technology of J2ME to make application program on all running gears in fact.In other words just arbitrarily running gear just can use action payment mechanism proposed by the invention as long as support more than the MIDP1.0.The present invention must use the mode of HTTPConnection to set up that all are online.Then depend on the difference of each tame hardware unit and different to some extent as for the network on-line mode outside the HTTP.
In the part of near-end transmission (ProximityTransfer), wish to use the information of the technology of J2ME in following the present invention with the status authentication, change into several bar code figure with the coded system of Code128, read for the CCD formula barcode machine of businessman.
The reality that satisfies security (Security) explains
The present invention in the present invention proposes a kind ofly to be applicable to that the data transmission encipher-decipher method on the running gear transmits transaction data, detailed content such as following.
Have on the present invention accesses to your password and learns " unidirectional " (one-way) with resist " collision " safe hash function (Secure HashFunction) of characteristic such as (collision), when transaction, dynamically produce one group of one time key and encrypt transaction data, to guarantee safety.The present invention in the present invention adopts SHA-1 and two kinds of hash algorithms of MD5, is set at random by e-Payment when the consumer adds e-Payment.
The hash function form that produces one time key is as follows:
H(SecretPhrase1;SecretPhrase2;RandomSeqNo)=OneTimeKey。
SecretPhrase1: be secret speech of the participant 1 of transaction, produce at random by participant 1 running gear.
SecretPhrase2: the secret speech for e-Payment is produced at random by the e-Payment server.
RandomSeqNo: be a random number (can be one or more) at random, the key that is produced when allowing transaction is each neither identical and do not have a systematicness.
For example: H (SPC; SPE; TransactionNo; DTnoC) for being used for producing the hash function of identical one time key between consumer and e-Payment.
SPC: be consumer's secret speech, produce at random by consumer's running gear.
SPE: the secret speech for e-Payment is produced at random by the e-Payment server.
TransactionNo: be a random number at random, when transaction, produce at random by e-Payment and to send the consumer to.
DTnoC: be a dynamic transaction sequence number, this is a random number at random, is produced at random by e-Payment and sends consumer's be used to conclude the business code of interval scale consumer status to.
In the part of encryption and decryption mechanism, the present invention in the present invention specifies and adopts the AES cryptographic algorithm to come encryption and decryption transaction data (can use multiple symmetrical expression encryption and decryption mechanism simultaneously, be not limited to use the AES cryptographic algorithm).Part in golden key length, if hash function is to adopt the algorithm of SHA-1, the output valve of function is the key of 160bits (i.e. 20 characters), so the mode that it is 192bits with the golden key length of employing bout that the present invention will supply this key to 192bits is again carried out encryption and decryption.If adopt the MD5 algorithm, because the output valve of function is the key of 128bits (i.e. 16 characters), so just the present invention can directly adopt the bout gold key (Rounded key) of 128bits to carry out encryption and decryption.
Hash function the present invention except above-mentioned mode here also can adopt the hash function of tool cyclicity (Recursive), according to time, access times, transaction sequence number (TransactionNo) or dynamic transaction code.
Action payment mechanism of the present invention
In action payment mechanism of the present invention, before desiring to carry out any transaction, must satisfy following condition earlier:
Consumer or businessman all must be the members of e-Payment.
The necessary download transactions software of consumer is installed on the running gear.Next carry out the initialization operation of transaction software, allow consumer and e-Payment produce " secret speech (SP) " separately and intercourse (being specified in down)." secret speech " herein is to be used to guarantee that transaction data can safe transmission.After safe data transfer mode had been arranged, e-Payment just can transmit dynamic transaction code (DTno) and give the consumer, and the consumer must use the dynamic transaction code just can conclude the business.
Because what the present invention adopted is the mode of the encryption and decryption of symmetrical expression, thus the keeping of key with share very important.So the exchange of " secret speech " must be guaranteed as safe as a housely in mechanism of the present invention, so the present invention adopts is a unidirectional asymmetric encryption and decryption mode (for example: RSA or ECC) of only carrying out once, and conceptual illustration is as follows:
At first e-Payment can produce how right PKI (PuKeye-Payment[i]) and private key (PriKeye-Payment[i]) in advance, when consumer's download transactions software, just give the PuKeye-Payment[i of this consumer's key correspondence to the lining] be hidden in the transaction software, send the consumer in the lump to.
Next, the consumer is behind the SPC that produces oneself, earlier with PuKeye-Payment[i] the SPC encryption is sent to e-Payment again.
E-Payment receives after the ciphertext PriKeye-Payment[i with correspondence] deciphering, after e-Payment produced own SPE, then the SPC with the consumer was an AES symmetrical expression encrypted secret key, sent the consumer to after the SPE encryption with e-Payment.
So, the consumer just can deciphering obtains the SPE of e-Payment.
Do not describe the content of action payment mechanism initialization operation of the present invention herein in detail.In order to allow the easy operation of consumer's energy, the present invention proposes convenient formula and two kinds of trade modes of trust formula.
Convenient formula (Convenient) Trading Model
For the consumer can be operated easily, the present invention proposes convenient formula and the Trading Model of trusting formula.The meaning of convenient formula Trading Model is meant code name and the dealing money that the consumer installs in action only needs simply input businessman, just can pay the bill.Herein businessman to hold employed device can be running gear or general PC computing machine, and online GPRS, 3G, Wireless LAN etc. of adopting between e-Payment and consumer or businessman.This model is fit to be applied in the account transfer (payee is treated as businessman) between the account and pays rate ... Deng easy payment.Fig. 2 describes the data transmission content and the step of convenient type Trading Model, and its code name of the step that the following describes conforms to step code name among Fig. 2.
The consumer imports payment information in advance: the consumer can be input into (shown in step 210) on the running gear with transaction data and Payment Information in advance.
The consumer sends the code name (sending the dynamic transaction code to e-Payment) of identification status: at first carry out the customer identification operation after the consumer is by " payment ", the dynamic transaction code of downloading in advance can be sent to e-Payment (can cause attack if be combined in the 5th step) this moment.The information of sending is: C → E:DTnoC[i] (shown in step 220).
E-Payment is after confirming that the dynamic transaction code is errorless, passback transaction sequence number is given the consumer: after e-Payment receives data, find out DTnoC[i earlier] corresponding account and check whether its account balance can conclude the business, note this consumer information (to obtain the hash function of corresponding generation key) then, and producing a unduplicated transaction sequence number (TransactionNo) at random, the sequence number of will concluding the business then is returned to the consumer.(using the transaction sequence number in this side the present invention is for fear of heavily sending attack).The information of sending is: E → C:TransactionNo (shown in step 230).
After the consumer receives the transaction sequence number, the transaction data of desiring to send is encrypted: after the consumer receives the transaction sequence number, can produce earlier a sequence number (SeqC also can TransactionNo replaces SeqC) at random, carry out the hash function that produces key then: H (SPC; SPE; SeqC), so just can produce an one time key (OneTimeKey) that only is suitable for this transaction, and with this key encrypt (EoneTimeKey (DTnoC[i]; TransactionNo; PaymentInfo; Tstamp)) (shown in step 240).
To conclude the business sequence number and ciphertext of consumer is sent to e-Payment: carry out encrypt operation after, the consumer sends ciphertext to e-Payment.Also can't decrypting ciphertext even if can allow the assailant of other malice steal data transmission through such encryption mechanism.The information of sending is: C → E:TransactionNo; (SeqC); EoneTimeKey (DTnoC[i]; TransactionNo; TransactionData; PaymentInfo; Tstamp) (shown in step 250).
After e-Payment receives data, carry out decrypting ciphertext and handle the payment information and this transaction amount of money of in this consumer account, withholding: after e-Payment receives data, find out the consumer information and the hash function that produces key of previous record earlier by TransactionNo, produce the one time key (OneTimeKey) identical then with the consumer, the execution deciphering (DoneTimeKey (DTnoC[i]; TransactionNo; TransactionData; PaymentInfo; Tstamp)), just so can obtain payment information and comparison DTnoC[i], TransactionNo forges or heavily send to guarantee that data is non-, directly fund paid businessman's (shown in step 260) after errorless.
E-Payment is after handling transaction, and passback result and account balance situation are given the consumer: the information of sending is: E → C:TransactionNo; Tresult; AccountInfoC.(shown in step 270).
Businessman requires inquiry gathering information to e-Payment, (or can initiatively deliver to businessman): after the consumer finishes payment by e-Payment, businessman can require to inquire about up-to-date gathering data, this data can above-mentioned e-Payment and the consumer between cipher mode encrypt and transmit or transmit (the present invention here is not to be encrypted as example) with cipher mode not.The information of sending is: M → E:DTnoM[i] (shown in step 280).
E-Payment is after confirming that businessman's dynamic transaction code is errorless, and return up-to-date gathering information and give businessman: the information of sending is: E → M:LastestReceiveMoney; AccountInfoM (shown in step 290).
Trust formula (Trusted) Trading Model
Because convenient formula Trading Model may take place because step is simple to lose for the mistake of wrong object because of input error causes payment.So the present invention proposes to trust the formula Trading Model and addresses this problem.Though execution in step can be avoided artificial careless mistake than original many (only businessman's step increases, and consumer's execution in step remains unchanged), guarantees the security of concluding the business more.The meaning of this model is that the consumer installs only need input businessman's code name and dealing money in action, carries out the payment in advance operation; After treating that the e-Payment processing has been concluded the business, can return the clearing password and give the consumer.When the consumer really wants to pay the bill, only need the clearing password is offered businessman, businessman just can this password requires the fund of this transaction to e-Payment, and (before not carrying out this operation, this fund can be retained in the e-Payment place, do not pay away, the consumer can cancel the payment in advance operation at any time).Such model is fit to use in general consumption, because after the consumer can import dealing money and businessman's code name in advance, send e-Payment to and prepay operation, after e-Payment handles prepayment, can pass back and handle sequence number and settle accounts password to the consumer, provide the clearing password to businessman when the consumer gets goods again, businessman just can use the clearing password to require the fund of this transaction to e-Payment, and the consumer can cancel payment in advance at any time before this.Businessman uses the prerequisite of clearing password to be herein: the collector of this transaction must be identical with the executor of claim for payment.
Fig. 3 describes the detailed content step of trust formula Trading Model, and its code name of the step that the following describes conforms to step code name among Fig. 3.
Import Transaction Information in advance: can in advance transaction data and Payment Information be input into (shown in step 310) on the running gear.
The consumer sends the code name (sending the dynamic transaction code to e-Payment) of identification status: at first carry out the customer identification operation after the consumer is by " payment in advance ", can send the dynamic transaction code of downloading in advance to e-Payment this moment.The information of sending is: C → E:DTnoC[i] (shown in step 320).
E-Payment is after confirming that the dynamic transaction code is errorless, passback transaction sequence number is given the consumer: after e-Payment receives data, find out DTnoC[i earlier] corresponding account and check whether its account balance can conclude the business, note this consumer information (to obtain the hash function of corresponding generation key) then, and producing a unduplicated transaction sequence number (TransactionNo) at random, the sequence number of will concluding the business then is returned to consumer's (using the transaction sequence number in this side the present invention is for fear of heavily sending attack).The information of sending is: E → C:TransactionNo (shown in step 330).
After the consumer receives the transaction sequence number, the transaction data of desiring to send is encrypted: after the consumer receives the transaction sequence number, can produce earlier a sequence number (SeqC also can TransactionNo replaces SeqC) at random, carry out the hash function that produces key then: H (SPC; SPE; SeqC), so just can produce an one time key (OneTimeKey) that only is applicable to this transaction, and with this key encrypt (EoneTimeKey (DTnoC[i]; TransactionNo; PaymentInfo; Tstamp)) (shown in step 340).
To conclude the business sequence number and ciphertext of consumer is sent to e-Payment: carry out encrypt operation after, the consumer sends ciphertext to e-Payment.Also can't decrypting ciphertext even if can allow the assailant of other malice steal data transmission through such encryption mechanism.
The information of sending is: C → E:TransactionNo; (SeqC); EoneTimeKey (DTnoC[i]; TransactionNo; TransactionData; PaymentInfo; Tstamp) (shown in step 350).
After e-Payment receives data, carry out decrypting ciphertext and handle the payment information and this transaction amount of money of in this consumer account, withholding: after e-Payment receives data, find out the consumer information and the hash function that produces key of previous record earlier by TransactionNo, produce the one time key (OneTimeKey) identical then with the consumer, the execution deciphering (DoneTimeKey (DTnoC[i]; TransactionNo; TransactionData; PaymentInfo; Tstamp)), just so can obtain payment information and comparison DTnoC[i], TransactionNo forges or heavily send to guarantee that data is non-, directly fund paid businessman's (shown in step 360) after errorless.
E-Payment is after handling transaction, and passback result, clearing password and account balance situation are given the consumer: the information of sending is: E → C:TransactionNo; Tresult; CompletionPassword; AccountInfoC (shown in step 370).
Just will settle accounts password when the consumer pays the bill desire and offer businessman: can read in or the oral businessman of informing for businessman's barcode machine by action dress screen display bar code figure.The information of sending is: C → M:CompletionPassword (shown in step 380).
Businessman requires inquiry gathering information to e-Payment, (or can initiatively deliver to businessman): after the consumer finishes payment in advance by e-Payment, businessman can require to inquire about up-to-date gathering data, this data can above-mentioned e-Payment and the consumer between cipher mode encrypt and transmit or transmit (the present invention here is not to be encrypted as example) with cipher mode not.The information of sending is: M → E:DTnoM[i] (shown in step 390).
E-Payment is after confirming that businessman's dynamic transaction code is errorless, and return up-to-date gathering information and give businessman: up-to-date gathering information comprises necessary every field of transaction and last result.The information of sending is: E → M:LastestReceiveMoney (shown in step 3100).
After businessman confirms that gathering information is errorless, input clearing password, require e-Payment to give and pay the bill: the information of sending is: M → E:TransactionNo; CompletionPassword (shown in step 3110).
E-Payment confirms the clearing password and to handle sequence number errorless, and the beneficiary of this transaction is when be this businessman, just to paying the bill (shown in step 3120).
E-Payment passback result and account balance situation are to businessman: the information of sending is: E → M:Tresult; AccountInfoM (shown in step 3130).
The security of system assessment
Behind top real work and test, will illustrate below how mechanism proposed by the invention in the present invention reaches safety requirements:
Identity validation (Authentication): be to see through the dynamic transaction code to confirm status in mechanism of the present invention, and the hash function of the generation one time key that meets of must arranging in pairs or groups is except carrying out keyholed back plate (as preferential mode and amount of money restriction) at the dynamic transaction code.And can be via e-Payment real-time verification identity when concluding the business.
Access control (Access Control): can be with various authority (as carrying out type of transaction, amount of money restriction, number of times restriction ... Deng) be set on the e-Payment, do not allow to change authority on the running gear.
Security (Security): mechanism of the present invention provides the protection at four outposts of the tax office:
1. checking earlier accessed to your password when consumer activated was paid the bill software;
2. need input the payment password when carrying out the payment operation;
3. must use the dynamic transaction code just can conclude the business;
4. must use identical one time key to produce hash function and secret speech ability encryption and decryption data with the e-Payment end.
Integrality (Integrity): must crack the cipher mechanism in the present invention earlier, and obtain the dynamic transaction code and just can alter, owing to the secret speech of the secret speech of consumer in the present invention, e-Payment and the hash function that produces disposal password all can be downloaded again and reset along with the dynamic transaction code.
Except the assessment of above-mentioned security of system, below the present invention how to defend active attack and passive type to attack (dividing) analytic system with the purpose of attack.
The purpose that passive type is attacked is only stolen the information content in the communication, does not destroy communication, and passive type attacks as eavesdropping, flow analysis etc. all are.Do not destroy communication itself, therefore be difficult to detect communication and whether suffer the passive type attack.So mechanism of the present invention is to adopt the dynamic transaction code to reach anonymity, and adopts encryption mechanism of the present invention, in case analyzed by eavesdropping.
(Denial of Service is attacked in blocking-up; Active): the electric power of running gear unless the program of downloading or installed without permission runs out, or remove transaction software of the present invention, otherwise be to block service.
Heavily send attack (Replay; Active): can effectively block the attack of this class through the time stamp in dynamic transaction code, transaction sequence number and the data transmission, attack if there is the assailant to want to make use of twice identical transaction, just then as long as do not repeat can for the transaction sequence number that produced of keyholed back plate e-Payment.
Fabricate (forging) and attack (the attack on authenticity; Active): be equal to the requirement of front to the status authentication.
In view of the above, a specific embodiment of the present invention is a kind of on-line trade system, comprise a consumption client and a server-side, the consumption client is to transmit and receive via a network and server-side, and the data that transmits between this consumption client and this server-side and receive can be the data of having encrypted.The consumption client provides following function: accept the input of a Transaction Information (for example above-mentioned transaction data and Payment Information); Transmit a transaction code (for example above-mentioned DTnoC[i]) by network; Receive a transaction sequence number and encrypt this Transaction Information producing a ciphertext by network, and transmit this transaction sequence number and this ciphertext by network.In addition, server-side provides following function: by network receive and the checking transaction code producing a transaction sequence number, and transmit this transaction sequence number by network; And by network reception transaction sequence number and ciphertext, and decipher this ciphertext to carry out one first trading function.Server-side can also comprise following function in addition: by network response consumption client one password, wherein server-side is to produce this password via carrying out first trading function; And accept businessman's client by this network and transmit this password to carry out one second trading function.
Cooperate the consumption client and the server-side of the foregoing description, another specific embodiment of the present invention is a kind of online trading method, and the consumption client is to transmit and receive via network and server-side.At first import a Transaction Information to consuming client, the consumption client transmits a transaction code by network, afterwards server-side receive by network and the checking transaction code producing a transaction sequence number, and this network transmits transaction sequence number.Next consume client and receive transaction sequence number and encrypted transaction message to produce a ciphertext by network, and transmit transaction sequence number and ciphertext by network, the final servo end receives transaction sequence number and ciphertext by network, and deciphers this ciphertext to carry out one first trading function.In addition, this specific embodiment also can comprise server-side by network response consumption client one password (for example above-mentioned clearing password (CompletionPassword)), wherein server-side is to carry out this first trading function and produce this password, next transmit this password by businessman's client by this network, the final servo end receives this password to carry out one second trading function by network.
The first above-mentioned trading function can be an account transfer function, is familiar with the correlative detail that correlation technique person can know the account transfer technology easily by inference, and as transferring accounts with the Internet bank or ATM (Automatic Teller Machine) (ATM), so correlative detail is not given unnecessary details at this.Wherein above-mentioned account transfer can be to another account by the pairing account's account transfer of this consumption client.This another account can be the pairing account of businessman's client.This account transfer process can be when carrying out first trading function by the pairing account of this consumption client amount of money of withholding, transmit this password in businessman's client by network and again the amount of money of withholding transferred accounts to the pairing account of businessman's client.In view of the above, can know businessman's client by inference also can be another consumption client.Moreover before businessman's client transmitted this password by network, the amount of money of withholding can be requested to return.
Therefore, above-mentioned consumption client is an action communication device, can connect network by a communications protocol, and this network can be selected from GSM, GPRS, 3G, Wireless LAN, WiMax, PHS or the like.Therefore above-mentioned consumption client can be reached by a software with reception the transmission of server-side, this software can be to download and be installed on the consumption client by server-side, comprise one or a plurality of transaction code in the software, the consumption client just transmits and receives server-side with this software after software is installed.
Transmitting between above-mentioned consumption client and server-side with the data that receives is can be the data that process is encrypted.In a specific embodiment of the present invention, this software can comprise a PKI (for example above-mentioned PuKeye-Payment[i]) in addition when being downloaded, therefore after being installed in the consumption client, just can use public key encryption one first close speech (for example above-mentioned SPC), and transmit this first close speech by network.Next server-side receives this first close speech and encrypts one second close speech (for example above-mentioned SPE) with the first close speech, and transmits the second close speech by this network, receives this second close speech by software then.Therefore transmit between this consumption client and this server-side with the data that receive in and just can carry out encrypt and decrypt with this first close speech and this second close speech.
Claims (18)
1. an online trading method is characterized in that, comprises:
Import a Transaction Information to consumption client, this consumption client transmits and receives via a network and a server-side;
This consumption client transmits a transaction code by this network;
This server-side is received by this network and verifies this transaction code producing a transaction sequence number, and transmits this transaction sequence number by this network;
This consumption client is received this transaction sequence number and is encrypted this Transaction Information to produce a ciphertext by this network;
This consumption client transmits this transaction sequence number and this ciphertext by this network; And
This server-side receives this transaction sequence number and this ciphertext by this network, and deciphers this ciphertext to carry out one first trading function.
2. according to claim 1 a described online trading method, it is characterized in that, the corresponding account of wherein above-mentioned consumption client, this first trading function is to another account by the pairing account's account transfer of this consumption client.
3. according to claim 1 a described online trading method, it is characterized in that, wherein also comprise:
This server-side responds this consumption client one password by this network, and wherein this server-side is carried out this first trading function and produced this password;
One businessman's client transmits this password by this network; And
This server-side receives this password to carry out one second trading function by this network.
4. according to claim 3 a described online trading method, it is characterized in that, wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this second trading function are to the pairing account of this businessman's client by the pairing account's account transfer of this consumption client.
5. according to claim 3 a described online trading method, it is characterized in that, wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this first trading function is by the pairing account of this consumption client amount of money of withholding, and this second trading function is to the pairing account of this businessman's client with this amount of money account transfer.
6. according to claim 3 a described online trading method, it is characterized in that wherein above-mentioned businessman's client is another consumption client.
7. according to claim 1 a described online trading method, it is characterized in that, wherein above-mentioned consumption client is an action communication device, and this action communication device is to connect this network with a communications protocol, and this network is to be selected from GSM, GPRS, 3G, Wireless LAN, WiMax, PHS.
8. according to claim 1 a described online trading method, it is characterized in that, wherein also comprise this consumption client and download and install a software by this server-side, this software comprises at least one this transaction code, and wherein this consumption client is with this software this server-side to be transmitted and receives after this software is installed.
9. described online trading method according to Claim 8 is characterized in that, wherein also comprises:
This software is with a public key encryption one first close speech, and transmits this first close speech by this network, and wherein this software comprises this PKI when being downloaded;
This server-side receives this first close speech and encrypts one second close speech with this first close speech, and transmits this second close speech by this network; And
This software receives this second close speech, and the data that wherein transmit between this consumption client and this server-side and receive are to carry out encrypt and decrypt with this first close speech and this second close speech.
10. an on-line trade system is characterized in that, comprises:
One consumption client, this consumption client transmits and receives via a network and a server-side, and this consumption client has following function:
Accept the input of a Transaction Information;
Transmit a transaction code by this network; And
Receive a transaction sequence number and encrypt this Transaction Information producing a ciphertext by this network, and transmit this transaction sequence number and this ciphertext by this network; And
One server-side, this server-side has following function:
Receive and verify this transaction code producing a transaction sequence number by this network, and transmit this transaction sequence number by this network; And
Receive this transaction sequence number and this ciphertext by this network, and decipher this ciphertext to carry out one first trading function.
11. according to claim 10 a described on-line trade system, it is characterized in that, the corresponding account of wherein above-mentioned consumption client, this first trading function is to another account by the pairing account's account transfer of this consumption client.
12., it is characterized in that wherein above-mentioned server-side also has following function according to claim 10 a described on-line trade system:
Respond this consumption client one password by this network, wherein this server-side is carried out this first trading function and is produced this password; And
Accept businessman's client by this network and transmit this password to carry out one second trading function.
13. according to claim 12 a described on-line trade system, it is characterized in that, wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this second trading function are to the pairing account of this businessman's client by the pairing account's account transfer of this consumption client.
14. according to claim 12 a described on-line trade system, it is characterized in that, wherein above-mentioned consumption client and this corresponding account of businessman's client difference, this first trading function is by the pairing account of this consumption client amount of money of withholding, and this second trading function is to the pairing account of this businessman's client with this amount of money account transfer.
15., it is characterized in that wherein above-mentioned businessman's client is another consumption client according to claim 12 a described on-line trade system.
16. according to claim 10 a described on-line trade system, it is characterized in that, wherein above-mentioned consumption client is an action communication device, and this action communication device is to connect this network with a communications protocol, and this network is to be selected from GSM, GPRS, 3G, Wireless LAN, WiMax, PHS.
17. according to claim 10 a described on-line trade system, it is characterized in that, wherein above-mentioned consumption client also has following function: download and install a software by this server-side, this software comprises at least one this transaction code, and wherein this consumption client is with this software this server-side to be transmitted and receives after this software is installed.
18. according to claim 17 a described on-line trade system, it is characterized in that, wherein also comprise:
This consumption client has more following function:
Utilize this software with a public key encryption one first close speech, and transmit this first close speech by this network, wherein this software comprises this PKI when being downloaded; And
Utilize this software to receive this encrypted second close speech, and with this second encrypted close speech of this first close speech deciphering, to draw this second close speech; And
This server-side also has following function:
Receive this encrypted first close speech and with the deciphering of a private key of this PKI correspondence with must this first close speech; And
Utilize this first close speech to encrypt one second close speech, and transmit this second close speech by this network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100781069A CN101064033A (en) | 2006-04-26 | 2006-04-26 | System and method for action payment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100781069A CN101064033A (en) | 2006-04-26 | 2006-04-26 | System and method for action payment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101064033A true CN101064033A (en) | 2007-10-31 |
Family
ID=38965044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006100781069A Pending CN101064033A (en) | 2006-04-26 | 2006-04-26 | System and method for action payment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101064033A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102567876A (en) * | 2010-12-01 | 2012-07-11 | 微软公司 | Account Transfer Techniques |
TWI476713B (en) * | 2010-07-29 | 2015-03-11 | Intel Corp | Method, server and tangible machine readable medium for location-based payment authorization |
US9026171B2 (en) | 2010-11-23 | 2015-05-05 | Microsoft Technology Licensing, Llc | Access techniques using a mobile communication device |
TWI510952B (en) * | 2015-01-26 | 2015-12-01 | Acer Inc | Method and system for retrieving private key |
CN105205666A (en) * | 2014-06-17 | 2015-12-30 | 中国银联股份有限公司 | Bluetooth-based face to face payment method and system |
US9509686B2 (en) | 2010-12-03 | 2016-11-29 | Microsoft Technology Licensing, Llc | Secure element authentication |
US9525548B2 (en) | 2010-10-21 | 2016-12-20 | Microsoft Technology Licensing, Llc | Provisioning techniques |
TWI762779B (en) * | 2019-04-02 | 2022-05-01 | 兆豐國際商業銀行股份有限公司 | Over-the-counter transaction control method and over-the-counter transaction control system |
-
2006
- 2006-04-26 CN CNA2006100781069A patent/CN101064033A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI476713B (en) * | 2010-07-29 | 2015-03-11 | Intel Corp | Method, server and tangible machine readable medium for location-based payment authorization |
US9525548B2 (en) | 2010-10-21 | 2016-12-20 | Microsoft Technology Licensing, Llc | Provisioning techniques |
US9026171B2 (en) | 2010-11-23 | 2015-05-05 | Microsoft Technology Licensing, Llc | Access techniques using a mobile communication device |
CN102567876A (en) * | 2010-12-01 | 2012-07-11 | 微软公司 | Account Transfer Techniques |
US9509686B2 (en) | 2010-12-03 | 2016-11-29 | Microsoft Technology Licensing, Llc | Secure element authentication |
CN105205666A (en) * | 2014-06-17 | 2015-12-30 | 中国银联股份有限公司 | Bluetooth-based face to face payment method and system |
CN105205666B (en) * | 2014-06-17 | 2019-10-25 | 中国银联股份有限公司 | Face-to-face method of payment and system based on bluetooth |
TWI510952B (en) * | 2015-01-26 | 2015-12-01 | Acer Inc | Method and system for retrieving private key |
TWI762779B (en) * | 2019-04-02 | 2022-05-01 | 兆豐國際商業銀行股份有限公司 | Over-the-counter transaction control method and over-the-counter transaction control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1271485C (en) | Device and method for proceeding encryption and identification of network bank data | |
CN101064033A (en) | System and method for action payment | |
CN1266560C (en) | Enhanced quality of identification in a data communications network | |
CN1908981A (en) | Wireless computer wallet for physical point of sale (pos) transactions | |
CN1302406A (en) | Method and system for secure transactions in computer system | |
CN101034449A (en) | Method, system and mobile terminal for implementing electronic payment | |
CN1635525A (en) | Security Internet payment system and security Internet payment authentication method | |
CN1647089A (en) | Electronic transfer system | |
CN1299545A (en) | User authentication using a virtual private key | |
CN1926567A (en) | Systems and methods for conducting secure payment transactions using a formatted data structure | |
CN1575580A (en) | Portability and privacy with data communications network browsing | |
CN1653746A (en) | Method for authenticating and verifying sms communications | |
CN1579079A (en) | Enhanced privacy protection in identification in a data communications network | |
CN1579080A (en) | User access control to distributed resources on a data communications network | |
CN1561498A (en) | Apparatus, method and system for payment using mobile device | |
CN1853189A (en) | Customer authentication in e-commerce transactions | |
CN1340784A (en) | Network business operated by intelligent card allowed to te used through consumers' equipment | |
CN1756150A (en) | Information management apparatus, information management method, and program | |
CN1502186A (en) | Controlled distribution of application code and content data within a computer network | |
CN1897027A (en) | Authentication services using mobile device | |
CN1395716A (en) | Payment device and method for secure payment | |
CN1625743A (en) | Activity management method | |
CN1831865A (en) | Electronic bank safety authorization system and method based on CPK | |
CN1921395A (en) | Method and system for improving security of network software | |
CN1922623A (en) | Wireless wallet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20071031 |