CN107292615A - The method for protecting and device of a kind of e-payment - Google Patents
The method for protecting and device of a kind of e-payment Download PDFInfo
- Publication number
- CN107292615A CN107292615A CN201610193090.XA CN201610193090A CN107292615A CN 107292615 A CN107292615 A CN 107292615A CN 201610193090 A CN201610193090 A CN 201610193090A CN 107292615 A CN107292615 A CN 107292615A
- Authority
- CN
- China
- Prior art keywords
- private information
- information
- payment
- generating
- private
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a kind of method for protecting and device of e-payment.Methods described includes:Receive the payment request towards beneficiary that paying party is sent;After delivery operation is completed, the payment result of delivery operation and the first private information are sent to paying party;Wherein, first private information is associated with the second private information that the beneficiary is uploaded, and first private information is used to verify payment result for beneficiary.The electronic payment schemes provided using the application, beneficiary can be in the paying party payment result page the first private information validation of payment result accuracy, so that paying party can not be cheated by forging payment result, it is to avoid the economic loss that dolus malus is brought.Meanwhile, the transformation that beneficiary need not carry out POS can be collected money by Third-party payment platform, save substantial amounts of improvement cost.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for securing electronic payment.
Background
With the rapid development of internet technology, more and more offline payment behaviors can be paid in an online payment manner, such as: when the user purchases the product online, the payment operation can be completed online through the third-party payment platform. In the related art, when electronic payment is performed in a consumption place on line, a malicious user can cheat by forging a payment result page of an electronic payment platform, and a cashier may not be able to accurately judge whether the user has successfully paid, which brings huge economic loss to a payee.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for securing electronic payment.
Specifically, the method is realized through the following technical scheme:
a method of securing an electronic payment, the method comprising:
receiving a payment request facing a payee sent by a payer;
after the payment operation is completed, sending a payment result of the payment operation and first private information to the payer;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
Optionally, before the sending the payment result of the payment operation and the first private information to the payer, the method further includes:
saving second private information uploaded by the payee;
and generating first private information according to the second private information.
Optionally, the generating the first private information according to the second private information includes:
splitting the second private information into a plurality of information fragments;
randomly selecting a first number of information segments;
and generating first private information according to the selected information fragment.
Optionally, the generating the first private information according to the selected information fragment includes:
randomly selecting a second number of interference segments;
and generating first private information according to the selected information fragment and the interference fragment.
Optionally, the generating the first private information according to the second private information includes:
and when the second private information is static information, generating dynamically-changed first private information according to a preset algorithm.
Optionally, the generating the first private information according to the second private information includes:
determining an information generation rule corresponding to the payment time;
and generating first private information according to the information generation rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
A security device for electronic payments, the device comprising:
a request receiving unit which receives a payment request for a payee sent by a payer;
the result returning unit is used for sending the payment result of the payment operation and the first private information to the payer after the payment operation is finished;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
Optionally, the apparatus further comprises:
the information storage unit is used for storing second private information uploaded by the payee;
and the information generating unit is used for generating first private information according to the second private information.
Optionally, the information generating unit includes:
the splitting subunit splits the second private information into a plurality of information fragments;
selecting subunits, and randomly selecting a first number of information fragments;
and the generating subunit generates first private information according to the selected information fragment.
Optionally, the generating subunit randomly selects a second number of interference fragments, and generates the first private information according to the selected information fragments and the interference fragments.
Optionally, the information generating unit generates the first private information that changes dynamically according to a preset algorithm when the second private information is static information.
Optionally, the information generating unit determines an information generating rule corresponding to the payment time, and generates the first private information according to the information generating rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
From the above description, it can be seen that by adopting the electronic payment scheme provided by the application, the payee can verify the accuracy of the payment result according to the first private information in the payment result page of the payer, so that the payer cannot perform fraud by forging the payment result, and the economic loss caused by malicious fraud is avoided. Meanwhile, the payee can collect the money through the third-party payment platform without modifying a money receiving system, so that a large amount of modification cost is saved.
Drawings
Fig. 1 is a flowchart illustrating a security method for electronic payment according to an exemplary embodiment of the present application.
Fig. 2 is a flowchart illustrating a process of generating first private information according to second private information according to an exemplary embodiment of the present application.
Fig. 3 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Fig. 4 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Fig. 1 is a flowchart illustrating a security method for electronic payment according to an exemplary embodiment of the present application.
Referring to fig. 1, the security method for electronic payment may be applied to a server, such as: the server or server cluster of the third party payment platform comprises the following steps:
step 101, receiving a payment request for a payee sent by a payer.
In this embodiment, the payee may include: malls, hotels, restaurants, and the like, provide consumers with offline business services. The payee may register a user account in the server in advance, and may subsequently perform online collection based on the user account, for example: the payee may display the two-dimensional code associated with his user account at the checkout counter for payment after scanning by the consumer.
In this embodiment, the payer is usually a consumer, and when paying to the payee, the payer may scan the two-dimensional code displayed by the payee using client software of the third-party payment platform, and then input information such as payment amount, payment method, payment password, and the like in the displayed payment page, and the client software may further send a payment request to the payee in the aspect of payment to the server. The processing and implementation of this part can refer to the prior art, and the detailed description is omitted here.
And 102, after the payment operation is completed, sending the payment result of the payment operation and the first private information to the payer.
In this embodiment, the payee may upload the second private information to the server in advance for storage. The second private information may be pictures, characters, audio, video, etc., and taking pictures as an example, the payee may select some own specific pictures that are difficult to forge by others to upload to the server, for example: the payee can take a picture of the pet and upload the picture of the pet to the server.
In this embodiment, the payee may upload one or more second private information, such as: one or more pictures are uploaded. The payee may also upload various types of second private information, such as: and uploading a plurality of pictures and a plurality of videos respectively, and the like, which is not particularly limited in the present application.
In this embodiment, the first private information is associated with the second private information. Such as: the first private information may include a partial information fragment of the second private information, and the payee may identify the first private information by using the partial information fragment. For another example: the first private information is composed of a plurality of second private information, and the payee can also identify the first private information through the plurality of second private information.
Based on the foregoing step 101, after receiving the payment request, the server may complete a payment operation according to the payment request, and after the payment is successful, may send a payment result of the successful payment and the generated first private information to the payer. If the payment fails, the server does not need to send the first private information to the payer. After receiving the payment result and the first private information, the client of the payer may display a payment result page including the first private information. Wherein, the display parameters of the first private information, such as: the display position, the display size, and the like may be set in advance by a developer, and the present application is not particularly limited thereto.
In this embodiment, the payer may display the payment result page to the payee, and the payee may manually identify the first private information in the payment result page, and if it is determined that the first private information is associated with the second private information uploaded by the payee, for example: if the first private information comprises the uploaded pet photo, the payment result page is not forged, and the payer can pay successfully.
From the above description, it can be seen that by adopting the electronic payment scheme provided by the application, the payee can verify the accuracy of the payment result according to the first private information in the payment result page of the payer, so that the payer cannot perform fraud by forging the payment result, and the economic loss caused by malicious fraud is avoided. Meanwhile, the payee can collect the money through the third-party payment platform without modifying a money receiving system, so that a large amount of modification cost is saved.
Optionally, in an example of the application, the server may generate and store a plurality of pieces of first private information in advance according to the second private information, randomly select one or more pieces of first private information after the payment operation is completed, and then send the payment result of the payment operation and the selected first private information to the payer. In another example of the present application, the server may also generate the first private information after completing the payment operation, and send the payment result of the payment operation and the generated first private information to the payer, which is not limited in this application.
Optionally, in an example of the present application, in order to ensure that the generated first private information is not easily forged by an illegal person, the first private information may be generated in a manner shown in fig. 2. Referring to fig. 2, the process of generating the first private information according to the second private information may include the following steps:
step 201, splitting the second private information into a plurality of information fragments.
In this embodiment, taking the second private information as an example of a picture, the server may divide the picture into a plurality of sub-pictures according to a division rule preset by the payee. For example, if the partition rule preset by the payee is to partition the picture into three sub-pictures from top to bottom, the server may horizontally partition the picture uploaded by the payee into three sub-pictures with the same size, where each sub-picture is an information fragment of the picture uploaded by the payee. Optionally, when the payee uploads a plurality of second private information, the server may split each second private information.
Step 202, a first number of pieces of information are randomly selected.
In this embodiment, the minimum value of the first number is 1, and the maximum value is the number of the information fragments obtained after splitting. The first amount may be set by a developer or may be specified by a payee. Optionally, the first number may also be dynamically changed, such as: the value of the first number may be associated with time, the first number being a1 in the morning, a2 in the afternoon, etc. Of course, the first number may also be a random number, and the application is not limited in this respect.
It should be noted that, when the number of the second private information is multiple, the server may randomly select from all the information fragments of the second private information, and does not need to be limited to an information fragment of a certain second private information.
Step 203, generating first private information according to the selected information fragment.
Based on the foregoing step 202, after the information fragment is selected, the first private information may be generated according to the information fragment.
In one example, the pieces of information may be recombined to generate the first private information. Still taking a picture as an example, the selected sub-pictures may be recombined to form a new picture as the first private information. For example, still taking the example of dividing the picture uploaded by the payee into three sub-pictures, in the step 201, the picture may be divided into three sub-pictures, i.e., an upper sub-picture, a middle sub-picture and a lower sub-picture, and if the upper sub-picture and the middle sub-picture are selected in the step 202, in this step, the middle sub-picture may be placed above the upper sub-picture to form the first private information.
In another example, the selected information segment may be directly used as the first private information. Still taking the foregoing example as an example, the selected upper sub-picture and middle sub-picture may be used as the first private information, and in this example, the number of the first private information is 2.
In another example, to avoid the illegal person from forging the information segments, the server may further randomly select a second number of interference segments, and generate the first private information according to the selected information segments and the interference segments. The second number may be the same as the first number, may also be different from the first number, and may be specifically set by a developer. Optionally, the server may combine the selected information fragment and the interference fragment to generate first private information, or the server may directly use the selected information fragment and the interference fragment as the first private information, which is not limited in this application.
Optionally, in another example of the present application, when the second private information is static information, the first private information that changes dynamically may be generated according to a preset algorithm. In this embodiment, the second private information of the picture and character type is static information, and the second private information of the audio and video type is dynamically changing information. When the second private information is a picture or a character, the server may generate a dynamically changing audio or video as the first private information according to the picture or the character. For example, assuming that the second private information is a picture, if the payee uploads 5 pictures to the server, the server may generate a video containing the 5 pictures as the first private information, such as: the server may generate, as the first private information, a video including the 5 pictures according to a preset frame rate, where the first private information includes 5 frames of images. Further, assuming that the second private information is a character, if the payee uploads 10 characters to the server, the server may convert the 10 characters into corresponding audio frequencies and combine the audio frequencies, and use the combined audio frequencies as the first private information.
Optionally, in another example of the application, the payee may further set different information generation rules with time as a dimension, and the server may determine the corresponding information generation rule according to the payment time after performing the payment operation, and then generate the first private information according to the information generation rule. Still taking the second private information as an example, for example, suppose that the payee uploads two pictures, one is a picture of a pet cat and the other is a picture of a pet dog, suppose that the payee is provided with two information generation rules, the information generation rule 1 is to generate the first private information according to the picture of the pet cat, and the corresponding payment time is 0:00:00 to 11:59: 59. The information generation rule 2 is to generate first private information according to the picture of the pet dog, and the corresponding payment time is 12:00:00 to 23:59: 59. If the payment time of a certain payment request is 9:12:29, the server side can determine that the information generation rule corresponding to the payment time is the information generation rule 1, randomly select 2 sub-pictures from 3 sub-pictures of the pet cat picture according to the information generation rule 1 to form first private information, and send a payment result and the first private information to the payer.
Of course, in practical applications, the first private information may also be generated in other manners for the payee to verify the payment result, such as: a manner of combining the information generation rule of the time dimension with the interference segment, and the like, which is not particularly limited in the present application.
Corresponding to the embodiment of the safety guarantee method for electronic payment, the application also provides an embodiment of a safety guarantee device for electronic payment.
The embodiment of the safety guarantee device for electronic payment can be applied to the server. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and as a device in a logical sense, a processor of a service end reads corresponding computer program instructions in a nonvolatile memory into a memory for operation. From a hardware aspect, as shown in fig. 3, a hardware structure diagram of a service end where a security and security device for electronic payment is located is shown, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 3, the service end where the device is located in the embodiment may also include other hardware according to the actual function of the service end, which is not described again.
Fig. 4 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Referring to fig. 4, the electronic payment security device 300 can be applied to the service end shown in fig. 3, and includes: an information holding unit 301, an information generating unit 302, a request receiving unit 303, and a result returning unit 304. Wherein, the information generating unit 302 may further include: split subunit 3021, select subunit 3022, and generate subunit 3023.
Wherein,
the request receiving unit 303 is configured to receive a payment request for a payee sent by a payer;
the result returning unit 304 is configured to send the payment result of the payment operation and the first private information to the payer after the payment operation is completed;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
The information storage unit 301 stores the second private information uploaded by the payee;
the information generating unit 302 generates first private information according to the second private information.
The splitting subunit 3021 splits the second private information into a plurality of information pieces;
the selecting subunit 3022 randomly selects a first number of information segments;
the generating subunit 3023 generates the first private information according to the selected information fragment.
Optionally, the generating subunit 3023 randomly selects a second number of interference segments, and generates the first private information according to the selected information segments and the interference segments.
Optionally, the information generating unit 302 generates the first private information that changes dynamically according to a preset algorithm when the second private information is static information.
Optionally, the information generating unit 302 determines an information generating rule corresponding to the payment time, and generates the first private information according to the information generating rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (14)
1. A method for securing an electronic payment, the method comprising:
receiving a payment request facing a payee sent by a payer;
after the payment operation is completed, sending a payment result of the payment operation and first private information to the payer;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
2. The method of claim 1, wherein prior to sending the payment result of the payment operation and the first private information to the payer, the method further comprises:
saving second private information uploaded by the payee;
and generating first private information according to the second private information.
3. The method of claim 2, wherein the generating first private information from the second private information comprises:
splitting the second private information into a plurality of information fragments;
randomly selecting a first number of information segments;
and generating first private information according to the selected information fragment.
4. The method according to claim 3, wherein the generating first private information according to the selected information piece comprises:
randomly selecting a second number of interference segments;
and generating first private information according to the selected information fragment and the interference fragment.
5. The method of claim 2, wherein the generating first private information from the second private information comprises:
and when the second private information is static information, generating dynamically-changed first private information according to a preset algorithm.
6. The method of claim 2, wherein the generating first private information from the second private information comprises:
determining an information generation rule corresponding to the payment time;
and generating first private information according to the information generation rule and the second private information.
7. The method of claim 1,
the second private information includes: pictures, characters, audio, video.
8. An electronic payment security device, the device comprising:
a request receiving unit which receives a payment request for a payee sent by a payer;
the result returning unit is used for sending the payment result of the payment operation and the first private information to the payer after the payment operation is finished;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
9. The apparatus of claim 8, further comprising:
the information storage unit is used for storing second private information uploaded by the payee;
and the information generating unit is used for generating first private information according to the second private information.
10. The apparatus of claim 9, wherein the information generating unit comprises:
the splitting subunit splits the second private information into a plurality of information fragments;
selecting subunits, and randomly selecting a first number of information fragments;
and the generating subunit generates first private information according to the selected information fragment.
11. The apparatus of claim 10,
the generating subunit randomly selects a second number of interference fragments, and generates first private information according to the selected information fragments and the interference fragments.
12. The apparatus of claim 9,
and the information generating unit is used for generating the first private information which changes dynamically according to a preset algorithm when the second private information is static information.
13. The apparatus of claim 9,
the information generating unit determines an information generating rule corresponding to the payment time and generates first private information according to the information generating rule and the second private information.
14. The apparatus of claim 8,
the second private information includes: pictures, characters, audio, video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610193090.XA CN107292615A (en) | 2016-03-30 | 2016-03-30 | The method for protecting and device of a kind of e-payment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610193090.XA CN107292615A (en) | 2016-03-30 | 2016-03-30 | The method for protecting and device of a kind of e-payment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107292615A true CN107292615A (en) | 2017-10-24 |
Family
ID=60087676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610193090.XA Pending CN107292615A (en) | 2016-03-30 | 2016-03-30 | The method for protecting and device of a kind of e-payment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107292615A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107870785A (en) * | 2017-12-27 | 2018-04-03 | 深圳市茁壮网络股份有限公司 | One kind pays successfully interface creating method and device |
CN111917759A (en) * | 2020-07-27 | 2020-11-10 | 八维通科技有限公司 | Data security interaction method for gas station |
CN112101924A (en) * | 2020-09-25 | 2020-12-18 | 北京达佳互联信息技术有限公司 | Information display method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020049681A1 (en) * | 2000-07-20 | 2002-04-25 | International Business Machines Corporation | Secure anonymous verification, generation and/or proof of ownership of electronic receipts |
CN1470034A (en) * | 2000-08-28 | 2004-01-21 | 李树源 | System for managing electronic receipt according to electronic commerce and method for managing thereof |
CN104115172A (en) * | 2011-12-07 | 2014-10-22 | 亚马逊技术股份有限公司 | Network-accessible point-of-sale device instance |
-
2016
- 2016-03-30 CN CN201610193090.XA patent/CN107292615A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020049681A1 (en) * | 2000-07-20 | 2002-04-25 | International Business Machines Corporation | Secure anonymous verification, generation and/or proof of ownership of electronic receipts |
CN1470034A (en) * | 2000-08-28 | 2004-01-21 | 李树源 | System for managing electronic receipt according to electronic commerce and method for managing thereof |
CN104115172A (en) * | 2011-12-07 | 2014-10-22 | 亚马逊技术股份有限公司 | Network-accessible point-of-sale device instance |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107870785A (en) * | 2017-12-27 | 2018-04-03 | 深圳市茁壮网络股份有限公司 | One kind pays successfully interface creating method and device |
CN111917759A (en) * | 2020-07-27 | 2020-11-10 | 八维通科技有限公司 | Data security interaction method for gas station |
CN111917759B (en) * | 2020-07-27 | 2021-02-19 | 八维通科技有限公司 | Data security interaction method for gas station |
CN112101924A (en) * | 2020-09-25 | 2020-12-18 | 北京达佳互联信息技术有限公司 | Information display method and device |
WO2022062600A1 (en) * | 2020-09-25 | 2022-03-31 | 北京达佳互联信息技术有限公司 | Information display method and information display device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11468696B2 (en) | Systems and methods for imaging identification information | |
US11640605B2 (en) | Method, server, and storage medium for verifying transactions using a smart card | |
US20210233056A1 (en) | Data interaction method, verification terminal, server, and system | |
KR102272119B1 (en) | Method and apparatus for offline interaction based on augmented reality | |
US10885522B1 (en) | Updating merchant location for cardless payment transactions | |
JP6615113B2 (en) | Routing payments to a payment aggregator | |
CN107025548A (en) | Transaction processing method, terminal and system | |
US20160247142A1 (en) | Online payment system and method based on two-dimensional code | |
TWI633506B (en) | A message sending method, system and device thereof | |
US20130198079A1 (en) | Verification of Online Transactions | |
CN104063790A (en) | Method and system for providing authorization through mobile terminal | |
TW201915894A (en) | Method for realizing an installment business based on credit | |
US10275812B2 (en) | Method and apparatus for denying a transaction detected to be initiated outside of a required application on an endpoint device | |
JP2018185801A (en) | Mobile payment method using bar code, apparatus, and server for using the method | |
JP2020052633A (en) | Program, information processing terminal, and information processing method | |
JP2020126545A (en) | Information processing method, information processing apparatus, and information processing program | |
GB2513602A (en) | Authentication system for purchase delivery | |
US20180075451A1 (en) | Transaction Method and Transaction System | |
CN107292615A (en) | The method for protecting and device of a kind of e-payment | |
JP2020113005A (en) | Information processing method, information processing apparatus, and program | |
CN105516225B (en) | Method, device and system for operating object | |
CN110266686B (en) | Data sharing method, apparatus, device and computer readable storage medium | |
KR20130125344A (en) | Online payment method for providing online payment service | |
US20140324700A1 (en) | Method and system for processing object to be processed | |
CN116523516A (en) | A payment method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1245966 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171024 |
|
RJ01 | Rejection of invention patent application after publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1245966 Country of ref document: HK |