[go: up one dir, main page]

CN107292615A - The method for protecting and device of a kind of e-payment - Google Patents

The method for protecting and device of a kind of e-payment Download PDF

Info

Publication number
CN107292615A
CN107292615A CN201610193090.XA CN201610193090A CN107292615A CN 107292615 A CN107292615 A CN 107292615A CN 201610193090 A CN201610193090 A CN 201610193090A CN 107292615 A CN107292615 A CN 107292615A
Authority
CN
China
Prior art keywords
private information
information
payment
generating
private
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610193090.XA
Other languages
Chinese (zh)
Inventor
许寄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610193090.XA priority Critical patent/CN107292615A/en
Publication of CN107292615A publication Critical patent/CN107292615A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a kind of method for protecting and device of e-payment.Methods described includes:Receive the payment request towards beneficiary that paying party is sent;After delivery operation is completed, the payment result of delivery operation and the first private information are sent to paying party;Wherein, first private information is associated with the second private information that the beneficiary is uploaded, and first private information is used to verify payment result for beneficiary.The electronic payment schemes provided using the application, beneficiary can be in the paying party payment result page the first private information validation of payment result accuracy, so that paying party can not be cheated by forging payment result, it is to avoid the economic loss that dolus malus is brought.Meanwhile, the transformation that beneficiary need not carry out POS can be collected money by Third-party payment platform, save substantial amounts of improvement cost.

Description

Electronic payment security guarantee method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for securing electronic payment.
Background
With the rapid development of internet technology, more and more offline payment behaviors can be paid in an online payment manner, such as: when the user purchases the product online, the payment operation can be completed online through the third-party payment platform. In the related art, when electronic payment is performed in a consumption place on line, a malicious user can cheat by forging a payment result page of an electronic payment platform, and a cashier may not be able to accurately judge whether the user has successfully paid, which brings huge economic loss to a payee.
Disclosure of Invention
In view of this, the present application provides a method and an apparatus for securing electronic payment.
Specifically, the method is realized through the following technical scheme:
a method of securing an electronic payment, the method comprising:
receiving a payment request facing a payee sent by a payer;
after the payment operation is completed, sending a payment result of the payment operation and first private information to the payer;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
Optionally, before the sending the payment result of the payment operation and the first private information to the payer, the method further includes:
saving second private information uploaded by the payee;
and generating first private information according to the second private information.
Optionally, the generating the first private information according to the second private information includes:
splitting the second private information into a plurality of information fragments;
randomly selecting a first number of information segments;
and generating first private information according to the selected information fragment.
Optionally, the generating the first private information according to the selected information fragment includes:
randomly selecting a second number of interference segments;
and generating first private information according to the selected information fragment and the interference fragment.
Optionally, the generating the first private information according to the second private information includes:
and when the second private information is static information, generating dynamically-changed first private information according to a preset algorithm.
Optionally, the generating the first private information according to the second private information includes:
determining an information generation rule corresponding to the payment time;
and generating first private information according to the information generation rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
A security device for electronic payments, the device comprising:
a request receiving unit which receives a payment request for a payee sent by a payer;
the result returning unit is used for sending the payment result of the payment operation and the first private information to the payer after the payment operation is finished;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
Optionally, the apparatus further comprises:
the information storage unit is used for storing second private information uploaded by the payee;
and the information generating unit is used for generating first private information according to the second private information.
Optionally, the information generating unit includes:
the splitting subunit splits the second private information into a plurality of information fragments;
selecting subunits, and randomly selecting a first number of information fragments;
and the generating subunit generates first private information according to the selected information fragment.
Optionally, the generating subunit randomly selects a second number of interference fragments, and generates the first private information according to the selected information fragments and the interference fragments.
Optionally, the information generating unit generates the first private information that changes dynamically according to a preset algorithm when the second private information is static information.
Optionally, the information generating unit determines an information generating rule corresponding to the payment time, and generates the first private information according to the information generating rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
From the above description, it can be seen that by adopting the electronic payment scheme provided by the application, the payee can verify the accuracy of the payment result according to the first private information in the payment result page of the payer, so that the payer cannot perform fraud by forging the payment result, and the economic loss caused by malicious fraud is avoided. Meanwhile, the payee can collect the money through the third-party payment platform without modifying a money receiving system, so that a large amount of modification cost is saved.
Drawings
Fig. 1 is a flowchart illustrating a security method for electronic payment according to an exemplary embodiment of the present application.
Fig. 2 is a flowchart illustrating a process of generating first private information according to second private information according to an exemplary embodiment of the present application.
Fig. 3 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Fig. 4 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Fig. 1 is a flowchart illustrating a security method for electronic payment according to an exemplary embodiment of the present application.
Referring to fig. 1, the security method for electronic payment may be applied to a server, such as: the server or server cluster of the third party payment platform comprises the following steps:
step 101, receiving a payment request for a payee sent by a payer.
In this embodiment, the payee may include: malls, hotels, restaurants, and the like, provide consumers with offline business services. The payee may register a user account in the server in advance, and may subsequently perform online collection based on the user account, for example: the payee may display the two-dimensional code associated with his user account at the checkout counter for payment after scanning by the consumer.
In this embodiment, the payer is usually a consumer, and when paying to the payee, the payer may scan the two-dimensional code displayed by the payee using client software of the third-party payment platform, and then input information such as payment amount, payment method, payment password, and the like in the displayed payment page, and the client software may further send a payment request to the payee in the aspect of payment to the server. The processing and implementation of this part can refer to the prior art, and the detailed description is omitted here.
And 102, after the payment operation is completed, sending the payment result of the payment operation and the first private information to the payer.
In this embodiment, the payee may upload the second private information to the server in advance for storage. The second private information may be pictures, characters, audio, video, etc., and taking pictures as an example, the payee may select some own specific pictures that are difficult to forge by others to upload to the server, for example: the payee can take a picture of the pet and upload the picture of the pet to the server.
In this embodiment, the payee may upload one or more second private information, such as: one or more pictures are uploaded. The payee may also upload various types of second private information, such as: and uploading a plurality of pictures and a plurality of videos respectively, and the like, which is not particularly limited in the present application.
In this embodiment, the first private information is associated with the second private information. Such as: the first private information may include a partial information fragment of the second private information, and the payee may identify the first private information by using the partial information fragment. For another example: the first private information is composed of a plurality of second private information, and the payee can also identify the first private information through the plurality of second private information.
Based on the foregoing step 101, after receiving the payment request, the server may complete a payment operation according to the payment request, and after the payment is successful, may send a payment result of the successful payment and the generated first private information to the payer. If the payment fails, the server does not need to send the first private information to the payer. After receiving the payment result and the first private information, the client of the payer may display a payment result page including the first private information. Wherein, the display parameters of the first private information, such as: the display position, the display size, and the like may be set in advance by a developer, and the present application is not particularly limited thereto.
In this embodiment, the payer may display the payment result page to the payee, and the payee may manually identify the first private information in the payment result page, and if it is determined that the first private information is associated with the second private information uploaded by the payee, for example: if the first private information comprises the uploaded pet photo, the payment result page is not forged, and the payer can pay successfully.
From the above description, it can be seen that by adopting the electronic payment scheme provided by the application, the payee can verify the accuracy of the payment result according to the first private information in the payment result page of the payer, so that the payer cannot perform fraud by forging the payment result, and the economic loss caused by malicious fraud is avoided. Meanwhile, the payee can collect the money through the third-party payment platform without modifying a money receiving system, so that a large amount of modification cost is saved.
Optionally, in an example of the application, the server may generate and store a plurality of pieces of first private information in advance according to the second private information, randomly select one or more pieces of first private information after the payment operation is completed, and then send the payment result of the payment operation and the selected first private information to the payer. In another example of the present application, the server may also generate the first private information after completing the payment operation, and send the payment result of the payment operation and the generated first private information to the payer, which is not limited in this application.
Optionally, in an example of the present application, in order to ensure that the generated first private information is not easily forged by an illegal person, the first private information may be generated in a manner shown in fig. 2. Referring to fig. 2, the process of generating the first private information according to the second private information may include the following steps:
step 201, splitting the second private information into a plurality of information fragments.
In this embodiment, taking the second private information as an example of a picture, the server may divide the picture into a plurality of sub-pictures according to a division rule preset by the payee. For example, if the partition rule preset by the payee is to partition the picture into three sub-pictures from top to bottom, the server may horizontally partition the picture uploaded by the payee into three sub-pictures with the same size, where each sub-picture is an information fragment of the picture uploaded by the payee. Optionally, when the payee uploads a plurality of second private information, the server may split each second private information.
Step 202, a first number of pieces of information are randomly selected.
In this embodiment, the minimum value of the first number is 1, and the maximum value is the number of the information fragments obtained after splitting. The first amount may be set by a developer or may be specified by a payee. Optionally, the first number may also be dynamically changed, such as: the value of the first number may be associated with time, the first number being a1 in the morning, a2 in the afternoon, etc. Of course, the first number may also be a random number, and the application is not limited in this respect.
It should be noted that, when the number of the second private information is multiple, the server may randomly select from all the information fragments of the second private information, and does not need to be limited to an information fragment of a certain second private information.
Step 203, generating first private information according to the selected information fragment.
Based on the foregoing step 202, after the information fragment is selected, the first private information may be generated according to the information fragment.
In one example, the pieces of information may be recombined to generate the first private information. Still taking a picture as an example, the selected sub-pictures may be recombined to form a new picture as the first private information. For example, still taking the example of dividing the picture uploaded by the payee into three sub-pictures, in the step 201, the picture may be divided into three sub-pictures, i.e., an upper sub-picture, a middle sub-picture and a lower sub-picture, and if the upper sub-picture and the middle sub-picture are selected in the step 202, in this step, the middle sub-picture may be placed above the upper sub-picture to form the first private information.
In another example, the selected information segment may be directly used as the first private information. Still taking the foregoing example as an example, the selected upper sub-picture and middle sub-picture may be used as the first private information, and in this example, the number of the first private information is 2.
In another example, to avoid the illegal person from forging the information segments, the server may further randomly select a second number of interference segments, and generate the first private information according to the selected information segments and the interference segments. The second number may be the same as the first number, may also be different from the first number, and may be specifically set by a developer. Optionally, the server may combine the selected information fragment and the interference fragment to generate first private information, or the server may directly use the selected information fragment and the interference fragment as the first private information, which is not limited in this application.
Optionally, in another example of the present application, when the second private information is static information, the first private information that changes dynamically may be generated according to a preset algorithm. In this embodiment, the second private information of the picture and character type is static information, and the second private information of the audio and video type is dynamically changing information. When the second private information is a picture or a character, the server may generate a dynamically changing audio or video as the first private information according to the picture or the character. For example, assuming that the second private information is a picture, if the payee uploads 5 pictures to the server, the server may generate a video containing the 5 pictures as the first private information, such as: the server may generate, as the first private information, a video including the 5 pictures according to a preset frame rate, where the first private information includes 5 frames of images. Further, assuming that the second private information is a character, if the payee uploads 10 characters to the server, the server may convert the 10 characters into corresponding audio frequencies and combine the audio frequencies, and use the combined audio frequencies as the first private information.
Optionally, in another example of the application, the payee may further set different information generation rules with time as a dimension, and the server may determine the corresponding information generation rule according to the payment time after performing the payment operation, and then generate the first private information according to the information generation rule. Still taking the second private information as an example, for example, suppose that the payee uploads two pictures, one is a picture of a pet cat and the other is a picture of a pet dog, suppose that the payee is provided with two information generation rules, the information generation rule 1 is to generate the first private information according to the picture of the pet cat, and the corresponding payment time is 0:00:00 to 11:59: 59. The information generation rule 2 is to generate first private information according to the picture of the pet dog, and the corresponding payment time is 12:00:00 to 23:59: 59. If the payment time of a certain payment request is 9:12:29, the server side can determine that the information generation rule corresponding to the payment time is the information generation rule 1, randomly select 2 sub-pictures from 3 sub-pictures of the pet cat picture according to the information generation rule 1 to form first private information, and send a payment result and the first private information to the payer.
Of course, in practical applications, the first private information may also be generated in other manners for the payee to verify the payment result, such as: a manner of combining the information generation rule of the time dimension with the interference segment, and the like, which is not particularly limited in the present application.
Corresponding to the embodiment of the safety guarantee method for electronic payment, the application also provides an embodiment of a safety guarantee device for electronic payment.
The embodiment of the safety guarantee device for electronic payment can be applied to the server. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and as a device in a logical sense, a processor of a service end reads corresponding computer program instructions in a nonvolatile memory into a memory for operation. From a hardware aspect, as shown in fig. 3, a hardware structure diagram of a service end where a security and security device for electronic payment is located is shown, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 3, the service end where the device is located in the embodiment may also include other hardware according to the actual function of the service end, which is not described again.
Fig. 4 is a schematic structural diagram of a security device for electronic payment according to an exemplary embodiment of the present application.
Referring to fig. 4, the electronic payment security device 300 can be applied to the service end shown in fig. 3, and includes: an information holding unit 301, an information generating unit 302, a request receiving unit 303, and a result returning unit 304. Wherein, the information generating unit 302 may further include: split subunit 3021, select subunit 3022, and generate subunit 3023.
Wherein,
the request receiving unit 303 is configured to receive a payment request for a payee sent by a payer;
the result returning unit 304 is configured to send the payment result of the payment operation and the first private information to the payer after the payment operation is completed;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
The information storage unit 301 stores the second private information uploaded by the payee;
the information generating unit 302 generates first private information according to the second private information.
The splitting subunit 3021 splits the second private information into a plurality of information pieces;
the selecting subunit 3022 randomly selects a first number of information segments;
the generating subunit 3023 generates the first private information according to the selected information fragment.
Optionally, the generating subunit 3023 randomly selects a second number of interference segments, and generates the first private information according to the selected information segments and the interference segments.
Optionally, the information generating unit 302 generates the first private information that changes dynamically according to a preset algorithm when the second private information is static information.
Optionally, the information generating unit 302 determines an information generating rule corresponding to the payment time, and generates the first private information according to the information generating rule and the second private information.
Optionally, the second private information includes: pictures, characters, audio, video.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (14)

1. A method for securing an electronic payment, the method comprising:
receiving a payment request facing a payee sent by a payer;
after the payment operation is completed, sending a payment result of the payment operation and first private information to the payer;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
2. The method of claim 1, wherein prior to sending the payment result of the payment operation and the first private information to the payer, the method further comprises:
saving second private information uploaded by the payee;
and generating first private information according to the second private information.
3. The method of claim 2, wherein the generating first private information from the second private information comprises:
splitting the second private information into a plurality of information fragments;
randomly selecting a first number of information segments;
and generating first private information according to the selected information fragment.
4. The method according to claim 3, wherein the generating first private information according to the selected information piece comprises:
randomly selecting a second number of interference segments;
and generating first private information according to the selected information fragment and the interference fragment.
5. The method of claim 2, wherein the generating first private information from the second private information comprises:
and when the second private information is static information, generating dynamically-changed first private information according to a preset algorithm.
6. The method of claim 2, wherein the generating first private information from the second private information comprises:
determining an information generation rule corresponding to the payment time;
and generating first private information according to the information generation rule and the second private information.
7. The method of claim 1,
the second private information includes: pictures, characters, audio, video.
8. An electronic payment security device, the device comprising:
a request receiving unit which receives a payment request for a payee sent by a payer;
the result returning unit is used for sending the payment result of the payment operation and the first private information to the payer after the payment operation is finished;
wherein the first private information is associated with second private information of the payee, the first private information being used for the payee to verify the payment result.
9. The apparatus of claim 8, further comprising:
the information storage unit is used for storing second private information uploaded by the payee;
and the information generating unit is used for generating first private information according to the second private information.
10. The apparatus of claim 9, wherein the information generating unit comprises:
the splitting subunit splits the second private information into a plurality of information fragments;
selecting subunits, and randomly selecting a first number of information fragments;
and the generating subunit generates first private information according to the selected information fragment.
11. The apparatus of claim 10,
the generating subunit randomly selects a second number of interference fragments, and generates first private information according to the selected information fragments and the interference fragments.
12. The apparatus of claim 9,
and the information generating unit is used for generating the first private information which changes dynamically according to a preset algorithm when the second private information is static information.
13. The apparatus of claim 9,
the information generating unit determines an information generating rule corresponding to the payment time and generates first private information according to the information generating rule and the second private information.
14. The apparatus of claim 8,
the second private information includes: pictures, characters, audio, video.
CN201610193090.XA 2016-03-30 2016-03-30 The method for protecting and device of a kind of e-payment Pending CN107292615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610193090.XA CN107292615A (en) 2016-03-30 2016-03-30 The method for protecting and device of a kind of e-payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610193090.XA CN107292615A (en) 2016-03-30 2016-03-30 The method for protecting and device of a kind of e-payment

Publications (1)

Publication Number Publication Date
CN107292615A true CN107292615A (en) 2017-10-24

Family

ID=60087676

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610193090.XA Pending CN107292615A (en) 2016-03-30 2016-03-30 The method for protecting and device of a kind of e-payment

Country Status (1)

Country Link
CN (1) CN107292615A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870785A (en) * 2017-12-27 2018-04-03 深圳市茁壮网络股份有限公司 One kind pays successfully interface creating method and device
CN111917759A (en) * 2020-07-27 2020-11-10 八维通科技有限公司 Data security interaction method for gas station
CN112101924A (en) * 2020-09-25 2020-12-18 北京达佳互联信息技术有限公司 Information display method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049681A1 (en) * 2000-07-20 2002-04-25 International Business Machines Corporation Secure anonymous verification, generation and/or proof of ownership of electronic receipts
CN1470034A (en) * 2000-08-28 2004-01-21 李树源 System for managing electronic receipt according to electronic commerce and method for managing thereof
CN104115172A (en) * 2011-12-07 2014-10-22 亚马逊技术股份有限公司 Network-accessible point-of-sale device instance

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049681A1 (en) * 2000-07-20 2002-04-25 International Business Machines Corporation Secure anonymous verification, generation and/or proof of ownership of electronic receipts
CN1470034A (en) * 2000-08-28 2004-01-21 李树源 System for managing electronic receipt according to electronic commerce and method for managing thereof
CN104115172A (en) * 2011-12-07 2014-10-22 亚马逊技术股份有限公司 Network-accessible point-of-sale device instance

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870785A (en) * 2017-12-27 2018-04-03 深圳市茁壮网络股份有限公司 One kind pays successfully interface creating method and device
CN111917759A (en) * 2020-07-27 2020-11-10 八维通科技有限公司 Data security interaction method for gas station
CN111917759B (en) * 2020-07-27 2021-02-19 八维通科技有限公司 Data security interaction method for gas station
CN112101924A (en) * 2020-09-25 2020-12-18 北京达佳互联信息技术有限公司 Information display method and device
WO2022062600A1 (en) * 2020-09-25 2022-03-31 北京达佳互联信息技术有限公司 Information display method and information display device

Similar Documents

Publication Publication Date Title
US11468696B2 (en) Systems and methods for imaging identification information
US11640605B2 (en) Method, server, and storage medium for verifying transactions using a smart card
US20210233056A1 (en) Data interaction method, verification terminal, server, and system
KR102272119B1 (en) Method and apparatus for offline interaction based on augmented reality
US10885522B1 (en) Updating merchant location for cardless payment transactions
JP6615113B2 (en) Routing payments to a payment aggregator
CN107025548A (en) Transaction processing method, terminal and system
US20160247142A1 (en) Online payment system and method based on two-dimensional code
TWI633506B (en) A message sending method, system and device thereof
US20130198079A1 (en) Verification of Online Transactions
CN104063790A (en) Method and system for providing authorization through mobile terminal
TW201915894A (en) Method for realizing an installment business based on credit
US10275812B2 (en) Method and apparatus for denying a transaction detected to be initiated outside of a required application on an endpoint device
JP2018185801A (en) Mobile payment method using bar code, apparatus, and server for using the method
JP2020052633A (en) Program, information processing terminal, and information processing method
JP2020126545A (en) Information processing method, information processing apparatus, and information processing program
GB2513602A (en) Authentication system for purchase delivery
US20180075451A1 (en) Transaction Method and Transaction System
CN107292615A (en) The method for protecting and device of a kind of e-payment
JP2020113005A (en) Information processing method, information processing apparatus, and program
CN105516225B (en) Method, device and system for operating object
CN110266686B (en) Data sharing method, apparatus, device and computer readable storage medium
KR20130125344A (en) Online payment method for providing online payment service
US20140324700A1 (en) Method and system for processing object to be processed
CN116523516A (en) A payment method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1245966

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20171024

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1245966

Country of ref document: HK