CN106131037A - A kind of internet trade method - Google Patents
A kind of internet trade method Download PDFInfo
- Publication number
- CN106131037A CN106131037A CN201610588294.3A CN201610588294A CN106131037A CN 106131037 A CN106131037 A CN 106131037A CN 201610588294 A CN201610588294 A CN 201610588294A CN 106131037 A CN106131037 A CN 106131037A
- Authority
- CN
- China
- Prior art keywords
- information
- transaction data
- sent
- payment
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of internet trade method, comprised the following steps: (1) PC has received the transaction request of user, and described transaction request is sent to backstage trading server, and transaction data is encrypted by server;(2) backstage trading server generates the payment information of encryption according to described transaction data, and payment information is sent on user PC display;(3) connecting PC by payment affirmation terminal and resolve described payment information, the transaction data after resolving is sent in payment affirmation terminal display;(4) user checks the transaction data of display in payment affirmation terminal, and after user confirms, the information after payment affirmation terminal will be digitally signed is sent to transaction page, and transmits to backstage trading server;(5), after backstage trading server is verified, internet trade is carried out according to described transaction data.The present invention uses encryption technology to be encrypted Transaction Information, is capable of the discriminating to raw information and non-repudiation by digital signature, makes transaction safer.
Description
Technical field
The present invention relates to technical field of electronic commerce, a kind of internet trade method.
Background technology
Along with popularizing of the Internet, ecommerce is increasingly becoming the most most popular trade mode.This is new in ecommerce
The mode of doing business of type, just with its high efficiency, low payment, high yield and global feature, is paid attention to by business and government,
And the bright spot being increasingly becoming in national economy activity.The original intention of Internet design be open, the sharing of resource and
Interoperability, the originally safety of information and network does not obtain enough attention.Along with the universal of internet and information
Source, the explosivity of application increase, and safety issue the most constantly occurs, the safety problem of ecommerce is the most prominent.At present,
The safety problem of ecommerce mainly has: information theft, information are distorted, information is palmed off, denial etc. of concluding the business, and causes transaction to there is peace
Full hidden danger.
Summary of the invention
Not enough for above-mentioned prior art, the present invention provides a kind of safer internet trade method.
The internet trade method that the present invention provides is achieved through the following technical solutions:
A kind of internet trade method, it is characterised in that comprise the following steps:
(1) PC receives the transaction request of user, and described transaction request is sent to backstage trading server, and server is to transaction
Data are encrypted;
(2) backstage trading server generates the payment information of encryption according to described transaction data, and is sent to payment information use
Show on the PC of family;
(3) connecting PC by payment affirmation terminal and resolve described payment information, the transaction data after resolving is sent to pay
Confirm to show in terminal;
(4) user checks the transaction data of display in payment affirmation terminal, and after user confirms, payment affirmation terminal will count
Information after word signature is sent to transaction page, and transmits to backstage trading server;
(5), after backstage trading server is verified, internet trade is carried out according to described transaction data.
Encryption in described step 1 uses unsymmetrical key technology, method particularly includes: offer pair of secret keys, one
PKI, a private key, both differ, and can not calculate mutually;PKI is that private key is for receiving to key disclosed in other people
Side has oneself;The sender of information uses the public keys of recipient information to be encrypted, and the ciphertext of formation is transmitted in a network
To the recipient of information;After the recipient of information receives ciphertext, with the private cipher key of oneself, ciphertext is deciphered, obtain information
Original text.
The invention has the beneficial effects as follows: use encryption technology that Transaction Information is encrypted, can be real by digital signature
Now discriminating and the non-repudiation to raw information, makes transaction safer.
Detailed description of the invention
By embodiment, technical scheme will be clearly and completely described below, it is clear that described reality
Execute a part of embodiment rather than whole embodiments that example is only the present invention.Based on the embodiment in the present invention, this area skill
The every other embodiment that art personnel are obtained under not making creative work premise, broadly falls into the model of present invention protection
Enclose.
A kind of internet trade method, comprises the following steps:
(1) PC receives the transaction request of user, and described transaction request is sent to backstage trading server, and server is to transaction
Data are encrypted;
(2) backstage trading server generates the payment information of encryption according to described transaction data, and is sent to payment information use
Show on the PC of family;
(3) connecting PC by payment affirmation terminal and resolve described payment information, the transaction data after resolving is sent to pay
Confirm to show in terminal;
(4) user checks the transaction data of display in payment affirmation terminal, and after user confirms, payment affirmation terminal will count
Information after word signature is sent to transaction page, and transmits to backstage trading server;
(5), after backstage trading server is verified, internet trade is carried out according to described transaction data.
Further, the encryption in described step 1 uses unsymmetrical key technology, method particularly includes: provide a pair
Key, a PKI, a private key, both differ, and can not calculate mutually;PKI is to key disclosed in other people,
Private key is that recipient oneself has;The sender of information uses the public keys of recipient information to be encrypted, and the ciphertext of formation exists
Network passes to the recipient of information;After the recipient of information receives ciphertext, with the private cipher key of oneself by ciphertext solution
Close, obtain the original text of information.
Embodiment described above only represents embodiments of the present invention, and it describes more concrete and detailed, but can not manage
Solve as limitation of the scope of the invention.It should be pointed out that, for a person skilled in the art, without departing from structure of the present invention
On the premise of think of, it is also possible to make some deformation and improvement, these broadly fall into scope.
Claims (2)
1. an internet trade method, it is characterised in that comprise the following steps:
(1) PC receives the transaction request of user, and described transaction request is sent to backstage trading server, and server is to transaction
Data are encrypted;
(2) backstage trading server generates the payment information of encryption according to described transaction data, and is sent to payment information use
Show on the PC of family;
(3) connecting PC by payment affirmation terminal and resolve described payment information, the transaction data after resolving is sent to pay
Confirm to show in terminal;
(4) user checks the transaction data of display in payment affirmation terminal, and after user confirms, payment affirmation terminal will count
Information after word signature is sent to transaction page, and transmits to backstage trading server;
(5), after backstage trading server is verified, internet trade is carried out according to described transaction data.
A kind of internet trade method the most according to claim 1, it is characterised in that: the encryption in described step 1 is adopted
Use unsymmetrical key technology, method particularly includes: providing pair of secret keys, a PKI, a private key, both differ, also
Can not calculate mutually;PKI is to key disclosed in other people, and private key is that recipient oneself has;The sender of information uses and connects
Information is encrypted by the public keys of debit, and the ciphertext of formation passes to the recipient of information in a network;The recipient of information connects
After receiving ciphertext, with the private cipher key of oneself, ciphertext is deciphered, obtain the original text of information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610588294.3A CN106131037A (en) | 2016-07-25 | 2016-07-25 | A kind of internet trade method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610588294.3A CN106131037A (en) | 2016-07-25 | 2016-07-25 | A kind of internet trade method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106131037A true CN106131037A (en) | 2016-11-16 |
Family
ID=57290661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610588294.3A Withdrawn CN106131037A (en) | 2016-07-25 | 2016-07-25 | A kind of internet trade method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106131037A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108401494A (en) * | 2018-02-27 | 2018-08-14 | 福建联迪商用设备有限公司 | A kind of method and system of transmission data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101840549A (en) * | 2010-05-17 | 2010-09-22 | 成都中联信通科技有限公司 | System and method for realizing mobile payment in internet sales |
CN101848090A (en) * | 2010-05-11 | 2010-09-29 | 武汉珞珈新世纪信息有限公司 | Authentication device and system and method using same for on-line identity authentication and transaction |
CN102054258A (en) * | 2010-12-16 | 2011-05-11 | 中国建设银行股份有限公司 | Electronic bank safety certificating method and system based on mobile equipment |
CN103136664A (en) * | 2013-03-06 | 2013-06-05 | 天地融科技股份有限公司 | Trading system and trading method of smart card with electronic signature function |
-
2016
- 2016-07-25 CN CN201610588294.3A patent/CN106131037A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101848090A (en) * | 2010-05-11 | 2010-09-29 | 武汉珞珈新世纪信息有限公司 | Authentication device and system and method using same for on-line identity authentication and transaction |
CN101840549A (en) * | 2010-05-17 | 2010-09-22 | 成都中联信通科技有限公司 | System and method for realizing mobile payment in internet sales |
CN102054258A (en) * | 2010-12-16 | 2011-05-11 | 中国建设银行股份有限公司 | Electronic bank safety certificating method and system based on mobile equipment |
CN103136664A (en) * | 2013-03-06 | 2013-06-05 | 天地融科技股份有限公司 | Trading system and trading method of smart card with electronic signature function |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108401494A (en) * | 2018-02-27 | 2018-08-14 | 福建联迪商用设备有限公司 | A kind of method and system of transmission data |
CN108401494B (en) * | 2018-02-27 | 2020-10-30 | 福建联迪商用设备有限公司 | Method and system for transmitting data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2014101545A4 (en) | Software behavior monitoring and verification system | |
CN102801710A (en) | Networked transaction method and system | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
CN105407079A (en) | Novel terminal safety soft secret key management method | |
CN102789607A (en) | Network transaction method and system | |
CN102790767B (en) | Information safety control method, information safety display equipment and electronic trading system | |
CN101833724A (en) | System and method for saving e-commerce data telegraph text and forming judicial evidence by other party | |
CN102609834A (en) | Countersigning method and system | |
CN104079413A (en) | Enhancement type one-time dynamic password authentication method and system | |
Zhang | A study on application of digital signature technology | |
CN102693478A (en) | Trading method of bid security during bidding procedure and system thereof | |
CN102857487A (en) | Method and system for remote tender invitation | |
JP2024003002A (en) | Using virtual blockchain protocols to implement fair electronic exchange | |
CN106131037A (en) | A kind of internet trade method | |
TW200806002A (en) | Message authentication system and message authentication method | |
CN108900472A (en) | The transmission method and device of information | |
CN104618306A (en) | Novel integrated mobile phone data transmission key signal encryption method | |
CN206461659U (en) | A kind of LAN services platform based on router | |
CN116017437A (en) | Multiparty collaborative signature method and device suitable for mobile communication | |
CN103326992B (en) | A kind of for realizing the electronics notarization system and method for trusted mailbox | |
CN104318432A (en) | Trade information transmission method and system and mobile terminal | |
Hu et al. | A method based on MD5 and time for preventing deception in electronic commerce | |
Hu | The study of E-commerce security protocol | |
CN102073801A (en) | Method for confirming data in CPU (Central Processing Unit) card | |
Li et al. | Security study of mobile business based on WPKI |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161116 |
|
WW01 | Invention patent application withdrawn after publication |