Science and Technology daily: mobile payment can guarantee security

Source: Internet
Author: User
Keywords Mobile payment Sci-tech daily
Our reporter Shoujian Break the casserole if one day, you are inseparable from the mobile phone and a more financial and consumer functions--at any time to pay, recharge, transfer, etc., you will support and use it? Please pay attention-recent media reports say Beijing is expected to pay for the mobile phone of China UnionPay this year. Just paste a slice of the "joint payment card" with the same size as the SIM card into the SIM card on the phone. Insert the cell phone card slot, opened and bound with UnionPay logo bank card, set access password, that is, the completion of the Silver Joint machine payment registration process, consumers can use mobile phones to achieve payment, recharge, transfer and other financial and consumer business. To deal with the business need to first use the mobile phone to pay the payment website, enter access password, and then through the menu to select Business and enter the bank card password.  Prior to this, the Silver Joint machine payment business has been in Shanghai, Shandong and other 7 provinces and cities to carry out the pilot. But its security risks are also questioned by users: if the phone lost how to guarantee the security of funds?  Mobile payment account how not to be stolen and other similar problems gradually surface.  Pay security is a hot spot when reporters in the online QQ group, "You will use the mobile phone online payment" Such a topic interview group of netizens, although all young people, but to this new thing also diverged "conservative type" and "open" two factions. Netizen "Prophet-shareholder" opened the mobile phone payment two months ago, but he is still cautious, he thought that the mobile phone online payment "inferior to Online banking", "already has the ' net silver ' and the bank card, the use is also very convenient, how does the handset pay again?" "This function is not yet mature enough," Netizen "ran-it" think, "mobile phone payment caused by the security problem will be very serious." "Netizen" cold Jiang-education "worry:" Mobile phone lost, steal how to do? It would be safer to brush the bank card. However, some netizens think that "now the mobile phone is the real name, and its possible crime problems can be verified and avoided." "If the penetration rate of mobile phone payment and the degree of security reached to a certain extent will be accepted and used, because the advantages are obvious: convenient, fast." "For the Prophet-shareholder point of view, some netizens think:" This is the user experience problem, if there is better, who will use. "And in fact," whether the mobile phone payment or the personal computer payment, its essence or realize the transfer function, all belong to ' network payment ' this big category, but they rely on the equipment and support environment is different, its essence is to achieve convenient and fast and safe transfer function.  Yangminggang, deputy dean of the Institute of E-government, Peking University. Yangminggang that the mobile phone payment for its convenience, fast, safe, will inevitably become public shopping when the first choice to pay. But the biggest security issue for mobile phones is that users have bundled their bank cards with secure payment chips in their phones, so will users disclose their account information in various ways, including private information such as payment passwords, when using mobile phones?  How can security be guaranteed when the phone that binds the personal bank account information is lost or stolen? "DomesticBank cipher Algorithm "There are many kinds of mobile phones that need to be developed, but not all mobile phones have the ability to pay." Yangminggang said that only by adding a special payment and safety patch on a mobile phone can the handset be able to communicate with the bank and provide the most basic environment for the transfer.  The patch also has a high security protection function to ensure the security of the account information during the transaction or when the user uses the mobile phone. "The security of the account involved in mobile payment is very prominent, which requires the patch to provide a reliable means of security encryption." "Yangminggang introduced," the current domestic financial and banking system security encryption algorithms have adopted the western standards, in China's financial system increasingly perfect and development at the same time, speed up domestic independent intellectual property rights of the domestic Bank cipher algorithm system research appears particularly important, this is not only related to the security of individual accounts, It also involves the interests of the national level. Therefore, China needs to launch and apply a series of products and applications based on the domestic bank cipher algorithm system as soon as possible. "Yangminggang suggested that mobile payment as a more efficient means of payment, first of all, the use of High-strength encryption algorithm to ensure that the user's account and input password information is not intercepted or stolen.  Second, a scientific identification and identification system should be used, so that people who steal the user's mobile phone or know the user's bank password can not understand the user's account status or steal the user's account funds. Mobile virus can not be ignored in fact, for mobile phone payment people are most concerned about security issues.  What if the cell phone gets infected? "Any security means will not be absolutely guaranteed to be safe, and the phone will pay the same." "Yangminggang is equally concerned," as we all know, mobile Trojans and personal computer Trojan virus principle, will focus screenshots or steal some of the user's important information, including mobile phone payment has been installed on the personal bank account information. This requires mobile phone users to be careful to log in or do not browse those sites that may pose a threat to security, and not download unsolicited mobile software as much as possible. "Although" the use of Trojan virus to steal or disguise other ways to steal user account data will certainly exist, technically speaking, this crime will leave clues to check, but the cost and cost will be very high, the loss of the bank or mobile payment service providers will not pay, This is the same reason that a bank account is stolen after a virus in one's computer. "Yangminggang points out," the service provider of mobile payment only provides a fast and secure payment platform, this platform is reliable in theory and practical application. But some of the user's behavior is likely to lead to loss of their own account funds, such as the use of mobile phone with others, or the payment password to inform others, so the user's self-protection awareness is equally important. "Beijing Jinshan Security Software Co., Ltd. Wireless Application division director Wang Yingchi said that the timely interception of mobile phone virus, virus database is a vital factor." Security software developers will be able to follow up on the possible virus, comparison analysis, through real-time update virus library, network cloud killing way to helpThe user effectively intercepts the virus to protect the handset to pay the security. "At the same time, once the security of the user account to intercept the virus, we will promptly report to the public security organs to maintain a good environment for the payment of mobile phones." "To be ready before popularizing" mobile phone business in the country has actually been done for more than three or four years, the mainstream of the solution is relatively safe, some areas are already in use.  Yangminggang said, the mobile payment each link design strict, specific, perfect user verification and timeout processing measures, that is to say, no matter which link problem, payment behavior will not succeed. "But the mobile payment business is going to be widespread nationwide, must solve the following problems: The patch used in the encryption algorithm to mature and stable, it is best to use the domestic password algorithm standards; for the 3G Mobile phone security protection system needs supporting and support (for example, in the provision of wireless payment patches at the same time provide relevant Trojan horse software and other measures) Strict management of the preset payment patch of cooperation channels to provide mobile products, to prevent the disclosure of potential user account information, to develop a convenient and efficient user Service system to provide users with timely guidance and help.  "Yangminggang said. Meanwhile, Yangminggang suggested that the mobile payment business in the promotion of popularization before the need to do the following several aspects of preparation: first, let the vast number of mobile phone users understand the advantages of mobile phone payment and security, which is the most fundamental; The banking system is upgraded to the wireless Payment business module or interface; In addition, the improvement and promotion of mobile payment methods and the development of the technology of Internet of things will make people pay more and more changes in the supermarket.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.