期刊文献+

基于可见光的手机支付系统设计 被引量:3

Design of mobile phone payment system based on visible light
下载PDF
导出
摘要 针对手机支付过程中存在的便捷性差、安全性能低等一系列问题,提出了基于可见光的手机支付系统设计。根据可见光通信原理,以手机手电筒的灯光作为传输媒介进行数据传输,收费端的光电接收装置接收、判读并存储支付数据实现支付功能。整个支付过程能在1~2s时间内完成,支付距离在0~40cm范围内。该系统能初步实现利用可见光进行手机支付。 This paper puts forward the design of mobile payment system based on visible light for a series of problems such as poor convenience and low security performance in mobile payment process. The system ac- cording to the principle of visible light communication, using mobile phone lighting as the transmission medi- um for data transmission, the light receiving device at the charging terminal receives, interprets and stores the payment data to realize the payment function. The entire payment process can be completed in 1-2s, the pay distance in the 0--40cm range. The system can initially achieve the use of visible light for mobile payment.
出处 《光通信技术》 北大核心 2018年第1期46-49,共4页 Optical Communication Technology
基金 2016年省级大学生创新创业训练计划项目(201611116051)资助
关键词 可见光通信 手机支付 光电接收 APP visible light communication mobile payment photoelectric receiving APP
  • 相关文献

参考文献7

二级参考文献41

  • 1赵文,戴宗坤.WPKI应用体系架构研究[J].四川大学学报(自然科学版),2005,42(4):725-730. 被引量:15
  • 2刘坚斌,李培咸,郝跃.高亮度GaN基蓝光与白光LED的研究和进展[J].量子电子学报,2005,22(5):673-679. 被引量:24
  • 3丁德强,柯熙政.可见光通信及其关键技术研究[J].半导体光电,2006,27(2):114-117. 被引量:82
  • 4ABOBA B, BLUNK L, VOLLBRECHT J, et al. IETF RFC 3748, Extensible Authentication Protocol (EAP) [S]. Reston: IETF, 2004.
  • 5WANG L, SRINIVASAN B, BHATTACHAP, JEE N. Security analysis and improvements on WLANs [J]. Journal of Networks, 2011, 6(3): 470 -481.
  • 6IEEE-SA. IEEE Std 802.1X-2001, port-based network access control [S]. Washington, DC: IEEE Computer Society, 2001.
  • 7TURAB N, MOLDOVE F. A comparison between wireless LAN security protocols [J]. Eleetrieal Engineering and Computer Science, 2009, 71(1): 61-80.
  • 8LEI J, FU X M, HOGREF D, et al. Comparative studies on authentication and key exchange methods for 802. 11 wireless LAN [J]. Computers and Security, 2007, 26(5): 401-409.
  • 9DANTU R, CLOTHIER G, ATRI A. EAP methods for wireless networks [J]. Computer Standards and Interfaces, 2007, 29(3): 289 - 301.
  • 10FUNK P, WILSON S B. IETF RFC5281, extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TYLSv0) [S]. Reston: IETF, 2008.

共引文献101

同被引文献33

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部