Current location - Quotes Website - Signature design - Is App aggregation payment POS machine safe?
Is App aggregation payment POS machine safe?
Security of mobile phone POS machine 1. Bind the bank card with the mobile phone. If a mobile phone is lost and picked up by a malicious person, isn't the money in your bank card very dangerous? 1) If the mobile phone is lost, the person who finds it must enter the transaction password of the SD card and the password of the bank card before making a transaction. At the same time, once the loss is reported, the original card will be invalidated immediately, which can ensure the safety of users' funds to the greatest extent. 2) Authoritative cooperative banks to ensure the safety of card use. 3)POS mobile payment has five advantages to ensure its transaction security. Chen Jing, member of the National Informationization Expert Advisory Committee and former director of the Science and Technology Department of the People's Bank of China, also said that there were many discussions about the security of mobile payment at first, but in practice, it was found that although the information transmission of mobile payment was open, its transmission speed was calculated in milliseconds. Technically, it is difficult to crack the transmitted information after it is intercepted. Compared with online banking, the time for users to log on to online banking is calculated in minutes, leaving an opportunity for criminals. So the security of mobile payment is higher than that of online banking. 2. Is the hardware and software of this POS mobile phone safe? Will the card information be leaked, the card will not be paid and the money will be stolen because of the software and hardware itself? 1) The mobile phone itself is certified by the Ministry of Industry and Information Technology, and a production license is issued. Not a fake, stable performance. 2) The mobile phone POS machine adopts the international leading application server and database system. On the bank side, SSL 128-bit encryption algorithm is adopted to ensure the security of information transmission; On the platform side, using PKI/CA electronic signature authentication transmission technology, a secure payment system conforming to the electronic signature method is introduced to encrypt and verify the order information, thus ensuring the confidentiality, authenticity, integrity and non-repudiation of data transmission on the Internet. 3) Powerful firewall system combining software and hardware, perfect intrusion detection system and active defense equipment. Professional anti-hacker, anti-virus and vulnerability scanning technology. Robust J2EE architecture, JSP+JAVABEAN+SML environment, with strong security and scalability. These measures make the security and stability of the system reach a high level, which is also an important factor for successfully passing CSTC certification. China Software Evaluation Center (hereinafter referred to as "the evaluation") was established in 1990, which is a national first-class scientific research institution directly under the Ministry of Industry and Information Technology. In the authentication field, as early as 1999, it was authorized by the former Ministry of Information Industry to carry out the qualification authentication of computer information system integration, and launched the dual-mode authentication service in 2003. It is the earliest authoritative organization in China to carry out certification services. 4) The mobile phone POS machine has five advantages to ensure its transaction security: IC card chips that meet national standards, hardware encryption, and are not easy to crack; The key system is one card and one secret, and each transaction process uses different process keys, so the cracking of one transmission cannot threaten the whole key system; Trajectory information is encrypted and stored, and there is no clear trajectory information outside UnionPay system; The transaction can be completed by double password verification of SD card password and bank card password; Application signature ensures the legitimacy of the application. At the same time, according to the data released by the authoritative investigation agency in the United States and HAPPYPAY, the largest mobile phone POS operator in the United States, POS phones have been used to swipe their cards for billions of times in the United States, and no customer's funds have been lost due to software and hardware reasons, which is also a highlight of this POS machine. Charge 3. How about the merchant version of POS mobile phone and how to charge it? Step 1: according to the personal version method, first bind the personal ID card and bank card, and pass the examination within two working days; Step 2: After the personal version is approved, submit the company's five certificates (electronic version) for use in 4-5 working days. It should be noted that the conditions for POS mobile phones to provide five certificates to merchants are different from the traditional POS capped version. The review time is shorter and the conditions are more relaxed. It is no longer required to be a franchise store, and the running water reaches tens of thousands, as long as the company's license is complete, true and effective, and there is no illegal operation. Charge: the charge for credit card is capped in 50 yuan, and the charge for credit card not exceeding 5,000 yuan is 1%. Credit card is 4,000 yuan, and the charge is 40 yuan, and over 6,000 yuan, only 50 yuan is accepted.