Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Management System of Mobile Payment Based on Short-range Visible Light Communication
Zhao Xiaomeng,Zhou Junjie
Guangdong Science & Technology Infrastructure Center; Guangdong Provincial Key Laboratory of High Performance Computing
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of mobile internet, the demand for management of mobile payment information is increasing.Nowadays there are many normal interactive mode of mobile payment information like IC card, interactive mode based on mobile internet, Near Field Communication and so on, but these means have some disadvantages. In view of the problem, a management system of mobile payment based on short-range Visible Light Communication is proposed. Firstly, the system architecture is designed. Secondly, the software and hardware are designed. Finally, the security of information interaction of the system is analyzed based on Visible Light Communication protocols. The system has many advantage, such as security, convenience, low cost and quick popularization.
Key wordsVisible Light Communication      mobile payment      information interaction      information security     
:  TN99  
  TN929.5  

Cite this article:

Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication. Computer & Telecommunication, 2017, 1(10): 10-13.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2017/V1/I10/10

[1] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[2] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[3] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[4] CHEN Jian-qing, MAZhen-yi. The Exploration and Practice of Intelligent Medical Treatment to Promote the Reengineering of Outpatient Service Process[J]. 电脑与电信, 2018, 1(1-2): 58-60.
[5] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[6] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[7] Xu Haidong. Research and Suggestion on Data Privacy Protection in Cloud Computing[J]. 电脑与电信, 2016, 1(8): 112-113.
[8] Lai Jinzhi. Research on Information Security Protection System of Campus Network in Higher Vocational Colleges[J]. 电脑与电信, 2016, 1(7): 65-67.
[9] Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection[J]. 电脑与电信, 2016, 1(7): 68-70.
[10] Yu Xiangqian. Research on the Tertiary Hospital Informatization Level Protection Plan[J]. 电脑与电信, 2016, 1(6): 65-66.
[11] Zhao Xiaomeng, Li Qiushi, Fang Shaoliang, Lu Zhixing. Visible Light MIMO Clock Synchronous Communication System Based on Image Sensor[J]. 电脑与电信, 2016, 1(11): 19-23.
[12] Zhong Gengfang. Study on the Enterprise Mobile Application Security Scheme[J]. 电脑与电信, 2015, 1(8): 64-66.
[13] Zhang Tao, Yin Mengjia, Chen Xiaowen. Design and Research on Information Security Course Experiment Teaching[J]. 电脑与电信, 2015, 1(5): 19-21.
[14] Li Yingjie. The Application of VPN Technology in Computer Network Information Security[J]. 电脑与电信, 2015, 1(5): 27-28.
[15] Zhang Zheng. Study on the Control of Modern Enterprise Information Security Ri[J]. 电脑与电信, 2015, 1(4): 74-76.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd