China's original invention of "digital currency offline payment wallet"

2021-08-01 23:11

Invented by Xu Wei, the inventor of the “code chain patent pool” (code scanning link, unified code issuing patent technology), the inventor of the global QR code scan, and the domestic patent authorized on March 3, 2020: “Mobile terminal and service provision Device connection system and service provision method"-CN106412041B (application number: CN201610835052.X application date: 2016-09-20), which covers "digital currency offline payment wallet", obtained patent authorization in Singapore on June 7, 2021 . This is the first foreign country's authorization for the patent layout internationally. This means that the "digital currency offline payment wallet" originally invented by China will be widely used internationally from then on.

It is understood that the invention provides a system for connecting a mobile terminal and a service providing device and a service providing method. The service providing device and the mobile terminal are directly connected through the interface of the mobile terminal. The identification information of any one or more of the user, the first mobile terminal, and the service providing device, and/or various auxiliary information such as information bound to the identification information, is provided by the service providing device alone. Or through the cooperation of the service providing equipment and the mobile terminal and/or the back-end server to provide services. Through the active type, passive type or a combination of the two, the invention can quickly and easily realize sensor access, and effectively improve the security of operations such as mobile payment.

The inventor Xu Wei analyzed the technology of the invention and said that the first generation of digital currency payment wallets scan code access payment, as well as touch access payment, face recognition access payment, and the payment is through WeChat, Alipay, etc. Payment by third-party payment tools. Our money is actually in the cloud of a third party, that is, your money is not in your hands, but by a third party in charge. This third party is still an enterprise, especially if there is a problem with the three views of this enterprise, it will trigger the whole world. The big problem of society.

And this patent can be understood as the "money" in our mobile phone (or the mobile phone's SM card, or SD card, and USB-Shield and other hardware encryption devices), you can pay without relying on a third party, or even if there is no network. Under the circumstances, offline payment is completed, surpassing the current scan code payment, and supports the "DCEP" digital renminbi payment method.

   Therefore, this is a way to continue to use the "scanning" scan code payment convenience and usage habits, and to obtain a more secure (hardware encryption) and reliable (your banknotes are the master) payment method. Therefore, it is referred to as the "digital currency offline payment wallet" patent, which can also be called a "hard wallet" compared to the "fog (device)" computing of cloud computing.

Some time ago, when there was a heated discussion on the Internet about which information technology such as scan code access payment, touch access payment, face recognition access payment, etc. The incident of “unlocking 19 unfamiliar domestic smartphones within minutes” has raised public doubts about the security of face recognition access technology. The NFC near-field communication technology that supports tap-to-pay is evolved from the integration of non-contact radio frequency identification (RFID) and interconnection technologies, combining inductive card readers, inductive cards and point-to-point functions on a single chip , Can identify and exchange data with compatible devices within a short distance. The operating frequency is 13.56MHz. Users who use this mobile payment solution must change to a special mobile phone. Mobile phone users need to rely on mobile phones equipped with payment functions to walk around. Such chaos of unsafe payment shows that without a secure information and communication ecosystem, the security of information and communication cannot be guaranteed. And the offline payment function of this invention is compared with the wallet on a third-party platform that lacks security. If a third-party payment platform server fails or the platform fails, the money disappears. The digital currency offline payment wallet is even more Safe, reliable and reasonable.

   Singapore’s authorization of this patent indicates that the global application of the patented technology has been opened.

   It is also understood that the invention also has 13 related digital currency, digital wallet, digital asset transaction payment solutions, the priority of the invention is 2016, and the Central Bank Digital Currency Research Institute was officially established in July 2017.

   This will also provide a safer and more reliable patented technology for the global promotion and application of digital renminbi. At the same time, it also provides a good patent foundation for the "unified code issuing" invention invented by the inventor.

   Today's human society has entered the era of the Internet of Things. The Internet of Things is the use of communication technologies such as the Internet to connect people, machines, and things together in new ways to form a connection and communication between people, people and things, and things and things, and then realize informatization and remote management and control. And an intelligent network. It is called the third wave of the development of the world's information industry after computers and the Internet.

   In the code chain digital ecosystem constructed by Xu Wei based on his invention of sweeping patent communication technology, people, machines, and things establish digital identities through “codes”. In the digital world constructed by the code chain, the code represents the ownership of the identity information of people, machines, and things. After people, machines, and things can be implanted with their own DNA in a code, they can be stored in the code chain network to ensure the authenticity of the information. . People access by scanning the code, integrate the geographic location represented by the latitude and longitude of the three-dimensional world with the digital person, and then map it to the four-dimensional world to generate a unique grid code (a two-dimensional code representing the grid of the Internet of Things).

   In the multiple parallel worlds specific to the code chain, the uniqueness, security, immutability of the code, as well as the huge number and timestamp, have become the basis for building the digital world. Based on the identity system of this code, the code chain system builds its own value delivery network for each digital person. This social network that can deliver value is called a value chain. "Value chain" is a network of interpersonal and material relationships constructed by users based on coded digital identities. Because the problem of online privacy is rooted in the genes of the traditional Internet.

  To solve this problem fundamentally, it is necessary to rebuild a trust network through a new ecology, and through code encryption, so that everyone and things can well protect their privacy. As a result, the security of the code chain, the distributed network, and the three major characteristics of non-tampering have become the most solid foundation for the operation of IoT devices. IoT devices identify users through cloud servers, and they store identification data in these cloud servers. These data can easily be leaked, stolen or plagiarized, and applications based on these data will also be subject to great security threats. Compared with the client-server model of the Internet of Things, the code chain system uses distributed information storage to protect these user identities, and users can only publish information according to the corresponding QR code to ensure that the identity is unique and cannot be tampered with. This is a secure and tamper-proof identification that cannot be achieved by existing third-party platforms. What is most lacking in the direct interaction between things is the protocol for the interaction between things, that is, the application layer protocol. What the code chain solves is the application layer protocol. There are some common things between things, which can be abstracted out. Through encoding, each device has a unique code, which is called one thing, one code, one pass, which is both an ID and a private key. The security bottom layer can use the code chain architecture to increase the bottom layer guarantee. Therefore, through the unified code sending, the whereabouts of the money in the digital offline wallet can be tracked. This is the application of the offline wallet patent, which adds another layer of security.