Abstract

This paper presents a new method for online payment of electricity charge based on USBKEY. We integrate payment software with the USBKEY, working with the background management module, to realize the safe and efficient payment for large power customers. Guarantee the construction and promotion of online service channel for electric power enterprises, and realize quality improvement of safety protection level on the marketing automation system in enterprises. Introduction With the development of social economy, the Internet trading occupies more and more proportion in economic activities. So far in 2014 June [1], the scale of Chinese Internet users reached 632 million, which paid use Internet users reached 292 million, accounted for 46.2%. This will produce a lot of new challenges to the electric power enterprise, such as new business models are emerging, electricity customers, increase the surge in the number of service radius, supply increases, customer demand difference power customer service experience to improve, customer and power information interactive etc. How to service based on the existing channels of expanding the service content, improve service means, enhance service efficiency, the introduction of the establishment of new service channel new technologies, to reduce the construction cost, it is essential to improve the channels of customer service quality. Therefore, there is an urgent need to develop a new method for online payment of electricity charge based on USBKEY, to provide the guarantee for the safety of large customers’ online payment for power enterprises. Requirement and Design Through visiting the electric power company, communication with experts who engaged in scientific and technological research of electric power, and the research data of an electric power company, we draw the following conclusions: Customers get the authentication by the USBKEY which containing the certificate provided by electric power company. After we insert the USBKEY into the computer, we should input the PIN code firstly. Only verified before they can start electricity charge payment software [2]. Using this electricity charge payment software, users can maintain personal information, query electricity information, payment, view the history of the bill, and arrears forewarning information. All of the above are encrypted communication process. According to the above requirements, we designed the following entities: A USBKEY, which mainly used for authentication, would be written a certificate while it is issued to the customers. A desktop applications, as the interface of Human computer interaction named payment software, could provide customers a panel for the maintenance of personal information, electricity information, the record of payment etc. Encrypted communication process is transparent to the user. The premise for starting to use this software is that users have a USBKEY which contain a certificate provided by electric power company, and know its PIN code. International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) © 2015. The authors Published by Atlantis Press 1075 A security server, communicating with the desktop application, is responsible for encryption involves the user's personal information and other sensitive information. We decided to adopt the hardware encryption encryption card. Payment software would encrypt the request-URL, and sent it to the security server. The security server decrypts the request field, and then sends a request to the payment platform. Finally it gets results returned, encrypts it and send to the desktop application, the application would display the results. A payment platform, responsible for the interaction between internal network and external network, has been prepared by the electric power company. Payment belongs to the intranet system of electric power company. In order to provide service support, power companies provide Web Services for external network user. We do the firewall protection, only allowing the communication with the security server to keep it safe. A management tool, for manager, could write the certificate to the USBKEY when issuing USBKEY to the user, and binding USBKEY with the user. Similarly, when the users report the loss of USBKEY, the administrator would unbound the relationship between the USBKEY and the user.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call