CN102521924A - Online electronic purse recharging method of cross-platform intelligent card - Google Patents
Online electronic purse recharging method of cross-platform intelligent card Download PDFInfo
- Publication number
- CN102521924A CN102521924A CN2011103968097A CN201110396809A CN102521924A CN 102521924 A CN102521924 A CN 102521924A CN 2011103968097 A CN2011103968097 A CN 2011103968097A CN 201110396809 A CN201110396809 A CN 201110396809A CN 102521924 A CN102521924 A CN 102521924A
- Authority
- CN
- China
- Prior art keywords
- card
- money
- party
- blacklist
- record
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to a data processing system or method special suitable for administration, business, finance, management, supervision or prediction purpose, in particular to an online electronic purse recharging method of a cross-platform intelligent card. The online electronic purse recharging method of the cross-platform intelligent card comprises the steps of: firstly, placing the intelligent card on a card reader; pre-reading the intelligent card; reading the intelligent card by the card reader; inputting the recharging amount information; recording current information of the intelligent card; rewriting a mark in the intelligent card by the card reader; and displaying recharging results on third-party client programs. The online electronic purse recharging method of the cross-platform intelligent card, provided by the invention, can be cooperated with any third party with an independent running network, such as a bank, a post office and the like, the issuing and recharging of the intelligent card are realized by third-party online stores, and the rigorous requirements of these third parties on data security are satisfied.
Description
Technical field:
The present invention relates to a kind of data handling system or method that is specially adapted for administration, commerce, finance, management, supervision or prediction purpose, further relate to the online stored value card recharge method of a kind of cross-platform cross-platform smart card.
Background technology:
Current, public smart card billing system and city all-purpose card Fare Collection System have been opened in a lot of cities, below are referred to as smart card system.In the system of these city operations, to smart card issue and block in the stored value card module of supplementing with money develop and safeguard by a company often.When the user hopes to carry out professional cooperation with other businessman, must let original smart card system developer carry out the modification of software or the corresponding techniques data is provided, could realize required business development.
Give an example: if smart card system operator hopes to cooperate with bank, utilize the site advantage and the fund advantage of bank, accomplish the distribution of smart card and the work of supplementing with money of stored value card.Bank has independently banking management system and network, and bank often from the consideration of security aspect, does not allow the smart card system developer in bank finance system and network, to carry out program.Therefore, the smart card system developer must provide the complete technical solution of a cover to bank, and communication system and smart card system through bank carry out communication, thus the distribution and the recharging service of completion smart card.Different in addition banking systems; Use different operating systems; Therefore the technical solution that provides of smart card system developer must be cross-platform, has secondary development function, so just can let smart card system under the operating system of bank, move.
Because above various reasons causes very difficulty of the professional expansion of smart card system.
How developing a cross-platform, that can carry out secondary development, the safe online stored value card recharge method of smart card, is the urgent problem of pendulum in face of ours.
Summary of the invention:
The purpose of native system exploitation is, overcomes the technical deficiency of original system, utilizes operation of serial-port and Socket communication mechanism, and function cross-platform, secondary development is provided.Simultaneity factor provides the integrity ensuring of safety of data and transaction.
Native system is realized through following technical scheme:
Cross-platform smart card on-line operation system; Comprise: card reader; With third party's client of the corresponding one by one serial connection of card reader, the third party's communication program end that is connected in series with above third party's client respectively, the smart card liquidation center transaction middleware program end that is connected in series respectively with above third party's communication program; With the liquidation center that smart card liquidation center transaction middleware program end is connected in series successively, liquidation center has the encryption and decryption function.
The built-in embedded software of said card reader is used for smart card is carried out read-write operation; The SAM card is installed in the card reader, is used for the encryption and decryption of transmission course, in the SAM card many group keys are set, by the embedded software picked at random to data; Card reader provides special-purpose smart card read write command, is used for smart card is operated.
Card reader can be the external card reader, is connected with the main frame at third party's client place; Also can be built-in card reader, be connected through serial ports with any in ATM, bank's enquiry machine, the POS machine equipment.
The pairing smart card of native system has the blacklist sign, and table is known the current state of card.
The cross-platform smart card on-line operation method that on said system, realizes, process is following:
At first, smart card is placed on the card reader,
Step 1: third party's client-side program sends to card reader and supplements preparatory Card Reader instruction with money; Card reader is passed through third party's client, third party's communication program, transaction middleware program with the form of ciphertext with the essential information of smart card successively, arrives smart card liquidation center database at last; Encryption equipment is supplemented key with money through deciphering back inquirying card type parameter, calculating; The Card Type parameter successively through transaction middleware program, third party's communication program, arrives third party's client with form expressly; Comprise the smart card operation information via encryption equipment encryption of supplementing key with money, pass through transaction middleware program, third party's communication program, third party's client successively, arrive card reader with the form of ciphertext;
Step 2: the card reader Card Reader, judge card state and transaction process tag; If blacklist indicates normally with launching, get into and supplement the interface with money, change step 3, if normal any one sign of blacklist and process tag is undesired, the commentaries on classics step 7;
Step 3: operating personnel import recharge amount information through third party's client-side program, and send the instruction of preliminary filling value to card reader; Card reader at first is rewritten as 4 with the blacklist sign by 0, and process tag is rewritten as 11 by 0; Supplement the information formation wallet of smart card with money ciphertext then, through third party's client, third party's communication program, transaction middleware program, arrive smart card liquidation center database at last successively;
Step 4: smart card liquidation center database carries out stored value card and supplements the operation validity check with money; If it is legal; The recording card current information carries out stored value card and supplements record with money, and confirmation message is supplemented in formation with money; Through transaction middleware program, transaction middleware program, third party's client-side program, arrive card reader with the form of ciphertext;
Step 5: card reader is rewritten sign in the card, and process tag is rewritten as 12 by 11, according to cipher-text information smart card is supplemented with money then, supplement completion with money after, the blacklist sign is rewritten as 0 by 4, process tag is rewritten as 0 by 12;
Step 6: on third party's client-side program, show recharging result;
Step 7: card reader will comprise card number, blacklist sign, the process tag information of concluding the business is recovered message at interior stored value card and passed through third party's client, third party's communication program, transaction middleware program successively with the form of ciphertext, arrive smart card liquidation center database at last;
Step 8: this step has three kinds of recovery schemes, first scheme; Generate stored value card and recover ciphertext, its hints on operation is that the change blacklist is masked as 0, and the change process tag is 0, and other content is constant in the card; Alternative plan: generate stored value card and recover ciphertext, its hints on operation is that remaining sum changes into consistently with database in the stored value card, and the change blacklist is masked as 0, and the change process tag is 0, and interior other content of card is constant; Third party's case: artificial treatment, the principle of artificial treatment is following:
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database and remaining sum in the card write down consistently, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is implemented alternative plan greater than the remaining sum record in the card;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent with the remaining sum record in the card, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent greater than the record of the remaining sum in the card, implements alternative plan;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, and is not also having the last item record in the statement of account, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented alternative plan supplementing not statement of account with money or in the statement of account the last item record having been arranged;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented third party's case supplementing not statement of account with money and all not had the last item record in the statement of account;
Step 9: will recover ciphertext and with form expressly subsidiary with restore data through transaction middleware program, third party's communication program, third party's client; Arrive card reader, card reader sends to third party's client with data with form expressly after executing recovery operation;
Again execution in step two then.
Card reader forms encrypt data and comprises in the said step 1: random number, the core of the card sheet number, card number, Card Type number, card authentication code, date of expiration, the date of launching, key card number.
The Card Type supplemental characteristic comprises in the said step 1: server time, Card Type title, wallet bound.
Smart card operation information also comprises except that supplementing key with money in the said step 1: random number, server time.
Supplementing the interface in the said step 2 with money can real information comprise: the core of the card sheet number, card number, Card Type number, cash pledge, date of expiration, the date of launching, wallet accumulative total are supplemented number of times, the wallet amount of money, annual test date, blacklist sign, key card number with money.
The cipher-text information of supplementing with money in the said step 3 comprises: random number, the core of the card sheet number, card number, Card Type, accumulative total wallet are supplemented number of times with money, accumulative total is supplemented volume, wallet balances, this recharge amount, key card number with money.
Validity checking in the said step 4 comprises one or more of following inspection: according to Card Type and operator number inquiry whether card authority on sale, inquiry whether be moved back card, inquiry whether be report the loss whether card, inquiry are the blacklist cards, judge whether recharge amount legal, judgement supplement with money after remaining sum whether legal.
The content of recording card current information comprises a kind of in the following content at least in the said step 4: the accumulative total wallet is supplemented number of times with money, is supplemented preceding remaining sum with money, recharge amount, supplement the back remaining sum with money.
The confirmation message content of supplementing with money in the said step 4 comprises a kind of in the following content at least: random number, supplement time, card number, key card number with money, supplement with money before wallet accumulative total supplement number of times with money, supplement that back wallet accumulative total is supplemented number of times with money, supplemented preceding remaining sum with money with money, this recharge amount, supplement the back wallet balances with money.
Showing in the said step 6 shows that information comprises: card number with supplement with money the back remaining sum.
Display message in the said step 6 comprises: card number with supplement with money the back remaining sum.
The present invention has following advantage with respect to prior art:
(1) can with any third party with independent operating network, such as units such as bank, post office cooperate, the distribution that has both realized utilizing third party on-line shop to realize card with supplement with money, satisfied the harsh requirement of these third parties again to the data security.
(2) realized cross-platform operation veritably, the backstage centralized management.
Description of drawings:
Fig. 1 is a system architecture synoptic diagram of the present invention.
Fig. 2 is the SAM key card structural representation among the embodiment.
Fig. 3 is card reader RC500 and the Principle of Antenna synoptic diagram among the embodiment.
Fig. 4 is the card reader RC500 general structure synoptic diagram among the embodiment.
Fig. 5 is transaction middleware program end critical piece and the internal storage structure among the embodiment.
Fig. 6 is an embodiment system architecture synoptic diagram.
Fig. 7 sets up database Connection Step one computing machine actual displayed sectional drawing among the embodiment.
Fig. 8 sets up database Connection Step two computing machine actual displayed sectional drawings among the embodiment.
Fig. 9 sets up database Connection Step three computing machine actual displayed sectional drawings among the embodiment.
Figure 10 sets up database Connection Step five computing machine actual displayed sectional drawings among the embodiment.
Figure 11 is the content actual displayed sectional drawing of revising among the embodiment in the ConnectParam.xml configuration file.
Figure 12 is a system start-up actual displayed sectional drawing among the embodiment.
Embodiment:
Embodiment:
XX city card system adopts this programme design to realize.Realization Construction Bank circle is deposited the IC-card of machine and cabinet plane system and is sold card, recharging service.By the quantity and the network advantage of bank outlets, realize the expansion that the city all-purpose card is professional.
Functional description
That realizes IC-card in the card system of city sells that card, stored value card are supplemented with money, monthly ticket is supplemented function with money.
Construction Bank deposits the online function of supplementing with money that has added IC-card in machine and the cabinet face savings system at more than 20 circles at present.Thereby expanded the professional coverage of IC-card effectively.
Cross-platform smart card on-line operation system; Comprise: card reader; With third party's client of the corresponding one by one serial connection of card reader, the third party's communication program that is connected in series with above third party's client respectively, the smart card liquidation center transaction middleware program that is connected in series respectively with above third party's communication program; With the liquidation center that smart card liquidation center transaction middleware program is connected in series successively, liquidation center has the encryption and decryption function.
The built-in embedded software of said card reader is used for smart card is carried out read-write operation; The SAM card is installed in the card reader, is used for the encryption and decryption of transmission course, in the SAM card many group keys are set, by the embedded software picked at random to data; Card reader provides special-purpose smart card read write command, is used for smart card is operated.
Card reader can be the external card reader, is connected with the main frame at third party's client place; Also can be built-in card reader, be connected through serial ports with any in ATM, bank's enquiry machine, the POS machine equipment.
The pairing smart card of native system has the blacklist sign, and table is known the current state of card.
One, inside/outside is put card reader
Like Fig. 3, shown in 4.Concrete parameter is following:
CPU: the SST89E52RD2 that adopts American SS T company to produce;
WV:, need not additional power source by the USB interface power supply;
Working current: 300mA;
Maximum power dissipation :≤2.25W;
Working temperature: 20 ℃~+ 50 ℃;
Reading/writing distance :≤4.0CM;
Communication speed: 57.6Kbps.
Card reader designs the read-write capability with Contact Type Ic Card and non-contact IC card respectively;
Adopt low-work voltage, Low-power Technology, hardware performance is safe and reliable;
Adopt SAM managing card safety module and CPU control card key mode, hair fastener and supplement with money safe and reliable;
Support meets the serial contactless IC card of mifare international standard; Support meets the CPU card of T=0/T=1 agreement;
Support meets ISO7816-3 series contact IC storage card, logic encryption card;
Support meets the contactless logic encryption card of ISO14443 international standard, contactless CPU card;
Adopt RS232 interface (USB power supply), transfer rate is 57600bps;
Support serial communication, send instruction, receive data;
Embedded program is realized safe operation and data encrypting and deciphering to IC-card.
Card reader communication interface: RS232;
Card reader communication interface baud rate: 19200;
Card reader communication data format: 0xAA+LEN+COMMAND+DATA+VERIFY+0xCC
Card reader communication LEN:COMMAND+DATA+VERIFY (byte)
Card reader communication VERIFY:LEN XOR COMMAND XOR DATA (byte)
Card reader communication response form: 0xBB+VALUE+0xCC
Card reader communication VALUE:
Card reader communication backward byte align: upper byte->low byte;
Like 100 backward nybbles is 64H 00H 00H 00H in proper order.
Two, SAM key card structure
As shown in Figure 2.
Three, transaction middleware program
Transaction middleware receives user's connection synchronously, the verified users identity, and real-time analysis user's transaction request, and feedback processing result, native system need be used the RF inside/outside and put card reader.This system can effectively prevent the operation and the use of illegal program, and in data transmission procedure, carries out automatic encryption and decryption, causes the harm to system after the information of preventing is stolen; Prevent the operation and the use of illegal node; The omnidistance ciphertext transmission of data.Dynamic communication authentication key code system can be realized that each authenticating user identification all gives a unique communication key, and carry out dynamic authentication in the communication overall process, guarantees the correctness of user identity.
1, principle of work:
Critical piece and internal storage structure are as shown in Figure 5.Start middleware program, be equivalent to start a service processes, service processes will start a plurality of threads and come management system, and corresponding service will be provided for the user of a plurality of connections.
Service processes mainly provides following function:
(1) storage allocation space starts a plurality of threads and carries out system management;
(2) start the Server thread.A, accept the user connection request, close connection request, and be user's allocation process thread; B, database connection pool is effectively controlled and managed.
(3) start processing threads.The registering of a, process user, sign-out message; The transaction message of b, process user; C, video data, statistics, daily record data are put into respectively shown formation, statistics formation, journal queue respectively.
(4) start the demonstration thread.The demonstration of a, maintenance interface; The interface display of b, realization information, statistical information, log information; C, realization record system communication information in the syslog file.
The characteristics of transaction middleware software: a large amount of online users; Frequent message reference; Little issued transaction; The TCP/IP network; Management C/S data stream; Support 3-tier architecture; Support secondary development; Handle based on real-time deal; The core parameter configuration file; Load balance; Secure data transmission.
2, transaction middleware program communication packet design
Adopt transaction terminal+card reader, transaction middleware program, database three-decker, the message format that uses this agreement to formulate between transaction terminal and the middleware carries out communication, and communication packet is formulated according to the ISO8583 message specification.
(1) data type
In the message that exchanges messages between transaction terminal and the middleware, each data element type and form are listed as follows:
The A letter, a left side is leaned on, right part redundance blank fill.
The N numeral, the right side is leaned on, the first significant figure leading zero.If the expression amount of money, then the rightest two be the angle branch.
The S special symbol.
AN letter and/or digital, a left side is leaned on, right part redundance blank fill.
AS letter and/or special symbol, a left side is leaned on, right part redundance blank fill.
ANS letter, numeral and/or special symbol, a left side is leaned on, right part redundance blank fill.
The B binary digit.
DD day.
The MM month.
YY.
During hh.
The mm branch.
Ss second.
The length value of LL variable-length field (two figure places), the maximum length of permission is 99.
The length value of LLL variable-length field (three figure places), the maximum length of permission is 999.
The VAR variable-length field.
X borrows or lends money symbol, and before numerical value, D representes to borrow, and C representes to borrow.
M: force territory (Mandatory), represent that this territory must appear in the message packet, otherwise the message take over party thinks that this message packet form makes mistakes.
C: condition field (Conditional), represent that this territory appears in the message packet under certain condition.
To variable length data unit, below the example explanation:
The data type of variable X YZ is ANS...999 (LLLVAR), then expression: can comprise letter, numeral and special symbol in this variable, no longer than 999 characters, concrete length is confirmed by three bit digital.
(2) message format: send the message packet structure of middleware to comprise TPDU, heading and application data three parts on the transaction terminal, as shown in table 1 below
Table 1
The TPDU explanation: length is 5 bytes.
Heading explanation: total length is 12 bytes, is expressed as the numerical value of 6 byte lengths during compression with binary-coded decimal.
In the request of on transaction terminal, sending/notice message; Insert applicating category, software version number and the SOT state of termination according to transaction terminal parameter and current state when this numerical value is sent in packing by the transaction terminal application program, be used for middleware and handle accordingly according to numerical value.
In the response message that middleware returns, insert processing requirements by middleware, other territories keep initial value to return, and transaction terminal will be according to receiving that the processing requirements in the heading carries out handled.
The heading value is following:
Applicating category definition: 70
Software version number: 05
The SOT state of termination: 0 represents the arm's length transaction state, and 1 represents the test transaction state.
Processing requirements: 0 representative of consumer is registered, and 1 represents transaction processing.
Keep to use: temporarily need not, fill out complete " 0 ".
The application data explanation: application data is the transaction data that meets ISO8583 message protocol form, and the message field that the various transaction message of this document definition are used comprises: territory 1, territory 11, territory 12, territory 13, territory 32, territory 37, territory 39, territory 41, territory 42, territory 55, territory 56 and territory 59.
(3) application data message territory explanation
Type of message.Variable's attribute: N4, the fixed length numerical character territory of 4 bytes,
Type of message defines as follows:
0600IC card business class request message: query requests, IC-card service request, IC-card business are cancelled request.
0610IC card business class response message: inquiry response, IC-card business are replied, the IC-card business is cancelled and replied.
0800 NTM network traffic management class message: the terminal request of registering, terminal parameter transmission request.
0810 NTM network traffic management class response message: register and reply in the terminal, the terminal parameter transmission is replied.
0820 NTM network traffic management class message: the sign-out request in terminal.
0830 NTM network traffic management class response message: the terminal is sign-out replys.
Ignore untapped territory in the explanation below.
1 bitmap territory, territory.Attribute: B8, the fixed-length field of 8 bytes.
Describe: as first of bitmap is made as ' 1 ', the expansion bitmap is used in expression, otherwise basic bitmap is only used in expression.As use certain data field, and then in bitmap, corresponding position is made as ' 1 ', as uses 41 territories, then need 41 of bitmap be made as ' 1 '.As use 65 to 128 territories, first that need establish the bitmap territory is made as ' 1 '.Because of native system only uses 1 to 64 territory, so this territory is 8 byte fixed-length fields.
Territory 11 is blocked method, system and is followed the tracks of number.Variable's attribute: N6, the fixed length numerical character territory of 6 bytes.
Describe: transaction receives card side (the POS terminal of the transaction terminal of IC-card business, POS transaction) to give unique serial number of confirming this transaction in certain period of transaction.Concerning receiving card side, this transaction of combination unique identification of this tracking number and 41 territories (side's of being blocked host ID), 42 territories (being blocked the square mark sign indicating number) and 55.2 territories (batch number).
Usage: the terminal is given one to each arm's length transaction of initiating and is followed the tracks of number.For recovering transaction, this territory and original transaction are consistent; This value is preserved at the IC-card center after receiving message, and former state returns to the terminal in response message.This value of terminal applies and 41 territories (side's of being blocked host ID), 42 territories (being blocked the square mark sign indicating number), 55.2 territories (batch number) mate original request message together.
Regulation: 000001-999999.
12 side of being blocked, the territory location time.Variable's attribute: N6, the fixed length numerical character territory of 6 bytes.
The territory is described: when transaction takes place, and location, the side of the being blocked time (server time).Form is hhmmss, and wherein hh is hour, and mm is for dividing, and ss be second.
Usage: when the request message at terminal is received at the IC-card center, 12 territories and 13 territories are returned to the terminal together.
The span of location, the side of being blocked time: hh:00-23; Mm:00-59; Ss:00-59.
Regulation: 123021.
13 side of being blocked, the territory location date.Variable's attribute: N4, the fixed length numerical character territory of 4 bytes
The territory is described: when transaction takes place, and location, the side of the being blocked date (server time).Form is MMDD, and wherein MM is month, and DD is day.
Usage: when the request message at terminal is received at the IC-card center, 12 territories and 13 territories are returned to the terminal together.The span on location, the side of being blocked date: MM:01-12; DD:01-31.
Regulation: 0926.
The square mark sign indicating number is accepted in territory 32.Variable's attribute: N..11 (LLVAR), the length value of 2 bytes+11 bytes of maximum accept the square mark sign indicating number.
The territory is described: accept the square mark sign indicating number.Native system middle finger " IC-card operation centre ".
Usage: identify a mechanism with the eight digit number word at present,, think that then message format makes mistakes if the length value in this territory is not equal to 8.
Regulation: 0800000001.
Territory 37 retrieving references number.Variable's attribute: AN12, the fixed length character field of 12 bytes.
The territory is described: unique system's serial number that every is received from the terminal in each settlement day is given at the IC-card center.The IC-card center identifies this transaction (transaction that repeats to send will be considered to a transaction) uniquely with the combination in this serial number and type of message, 12 territories (location, the side of being blocked time) and 13 territories (location, the side of being blocked date).
Usage 1: the terminal can obtain system's serial number at IC-card center when receiving the transaction response message, the value in this territory can be used as the foundation of Transaction Inquiries in the future.
The serial number of the non-online transaction class message of sending at the terminal is given at usage 2:IC card center.
Regulation: scope: X00000000001-X99999999999.
Territory 39 answer back codes.Variable's attribute: AN2, the fixed length character field of 2 bytes.
The territory is described: the answer back code of IC-card center response terminal.
Usage: in the transaction answer back code only " 00 " be Transaction Success, other gets nowhere for transaction.Transaction all has 39 territories when returning the terminal, and terminal and terminal operator will take corresponding operation according to answer back code, can be divided into following several types to operation:
A: Transaction Success
B: Fail Transaction, but retry
C: Fail Transaction does not need retry
D: Fail Transaction, the terminal operator handles
E: Fail Transaction, the system failure does not need retry
Annotate 1:, just show " Fail Transaction " if the content in 39 territories can not find in following table
Annotate 2: if the batch number of transaction with network center's batch number when inconsistent answer back code can fill out " 77 ", should prompting operation person register again in the terminal at this moment, transacts business again.
Detailed content is seen table 2
Table 2
In the recovery message that cause at the terminal, deposit the recovery reason code, see table 3 for details.
Table 3
Code | Explanation |
98 | Replying of IC-card center failed to receive in the terminal in the time limit |
96 | The approval response message at IC-card center is received at the terminal, but because terminal fault can't be accomplished transaction |
99 | The terminal is to receiving the approval response message at IC-card center, and checking MAC makes mistakes |
06 | The recovery that other situation cause |
Territory 41 side's of being blocked host ID.Variable's attribute: AN8, the fixed-length field of 8 bytes.
The territory is described: the identification code at terminal, the side of being blocked.This identification code is terminal of unique identification in the network at IC-card center, can not repeat.
Usage: the side's of being blocked host ID is preserved at the IC-card center after receiving message, former state returns to the terminal in response message.Original request message is mated together with this value and 11 territories (blocked method, system follow the tracks of number), 42 territories (being blocked the square mark sign indicating number), 55.2 territories (batch number) in the terminal.
Specialized range: 00000001-99999999.
The square mark sign indicating number is blocked in territory 42.Variable's attribute: AN15, the fixed-length field of 15 bytes.
The territory is described: the identification code of the side of being blocked, i.e. trade company's code.
Usage: this identification code one of unique identification in the network at IC-card center is acted on behalf of trade company's code, can not repeat.Carry out according to " the bank card franchised business Unified coding and the service regeulations " of China Unionpay's regulation at present.
Specialized range: 000000000000001-000000099999999.
Territory 55 transaction data.Variable's attribute: ANS...995 (LLLVAR), the data field of the length value of 3 bytes+995 bytes of maximum.
The territory is described: this territory is the transaction data territory.
Usage: all terminals all comprise 55.1 territories and 55.2 territories in the transaction message that send at the IC-card center, be used to indicate the type of transaction of this transaction.
In the network management class message at terminal, the combination of network management information sign indicating number and type of message sign indicating number sign various network administrative class message.
55.A the type of transaction sign indicating number is as shown in table 4.
Table 4
Type of message | The type of transaction sign indicating number | The network management information sign indicating number | Type of transaction |
0600/0610 | 80 | 000 | Sell card preparatory Card Reader |
0600/0610 | 81 | 000 | Sell card |
0600/0610 | 84 | 000 | Supplement preparatory Card Reader with money |
0600/0610 | 85 | 000 | Wallet is supplemented with money |
0600/0610 | 86 | 000 | Wallet recovery |
0600/0610 | 87 | 000 | Monthly ticket is supplemented with money |
0600/0610 | 88 | 000 | Monthly ticket recovers |
0600/0610 | 90 | 000 | Wallet is towards red |
0600/0610 | 91 | 000 | Monthly ticket is towards red |
55.B the network management information sign indicating number is as shown in table 5.
Table 5
55.1 supplement preparatory Card Reader with money
The type of message unification is: 0600
The return message unification is: 0610
Network management information sign indicating number: 000
Type of transaction sign indicating number: 84
Transaction (ciphertext) data layout:
Table 6
Coding | | Form | Value | |
1 | The ciphertext content | AN64 | Data element length: 32 bytes |
55.2 wallet is supplemented with money
The type of message unification is: 0600
The return message unification is: 0610
Network management information sign indicating number: 000
Type of transaction sign indicating number: 85
Transaction (ciphertext) data layout:
Table 7
Coding | | Form | Value | |
1 | The ciphertext content | AN80 | Data element length: 40 bytes |
55.3 wallet recovery
The type of message unification is: 0600
The return message unification is: 0610
Network management information sign indicating number: 000
Type of transaction sign indicating number: 86
Transaction (ciphertext) data layout:
Table 8
Coding | | Form | Value | |
1 | The ciphertext content | AN64 | Data element length: 32 bytes |
Territory 56 return datas
Variable's attribute:
ANS...990 (LLLVAR), the data field of the length value of 3 bytes+990 bytes of maximum.
The territory is described:
This territory is the custom zone.
Data element length N 3
56.X return data ANS...990 (LLLVAR)
56.1 supplement preparatory Card Reader with money
Return (expressly) data layout:
Table 9
Coding | | Form | Value | |
1 | The Card | AN20 | 10 byte HEX sign indicating numbers, (ASCII character) | |
2 | Whether monthly ticket is | AN2 | 1 byte HEX sign indicating number, 0x00: invalid; 0x01: effectively | |
3 | Every month number of times of | N4 | 2 byte HEX sign indicating numbers | |
4 | Every month amount of money of monthly ticket | AN8 | 4 byte HEX sign indicating numbers are to be divided into unit | |
5 | Whether passenger ticket is | N2 | 1 byte HEX sign indicating number, 0x00: invalid; 0x01: effectively | |
6 | Passenger ticket is supplemented the upper limit with money | N8 | 4 byte HEX sign indicating numbers are to be divided into unit | |
7 | Passenger ticket is supplemented lower limit with money | N8 | 4 byte HEX sign indicating numbers are to be divided into unit |
Data element length: 26 bytes
Return (ciphertext) data layout:
Table 10
Coding | Implication | Form | Value |
8 | The ciphertext content | AN64 | Data element length: 32 bytes |
56.2 wallet is supplemented with money
Return (ciphertext) data layout:
Table 11
Coding | | Form | Value | |
1 | The ciphertext content | AN48 | Data element length: 24 bytes |
56.3 wallet recovery
Return (ciphertext) data layout:
Table 12
Coding | | Form | Value | |
1 | The ciphertext content | AN96 | Data element length: 48 bytes |
Territory 59 operator's codes
Custom zone (Reserved Private)
Variable's attribute:
ANS..63 (LLVAR), the data of the length value of 2 bytes+63 bytes of maximum.
The territory is described:
This territory is the custom zone.
Data element length N 2
59.1 operator's code AN16
In terminal transaction, the terminal is with delivering to the IC-card center on operator's code, and former state is returned when replying.
(3) transaction message
Table 13
Supplement preparatory Card Reader with money
Table 14
Stored value card is supplemented with money
Table 15
Stored value card recovers
3, the transaction middleware system installs and configuration
Program is installed
(1) select an application server, and basic configuration (more than the CPU:Intel Duo double-core 1.8G, internal memory: more than the 2G DDR2800, hard disk: 160GBSATA, network interface card: the 10/100M network interface card)
(2) under D packing catalogue, set up the CAgent catalogue, and with following document copying in catalogue.
CAgent.exe
CTongBASIC.dll
CTongFile.dll
CTongSE.dll
ProcCommand.xml
ConnectParam.xml
(3) set up CAgent, CAgent, CAgent sub-directory.
(4) .net 2005 running environment are installed.
Setting up database connects
(1) control panel → management tool → data source (ODBC) is as shown in Figure 7.
(2) select user DSN, and by by " interpolation " button, as shown in Figure 8.
(3) select " microsoft ODBC for Oracle ", and by accomplishing button, as shown in Figure 9.
(4) input information in pop-up window, and press confirming button.
DSN: the ODBC connection name that is used to define;
Describe: the description of user about connecting;
User's name: the user name that connects database;
Server: connect the Service name that is disposed for setting up oracle;
(5) press confirming button and accomplish configuration, shown in figure 10.
Revise the content in the ConnectParam.xml configuration file, shown in figure 11
System start-up, the operation CAgent; Shown in figure 12.
The cross-platform smart card on-line operation method that on said system, realizes comprises:
At first, smart card is placed on the card reader,
Step 1: third party's client-side program sends to card reader and supplements preparatory Card Reader instruction with money; Card reader is passed through third party's client, third party's communication program, transaction middleware program with the form of ciphertext with the essential information of smart card successively, arrives smart card liquidation center database at last; Encryption equipment is supplemented key with money through deciphering back inquirying card type parameter, calculating; The Card Type parameter successively through transaction middleware program, third party's communication program, arrives third party's client with form expressly; Comprise the smart card operation information via encryption equipment encryption of supplementing key with money, pass through transaction middleware program, third party's communication program, third party's client successively, arrive card reader with the form of ciphertext;
Step 2: the card reader Card Reader, judge card state and transaction process tag; If blacklist indicates normally with launching, get into and supplement the interface with money, change step 3, if normal any one sign of blacklist and process tag is undesired, the commentaries on classics step 7;
Step 3: operating personnel import recharge amount information through third party's client-side program, and send the instruction of preliminary filling value to card reader; Card reader at first is rewritten as 4 with the blacklist sign by 0, and process tag is rewritten as 11 by 0; Supplement the information formation wallet of smart card with money ciphertext then, through third party's client, third party's communication program, transaction middleware program, arrive smart card liquidation center database at last successively;
Step 4: smart card liquidation center database carries out stored value card and supplements the operation validity check with money; If it is legal; The recording card current information carries out stored value card and supplements record with money, and confirmation message is supplemented in formation with money; Through transaction middleware program, transaction middleware program, third party's client-side program, arrive card reader with the form of ciphertext;
Step 5: card reader is rewritten sign in the card, and process tag is rewritten as 12 by 11, according to cipher-text information smart card is supplemented with money then, supplement completion with money after, the blacklist sign is rewritten as 0 by 4, process tag is rewritten as 0 by 12;
Step 6: on third party's client-side program, show recharging result;
Step 7: card reader will comprise card number, blacklist sign, the process tag information of concluding the business is recovered message at interior stored value card and passed through third party's client, third party's communication program, transaction middleware program successively with the form of ciphertext, arrive smart card liquidation center database at last;
Step 8: this step has three kinds of recovery schemes, first scheme; Generate stored value card and recover ciphertext, its hints on operation is that the change blacklist is masked as 0, and the change process tag is 0, and other content is constant in the card; Alternative plan: generate stored value card and recover ciphertext, its hints on operation is that remaining sum changes into consistently with database in the stored value card, and the change blacklist is masked as 0, and the change process tag is 0, and interior other content of card is constant; Third party's case: artificial treatment, the principle of artificial treatment is following:
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database and remaining sum in the card write down consistently, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is implemented alternative plan greater than the remaining sum record in the card;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent with the remaining sum record in the card, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent greater than the record of the remaining sum in the card, implements alternative plan;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, and is not also having the last item record in the statement of account, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented alternative plan supplementing not statement of account with money or in the statement of account the last item record having been arranged;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented third party's case supplementing not statement of account with money and all not had the last item record in the statement of account;
Step 9: will recover ciphertext and with form expressly subsidiary with restore data through transaction middleware program, third party's communication program, third party's client; Arrive card reader, card reader sends to third party's client with data with form expressly after executing recovery operation;
Again execution in step two then.
Card reader forms encrypt data and comprises in the said step 1: random number, the core of the card sheet number, card number, Card Type number, card authentication code, date of expiration, the date of launching, key card number.
The Card Type supplemental characteristic comprises in the said step 1: server time, Card Type title, wallet bound.
Smart card operation information also comprises except that supplementing key with money in the said step 1: random number, server time.
Supplementing the interface in the said step 2 with money can real information comprise: the core of the card sheet number, card number, Card Type number, cash pledge, date of expiration, the date of launching, wallet accumulative total are supplemented number of times, the wallet amount of money, annual test date, blacklist sign, key card number with money.
The cipher-text information of supplementing with money in the said step 3 comprises: random number, the core of the card sheet number, card number, Card Type, accumulative total wallet are supplemented number of times with money, accumulative total is supplemented volume, wallet balances, this recharge amount, key card number with money.
Validity checking in the said step 4 comprises one or more of following inspection: according to Card Type and operator number inquiry whether card authority on sale, inquiry whether be moved back card, inquiry whether be report the loss whether card, inquiry are the blacklist cards, judge whether recharge amount legal, judgement supplement with money after remaining sum whether legal.
The content of recording card current information comprises a kind of in the following content at least in the said step 4: the accumulative total wallet is supplemented number of times with money, is supplemented preceding remaining sum with money, recharge amount, supplement the back remaining sum with money.
The confirmation message content of supplementing with money in the said step 4 comprises a kind of in the following content at least: random number, supplement time, card number, key card number with money, supplement with money before wallet accumulative total supplement number of times with money, supplement that back wallet accumulative total is supplemented number of times with money, supplemented preceding remaining sum with money with money, this recharge amount, supplement the back wallet balances with money.
Showing in the said step 6 shows that information comprises: card number with supplement with money the back remaining sum.
Claims (10)
1. the online stored value card recharge method of cross-platform smart card is characterized in that, comprising:
At first, smart card is placed on the card reader,
Step 1: third party's client-side program sends to card reader and supplements preparatory Card Reader instruction with money; Card reader is passed through third party's client, third party's communication program, transaction middleware program with the form of ciphertext with the essential information of smart card successively, arrives smart card liquidation center database at last; Encryption equipment is supplemented key with money through deciphering back inquirying card type parameter, calculating; The Card Type parameter successively through transaction middleware program, third party's communication program, arrives third party's client with form expressly; Comprise the smart card operation information via encryption equipment encryption of supplementing key with money, pass through transaction middleware program, third party's communication program, third party's client successively, arrive card reader with the form of ciphertext;
Step 2: the card reader Card Reader, judge card state and transaction process tag; If blacklist indicates normally with launching, get into and supplement the interface with money, change step 3, if normal any one sign of blacklist and process tag is undesired, the commentaries on classics step 7;
Step 3: operating personnel import recharge amount information through third party's client-side program, and send the instruction of preliminary filling value to card reader; Card reader at first is rewritten as 4 with the blacklist sign by 0, and process tag is rewritten as 11 by 0; Supplement the information formation wallet of smart card with money ciphertext then, through third party's client, third party's communication program, transaction middleware program, arrive smart card liquidation center database at last successively;
Step 4: smart card liquidation center database carries out stored value card and supplements the operation validity check with money; If it is legal; The recording card current information carries out stored value card and supplements record with money, and confirmation message is supplemented in formation with money; Through transaction middleware program, transaction middleware program, third party's client-side program, arrive card reader with the form of ciphertext;
Step 5: card reader is rewritten sign in the card, and process tag is rewritten as 12 by 11, according to cipher-text information smart card is supplemented with money then, supplement completion with money after, the blacklist sign is rewritten as 0 by 4, process tag is rewritten as 0 by 12;
Step 6: on third party's client-side program, show recharging result;
Step 7: card reader will comprise card number, blacklist sign, the process tag information of concluding the business is recovered message at interior stored value card and passed through third party's client, third party's communication program, transaction middleware program successively with the form of ciphertext, arrive smart card liquidation center database at last;
Step 8: this step has three kinds of recovery schemes, first scheme; Generate stored value card and recover ciphertext, its hints on operation is that the change blacklist is masked as 0, and the change process tag is 0, and other content is constant in the card; Alternative plan: generate stored value card and recover ciphertext, its hints on operation is that remaining sum changes into consistently with database in the stored value card, and the change blacklist is masked as 0, and the change process tag is 0, and interior other content of card is constant; Third party's case: artificial treatment, the principle of artificial treatment is following:
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database and remaining sum in the card write down consistently, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is implemented alternative plan greater than the remaining sum record in the card;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number has the last item record in the statement of account not supplementing with money, and the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent with the remaining sum record in the card, implements first scheme;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent greater than the record of the remaining sum in the card, implements alternative plan;
When satisfying following condition: the blacklist in the step 7 is masked as 4; Process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, but in the statement of account the last item record is being arranged; And the record of the remaining sum in the database is consistent less than the record of the remaining sum in the card, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 11, and this card number is no the last item record in supplementing not statement of account with money, and is not also having the last item record in the statement of account, implements third party's case;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented alternative plan supplementing not statement of account with money or in the statement of account the last item record having been arranged;
When satisfying following condition: the blacklist in the step 7 is masked as 4, and process tag is 12, and this card number is implemented third party's case supplementing not statement of account with money and all not had the last item record in the statement of account;
Step 9: will recover ciphertext and with form expressly subsidiary with restore data through transaction middleware program, third party's communication program, third party's client; Arrive card reader, card reader sends to third party's client with data with form expressly after executing recovery operation;
Again execution in step two then.
2. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that card reader forms encrypt data and comprises in the said step 1: random number, the core of the card sheet number, card number, Card Type number, card authentication code, date of expiration, the date of launching, key card number.
3. the online stored value card recharge method of cross-platform smart card according to claim 1 is characterized in that the Card Type supplemental characteristic comprises in the said step 1: server time, Card Type title, wallet bound.
4. the online stored value card recharge method of cross-platform smart card according to claim 1 is characterized in that smart card operation information also comprises in the said step 1: random number, server time except that supplementing key with money.
5. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that supplementing the interface in the said step 2 with money can real information comprise: the core of the card sheet number, card number, Card Type number, cash pledge, date of expiration, the date of launching, wallet accumulative total are supplemented number of times, the wallet amount of money, annual test date, blacklist sign, key card number with money.
6. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that the cipher-text information of supplementing with money in the said step 3 comprises: random number, the core of the card sheet number, card number, Card Type, accumulative total wallet are supplemented number of times with money, accumulative total is supplemented volume, wallet balances, this recharge amount, key card number with money.
7. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that the validity checking in the said step 4 comprises one or more of following inspection: according to Card Type and operator number inquiry whether card authority on sale, inquiry whether be moved back card, inquiry whether be report the loss whether card, inquiry are the blacklist cards, judge whether recharge amount legal, judgement supplement with money after remaining sum whether legal.
8. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that the content of recording card current information comprises a kind of in the following content at least in the said step 4: the accumulative total wallet is supplemented number of times with money, is supplemented preceding remaining sum with money, recharge amount, supplement the back remaining sum with money.
9. the online stored value card recharge method of cross-platform smart card according to claim 1; It is characterized in that the confirmation message content of supplementing with money in the said step 4 comprises a kind of in the following content at least: random number, supplement time, card number, key card number with money, supplement with money before wallet accumulative total supplement number of times with money, supplement that back wallet accumulative total is supplemented number of times with money, supplemented preceding remaining sum with money with money, this recharge amount, supplement the back wallet balances with money.
10. the online stored value card recharge method of cross-platform smart card according to claim 1 is characterized in that showing in the said step 6 shows that information comprises: card number with supplement with money the back remaining sum.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103968097A CN102521924A (en) | 2011-12-05 | 2011-12-05 | Online electronic purse recharging method of cross-platform intelligent card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103968097A CN102521924A (en) | 2011-12-05 | 2011-12-05 | Online electronic purse recharging method of cross-platform intelligent card |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102521924A true CN102521924A (en) | 2012-06-27 |
Family
ID=46292824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011103968097A Pending CN102521924A (en) | 2011-12-05 | 2011-12-05 | Online electronic purse recharging method of cross-platform intelligent card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102521924A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537763A (en) * | 2015-01-12 | 2015-04-22 | 上海贤能信息技术有限公司 | Intelligent IC card recharge device and method |
CN106993011A (en) * | 2016-01-21 | 2017-07-28 | 广东华大互联网股份有限公司 | Application of IC cards method and the application system for realizing the application process |
-
2011
- 2011-12-05 CN CN2011103968097A patent/CN102521924A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104537763A (en) * | 2015-01-12 | 2015-04-22 | 上海贤能信息技术有限公司 | Intelligent IC card recharge device and method |
CN104537763B (en) * | 2015-01-12 | 2016-11-30 | 上海贤能信息技术有限公司 | A kind of intellective IC card recharging device and recharge method thereof |
CN106993011A (en) * | 2016-01-21 | 2017-07-28 | 广东华大互联网股份有限公司 | Application of IC cards method and the application system for realizing the application process |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200082403A1 (en) | Systems and methods for providing tokenized transaction accounts | |
CN101256645B (en) | Setting method of integrated citizen card system | |
US20200250752A1 (en) | Systems, methods, and program products for issuing, managing, valuing and trading digital asset tokens backed by a value bank comprising the residual value of a portfolio of ground leases | |
CN110097462A (en) | Promote the method and system of ATM transaction using block chain | |
CN103714625B (en) | A kind of charging intelligent card method and system | |
CN108780550A (en) | The method and system of solution and monthly payment plan simulation is paid by instalments in transaction in advance | |
CN101719251A (en) | Internet electronic money system | |
CN103810590A (en) | Payment system and method for controlling receiving side consumption by paying side | |
CN105205508A (en) | Self-service card issuing machine for intelligent card | |
CN107808285A (en) | A kind of method of payment, equipment and computer-readable recording medium | |
CN108711045A (en) | A kind of cash register system and cash method | |
CN101587615A (en) | Information integrated platform of traffic IC card and bank card | |
CN102131164A (en) | System for performing loan transaction service based on mobile phone short message | |
CN102496112A (en) | Three-screen payment system based on intelligent SD card and realization method thereof | |
JP2001216458A (en) | System and device for processing information | |
US20150032588A1 (en) | Systems and methods for enrolling merchants using card data | |
CN108765106A (en) | A kind of integrated financial affairs receipt generation method of industry wealth | |
CN108694660A (en) | A kind of industry wealth integration account checking method | |
JP2001216459A (en) | System and device for processing information | |
CN201307311Y (en) | IC card electronic payment system of dual-direction data transmitting network | |
CN102073969A (en) | Method for realizing debit and credit integrated card | |
CN102521924A (en) | Online electronic purse recharging method of cross-platform intelligent card | |
CN102521745A (en) | Online card selling method for cross-platform smart card | |
CN108762727A (en) | A kind of event driven Financial information processing method and system | |
CN101884050A (en) | Card authentication system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120627 |
|
RJ01 | Rejection of invention patent application after publication |