HK40101285A - Systems and methods for authenticated peer-to-peer data transfer using resource locators - Google Patents
Systems and methods for authenticated peer-to-peer data transfer using resource locators Download PDFInfo
- Publication number
- HK40101285A HK40101285A HK62024089364.9A HK62024089364A HK40101285A HK 40101285 A HK40101285 A HK 40101285A HK 62024089364 A HK62024089364 A HK 62024089364A HK 40101285 A HK40101285 A HK 40101285A
- Authority
- HK
- Hong Kong
- Prior art keywords
- information
- data transmission
- peer
- transmission system
- link
- Prior art date
Links
Description
相关申请的交叉引用Cross-references to related applications
本申请要求于2021年1月29日提交的美国专利申请号17/162783的优先权,该申请的公开内容通过引用整体并入本文。This application claims priority to U.S. Patent Application No. 17/162783, filed January 29, 2021, the disclosure of which is incorporated herein by reference in its entirety.
技术领域Technical Field
本公开涉及用于点对点数据传送的系统和方法,并且特别涉及用于使用资源定位符的经认证点对点数据传送的系统和方法。This disclosure relates to systems and methods for peer-to-peer data transfer, and more particularly to systems and methods for authenticated peer-to-peer data transfer using resource locators.
背景技术Background Technology
当两个对端设备尚未通过现有网络连接时,点对点数据传送可能会很麻烦。这是因为为了完成传送,两个对端设备必须在同一网络上注册并被配置用于通信。此外,配置和调度数据传送可能对用户体验有害。还存在安全风险,并且可能包括与跨平台时的数据完整性和漏洞相关联的风险,以及通过使用电子邮件地址或其他帐户标识符错误识别帐户相关联的风险。这些风险和缺点可能会减少用户对跨应用通信的需求,并抑制跨应用通信的功能和效率。Point-to-point data transfer can be cumbersome when two peer devices are not already connected via an existing network. This is because, in order to complete a transfer, both peer devices must register and be configured for communication on the same network. Furthermore, configuring and scheduling data transfers can be detrimental to the user experience. Security risks also exist, potentially including risks associated with data integrity and vulnerabilities across platforms, as well as risks associated with misidentifying accounts using email addresses or other account identifiers. These risks and drawbacks may reduce user demand for cross-application communication and inhibit its functionality and efficiency.
存在这些和其他缺陷。因此,需要用于提供增强的安全性和改进的用户体验的点对点数据传送的系统和方法。These and other shortcomings exist. Therefore, there is a need for systems and methods for peer-to-peer data transmission that provide enhanced security and an improved user experience.
发明内容Summary of the Invention
本公开的实施例提供了一种经过认证的数据传送系统,包括由处理器和存储器组成的非接触式卡。在进入通信场之后,处理器可以被配置为动态生成统一资源定位符(URL)。该URL可以包括第一组信息,该第一组信息包括抽象的标识符信息。该URL可以包括包含用户信息的第二组信息。处理器可以被配置为发送URL以发起数据传送。在验证了接收到的响应并确认了与数据传送相关联的第三组信息后,可以完成数据传送。Embodiments of this disclosure provide an authenticated data transmission system including a contactless card comprising a processor and a memory. Upon entering a communication field, the processor can be configured to dynamically generate a Uniform Resource Locator (URL). This URL may include a first set of information, which includes abstract identifier information. The URL may also include a second set of information containing user information. The processor can be configured to send the URL to initiate data transmission. After verifying a received response and confirming a third set of information associated with the data transmission, the data transmission can be completed.
本公开的实施例提供了一种对数据传送进行认证的方法。该方法可以包括:在发送设备的一个或多个处理器进入通信场之后,动态地生成包括近场通信数据交换格式统一资源定位符的链路,该统一资源定位符包括标识符数据和用户数据。该方法可以包括向包括用于在第一设备上执行的指令的第一应用发送链路以发起数据传送。该方法可以包括通过基于该链路激活一个或多个动作来认证与第一设备相关联的用户。该方法可以包括发送对与数据传送相关联的数量和接收方数据的确认的一个或多个请求。该方法可以包括接收一个或多个通知,该一个或多个通知基于该对与数据传送相关联的数量和接收方数据的确认的一个或多个请求。该方法可以包括执行响应于该一个或多个通知的一个或多个登录凭证,以便完成数据传送。Embodiments of this disclosure provide a method for authenticating data transmission. The method may include: dynamically generating a link including a Near Field Communication Data Exchange Format Uniform Resource Locator (URI), which includes identifier data and user data, after one or more processors of a transmitting device enter a communication field. The method may include sending the link to a first application including instructions for execution on a first device to initiate data transmission. The method may include authenticating a user associated with the first device by activating one or more actions based on the link. The method may include sending one or more requests for confirmation of quantity and recipient data associated with the data transmission. The method may include receiving one or more notifications based on the one or more requests for confirmation of quantity and recipient data associated with the data transmission. The method may include executing one or more login credentials in response to the one or more notifications to complete the data transmission.
本公开的实施例提供了一种包括计算机可执行指令的计算机可读非瞬态介质,当由处理器执行时,所述指令执行包括以下步骤的过程:在非接触式卡进入通信场后,动态地生成链路,该链路包括第一组信息和第二组信息,该第一组信息包括标识符信息,该第二组信息包括用户信息;向包括用于在第一设备上执行的指令的第一应用发送链路以发起数据传送;通过基于该链路激活一个或多个动作来识别与该第一设备相关联的用户,该一个或多个动作被配置为请求确认与该数据传送相关联的第三组信息;以及基于对第三组信息的认证来发送一个或多个响应,以便完成数据传送。Embodiments of this disclosure provide a computer-readable non-transient medium including computer-executable instructions, wherein, when executed by a processor, the instructions execution includes the following steps: dynamically generating a link after a contactless card enters a communication field, the link including a first set of information and a second set of information, the first set of information including identifier information and the second set of information including user information; sending the link to a first application including instructions for execution on a first device to initiate data transmission; identifying a user associated with the first device by activating one or more actions based on the link, the one or more actions being configured to request confirmation of a third set of information associated with the data transmission; and sending one or more responses based on authentication of the third set of information to complete the data transmission.
附图说明Attached Figure Description
通过参考以下结合附图的描述,可以最好地理解本公开的各种实施例以及另外的目的和优点。Various embodiments of the present disclosure, as well as other objects and advantages, can be best understood by referring to the following description taken in conjunction with the accompanying drawings.
图1描绘了根据示例性实施例的经过认证的数据传送系统。Figure 1 depicts an authenticated data transmission system according to an exemplary embodiment.
图2A是根据示例性实施例的非接触式卡的图示。Figure 2A is an illustration of a contactless card according to an exemplary embodiment.
图2B是根据示例性实施例的非接触式卡的接触垫的图示。Figure 2B is an illustration of the contact pad of a contactless card according to an exemplary embodiment.
图3描绘了根据示例性实施例的对数据传送进行认证的方法。Figure 3 illustrates a method for authenticating data transmission according to an exemplary embodiment.
图4描绘了根据示例性实施例的对数据传送进行发起和认证的方法。Figure 4 illustrates a method for initiating and authenticating data transmission according to an exemplary embodiment.
图5描绘了根据示例性实施例对数据传送进行发起和认证的另一种方法。Figure 5 illustrates another method for initiating and authenticating data transmission according to an exemplary embodiment.
具体实施方式Detailed Implementation
实施例的以下描述提供了非限制性代表性示例,该非限制性代表性示例参考数字具体描述了本发明不同方面的特征和教导。所描述的实施例应当被认为能够与实施例的描述中的其他实施例分开或结合实施。阅读实施例的描述的本领域普通技术人员应当能够学习和理解本发明的不同描述方面。对实施例的描述应当有助于对本公开的理解达到这样的程度,即没有具体涵盖但在阅读了实施例的描述的本领域技术人员的知识范围内的其他实施方式将被理解为与本发明的应用一致。The following description of the embodiments provides non-limiting representative examples that specifically describe features and teachings of different aspects of the invention with reference to numerals. The described embodiments should be considered as being practiceable separately from or in combination with other embodiments described in the embodiment description. Those skilled in the art who read the description of the embodiments should be able to learn and understand the different descriptive aspects of the invention. The description of the embodiments should contribute to an understanding of this disclosure to the extent that other implementations not specifically covered but within the knowledge of those skilled in the art upon reading the description of the embodiments will be understood to be consistent with the application of the invention.
如本文所公开的,用户可以使用他们的卡进行无缝识别,并发起数据传送。诸如统一资源定位符(URL)、互联网资源定位符(IRL)、统一资源标识符(URI)、统一资源名称(URN)或其他资源定位符之类的资源定位符可以包括抽象的识别信息,包括但不限于持卡人的账户或用户标识符,其在卡的个性化时被加载到芯片上。可以为每笔交易生成抽象的识别信息,诸如动态生成的URL。As disclosed herein, users can use their cards for seamless identification and to initiate data transfers. Resource locators, such as Uniform Resource Locators (URLs), Internet Resource Locators (IRLs), Uniform Resource Identifiers (URIs), Uniform Resource Names (URNs), or other resource locators, can include abstract identification information, including but not limited to the cardholder's account or user identifier, which is loaded onto the chip during card personalization. Abstract identification information, such as dynamically generated URLs, can be generated for each transaction.
非限制性地,通过将唯一标识符与一个或多个变量(如计数器、一个或多个密码算法和/或其任意组合)相结合,可在卡上生成识别信息。例如,一个或多个密码算法可以包括诸如公钥或私钥加密之类的加密技术,该加密技术也将被用于认证的服务器所知。非限制性地,示例性对称密钥算法可以包括对称密钥加密,诸如DES(数据加密标准)、三重DES或AES(高级加密标准)。非限制性地,示例性非对称密钥算法可以包括非对称公钥加密、数字签名算法或RSA(Rivest–Shamir–Adleman)。Non-limiting, identification information can be generated on the card by combining a unique identifier with one or more variables, such as a counter, one or more cryptographic algorithms, and/or any combination thereof. For example, one or more cryptographic algorithms may include encryption techniques such as public-key or private-key encryption, which will also be known to the authentication server. Non-limiting, exemplary symmetric-key algorithms may include symmetric-key encryption, such as DES (Data Encryption Standard), Triple DES, or AES (Advanced Encryption Standard). Non-limiting, exemplary asymmetric-key algorithms may include asymmetric public-key encryption, digital signature algorithms, or RSA (Rivest–Shamir–Adleman).
在一些示例中,点对点数据传送可以通过网站发起和认证。在其他示例中,点对点数据传送可以通过应用来发起和认证。本文公开的系统和方法最小化了身份信息或其他个人信息的暴露,并提供了更大的安全性。In some examples, peer-to-peer data transfers can be initiated and authenticated via a website. In other examples, peer-to-peer data transfers can be initiated and authenticated via an application. The systems and methods disclosed herein minimize the exposure of identity information or other personal information and provide greater security.
本公开的示例实施例提供了对用户体验中的限制的改进,以建立和协调不同类型的数据传送,并减轻或消除安全风险(诸如与跨平台、通过电子邮件地址误识别帐户、对所请求的数据传送的认证和设备辨识的验证相关联的风险)。因此,本文公开的系统和方法通过协调定制的点对点数据传送来改进现有的实施方式,该定制的点对点数据传送解决了这些限制,并且提供了增强型安全益处和改进的用户体验。The exemplary embodiments of this disclosure provide improvements to limitations in the user experience for establishing and coordinating different types of data transfers and mitigating or eliminating security risks such as those associated with cross-platform compatibility, misidentification of accounts via email addresses, authentication of requested data transfers, and verification of device identification. Therefore, the systems and methods disclosed herein improve upon existing implementations by coordinating customized peer-to-peer data transfers that address these limitations and provide enhanced security benefits and an improved user experience.
图1示出了经过认证的数据传送系统100。该经过认证的数据传送系统100可以包括发送设备105、第一应用110、第二应用115、网络120、服务器125和数据库130。尽管图1示出了系统100的组件的单个实例,但是系统100可以包括任意数量的组件。Figure 1 illustrates an authenticated data transmission system 100. The authenticated data transmission system 100 may include a transmitting device 105, a first application 110, a second application 115, a network 120, a server 125, and a database 130. Although Figure 1 shows a single instance of the components of system 100, system 100 may include any number of components.
系统100可包括发送设备105。该发送设备105可以包括非接触式卡、基于接触的卡、网络使能计算机或本文所描述的其他设备。如下面在图2A-2B中进一步解释的,发送设备105可以包括一个或多个处理器102和存储器104。存储器104可以包括一个或多个小程序106和一个或多个计数器108。发送设备105可以与一个或多个设备112、117进行数据通信。例如,发送设备可以经由网络120向客户端设备112、117发送数据。在一些示例中,发送设备105可以被配置为在进入客户端设备112、117的一个或多个通信场之后,经由网络120向客户端设备117发送数据。非限制性地,发送设备105可以被配置为在一次或多次进入客户端设备112、117的一个或多个通信场之后向客户端设备112、117发送数据,该一次或多次进入与轻敲、轻刷、挥动和/或其任意组合相关联。System 100 may include a transmitting device 105. The transmitting device 105 may include a contactless card, a contact-based card, a network-enabled computer, or other devices described herein. As further explained below in Figures 2A-2B, the transmitting device 105 may include one or more processors 102 and a memory 104. The memory 104 may include one or more applets 106 and one or more counters 108. The transmitting device 105 may communicate data with one or more devices 112, 117. For example, the transmitting device may transmit data to client devices 112, 117 via network 120. In some examples, the transmitting device 105 may be configured to transmit data to client device 117 via network 120 after entering one or more communication fields of client devices 112, 117. Without limitation, the transmitting device 105 may be configured to transmit data to client devices 112, 117 after entering one or more communication fields of client devices 112, 117 once or multiple times, such entry being associated with tapping, swiping, waving, and/or any combination thereof.
系统100可包括第一应用110。例如,第一应用110可以包括用于在第一设备112上执行的指令。第一应用110可以与系统100的任意组件进行通信。例如,第一设备112可以执行诸如第一应用110之类的一个或多个应用,其使得能够例如与系统100的一个或多个组件进行网络和/或数据通信,并且发送和/或接收数据。第一设备112可以包括被耦合到存储器114的一个或多个处理器113。例如,第一设备112可以是网络使能计算机。如本文所指,联网计算机可以包括但不限于计算机设备或通信设备,包括例如服务器、网络装备、个人计算机、工作站、电话、手持PC、个人数字助理、非接触式卡、瘦客户端、胖客户端、互联网浏览器或其他设备。第一设备112也可以是移动设备;例如,移动设备可以包括来自的iPhone、iPod、iPad或运行Apple的操作系统的任何其他移动设备、运行微软的Mobile操作系统的任意设备、运行Google的操作系统的任意设备和/或任何其他智能手机、平板电脑或类似的可穿戴移动设备。System 100 may include a first application 110. For example, the first application 110 may include instructions for execution on the first device 112. The first application 110 may communicate with any component of system 100. For example, the first device 112 may execute one or more applications such as the first application 110, which enable, for example, network and/or data communication with one or more components of system 100, and to send and/or receive data. The first device 112 may include one or more processors 113 coupled to memory 114. For example, the first device 112 may be a network-enabled computer. As referred to herein, a networked computer may include, but is not limited to, computer equipment or communication equipment, including, for example, servers, network equipment, personal computers, workstations, telephones, handheld PCs, personal digital assistants, contactless cards, thin clients, fat clients, internet browsers, or other devices. The first device 112 may also be a mobile device; for example, a mobile device may include an iPhone, iPod, iPad, or any other mobile device running Apple's operating system, any device running Microsoft's Mobile operating system, any device running Google's operating system, and/or any other smartphone, tablet, or similar wearable mobile device.
第一设备112可以包括处理电路,并且可以包含附加组件,该附加组件包括处理器、存储器、错误和奇偶校验/CRC校验器、数据编码器、防冲突算法、控制器、命令解码器、安全原语和防篡改硬件,如执行本文所述功能所需要的。第一设备112还可以包括显示器和输入设备。显示器可以是用于呈现视觉信息的任意类型的设备,诸如计算机监视器、平板显示器和移动设备屏幕,包括液晶显示器、发光二极管显示器、等离子面板和阴极射线管显示器。输入设备可以包括用于将信息输入到用户设备中的可用的并且由用户设备支持的任意设备,诸如触摸屏、键盘、鼠标、光标控制设备、触摸屏、麦克风、数码相机、录像机或便携式摄像机。这些设备可以被用于输入信息并且与本文所描述的软件其他设备交互。在一些示例中,第一设备112可以包括从移动设备、可穿戴设备和自动服务终端的组中选择的至少一个。The first device 112 may include processing circuitry and may include additional components such as a processor, memory, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives, and tamper-proof hardware, as required to perform the functions described herein. The first device 112 may also include a display and input devices. The display may be any type of device for presenting visual information, such as a computer monitor, flat panel display, and mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. Input devices may include any available and supported device for inputting information into a user device, such as a touchscreen, keyboard, mouse, cursor control device, microphone, digital camera, video recorder, or portable video camera. These devices may be used for inputting information and interacting with other devices in the software described herein. In some examples, the first device 112 may include at least one selected from the group consisting of mobile devices, wearable devices, and automated service terminals.
系统100可以包括第二应用115。第二应用115可以包括用于在第二设备117上执行的指令。第二应用115可以与系统100的任意组件进行通信。例如,第二设备117可以执行诸如第二应用115之类的一个或多个应用,其使得能够例如与系统100的一个或多个组件进行网络和/或数据通信,并且发送和/或接收数据。第二设备117可以包括被耦合到存储器118的一个或多个处理器116。例如,第二设备117可以是联网计算机。如本文所指,联网计算机可以包括但不限于计算机设备或通信设备,包括例如服务器、网络装备、个人计算机、工作站、电话、手持PC、个人数字助理、非接触式卡、瘦客户端、胖客户端、互联网浏览器或其他设备。第二设备117也可以是移动设备;例如,移动设备可以包括来自的iPhone、iPod、iPad或运行Apple的操作系统的任何其他移动设备、运行微软的Mobile操作系统的任意设备、运行Google的操作系统的任意设备和/或任何其他智能手机、平板电脑或类似的可穿戴移动设备。System 100 may include a second application 115. The second application 115 may include instructions for execution on the second device 117. The second application 115 may communicate with any component of system 100. For example, the second device 117 may execute one or more applications such as the second application 115, enabling, for example, network and/or data communication with one or more components of system 100, and sending and/or receiving data. The second device 117 may include one or more processors 116 coupled to memory 118. For example, the second device 117 may be a networked computer. As referred to herein, a networked computer may include, but is not limited to, computer equipment or communication equipment, including, for example, servers, network equipment, personal computers, workstations, telephones, handheld PCs, personal digital assistants, contactless cards, thin clients, fat clients, internet browsers, or other devices. The second device 117 may also be a mobile device; for example, a mobile device may include an iPhone, iPod, iPad, or any other mobile device running Apple's operating system, any device running Microsoft's Mobile operating system, any device running Google's operating system, and/or any other smartphone, tablet, or similar wearable mobile device.
第二设备117可以包括处理电路,并且可以包含附加组件,该附加组件包括处理器、存储器、错误和奇偶校验/CRC校验器、数据编码器、防冲突算法、控制器、命令解码器、安全原语和防篡改硬件,如执行本文所述功能所需要的。第二设备117还可以包括显示器和输入设备。显示器可以是用于呈现视觉信息的任意类型的设备,诸如计算机监视器、平板显示器和移动设备屏幕,包括液晶显示器、发光二极管显示器、等离子面板和阴极射线管显示器。输入设备可以包括用于将信息输入到用户设备中的可用的并且由用户设备支持的任意设备,诸如触摸屏、键盘、鼠标、光标控制设备、触摸屏、麦克风、数码相机、录像机或便携式摄像机。这些设备可以被用于输入信息并且与本文所描述的软件其他设备交互。在一些示例中,第二设备117可以包括从移动设备、可穿戴设备和自动服务终端的组中选择的至少一个。The second device 117 may include processing circuitry and may include additional components such as a processor, memory, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives, and tamper-proof hardware, as required to perform the functions described herein. The second device 117 may also include a display and input devices. The display may be any type of device for presenting visual information, such as a computer monitor, flat panel display, and mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. Input devices may include any available and supported device for inputting information into a user device, such as a touchscreen, keyboard, mouse, cursor control device, microphone, digital camera, video recorder, or portable video camera. These devices may be used for inputting information and interacting with other devices in the software described herein. In some examples, the second device 117 may include at least one selected from the group consisting of mobile devices, wearable devices, and automated service terminals.
系统100可以包括网络120。在一些示例中,网络120可以是无线网络、有线网络或无线网络和有线网络的任意组合中的一个或多个,并且可以被配置为连接到系统100的任意一个组件。例如,客户端设备112、117可以被配置为经由网络120连接到服务器125。在一些示例中,网络120可以包括光纤网络、无源光学网络、有线网络、互联网网络、卫星网络、无线局域网(LAN)、全球移动通信系统、个人通信服务、个人区域网、无线应用协议、多媒体消息服务、增强型消息服务、短消息服务、基于时分复用的系统、基于码分多址的系统、D-AMPS、Wi-Fi、固定无线数据、IEEE 802.11b、802.15.1、802.11n和802.11g、蓝牙、NFC、射频识别(RFID)、Wi-Fi等中的一个或多个。System 100 may include network 120. In some examples, network 120 may be one or more of a wireless network, a wired network, or any combination of wireless and wired networks, and may be configured to connect to any component of system 100. For example, client devices 112, 117 may be configured to connect to server 125 via network 120. In some examples, network 120 may include one or more of the following: fiber optic network, passive optical network, wired network, Internet network, satellite network, wireless local area network (LAN), Global System for Mobile Communications (GSMO), personal communication service, personal area network, wireless application protocol, multimedia messaging service, enhanced messaging service, short message service, time division multiplexing-based system, code division multiple access-based system, D-AMPS, Wi-Fi, fixed wireless data, IEEE 802.11b, 802.15.1, 802.11n and 802.11g, Bluetooth, NFC, radio frequency identification (RFID), Wi-Fi, etc.
此外,网络120可以包括但不限于电话线、光纤、IEEE以太网902.3、广域网、无线个人区域网、LAN或诸如互联网之类的全球网络。此外,网络120可以支持互联网、无线通信网络、蜂窝网络等,或者它们的任意组合。网络120还可以包括一个网络,或者上面提及的任意数量的示例性类型的网络,作为独立的网络或者彼此协作地操作。网络120可以利用它们通信地被耦合到的一个或多个网元的一个或者多个协议。网络120可以转换成网络设备的一个或多个协议,或者从其他协议转换成网络设备的一个或多个协议。尽管网络120被描绘为单个网络,但是应当理解,根据一个或多个示例,网络120可以包括多个互连的网络,诸如例如互联网、服务提供商的网络、有线电视网络、诸如信用卡协会网络之类的公司网络以及家庭网络。Furthermore, network 120 may include, but is not limited to, telephone lines, fiber optic cables, IEEE Ethernet 902.3, wide area networks, wireless personal area networks, LANs, or global networks such as the Internet. Additionally, network 120 may support the Internet, wireless communication networks, cellular networks, or any combination thereof. Network 120 may also include a single network, or any number of exemplary types of networks mentioned above, operating as independent networks or collaboratively with each other. Network 120 may utilize one or more protocols of one or more network elements to which it is communicatively coupled. Network 120 may be converted to one or more protocols of network devices, or converted from other protocols to one or more protocols of network devices. Although network 120 is depicted as a single network, it should be understood that, according to one or more examples, network 120 may include multiple interconnected networks, such as, for example, the Internet, service provider networks, cable television networks, corporate networks such as credit card association networks, and home networks.
客户端设备112、117可经由一个或多个网络120与一个或多个服务器125进行通信,并且可以作为与服务器125的相应前端至后端对进行操作。客户端设备112、117可以例如从在其上执行的移动设备应用110、115向服务器125发送一个或多个请求。该一个或多个请求可以与从服务器125检索数据相关联。服务器125可以接收来自客户端设备112、117的一个或多个请求。基于来自客户端应用110、115的一个或多个请求,服务器125可以被配置为检索所请求的数据。服务器125可以被配置为将接收到的数据发送给客户端应用110、115,接收到的数据响应于一个或多个请求。Client devices 112 and 117 can communicate with one or more servers 125 via one or more networks 120 and can operate as a corresponding front-end to back-end pair with server 125. Client devices 112 and 117 can, for example, send one or more requests to server 125 from mobile device applications 110 and 115 running on them. These requests may be associated with retrieving data from server 125. Server 125 can receive one or more requests from client devices 112 and 117. Based on one or more requests from client applications 110 and 115, server 125 can be configured to retrieve the requested data. Server 125 can be configured to send the received data to client applications 110 and 115 in response to one or more requests.
系统100可以包括一个或多个服务器125。在一些示例中,服务器125可以包括被耦合到存储器129的一个或多个处理器127。服务器125可以被配置为在不同时间控制和调用各种数据以执行多个工作流动作的中央系统、服务器或平台。服务器125可以被配置为连接到一个或多个客户端设备112、117。服务器125可以与客户端应用110、115进行数据通信。例如,服务器125可以经由一个或多个网络120与客户端应用110、115进行数据通信。System 100 may include one or more servers 125. In some examples, server 125 may include one or more processors 127 coupled to memory 129. Server 125 may be configured as a central system, server, or platform to control and invoke various data at different times to perform multiple workflow actions. Server 125 may be configured to connect to one or more client devices 112, 117. Server 125 may communicate with client applications 110, 115. For example, server 125 may communicate with client applications 110, 115 via one or more networks 120.
系统100可以包括一个或多个数据库130。数据库130可以包括关系数据库、非关系数据库或其他数据库实施方式,以及它们的包括多个关系数据库和非关系数据库的任意组合。在一些示例中,数据库130可以包括桌面数据库、移动数据库或内存数据库。此外,数据库130可以由设备112、117内部托管,或者数据库130可以诸如由服务器125、由基于云的平台外部托管到设备112、117,或者托管在与设备112、117进行数据通信的任意存储设备中。在一些示例中,数据库130可以与系统100的任意数量的组件进行数据通信。例如,服务器125可以被配置为从数据库130中检索由应用110、115发送的所请求的数据。服务器125可以被配置为经由网络120将接收到的数据从数据库130发送给客户端应用110、115,接收到的该数据响应于发送的一个或多个请求。在其他示例中,客户端应用110、115可以被配置为经由网络120从数据库130发送对所请求的数据的一个或多个请求。System 100 may include one or more databases 130. Database 130 may include relational databases, non-relational databases, or other database implementations, and any combination thereof comprising multiple relational and non-relational databases. In some examples, database 130 may include a desktop database, a mobile database, or an in-memory database. Furthermore, database 130 may be hosted internally on devices 112, 117, or it may be hosted externally on devices 112, 117, such as by server 125, by a cloud-based platform, or on any storage device that communicates with devices 112, 117. In some examples, database 130 may communicate with any number of components of system 100. For example, server 125 may be configured to retrieve requested data sent by applications 110, 115 from database 130. Server 125 may be configured to send received data from database 130 to client applications 110, 115 via network 120, the received data being in response to one or more requests. In other examples, client applications 110 and 115 may be configured to send one or more requests for requested data from database 130 via network 120.
在一些示例中,根据本文所描述的本公开的示例性过程可以由处理装置和/或计算装置(例如,计算机硬件装置)执行。这种处理/计算装置例如可以是计算机/处理器的全部或一部分,或者包括但不限于计算机/处理器,该计算机/处理器可以包括例如一个或多个微处理器,并且使用被存储在计算机可访问介质(例如,RAM、ROM、硬盘驱动器或其他存储设备)上的指令。例如,计算机可访问介质可以是客户端设备112、117和/或服务器125或其他计算机硬件装置的存储器的一部分。In some examples, the exemplary processes described herein can be performed by a processing device and/or a computing device (e.g., a computer hardware device). Such a processing/computing device may be, for example, all or part of a computer/processor, or may include, but is not limited to, a computer/processor that may include, for example, one or more microprocessors, and uses instructions stored on a computer-accessible medium (e.g., RAM, ROM, hard disk drive, or other storage device). For example, the computer-accessible medium may be part of the memory of client devices 112, 117, and/or server 125 or other computer hardware devices.
在一些示例中,可以提供计算机可访问介质(例如,如上文所描述,诸如硬盘、软盘、记忆棒、CD-ROM、RAM、ROM等之类的存储设备或其集合)(例如,与处理装置进行通信)。计算机可访问介质可以包含其上的可执行指令。另外地或可替选地,存储装置可以与计算机可访问介质分开提供,该存储装置可以向处理装置提供指令,以便将处理装置配置为执行某些示例性过程、进程和方法,例如,如上所描述。In some examples, a computer-accessible medium (e.g., a storage device or a collection thereof, such as a hard disk, floppy disk, memory stick, CD-ROM, RAM, ROM, etc., as described above) may be provided (e.g., for communication with a processing device). The computer-accessible medium may contain executable instructions thereon. Alternatively or separately, a storage device may be provided separately from the computer-accessible medium, which may provide instructions to the processing device to configure the processing device to perform certain exemplary procedures, processes, and methods, such as those described above.
在一些示例中,发送设备105可以包括基于接触的卡。例如,该基于接触的卡可以被配置为在与设备建立连接之后发送链路以发起数据传送。该链路可以包括例如URL、IRL、URI或URN。非限制性地,该基于接触的卡可以被配置为与客户端设备112的读卡器(例如,芯片读取器或磁条读取器)建立物理接触。读卡器可以集成在客户端设备112的内部或外部。In some examples, the sending device 105 may include a contact-based card. For example, the contact-based card may be configured to send a link to initiate data transmission after a connection is established with the device. This link may include, for example, a URL, IRL, URI, or URN. Without limitation, the contact-based card may be configured to establish physical contact with a card reader (e.g., a chip reader or magnetic stripe reader) of the client device 112. The card reader may be integrated internally or externally into the client device 112.
在其他示例中,发送设备105可以包括非接触式卡。例如,非接触式卡可以被配置为在进入通信场之后,向第一应用110发送链路以发起数据传送。该链路可以包括例如URL、IRL、URI或URN。在一些示例中,非接触式卡可以经由从轻敲、轻刷、挥动或其任意组合的组中选择的一个或多个手势进入客户端设备112的通信场。In other examples, the sending device 105 may include a contactless card. For example, the contactless card may be configured to send a link to the first application 110 to initiate data transmission after entering the communication field. This link may include, for example, a URL, IRL, URI, or URN. In some examples, the contactless card may enter the communication field of the client device 112 via one or more gestures selected from the group of tapping, swiping, waving, or any combination thereof.
在一些示例中,可以基于移动网络运营商(MNO)查找来识别用户。在其他示例中,可以基于与之前的帐户登录相关联的一个或多个cookie来识别用户,例如,登录到与发送设备相关联的账户、与用户相关联的单独账户和/或其他账户。该链路可以包括近场通信数据交换格式统一资源定位符(NDEF URL),并且可以被配置为调用一个或多个动作或应用。在一个示例中,该链路可以被配置为调用网站,这可以包括使得在客户端设备112或另一设备上执行的浏览器或其他查看应用访问和显示网站和/或使得网站执行一个或多个动作(例如,显示或提交信息)。在另一示例中,该链路可以被配置为调用在客户端设备112或单独的设备上执行的应用。In some examples, a user may be identified based on a Mobile Network Operator (MNO) lookup. In other examples, a user may be identified based on one or more cookies associated with a previous account login, such as login to an account associated with the sending device, a separate account associated with the user, and/or other accounts. The link may include a Near Field Communication Data Exchange Format Uniform Resource Locator (NDEF URL) and may be configured to invoke one or more actions or applications. In one example, the link may be configured to invoke a website, which may include causing a browser or other viewing application running on client device 112 or another device to access and display the website and/or causing the website to perform one or more actions (e.g., displaying or submitting information). In another example, the link may be configured to invoke an application running on client device 112 or a separate device.
该链路可以包括第一组信息和第二组信息。例如,第一组信息可以包括标识符信息。第一组信息可以包括在发送设备105进入通信场之后由处理器生成的抽象用户名。例如,可以以例如动态生成的URL的形式,为每笔交易生成抽象的标识信息。非限制性地,可以通过将唯一标识符与一个或多个变量(例如计数器、一个或多个密码算法和/或其任意组合)相组合来在卡上生成识别信息。例如,一个或多个密码算法可以包括诸如公钥或私钥加密之类的加密技术,该加密技术也将被诸如服务器125之类的服务器所知,用于认证。非限制性地,示例性对称密钥算法可以包括诸如DES、三重DES或AES之类的对称密钥加密。非限制性地,示例性非对称密钥算法可以包括非对称公钥加密、数字签名算法或RSA。例如,第二组信息可以包括用户信息,诸如持卡人信息(例如,账户所有者姓名、账号、失效日期、卡验证值)。第一应用110可以被配置为通过基于链路激活一个或多个动作来识别与第一设备112相关联的用户。该一个或多个动作可以被配置为请求确认与数据传送相关联的第三组信息。第三组信息可以包括从数量、数字资产和接收方信息的组中选择的至少一个。The link may include a first set of information and a second set of information. For example, the first set of information may include identifier information. The first set of information may include an abstract username generated by the processor after the sending device 105 enters the communication field. For example, abstract identifier information may be generated for each transaction in the form of, for example, a dynamically generated URL. Without limitation, identification information can be generated on the card by combining a unique identifier with one or more variables (e.g., a counter, one or more cryptographic algorithms, and/or any combination thereof). For example, one or more cryptographic algorithms may include encryption techniques such as public-key or private-key encryption, which will also be known to a server such as server 125 for authentication. Without limitation, exemplary symmetric key algorithms may include symmetric key encryption such as DES, triple DES, or AES. Without limitation, exemplary asymmetric key algorithms may include asymmetric public-key encryption, digital signature algorithms, or RSA. For example, the second set of information may include user information such as cardholder information (e.g., account owner name, account number, expiration date, card verification value). The first application 110 may be configured to identify the user associated with the first device 112 by activating one or more actions based on the link. The one or more actions can be configured to request confirmation of a third set of information associated with the data transfer. The third set of information may include at least one selected from the groups of quantity, digital assets, and recipient information.
在一些示例中,至少一个动作可以包括启动被配置为识别与第一设备112相关联的用户的网站。服务器125可以被配置为通过从第一设备112的一组设备指纹和被存储在第一设备112上的cookie的组中选择的至少一个来识别与第一设备112相关联的用户。非限制性地,设备指纹识别可以基于从第一设备112的设备配置、设备存储器、设备屏幕尺寸、设备操作系统版本、安装的应用、电话运营商提供商、网站的第三方cookie、通过移动网络运营商(MNO)查找的电话号码追踪、浏览器类型、浏览器语言、IP地址和/或其任意组合的组中选择的至少一个。网站可以被配置为在第一设备112上显示第二组信息和第三组信息。在成功地识别第一设备112的用户或所有者之后,网站可以被配置为加载包括第二组信息的预定信息。在一些示例中,该预定信息可以包括诸如持卡人信息之类的用户信息。在一些示例中,当发送设备105进入通信场时,该信息可以被嵌入NDEF URL中并经由NDEF URL传递。网站还可以被配置为允许指定数量,包括但不限于金额。网站还可以被配置为通过选择按钮来提交传送。此外,网站还可以被配置为调整数据传送的接收方和/或转让方。例如,数据传送的方向性可以被颠倒。在一些示例中,通过调整传输的方向性,诸如从转让方到接收方或者从接收方到转让方,可以生成诸如推送通知或电子邮件之类的对应的消息,以便指示对所需的传送反向性的确认。在一些示例中,该对应的消息可以由第一应用110和/或第二应用115显示。In some examples, at least one action may include launching a website configured to identify a user associated with the first device 112. Server 125 may be configured to identify a user associated with the first device 112 by selecting at least one from a set of device fingerprints of the first device 112 and cookies stored on the first device 112. Non-limitingly, device fingerprint identification may be based on at least one from a set of device configuration, device memory, device screen size, device operating system version, installed applications, telephone carrier provider, third-party cookies of the website, telephone number tracking obtained through a mobile network operator (MNO), browser type, browser language, IP address, and/or any combination thereof. The website may be configured to display a second set of information and a third set of information on the first device 112. After successfully identifying the user or owner of the first device 112, the website may be configured to load predetermined information including the second set of information. In some examples, this predetermined information may include user information such as cardholder information. In some examples, this information may be embedded in and transmitted via an NDEF URL when the transmitting device 105 enters the communication field. The website can also be configured to allow specifying quantities, including but not limited to monetary amounts. The website can also be configured to submit a transmission via a selection button. Furthermore, the website can be configured to adjust the recipient and/or transferor of the data transmission. For example, the directionality of the data transmission can be reversed. In some examples, by adjusting the directionality of the transmission, such as from transferor to recipient or from recipient to transferor, a corresponding message, such as a push notification or email, can be generated to indicate confirmation of the desired reversal of transmission. In some examples, this corresponding message can be displayed by the first application 110 and/or the second application 115.
第二应用115可以被配置为发送与第三组信息的认证和确认相关联的一个或多个响应,以完成数据传送。在一些示例中,第二应用115可以被配置为从第一应用110接收通知,该通知需要与第三组信息的确认相关联的一个或多个响应。第二应用115可以被配置为执行与第三组信息的确认相关联的一个或多个认证通信。例如,可以在验证了接收到的响应并且确认了与数据传送相关联的第三组信息之后,完成数据传送。在一些示例中,一个或多个认证通信可以包括从生物特征通信和登录通信的组中选择的至少一个。The second application 115 can be configured to send one or more responses associated with authentication and confirmation of the third set of information to complete data transfer. In some examples, the second application 115 can be configured to receive a notification from the first application 110 that requires one or more responses associated with confirmation of the third set of information. The second application 115 can be configured to perform one or more authentication communications associated with confirmation of the third set of information. For example, data transfer can be completed after the received responses have been verified and the third set of information associated with data transfer has been confirmed. In some examples, one or more authentication communications may include at least one selected from the group of biometric communications and login communications.
在其他示例中,至少一个动作可以包括由第一应用110请求一个或多个登录凭证。第一应用110可以被配置为在提交所请求的一个或多个登录凭证时以及在认证一个或多个登录凭证时,深度链接到具有第二组信息和第三组信息的屏幕。举例来说,本文所描述的深度链接可以指NDEF URL被配置为链接到网站上的特定的、通常可搜索的或被索引的web内容部分,而不是网站的主页。第三组信息可以包括从数量、数字资产和接收方信息的组中选择的至少一个。在一些示例中,第二应用115可以被配置为接收通知,该通知要求与第三组信息的确认相关联的一个或多个响应。第二应用115可以被配置为执行与第三组信息的确认相关联的一个或多个认证通信。在一些示例中,一个或多个认证通信可以包括认证输入。示例性认证输入可以包括但不限于登录凭证、账户信息、安全信息、生物特征信息及其组合的输入(例如,输入用户名、密码、账号、安全码、一次性密码、安全问题的答案、指纹、面部扫描、视网膜扫描、语音识别,以及登录到与账户或发卡机构相关联的应用或网站)。In other examples, at least one action may include a first application 110 requesting one or more login credentials. The first application 110 may be configured to deeply link to a screen containing a second set of information and a third set of information upon submission of the requested login credentials and upon authentication of the login credentials. For example, the deep link described herein may refer to an NDEF URL being configured to link to a specific, generally searchable or indexed section of web content on a website, rather than the website's homepage. The third set of information may include at least one selected from the groups of quantity, digital assets, and recipient information. In some examples, a second application 115 may be configured to receive a notification requesting one or more responses associated with confirmation of the third set of information. The second application 115 may be configured to perform one or more authentication communications associated with confirmation of the third set of information. In some examples, one or more authentication communications may include authentication input. Exemplary authentication input may include, but is not limited to, input of login credentials, account information, security information, biometric information, and combinations thereof (e.g., entering a username, password, account number, security code, one-time password, answer to a security question, fingerprint, facial scan, retinal scan, voice recognition, and logging into an application or website associated with an account or issuing institution).
与发送设备105用户相关联的设备(诸如与持卡人相关联的第二设备117的第二应用115),可以被配置为接收通知,包括但不限于推送通知或电子邮件,该通知用作金额、数字资产和传送接收方的第二确认。为了确认数据传送,持卡人可以选择按钮来采取响应于所请求的认证通信的动作,诸如提供认证输入。在经由所接收的认证输入对登录进行认证之后,可以确认传送。以这种方式,在确认之后,点对点传送将用于经过认证的用户,因为传送是到已知的接收方。Devices associated with the user of sending device 105 (such as a second application 115 of a second device 117 associated with a cardholder) can be configured to receive notifications, including but not limited to push notifications or emails, which serve as a secondary confirmation of amount, digital assets, and the recipient of the transfer. To confirm the data transfer, the cardholder can select a button to take an action in response to a requested authentication communication, such as providing authentication input. After authenticating login via the received authentication input, the transfer can be confirmed. In this way, after confirmation, peer-to-peer transfers will be used for the authenticated user because the transfer is to a known recipient.
在一些示例中,点对点传送可以包括发放信用。该信用可以符合一项或多项消费限制。例如,一项或多项消费限制可以包括时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合。在一些示例中,信用的发放可以与一个或多个奖励和/或积分相关联。例如,如果在特定的时间(例如周末)在特定的商家(例如餐馆)使用信用,则可以发放奖励和/或积分,从并由此添加到用户奖励或忠诚度积分计划中。例如,奖励和/或积分可以针对转让方和受让方中的每一个进行调整,并且可以基于信用的兑换进行调整。例如,如果在特定的商家(例如餐馆)和/或在特定的时间(例如周末)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。当接收方或受让方使用信用时,转让方仍然可以累积奖励和/或积分。In some examples, peer-to-peer transfers may include the issuance of credit. This credit may be subject to one or more spending restrictions. For example, one or more spending restrictions may include time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, the issuance of credit may be associated with one or more rewards and/or points. For example, if credit is used at a specific merchant (e.g., a restaurant) at a specific time (e.g., a weekend), rewards and/or points may be issued and thus added to the user's rewards or loyalty points program. For example, rewards and/or points may be tailored to each of the transferor and transferee and may be adjusted based on the redemption of credit. For example, if credit is used at a specific merchant (e.g., a restaurant) and/or at a specific time (e.g., a weekend), rewards and/or points may be issued and thus added to the user's rewards or loyalty points program. The transferor may still accumulate rewards and/or points when the recipient or transferee uses the credit.
在其他示例中,点对点传送可以包括一个或多个数字资产的传送。非限制性地,数字资产可以包括图像或文档。非限制性地,数字资产的格式类型可以包括从静态图像文件(例如JPEG、PNG、SVG)、静态文档文件(例如PDF、PSD)、动画文件(例如GIF、SWF)和web代码(例如HTML、CSS、JavaScript)的组中选择的至少一个。一个或多个数字资产可以被识别用于传送。例如,可以通过启动网站并上传所识别的用于传送的数字资产来安全地传输数字资产。在另一示例中,可以通过打开应用或启动电子邮件客户端来安全地传输数字资产,在该电子邮件客户端中,所识别的数字资产可以作为附件被包括。在另一示例中,数字资产可以被识别为统一资源定位符(URL)的一部分,该URL被发送用于检索所识别的数字资产。In other examples, peer-to-peer delivery may include the delivery of one or more digital assets. Without limitation, digital assets may include images or documents. Without limitation, the format type of the digital asset may include at least one selected from the group consisting of static image files (e.g., JPEG, PNG, SVG), static document files (e.g., PDF, PSD), animated files (e.g., GIF, SWF), and web code (e.g., HTML, CSS, JavaScript). One or more digital assets may be identified for delivery. For example, digital assets can be securely transmitted by launching a website and uploading the identified digital assets for delivery. In another example, digital assets can be securely transmitted by opening an application or launching an email client in which the identified digital assets may be included as attachments. In yet another example, digital assets may be identified as part of a Uniform Resource Locator (URL) sent for retrieving the identified digital assets.
在其他示例中,点对点传送可以包括诸如现金传送之类的资金传送。与同发放信用一样,资金传送可能受到一项或多项消费限制和/或一个或多个商家的限制。例如,资金传送可能受到基于时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,资金传送可以包括多个部分。例如,可以在资金传送的第二部分之前传输资金传送的第一部分。资金传送的任意部分都可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。以这种方式,资金传送可以被合计传输,直到满足整个资金传送为止。In other examples, peer-to-peer transfers may include money transfers such as cash transfers. Similar to credit issuance, money transfers may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, money transfers may be subject to constraints based on time limits, amount limits, geographic restrictions, merchant type, merchant restrictions, and/or any combination thereof. In some examples, a money transfer may include multiple parts. For example, the first part of a money transfer may be transmitted before the second part. Any part of a money transfer may be transmitted at a predetermined time, including but not limited to a specific day, time, week, month, and/or any combination thereof. In this way, money transfers may be aggregated until the entire money transfer is satisfied.
在其他示例中,点对点传送可以包括虚拟礼品卡的发放。如同信用的发放一样,虚拟礼品卡可能受到一项或多项消费限制和/或一个或多个商家的限制。例如,虚拟礼品卡可能受到时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的限制。在一些示例中,点对点传送可以包括与虚拟礼品卡的各种金额相关联的多个部分。例如,可以在点对点传送的第二部分之前传输点对点传送的第一部分。传送的任意部分可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。In other examples, peer-to-peer delivery may include the issuance of virtual gift cards. Similar to the issuance of credit, virtual gift cards may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, virtual gift cards may be subject to time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, peer-to-peer delivery may include multiple portions associated with various amounts of the virtual gift card. For example, the first portion of a peer-to-peer delivery may be transmitted before the second portion. Any portion of the delivery may be transmitted at a predetermined time, including but not limited to a day, a time, a week, a month, and/or any combination thereof.
图2A示出了一个或多个发送设备200。发送设备200可以参考发送设备或非接触式卡105的相同或类似的组件,如以上关于图1所解释的。尽管图2A和2B示出了发送设备200的组件的单个实例,但可以使用任意数量的组件。Figure 2A illustrates one or more transmitting devices 200. Transmitting device 200 may refer to the same or similar components of a transmitting device or contactless card 105, as explained above with respect to Figure 1. Although Figures 2A and 2B show a single instance of the components of transmitting device 200, any number of components may be used.
发送设备200可以配置为与系统100的一个或多个组件进行通信。发送设备200可以包括基于接触的卡或非接触式卡,其可以包括由显示在卡200的正面或背面上的服务提供商205发放的支付卡,诸如信用卡、借记卡或礼品卡。在一些示例中,非接触式卡200与支付卡无关,并且可以包括但不限于身份证、会员卡和交通卡。在一些示例中,支付卡可以包括双接口非接触式支付卡。非接触式卡200可以包括基板210,基板210可以包括由塑料、金属和其他材料构成的单层或一个或多个层压层。示例性的基板材料包括聚氯乙烯、聚氯乙烯醋酸酯、丙烯腈丁二烯苯乙烯、聚碳酸酯、聚酯、阳极化钛、钯、金、碳、纸和可生物降解的材料。在一些示例中,非接触式卡200可以具有符合ISO/IEC 7810标准的ID-1格式的物理特性,并且非接触式卡可以另外符合ISO/IEC 14443标准。然而,应当理解,根据本公开的非接触式卡200可以具有不同的特性,并且本公开不要求在支付卡中实现非接触式卡。The sending device 200 can be configured to communicate with one or more components of the system 100. The sending device 200 can include contact-based or contactless cards, which can include payment cards such as credit cards, debit cards, or gift cards issued by a service provider 205 displayed on the front or back of the card 200. In some examples, the contactless card 200 is not a payment card and can include, but is not limited to, ID cards, membership cards, and transportation cards. In some examples, the payment card can include a dual-interface contactless payment card. The contactless card 200 can include a substrate 210, which can include a single layer or one or more laminates made of plastic, metal, and other materials. Exemplary substrate materials include polyvinyl chloride, polyvinyl chloride acetate, acrylonitrile butadiene styrene, polycarbonate, polyester, anodized titanium, palladium, gold, carbon, paper, and biodegradable materials. In some examples, the contactless card 200 can have physical characteristics conforming to the ID-1 format of the ISO/IEC 7810 standard, and the contactless card can additionally conform to the ISO/IEC 14443 standard. However, it should be understood that the contactless card 200 according to this disclosure may have different characteristics, and this disclosure does not require the implementation of contactless cards in payment cards.
非接触式卡200还可以包括显示在卡的正面和/或背面的识别信息215以及接触垫220。接触垫220可以被配置为建立与另一通信设备的接触,该通信设备包括但不限于用户设备、智能电话、膝上型电脑、台式机或平板电脑。非接触式卡200还可以包括处理电路、天线和图2A中未示出的其他组件。这些组件可以位于接触垫220的后面或衬底210上的其它地方。非接触式卡200还可以包括磁条或磁带,其可以位于卡的背面(图2A中未示出)。The contactless card 200 may also include identification information 215 displayed on the front and/or back of the card, and a contact pad 220. The contact pad 220 may be configured to establish contact with another communication device, including but not limited to user equipment, smartphones, laptops, desktop computers, or tablet computers. The contactless card 200 may also include processing circuitry, an antenna, and other components not shown in FIG. 2A. These components may be located behind the contact pad 220 or elsewhere on the substrate 210. The contactless card 200 may also include a magnetic stripe or magnetic tape, which may be located on the back of the card (not shown in FIG. 2A).
如图2B所示,图2A的接触垫220可以包括用于存储和处理信息的处理电路225,该处理电路225包括微处理器230和存储器235。应当理解,该处理电路225可以包含附加的组件,该附加的组件包括处理器、存储器、错误和奇偶校验/CRC校验器、数据编码器、防冲突算法、控制器、命令解码器、安全原语和防篡改硬件,如执行本文所述功能所需要的。As shown in Figure 2B, the contact pad 220 of Figure 2A may include processing circuitry 225 for storing and processing information. This processing circuitry 225 includes a microprocessor 230 and a memory 235. It should be understood that the processing circuitry 225 may include additional components, including a processor, memory, error and parity/CRC checksum, data encoder, anti-collision algorithm, controller, command decoder, security primitives, and tamper-proof hardware, as required to perform the functions described herein.
存储器235可以是只读存储器、一次写入多次读取存储器或读/写存储器,例如RAM、ROM和EEPROM,并且非接触式卡200可以包括这些存储器中的一个或多个。只读存储器可以是工厂可编程的只读存储器或一次性可编程存储器。一次性可编程性提供了一次写入然后多次读取的机会。一次写入/多次读取存储器可以在存储器芯片出厂后的某个时间点被编程。一旦对存储器进行了编程,它可能不会被重写,但是它可能会被多次读取。读/写存储器可能在出厂后被编程和重新编程多次。它也可以被读取多次。Memory 235 can be a read-only memory, a write-once-read-many memory, or a read/write memory, such as RAM, ROM, and EEPROM, and the contactless card 200 may include one or more of these memories. Read-only memory can be factory-programmable or one-time programmable. One-time programmability provides the opportunity to write once and then read many times. Write-once/read-many memory can be programmed at some point after the memory chip leaves the factory. Once programmed, the memory may not be rewritten, but it may be read multiple times. Read/write memory may be programmed and reprogrammed multiple times after leaving the factory. It can also be read multiple times.
存储器235可以被配置为存储一个或多个小程序240、一个或多个计数器245和客户标识符250。一个或多个小程序240可以包括被配置为在一个或多个非接触式卡(诸如Java卡小程序)上执行的一个或多个软件应用。然而,应当理解,小程序240不限于Java卡小程序,而是可以是可在非接触式卡或具有有限存储器的其他设备上操作的任何软件应用。一个或多个计数器245可以包括足以存储整数的数字计数器。客户标识符250可以包括分配给非接触式卡200的用户的唯一字母数字标识符,并且该标识符可以将非接触式卡的用户与其他非接触式卡用户区分开来。在一些示例中,客户标识符250可以识别客户和分配给该客户的账户,并且还可以识别与该客户的帐户相关联的非接触式卡。Memory 235 can be configured to store one or more applets 240, one or more counters 245, and a customer identifier 250. The one or more applets 240 may include one or more software applications configured to execute on one or more contactless cards (such as Java Card applets). However, it should be understood that applet 240 is not limited to Java Card applets, but can be any software application that can operate on a contactless card or other device with limited memory. The one or more counters 245 may include numeric counters sufficient to store integers. The customer identifier 250 may include a unique alphanumeric identifier assigned to a user of the contactless card 200, and this identifier can distinguish the user of the contactless card from other contactless card users. In some examples, the customer identifier 250 can identify a customer and the account assigned to that customer, and can also identify the contactless card associated with that customer's account.
参考接触垫描述了前述示例性实施例的处理器和存储器元件,但本公开不限于此。应当理解,这些元件可以在垫220之外实施,或者与垫220完全分离,或者作为除了位于接触垫220内的处理器230和存储器235元件之外的其他元件来实施。The processor and memory elements of the foregoing exemplary embodiments are described with reference to the contact pad, but this disclosure is not limited thereto. It should be understood that these elements may be implemented outside of the pad 220, or completely separated from the pad 220, or implemented as other elements besides the processor 230 and memory 235 elements located within the contact pad 220.
在一些示例中,非接触式卡200可以包括一个或多个天线255。该一个或多个天线255可以被放置在非接触式卡200内并围绕接触垫220的处理电路225。例如,该一个或多个天线255可以与处理电路225集成在一起,并且该一个或多个天线255可与外部升压线圈一起使用。作为另一示例,该一个或多个天线255可以在接触垫220和处理电路225的外部。In some examples, the contactless card 200 may include one or more antennas 255. These antennas 255 may be placed within the contactless card 200 and surrounding the processing circuitry 225 of the contact pad 220. For example, the antennas 255 may be integrated with the processing circuitry 225, and may be used in conjunction with an external boost coil. As another example, the antennas 255 may be external to the contact pad 220 and the processing circuitry 225.
在一个实施例中,非接触式卡200的线圈可以用作空心变压器的次级。终端可以通过切断电源或调幅来与非接触式卡200进行通信。非接触式卡200可以使用非接触式卡的电力连接中的间隙来推断从终端发送的数据,该电力连接可以通过一个或多个电容器来功能性地保持。非接触式卡200可以通过切换非接触式卡的线圈上的负载或负载调制来进行通信。负载调制可以通过干扰在终端的线圈中被检测到。In one embodiment, the coil of the contactless card 200 can be used as the secondary winding of an air-core transformer. The terminal can communicate with the contactless card 200 by cutting off power or by amplitude modulation. The contactless card 200 can infer data transmitted from the terminal using gaps in the power connection of the contactless card, which can be functionally maintained by one or more capacitors. The contactless card 200 can communicate by switching the load or load modulation on the coil of the contactless card. Load modulation can be detected in the coil of the terminal by interference.
图3描述了对数据传送进行认证的方法300。图3可以参考系统100的相同或相似的组件以及图2A和图2B的发送设备200。Figure 3 illustrates a method 300 for authenticating data transmission. Figure 3 may refer to the same or similar components of system 100 and the transmitting device 200 of Figures 2A and 2B.
在框310处,方法300可以包括在发送设备的一个或多个处理器进入通信场后,向第一应用发送链路,该链路包括用于在第一设备上执行的指令,该链路被配置为发起数据传送,该链路包括近场通信数据交换格式统一资源定位符,该统一资源定位符包括标识符数据和持卡人数据。在一些示例中,链路的发送可以发生在动态生成链路之后。在一些示例中,发送设备可以经由从轻敲、轻刷、挥动或其任意组合的组中选择的一个或多个手势进入客户端设备的通信场。在一些示例中,可以基于移动网络运营商(MNO)查找来识别用户。在其他示例中,可以基于与之前的账户登录相关联的一个或多个cookie来识别用户,例如,登录到与发送设备相关联的账户、与用户相关联的单独账户和/或其他账户。At block 310, method 300 may include sending a link to a first application after one or more processors of the transmitting device enter the communication field. This link includes instructions for execution on the first device, is configured to initiate data transmission, and includes a Near Field Communication Data Exchange Format Uniform Resource Locator (URI) comprising identifier data and cardholder data. In some examples, the transmission of the link may occur after the link is dynamically generated. In some examples, the transmitting device may enter the communication field of the client device via one or more gestures selected from a group of taps, swipes, waves, or any combination thereof. In some examples, the user may be identified based on a Mobile Network Operator (MNO) lookup. In other examples, the user may be identified based on one or more cookies associated with a previous account login, such as an account associated with the transmitting device, a separate account associated with the user, and/or other accounts.
该链路可以包括近场通信数据交换格式统一资源定位符(NDEF URL)。该链路可以包括第一组信息和第二组信息。第一组信息可以包括标识符信息。例如,第一组信息可以包括在发送设备进入通信场之后由处理器生成的抽象用户名。例如,可以为每笔交易生成诸如动态生成的URL之类的抽象的识别信息。非限制性地,可以通过将唯一标识符与一个或多个变量(例如计数器、一个或多个密码算法和/或其任意组合)相结合来在卡上生成识别信息。例如,一个或多个密码算法可以包括诸如公钥或私钥加密之类的加密技术,该加密技术也将被用于认证的服务器所知。非限制性地,示例性对称密钥算法可以包括对称密钥加密(诸如DES、三重DES或AES)。非限制性地,示例性非对称密钥算法可以包括非对称公钥加密、数字签名算法或RSA。例如,第二组信息可以包括用户信息,诸如持卡人信息。在一些示例中,第二组信息可以包括持卡人信息(例如,账户所有者姓名、账号、失效日期、卡验证值)。The link may include a Near Field Communication Data Exchange Format Uniform Resource Locator (NDEF URL). The link may include a first set of information and a second set of information. The first set of information may include identifier information. For example, the first set of information may include an abstract username generated by the processor after the transmitting device enters the communication field. For example, abstract identification information such as a dynamically generated URL may be generated for each transaction. Without limitation, identification information can be generated on the card by combining a unique identifier with one or more variables (e.g., a counter, one or more cryptographic algorithms, and/or any combination thereof). For example, one or more cryptographic algorithms may include encryption techniques such as public-key or private-key encryption, which will also be known to the authentication server. Without limitation, exemplary symmetric key algorithms may include symmetric key encryption (such as DES, triple DES, or AES). Without limitation, exemplary asymmetric key algorithms may include asymmetric public-key encryption, digital signature algorithms, or RSA. For example, the second set of information may include user information, such as cardholder information. In some examples, the second set of information may include cardholder information (e.g., account owner name, account number, expiration date, card verification value).
在框320处,方法300可以包括通过基于链路激活一个或多个动作来认证与第一设备相关联的用户。该一个或多个动作可以被配置为请求确认与数据传送相关联的第三组信息。该第三组信息可以包括从数量、数字资产和接收方信息的组中选择的至少一个。在一些示例中,至少一个动作可以包括启动被配置为识别与第一设备相关联的用户的网站。在其他示例中,至少一个动作可以包括由第一应用请求一个或多个登录凭证。At box 320, method 300 may include authenticating a user associated with the first device by activating one or more actions based on a link. The one or more actions may be configured to request confirmation of a third set of information associated with the data transfer. The third set of information may include at least one selected from the groups of quantity, digital assets, and recipient information. In some examples, at least one action may include launching a website configured to identify the user associated with the first device. In other examples, at least one action may include a first application requesting one or more login credentials.
在框330处,方法300可以包括发送对与数据传送相关联的数量、数字资产和接收方数据的确认的一个或多个请求。例如,第一应用可以被配置为接收指示与框320的第三组信息相关联的点对点传送的数量(诸如金额、数字资产)和接收方数据(例如接收方)的确认的输入。At box 330, method 300 may include sending one or more requests for confirmation of the quantity, digital assets, and recipient data associated with the data transfer. For example, a first application may be configured to receive input indicating confirmation of the quantity (such as amount, digital assets) and recipient data (such as recipient) of the peer-to-peer transfer associated with the third set of information in box 320.
在框340处,方法300可以包括接收一个或多个通知,该通知基于对与数据传送相关联的数量、数字资产和接收方数据的确认的一个或多个请求。与发送设备用户相关联的设备(诸如与持卡人相关联的第二设备的第二应用),可以被配置为接收通知,包括但不限于推送通知或电子邮件,该通知用作金额、数字资产和传送接收方的第二确认。At box 340, method 300 may include receiving one or more notifications based on one or more requests for confirmation of the amount, digital assets, and recipient data associated with the data transfer. A device associated with the sending device user (such as a second application on a second device associated with a cardholder) may be configured to receive notifications, including but not limited to push notifications or emails, which serve as a secondary confirmation of the amount, digital assets, and recipient data.
在框350处,方法300可以包括执行响应于一个或多个通知的一个或多个登录凭证,以完成数据传送。例如,可以接收一个或多个认证输入来完成数据传送。该认证输入可以响应于一个或多个通知。为了确认数据传送,持卡人可以选择按钮来采取响应于一个或多个请求并基于一个或多个通知的动作,诸如仅包括认证输入的所请求的认证通信。示例性的认证输入可以包括但不限于登录凭证、账户信息、安全信息、生物特征信息及其组合的输入(例如,输入用户名、密码、账号、安全码、一次性密码、安全问题的答案、指纹、面部扫描、视网膜扫描、语音识别,以及登录到与账户或发卡机构相关联的应用或网站)。在经由接收到的认证输入对登录进行认证之后,可以确认传送。此外,数据传送的方向性可以被颠倒。在一些示例中,通过调整传送的方向性,例如从转让方到接收方或者从接收方到转让方,可以生成诸如推送通知或电子邮件之类的对应的消息,以指示对所需的传送反向性的确认。在一些示例中,该对应的消息可以由第一应用和/或第二应用显示。以这种方式,在确认之后,点对点传送将用于经过认证的用户,因为传送是到已知的接收方。At box 350, method 300 may include executing one or more login credentials in response to one or more notifications to complete a data transfer. For example, one or more authentication inputs may be received to complete the data transfer. This authentication input may be in response to one or more notifications. To confirm the data transfer, the cardholder can select a button to take an action in response to one or more requests and based on one or more notifications, such as a requested authentication communication including only the authentication input. Exemplary authentication inputs may include, but are not limited to, login credentials, account information, security information, biometric information, and combinations thereof (e.g., entering a username, password, account number, security code, one-time password, answer to a security question, fingerprint, facial scan, retinal scan, voice recognition, and logging into an application or website associated with an account or card issuer). After authenticating the login via the received authentication input, the transfer can be confirmed. Furthermore, the directionality of the data transfer can be reversed. In some examples, by adjusting the directionality of the transfer, such as from transferor to recipient or from recipient to transferor, a corresponding message, such as a push notification or email, can be generated to indicate confirmation of the desired reversal of the transfer. In some examples, this corresponding message may be displayed by a first application and/or a second application. In this way, after confirmation, peer-to-peer transmissions will be used for authenticated users, since the transmission is to a known recipient.
在一些示例中,点对点传送可以包括发放信用。该信用可以符合一项或多项消费限制。例如,一项或多项消费限制可以包括时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合。In some examples, peer-to-peer delivery may include issuing credit. This credit may be subject to one or more spending restrictions. For example, one or more spending restrictions may include time restrictions, amount restrictions, geographical restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof.
在一些示例中,点对点传送可以与一个或多个奖励和/或积分相关联。例如,奖励和/或积分可以针对转让方和受让方中的每一个进行调整,并且可以基于信用的兑换进行调整。例如,如果在特定的商家(例如餐馆)和/或在特定的时间(例如周末)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。当接收方或受让方使用信用时,转让方仍然可以累积奖励和/或积分。在一些示例中,点对点传送可以包括多个部分。例如,可以在点对点传送的第二部分之前传输点对点传送的第一部分。例如,第一部分可以包括一个或多个奖励,并且第二部分可以包括一个或多个积分。传送的任意部分可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。In some examples, peer-to-peer transfers may be associated with one or more rewards and/or points. For example, rewards and/or points may be tailored to each of the transferor and transferee, and may be based on credit redemption. For instance, rewards and/or points may be awarded and added to a user's rewards or loyalty points program if the credit is used at a specific merchant (e.g., a restaurant) and/or at a specific time (e.g., a weekend). The transferor can still accumulate rewards and/or points as the recipient or transferee uses the credit. In some examples, peer-to-peer transfers may include multiple parts. For example, the first part of a peer-to-peer transfer may be transmitted before the second part. For example, the first part may include one or more rewards, and the second part may include one or more points. Any part of the transfer may be transmitted at a predetermined time, including but not limited to a day, a time, a week, a month, and/or any combination thereof.
在其他示例中,点对点传送可以包括一个或多个数字资产的传送。非限制性地,该数字资产可以包括图像或文档。非限制性地,该数字资产的格式类型可以包括从静态图像文件(诸如JPEG、PNG、SVG)、静态文档文件(诸如PDF、PSD)、动画文件(诸如GIF、SWF)和web代码(诸如HTML、CSS、JavaScript)的组中选择的至少一个。该一个或多个数字资产可以被识别用于传送。例如,可以通过启动网站并上传所识别的用于传送的数字资产来安全地传输数字资产。在另一示例中,可以通过打开应用或启动电子邮件客户端来安全地传输数字资产,在该电子邮件客户端中,所识别的数字资产可以作为附件被包括。在另一个示例中,数字资产可以是可以被识别为统一资源定位符(URL)的一部分的数字资产,该URL被发送用于检索所识别的数字资产。In other examples, peer-to-peer transmission may include the transmission of one or more digital assets. Without limitation, the digital asset may include an image or a document. Without limitation, the format type of the digital asset may include at least one selected from the group consisting of static image files (such as JPEG, PNG, SVG), static document files (such as PDF, PSD), animation files (such as GIF, SWF), and web code (such as HTML, CSS, JavaScript). The one or more digital assets may be identified for transmission. For example, a digital asset can be securely transmitted by launching a website and uploading the identified digital asset for transmission. In another example, a digital asset can be securely transmitted by opening an application or launching an email client in which the identified digital asset may be included as an attachment. In yet another example, the digital asset may be a digital asset that can be identified as part of a Uniform Resource Locator (URL), which is sent to retrieve the identified digital asset.
在其他示例中,点对点传送可以包括诸如现金传送之类的资金传送。如同发放信用一样,资金传送可能受到一项或多项消费约束和/或一个或多个商家的限制。例如,资金传送可以受到基于时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,资金传送可以包括多个部分。例如,可以在资金传送的第二部分之前传输资金传送的第一部分。资金传送的任意部分都可以在预定的时间被传输,包括但不限于某天、某时间次、某周、某月和/或其任意组合。以这种方式,资金传送可以被合计传输,直到满足整个资金传送为止。In other examples, peer-to-peer transfers may include money transfers such as cash transfers. Similar to credit issuance, money transfers may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, money transfers may be subject to restrictions based on time limits, amount limits, geographical restrictions, merchant type, merchant restrictions, and/or any combination thereof. In some examples, a money transfer may include multiple parts. For example, the first part of a money transfer may be transmitted before the second part. Any part of a money transfer may be transmitted at a predetermined time, including but not limited to a specific day, time period, week, month, and/or any combination thereof. In this way, money transfers may be aggregated until the entire money transfer is satisfied.
在其他示例中,点对点传送可以包括虚拟礼品卡的发放。如同信用的发放一样,虚拟礼品卡可以受到一项或多项消费约束和/或一个或多个商家的限制。例如,虚拟礼品卡可以受到时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合。在一些示例中,点对点传送可以包括与虚拟礼品卡的各种金额相关联的多个部分。例如,可以在点对点传送的第二部分之前传输点对点传送的第一部分。传送的任意部分可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。In other examples, peer-to-peer delivery may include the issuance of virtual gift cards. Similar to the issuance of credit, virtual gift cards may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, virtual gift cards may be subject to time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, peer-to-peer delivery may include multiple portions associated with various amounts of virtual gift cards. For example, the first portion of a peer-to-peer delivery may be transmitted before the second portion. Any portion of the delivery may be transmitted at a predetermined time, including but not limited to a day, a time, a week, a month, and/or any combination thereof.
图4描绘了根据示例性实施例的对数据传送进行发起和认证的方法。图4可以参考系统100的相同或相似的组件、图2A和图2B的发送设备200以及图3的方法300。如图4所示,点对点传送可以通过卡进入用户设备的通信场并加载网站来发起。Figure 4 illustrates a method for initiating and authenticating data transmission according to an exemplary embodiment. Figure 4 may be referenced to the same or similar components of system 100, the transmitting device 200 of Figures 2A and 2B, and the method 300 of Figure 3. As shown in Figure 4, peer-to-peer transmission can be initiated by a card entering the communication field of the user equipment and loading a website.
在框405处,方法400可以包括卡进入用户设备的通信场,包括但不限于经由一个或多个手势,所述手势选自轻敲、轻刷、挥动或其任意组合。这种通信可以包括但不限于NFC。在框410处,方法400可以包括在卡进入用户设备的通信场之后,经由NDEF URL加载网站以识别用户设备的用户。在一些示例中,卡可以被配置为在进入框405的通信场之后,向一个或多个用户设备的客户端应用发送链路,以发起数据传送。在一些示例中,链路的发送可以发生在动态生成链路之后。在一些示例中,客户端应用可以与发送设备或卡的发放实体相关联。在其他示例中,客户端应用可以不与发送设备或卡的发放实体相关联。例如,客户端应用可以与第三方实体或发送设备或卡的发放实体外部的实体相关联。At box 405, method 400 may include the card entering the communication field of a user equipment, including but not limited to via one or more gestures selected from tapping, swiping, waving, or any combination thereof. This communication may include, but is not limited to, NFC. At box 410, method 400 may include loading a website via an NDEF URL to identify the user of the user equipment after the card enters the communication field of the user equipment. In some examples, the card may be configured to send a link to a client application of one or more user equipment devices to initiate data transfer after entering the communication field of box 405. In some examples, the sending of the link may occur after the link is dynamically generated. In some examples, the client application may be associated with a sending device or the issuing entity of the card. In other examples, the client application may not be associated with a sending device or the issuing entity of the card. For example, the client application may be associated with a third-party entity or an entity external to the issuing entity of the sending device or the card.
在一些示例中,NDEF URL可以包括域名和标识符。例如,该链路可以包括抽象的识别信息,包括但不限于持卡人的账户或用户标识符,该标识信息在卡的个性化时被加载到芯片上。例如,URL可以在卡压印时被编码在NDEF文件中。可以为每笔交易生成抽象的识别信息,诸如动态生成的URL。非限制性地,可以通过将唯一标识符与一个或多个变量(例如计数器、一个或多个密码算法和/或其任意组合)相结合来在卡上生成识别信息。例如,一个或多个密码算法可以包括诸如公钥或私钥加密之类的加密技术,该加密技术也将被用于认证的服务器所知。非限制性地,示例性对称密钥算法可以包括对称密钥加密(诸如DES、三重DES或AES)。非限制性地,示例性非对称密钥算法可以包括非对称公钥加密、数字签名算法或RSA。In some examples, the NDEF URL may include a domain name and an identifier. For example, the link may include abstract identification information, including but not limited to the cardholder's account or user identifier, which is loaded onto the chip during card personalization. For example, the URL may be encoded in the NDEF file during card imprinting. Abstract identification information, such as a dynamically generated URL, can be generated for each transaction. Without limitation, identification information can be generated on the card by combining a unique identifier with one or more variables (e.g., a counter, one or more cryptographic algorithms, and/or any combination thereof). For example, one or more cryptographic algorithms may include encryption techniques such as public-key or private-key encryption, which will also be used by the authentication server. Without limitation, exemplary symmetric key algorithms may include symmetric key encryption (such as DES, triple DES, or AES). Without limitation, exemplary asymmetric key algorithms may include asymmetric public-key encryption, digital signature algorithms, or RSA.
在框415处,方法400可以包括经由设备指纹来识别用户,并且可以基于但不限于从设备配置、设备存储器、设备屏幕尺寸、设备操作系统版本、安装的应用、电话运营商提供商、网站的第三方cookie、通过MNO查找的电话号码追踪、浏览器类型、浏览器语言、IP地址和/或设备的其任意组合的组中选择的至少一个。At box 415, method 400 may include identifying a user via device fingerprint, and may be based on, but not limited to, at least one of the following groups: device configuration, device memory, device screen size, device operating system version, installed applications, telephone carrier provider, third-party cookies of websites, phone number tracking via MNO lookup, browser type, browser language, IP address and/or device.
在框420处,该方法可以包括,如果网站无法经由cookie或设备指纹来识别用户,则提示用户登录以识别用户。例如,如果网站不能经由从操作系统、浏览器类型、浏览器语言、IP地址的组中选择的至少一个成功地识别用户,则用户可以接收由服务器生成的指示不成功通知的通知,和/或可以由应用提示输入登录信息以便成功地识别用户,并且响应于不成功通知。At box 420, the method may include prompting the user to log in to identify the user if the website cannot identify the user via cookies or device fingerprints. For example, if the website cannot successfully identify the user via at least one selected from the group of operating system, browser type, browser language, and IP address, the user may receive a notification generated by the server indicating an unsuccessful attempt, and/or the application may prompt the user to enter login information to successfully identify the user, and respond to the unsuccessful attempt notification.
在框425处,方法400可以包括在识别用户后加载预定信息。在一些示例中,预定信息可以是与持卡人相关联的任意信息,该信息已经被填写或者以其他方式经由直接嵌入在NDEF URL中而在网站上提供。网站还可以被配置为通过选择按钮来提交传送。此外,网站还可以被配置为调整数据传送的接收方和/或转让方。例如,数据传送的方向性可以被颠倒。在一些示例中,通过调整传送的方向性,例如从转让方到接收方或者从接收方到转让方,可以生成诸如推送通知或电子邮件之类的对应的消息,以便指示对所需的传送反向性的确认。在一些示例中,该对应的消息可以由第一应用和/或第二应用来显示。At box 425, method 400 may include loading pre-registration information after user identification. In some examples, the pre-registration information may be any information associated with the cardholder that has been filled in or otherwise provided on the website via direct embedding in the NDEF URL. The website may also be configured to submit a transfer via a selection button. Furthermore, the website may be configured to adjust the recipient and/or transferor of the data transfer. For example, the directionality of the data transfer may be reversed. In some examples, by adjusting the directionality of the transfer, such as from transferor to recipient or from recipient to transferor, a corresponding message, such as a push notification or email, may be generated to indicate confirmation of the desired reversal of the transfer. In some examples, this corresponding message may be displayed by a first application and/or a second application.
在框430处,方法400可以包括在传送提交之前输入点对点传送的金额和接收方数据。在框435处,方法400可以包括接收电子邮件或推送通知以确认点对点传送。例如,持卡人可以与用户设备相关联。用户设备的应用可以被配置为接收通知。在框440处,响应于接收到通知,可以打开或显示通知,以便提示登录或请求生物特征输入来验证用户发起了传送。在一些示例中,该提示可以包括对一个或多个认证输入的请求。例如,示例性认证输入可以包括但不限于登录凭证、账户信息、安全信息、生物特征信息及其组合的输入(例如,输入用户名、密码、账号、安全码、一次性密码、安全问题的答案、指纹、面部扫描、视网膜扫描、语音识别,以及登录到与账户或发卡机构相关联的应用或网站)。At box 430, method 400 may include entering the amount and recipient data for the peer-to-peer transfer before the transfer is submitted. At box 435, method 400 may include receiving an email or push notification to confirm the peer-to-peer transfer. For example, a cardholder may be associated with a user device. An application on the user device may be configured to receive notifications. At box 440, in response to receiving a notification, the notification may be opened or displayed to prompt login or request biometric input to verify that the user initiated the transfer. In some examples, the prompt may include a request for one or more authentication inputs. For example, exemplary authentication inputs may include, but are not limited to, login credentials, account information, security information, biometric information, and combinations thereof (e.g., entering a username, password, account number, security code, one-time password, answer to a security question, fingerprint, facial scan, retinal scan, voice recognition, and logging into an application or website associated with the account or card issuer).
在框445处,在验证一个或多个认证输入后,可以调度持卡人和第二用户之间的点对点传送。在一些示例中,点对点传送可以在预定时间被调度,诸如预定的某天、某时间、某星期、某月和/或某年。在其他示例中,点对点传送可以被即时调度。以这种方式,点对点传送可以被调度或放置在交易队列中,而不必识别个人以及下载和注册不同的应用。此外,数据传送的方向可以被颠倒。在一些示例中,通过调整传送的方向性,例如从转让方到接收方或者从接收方到转让方,可以生成诸如推送通知或电子邮件之类的对应的消息,以便指示对所需的传送反向性的确认。在一些示例中,该对应的消息可以由第一应用和/或第二应用来显示。以这种方式,在确认之后,点对点传送将用于经过认证的用户,因为传送是到已知的接收方。At box 445, after verifying one or more authentication inputs, a peer-to-peer transfer between the cardholder and the second user can be scheduled. In some examples, the peer-to-peer transfer can be scheduled at a predetermined time, such as a scheduled day, time, week, month, and/or year. In other examples, the peer-to-peer transfer can be scheduled instantly. In this way, the peer-to-peer transfer can be scheduled or placed in a transaction queue without having to identify individuals or download and register different applications. Furthermore, the direction of data transfer can be reversed. In some examples, by adjusting the directionality of the transfer, such as from sender to receiver or from receiver to sender, a corresponding message, such as a push notification or email, can be generated to indicate confirmation of the desired reversal of the transfer. In some examples, this corresponding message can be displayed by the first application and/or the second application. In this way, after confirmation, the peer-to-peer transfer will be used for the authenticated user because the transfer is to a known receiver.
在一些示例中,点对点传送可以包括发放信用。该信用可以符合一项或多项消费限制。例如,一项或多项消费限制可以包括时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合。在一些示例中,信用的发放可以与一个或多个奖励和/或积分相关联。例如,如果在特定的时间(例如周末)在特定的商家(例如餐馆)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。例如,奖励和/或积分可以针对转让方和受让方中的每一个进行调整,并且可以基于信用的兑换进行调整。例如,如果在特定的商家(例如餐馆)和/或在特定的时间(例如周末)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。当接收方或受让方使用信用时,转让方仍然可以累积奖励和/或积分。In some examples, peer-to-peer transfers may include the issuance of credit. This credit may be subject to one or more spending restrictions. For example, one or more spending restrictions may include time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, the issuance of credit may be associated with one or more rewards and/or points. For example, if credit is used at a specific merchant (e.g., a restaurant) at a specific time (e.g., a weekend), rewards and/or points may be issued and thereby added to a user's rewards or loyalty points program. For example, rewards and/or points may be tailored to each of the transferor and transferee and may be adjusted based on the redemption of credit. For example, if credit is used at a specific merchant (e.g., a restaurant) and/or at a specific time (e.g., a weekend), rewards and/or points may be issued and thereby added to a user's rewards or loyalty points program. The transferor can still accumulate rewards and/or points when the recipient or transferee uses the credit.
在其他示例中,点对点传送可以包括一个或多个数字资产的传送。非限制性地,数字资产可以包括图像或文档。非限制性地,数字资产的格式类型可以包括从静态图像文件(诸如JPEG、PNG、SVG)、静态文档文件(诸如PDF、PSD)、动画文件(诸如GIF、SWF)和web代码(诸如HTML、CSS、JavaScript)的组中选择的至少一个。一个或多个数字资产可以被识别用于传送。例如,可以通过启动网站并上传所识别的用于传送的数字资产来安全地传输数字资产。在另一示例中,可以通过打开应用或启动电子邮件客户端来安全地传输数字资产,在该电子邮件客户端中,所识别的数字资产可以作为附件被包括。在另一个示例中,数字资产可以被识别为统一资源定位符(URL)的一部分的数字资产,该URL被发送用于检索所识别的数字资产。In other examples, peer-to-peer delivery may include the delivery of one or more digital assets. Without limitation, digital assets may include images or documents. Without limitation, the format type of the digital asset may include at least one selected from the group consisting of static image files (such as JPEG, PNG, SVG), static document files (such as PDF, PSD), animated files (such as GIF, SWF), and web code (such as HTML, CSS, JavaScript). One or more digital assets may be identified for delivery. For example, digital assets can be securely transmitted by launching a website and uploading the identified digital assets for delivery. In another example, digital assets can be securely transmitted by opening an application or launching an email client in which the identified digital assets may be included as attachments. In yet another example, digital assets may be identified as part of a Uniform Resource Locator (URL) sent for retrieving the identified digital assets.
在其他示例中,点对点传送可以包括诸如现金传送之类的资金传送。如同发放信用一样,资金传送可以受到一项或多项消费约束和/或一个或多个商家的限制。例如,资金传送可以受到基于时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,资金传送可以包括多个部分。例如,可以在资金传送的第二部分之前传输资金传送的第一部分。资金传送的任意部分都可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。以这种方式,资金传送可以被合计传输,直到满足整个资金传送为止。In other examples, peer-to-peer transfers may include money transfers such as cash transfers. Similar to credit issuance, money transfers may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, money transfers may be subject to restrictions based on time limits, amount limits, geographical restrictions, merchant type, merchant restrictions, and/or any combination thereof. In some examples, a money transfer may include multiple parts. For example, the first part of a money transfer may be transmitted before the second part. Any part of a money transfer may be transmitted at a predetermined time, including but not limited to a specific day, time, week, month, and/or any combination thereof. In this way, money transfers may be aggregated until the entire money transfer is satisfied.
在其他示例中,点对点传送可以包括虚拟礼品卡的发放。如同信用的发放一样,虚拟礼品卡可以受到一项或多项消费约束和/或一个或多个商家的限制。例如,虚拟礼品卡可以受到时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,点对点传送可以包括与虚拟礼品卡的各种金额相关联的多个部分。例如,可以在点对点传送的第二部分之前传输点对点传送的第一部分。传送的任意部分可以在预定的时间被传输,包括但不限于某天、一次、一周、一个月和/或其任意组合。In other examples, peer-to-peer delivery may include the issuance of virtual gift cards. Similar to the issuance of credit, virtual gift cards may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, virtual gift cards may be subject to time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, peer-to-peer delivery may include multiple portions associated with various amounts of virtual gift cards. For example, the first portion of a peer-to-peer delivery may be transmitted before the second portion. Any portion of the delivery may be transmitted at a predetermined time, including but not limited to a day, once, a week, a month, and/or any combination thereof.
图5描绘了根据示例性实施例对数据传送进行发起和认证的另一种方法。图5可以参考系统100的相同或相似的组件、图2A和图2B的发送设备200、图3的方法300和图4的方法400。如图5所示,点对点传送可以由卡进入到用户设备的通信场并深度链接到应用中来发起。Figure 5 illustrates another method for initiating and authenticating data transmission according to an exemplary embodiment. Figure 5 may refer to the same or similar components of system 100, the transmitting device 200 of Figures 2A and 2B, the method 300 of Figure 3, and the method 400 of Figure 4. As shown in Figure 5, point-to-point transmission can be initiated by the card entering the communication field of the user equipment and deeply linking it to the application.
在框505处,该方法可以包括卡进入用户设备的通信场,包括但不限于经由一个或多个手势,所述手势选自轻敲、轻刷、挥动或其任意组合的组。这种通信可以包括但不限于近场通信(NFC)。在框510处,该方法可以包括在卡进入用户设备的通信场之后,经由近场通信数据交换格式(NDEF URL)启动用户设备的应用。在一些示例中,NDEF URL的发送可以发生在动态生成NDEF URL之后。在一些示例中,应用可以与发送设备的发放实体相关联。在其他示例中,应用可以不与发送设备的发放实体相关联。例如,该应用可以与第三方实体或发送设备的发放实体外部的实体相关联。在框515处,该方法可以包括应用到包括预定信息的点对点传送屏幕的深度链接。在一些示例中,预定信息可以是与持卡人相关联的任意信息,该信息已经被填写或者经由直接嵌入到NDEF URL中。在一些示例中,该应用可以被配置为在深度链接之前提示用户登录。在其他示例中,该应用可以被配置为在深度链接之后提示用户登录。在一些示例中,深度链接之前的登录可以与深度链接之后所需的登录相同或不同。此外,示例性的认证输入可以包括但不限于登录凭证、账户信息、安全信息、生物特征信息及其组合的输入(例如,输入用户名、密码、账号、安全码、一次性密码、安全问题的答案、指纹、面部扫描、视网膜扫描、语音识别,以及登录到与账户或发卡机构相关联的应用或网站)。在框520处,该方法可以包括在提交传送之前输入点对点传送的金额和接收方数据。在框525处,该方法可以包括接收电子邮件或推送通知以确认点对点传送。例如,持卡人可以与用户设备相关联。用户设备或其应用可以被配置为接收通知。在框530处,响应于接收到通知,可以打开或显示通知,以便提示认证输入来验证用户发起了传送。在框535处,在验证之后,可以调度持卡人和第二用户之间的点对点传送。在一些示例中,该点对点传送可以在预定时间被调度,诸如预定的某天、某时间、某星期、某月和/或某年。在其他示例中,点对点传送可以被即时调度。以这种方式,点对点传送可以被调度或放置在交易队列中,而不必识别个人以及下载和注册不同的应用。此外,数据传送的方向可以被颠倒。在一些示例中,通过调整传送的方向性,例如从转让方到接收方或者从接收方到转让方,可以生成诸如推送通知或电子邮件之类的对应的消息,以便指示对所需的传送反向性的确认。在一些示例中,该对应的消息可以由第一应用和/或第二应用来显示。以这种方式,在确认之后,点对点传送将用于经过认证的用户,因为传送是到已知的接收方。At box 505, the method may include the card entering the communication field of the user device, including but not limited to via one or more gestures selected from tapping, swiping, waving, or any combination thereof. This communication may include, but is not limited to, Near Field Communication (NFC). At box 510, the method may include launching an application on the user device via a Near Field Communication Data Exchange Format (NDEF URL) after the card enters the communication field of the user device. In some examples, the transmission of the NDEF URL may occur after the NDEF URL is dynamically generated. In some examples, the application may be associated with the issuing entity of the issuing device. In other examples, the application may not be associated with the issuing entity of the issuing device. For example, the application may be associated with a third-party entity or an entity external to the issuing entity of the issuing device. At box 515, the method may include a deep link to the application on a peer-to-peer transmission screen that includes predefined information. In some examples, the predefined information may be any information associated with the cardholder that has been filled in or is directly embedded in the NDEF URL. In some examples, the application may be configured to prompt the user to log in before the deep link. In other examples, the application may be configured to prompt the user to log in after the deep link. In some examples, the login prior to the deep link may be the same as or different from the login required after the deep link. Furthermore, exemplary authentication input may include, but is not limited to, input of login credentials, account information, security information, biometric information, and combinations thereof (e.g., entering a username, password, account number, security code, one-time password, answers to security questions, fingerprint, facial scan, retinal scan, voice recognition, and logging into an application or website associated with an account or card issuer). At box 520, the method may include entering the amount and recipient data for the peer-to-peer transfer before submitting the transfer. At box 525, the method may include receiving an email or push notification to confirm the peer-to-peer transfer. For example, a cardholder may be associated with a user device. The user device or its application may be configured to receive notifications. At box 530, in response to receiving a notification, the notification may be opened or displayed to prompt authentication input to verify that the user initiated the transfer. At box 535, after verification, a peer-to-peer transfer between the cardholder and a second user may be scheduled. In some examples, the peer-to-peer transfer may be scheduled at a predetermined time, such as a predetermined day, time, week, month, and/or year. In other examples, peer-to-peer transfers can be scheduled on the fly. In this way, peer-to-peer transfers can be scheduled or placed in a transaction queue without requiring identification of individuals or downloading and registering different applications. Furthermore, the direction of data transfer can be reversed. In some examples, by adjusting the directionality of the transfer, such as from sender to receiver or from receiver to sender, a corresponding message, such as a push notification or email, can be generated to indicate confirmation of the desired reversal of the transfer. In some examples, this corresponding message can be displayed by a first application and/or a second application. In this way, after confirmation, the peer-to-peer transfer will be used for an authenticated user because the transfer is to a known receiver.
在一些示例中,点对点传送可以包括发放信用。该信用可以符合一项或多项消费限制。例如,一项或多项消费限制可以包括时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合。在一些示例中,信用的发放可以与一个或多个奖励和/或积分相关联。例如,如果在特定的时间(例如周末)在特定的商家(例如餐馆)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。例如,奖励和/或积分可以针对转让方和受让方中的每一个进行调整,并且可以基于信用的兑换进行调整。例如,如果在特定的商家(例如餐馆)和/或在特定的时间(例如周末)使用信用,则可以发放奖励和/或积分,并由此添加到用户奖励或忠诚度积分计划中。当接收方或受让方使用信用时,转让方仍然可以累积奖励和/或积分。In some examples, peer-to-peer transfers may include the issuance of credit. This credit may be subject to one or more spending restrictions. For example, one or more spending restrictions may include time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, the issuance of credit may be associated with one or more rewards and/or points. For example, if credit is used at a specific merchant (e.g., a restaurant) at a specific time (e.g., a weekend), rewards and/or points may be issued and thereby added to a user's rewards or loyalty points program. For example, rewards and/or points may be tailored to each of the transferor and transferee and may be adjusted based on the redemption of credit. For example, if credit is used at a specific merchant (e.g., a restaurant) and/or at a specific time (e.g., a weekend), rewards and/or points may be issued and thereby added to a user's rewards or loyalty points program. The transferor can still accumulate rewards and/or points when the recipient or transferee uses the credit.
在其他示例中,点对点传送可以包括一个或多个数字资产的传送。非限制性地,数字资产可以包括图像或文档。非限制性地,数字资产的格式类型可以包括从静态图像文件(诸如JPEG、PNG、SVG)、静态文档文件(诸如PDF、PSD)、动画文件(诸如GIF、SWF)和web代码(诸如HTML、CSS、JavaScript)的组中选择的至少一个。一个或多个数字资产可以被识别用于传送。例如,可以通过启动网站并上传所识别的用于传送的数字资产来安全地传输数字资产。在另一示例中,可以通过打开应用或启动电子邮件客户端来安全地传输数字资产,在该电子邮件客户端中,所识别的数字资产可以作为附件被包括。在另一个示例中,数字资产可以被识别为统一资源定位符(URL)的一部分的数字资产,该URL被发送用于检索所识别的数字资产。In other examples, peer-to-peer delivery may include the delivery of one or more digital assets. Without limitation, digital assets may include images or documents. Without limitation, the format type of the digital asset may include at least one selected from the group consisting of static image files (such as JPEG, PNG, SVG), static document files (such as PDF, PSD), animated files (such as GIF, SWF), and web code (such as HTML, CSS, JavaScript). One or more digital assets may be identified for delivery. For example, digital assets can be securely transmitted by launching a website and uploading the identified digital assets for delivery. In another example, digital assets can be securely transmitted by opening an application or launching an email client in which the identified digital assets may be included as attachments. In yet another example, digital assets may be identified as part of a Uniform Resource Locator (URL) sent for retrieving the identified digital assets.
在其他示例中,点对点传送可以包括诸如现金传送之类的资金传送。如同发放信用一样,资金传送可以受到一项或多项消费约束和/或一个或多个商家的限制。例如,资金传送可以受到基于时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,资金传送可以包括多个部分。例如,可以在资金传送的第二部分之前传输资金传送的第一部分。资金传送的任意部分都可以在预定的时间被传输,包括但不限于某天、某时间、某周、某月和/或其任意组合。以这种方式,资金传送可以被合计传输,直到满足整个资金传送为止。In other examples, peer-to-peer transfers may include money transfers such as cash transfers. Similar to credit issuance, money transfers may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, money transfers may be subject to restrictions based on time limits, amount limits, geographical restrictions, merchant type, merchant restrictions, and/or any combination thereof. In some examples, a money transfer may include multiple parts. For example, the first part of a money transfer may be transmitted before the second part. Any part of a money transfer may be transmitted at a predetermined time, including but not limited to a specific day, time, week, month, and/or any combination thereof. In this way, money transfers may be aggregated until the entire money transfer is satisfied.
在其他示例中,点对点传送可以包括虚拟礼品卡的发放。如同信用的发放一样,虚拟礼品卡可以受到一项或多项消费约束和/或一个或多个商家的限制。例如,虚拟礼品卡可以受到时间限制、金额限制、地理限制、商家类型、商家限制和/或其任意组合的约束。在一些示例中,点对点传送可以包括与虚拟礼品卡的各种金额相关联的多个部分。例如,可以在点对点传送的第二部分之前传输点对点传送的第一部分。传送的任意部分可以在预定的时间被传输,包括但不限于某天、某时间、某周、某个月和/或其任意组合。In other examples, peer-to-peer delivery may include the issuance of virtual gift cards. Similar to the issuance of credit, virtual gift cards may be subject to one or more spending restrictions and/or restrictions imposed by one or more merchants. For example, virtual gift cards may be subject to time restrictions, amount restrictions, geographic restrictions, merchant type restrictions, merchant restrictions, and/or any combination thereof. In some examples, peer-to-peer delivery may include multiple portions associated with various amounts of virtual gift cards. For example, the first portion of a peer-to-peer delivery may be transmitted before the second portion. Any portion of the delivery may be transmitted at a predetermined time, including but not limited to a day, a time, a week, a month, and/or any combination thereof.
在本说明书中,提及资源定位符的类型,诸如URL、NDEF URL、IRL、URI和URN。然而,应当理解,这些提及是示例性的,并且本公开包括但不限于所提及的资源定位符的类型。In this specification, references are made to types of resource locators, such as URL, NDEF URL, IRL, URI, and URN. However, it should be understood that these references are exemplary, and this disclosure includes, but is not limited to, the types of resource locators mentioned.
还应注意,本文所述的系统和方法可有形地体现在一种或多种物理介质中,诸如但不限于光盘(CD)、数字多功能光盘(DVD)、软盘、硬盘、只读存储器(ROM)、随机存取存储器(RAM)以及其他能够存储数据的物理介质。例如,数据存储装置可以包括随机存取存储器(RAM)和只读存储器(ROM),它们可以被配置为访问和存储数据和信息以及计算机程序指令。数据存储装置还可以包括存储介质或其他合适类型的存储器(例如,诸如例如RAM、ROM、可编程只读存储器(PROM)、可擦除可编程只读存储器(EPROM)、电可擦除可编程只读存储器(EEPROM)、磁盘、光盘、软盘、硬盘、可移动盒式磁带、闪存驱动器、任意类型的有形和非瞬态存储介质),其中可以存储包括操作系统的文件、包括例如web浏览器应用、电子邮件应用和/或其他应用的应用程序以及数据文件。网络使能计算机系统的数据存储可以包括以各种方式存储的电子信息、文件和文档,包括例如平面文件、索引文件、分层数据库、关系数据库,诸如用来自例如公司的软件创建和维护的数据库、Excel文件、Access文件、固态存储设备(其可以包括闪存阵列、混合阵列或服务器端产品)、企业存储(其可以包括在线存储或云存储)或任何其他存储机制。此外,附图分别示出了各种组件(例如,服务器、计算机、处理器等)。被描述为在各种组件处执行的功能可以在其他组件处执行,并且各种组件可以被组合或分离。也可以进行其他修改。It should also be noted that the systems and methods described herein can be tangibly embodied in one or more physical media, such as, but not limited to, optical discs (CDs), digital versatile optical discs (DVDs), floppy disks, hard disks, read-only memory (ROM), random access memory (RAM), and other physical media capable of storing data. For example, data storage devices may include random access memory (RAM) and read-only memory (ROM), which can be configured to access and store data and information, as well as computer program instructions. Data storage devices may also include storage media or other suitable types of memory (e.g., such as RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical discs, floppy disks, hard disks, removable magnetic tape cassettes, flash drives, any type of tangible and non-transient storage media), in which files including operating systems, applications including, for example, web browser applications, email applications and/or other applications, and data files can be stored. Data storage in network-enabled computer systems can include electronic information, files, and documents stored in various ways, including, for example, flat files, indexed files, hierarchical databases, relational databases, such as databases created and maintained using software from, for example, a company, Excel files, Access files, solid-state storage devices (which may include flash arrays, hybrid arrays, or server-side products), enterprise storage (which may include online storage or cloud storage), or any other storage mechanism. Furthermore, the accompanying drawings illustrate various components (e.g., servers, computers, processors, etc.). Functions described as performing at various components can be performed at other components, and the various components can be combined or separated. Other modifications are also possible.
在前面的说明书中,已经参考附图描述了各种实施例。然而,显而易见的是,可以对其进行各种修改和改变,并且可以实施附加的实施例,而不偏离如在随后的权利要求中所阐述的本公开的更广泛的范围。因此,说明书和图纸应被视为说明性的,而不是限制性的。Various embodiments have been described in the foregoing description with reference to the accompanying drawings. However, it will be apparent that various modifications and changes can be made thereto, and additional embodiments can be implemented without departing from the broader scope of this disclosure as set forth in the following claims. Therefore, the description and drawings should be considered illustrative rather than restrictive.
Claims (20)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/162,783 | 2021-01-29 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK40101285A true HK40101285A (en) | 2024-05-10 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12520136B2 (en) | Systems and methods for context-switching authentication over short range wireless communication | |
| US20250209440A1 (en) | Authentication for third party digital wallet provisioning | |
| EP4081964B1 (en) | Card issuing with restricted virtual numbers | |
| JP2024505510A (en) | System and method for near-field contactless card communication and cryptographic authentication | |
| KR20210066795A (en) | System and method for cryptographic authentication of contactless card | |
| US20220368692A1 (en) | Systems and methods for authenticated peer-to-peer data transfer using resource locators | |
| JP7783833B2 (en) | Systems and methods for peer-to-peer identity verification | |
| EP4193623B1 (en) | Controlling secured data transfer via urls | |
| US20240303649A1 (en) | Systems and methods for secure authentication through near field communication | |
| US11995643B2 (en) | System and method for providing a temporary virtual payment card | |
| HK40101285A (en) | Systems and methods for authenticated peer-to-peer data transfer using resource locators | |
| US20240420100A1 (en) | Systems and methods for transaction processing based on authenticated identity | |
| HK40120736A (en) | Systems and methods for context-switching authentication over short range wireless communication | |
| HK40093613A (en) | Systems and methods for controlling secured data transfer via urls | |
| WO2024196699A1 (en) | Systems and methods for web access with contactless card | |
| CN121127875A (en) | Systems and methods for recording consumer transactions |