[go: up one dir, main page]

TWI684945B - Point-to-point transfer system and method - Google Patents

Point-to-point transfer system and method Download PDF

Info

Publication number
TWI684945B
TWI684945B TW106115671A TW106115671A TWI684945B TW I684945 B TWI684945 B TW I684945B TW 106115671 A TW106115671 A TW 106115671A TW 106115671 A TW106115671 A TW 106115671A TW I684945 B TWI684945 B TW I684945B
Authority
TW
Taiwan
Prior art keywords
token
terminal
peer
alternative
transaction
Prior art date
Application number
TW106115671A
Other languages
Chinese (zh)
Other versions
TW201743268A (en
Inventor
才華
Original Assignee
中國銀聯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中國銀聯股份有限公司 filed Critical 中國銀聯股份有限公司
Publication of TW201743268A publication Critical patent/TW201743268A/en
Application granted granted Critical
Publication of TWI684945B publication Critical patent/TWI684945B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本發明公開了一種點對點轉帳系統,該系統應用在包括第一終端、第二終端以及設置在伺服器端的後臺系統的應用環境中,該點對點轉帳系統包括:設置在後臺系統的後臺應用單元;設置在第一終端的第一應用單元;設置在第二終端的第二應用單元;其中,在進行轉帳交易時,第一終端和終端配置成分別通過第一應用與第二應用,向後臺系統的後臺應用獲取第一權杖和第二權杖,第一權杖包括與第一終端關聯的第一帳戶資訊而第二權杖包括與第二終端關聯的第二帳戶資訊;第一終端通過近距離無線通訊技術將第一權杖轉發給第二終端;以及在收到所轉發的第一權杖後,第二終端將第一權杖和所述第二權杖兩者發送給後臺系統。 The invention discloses a peer-to-peer transfer system. The system is applied in an application environment including a first terminal, a second terminal, and a background system provided on the server side. The peer-to-peer transfer system includes: a background application unit provided in the background system; settings The first application unit at the first terminal; the second application unit provided at the second terminal; wherein, when performing a transfer transaction, the first terminal and the terminal are configured to pass through the first application and the second application to the background system The background application obtains the first token and the second token. The first token includes the first account information associated with the first terminal and the second token includes the second account information associated with the second terminal. The distance wireless communication technology forwards the first token to the second terminal; and after receiving the forwarded first token, the second terminal sends both the first token and the second token to the background system.

Description

點對點轉帳系統和方法 Point-to-point transfer system and method

本發明涉及點對點轉帳系統和方法,尤其涉及基於近距離無線通訊技術和權杖技術的轉帳系統和方法。 The invention relates to a point-to-point transfer system and method, and in particular to a transfer system and method based on short-range wireless communication technology and scepter technology.

現有方式下,微信、支付寶、銀行等都提供了各自的轉帳產品,但是這些轉帳產品都不夠便捷和安全。例如,在現有轉帳方式下,需要轉出方提供卡號,並由轉出方發起交易,需要輸入密碼等要素。這些方式不夠便捷,難以滿足用戶的需求。 Under the existing methods, WeChat, Alipay, and banks all provide their own transfer products, but these transfer products are not convenient and safe. For example, under the existing transfer method, the transfer-out party needs to provide the card number, and the transfer-out party initiates the transaction, and needs to enter the password and other elements. These methods are not convenient enough to meet the needs of users.

為了解決上述問題,本申請提出了一種基於近距離無線通訊技術(即NFC)和權杖(即Token)技術的點對點(即P2P)轉帳系統。該系統適用於移動互聯支付線下場景中個人對個人之間資金的方便劃轉。 In order to solve the above problems, this application proposes a peer-to-peer (ie P2P) transfer system based on short-range wireless communication technology (ie NFC) and token (ie Token) technology. The system is suitable for the convenient transfer of funds between individuals in the offline scenario of mobile internet payment.

根據本申請的一個方面,提供了一種點對點轉帳系統,所述系統應用在包括第一終端、第二終端以及 設置在伺服器端的後臺系統的應用環境中,該點對點轉帳系統包括:設置在後臺系統的後臺應用單元;設置在第一終端的第一應用單元;設置在第二終端的第二應用單元;其中,在進行轉帳交易時,所述第一終端和所述第二終端配置成分別通過第一應用與第二應用,向所述後臺系統的後臺應用獲取第一權杖和第二權杖,所述第一權杖包括與第一終端關聯的第一帳戶資訊而所述第二權杖包括與第二終端關聯的第二帳戶資訊;所述第一終端通過近距離無線通訊技術將所述第一權杖轉發給所述第二終端;以及在收到所轉發的第一權杖後,所述第二終端將所述第一權杖和所述第二權杖兩者發送給所述後臺系統,以便進行權杖的鑑認和匹配。 According to an aspect of the present application, there is provided a point-to-point transfer system, the system is applied to include a first terminal, a second terminal and In the application environment of the background system provided on the server side, the peer-to-peer transfer system includes: a background application unit provided in the background system; a first application unit provided in the first terminal; a second application unit provided in the second terminal; wherein , When performing a transfer transaction, the first terminal and the second terminal are configured to obtain the first token and the second token from the background application of the background system through the first application and the second application, respectively. The first token includes first account information associated with the first terminal and the second token includes second account information associated with the second terminal; the first terminal uses the short-range wireless communication technology to A token is forwarded to the second terminal; and after receiving the forwarded first token, the second terminal sends both the first token and the second token to the background System for identification and matching of tokens.

在上述點對點轉帳系統中,所述第二終端設置成在將所述第一權杖和所述第二權杖兩者發送給所述後臺系統之前,通過所述第二應用單元將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖。作為示例,所述第二終端設置成通過如下方式將第一權杖與第二權杖重組以形成第一替代權杖資訊與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成第一替代權杖與第二替代權杖,其中,第一替代權杖包括來自第一權杖的資料段與第二權杖的資料段,第二替代權杖包括第一權杖中剩餘的資料段與第二權杖中剩餘的資料段。 In the above point-to-point transfer system, the second terminal is configured to send the first right through the second application unit before sending both the first token and the second token to the background system The rod and the second token are reorganized to form a first alternate token and a second alternate token. As an example, the second terminal is configured to reorganize the first token and the second token to form the first substitute token information and the second substitute token by dividing the data of the first token into at least Two data segments, the data of the second token is divided into at least two data segments; and the data segment divided by the first token and the data segment divided by the second token are combined to form the first substitution right Rod and second alternative token, where the first alternative token includes the data segment from the first token and the second token, and the second alternative token includes the remaining data segment and the first token in the first token The remaining data segment in the second scepter.

在上述點對點轉帳系統中,其中,所述後臺系統在收到從所述第二終端發送的第一權杖和第二權杖後,對所述第一權杖和所述第二權杖進行鑑認和匹配,從而獲取交易要素以進行帳戶匹配和交易授權。 In the above point-to-point transfer system, the background system performs the first token and the second token after receiving the first token and the second token sent from the second terminal Authentication and matching to obtain transaction elements for account matching and transaction authorization.

在上述點對點轉帳系統中,其中,所述第一終端配置成類比支付帳戶載體,而所述第二終端配置成類比支付受理終端。 In the above point-to-point transfer system, wherein the first terminal is configured as an analog payment account carrier, and the second terminal is configured as an analog payment acceptance terminal.

在上述點對點轉帳系統中,所述後臺系統配置成在將所述第一權杖和所述第二權杖分別發送給所述第一終端和所述第二終端之前,利用交易時間、亂數、交易金額中的一項或多項來對所述第一權杖和/或所述第二權杖進行邏輯處理,從而確保傳輸安全。 In the above point-to-point transfer system, the background system is configured to use the transaction time and random number before sending the first token and the second token to the first terminal and the second terminal, respectively. Or one or more of the transaction amount to perform logical processing on the first token and/or the second token to ensure transmission security.

根據本申請的另一個方面,提供了一種在後臺系統中執行的點對點轉帳方法,所述方法包括:生成第一權杖,並將所述第一權杖發送給模擬支付帳戶載體的第一終端,其中,所述第一權杖包括與所述第一終端關聯的帳戶資訊;生成第二權杖,並將所述第二權杖發送給類比支付受理終端的第二終端,其中,所述第二權杖包括與所述第二終端關聯的帳戶資訊;從所述第二終端接收所述第一權杖和所述第二權杖,其中,所述第一權杖由所述第一終端通過近距離無線通訊技術轉發給所述第二終端;以及對所述第一權杖和所述第二權杖進行鑑認和匹配。 According to another aspect of the present application, there is provided a peer-to-peer transfer method executed in a background system, the method comprising: generating a first token, and sending the first token to a first terminal simulating a payment account carrier , Wherein the first token includes account information associated with the first terminal; generate a second token and send the second token to the second terminal of the analog payment acceptance terminal, wherein, the The second token includes account information associated with the second terminal; receiving the first token and the second token from the second terminal, wherein the first token is defined by the first token The terminal forwards it to the second terminal through short-range wireless communication technology; and authenticates and matches the first token and the second token.

在上述點對點轉帳方法中,接收由所述第二終端發送的所述第一權杖和所述第二權杖包括:所述第一 權杖與第二權杖被重組以形成第一替代權杖與第二替代權杖,接收所發送的所述第一替代權杖與第二替代權杖。作為示例,其中,所述第一權杖與第二權杖被按照如下步驟重組以形成第一替代權杖與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。 In the above point-to-point transfer method, receiving the first token and the second token sent by the second terminal includes: the first The token and the second token are reorganized to form a first substitute token and a second substitute token, and the transmitted first substitute token and second substitute token are received. As an example, wherein the first token and the second token are reorganized according to the following steps to form a first substitute token and a second substitute token: the data of the first token is divided into at least two data segments , The data of the second token is divided into at least two data segments; and the data segment divided by the first token and the data segment divided by the second token are combined to form data including the first token respectively The first alternative token and the second alternative token of the data segment of the segment and the second token.

在上述點對點轉帳方法中,對所述第一權杖和所述第二權杖進行鑑認和匹配包括:從所述第一權杖和所述第二權杖提取交易要素。 In the above point-to-point transfer method, authenticating and matching the first token and the second token includes: extracting transaction elements from the first token and the second token.

在上述點對點轉帳方法中,還包括:將所述交易要素發送給發卡系統,以便進行交易授權。 In the above point-to-point transfer method, the method further includes: sending the transaction element to the card issuing system for transaction authorization.

在上述點對點轉帳方法中,將所生成的第一權杖發送給模擬支付帳戶載體的第一終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第一權杖進行邏輯處理,和/或將所生成的第二權杖發送給模擬支付帳戶載體的第二終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第二權杖進行邏輯處理。 In the above point-to-point transfer method, before sending the generated first token to the first terminal of the simulated payment account carrier, one or more of the transaction time, random number, and transaction amount are used to perform the first token Logic processing, and/or before sending the generated second token to the second terminal of the simulated payment account carrier, use one or more of transaction time, random number, transaction amount to perform logic on the second token deal with.

10‧‧‧第一終端 10‧‧‧First terminal

100‧‧‧第一應用單元 100‧‧‧First application unit

20‧‧‧第二終端 20‧‧‧Second terminal

200‧‧‧第二應用單元 200‧‧‧Second application unit

30‧‧‧後臺系統 30‧‧‧Backstage system

31‧‧‧第一權杖 31‧‧‧ First Scepter

32‧‧‧第二權杖 32‧‧‧Second Scepter

40‧‧‧發卡機構 40‧‧‧Card issuer

在參照附圖閱讀了本發明的具體實施方式以後,本領域技術人員將會更清楚地瞭解本發明的各個方 面。本領域技術人員應當理解的是:這些附圖僅僅用於配合具體實施方式說明本發明的技術方案,而並非意在對本發明的保護範圍構成限制。 After reading the specific embodiments of the present invention with reference to the accompanying drawings, those skilled in the art will understand more clearly the various aspects of the present invention surface. Those skilled in the art should understand that these drawings are only used to describe the technical solutions of the present invention in conjunction with specific embodiments, and are not intended to limit the protection scope of the present invention.

圖1是是根據本發明示例的點對點轉帳系統及其應用環境的結構示意圖。 FIG. 1 is a schematic structural diagram of a peer-to-peer transfer system and its application environment according to an example of the present invention.

下面介紹的是本發明的多個可能實施例中的一些,旨在提供對本發明的基本瞭解,並不旨在確認本發明的關鍵或決定性的要素或限定所要保護的範圍。容易理解,根據本發明的技術方案,在不變更本發明的實質精神下,本領域的一般技術人員可以提出可相互替換的其他實現方式。因此,以下具體實施方式以及附圖僅是對本發明的技術方案的示例性說明,而不應當視為本發明的全部或者視為對本發明技術方案的限定或限制。 The following describes some of the many possible embodiments of the present invention, intended to provide a basic understanding of the present invention, and is not intended to confirm the key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, without changing the essential spirit of the present invention, those of ordinary skill in the art may propose other implementations that can be replaced with each other. Therefore, the following specific embodiments and the accompanying drawings are only exemplary illustrations of the technical solutions of the present invention, and should not be regarded as the entirety of the present invention or as limitations or limitations to the technical solutions of the present invention.

,即近距離無線通訊技術,可以在移動設備間進行近距離(通常幾釐米內)無線通信,支援主動模式、被動模式和雙向模式等。在本申請的一個實施例中,利用NFC技術的,將植入NFC晶片的個人移動終端分別類比成支付帳戶載體和支付受理終端,通過讀取權杖(即,Token)方式傳遞帳戶資訊,由類比支付受理終端的個人移動終端發起交易上送到後臺系統進行Token校驗和帳戶匹配,並發送到發卡機構進行交易授權。 , That is, short-range wireless communication technology, which can carry out short-range (usually within a few centimeters) wireless communication between mobile devices, supporting active mode, passive mode and bidirectional mode. In an embodiment of the present application, using NFC technology, the personal mobile terminal implanted with the NFC chip is compared to a payment account carrier and a payment acceptance terminal, respectively, and the account information is transmitted by reading a token (ie, Token) by The personal mobile terminal of the analog payment acceptance terminal initiates the transaction and sends it to the back-end system for token verification and account matching, and sends it to the card issuer for transaction authorization.

在如下各示例中,第一終端與第二終端分別 是以手機作為示例來說明的,但並不以此為限制。所有具有NFC功能且可與用戶銀行卡帳戶綁定且可接入網路的電子終端都可用作第一終端或第二終端,例如ipad等平板等。 In the following examples, the first terminal and the second terminal are The mobile phone is used as an example to illustrate, but not limited to this. All electronic terminals that have the NFC function, can be bound to the user's bank card account, and can access the network can be used as the first terminal or the second terminal, such as an ipad or other tablet.

圖1是根據本發明示例的點對點轉帳系統及其應用環境的結構示意圖。下面參照圖1闡述根據本發明示例的點對點轉帳系統。如圖1所示,類比支付帳戶載體的終端,即第一終端10包括第一應用單元100,類比支付受理終端,即第二終端20包括第二應用單元200。在本例中,依據第一終端10與第二終端20的轉帳角色,將第一應用單元100稱作轉出應用單元而將第二應用單元200稱作轉入應用單元,但實際應用中,轉入應用單元與轉出應用單元可實現為既包括轉入功能又包括轉出功能的應用,這也使得裝載了該應用的終端既可以作為支付帳戶載體也可作為支付受理終端。後臺系統30則包括了後臺應用單元(未標號)。 FIG. 1 is a schematic structural diagram of a peer-to-peer transfer system and its application environment according to an example of the present invention. The point-to-point transfer system according to an example of the present invention is explained below with reference to FIG. As shown in FIG. 1, the terminal of the analog payment account carrier, that is, the first terminal 10 includes the first application unit 100, and the analog payment acceptance terminal, that is, the second terminal 20 includes the second application unit 200. In this example, the first application unit 100 is called the transfer-out application unit and the second application unit 200 is called the transfer-in application unit according to the transfer roles of the first terminal 10 and the second terminal 20. However, in actual application, The transfer-in application unit and the transfer-out application unit can be implemented as applications that include both the transfer-in function and the transfer-out function, which also enables the terminal loaded with the application to function as both a payment account carrier and a payment acceptance terminal. The background system 30 includes a background application unit (not labeled).

類比支付帳戶載體的第一終端10與類比支付受理終端的第二終端20分別連接後臺系統30。第一終端10通過其第一應用單元100向後臺系統30的後臺應用獲取第一權杖31(下文中也稱為Token 1),第二終端20通過其第二應用單元200向後臺系統30的後臺應用獲取第二權杖32(下文中也稱為Token 2)。 The first terminal 10 of the analog payment account carrier and the second terminal 20 of the analog payment acceptance terminal are respectively connected to the background system 30. The first terminal 10 obtains the first token 31 (hereinafter also referred to as Token 1) from the background application of the background system 30 through its first application unit 100, and the second terminal 20 sends the first token 31 to the background system 30 through its second application unit 200. The background application acquires the second token 32 (hereinafter also referred to as Token 2).

根據本發明的該示例,第一權杖31由後臺系統30的後臺應用單元生成,第二權杖32同樣由後臺系統 30的後臺應用生成。在有關轉帳的操作中,當後臺系統30在接收到第一終端10傳送的操作請求時,後臺系統30的後臺應用單元將會通過當前的交易時間、交易金額、亂數中的任意一項或它們的結合對所產生的第一權杖31進行異或等邏輯操作,以便該權杖更為安全。類似地,在有關轉帳的操作中,當後臺系統30在接收到第二終端20傳送的操作請求時,後臺系統30的後臺應用單元將會通過當前的交易時間、交易金額、亂數中的任意一項或它們的結合對所產生的第二權杖20進行異或等邏輯操作,以便該權杖更為安全。需要說明的是,可以通過當前的交易時間、交易金額、亂數中的任意一項或其結合對第一權杖31與第二權杖32兩者均進行異或等邏輯操作,也可僅對第一權杖31與第二權杖32中的一個進行異或等邏輯操作。 According to this example of the present invention, the first token 31 is generated by the background application unit of the background system 30, and the second token 32 is also generated by the background system 30 background application generation. In the operation related to transfer, when the background system 30 receives the operation request transmitted by the first terminal 10, the background application unit of the background system 30 will pass any one of the current transaction time, transaction amount, and random number or The combination of them performs XOR and other logical operations on the generated first token 31, so that the token is more secure. Similarly, in the operation related to transfer, when the background system 30 receives the operation request transmitted by the second terminal 20, the background application unit of the background system 30 will pass any of the current transaction time, transaction amount, and random number One or a combination of them performs logical operations such as XOR on the generated second token 20 to make the token more secure. It should be noted that either the current transaction time, transaction amount, random number, or a combination thereof can be used to perform logical operations such as XOR on both the first token 31 and the second token 32, or only An exclusive OR logical operation is performed on one of the first token 31 and the second token 32.

更進一步,為了使Token 1和Token 2即使被非法截取也不產生資訊洩露的情況,按照本發明的示例,將第一權杖31與第二權杖32重組以形成第一替代權杖與第二替代權杖。示例地,可將第一權杖31分成兩個資料段,將第二權杖32分成兩個資料段,由此將第一權杖31的一個資料段與第二權杖32的一個資料段組合構成第一替代權杖而將第一權杖31剩餘的資料段與第二權杖32剩餘的資料段組合以構成第二替代權杖。同樣地,可將第一權杖31分成兩個資料段而將第二權杖32分成三個資料段,由此將第一權杖31的一個資料段與第二權杖32的兩 個資料段組合以構成一個替代權杖而將第一權杖31剩餘的資料段與第二權杖32剩餘的資料段組成以構成另一個替代權杖。舉例來說,可以用前1/2和後1/2方式拆解重組,如:Token1的前1/2和Token2的後1/2,以及Token2的前1/2和Token2的後1/2(可以設置幾種,具體每次交易過程後臺和前端隨機選取即可)。如上討論的第一權杖31與第二權杖32的重組過程可以由第二終端20的第二應用單元200來執行。 Furthermore, in order to prevent the information leakage even if Token 1 and Token 2 are intercepted illegally, according to the example of the present invention, the first token 31 and the second token 32 are reorganized to form the first substitute token and the second token Two alternative scepter. Exemplarily, the first token 31 may be divided into two data segments, and the second token 32 may be divided into two data segments, thereby one data segment of the first token 31 and one data segment of the second token 32 The combination constitutes the first alternative token and combines the remaining data segment of the first token 31 and the remaining data segment of the second token 32 to constitute the second alternative token. Similarly, the first token 31 may be divided into two data segments and the second token 32 may be divided into three data segments, thereby one data segment of the first token 31 and two of the second token 32 The data segments are combined to form a substitute token, and the remaining data segments of the first token 31 and the remaining data segments of the second token 32 are combined to constitute another substitute token. For example, you can use the first 1/2 and last 1/2 methods to disassemble and reorganize, such as: the first 1/2 of Token1 and the last 1/2 of Token2, and the first 1/2 of Token2 and the last 1/2 of Token2 (Several types can be set, and the back-end and front-end can be randomly selected for each transaction.) The reorganization process of the first token 31 and the second token 32 as discussed above may be performed by the second application unit 200 of the second terminal 20.

在現場交易的過程中,類比支付帳戶載體的手機終端10和類比支付受理終端的手機終端20通過NFC技術進行交互,通過該過程類比支付受理終端的手機獲取轉出帳戶Token 1,並將Token 1以及自身獲得Token 2發送給後臺系統,或將經過重組的第一替代權杖與第二替代權杖例如作為交易報文發送給後臺系統30。 In the process of on-site transactions, the mobile phone terminal 10 of the analog payment account carrier and the mobile phone terminal 20 of the analog payment acceptance terminal interact through NFC technology. Through this process, the mobile phone of the analog payment acceptance terminal obtains the transfer account Token 1 and transfers the Token 1 And the token 2 obtained by itself is sent to the background system, or the reorganized first replacement token and second replacement token are sent to the background system 30 as a transaction message, for example.

支付受理終端組織交易報文到後臺系統30,由後臺系統進行Token的鑑認和匹配,再將交易請求發送到發卡機構40進行授權。發卡機構授權完成後,交易應答原路返回到支付受理終端20,併發短信給支付帳戶載體終端10。 The payment acceptance terminal organizes the transaction message to the back-end system 30, and the back-end system authenticates and matches the token, and then sends the transaction request to the card issuer 40 for authorization. After the authorization by the card issuer is completed, the transaction response returns to the payment acceptance terminal 20 and sends a short message to the payment account carrier terminal 10.

在一個具體的實施例中,在後臺系統30中執行的點對點轉帳方法包括:生成第一權杖,並將所述第一權杖發送給模擬支付帳戶載體的第一終端,其中,所述第一權杖包括與所述第一終端關聯的帳戶資訊;生成第二權杖,並將所述第二權杖發送給類比支付受理終端的第二終 端,其中,所述第二權杖包括與所述第二終端關聯的帳戶資訊;接收由所述第二終端發送的所述第一權杖和所述第二權杖,其中,所述第一權杖由所述第一終端通過近距離無線通訊技術轉發給所述第二終端;以及對所述第一權杖和所述第二權杖進行鑑認和匹配。 In a specific embodiment, the peer-to-peer transfer method performed in the background system 30 includes: generating a first token and sending the first token to a first terminal that simulates a payment account carrier, where the A token includes account information associated with the first terminal; generate a second token and send the second token to the second terminal of the analog payment accepting terminal Terminal, wherein the second token includes account information associated with the second terminal; receiving the first token and the second token sent by the second terminal, wherein, the first token A token is forwarded by the first terminal to the second terminal through short-range wireless communication technology; and the first token and the second token are authenticated and matched.

在一個實施例中,接收由所述第二終端發送的所述第一權杖和所述第二權杖包括將所述第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖,從而由所述第二終端發送第一替代權杖與第二替代權杖給後臺系統。作為一個具體示例,按照如下方式來將所述第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。作為一個具體的示例,兩個Token可以用前1/2和後1/2等方式進行拆解重組,確保在支付受理終端和後臺系統傳輸過程中兩個帳戶的Token即使被截取也無法還原,進一步加強安全。 In one embodiment, receiving the first token and the second token sent by the second terminal includes reorganizing the first token and the second token to form a first replacement token and The second substitute token, so that the second terminal sends the first substitute token and the second substitute token to the background system. As a specific example, the first scepter and the second scepter are reorganized in the following manner to form a first alternative scepter and a second alternative scepter: the data of the first scepter is divided into at least two data Segment, the data of the second scepter is divided into at least two data segments; and the data segment divided by the first scepter and the data segment divided by the second scepter are combined to form a data segment including the first scepter respectively The first alternative token and the second alternative token of the data segment of the data segment and the second token. As a specific example, the two tokens can be disassembled and reorganized in the first 1/2 and last 1/2 ways to ensure that the tokens of the two accounts cannot be restored even if they are intercepted during the transmission of the payment acceptance terminal and the background system. Further strengthen security.

根據本發明的各示例中,對所述第一權杖和所述第二權杖進行鑑認和匹配包括:從所述第一權杖和所述第二權杖提取交易要素。隨後,可將所述交易要素發送給發卡系統,以便進行交易授權。 According to examples of the present invention, authenticating and matching the first token and the second token include: extracting transaction elements from the first token and the second token. Subsequently, the transaction element may be sent to the card issuing system for transaction authorization.

根據本發明的一個實施例,將所生成的第一 權杖發送給模擬支付帳戶載體的第一終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第一權杖進行邏輯處理,以及將所生成的第二權杖發送給模擬支付帳戶載體的第二終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第二權杖進行邏輯處理。如此,進一步加強轉帳處理的安全性。 According to an embodiment of the present invention, the generated first Before sending the token to the first terminal of the simulated payment account carrier, use one or more of the transaction time, random number, and transaction amount to logically process the first token and send the generated second token Before giving the second terminal that simulates the payment account carrier, the second token is logically processed using one or more of transaction time, random number, and transaction amount. In this way, the security of the transfer process is further strengthened.

在另一個具體的實施例中,提供了一種點對點轉帳系統。該系統包括:位於伺服器端的後臺系統;第一終端;以及第二終端。在進行轉帳交易時,第一終端和第二終端配置成分別從所述後臺系統獲取第一權杖和第二權杖,所述第一權杖包括與第一終端關聯的第一帳戶資訊而所述第二權杖包括與第二終端關聯的第二帳戶資訊。第一終端通過近距離無線通訊技術將所述第一權杖轉發給所述第二終端。在收到所轉發的第一權杖後,第二終端將所述第一權杖和所述第二權杖兩者發送給所述後臺系統,以便進行權杖的鑑認和匹配。 In another specific embodiment, a peer-to-peer transfer system is provided. The system includes: a background system located on the server side; a first terminal; and a second terminal. When performing a transfer transaction, the first terminal and the second terminal are configured to obtain the first token and the second token respectively from the background system, the first token includes the first account information associated with the first terminal and The second token includes second account information associated with the second terminal. The first terminal forwards the first token to the second terminal through short-range wireless communication technology. After receiving the forwarded first token, the second terminal sends both the first token and the second token to the background system for authentication and matching of the token.

在一個實施例中,上述點對點轉帳系統還包括發卡系統,所述第二終端設置成在將所述第一權杖和所述第二權杖兩者發送給所述後臺系統之前,將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖。示例地,所述第二終端設置成通過如下方式將第一權杖與第二權杖重組以形成第一替代權杖資訊與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的 資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。作為一個更為具體的示例,例如,在傳輸過程中兩個Token可以用前1/2和後1/2等方式進行拆解重組,確保在支付受理終端和後臺系統傳輸過程中兩個帳戶的Token即使被截取也無法還原,進一步加強安全。 In one embodiment, the aforementioned peer-to-peer transfer system further includes a card issuing system, and the second terminal is configured to send the first token and the second token to the background system before sending both The scepter and the second scepter are reorganized to form a first alternative scepter and a second alternative scepter. Exemplarily, the second terminal is configured to reorganize the first token and the second token to form the first substitute token information and the second substitute token by dividing the data of the first token into at least Two data segments, dividing the data of the second scepter into at least two data segments; and dividing the data divided by the first scepter The data segment is combined with the data segment divided by the second token to form a first alternative token and a second alternative token that respectively include the data segment of the first token and the data segment of the second token. As a more specific example, for example, during the transmission process, the two tokens can be disassembled and reorganized in the first 1/2 and the last 1/2, etc., to ensure that the two accounts in the payment acceptance terminal and the background system during the transmission process Token cannot be recovered even if it is intercepted, further enhancing security.

在一個實施例中,後臺系統在收到從所述第二終端發送的第一權杖和第二權杖後,對所述第一權杖和所述第二權杖進行鑑認和匹配,從而獲取交易要素以進行帳戶匹配和交易授權。 In one embodiment, after receiving the first token and the second token sent from the second terminal, the background system authenticates and matches the first token and the second token, Thereby obtaining transaction elements for account matching and transaction authorization.

在一個實施例中,第一終端配置成類比支付帳戶載體,第二終端配置成類比支付受理終端,採用所述近距離無線通訊技術,第二終端獲取第一終端傳輸的第一權杖的資訊,並進而將第一權杖與第二權杖傳輸的後臺系統。在該示例中,如果是第一終端作為NFC傳輸的發起方(主設備),則在第一終端與第二終端之間的資料傳輸過程中,第一終端提供射頻場,反之,第二終端提供射頻場。但是,就處理轉帳業務而言,是經由作為類比支付受理終端的第二終端來向後臺發起請求,可將其理解為整個轉帳業務的發起方或稱其處於主動工作模式而第二終端處於被動工作模式。 In one embodiment, the first terminal is configured as an analog payment account carrier, and the second terminal is configured as an analog payment accepting terminal. Using the short-range wireless communication technology, the second terminal obtains the first token information transmitted by the first terminal , And then the background system that transmits the first scepter and the second scepter. In this example, if the first terminal is the initiator (master device) of NFC transmission, the first terminal provides the radio frequency field during the data transmission between the first terminal and the second terminal, otherwise, the second terminal Provide RF field. However, in terms of processing the transfer business, the request is initiated to the background via the second terminal as the analog payment acceptance terminal, which can be understood as the initiator of the entire transfer business or that it is in the active working mode and the second terminal is in the passive work mode.

在一個實施例中,所述後臺系統配置成在將所述第一權杖和所述第二權杖分別發送給所述第一終端和所述第二終端之前,利用交易時間、亂數、交易金額中的 一項或多項來對所述第一權杖和/或所述第二權杖進行邏輯處理,從而確保傳輸安全。 In one embodiment, the background system is configured to use the transaction time, random number, and time before sending the first token and the second token to the first terminal and the second terminal, respectively. Of the transaction amount One or more items to perform logical processing on the first token and/or the second token to ensure transmission security.

在此所描述的各示例或實施例中,關於第一權杖與第二權杖重組的方式有多種,根據本發明,後臺系統與終端之間會預先約定採用哪些重組方式,採用不同的重組方式,則在第二終端發給後臺系統的報文資訊中會進行指示,以便後臺系統正確地從第一替代權杖與第二替代權杖識別出第一權杖與第二權杖。更為具體地,後臺系統的後臺應用單元與設置在終端的第二應用單元之間會預先約定採用哪些重組方式,採用不同的重組方式,則在第二終端發給後臺系統的報文資訊中會進行指示,以便後臺系統的後臺應用單元可正確地從第一替代權杖與第二替代權杖識別出第一權杖與第二權杖。 In the examples or embodiments described herein, there are multiple ways to reorganize the first token and the second token. According to the present invention, the background system and the terminal will pre-appoint which reorganization methods to adopt and different reorganizations In the method, an instruction will be given in the message information sent by the second terminal to the background system, so that the background system correctly recognizes the first token and the second token from the first substitute token and the second substitute token. More specifically, between the background application unit of the background system and the second application unit installed in the terminal, which reorganization methods are adopted in advance, and different reorganization methods are adopted, in the message information sent by the second terminal to the background system An instruction is given so that the background application unit of the background system can correctly identify the first token and the second token from the first substitute token and the second substitute token.

在本發明的各示例中,第一應用單元、第二應用單元以及後臺應用單元每一個都可以軟體的形式實現,從而裝載到第一終端、第二終端以及現有的後臺系統中;可替代地,第一應用單元、第二應用單元以及後臺應用單元每一個都可以軟體結合硬體的形式實現,從而裝載到第一終端、第二終端以及現有的後臺系統中。更進一步,根據本發明示例的點對點轉帳系統可以軟體、或硬體、或軟體與硬體結合的方式實現。 In the examples of the present invention, each of the first application unit, the second application unit, and the background application unit can be implemented in the form of software to be loaded into the first terminal, the second terminal, and the existing background system; alternatively Each of the first application unit, the second application unit, and the background application unit can be implemented in the form of software combined with hardware, so as to be loaded into the first terminal, the second terminal, and the existing background system. Furthermore, the point-to-point transfer system according to the example of the present invention can be implemented by software, or hardware, or a combination of software and hardware.

本申請的系統在保證安全的前提下實現了由轉入方主動發起資金劃轉交易到後臺授權。帳戶資訊由個人移動終端自動非接觸方式讀取,無需轉出方告知轉入方 卡號資訊,方便且提高安全性。另外,利用權杖方式傳遞帳戶資訊,再由後臺系統匹配,避免轉出卡卡號被受理終端獲取,避免卡號洩露等風險隱患,提高安全性。 Under the premise of ensuring safety, the system of this application enables the transfer party to initiate fund transfer transactions to the background authorization. Account information is automatically read by a personal mobile terminal in a contactless manner, without the need for the transferring party to inform the transferring party Card number information is convenient and improves security. In addition, the account information is transmitted using the scepter method, and then matched by the background system to avoid the transfer of the card number to be received by the receiving terminal, to avoid hidden risks such as card number leakage, and improve security.

上文中,參照附圖描述了本發明的具體實施方式。但是,本領域中的普通技術人員能夠理解,在不偏離本發明的精神和範圍的情況下,還可以對本發明的具體實施方式作各種變更和替換。這些變更和替換都落在本發明申請專利範圍所限定的範圍內。 In the foregoing, specific embodiments of the present invention have been described with reference to the accompanying drawings. However, those of ordinary skill in the art can understand that various changes and replacements can be made to the specific embodiments of the present invention without departing from the spirit and scope of the present invention. These changes and replacements all fall within the scope defined by the patent application scope of the present invention.

10‧‧‧第一終端 10‧‧‧First terminal

20‧‧‧第二終端 20‧‧‧Second terminal

30‧‧‧後臺系統 30‧‧‧Backstage system

31‧‧‧第一權杖 31‧‧‧ First Scepter

32‧‧‧第二權杖 32‧‧‧Second Scepter

40‧‧‧發卡機構 40‧‧‧Card issuer

100‧‧‧第一應用單元 100‧‧‧First application unit

200‧‧‧第二應用單元 200‧‧‧Second application unit

Claims (13)

一種點對點轉帳系統,所述系統應用在包括第一終端、第二終端及設置在伺服器端的後臺系統的應用環境中,該點對點轉帳系統包括:設置在後臺系統的後臺應用單元;設置在第一終端的第一應用單元;設置在第二終端的第二應用單元;其中,在進行轉帳交易時,所述第一終端和所述第二終端配置成分別通過第一應用與第二應用,向所述後臺系統的後臺應用獲取第一權杖和第二權杖,所述第一權杖包括與第一終端關聯的第一帳戶資訊而所述第二權杖包括與第二終端關聯的第二帳戶資訊;所述第一終端通過近距離無線通訊技術將所述第一權杖轉發給所述第二終端;以及在收到所轉發的第一權杖後,所述第二終端將所述第一權杖和所述第二權杖兩者發送給所述後臺系統,以便進行權杖的鑑認和匹配。 A point-to-point transfer system. The system is applied in an application environment including a first terminal, a second terminal, and a background system provided on the server side. The point-to-point transfer system includes: a background application unit provided in the background system; A first application unit of the terminal; a second application unit provided in the second terminal; wherein, when performing a transfer transaction, the first terminal and the second terminal are configured to pass through the first application and the second application, respectively, to The background application of the background system obtains a first token and a second token, the first token includes the first account information associated with the first terminal and the second token includes the first token associated with the second terminal Two account information; the first terminal forwards the first token to the second terminal through short-range wireless communication technology; and after receiving the forwarded first token, the second terminal transmits Both the first token and the second token are sent to the background system for authentication and matching of the token. 如請求項1所述的點對點轉帳系統,其中,所述第二終端設置成在將所述第一權杖和所述第二權杖兩者發送給所述後臺系統之前,通過所述第二應用單元將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖。 The peer-to-peer transfer system according to claim 1, wherein the second terminal is configured to pass the second terminal before sending both the first token and the second token to the background system The application unit reorganizes the first token and the second token to form a first substitute token and a second substitute token. 如請求項2所述的點對點轉帳系統,其中,所述第二應用單元設置成通過如下方式將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖: 將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合以構成第一替代權杖與第二替代權杖,其中,所述第一替代權杖與第二替代權杖各自都包括第一權杖的部分資料段與第二權杖的部分資料段。 The peer-to-peer transfer system according to claim 2, wherein the second application unit is configured to reorganize the first token and the second token to form the first substitute token and the second substitute token in the following manner: Dividing the data of the first token into at least two data segments, and dividing the data of the second token into at least two data segments; and dividing the data segment divided by the first token and the second token Combination of data segments to form a first alternative token and a second alternative token, wherein each of the first alternative token and the second alternative token includes a partial data segment of the first token and the second token Part of the information section. 如請求項1到3中任一項所述的點對點轉帳系統,其中,所述後臺系統在收到從所述第二終端發送的第一權杖和第二權杖後,對所述第一權杖和所述第二權杖進行鑑認和匹配,從而獲取交易要素以進行帳戶匹配和交易授權。 The peer-to-peer transfer system according to any one of request items 1 to 3, wherein, after receiving the first token and the second token sent from the second terminal, the background system The token and the second token are authenticated and matched to obtain transaction elements for account matching and transaction authorization. 如請求項1到3中任一項所述的點對點轉帳系統,其中,所述第一終端被配置成類比支付帳戶載體。 The peer-to-peer transfer system according to any one of claims 1 to 3, wherein the first terminal is configured as an analog payment account carrier. 如請求項1到3中任一項所述的點對點轉帳系統,其中,所述第二終端被配置成類比支付受理終端。 The peer-to-peer transfer system according to any one of request items 1 to 3, wherein the second terminal is configured as an analog payment acceptance terminal. 如請求項1到3中任一項所述的點對點轉帳系統,其中,所述後臺應用單元配置成在將所述第一權杖和所述第二權杖分別發送給所述第一終端和所述第二終端之前,利用交易時間、亂數、交易金額中的一項或多項來對所述第一權杖和/或所述第二權杖進行邏輯處理,從而確保傳輸安全。 The peer-to-peer transfer system according to any one of the request items 1 to 3, wherein the background application unit is configured to send the first token and the second token to the first terminal and the Before the second terminal, one or more of transaction time, random number, and transaction amount are used to logically process the first token and/or the second token to ensure transmission security. 一種在後臺系統中執行的點對點轉帳方法,所述方法包括:生成第一權杖,並將所述第一權杖發送給模擬支付帳 戶載體的第一終端,其中,所述第一權杖包括與所述第一終端關聯的帳戶資訊;生成第二權杖,並將所述第二權杖發送給類比支付受理終端的第二終端,其中,所述第二權杖包括與所述第二終端關聯的帳戶資訊;接收由所述第二終端發送的所述第一權杖和所述第二權杖,其中,所述第一權杖由所述第一終端通過近距離無線通訊技術轉發給所述第二終端;以及對所述第一權杖和所述第二權杖進行鑑認和匹配。 A peer-to-peer transfer method performed in a background system, the method includes: generating a first token, and sending the first token to a simulated payment account A first terminal of a user carrier, wherein the first token includes account information associated with the first terminal; a second token is generated, and the second token is sent to the second of the analog payment accepting terminal A terminal, wherein the second token includes account information associated with the second terminal; receiving the first token and the second token sent by the second terminal, wherein, the first token A token is forwarded by the first terminal to the second terminal through short-range wireless communication technology; and the first token and the second token are authenticated and matched. 如請求項8所述的點對點轉帳方法,其中,接收由所述第二終端發送的所述第一權杖和所述第二權杖包括:所述第一權杖與第二權杖被重組以形成第一替代權杖與第二替代權杖,接收所發送的第一替代權杖與第二替代權杖。 The peer-to-peer transfer method according to claim 8, wherein receiving the first token and the second token sent by the second terminal includes: the first token and the second token are reorganized To form a first alternative token and a second alternative token, and receive the transmitted first alternative token and second alternative token. 如請求項9所述的點對點轉帳方法,其中,所述第一權杖與第二權杖被按照如下步驟重組以形成第一替代權杖與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合以構成第一替代權杖與第二替代權杖,其中,所述第一替代權杖與第二替代權杖各自都包括第一權杖的部分資料段與第二權杖的部分資料段。 The peer-to-peer transfer method according to claim 9, wherein the first token and the second token are reorganized according to the following steps to form a first substitute token and a second substitute token: the first token The data of is divided into at least two data segments, the data of the second token is divided into at least two data segments; and the data segment divided by the first token is combined with the data segment divided by the second token to form the first An alternative token and a second alternative token, wherein the first alternative token and the second alternative token each include a partial data segment of the first token and a partial data segment of the second token. 如請求項8到10中任一項所述的點對點轉帳方 法,其中,對所述第一權杖和所述第二權杖進行鑑認和匹配包括:從所述第一權杖和所述第二權杖提取交易要素。 Point-to-point transfer party as described in any one of request items 8 to 10 The method, wherein authenticating and matching the first token and the second token includes: extracting transaction elements from the first token and the second token. 如請求項8到10中任一項所述的點對點轉帳方法,還包括:將所述交易要素發送給發卡系統,以便進行交易授權。 The peer-to-peer transfer method according to any one of request items 8 to 10, further comprising: sending the transaction element to a card issuing system for transaction authorization. 如請求項8到10中任一項所述的點對點轉帳方法,其中,將所生成的第一權杖發送給模擬支付帳戶載體的第一終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第一權杖進行邏輯處理,和/或將所生成的第二權杖發送給模擬支付帳戶載體的第二終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第二權杖進行邏輯處理。 The peer-to-peer transfer method according to any one of claims 8 to 10, wherein before sending the generated first token to the first terminal of the simulated payment account carrier, the transaction time, random number, and transaction amount are used. One or more of the logical processing of the first token, and/or before sending the generated second token to the second terminal of the simulated payment account carrier, using one of the transaction time, random number, and transaction amount The item or items perform logical processing on the second token.
TW106115671A 2016-06-01 2017-05-11 Point-to-point transfer system and method TWI684945B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610379732.5 2016-06-01
CN201610379732.5A CN106022743A (en) 2016-06-01 2016-06-01 Point-to-point fund transfer system and point-to-point fund transfer method

Publications (2)

Publication Number Publication Date
TW201743268A TW201743268A (en) 2017-12-16
TWI684945B true TWI684945B (en) 2020-02-11

Family

ID=57092020

Family Applications (1)

Application Number Title Priority Date Filing Date
TW106115671A TWI684945B (en) 2016-06-01 2017-05-11 Point-to-point transfer system and method

Country Status (3)

Country Link
CN (1) CN106022743A (en)
TW (1) TWI684945B (en)
WO (1) WO2017206680A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022743A (en) * 2016-06-01 2016-10-12 中国银联股份有限公司 Point-to-point fund transfer system and point-to-point fund transfer method
CN110663055A (en) 2017-05-16 2020-01-07 苹果公司 Facilitates the transfer of funds between user accounts

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679443A (en) * 2012-09-18 2014-03-26 中国银联股份有限公司 Method of payment with handset terminals, and processing system thereof
US20140256251A1 (en) * 2013-03-11 2014-09-11 Cellco Partnership D/B/A Verizon Wireless Secure nfc data authentication
CN104951937A (en) * 2015-04-27 2015-09-30 上海浩恺信息科技有限公司 Authentication method and authentication system among mobile devices
CN105139193A (en) * 2015-07-31 2015-12-09 腾讯科技(深圳)有限公司 Electronic resource processing method, electronic resource processing device and server
WO2016049745A1 (en) * 2014-09-29 2016-04-07 Royal Bank Of Canada Secure processing of data
CN106022743A (en) * 2016-06-01 2016-10-12 中国银联股份有限公司 Point-to-point fund transfer system and point-to-point fund transfer method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067385B (en) * 2012-12-27 2015-09-09 深圳市深信服电子科技有限公司 The method of defence Hijack Attack and fire compartment wall
CN105847000A (en) * 2016-05-27 2016-08-10 深圳市雪球科技有限公司 Token generation method and communication system based on same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679443A (en) * 2012-09-18 2014-03-26 中国银联股份有限公司 Method of payment with handset terminals, and processing system thereof
US20140256251A1 (en) * 2013-03-11 2014-09-11 Cellco Partnership D/B/A Verizon Wireless Secure nfc data authentication
WO2016049745A1 (en) * 2014-09-29 2016-04-07 Royal Bank Of Canada Secure processing of data
CN104951937A (en) * 2015-04-27 2015-09-30 上海浩恺信息科技有限公司 Authentication method and authentication system among mobile devices
CN105139193A (en) * 2015-07-31 2015-12-09 腾讯科技(深圳)有限公司 Electronic resource processing method, electronic resource processing device and server
CN106022743A (en) * 2016-06-01 2016-10-12 中国银联股份有限公司 Point-to-point fund transfer system and point-to-point fund transfer method

Also Published As

Publication number Publication date
WO2017206680A1 (en) 2017-12-07
CN106022743A (en) 2016-10-12
TW201743268A (en) 2017-12-16

Similar Documents

Publication Publication Date Title
US10140607B2 (en) Mutual mobile authentication using a key management center
JP7483688B2 (en) System and method for cryptographic authentication of contactless cards - Patents.com
CN108292334B (en) Wireless biometric authentication system and method
JP5964499B2 (en) System and method for enabling secure transactions with mobile devices
EP3861503A1 (en) Systems and methods for cryptographic authentication of contactless cards
US20160117673A1 (en) System and method for secured transactions using mobile devices
CN102810189B (en) A kind of NFC functional mobile phone near field pays and has confirmed the method for payment
CN108604338A (en) Verifying online access to security device functionality
CN103577983A (en) Load method of electronic currency for off-line consumption
CN104700267A (en) Bank virtual card number based mobile payment system and method
WO2011106404A2 (en) Multifactor authentication using a directory server
CN103839157A (en) Electronic payment method, device and system
CN103400265A (en) Quick payment method and system based on position information
WO2020072687A1 (en) Systems and methods for cryptographic authentication of contactless cards
JP2025000785A (en) Systems and methods for cryptographic authentication of contactless cards
US11868988B2 (en) Devices and methods for selective contactless communication
CN113169873B (en) System and method for password authentication of contactless cards
CN104680371A (en) Card-free transaction processing method and system
TWI684945B (en) Point-to-point transfer system and method
CN108449332A (en) A Design Method of Lightweight Mobile Payment Protocol Based on Dual Gateways
KR102643418B1 (en) Mobile Electronic wallet system based on Block chain technology
CN104102934A (en) Portable IC card read-write device, system and method
CN105160531B (en) Transaction data information processing method and device
CN115271705A (en) Payment method and device based on NFC
JPWO2018150931A1 (en) Server and authentication method