TWI684945B - Point-to-point transfer system and method - Google Patents
Point-to-point transfer system and method Download PDFInfo
- Publication number
- TWI684945B TWI684945B TW106115671A TW106115671A TWI684945B TW I684945 B TWI684945 B TW I684945B TW 106115671 A TW106115671 A TW 106115671A TW 106115671 A TW106115671 A TW 106115671A TW I684945 B TWI684945 B TW I684945B
- Authority
- TW
- Taiwan
- Prior art keywords
- token
- terminal
- peer
- alternative
- transaction
- Prior art date
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 57
- 238000000034 method Methods 0.000 title claims description 33
- 238000005516 engineering process Methods 0.000 claims abstract description 15
- 238000004891 communication Methods 0.000 claims abstract description 12
- 238000013475 authorization Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000012545 processing Methods 0.000 claims description 6
- VJBCNMFKFZIXHC-UHFFFAOYSA-N azanium;2-(4-methyl-5-oxo-4-propan-2-yl-1h-imidazol-2-yl)quinoline-3-carboxylate Chemical compound N.N1C(=O)C(C(C)C)(C)N=C1C1=NC2=CC=CC=C2C=C1C(O)=O VJBCNMFKFZIXHC-UHFFFAOYSA-N 0.000 description 25
- 230000008521 reorganization Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 2
- 239000003999 initiator Substances 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本發明公開了一種點對點轉帳系統,該系統應用在包括第一終端、第二終端以及設置在伺服器端的後臺系統的應用環境中,該點對點轉帳系統包括:設置在後臺系統的後臺應用單元;設置在第一終端的第一應用單元;設置在第二終端的第二應用單元;其中,在進行轉帳交易時,第一終端和終端配置成分別通過第一應用與第二應用,向後臺系統的後臺應用獲取第一權杖和第二權杖,第一權杖包括與第一終端關聯的第一帳戶資訊而第二權杖包括與第二終端關聯的第二帳戶資訊;第一終端通過近距離無線通訊技術將第一權杖轉發給第二終端;以及在收到所轉發的第一權杖後,第二終端將第一權杖和所述第二權杖兩者發送給後臺系統。 The invention discloses a peer-to-peer transfer system. The system is applied in an application environment including a first terminal, a second terminal, and a background system provided on the server side. The peer-to-peer transfer system includes: a background application unit provided in the background system; settings The first application unit at the first terminal; the second application unit provided at the second terminal; wherein, when performing a transfer transaction, the first terminal and the terminal are configured to pass through the first application and the second application to the background system The background application obtains the first token and the second token. The first token includes the first account information associated with the first terminal and the second token includes the second account information associated with the second terminal. The distance wireless communication technology forwards the first token to the second terminal; and after receiving the forwarded first token, the second terminal sends both the first token and the second token to the background system.
Description
本發明涉及點對點轉帳系統和方法,尤其涉及基於近距離無線通訊技術和權杖技術的轉帳系統和方法。 The invention relates to a point-to-point transfer system and method, and in particular to a transfer system and method based on short-range wireless communication technology and scepter technology.
現有方式下,微信、支付寶、銀行等都提供了各自的轉帳產品,但是這些轉帳產品都不夠便捷和安全。例如,在現有轉帳方式下,需要轉出方提供卡號,並由轉出方發起交易,需要輸入密碼等要素。這些方式不夠便捷,難以滿足用戶的需求。 Under the existing methods, WeChat, Alipay, and banks all provide their own transfer products, but these transfer products are not convenient and safe. For example, under the existing transfer method, the transfer-out party needs to provide the card number, and the transfer-out party initiates the transaction, and needs to enter the password and other elements. These methods are not convenient enough to meet the needs of users.
為了解決上述問題,本申請提出了一種基於近距離無線通訊技術(即NFC)和權杖(即Token)技術的點對點(即P2P)轉帳系統。該系統適用於移動互聯支付線下場景中個人對個人之間資金的方便劃轉。 In order to solve the above problems, this application proposes a peer-to-peer (ie P2P) transfer system based on short-range wireless communication technology (ie NFC) and token (ie Token) technology. The system is suitable for the convenient transfer of funds between individuals in the offline scenario of mobile internet payment.
根據本申請的一個方面,提供了一種點對點轉帳系統,所述系統應用在包括第一終端、第二終端以及 設置在伺服器端的後臺系統的應用環境中,該點對點轉帳系統包括:設置在後臺系統的後臺應用單元;設置在第一終端的第一應用單元;設置在第二終端的第二應用單元;其中,在進行轉帳交易時,所述第一終端和所述第二終端配置成分別通過第一應用與第二應用,向所述後臺系統的後臺應用獲取第一權杖和第二權杖,所述第一權杖包括與第一終端關聯的第一帳戶資訊而所述第二權杖包括與第二終端關聯的第二帳戶資訊;所述第一終端通過近距離無線通訊技術將所述第一權杖轉發給所述第二終端;以及在收到所轉發的第一權杖後,所述第二終端將所述第一權杖和所述第二權杖兩者發送給所述後臺系統,以便進行權杖的鑑認和匹配。 According to an aspect of the present application, there is provided a point-to-point transfer system, the system is applied to include a first terminal, a second terminal and In the application environment of the background system provided on the server side, the peer-to-peer transfer system includes: a background application unit provided in the background system; a first application unit provided in the first terminal; a second application unit provided in the second terminal; wherein , When performing a transfer transaction, the first terminal and the second terminal are configured to obtain the first token and the second token from the background application of the background system through the first application and the second application, respectively. The first token includes first account information associated with the first terminal and the second token includes second account information associated with the second terminal; the first terminal uses the short-range wireless communication technology to A token is forwarded to the second terminal; and after receiving the forwarded first token, the second terminal sends both the first token and the second token to the background System for identification and matching of tokens.
在上述點對點轉帳系統中,所述第二終端設置成在將所述第一權杖和所述第二權杖兩者發送給所述後臺系統之前,通過所述第二應用單元將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖。作為示例,所述第二終端設置成通過如下方式將第一權杖與第二權杖重組以形成第一替代權杖資訊與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成第一替代權杖與第二替代權杖,其中,第一替代權杖包括來自第一權杖的資料段與第二權杖的資料段,第二替代權杖包括第一權杖中剩餘的資料段與第二權杖中剩餘的資料段。 In the above point-to-point transfer system, the second terminal is configured to send the first right through the second application unit before sending both the first token and the second token to the background system The rod and the second token are reorganized to form a first alternate token and a second alternate token. As an example, the second terminal is configured to reorganize the first token and the second token to form the first substitute token information and the second substitute token by dividing the data of the first token into at least Two data segments, the data of the second token is divided into at least two data segments; and the data segment divided by the first token and the data segment divided by the second token are combined to form the first substitution right Rod and second alternative token, where the first alternative token includes the data segment from the first token and the second token, and the second alternative token includes the remaining data segment and the first token in the first token The remaining data segment in the second scepter.
在上述點對點轉帳系統中,其中,所述後臺系統在收到從所述第二終端發送的第一權杖和第二權杖後,對所述第一權杖和所述第二權杖進行鑑認和匹配,從而獲取交易要素以進行帳戶匹配和交易授權。 In the above point-to-point transfer system, the background system performs the first token and the second token after receiving the first token and the second token sent from the second terminal Authentication and matching to obtain transaction elements for account matching and transaction authorization.
在上述點對點轉帳系統中,其中,所述第一終端配置成類比支付帳戶載體,而所述第二終端配置成類比支付受理終端。 In the above point-to-point transfer system, wherein the first terminal is configured as an analog payment account carrier, and the second terminal is configured as an analog payment acceptance terminal.
在上述點對點轉帳系統中,所述後臺系統配置成在將所述第一權杖和所述第二權杖分別發送給所述第一終端和所述第二終端之前,利用交易時間、亂數、交易金額中的一項或多項來對所述第一權杖和/或所述第二權杖進行邏輯處理,從而確保傳輸安全。 In the above point-to-point transfer system, the background system is configured to use the transaction time and random number before sending the first token and the second token to the first terminal and the second terminal, respectively. Or one or more of the transaction amount to perform logical processing on the first token and/or the second token to ensure transmission security.
根據本申請的另一個方面,提供了一種在後臺系統中執行的點對點轉帳方法,所述方法包括:生成第一權杖,並將所述第一權杖發送給模擬支付帳戶載體的第一終端,其中,所述第一權杖包括與所述第一終端關聯的帳戶資訊;生成第二權杖,並將所述第二權杖發送給類比支付受理終端的第二終端,其中,所述第二權杖包括與所述第二終端關聯的帳戶資訊;從所述第二終端接收所述第一權杖和所述第二權杖,其中,所述第一權杖由所述第一終端通過近距離無線通訊技術轉發給所述第二終端;以及對所述第一權杖和所述第二權杖進行鑑認和匹配。 According to another aspect of the present application, there is provided a peer-to-peer transfer method executed in a background system, the method comprising: generating a first token, and sending the first token to a first terminal simulating a payment account carrier , Wherein the first token includes account information associated with the first terminal; generate a second token and send the second token to the second terminal of the analog payment acceptance terminal, wherein, the The second token includes account information associated with the second terminal; receiving the first token and the second token from the second terminal, wherein the first token is defined by the first token The terminal forwards it to the second terminal through short-range wireless communication technology; and authenticates and matches the first token and the second token.
在上述點對點轉帳方法中,接收由所述第二終端發送的所述第一權杖和所述第二權杖包括:所述第一 權杖與第二權杖被重組以形成第一替代權杖與第二替代權杖,接收所發送的所述第一替代權杖與第二替代權杖。作為示例,其中,所述第一權杖與第二權杖被按照如下步驟重組以形成第一替代權杖與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。 In the above point-to-point transfer method, receiving the first token and the second token sent by the second terminal includes: the first The token and the second token are reorganized to form a first substitute token and a second substitute token, and the transmitted first substitute token and second substitute token are received. As an example, wherein the first token and the second token are reorganized according to the following steps to form a first substitute token and a second substitute token: the data of the first token is divided into at least two data segments , The data of the second token is divided into at least two data segments; and the data segment divided by the first token and the data segment divided by the second token are combined to form data including the first token respectively The first alternative token and the second alternative token of the data segment of the segment and the second token.
在上述點對點轉帳方法中,對所述第一權杖和所述第二權杖進行鑑認和匹配包括:從所述第一權杖和所述第二權杖提取交易要素。 In the above point-to-point transfer method, authenticating and matching the first token and the second token includes: extracting transaction elements from the first token and the second token.
在上述點對點轉帳方法中,還包括:將所述交易要素發送給發卡系統,以便進行交易授權。 In the above point-to-point transfer method, the method further includes: sending the transaction element to the card issuing system for transaction authorization.
在上述點對點轉帳方法中,將所生成的第一權杖發送給模擬支付帳戶載體的第一終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第一權杖進行邏輯處理,和/或將所生成的第二權杖發送給模擬支付帳戶載體的第二終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第二權杖進行邏輯處理。 In the above point-to-point transfer method, before sending the generated first token to the first terminal of the simulated payment account carrier, one or more of the transaction time, random number, and transaction amount are used to perform the first token Logic processing, and/or before sending the generated second token to the second terminal of the simulated payment account carrier, use one or more of transaction time, random number, transaction amount to perform logic on the second token deal with.
10‧‧‧第一終端 10‧‧‧First terminal
100‧‧‧第一應用單元 100‧‧‧First application unit
20‧‧‧第二終端 20‧‧‧Second terminal
200‧‧‧第二應用單元 200‧‧‧Second application unit
30‧‧‧後臺系統 30‧‧‧Backstage system
31‧‧‧第一權杖 31‧‧‧ First Scepter
32‧‧‧第二權杖 32‧‧‧Second Scepter
40‧‧‧發卡機構 40‧‧‧Card issuer
在參照附圖閱讀了本發明的具體實施方式以後,本領域技術人員將會更清楚地瞭解本發明的各個方 面。本領域技術人員應當理解的是:這些附圖僅僅用於配合具體實施方式說明本發明的技術方案,而並非意在對本發明的保護範圍構成限制。 After reading the specific embodiments of the present invention with reference to the accompanying drawings, those skilled in the art will understand more clearly the various aspects of the present invention surface. Those skilled in the art should understand that these drawings are only used to describe the technical solutions of the present invention in conjunction with specific embodiments, and are not intended to limit the protection scope of the present invention.
圖1是是根據本發明示例的點對點轉帳系統及其應用環境的結構示意圖。 FIG. 1 is a schematic structural diagram of a peer-to-peer transfer system and its application environment according to an example of the present invention.
下面介紹的是本發明的多個可能實施例中的一些,旨在提供對本發明的基本瞭解,並不旨在確認本發明的關鍵或決定性的要素或限定所要保護的範圍。容易理解,根據本發明的技術方案,在不變更本發明的實質精神下,本領域的一般技術人員可以提出可相互替換的其他實現方式。因此,以下具體實施方式以及附圖僅是對本發明的技術方案的示例性說明,而不應當視為本發明的全部或者視為對本發明技術方案的限定或限制。 The following describes some of the many possible embodiments of the present invention, intended to provide a basic understanding of the present invention, and is not intended to confirm the key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, without changing the essential spirit of the present invention, those of ordinary skill in the art may propose other implementations that can be replaced with each other. Therefore, the following specific embodiments and the accompanying drawings are only exemplary illustrations of the technical solutions of the present invention, and should not be regarded as the entirety of the present invention or as limitations or limitations to the technical solutions of the present invention.
,即近距離無線通訊技術,可以在移動設備間進行近距離(通常幾釐米內)無線通信,支援主動模式、被動模式和雙向模式等。在本申請的一個實施例中,利用NFC技術的,將植入NFC晶片的個人移動終端分別類比成支付帳戶載體和支付受理終端,通過讀取權杖(即,Token)方式傳遞帳戶資訊,由類比支付受理終端的個人移動終端發起交易上送到後臺系統進行Token校驗和帳戶匹配,並發送到發卡機構進行交易授權。 , That is, short-range wireless communication technology, which can carry out short-range (usually within a few centimeters) wireless communication between mobile devices, supporting active mode, passive mode and bidirectional mode. In an embodiment of the present application, using NFC technology, the personal mobile terminal implanted with the NFC chip is compared to a payment account carrier and a payment acceptance terminal, respectively, and the account information is transmitted by reading a token (ie, Token) by The personal mobile terminal of the analog payment acceptance terminal initiates the transaction and sends it to the back-end system for token verification and account matching, and sends it to the card issuer for transaction authorization.
在如下各示例中,第一終端與第二終端分別 是以手機作為示例來說明的,但並不以此為限制。所有具有NFC功能且可與用戶銀行卡帳戶綁定且可接入網路的電子終端都可用作第一終端或第二終端,例如ipad等平板等。 In the following examples, the first terminal and the second terminal are The mobile phone is used as an example to illustrate, but not limited to this. All electronic terminals that have the NFC function, can be bound to the user's bank card account, and can access the network can be used as the first terminal or the second terminal, such as an ipad or other tablet.
圖1是根據本發明示例的點對點轉帳系統及其應用環境的結構示意圖。下面參照圖1闡述根據本發明示例的點對點轉帳系統。如圖1所示,類比支付帳戶載體的終端,即第一終端10包括第一應用單元100,類比支付受理終端,即第二終端20包括第二應用單元200。在本例中,依據第一終端10與第二終端20的轉帳角色,將第一應用單元100稱作轉出應用單元而將第二應用單元200稱作轉入應用單元,但實際應用中,轉入應用單元與轉出應用單元可實現為既包括轉入功能又包括轉出功能的應用,這也使得裝載了該應用的終端既可以作為支付帳戶載體也可作為支付受理終端。後臺系統30則包括了後臺應用單元(未標號)。
FIG. 1 is a schematic structural diagram of a peer-to-peer transfer system and its application environment according to an example of the present invention. The point-to-point transfer system according to an example of the present invention is explained below with reference to FIG. As shown in FIG. 1, the terminal of the analog payment account carrier, that is, the
類比支付帳戶載體的第一終端10與類比支付受理終端的第二終端20分別連接後臺系統30。第一終端10通過其第一應用單元100向後臺系統30的後臺應用獲取第一權杖31(下文中也稱為Token 1),第二終端20通過其第二應用單元200向後臺系統30的後臺應用獲取第二權杖32(下文中也稱為Token 2)。
The
根據本發明的該示例,第一權杖31由後臺系統30的後臺應用單元生成,第二權杖32同樣由後臺系統
30的後臺應用生成。在有關轉帳的操作中,當後臺系統30在接收到第一終端10傳送的操作請求時,後臺系統30的後臺應用單元將會通過當前的交易時間、交易金額、亂數中的任意一項或它們的結合對所產生的第一權杖31進行異或等邏輯操作,以便該權杖更為安全。類似地,在有關轉帳的操作中,當後臺系統30在接收到第二終端20傳送的操作請求時,後臺系統30的後臺應用單元將會通過當前的交易時間、交易金額、亂數中的任意一項或它們的結合對所產生的第二權杖20進行異或等邏輯操作,以便該權杖更為安全。需要說明的是,可以通過當前的交易時間、交易金額、亂數中的任意一項或其結合對第一權杖31與第二權杖32兩者均進行異或等邏輯操作,也可僅對第一權杖31與第二權杖32中的一個進行異或等邏輯操作。
According to this example of the present invention, the
更進一步,為了使Token 1和Token 2即使被非法截取也不產生資訊洩露的情況,按照本發明的示例,將第一權杖31與第二權杖32重組以形成第一替代權杖與第二替代權杖。示例地,可將第一權杖31分成兩個資料段,將第二權杖32分成兩個資料段,由此將第一權杖31的一個資料段與第二權杖32的一個資料段組合構成第一替代權杖而將第一權杖31剩餘的資料段與第二權杖32剩餘的資料段組合以構成第二替代權杖。同樣地,可將第一權杖31分成兩個資料段而將第二權杖32分成三個資料段,由此將第一權杖31的一個資料段與第二權杖32的兩
個資料段組合以構成一個替代權杖而將第一權杖31剩餘的資料段與第二權杖32剩餘的資料段組成以構成另一個替代權杖。舉例來說,可以用前1/2和後1/2方式拆解重組,如:Token1的前1/2和Token2的後1/2,以及Token2的前1/2和Token2的後1/2(可以設置幾種,具體每次交易過程後臺和前端隨機選取即可)。如上討論的第一權杖31與第二權杖32的重組過程可以由第二終端20的第二應用單元200來執行。
Furthermore, in order to prevent the information leakage even if
在現場交易的過程中,類比支付帳戶載體的手機終端10和類比支付受理終端的手機終端20通過NFC技術進行交互,通過該過程類比支付受理終端的手機獲取轉出帳戶Token 1,並將Token 1以及自身獲得Token 2發送給後臺系統,或將經過重組的第一替代權杖與第二替代權杖例如作為交易報文發送給後臺系統30。
In the process of on-site transactions, the
支付受理終端組織交易報文到後臺系統30,由後臺系統進行Token的鑑認和匹配,再將交易請求發送到發卡機構40進行授權。發卡機構授權完成後,交易應答原路返回到支付受理終端20,併發短信給支付帳戶載體終端10。
The payment acceptance terminal organizes the transaction message to the back-
在一個具體的實施例中,在後臺系統30中執行的點對點轉帳方法包括:生成第一權杖,並將所述第一權杖發送給模擬支付帳戶載體的第一終端,其中,所述第一權杖包括與所述第一終端關聯的帳戶資訊;生成第二權杖,並將所述第二權杖發送給類比支付受理終端的第二終
端,其中,所述第二權杖包括與所述第二終端關聯的帳戶資訊;接收由所述第二終端發送的所述第一權杖和所述第二權杖,其中,所述第一權杖由所述第一終端通過近距離無線通訊技術轉發給所述第二終端;以及對所述第一權杖和所述第二權杖進行鑑認和匹配。
In a specific embodiment, the peer-to-peer transfer method performed in the
在一個實施例中,接收由所述第二終端發送的所述第一權杖和所述第二權杖包括將所述第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖,從而由所述第二終端發送第一替代權杖與第二替代權杖給後臺系統。作為一個具體示例,按照如下方式來將所述第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。作為一個具體的示例,兩個Token可以用前1/2和後1/2等方式進行拆解重組,確保在支付受理終端和後臺系統傳輸過程中兩個帳戶的Token即使被截取也無法還原,進一步加強安全。 In one embodiment, receiving the first token and the second token sent by the second terminal includes reorganizing the first token and the second token to form a first replacement token and The second substitute token, so that the second terminal sends the first substitute token and the second substitute token to the background system. As a specific example, the first scepter and the second scepter are reorganized in the following manner to form a first alternative scepter and a second alternative scepter: the data of the first scepter is divided into at least two data Segment, the data of the second scepter is divided into at least two data segments; and the data segment divided by the first scepter and the data segment divided by the second scepter are combined to form a data segment including the first scepter respectively The first alternative token and the second alternative token of the data segment of the data segment and the second token. As a specific example, the two tokens can be disassembled and reorganized in the first 1/2 and last 1/2 ways to ensure that the tokens of the two accounts cannot be restored even if they are intercepted during the transmission of the payment acceptance terminal and the background system. Further strengthen security.
根據本發明的各示例中,對所述第一權杖和所述第二權杖進行鑑認和匹配包括:從所述第一權杖和所述第二權杖提取交易要素。隨後,可將所述交易要素發送給發卡系統,以便進行交易授權。 According to examples of the present invention, authenticating and matching the first token and the second token include: extracting transaction elements from the first token and the second token. Subsequently, the transaction element may be sent to the card issuing system for transaction authorization.
根據本發明的一個實施例,將所生成的第一 權杖發送給模擬支付帳戶載體的第一終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第一權杖進行邏輯處理,以及將所生成的第二權杖發送給模擬支付帳戶載體的第二終端之前,利用交易時間、亂數、交易金額中的一項或多項對所述第二權杖進行邏輯處理。如此,進一步加強轉帳處理的安全性。 According to an embodiment of the present invention, the generated first Before sending the token to the first terminal of the simulated payment account carrier, use one or more of the transaction time, random number, and transaction amount to logically process the first token and send the generated second token Before giving the second terminal that simulates the payment account carrier, the second token is logically processed using one or more of transaction time, random number, and transaction amount. In this way, the security of the transfer process is further strengthened.
在另一個具體的實施例中,提供了一種點對點轉帳系統。該系統包括:位於伺服器端的後臺系統;第一終端;以及第二終端。在進行轉帳交易時,第一終端和第二終端配置成分別從所述後臺系統獲取第一權杖和第二權杖,所述第一權杖包括與第一終端關聯的第一帳戶資訊而所述第二權杖包括與第二終端關聯的第二帳戶資訊。第一終端通過近距離無線通訊技術將所述第一權杖轉發給所述第二終端。在收到所轉發的第一權杖後,第二終端將所述第一權杖和所述第二權杖兩者發送給所述後臺系統,以便進行權杖的鑑認和匹配。 In another specific embodiment, a peer-to-peer transfer system is provided. The system includes: a background system located on the server side; a first terminal; and a second terminal. When performing a transfer transaction, the first terminal and the second terminal are configured to obtain the first token and the second token respectively from the background system, the first token includes the first account information associated with the first terminal and The second token includes second account information associated with the second terminal. The first terminal forwards the first token to the second terminal through short-range wireless communication technology. After receiving the forwarded first token, the second terminal sends both the first token and the second token to the background system for authentication and matching of the token.
在一個實施例中,上述點對點轉帳系統還包括發卡系統,所述第二終端設置成在將所述第一權杖和所述第二權杖兩者發送給所述後臺系統之前,將第一權杖與第二權杖重組以形成第一替代權杖與第二替代權杖。示例地,所述第二終端設置成通過如下方式將第一權杖與第二權杖重組以形成第一替代權杖資訊與第二替代權杖:將所述第一權杖的資料分成至少兩個資料段,將所述第二權杖的數據分成至少兩個資料段;以及將由第一權杖的分成的 資料段與由第二權杖分成的資料段組合,以構成分別包括第一權杖的資料段與第二權杖的資料段的第一替代權杖與第二替代權杖。作為一個更為具體的示例,例如,在傳輸過程中兩個Token可以用前1/2和後1/2等方式進行拆解重組,確保在支付受理終端和後臺系統傳輸過程中兩個帳戶的Token即使被截取也無法還原,進一步加強安全。 In one embodiment, the aforementioned peer-to-peer transfer system further includes a card issuing system, and the second terminal is configured to send the first token and the second token to the background system before sending both The scepter and the second scepter are reorganized to form a first alternative scepter and a second alternative scepter. Exemplarily, the second terminal is configured to reorganize the first token and the second token to form the first substitute token information and the second substitute token by dividing the data of the first token into at least Two data segments, dividing the data of the second scepter into at least two data segments; and dividing the data divided by the first scepter The data segment is combined with the data segment divided by the second token to form a first alternative token and a second alternative token that respectively include the data segment of the first token and the data segment of the second token. As a more specific example, for example, during the transmission process, the two tokens can be disassembled and reorganized in the first 1/2 and the last 1/2, etc., to ensure that the two accounts in the payment acceptance terminal and the background system during the transmission process Token cannot be recovered even if it is intercepted, further enhancing security.
在一個實施例中,後臺系統在收到從所述第二終端發送的第一權杖和第二權杖後,對所述第一權杖和所述第二權杖進行鑑認和匹配,從而獲取交易要素以進行帳戶匹配和交易授權。 In one embodiment, after receiving the first token and the second token sent from the second terminal, the background system authenticates and matches the first token and the second token, Thereby obtaining transaction elements for account matching and transaction authorization.
在一個實施例中,第一終端配置成類比支付帳戶載體,第二終端配置成類比支付受理終端,採用所述近距離無線通訊技術,第二終端獲取第一終端傳輸的第一權杖的資訊,並進而將第一權杖與第二權杖傳輸的後臺系統。在該示例中,如果是第一終端作為NFC傳輸的發起方(主設備),則在第一終端與第二終端之間的資料傳輸過程中,第一終端提供射頻場,反之,第二終端提供射頻場。但是,就處理轉帳業務而言,是經由作為類比支付受理終端的第二終端來向後臺發起請求,可將其理解為整個轉帳業務的發起方或稱其處於主動工作模式而第二終端處於被動工作模式。 In one embodiment, the first terminal is configured as an analog payment account carrier, and the second terminal is configured as an analog payment accepting terminal. Using the short-range wireless communication technology, the second terminal obtains the first token information transmitted by the first terminal , And then the background system that transmits the first scepter and the second scepter. In this example, if the first terminal is the initiator (master device) of NFC transmission, the first terminal provides the radio frequency field during the data transmission between the first terminal and the second terminal, otherwise, the second terminal Provide RF field. However, in terms of processing the transfer business, the request is initiated to the background via the second terminal as the analog payment acceptance terminal, which can be understood as the initiator of the entire transfer business or that it is in the active working mode and the second terminal is in the passive work mode.
在一個實施例中,所述後臺系統配置成在將所述第一權杖和所述第二權杖分別發送給所述第一終端和所述第二終端之前,利用交易時間、亂數、交易金額中的 一項或多項來對所述第一權杖和/或所述第二權杖進行邏輯處理,從而確保傳輸安全。 In one embodiment, the background system is configured to use the transaction time, random number, and time before sending the first token and the second token to the first terminal and the second terminal, respectively. Of the transaction amount One or more items to perform logical processing on the first token and/or the second token to ensure transmission security.
在此所描述的各示例或實施例中,關於第一權杖與第二權杖重組的方式有多種,根據本發明,後臺系統與終端之間會預先約定採用哪些重組方式,採用不同的重組方式,則在第二終端發給後臺系統的報文資訊中會進行指示,以便後臺系統正確地從第一替代權杖與第二替代權杖識別出第一權杖與第二權杖。更為具體地,後臺系統的後臺應用單元與設置在終端的第二應用單元之間會預先約定採用哪些重組方式,採用不同的重組方式,則在第二終端發給後臺系統的報文資訊中會進行指示,以便後臺系統的後臺應用單元可正確地從第一替代權杖與第二替代權杖識別出第一權杖與第二權杖。 In the examples or embodiments described herein, there are multiple ways to reorganize the first token and the second token. According to the present invention, the background system and the terminal will pre-appoint which reorganization methods to adopt and different reorganizations In the method, an instruction will be given in the message information sent by the second terminal to the background system, so that the background system correctly recognizes the first token and the second token from the first substitute token and the second substitute token. More specifically, between the background application unit of the background system and the second application unit installed in the terminal, which reorganization methods are adopted in advance, and different reorganization methods are adopted, in the message information sent by the second terminal to the background system An instruction is given so that the background application unit of the background system can correctly identify the first token and the second token from the first substitute token and the second substitute token.
在本發明的各示例中,第一應用單元、第二應用單元以及後臺應用單元每一個都可以軟體的形式實現,從而裝載到第一終端、第二終端以及現有的後臺系統中;可替代地,第一應用單元、第二應用單元以及後臺應用單元每一個都可以軟體結合硬體的形式實現,從而裝載到第一終端、第二終端以及現有的後臺系統中。更進一步,根據本發明示例的點對點轉帳系統可以軟體、或硬體、或軟體與硬體結合的方式實現。 In the examples of the present invention, each of the first application unit, the second application unit, and the background application unit can be implemented in the form of software to be loaded into the first terminal, the second terminal, and the existing background system; alternatively Each of the first application unit, the second application unit, and the background application unit can be implemented in the form of software combined with hardware, so as to be loaded into the first terminal, the second terminal, and the existing background system. Furthermore, the point-to-point transfer system according to the example of the present invention can be implemented by software, or hardware, or a combination of software and hardware.
本申請的系統在保證安全的前提下實現了由轉入方主動發起資金劃轉交易到後臺授權。帳戶資訊由個人移動終端自動非接觸方式讀取,無需轉出方告知轉入方 卡號資訊,方便且提高安全性。另外,利用權杖方式傳遞帳戶資訊,再由後臺系統匹配,避免轉出卡卡號被受理終端獲取,避免卡號洩露等風險隱患,提高安全性。 Under the premise of ensuring safety, the system of this application enables the transfer party to initiate fund transfer transactions to the background authorization. Account information is automatically read by a personal mobile terminal in a contactless manner, without the need for the transferring party to inform the transferring party Card number information is convenient and improves security. In addition, the account information is transmitted using the scepter method, and then matched by the background system to avoid the transfer of the card number to be received by the receiving terminal, to avoid hidden risks such as card number leakage, and improve security.
上文中,參照附圖描述了本發明的具體實施方式。但是,本領域中的普通技術人員能夠理解,在不偏離本發明的精神和範圍的情況下,還可以對本發明的具體實施方式作各種變更和替換。這些變更和替換都落在本發明申請專利範圍所限定的範圍內。 In the foregoing, specific embodiments of the present invention have been described with reference to the accompanying drawings. However, those of ordinary skill in the art can understand that various changes and replacements can be made to the specific embodiments of the present invention without departing from the spirit and scope of the present invention. These changes and replacements all fall within the scope defined by the patent application scope of the present invention.
10‧‧‧第一終端 10‧‧‧First terminal
20‧‧‧第二終端 20‧‧‧Second terminal
30‧‧‧後臺系統 30‧‧‧Backstage system
31‧‧‧第一權杖 31‧‧‧ First Scepter
32‧‧‧第二權杖 32‧‧‧Second Scepter
40‧‧‧發卡機構 40‧‧‧Card issuer
100‧‧‧第一應用單元 100‧‧‧First application unit
200‧‧‧第二應用單元 200‧‧‧Second application unit
Claims (13)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610379732.5 | 2016-06-01 | ||
CN201610379732.5A CN106022743A (en) | 2016-06-01 | 2016-06-01 | Point-to-point fund transfer system and point-to-point fund transfer method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201743268A TW201743268A (en) | 2017-12-16 |
TWI684945B true TWI684945B (en) | 2020-02-11 |
Family
ID=57092020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW106115671A TWI684945B (en) | 2016-06-01 | 2017-05-11 | Point-to-point transfer system and method |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN106022743A (en) |
TW (1) | TWI684945B (en) |
WO (1) | WO2017206680A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022743A (en) * | 2016-06-01 | 2016-10-12 | 中国银联股份有限公司 | Point-to-point fund transfer system and point-to-point fund transfer method |
CN110663055A (en) | 2017-05-16 | 2020-01-07 | 苹果公司 | Facilitates the transfer of funds between user accounts |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679443A (en) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | Method of payment with handset terminals, and processing system thereof |
US20140256251A1 (en) * | 2013-03-11 | 2014-09-11 | Cellco Partnership D/B/A Verizon Wireless | Secure nfc data authentication |
CN104951937A (en) * | 2015-04-27 | 2015-09-30 | 上海浩恺信息科技有限公司 | Authentication method and authentication system among mobile devices |
CN105139193A (en) * | 2015-07-31 | 2015-12-09 | 腾讯科技(深圳)有限公司 | Electronic resource processing method, electronic resource processing device and server |
WO2016049745A1 (en) * | 2014-09-29 | 2016-04-07 | Royal Bank Of Canada | Secure processing of data |
CN106022743A (en) * | 2016-06-01 | 2016-10-12 | 中国银联股份有限公司 | Point-to-point fund transfer system and point-to-point fund transfer method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067385B (en) * | 2012-12-27 | 2015-09-09 | 深圳市深信服电子科技有限公司 | The method of defence Hijack Attack and fire compartment wall |
CN105847000A (en) * | 2016-05-27 | 2016-08-10 | 深圳市雪球科技有限公司 | Token generation method and communication system based on same |
-
2016
- 2016-06-01 CN CN201610379732.5A patent/CN106022743A/en active Pending
-
2017
- 2017-05-10 WO PCT/CN2017/083714 patent/WO2017206680A1/en active Application Filing
- 2017-05-11 TW TW106115671A patent/TWI684945B/en active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679443A (en) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | Method of payment with handset terminals, and processing system thereof |
US20140256251A1 (en) * | 2013-03-11 | 2014-09-11 | Cellco Partnership D/B/A Verizon Wireless | Secure nfc data authentication |
WO2016049745A1 (en) * | 2014-09-29 | 2016-04-07 | Royal Bank Of Canada | Secure processing of data |
CN104951937A (en) * | 2015-04-27 | 2015-09-30 | 上海浩恺信息科技有限公司 | Authentication method and authentication system among mobile devices |
CN105139193A (en) * | 2015-07-31 | 2015-12-09 | 腾讯科技(深圳)有限公司 | Electronic resource processing method, electronic resource processing device and server |
CN106022743A (en) * | 2016-06-01 | 2016-10-12 | 中国银联股份有限公司 | Point-to-point fund transfer system and point-to-point fund transfer method |
Also Published As
Publication number | Publication date |
---|---|
WO2017206680A1 (en) | 2017-12-07 |
CN106022743A (en) | 2016-10-12 |
TW201743268A (en) | 2017-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10140607B2 (en) | Mutual mobile authentication using a key management center | |
JP7483688B2 (en) | System and method for cryptographic authentication of contactless cards - Patents.com | |
CN108292334B (en) | Wireless biometric authentication system and method | |
JP5964499B2 (en) | System and method for enabling secure transactions with mobile devices | |
EP3861503A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
US20160117673A1 (en) | System and method for secured transactions using mobile devices | |
CN102810189B (en) | A kind of NFC functional mobile phone near field pays and has confirmed the method for payment | |
CN108604338A (en) | Verifying online access to security device functionality | |
CN103577983A (en) | Load method of electronic currency for off-line consumption | |
CN104700267A (en) | Bank virtual card number based mobile payment system and method | |
WO2011106404A2 (en) | Multifactor authentication using a directory server | |
CN103839157A (en) | Electronic payment method, device and system | |
CN103400265A (en) | Quick payment method and system based on position information | |
WO2020072687A1 (en) | Systems and methods for cryptographic authentication of contactless cards | |
JP2025000785A (en) | Systems and methods for cryptographic authentication of contactless cards | |
US11868988B2 (en) | Devices and methods for selective contactless communication | |
CN113169873B (en) | System and method for password authentication of contactless cards | |
CN104680371A (en) | Card-free transaction processing method and system | |
TWI684945B (en) | Point-to-point transfer system and method | |
CN108449332A (en) | A Design Method of Lightweight Mobile Payment Protocol Based on Dual Gateways | |
KR102643418B1 (en) | Mobile Electronic wallet system based on Block chain technology | |
CN104102934A (en) | Portable IC card read-write device, system and method | |
CN105160531B (en) | Transaction data information processing method and device | |
CN115271705A (en) | Payment method and device based on NFC | |
JPWO2018150931A1 (en) | Server and authentication method |