WO2014194822A1 - 用于电子资源转移的安全性信息交互方法 - Google Patents

用于电子资源转移的安全性信息交互方法 Download PDF

Info

Publication number
WO2014194822A1
WO2014194822A1 PCT/CN2014/079145 CN2014079145W WO2014194822A1 WO 2014194822 A1 WO2014194822 A1 WO 2014194822A1 CN 2014079145 W CN2014079145 W CN 2014079145W WO 2014194822 A1 WO2014194822 A1 WO 2014194822A1
Authority
WO
WIPO (PCT)
Prior art keywords
information interaction
security information
electronic resource
security
resource
Prior art date
Application number
PCT/CN2014/079145
Other languages
English (en)
French (fr)
Inventor
柴洪峰
徐燕军
李伟
李洁
吴水炯
Original Assignee
***股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ***股份有限公司 filed Critical ***股份有限公司
Priority to US14/895,065 priority Critical patent/US20160149918A1/en
Priority to JP2016517146A priority patent/JP2016533552A/ja
Priority to KR1020157035658A priority patent/KR20160013080A/ko
Priority to EP14807406.5A priority patent/EP3007365A4/en
Priority to SG11201509928SA priority patent/SG11201509928SA/en
Publication of WO2014194822A1 publication Critical patent/WO2014194822A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/047Payment circuits using payment protocols involving electronic receipts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B5/00Near-field transmission systems, e.g. inductive or capacitive transmission systems
    • H04B5/70Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
    • H04B5/72Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/78Architectures of resource allocation
    • H04L47/783Distributed allocation of resources, e.g. bandwidth brokers

Definitions

  • the present invention relates to an information interaction method, and more particularly to a security information interaction method for electronic resource transfer. Background technique
  • the existing security information interaction methods related to the transfer of electronic resources are generally only applied to the security information interaction in the form of offline offline (for example, electronic cash is applied offline by means of financial instruments), and security information interaction cannot be realized.
  • Direct transfer of electronic resources between terminals eg mobile terminals.
  • the present invention proposes a security information interaction method capable of transferring direct electronic resources between security information interaction terminals and having high security and reliability.
  • a security information interaction method includes the following steps:
  • the first security information interaction terminal constructs a security information interaction request based on the security information interaction instruction of the resource removal party, and transmits the security information interaction request to the second security information interaction terminal via the first communication channel.
  • the security information interaction request includes the following information: the number of electronic resources to be transferred, and the resource removal party electronic resource identifier;
  • the second security information interaction terminal processes the received security information interaction request and returns a security information interaction response based on the processing result, wherein the security information interaction response packet An identifier of the electronic resource containing the resource mover;
  • the first security information interaction terminal interactively responds based on the security information and performs data communication with the first security carrier via the second communication channel to construct a security information interaction message, and the security information is The interaction message is transmitted to the data processing server to complete the subsequent security information interaction process to implement the transfer of the electronic resource, wherein the security information interaction message includes information required to perform the subsequent security information interaction process.
  • the first communication channel is a communication channel based on a near field communication protocol.
  • the first security information interaction terminal acquires, from the first security bearer, the information required to perform a subsequent security information interaction process via the second communication channel.
  • the first security information interaction terminal and the second security information interaction terminal are both mobile terminals.
  • the step (A3) further comprises: the data processing server parsing the received security information interaction message, and performing an offline verification and a decision operation;
  • the result of the verification and decision operation is "approval of the transfer of the electronic resource to be performed", then the approval response is transmitted back to the first security information interaction terminal, otherwise the rejection response is transmitted back to the first security information interaction terminal.
  • the step (A3) further comprises: if the approval response is received, the first security information interaction terminal and the first security carrier via the second communication channel Performing data communication to perform an operation related to the removal of the electronic resource offline and acquiring a corresponding security information interaction credential, and if the rejection response is received, the first security information interaction terminal terminates the security information interaction process and Prompt user security information interaction failed.
  • the step (A3) further includes: after the operation related to the removal of the electronic resource is performed, the first security information interaction terminal to the data processing server Transmitting a move operation success response, wherein the move operation success response includes the security information interaction credential and the resource mover electronic resource identifier.
  • the step (A3) further includes: after receiving the successful response of the removal operation, the data processing server records the interaction with the current security information. Associated information and set the status of the record to "not completed", and send a security information interaction response to the first service provider server, wherein the security information interaction response includes interaction with current security information Linked information; the data processing server then sends a resource transfer notification to the second security information interaction terminal.
  • the step (A3) further includes: after receiving the resource transfer notification, the second security information interaction terminal sends security information to the data processing server.
  • the interactive record query/synchronization request is obtained to obtain the security information interaction status "unfinished”.
  • the step (A3) further includes: after acquiring the security information interaction record with the status of "not completed", the second security information interaction terminal is for the status "not The security information exchange record is completed to send a secure bearer electronic resource synchronization request to the data processing server, wherein the secure bearer electronic resource synchronization request includes at least a resource mover electronic resource identifier.
  • the step (A3) further includes: after receiving the secure carrier electronic resource synchronization request, the data processing server sends the security to the second security information interaction terminal.
  • the carrier electronic resource synchronization response wherein the security carrier electronic resource synchronization response includes a quantity value of the electronic resource to be transferred with tamper protection.
  • the step (A3) further includes: after receiving the secure carrier electronic resource synchronization response, the second security information interaction terminal via the third communication channel and the second The secure carrier performs data communication to acquire information related to the movement of the electronic resource, and then transmits the information related to the movement of the electronic resource and the value of the electronic resource to be transferred with the tamper-protected protection to the data Process the server.
  • the step (A3) further includes: after receiving the information related to the moving in of the electronic resource and the value of the electronic resource to be transferred with the tamper-protected protection
  • the data processing server constructs an electronic resource transfer request message based on the information related to the moving in of the electronic resource and the value of the electronic resource to be transferred with the tamper-protected protection, and transfers the electronic resource into the electronic resource
  • the request message is sent to the second service provider server.
  • the step (A3) further includes: after receiving the electronic resource transfer request message, the second service provider server is based on the electronic resource Transferring the request message to perform a decision operation, and if the result of the decision operation is "approving the transfer of the electronic resource to be performed", extracting the electronic resource margin value from the information related to the transfer of the electronic resource, and according to Calculating a new electronic resource margin value according to the electronic resource margin value and the value of the electronic resource to be transferred, and generating an electronic resource margin update script based on the new electronic resource margin value, and An electronic resource margin update script is sent to the data processing server.
  • the step (A3) further includes: after receiving the electronic resource remaining value update script, the data processing server forwards the same to the second security information After receiving the electronic resource remaining value update script, the second security information interaction terminal forwards the same to the second security bearer; after receiving the electronic resource remaining value update script And the second security bearer executes the electronic resource remaining value update script to update the electronic resource margin value and transmit the script execution result back to the second security information interaction terminal.
  • the step (A3) further includes: after receiving the script execution result, the second security information interaction terminal forwards the data to the data processing server; After the script executes the result, the data processing server forwards the result to the second service provider server, and sends an electronic resource transfer success notification to the first security information interaction terminal.
  • the data processing server calculates an authentication code for the number of electronic resources to be transferred, and combines the authentication code and the plaintext of the number of electronic resources to be transferred to form the The value of the electronic resources to be transferred to the tamper-protected protection.
  • the security information interaction method disclosed by the present invention has the following advantages: (1) capable of performing direct electronic resource transfer operations between security information interaction terminals (especially mobile terminals); (2) having high security and reliability.
  • the security information interaction method disclosed by the present invention includes the following steps: (A1) The first security information interaction terminal constructs a security information interaction instruction based on a resource removal party (for example, a payment party in a payment transaction) And the security information interaction request is transmitted to the second security information interaction terminal via the first communication channel, where the security information interaction request includes the following information: quantity of the electronic resource to be transferred (eg, transaction amount), and resource removal party electronic resource identifier (eg, payer electronic cash account); (A2) the second security information interaction terminal processes the received security information interaction request and based on the processing result Returning a security information interaction response, wherein the security information interaction response includes a resource mover electronic resource identifier (eg, a payee electronic cash account); (A3) the first security information interaction terminal is based on the security
  • the first communication channel is a communication channel based on a near field communication protocol (e.g., NFC protocol).
  • a near field communication protocol e.g., NFC protocol
  • the first security information interaction terminal acquires from the first security bearer (ie, the resource transfer party security carrier) via the second communication channel.
  • Information required to perform subsequent security information interaction processes eg, electronic cash application data in the first secure carrier.
  • the first security information interaction terminal and the second security information interaction terminal are both mobile terminals (for example, mobile phones;).
  • the step (A3) further includes: the data processing server parsing the received security information interaction message, and performing an offline verification and a decision operation; If the result of the offline verification and decision operation is "approving the transfer of the electronic resource to be performed", transmitting an approval response back to the first security information interaction terminal, otherwise to the first security information interaction terminal Send back a rejection response.
  • the step (A3) further includes: if an approval response is received, the first security information interaction terminal is connected to the second communication channel via the second communication channel Determining, by the first secure carrier, data communication to perform an operation related to the removal of the electronic resource (for example, offline debit) and acquire a corresponding security information interaction credential, and if the rejection response is received, the first The security information interaction terminal terminates the security information interaction process and prompts the user to fail the security information interaction.
  • the step (A3) further includes: after the operation related to the removal of the electronic resource is performed, the first security information interaction terminal
  • the data processing server transmits a removal operation success response, wherein the removal operation success response includes the security information interaction credential and the resource mover electronic resource identifier (eg, payee electronic cash account).
  • the step (A3) further includes: after receiving the successful response of the removal operation, the data processing server records the interaction with the current security information. Associated information (such as current transaction information) and sets the status of the record to "not completed", and sends a security information interaction response to the first service provider server (eg, the payer card issuer), wherein the security The information interaction response includes information associated with the current security information interaction (eg, current transaction information); the data processing server then sends a resource transfer notification to the second security information interaction terminal (eg, by SMS) Account transfer notification).
  • the first service provider server eg, the payer card issuer
  • the step (A3) further includes: after receiving the resource transfer notification, the second security information interaction terminal processes the data
  • the server sends a security information interaction record query/synchronization request to obtain a security information interaction record with a status of "not completed”.
  • the step (A3) further includes: after acquiring the security information interaction record whose status is "incomplete", the second security information interaction terminal Sending a security bearer electronic resource synchronization request (for example, a smart card electronic cash balance synchronization transaction request) to the data processing server for the security information interaction record whose status is "not completed", wherein the secure carrier electronic resource synchronization request includes at least resources Move in the party's electronic resource identifier.
  • a security bearer electronic resource synchronization request for example, a smart card electronic cash balance synchronization transaction request
  • the step (A3) further includes: after receiving the security bearer electronic resource synchronization request, the data processing server to the second security
  • the information interaction terminal sends a security carrier electronic resource synchronization response, wherein the security carrier electronic resource synchronization response includes a quantity value of the electronic resource to be transferred (for example, the transferred amount information) with tamper-resistant protection.
  • the step (A3) further includes: after receiving the security bearer electronic resource synchronization response, the second security information interaction terminal is connected to the third The communication channel is in data communication with the second secure carrier (ie, the resource transfer party secure carrier) to obtain information related to the migration of the electronic resource (eg, electronic cash application data and balance in the second secure carrier), and then The information related to the migration of the electronic resource and the value of the electronic resource to be transferred with the tamper-resistant protection are transmitted to the data processing server.
  • the second secure carrier ie, the resource transfer party secure carrier
  • the step (A3) further includes: receiving the information related to the moving in of the electronic resource and the to-be-transferred with the tamper-proof protection
  • the data processing server constructs an electronic resource transfer request message based on the information related to the moving in of the electronic resource and the value of the electronic resource to be transferred with the tamper-protected protection, and
  • the electronic resource transfer request message is sent to a second service provider server (for example, a payee card issuer).
  • the step (A3) further includes: after receiving the electronic resource transfer request message, the second service provider server is based on the The electronic resource transfer request message performs a decision operation, and if the result of the decision operation is "approval of the transfer of the electronic resource to be performed", the electronic resource margin value is extracted from the information related to the transfer of the electronic resource (for example, an electronic cash balance), and calculating a new electronic resource margin value according to the electronic resource margin value and the value of the electronic resource to be transferred (which is the electronic resource margin value and the value of the electronic resource to be transferred And, for example, a new electronic cash balance), and generating an electronic resource margin update script based on the new electronic resource margin value, and transmitting the electronic resource margin update script to the data processing server.
  • the step (A3) further includes: after receiving the electronic resource transfer request message, the second service provider server is based on the The electronic resource transfer request message performs a decision operation, and if the result of the decision operation is "approval of the transfer of the electronic resource to be performed", the electronic resource margin value is
  • the step (A3) further includes: after receiving the electronic resource remaining value update script, the data processing server forwards the same to the a second security information interaction terminal; receiving the electronic resource margin update script Afterwards, the second security information interaction terminal forwards the same to the second security carrier; after receiving the electronic resource remaining value update script, the second security carrier executes the electronic resource margin value
  • the script is updated to update the electronic resource margin value (ie, the new electronic resource margin value is taken as the currently valid electronic resource margin value) and the script execution result is transmitted back to the second security information interaction terminal.
  • the step (A3) further includes: after receiving the script execution result, the second security information interaction terminal forwards the data to the data processing a server; after receiving the script execution result, the data processing server forwards the result to the second service provider server, and sends an electronic resource transfer success notification to the first security information interaction terminal (for example, by using a short message The form sends a successful report of the transaction result ;).
  • the data processing server calculates an authentication code for the number of electronic resources to be transferred, and combines the authentication code with the plaintext of the number of electronic resources to be transferred. Together, the value of the electronic resource to be transferred with the tamper-proof protection is constructed.
  • the security information interaction method disclosed by the present invention has the following advantages: (1) capable of performing direct electronic resource transfer operation between security information interaction terminals (especially mobile terminals); (2) having high Safety and reliability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明提出了一种安全性信息交互方法。其中,在所述方法中,第一安全性信息交互终端基于与第二安全性信息交互终端的近场通信方式的直接数据通信而执行安全性信息交互过程以实现电子资源的转移。本发明所公开的安全性信息交互方法能够进行安全性信息交互终端之间的直接的电子资源的转移操作并具有高的安全性和可靠性。

Description

用于电子资源转移的安全性信息交互方法 技术领域
本发明涉及信息交互方法, 更具体地, 涉及用于电子资源转移的安全性信 息交互方法。 背景技术
目前, 随着网络应用 (尤其是移动网络)的日益广泛以及不同领域的业务 种类的日益丰富, 进行与电子资源的转移相关的安全性信息(即对安全性要求 较高的信息) 的交互变得越来越重要。
现有的与电子资源的转移相关的安全性信息交互方法通常仅应用于现场 脱机形式的安全性信息交互(例如借助于金融机具以脱机方式应用电子现金), 而无法实现安全性信息交互终端(例如移动终端)之间的直接的电子资源的转 移。
因此,存在如下需求: 提供能够进行安全性信息交互终端之间的直接的电 子资源的转移并具有高的安全性和可靠性的安全性信息交互方法。 发明内容
为了解决上述现有技术方案所存在的问题,本发明提出了能够进行安全性 信息交互终端之间的直接的电子资源的转移并具有高的安全性和可靠性的安 全性信息交互方法。
本发明的目的是通过以下技术方案实现的:
一种安全性信息交互方法, 所述安全性信息交互方法包括下列步骤:
( A1 )第一安全性信息交互终端基于资源移出方的安全性信息交互指令构 造安全性信息交互请求,并将所述安全性信息交互请求经由第一通信信道传送 到第二安全性信息交互终端, 其中, 所述安全性信息交互请求包含下列信息: 待转移的电子资源的数量、 以及资源移出方电子资源标识符;
( A2 )所述第二安全性信息交互终端处理接收到的所述安全性信息交互请 求并基于处理结果返回安全性信息交互应答,其中所述安全性信息交互应答包 含资源移入方电子资源标识符;
( A3 )所述第一安全性信息交互终端基于所述安全性信息交互应答并经由 第二通信信道与第一安全载体进行数据通信以构造安全性信息交互报文,并将 所述安全性信息交互报文传送到数据处理服务器,以完成后续的安全性信息交 互过程而实现电子资源的转移, 其中, 所述安全性信息交互报文包含执行后续 的安全性信息交互过程所需的信息。
在上面所公开的方案中,优选地, 所述第一通信信道是基于近场通信协议 的通信信道。
在上面所公开的方案中,优选地, 所述第一安全性信息交互终端经由所述 第二通信信道从所述第一安全载体获取所述执行后续的安全性信息交互过程 所需的信息。
在上面所公开的方案中,优选地, 所述第一安全性信息交互终端和所述第 二安全性信息交互终端均是移动终端。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 所述数据 处理服务器解析接收到的安全性信息交互报文, 并执行脱机验证和判决操作; 如果所述脱机验证和判决操作的结果是 "批准待进行的电子资源的转移", 则 向所述第一安全性信息交互终端传送回批准应答,否则向所述第一安全性信息 交互终端传送回拒绝应答。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 如果接收 到批准应答,则所述第一安全性信息交互终端经由所述第二通信信道与所述第 一安全载体进行数据通信以便脱机地执行与电子资源的移出相关的操作并获 取相应的安全性信息交互凭证, 而如果接收到拒绝应答, 则所述第一安全性信 息交互终端终止安全性信息交互过程并提示用户安全性信息交互失败。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在所述与 电子资源的移出相关的操作被执行之后,所述第一安全性信息交互终端向所述 数据处理服务器传送移出操作成功应答, 其中, 所述移出操作成功应答包含所 述安全性信息交互凭证以及所述资源移入方电子资源标识符。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述移出操作成功应答后,所述数据处理服务器记录与当前的安全性信息交互 相关联的信息并将该记录的状态设置为 "未完成", 以及向第一服务提供方服 务器发送安全性信息交互应答, 其中, 所述安全性信息交互应答包含与当前的 安全性信息交互相关联的信息;所述数据处理服务器随后向所述第二安全性信 息交互终端发送资源转入通知。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述资源转入通知后,所述第二安全性信息交互终端向所述数据处理服务器发 送安全性信息交互记录查询 /同步请求以获取状态为 "未完成" 的安全性信息 交互 i己录。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在获取状 态为 "未完成" 的安全性信息交互记录后, 所述第二安全性信息交互终端针对 状态为 "未完成"的安全性信息交互记录向所述数据处理服务器发送安全载体 电子资源同步请求, 其中, 所述安全载体电子资源同步请求至少包含资源移入 方电子资源标识符。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述安全载体电子资源同步请求后,所述数据处理服务器向所述第二安全性信 息交互终端发送安全载体电子资源同步应答, 其中, 所述安全载体电子资源同 步应答包含带有防篡改保护的待转入电子资源数量值。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述安全载体电子资源同步应答后,所述第二安全性信息交互终端经由第三通 信信道与第二安全载体进行数据通信以获取与电子资源的移入相关的信息,并 随后将所述与电子资源的移入相关的信息和所述带有防篡改保护的待转入电 子资源数量值传送到所述数据处理服务器。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述与电子资源的移入相关的信息和所述带有防篡改保护的待转入电子资源 数量值后,所述数据处理服务器基于所述与电子资源的移入相关的信息和所述 带有防篡改保护的待转入电子资源数量值构造电子资源转入请求报文,并将所 述电子资源转入请求报文发送到第二服务提供方服务器。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述电子资源转入请求报文后,所述第二服务提供方服务器基于所述电子资源 转入请求报文执行判决操作, 并且如果判决操作的结果是 "批准待进行的电子 资源的转移 ", 则从所述与电子资源的移入相关的信息中提取出电子资源余量 值,并根据所述电子资源余量值和所述待转入电子资源数量值计算新的电子资 源余量值, 并基于所述新的电子资源余量值生成电子资源余量值更新脚本, 以 及将所述电子资源余量值更新脚本发送到所述数据处理服务器。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 所述电子资源余量值更新脚本后,所述数据处理服务器将其转发给所述第二安 全性信息交互终端; 在接收到所述电子资源余量值更新脚本后, 所述第二安全 性信息交互终端将其转发给所述第二安全载体;在接收到所述电子资源余量值 更新脚本后,所述第二安全载体执行所述电子资源余量值更新脚本以更新电子 资源余量值并将脚本执行结果传送回所述第二安全性信息交互终端。
在上面所公开的方案中, 优选地, 所述步骤(A3 )进一步包括: 在接收到 脚本执行结果后,所述第二安全性信息交互终端将其转发给所述数据处理服务 器; 在接收到脚本执行结果后, 所述数据处理服务器将其转发给所述第二服务 提供方服务器,并且向所述第一安全性信息交互终端发送电子资源转移成功通 知。
在上面所公开的方案中,优选地, 所述数据处理服务器针对待转移的电子 资源的数量计算鉴别码,并将所述鉴别码和待转移的电子资源的数量的明文结 合在一起构成所述带有防篡改保护的待转入电子资源数量值。
本发明所公开的安全性信息交互方法具有如下优点: ( 1 )能够进行安全性 信息交互终端(尤其是移动终端)之间的直接的电子资源的转移操作; ( 2 )具 有高的安全性和可靠性。 附图说明
结合附图, 本发明的技术特征以及优点将会被本领域技术人员更好地理 解, 其中:
图 1是根据本发明的实施例的安全性信息交互方法的流程图。 具体实施方式 图 1是根据本发明的实施例的安全性信息交互方法的流程图。 如图 1所示, 本发明所公开的安全性信息交互方法包括下列步骤: (A1 )第一安全性信息交 互终端基于资源移出方(例如支付交易中的付款方)的安全性信息交互指令构 造安全性信息交互请求,并将所述安全性信息交互请求经由第一通信信道传送 到第二安全性信息交互终端, 其中, 所述安全性信息交互请求包含下列信息: 待转移的电子资源的数量(例如交易金额)、 以及资源移出方电子资源标识符 (例如付款方电子现金账号); ( A2 )所述第二安全性信息交互终端处理接收到 的所述安全性信息交互请求并基于处理结果返回安全性信息交互应答,其中所 述安全性信息交互应答包含资源移入方电子资源标识符(例如收款方电子现金 账号); ( A3 )所述第一安全性信息交互终端基于所述安全性信息交互应答并经 由第二通信信道与第一安全载体(即可以在其上存储并运行用于执行安全性信 息交互过程的安全应用的载体, 例如 S IM卡、 智能 SD卡等 )进行数据通信以 构造安全性信息交互报文,并将所述安全性信息交互报文传送到数据处理服务 器 (例如金融领域中的支付平台), 以完成后续的安全性信息交互过程而实现 电子资源的转移, 其中, 所述安全性信息交互报文包含执行后续的安全性信息 交互过程所需的信息 (例如第一安全载体中的电子现金应用数据)。
优选地,在本发明所公开的安全性信息交互方法中, 所述第一通信信道是 基于近场通信协议(例如 NFC协议) 的通信信道。
优选地,在本发明所公开的安全性信息交互方法中, 所述第一安全性信息 交互终端经由所述第二通信信道从所述第一安全载体(即资源转出方安全载 体 )获取所述执行后续的安全性信息交互过程所需的信息 (例如第一安全载体 中的电子现金应用数据)。
示例性地,在本发明所公开的安全性信息交互方法中, 所述第一安全性信 息交互终端和所述第二安全性信息交互终端均是移动终端 (例如手机;)。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 所述数据处理服务器解析接收到的安全性信息交互报文, 并执行脱机 验证和判决操作; 如果所述脱机验证和判决操作的结果是 "批准待进行的电子 资源的转移", 则向所述第一安全性信息交互终端传送回批准应答, 否则向所 述第一安全性信息交互终端传送回拒绝应答。 优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 如果接收到批准应答, 则所述第一安全性信息交互终端经由所述第二 通信信道与所述第一安全载体进行数据通信以便脱机地执行与电子资源的移 出相关的操作(例如脱机扣款)并获取相应的安全性信息交互凭证, 而如果接 收到拒绝应答,则所述第一安全性信息交互终端终止安全性信息交互过程并提 示用户安全性信息交互失败。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在所述与电子资源的移出相关的操作被执行之后, 所述第一安全性信 息交互终端向所述数据处理服务器传送移出操作成功应答, 其中, 所述移出操 作成功应答包含所述安全性信息交互凭证以及所述资源移入方电子资源标识 符(例如收款方电子现金账号)。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述移出操作成功应答后, 所述数据处理服务器记录与当前 的安全性信息交互相关联的信息(例如当前交易信息)并将该记录的状态设置 为 "未完成", 以及向第一服务提供方服务器 (例如付款方发卡机构)发送安 全性信息交互应答, 其中, 所述安全性信息交互应答包含与当前的安全性信息 交互相关联的信息 (例如当前交易信息); 所述数据处理服务器随后向所述第 二安全性信息交互终端发送资源转入通知(例如通过短信的形式发送账户转入 通知)。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述资源转入通知后, 所述第二安全性信息交互终端向所述 数据处理服务器发送安全性信息交互记录查询 /同步请求以获取状态为 "未完 成" 的安全性信息交互记录。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在获取状态为 "未完成" 的安全性信息交互记录后, 所述第二安全性 信息交互终端针对状态为 "未完成"的安全性信息交互记录向所述数据处理服 务器发送安全载体电子资源同步请求(例如智能卡电子现金余额同步交易请 求), 其中, 所述安全载体电子资源同步请求至少包含资源移入方电子资源标 识符。 优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述安全载体电子资源同步请求后, 所述数据处理服务器向 所述第二安全性信息交互终端发送安全载体电子资源同步应答, 其中, 所述安 全载体电子资源同步应答包含带有防篡改保护的待转入电子资源数量值(例如 转入金额信息)。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述安全载体电子资源同步应答后, 所述第二安全性信息交 互终端经由第三通信信道与第二安全载体(即资源转入方安全载体)进行数据 通信以获取与电子资源的移入相关的信息(例如第二安全载体中的电子现金应 用数据和余额), 并随后将所述与电子资源的移入相关的信息和所述带有防篡 改保护的待转入电子资源数量值传送到所述数据处理服务器。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括:在接收到所述与电子资源的移入相关的信息和所述带有防篡改保护的 待转入电子资源数量值后,所述数据处理服务器基于所述与电子资源的移入相 关的信息和所述带有防篡改保护的待转入电子资源数量值构造电子资源转入 请求报文, 并将所述电子资源转入请求报文发送到第二服务提供方服务器(例 如收款方发卡机构)。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述电子资源转入请求报文后, 所述第二服务提供方服务器 基于所述电子资源转入请求报文执行判决操作, 并且如果判决操作的结果是 "批准待进行的电子资源的转移",则从所述与电子资源的移入相关的信息中提 取出电子资源余量值(例如电子现金余额), 并根据所述电子资源余量值和所 述待转入电子资源数量值计算新的电子资源余量值(其是电子资源余量值与待 转入电子资源数量值之和, 例如新的电子现金余额), 并基于所述新的电子资 源余量值生成电子资源余量值更新脚本,以及将所述电子资源余量值更新脚本 发送到所述数据处理服务器。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到所述电子资源余量值更新脚本后, 所述数据处理服务器将其 转发给所述第二安全性信息交互终端;在接收到所述电子资源余量值更新脚本 后, 所述第二安全性信息交互终端将其转发给所述第二安全载体; 在接收到所 述电子资源余量值更新脚本后,所述第二安全载体执行所述电子资源余量值更 新脚本以更新电子资源余量值(即将所述新的电子资源余量值作为当前生效的 电子资源余量值)并将脚本执行结果传送回所述第二安全性信息交互终端。
优选地, 在本发明所公开的安全性信息交互方法中, 所述步骤(A3 )进一 步包括: 在接收到脚本执行结果后, 所述第二安全性信息交互终端将其转发给 所述数据处理服务器; 在接收到脚本执行结果后, 所述数据处理服务器将其转 发给所述第二服务提供方服务器,并且向所述第一安全性信息交互终端发送电 子资源转移成功通知 (例如以短信的形式发送交易成功结果通知;)。
优选地,在本发明所公开的安全性信息交互方法中, 所述数据处理服务器 针对待转移的电子资源的数量计算鉴别码,并将所述鉴别码和待转移的电子资 源的数量的明文结合在一起构成所述带有防篡改保护的待转入电子资源数量 值。
由上可见, 本发明所公开的安全性信息交互方法具有下列优点: (1 )能够 进行安全性信息交互终端(尤其是移动终端)之间的直接的电子资源的转移操 作; ( 2 )具有高的安全性和可靠性。
尽管本发明是通过上述的优选实施方式进行描述的,但是其实现形式并不 局限于上述的实施方式。 应该认识到: 在不脱离本发明主旨和范围的情况下,

Claims

权利要求
1. 一种安全性信息交互方法, 所述安全性信息交互方法包括下列步骤: ( A1 )第一安全性信息交互终端基于资源移出方的安全性信息交互指令构 造安全性信息交互请求,并将所述安全性信息交互请求经由第一通信信道传送 到第二安全性信息交互终端, 其中, 所述安全性信息交互请求包含下列信息: 待转移的电子资源的数量、 以及资源移出方电子资源标识符;
( A2 )所述第二安全性信息交互终端处理接收到的所述安全性信息交互请 求并基于处理结果返回安全性信息交互应答,其中所述安全性信息交互应答包 含资源移入方电子资源标识符;
( A3 )所述第一安全性信息交互终端基于所述安全性信息交互应答并经由 第二通信信道与第一安全载体进行数据通信以构造安全性信息交互报文,并将 所述安全性信息交互报文传送到数据处理服务器,以完成后续的安全性信息交 互过程而实现电子资源的转移, 其中, 所述安全性信息交互报文包含执行后续 的安全性信息交互过程所需的信息。
2. 根据权利要求 1所述的安全性信息交互方法, 其特征在于, 所述第一通 信信道是基于近场通信协议的通信信道。
3. 根据权利要求 2所述的安全性信息交互方法, 其特征在于, 所述第一安 全性信息交互终端经由所述第二通信信道从所述第一安全载体获取所述执行 后续的安全性信息交互过程所需的信息。
4. 根据权利要求 3所述的安全性信息交互方法, 其特征在于, 所述第一安 全性信息交互终端和所述第二安全性信息交互终端均是移动终端。
5.根据权利要求 4所述的安全性信息交互方法,其特征在于,所述步骤( A3 ) 进一步包括: 所述数据处理服务器解析接收到的安全性信息交互报文, 并执行 脱机验证和判决操作; 如果所述脱机验证和判决操作的结果是 "批准待进行的 电子资源的转移", 则向所述第一安全性信息交互终端传送回批准应答, 否则 向所述第一安全性信息交互终端传送回拒绝应答。
6.根据权利要求 5所述的安全性信息交互方法,其特征在于,所述步骤( A3 ) 进一步包括: 如果接收到批准应答, 则所述第一安全性信息交互终端经由所述 第二通信信道与所述第一安全载体进行数据通信以便脱机地执行与电子资源 的移出相关的操作并获取相应的安全性信息交互凭证, 而如果接收到拒绝应 答,则所述第一安全性信息交互终端终止安全性信息交互过程并提示用户安全 性信息交互失败。
7.根据权利要求 6所述的安全性信息交互方法,其特征在于,所述步骤( A3 ) 进一步包括: 在所述与电子资源的移出相关的操作被执行之后, 所述第一安全 性信息交互终端向所述数据处理服务器传送移出操作成功应答, 其中, 所述移 出操作成功应答包含所述安全性信息交互凭证以及所述资源移入方电子资源 标识符。
8.根据权利要求 7所述的安全性信息交互方法,其特征在于,所述步骤( A3 ) 进一步包括: 在接收到所述移出操作成功应答后, 所述数据处理服务器记录与 当前的安全性信息交互相关联的信息并将该记录的状态设置为 "未完成", 以 及向第一服务提供方服务器发送安全性信息交互应答, 其中, 所述安全性信息 交互应答包含与当前的安全性信息交互相关联的信息;所述数据处理服务器随 后向所述第二安全性信息交互终端发送资源转入通知。
9.根据权利要求 8所述的安全性信息交互方法,其特征在于,所述步骤( A3 ) 进一步包括: 在接收到所述资源转入通知后, 所述第二安全性信息交互终端向 所述数据处理服务器发送安全性信息交互记录查询 /同步请求以获取状态为 "未完成" 的安全性信息交互记录。
10. 根据权利要求 9所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在获取状态为 "未完成" 的安全性信息交互记录后, 所述 第二安全性信息交互终端针对状态为 "未完成"的安全性信息交互记录向所述 数据处理服务器发送安全载体电子资源同步请求, 其中, 所述安全载体电子资 源同步请求至少包含资源移入方电子资源标识符。
11. 根据权利要求 10所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到所述安全载体电子资源同步请求后, 所述数据处 理服务器向所述第二安全性信息交互终端发送安全载体电子资源同步应答,其 中,所述安全载体电子资源同步应答包含带有防篡改保护的待转入电子资源数 量值。
12. 根据权利要求 11所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到所述安全载体电子资源同步应答后, 所述第二安 全性信息交互终端经由第三通信信道与第二安全载体进行数据通信以获取与 电子资源的移入相关的信息,并随后将所述与电子资源的移入相关的信息和所 述带有防篡改保护的待转入电子资源数量值传送到所述数据处理服务器。
1 3. 根据权利要求 12所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到所述与电子资源的移入相关的信息和所述带有防 篡改保护的待转入电子资源数量值后,所述数据处理服务器基于所述与电子资 源的移入相关的信息和所述带有防篡改保护的待转入电子资源数量值构造电 子资源转入请求报文,并将所述电子资源转入请求报文发送到第二服务提供方 服务器。
14. 根据权利要求 1 3所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到所述电子资源转入请求报文后, 所述第二服务提 供方服务器基于所述电子资源转入请求报文执行判决操作,并且如果判决操作 的结果是 "批准待进行的电子资源的转移", 则从所述与电子资源的移入相关 的信息中提取出电子资源余量值,并根据所述电子资源余量值和所述待转入电 子资源数量值计算新的电子资源余量值,并基于所述新的电子资源余量值生成 电子资源余量值更新脚本,以及将所述电子资源余量值更新脚本发送到所述数 据处理服务器。
15. 根据权利要求 14所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到所述电子资源余量值更新脚本后, 所述数据处理 服务器将其转发给所述第二安全性信息交互终端;在接收到所述电子资源余量 值更新脚本后, 所述第二安全性信息交互终端将其转发给所述第二安全载体; 在接收到所述电子资源余量值更新脚本后,所述第二安全载体执行所述电子资 源余量值更新脚本以更新电子资源余量值并将脚本执行结果传送回所述第二 安全性信息交互终端。
16. 根据权利要求 15所述的安全性信息交互方法, 其特征在于, 所述步骤 ( A3 )进一步包括: 在接收到脚本执行结果后, 所述第二安全性信息交互终端 将其转发给所述数据处理服务器; 在接收到脚本执行结果后, 所述数据处理服 务器将其转发给所述第二服务提供方服务器,并且向所述第一安全性信息交互 终端发送电子资源转移成功通知。
17. 根据权利要求 16所述的安全性信息交互方法, 其特征在于, 所述数据 处理服务器针对待转移的电子资源的数量计算鉴别码,并将所述鉴别码和待转 移的电子资源的数量的明文结合在一起构成所述带有防篡改保护的待转入电 子资源数量值。
PCT/CN2014/079145 2013-06-06 2014-06-04 用于电子资源转移的安全性信息交互方法 WO2014194822A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US14/895,065 US20160149918A1 (en) 2013-06-06 2014-06-04 Secure information interaction method for electronic resources transfer
JP2016517146A JP2016533552A (ja) 2013-06-06 2014-06-04 電子リソースムーブに用いられるセキュリティ情報インタラクション方法
KR1020157035658A KR20160013080A (ko) 2013-06-06 2014-06-04 전자 자원 전송을 위한 보안 정보 인터랙션 방법
EP14807406.5A EP3007365A4 (en) 2013-06-06 2014-06-04 SECURE INFORMATION INTERACTION METHOD FOR TRANSFERRING ELECTRONIC RESOURCES
SG11201509928SA SG11201509928SA (en) 2013-06-06 2014-06-04 Security information interaction method for electronic resource transfer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310222492.4 2013-06-06
CN201310222492.4A CN104239803B (zh) 2013-06-06 2013-06-06 用于电子资源转移的安全性信息交互方法

Publications (1)

Publication Number Publication Date
WO2014194822A1 true WO2014194822A1 (zh) 2014-12-11

Family

ID=52007568

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/079145 WO2014194822A1 (zh) 2013-06-06 2014-06-04 用于电子资源转移的安全性信息交互方法

Country Status (9)

Country Link
US (1) US20160149918A1 (zh)
EP (1) EP3007365A4 (zh)
JP (1) JP2016533552A (zh)
KR (1) KR20160013080A (zh)
CN (1) CN104239803B (zh)
HK (1) HK1205310A1 (zh)
SG (1) SG11201509928SA (zh)
TW (1) TW201514751A (zh)
WO (1) WO2014194822A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012064280A1 (en) * 2010-11-10 2012-05-18 Smart Hub Pte. Ltd. Method of performing a financial transaction via unsecured public telecommunication infrastructure and an apparatus for same
CN107123051B (zh) * 2016-02-25 2020-09-04 阿里巴巴集团控股有限公司 一种资源的同步方法和装置
CN107135188B (zh) * 2016-02-29 2020-09-25 阿里巴巴集团控股有限公司 金融信息交换fix协议的业务实现方法、装置及***
CN107332806B (zh) * 2016-04-29 2020-05-05 阿里巴巴集团控股有限公司 移动设备标识的设置方法及装置
WO2018151953A1 (en) 2017-02-15 2018-08-23 Mastercard International Incorporated Offline transaction system and method
US11899757B2 (en) * 2019-12-02 2024-02-13 Cox Automotive, Inc. Systems and methods for temporary digital content sharing
JP2022012403A (ja) * 2020-07-01 2022-01-17 キヤノン株式会社 プログラム、情報処理装置及び制御方法
US20230214813A1 (en) * 2022-01-04 2023-07-06 Bank Of America Corporation System and method providing a data processing channel for alternative resource usage

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101933246A (zh) * 2008-01-30 2010-12-29 电子湾有限公司 一步式近场通信交易
CN102404025A (zh) * 2011-11-16 2012-04-04 中兴通讯股份有限公司 一种终端和处理支付业务的方法
CN102496125A (zh) * 2011-12-21 2012-06-13 成都英黎科技有限公司 基于移动终端的转账方法及***
CN102685692A (zh) * 2011-03-17 2012-09-19 中兴通讯股份有限公司 多模手机支付终端、支付方法及***

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001216459A (ja) * 2000-02-02 2001-08-10 Sony Corp 情報処理システム及び情報処理装置
JP2006221295A (ja) * 2005-02-09 2006-08-24 Sharp Corp 電子マネーシステム、携帯端末装置、及びプログラム
US20070011099A1 (en) * 2005-07-11 2007-01-11 Conrad Sheehan SECURE ELECTRONIC TRANSACTIONS BETWEEN A MOBILE DEVICE AND OTHER MOBILE, FIXED, or VIRTUAL DEVICES
JP2007041954A (ja) * 2005-08-04 2007-02-15 Felica Networks Inc 価値情報移動システム,価値情報移動方法
CN101154281B (zh) * 2006-09-30 2014-12-03 联想(北京)有限公司 迁移智能卡上的金融数据的方法和移动设备
JP2009003516A (ja) * 2007-06-19 2009-01-08 Oki Electric Ind Co Ltd 電子マネーシステム
US8341083B1 (en) * 2007-09-12 2012-12-25 Devicefidelity, Inc. Wirelessly executing financial transactions
CN101364329A (zh) * 2008-09-23 2009-02-11 ***通信集团广东有限公司 基于移动通信设备的非接触公交卡类应用***及管理方法
JP2013505487A (ja) * 2009-09-17 2013-02-14 ロイヤル カナディアン ミント 電子財布のための資産価値記憶、転送システム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101933246A (zh) * 2008-01-30 2010-12-29 电子湾有限公司 一步式近场通信交易
CN102685692A (zh) * 2011-03-17 2012-09-19 中兴通讯股份有限公司 多模手机支付终端、支付方法及***
CN102404025A (zh) * 2011-11-16 2012-04-04 中兴通讯股份有限公司 一种终端和处理支付业务的方法
CN102496125A (zh) * 2011-12-21 2012-06-13 成都英黎科技有限公司 基于移动终端的转账方法及***

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3007365A4 *

Also Published As

Publication number Publication date
TW201514751A (zh) 2015-04-16
EP3007365A1 (en) 2016-04-13
HK1205310A1 (zh) 2015-12-11
KR20160013080A (ko) 2016-02-03
CN104239803B (zh) 2017-08-25
SG11201509928SA (en) 2016-01-28
CN104239803A (zh) 2014-12-24
JP2016533552A (ja) 2016-10-27
US20160149918A1 (en) 2016-05-26
EP3007365A4 (en) 2016-11-16

Similar Documents

Publication Publication Date Title
WO2014194822A1 (zh) 用于电子资源转移的安全性信息交互方法
US10248952B2 (en) Automated account provisioning
EP3055978B1 (en) Systems, methods, and computer program products for managing communications
US20200342439A1 (en) Method, client device and pos terminal for offline transaction
US20120174189A1 (en) System and method for managing ota provisioning applications through use of profiles and data preparation
CN113115285B (zh) 信息处理方法及装置
EP2495695A1 (en) Method and system for conducting a monetary transaction using a mobile communication device
CN105427169B (zh) 用于资源转移的安全性信息交互方法
WO2014111888A1 (en) Mobile payment system
WO2010057405A1 (zh) 利用短信息进行身份认证的方法
KR20160119803A (ko) 인증 시스템 및 방법
CN103037323B (zh) 基于移动终端的随机码验证***及其验证方法
CN103577983A (zh) 一种脱机消费电子货币的圈存方法
WO2012151894A1 (zh) 移动终端支付方法、***及移动终端
US10097553B2 (en) Installation of a secure-element-related service application in a secure element in a communication device, system and telecommunications
CN103856940A (zh) 安全认证方法和***
Mampaey Secure remittance transaction to bankless consumers in a fragmented applications market
TWI661707B (zh) 安全性資訊交互方法、終端及電腦程式產品
WO2014048319A1 (zh) 安全性信息交互***、设备及方法
TW201828134A (zh) 基於密文的身份驗證方法
CN102693506A (zh) 一种支持移动交易业务流程运行的设备和方法
CN109639435A (zh) 一种基于终端卡对app的认证方法及***
CN112105020B (zh) 贴膜卡的云端sdk***及其运行方法
AU2011350194A1 (en) System and method for managing OTA provisioning applications through use of profiles and data preparation
CN107993068B (zh) 一种线上订单线下支付***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14807406

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14895065

Country of ref document: US

Ref document number: 2014807406

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016517146

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20157035658

Country of ref document: KR

Kind code of ref document: A