WO2017016039A1 - 一种在账户之间进行业务数据转移的方法及装置 - Google Patents

一种在账户之间进行业务数据转移的方法及装置 Download PDF

Info

Publication number
WO2017016039A1
WO2017016039A1 PCT/CN2015/088498 CN2015088498W WO2017016039A1 WO 2017016039 A1 WO2017016039 A1 WO 2017016039A1 CN 2015088498 W CN2015088498 W CN 2015088498W WO 2017016039 A1 WO2017016039 A1 WO 2017016039A1
Authority
WO
WIPO (PCT)
Prior art keywords
account
fingerprint information
data transfer
service data
terminal corresponding
Prior art date
Application number
PCT/CN2015/088498
Other languages
English (en)
French (fr)
Inventor
陈剑
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017016039A1 publication Critical patent/WO2017016039A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Definitions

  • the present invention relates to the field of Internet technologies, and in particular, to a method and apparatus for implementing mobile payment.
  • Mobile payment refers to the transaction of a certain commodity or business through a mobile phone, PDA, etc., and the transfer of related goods or wealth in the process of mobile payment.
  • the process of mobile payment is a business data transfer.
  • the process such as a transfer transaction process, is the process of transferring the account amount of a transferee to the account of the transferee.
  • the account amount here is an example of business data.
  • the specific transfer amount is the transfer of business data transfer. Business value.
  • WIFI third-generation mobile communication technology
  • mobile Internet and intelligent terminals mobile payment based on terminal application is rapidly popularized, users can conveniently pay for payment, transfer, and financial management of customers through mobile phones such as Alipay and WeChat. Wait for the operation.
  • the mobile payment client makes full use of near-field recognition technology to simplify payment operations, such as providing a two-dimensional code payment function based on a mobile phone camera, or providing a sound wave payment function based on a mobile phone speaker or a microphone.
  • the prior art mainly uses the terminal application or the mobile payment server to authenticate the payer, and the mobile payment can be performed only when the payer identity authentication is passed.
  • the mobile payment can be performed only when the payer identity authentication is passed.
  • due to malware damage caused by backdoors or loopholes in the entire payment system, virus Trojan implantation, terminal loss or user information leakage, the current business data transfer (mobile payment) process has serious security risks and insufficient security.
  • a service data between accounts is provided.
  • the method of transfer in order to solve the technical problem of insufficient security in the process of performing the user's service data transfer service (for example, mobile payment service) existing in the above-mentioned prior art, a service data between accounts is provided.
  • the method of transfer in order to solve the technical problem of insufficient security in the process of performing the user's service data transfer service (for example, mobile payment service) existing in the above-mentioned prior art, a service data between accounts is provided.
  • a method of transferring business data between accounts including:
  • the fingerprint information of the second account is authenticated, and when the fingerprint information of the second account is verified, the service data is transferred between the first account and the second account according to the service value.
  • the fingerprint information of the first account is fingerprint information encrypted by using the first third-party public key; the step of authenticating the fingerprint information of the first account further includes: acquiring the first Decrypting the encrypted fingerprint information of the first account by using the first third-party private key; acquiring pre-stored sample fingerprint information corresponding to the first account; The fingerprint information of the decrypted first account is matched with the pre-stored sample fingerprint information corresponding to the first account. If the matching is successful, the fingerprint information of the first account is verified.
  • the fingerprint information of the second account is fingerprint information encrypted by using a second third-party public key; the step of authenticating the fingerprint information of the second account further includes: acquiring the second Decrypting the encrypted fingerprint information of the second account by using the second third-party private key by using the second third-party private key corresponding to the three-party public key; acquiring the pre-stored corresponding to the second account according to the second account Pre-stored sample fingerprint information; matching the decrypted fingerprint information of the second account with the pre-stored sample fingerprint information corresponding to the second account, and if the matching is successful, the fingerprint information of the second account is verified.
  • the step of performing identity verification on the fingerprint information of the first account further includes: if the fingerprint information verification of the first account fails, the service data transfer is terminated; and the first account is notified to correspond Terminal.
  • the method further includes: if the verification of the fingerprint information of the second account fails, terminating the service data transfer; notifying the first account and Each of the second accounts corresponds to a terminal.
  • the step of notifying the terminal corresponding to the second account to perform the confirmation further includes: sending the first account and the service value to the terminal corresponding to the second account.
  • the method further includes: notifying the terminal corresponding to the first account and the second The service data transfer described by the terminal corresponding to the account has been completed.
  • the present invention also provides an apparatus for performing service data transfer between accounts, including:
  • the service data transfer request receiving module is configured to receive a service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries the second account, the service value, and the fingerprint information of the first account;
  • a first identity verification module configured to perform identity verification on the fingerprint information of the first account, and notify the terminal corresponding to the second account to confirm when the fingerprint information of the first account is verified;
  • a fingerprint information receiving module of the second account configured to receive fingerprint information of the second account uploaded by the terminal corresponding to the second account
  • a second identity verification module configured to perform identity verification on the fingerprint information of the second account, when the fingerprint information of the second account is verified, according to the service value in the first account and the second Business data transfer between accounts.
  • the fingerprint information of the first account is the fingerprint information encrypted by using the first third-party public key; the first identity verification module is further configured to: acquire the first number corresponding to the first third-party public key a three-party private key, using the first third-party private key to decrypt the encrypted fingerprint information of the first account; acquiring pre-stored sample fingerprint information corresponding to the first account; The fingerprint information of the account is matched with the pre-stored sample fingerprint information corresponding to the first account. If the matching is successful, the fingerprint information of the first account is verified.
  • the fingerprint information of the second account is fingerprint information encrypted by using a second third-party public key;
  • the second identity verification module is further configured to: acquire a second number corresponding to the second third-party public key a third-party private key, using the second third-party private key to decrypt the encrypted fingerprint information of the second account; acquiring pre-stored pre-stored sample fingerprint information corresponding to the second account according to the second account; The fingerprint information of the second account is matched with the pre-stored sample fingerprint information corresponding to the second account. If the matching is successful, the fingerprint information of the second account is verified.
  • the first identity verification module is further configured to: when the fingerprint information verification of the first account fails, terminate the service data transfer; and notify the terminal corresponding to the first account.
  • the second identity verification module is further configured to: when the fingerprint information verification of the second account fails, terminate the service data transfer, and notify the first account and the second account respectively terminal.
  • the first identity verification module is further configured to: send the first account and the service value to the terminal corresponding to the second account.
  • the device further includes a service data transfer completion notification module, configured to notify the terminal corresponding to the first account and the terminal corresponding to the second account that the service data transfer has been completed.
  • the present invention also provides a method for initiating service data transfer.
  • Methods including:
  • Receiving the input service data transfer instruction acquiring the first account that is logged in, and acquiring the service value carried by the service data transfer instruction and the second account;
  • the fingerprint input event is detected by the fingerprint sensor, and the fingerprint information corresponding to the first account corresponding to the fingerprint input event is obtained;
  • the server receives the service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries the second account, the service value And the fingerprint information of the first account, the fingerprint information of the first account is authenticated by the server, and when the fingerprint information of the first account is verified, the server notifies the second account to correspond Receiving, confirming, receiving fingerprint information of the second account uploaded by the terminal corresponding to the second account, performing identity verification on the fingerprint information of the second account, and verifying that the fingerprint information of the second account passes And performing service data transfer between the first account and the second account according to the service value.
  • the present invention also provides an apparatus for initiating service data transfer, including:
  • a service data transfer instruction receiving module configured to receive the input service data transfer instruction, obtain the first account that is logged in, and obtain the service value and the second account carried by the service data transfer instruction;
  • a fingerprint information acquiring module configured to detect, by using a fingerprint sensor, an input fingerprint input event, and obtain fingerprint information corresponding to the first account corresponding to the fingerprint input event;
  • a service data transfer request generating module configured to generate a corresponding service data transfer request according to the first account, the second account, the service value, and the fingerprint information
  • a service data transfer request uploading module configured to upload the service data transfer request to a server, where the server receives the service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries Describe the second account, the service value, and the fingerprint information of the first account, and the server performs identity verification on the fingerprint information of the first account, and when the fingerprint information of the first account is verified, the The server notifies the terminal corresponding to the second account to perform confirmation, receives fingerprint information of the second account uploaded by the terminal corresponding to the second account, and performs identity verification on the fingerprint information of the second account, where When the fingerprint information of the second account is verified, the service data is transferred between the first account and the second account according to the service value.
  • the server needs to be initiated and received by the server.
  • the party authenticates its fingerprint information, and the data transfer can be completed only if both parties pass the authentication. That is to say, a service data transfer requires two authentications, thereby improving the security of business data transfer.
  • FIG. 1 is a schematic diagram of an operating system of a mechanism for performing service data transfer between accounts in an embodiment
  • FIG. 2 is a flow chart of a method for performing service data transfer between accounts in an embodiment
  • FIG. 3 is a flow chart of a method for initiating service data transfer in an embodiment
  • FIG. 4 is a schematic structural diagram of an apparatus for initiating service data transfer in an embodiment
  • FIG. 5 is a schematic structural diagram of an apparatus for performing service data transfer between accounts in an embodiment.
  • a method is proposed between accounts.
  • the mechanism for transferring business data, the business data transfer mechanism between the accounts is composed of two parts, including a "method of initiating business data transfer" running on the terminal and "transfer of business data between accounts” running on the server. method".
  • the mechanism for performing service data transfer between accounts operates on a system constituted by the terminal 10 corresponding to the initiator, the server 20 performing the service data transfer, and the terminal 30 corresponding to the receiver as shown in FIG.
  • the computer program for carrying the foregoing method for initiating the data transfer of the service may be a client program of the mobile payment application running on the terminal corresponding to the initiator shown in FIG. 1; the terminal may be a smart phone, a tablet computer or Computer equipment such as laptops.
  • the computer program carrying the above method for performing service data transfer between accounts may be a server program of a mobile payment application running on the server as shown at 20 in FIG.
  • a method for performing service data transfer between accounts is as shown in FIG. 2, and can be run on the server 20 in FIG. 1 above, and includes the following steps:
  • Step S102 Receive a service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries the second account, the service value, and the fingerprint information of the first account.
  • the server receives the service data transfer request uploaded by the terminal corresponding to the first account, and receives the service data transfer request uploaded by the terminal corresponding to the first account at the server. Previously, the request was initiated by the terminal corresponding to the first account and uploaded to the server.
  • FIG. 3 illustrates a method of initiating a service data transfer, which specifically includes the following steps:
  • S202 Receive an input service data transfer instruction, obtain a first account that is logged in, and obtain a service value carried by the service data transfer instruction and a second account.
  • S204 The fingerprint input event is detected by the fingerprint sensor, and the fingerprint information corresponding to the first account corresponding to the fingerprint input event is obtained.
  • S206 Generate a corresponding service data transfer request according to the first account, the second account, the service value, and the fingerprint information.
  • the first account is an initiator of the service data transfer
  • the terminal corresponding to the first account receives the service data transfer instruction input by the user through the sensor, triggering the start of the service data transfer, for example, when the first account corresponds to
  • the terminal is a smart phone
  • the service data transfer instruction input by the user on the touch screen is received through the touch screen of the mobile phone, and then the account of the first account registered in the client is acquired.
  • the information that is, the account information that needs to be transferred by the service data, is then obtained by acquiring the second account corresponding to the service value corresponding to the service data transfer instruction and the recipient of the service data transfer carried in the service data transfer instruction.
  • the identity of the first account needs to be verified, that is, the user needs to input the fingerprint information after inputting the service data transfer instruction for verification.
  • the input fingerprint input event is detected by the fingerprint sensor of the terminal.
  • the fingerprint input event is acquired, and the fingerprint information corresponding to the first account corresponding to the fingerprint input event is obtained.
  • user A wants to transfer the amount of money agreed to user B to 1000.00 yuan, that is, it is desirable to transfer the service data whose service value is 1000.00 from the account of user A to the account of user B.
  • A inputs a corresponding transfer instruction on the online application terminal of the bank of the terminal, that is, the account information "1111222233334444" of the user B and the transfer information "1000.00", and after confirming the corresponding transfer information, inputting in the fingerprint sensor of the terminal Fingerprint information, thereby completing the input of the transfer instruction, generating a corresponding transfer request according to the input transfer instruction, and then The transfer request is uploaded to the server.
  • the server receives the service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries the second account, the service value, and the fingerprint information of the first account.
  • Step S104 Perform identity verification on the fingerprint information of the first account, and notify the terminal corresponding to the second account to confirm when the fingerprint information of the first account is verified.
  • the first account After receiving the service data transfer request uploaded by the terminal corresponding to the first account in step S102, the first account is authenticated according to the fingerprint information of the first account carried in the service data transfer request. Obtaining, according to the received service data transfer request, the account information for uploading the request, that is, the account information of the first account, and then acquiring the sample fingerprint information corresponding to the first account pre-stored in the server according to the account information of the first account. . It should be noted that each account needs to upload its corresponding sample fingerprint information when it is established, in the subsequent account management, in the process of verifying the identity of the user, the relevant sample fingerprint information is called for further processing. .
  • the process of authenticating the fingerprint information of the first account that is, the fingerprint information of the first account carried in the received service data transfer request, and the sample fingerprint information pre-stored in the first account are performed.
  • the process of matching If the two are matched, it is determined that the identity verification of the fingerprint information of the first account is passed, and if the two are not matched, it is determined that the fingerprint information of the first account is not matched.
  • the execution of the service data transfer can be continued. Then, the related information of the service data transfer is sent to the receiver for confirmation, and the receiver is the receiving account of the service data transfer, that is, the terminal corresponding to the second account, that is, the corresponding information of the service data transfer is sent. Confirm the terminal corresponding to the second account.
  • the step of notifying the terminal corresponding to the second account to perform the confirmation further includes: sending the first account and the service value to the terminal corresponding to the second account.
  • user A agrees to transfer money to user B for a total of 1000.00 yuan.
  • user B needs to confirm the transaction and confirm whether the originator of the transfer is correct. And whether the transfer amount is correct and so on. Therefore, when the fingerprint information of the user A is verified, the account information of the user A and the transfer amount of 1000.00 yuan are sent to the user. The user B notifies the terminal corresponding to the user B to confirm the related information.
  • the method for performing service data transfer between accounts further includes: if the fingerprint information of the first account is verified If not, the service data transfer is terminated; and the terminal corresponding to the first account is notified.
  • step S104 If the identity verification of the first account fails in step S104, the user who sends the service data transfer request does not have the corresponding service data transfer authority, and the corresponding service data transfer cannot be performed, then the service data transfer is terminated, and the service is terminated.
  • the message that the data transfer is terminated is notified to the initiator that initiated the data transfer of the service, that is, the terminal corresponding to the first account.
  • Step S106 Receive fingerprint information of the second account uploaded by the terminal corresponding to the second account.
  • the server when the receiver of the service data transfer, that is, the terminal corresponding to the second account, confirms the service data transfer, the server also needs to verify the identity of the second account, and only the identity verification of the second account is also performed. The execution process of the business data transfer can be continued when passing.
  • the terminal corresponding to the second account When receiving the notification message about the service data transfer sent by the server and confirming, the terminal corresponding to the second account needs to input the corresponding identity information and send it to the server for identity verification.
  • the identity information that needs to be input is required. That is the fingerprint information of the second account.
  • Step S108 Perform identity verification on the fingerprint information of the second account, and perform service between the first account and the second account according to the service value when the fingerprint information of the second account is verified. Data transfer.
  • the second account After receiving the fingerprint information of the second account uploaded by the terminal corresponding to the second account in step S106, the second account is authenticated to the fingerprint information of the second account.
  • the pre-stored sample fingerprint information corresponding to the second account is obtained according to the account information of the second account.
  • the process of authenticating the fingerprint information of the second account is a process of matching the fingerprint information of the received second account with the sample fingerprint information pre-stored by the second account. If the two are matched, it is determined that the identity verification of the fingerprint information of the second account is passed, and if the two are not matched, it is determined that the fingerprint information of the second account is not matched.
  • the service data transfer can be performed, that is, the service data transfer request can be performed according to the service data transfer request.
  • the corresponding service value is transferred between the first account and the second account, and the service data transfer is completed.
  • the step of the data transfer further includes: notifying the terminal corresponding to the first account and the terminal corresponding to the second account that the service data transfer has been completed.
  • Performing service data transfer between the first account and the second account according to the service value that is, the service data transfer has been performed, and further, the terminal corresponding to the first account and the second account are further notified.
  • the terminal informs that the business data transfer has been completed. Specifically, the terminal corresponding to the first account is notified, the service data transfer has been completed, and the corresponding service value has been deducted from the first account; the terminal corresponding to the second account is notified, the service data transfer has been completed, and the corresponding service value has been transferred. To the second account.
  • the method further includes: if the fingerprint information verification of the second account fails, terminating the service data transfer; A terminal corresponding to each of the first account and the second account.
  • step S108 If the identity verification of the second account fails to pass in step S108, the user who receives the service data transfer does not have the corresponding authority, and the service data transfer has a security risk or other problem, and the service data transfer cannot be continued.
  • the execution of the service data transfer is terminated, and the related message is notified to the related user, that is, the terminal corresponding to the first account and the terminal service data transfer corresponding to the second account have been terminated.
  • the fingerprint information of the first account may also be fingerprint information encrypted by using the first third-party public key; and identifying the fingerprint information of the first account
  • the step of verifying further includes: acquiring a first third-party private key corresponding to the first third-party public key, and decrypting the encrypted fingerprint information of the first account by using the first third-party private key; Pre-stored sample fingerprint information corresponding to the first account; matching the decrypted fingerprint information of the first account with pre-stored sample fingerprint information corresponding to the first account, if the matching is successful, the first The fingerprint information of the account is verified.
  • the fingerprint information is encrypted by the encryption module, that is, the encrypted fingerprint information is sent to the server.
  • the encryption for the fingerprint information of the first account may be encrypted by using a third-party public key, that is, using the first third public key for encryption, for example, by obtaining PKI authorization encryption on the PKI authorized party. To achieve encryption.
  • the server performs identity verification on the fingerprint information of the first account
  • the encrypted information needs to be decrypted first.
  • the server is based on the first third-party private key corresponding to the first third-party public key.
  • the fingerprint information of the encrypted first account is decrypted for use in subsequent authentication.
  • the process of authenticating the fingerprint information of the first account is a process of matching the fingerprint information of the decrypted first account with the pre-stored sample fingerprint information corresponding to the first account. If the two are matched, it is determined that the identity verification of the fingerprint information of the first account is passed, and if the two are not matched, it is determined that the fingerprint information of the first account is not matched.
  • the fingerprint information of the second account is fingerprint information encrypted by using a second third-party public key; and the step of authenticating the fingerprint information of the second account further includes: acquiring the second a second third-party private key corresponding to the third-party public key, using the second third-party private key to decrypt the encrypted fingerprint information of the second account; and acquiring, according to the second account, the pre-stored corresponding to the second account Pre-stored sample fingerprint information; matching the decrypted fingerprint information of the second account with the pre-stored sample fingerprint information corresponding to the second account, and if the matching is successful, the fingerprint information of the second account is verified .
  • the fingerprint information is encrypted by the encryption module, that is, the encrypted fingerprint information is sent to the server.
  • the encryption for the fingerprint information of the second account is encrypted by using a third-party public key, that is, using the second third public key for encryption, for example, by obtaining PKI authorization encryption on the PKI authorized party.
  • the encrypted information of the second account uploaded by the terminal corresponding to the second account received by the server is the encrypted fingerprint information
  • the server performs identity verification on the fingerprint information of the second account
  • the encrypted information needs to be decrypted first.
  • the server decrypts the encrypted fingerprint information of the second account according to the second third-party private key corresponding to the second third-party public key, so as to be used in subsequent identity verification.
  • the sample fingerprint information corresponding to the second account pre-stored in the server is acquired according to the account information of the second account.
  • the process of authenticating the fingerprint information of the second account is a process of matching the fingerprint information of the decrypted second account with the pre-stored sample fingerprint information corresponding to the second account. If the two are matched, it is determined that the identity verification of the fingerprint information of the second account is passed, and if the two are not matched, it is determined that the fingerprint information of the second account is not matched.
  • a A device for initiating service data transfer on a terminal and a device for performing service data transfer between accounts on a server in order to solve the technical problem of insufficient security in the process of performing a user's service data transfer service (for example, a mobile payment service) existing in the above-mentioned conventional technology, in one embodiment, a A device for initiating service data transfer on a terminal and a device for performing service data transfer between accounts on a server.
  • a user's service data transfer service for example, a mobile payment service
  • the device for initiating service data transfer is as shown in FIG. 4, and includes: a service data transfer instruction receiving module 102, a fingerprint information obtaining module 104, a service data transfer request generating module 106, and a service data transfer request uploading module 108, wherein:
  • the service data transfer instruction receiving module 102 is configured to receive the input service data transfer instruction, obtain the first account that is logged in, and obtain the service value and the second account carried by the service data transfer instruction.
  • the fingerprint information acquiring module 104 is configured to detect, by using the fingerprint sensor, the input fingerprint input event, and obtain the fingerprint information corresponding to the first account corresponding to the fingerprint input event.
  • the service data transfer request generating module 106 is configured to generate a corresponding service data transfer request according to the first account, the second account, the service value, and the fingerprint information.
  • the service data transfer request uploading module 108 is configured to upload the service data transfer request to the server, and the server receives the service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries The second account, the service value, and the fingerprint information of the first account are authenticated by the server for fingerprint information of the first account, and when the fingerprint information of the first account is verified, The server notifies the terminal corresponding to the second account to perform confirmation, receives fingerprint information of the second account uploaded by the terminal corresponding to the second account, and performs identity verification on the fingerprint information of the second account. When the fingerprint information verification of the second account is passed, the service data is transferred between the first account and the second account according to the service value.
  • the device for performing service data transfer between the accounts is as shown in FIG. 5, and specifically includes:
  • the service data transfer request receiving module 202 is configured to receive a service data transfer request uploaded by the terminal corresponding to the first account, where the service data transfer request carries the second account, the service value, and the fingerprint information of the first account.
  • the first identity verification module 204 is configured to perform identity verification on the fingerprint information of the first account, and notify the terminal corresponding to the second account to confirm when the fingerprint information of the first account is verified.
  • the fingerprint information receiving module 206 of the second account is configured to receive the terminal uploaded by the terminal corresponding to the second account. Fingerprint information of the second account.
  • the second identity verification module 208 is configured to perform identity verification on the fingerprint information of the second account.
  • the service data is transferred between the first account and the second account according to the service value.
  • the fingerprint information of the first account is the fingerprint information encrypted by using the first third-party public key; the first identity verification module 204 is further configured to: acquire the first third-party private key corresponding to the first third-party public key, Decrypting the encrypted fingerprint information of the first account by using the first third-party private key; acquiring pre-stored sample fingerprint information corresponding to the first account; pre-storing the fingerprint information of the decrypted first account corresponding to the first account The sample fingerprint information is matched. If the matching is successful, the fingerprint information of the first account is verified.
  • the fingerprint information of the second account is the fingerprint information encrypted by using the second third-party public key; the second identity verification module 208 is further configured to: acquire the second third-party private key corresponding to the second third-party public key, Decrypting the encrypted fingerprint information of the second account by using the second third-party private key; acquiring the pre-stored sample fingerprint information corresponding to the second account according to the second account; and deleting the fingerprint information of the decrypted second account
  • the pre-stored sample fingerprint information corresponding to the second account is matched. If the matching is successful, the fingerprint information of the second account is verified.
  • the first identity verification module 204 is further configured to: when the fingerprint information verification of the first account fails, terminate the service data transfer; and notify the terminal corresponding to the first account.
  • the second identity verification module 208 is further configured to: when the fingerprint information verification of the second account fails, terminate the service data transfer, and notify the terminal corresponding to each of the first account and the second account.
  • the first identity verification module 204 is further configured to: send the first account and the service value to the terminal corresponding to the second account.
  • the device further includes a service data transfer completion notification module 210, configured to notify that the terminal corresponding to the first account and the terminal service data transfer corresponding to the second account have been completed.
  • the server needs to be initiated and received by the server.
  • the party authenticates its fingerprint information, and the data transfer can be completed only if both parties pass the authentication.
  • a business data transfer Two authentications are required, which increases the security of business data transfer.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种在账户之间进行业务数据转移的方法,包括:接收第一账户对应的终端上传的业务数据转移请求(S102);对第一账户的指纹信息进行身份验证,在第一账户的指纹信息验证通过时,通知第二账户对应的终端进行确认(S104);接收第二账户对应的终端上传的第二账户的指纹信息(S106);对第二账户的指纹信息进行身份验证,在第二账户的指纹信息验证通过时,根据业务数值在第一账户和第二账户之间进行业务数据转移(S108)。一种发起业务数据转移的方法,以及一种在账户之间进行业务数据转移的装置、一种发起业务数据转移的装置。采用在账户之间进行业务数据转移的方法和装置,可以提高在账户之间进行业务数据转移的安全性。

Description

一种在账户之间进行业务数据转移的方法及装置 技术领域
本发明涉及互联网技术领域,尤其涉及一种实现移动支付的方法及装置。
背景技术
移动支付是指交易双方为了某种商品或者业务通过手机、PDA等终端进行商业交易,移动支付过程中,相关的商品或财富的转移,从本质上来讲,移动支付的过程,就是一个业务数据转移的过程,如一个转账交易的过程,即为一个转账方的账户金额转移到被转账方的账户上去的过程,这里的账户金额就是一个业务数据的例子,具体的转账金额就是业务数据转移中转移的业务数值。随着第三代移动通信技术、WIFI、移动互联网及智能终端的快速发展,基于终端应用程序的移动支付快速普及,用户可以很方便的通过支付宝、微信等手机支付客户端购物支付、转账、理财等操作。同时,移动支付客户端充分利用近场识别技术简化支付操作,如基于手机摄像头提供二维码支付功能,或者基于手机扬声器、麦克风提供声波支付功能。
为了确保业务数据转移如移动支付的安全,现有技术主要是终端应用程序或者移动支付服务器对支付方进行鉴权,只有在支付方身份认证通过的情况下才能进行移动支付。但是,由于整个支付***后门或漏洞导致的恶意软件危害、病毒木马植入、终端丢失或者用户信息泄密等问题,使得目前的业务数据转移(移动支付)过程存在严重的安全隐患,安全性不足。
发明内容
基于此,为解决上述提到的现有技术中存在的执行用户的业务数据转移业务(例如移动支付业务)的过程中的安全性不足的技术问题,提供了一种在账户之间进行业务数据转移的方法。
一种在账户之间进行业务数据转移的方法,包括:
接收第一账户对应的终端上传的业务数据转移请求,所述业务数据转移请 求携带第二账户、业务数值和第一账户的指纹信息;
对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,通知所述第二账户对应的终端进行确认;
接收所述第二账户对应的终端上传的所述第二账户的指纹信息;
对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
进一步地,所述第一账户的指纹信息为使用第一第三方公钥加密的指纹信息;所述对所述第一账户的指纹信息进行身份验证的步骤还包括:获取与所述第一第三方公钥对应的第一第三方私钥,使用所述第一第三方私钥将所述第一账户的加密的指纹信息进行解密;获取与所述第一账户对应的预存的样本指纹信息;将解密后的所述第一账户的指纹信息与所述第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第一账户的指纹信息验证通过。
进一步地,所述第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;所述对所述第二账户的指纹信息进行身份验证的步骤还包括:获取与所述第二第三方公钥对应的第二第三方私钥,使用所述第二第三方私钥将所述第二账户的加密的指纹信息进行解密;根据所述第二账户获取预存的与第二账户对应的预存的样本指纹信息;将解密后的所述第二账户的指纹信息与所述第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第二账户的指纹信息验证通过。
进一步地,所述对所述第一账户的指纹信息进行身份验证的步骤之后还包括:若所述第一账户的指纹信息验证不通过,终止所述业务数据转移;通知所述第一账户对应的终端。
进一步地,所述对所述第二账户的指纹信息进行身份验证的步骤之后还包括:若所述第二账户的指纹信息验证不通过,终止所述业务数据转移;通知所述第一账户和所述第二账户各自对应的终端。
进一步地,所述通知所述第二账户对应的终端进行确认的步骤还包括:将所述第一账户和业务数值发送给第二账户对应的终端。
进一步地,所述根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移的步骤之后还包括:通知所述第一账户对应的终端和所述第二 账户对应的终端所述业务数据转移已完成。
此外,本发明还提供了一种在账户之间进行业务数据转移的装置,包括:
业务数据转移请求接收模块,用于接收第一账户对应的终端上传的业务数据转移请求,所述业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息;
第一身份验证模块,用于对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,通知所述第二账户对应的终端进行确认;
第二账户的指纹信息接收模块,用于接收所述第二账户对应的终端上传的所述第二账户的指纹信息;
第二身份验证模块,用于对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
进一步地,所述第一账户的指纹信息为使用第一第三方公钥加密的指纹信息;所述第一身份验证模块还用于:获取与所述第一第三方公钥对应的第一第三方私钥,使用所述第一第三方私钥将所述第一账户的加密的指纹信息进行解密;获取与所述第一账户对应的预存的样本指纹信息;将解密后的所述第一账户的指纹信息与所述第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第一账户的指纹信息验证通过。
进一步地,所述第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;所述第二身份验证模块还用于:获取与所述第二第三方公钥对应的第二第三方私钥,使用所述第二第三方私钥将所述第二账户的加密的指纹信息进行解密;根据所述第二账户获取预存的与第二账户对应的预存的样本指纹信息;将解密后的所述第二账户的指纹信息与所述第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第二账户的指纹信息验证通过。
进一步地,所述第一身份验证模块还用于:在所述第一账户的指纹信息验证不通过时,终止所述业务数据转移;通知所述第一账户对应的终端。
进一步地,所述第二身份验证模块还用于:在所述第二账户的指纹信息验证不通过时,终止所述业务数据转移,通知所述第一账户和所述第二账户各自对应的终端。
进一步地,所述第一身份验证模块还用于:将所述第一账户和业务数值发送给第二账户对应的终端。
进一步地,所述装置还包括业务数据转移已完成通知模块,用于通知所述第一账户对应的终端和所述第二账户对应的终端所述业务数据转移已完成。
此外,为解决上述提到的现有技术中存在的执行用户的业务数据转移业务(例如移动支付业务)的过程中的安全性不足的技术问题,本发明还提供了一种发起业务数据转移的方法,包括:
接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户;
通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与所述第一账户对应的指纹信息;
根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求;
将所述业务数据转移请求上传到服务器,由所述服务器接收所述第一账户对应的终端上传的所述业务数据转移请求,所述业务数据转移请求携带所述第二账户、所述业务数值和所述第一账户的指纹信息,由所述服务器对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,所述服务器通知所述第二账户对应的终端进行确认,接收所述第二账户对应的终端上传的所述第二账户的指纹信息,对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
此外,本发明还提供了一种发起业务数据转移的装置,包括:
业务数据转移指令接收模块,用于接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户;
指纹信息获取模块,用于通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与所述第一账户对应的指纹信息;
业务数据转移请求生成模块,用于根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求;
业务数据转移请求上传模块,用于将所述业务数据转移请求上传到服务器,由所述服务器接收所述第一账户对应的终端上传的所述业务数据转移请求,所述业务数据转移请求携带所述第二账户、所述业务数值和所述第一账户的指纹信息,由所述服务器对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,所述服务器通知所述第二账户对应的终端进行确认,接收所述第二账户对应的终端上传的所述第二账户的指纹信息,对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
实施本发明实施例,将具有如下有益效果:
在上述一种在账户之间进行业务数据转移的方法及装置、和上述一种发起业务数据转移的方法及装置中,在进行业务数据转移如移动支付的过程中,需要服务器对发起方和接收方都对其指纹信息进行身份验证,只有在双方身份验证均通过的情况下,该业务数据转移才能完成。也就是说,一次业务数据转移需要两次鉴权,从而提高了业务数据转移的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
其中:
图1为一个实施例中一种在账户之间进行业务数据转移的机制的运行***的示意图;
图2为一个实施例中一种在账户之间进行业务数据转移的方法的流程图;
图3为一个实施例中一种发起业务数据转移的方法的流程图;
图4为一个实施例中一种发起业务数据转移的装置的结构示意图;
图5为一个实施例中一种在账户之间进行业务数据转移的装置的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
为解决上述提到的传统技术中存在的执行用户的业务数据转移业务(例如移动支付业务)的过程中的安全性不足的技术问题,在一个实施例中,特提出了一种在账户之间进行业务数据转移的机制,该在账户之间进行业务数据转移机制由两部分构成,包括运行于终端的“发起业务数据转移的方法”以及运行于服务器的“在账户之间进行业务数据转移的方法”。该在账户之间进行业务数据转移的机制运行于如图1所示的由发起方对应的终端10、进行业务数据转移的服务器20和接收方对应的终端30构成的***。上述“发起业务数据转移的方法”以及“在账户之间进行业务数据转移的方法”的实现均可以依赖于计算机程序,且上述服务器和终端均可以是基于冯诺依曼体系的计算机***。
其中,承载上述发起业务数据转移方法的计算机程序,可以是运行于如图1中的10所示的发起方对应的终端的移动支付应用的客户端程序;该终端可以是智能手机、平板电脑或笔记本电脑等计算机设备。承载上述在账户之间进行业务数据转移的方法的计算机程序,可以是运行于如图1中的20所示的服务器的移动支付应用的服务器程序。
具体的,在本实施例中,一种在账户之间进行业务数据转移的方法如图2所示,可运行于上述图1中的服务器20上,包括如下步骤:
步骤S102:接收第一账户对应的终端上传的业务数据转移请求,业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息。
在本实施例中,在服务器的移动支付应用的应用场景中,服务器接收由第一账户对应的终端上传的业务数据转移请求,并且在服务器接收由第一账户对应的终端上传的业务数据转移请求之前,该请求由第一账户对应的终端发起并上传到服务器。
对第一账户对应的终端而言,业务数据转移请求生成和上传的方法如图3 所示,图3展示了一种发起业务数据转移的方法,具体包括如下步骤:
S202:接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户。
S204:通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与第一账户对应的指纹信息。
S206:根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求。
S208:将所述业务数据转移请求上传到服务器。
具体的,第一账户即为业务数据转移的发起方,在第一账户对应的终端中,通过传感器接收用户输入的业务数据转移指令,触发该业务数据转移的开始,例如,当第一账户对应的终端为智能手机时,在手机中业务数据转移对应的客户端应用中,通过手机的触摸屏接收用户在触摸屏上输入的业务数据转移指令,然后获取在该客户端中登录的第一账户的账户信息,即需要进行业务数据转移的账户信息,然后获取在该业务数据转移指令中携带有的与该业务数据转移指令对应的业务数值和业务数据转移的接收方对应的第二账户。
因为该业务数据的转移需要对发起请求的账户进行身份验证,故需要对第一账户的身份进行验证,即需要用户在输入业务数据转移指令后,输入指纹信息以备进行验证。具体的,通过终端的指纹传感器检测输入的指纹输入事件,当检测到有指纹输入事件发生时,获取该指纹输入事件,并获取该指纹输入事件对应的与第一账户对应的指纹信息。
在第一账户对应的终端的与该业务数据转移对应的客户端应用场景中,根据已经获取到的业务数据转移指令对应的业务数值、第二账户以及第一账户的指纹信息等相关信息,生成与这些数据对应的业务数据转移请求,然后将该业务数据转移请求发送给服务器。
例如,在一个移动支付应用的应用场景中,用户A希望转账给用户B约定金额1000.00元,即希望将执行业务数值为1000.00的业务数据从用户A的账户转移至用户B的帐号,则需要用户A在终端的银行的在线应用终端上输入相应的转账指令,即用户B的账户信息“1111222233334444”和转账信息“1000.00”,并且在对相应的转账信息进行确认之后,在终端的指纹传感器中输入指纹信息,从而完成转账指令的输入,根据输入的转账指令生成相应的转账请求,然后将 转账请求上传至服务器。
因此,服务器接收第一账户对应的终端上传的业务数据转移请求,所述业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息。
步骤S104:对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,通知所述第二账户对应的终端进行确认。
在步骤S102中接收到第一账户对应的终端上传的业务数据转移请求之后,就根据该业务数据转移请求中携带的第一账户的指纹信息对第一账户进行身份验证。根据接收到的业务数据转移请求,获取上传该请求的账户信息,即为第一账户的账户信息,然后根据第一账户的账户信息,获取在服务器中预存的与第一账户对应的样本指纹信息。需要说明的是,每个账户在建立时就需要上传其对应的样本指纹信息,以备在后续的账户管理中,在对用户的身份进行验证的过程中调用相关样本指纹信息以进行进一步的处理。
例如,在一个移动支付应用的应用场景中,用户A希望转账给用户B约定金额1000.00元,则需要对用户A的身份进行验证,只有在用户A的身份验证通过的情况下,才能完成该转账申请的提交。
在本实施例中,对第一账户的指纹信息进行身份验证的过程,即为一个将接收到的业务数据转移请求中携带的第一账户的指纹信息,与第一账户预存的样本指纹信息进行匹配的过程。若二者是匹配的,则判定第一账户的指纹信息的身份验证通过,若二者是不匹配的,则判定第一账户的指纹信息是不匹配的。
在第一账户的身份验证通过的情况下,即代表发起该业务数据转移请求的用户具备相应的业务数据转移权限,可以继续该业务数据转移的执行。然后,将该业务数据转移的相关信息发送给接收方进行确认,接收方即为业务数据转移的接收账户,即为第二账户对应的终端,也就是说,将该业务数据转移的相应信息发送给第二账户对应的终端进行确认。
进一步地,在本实施例中,通知所述第二账户对应的终端进行确认的步骤还包括:将所述第一账户和业务数值发送给第二账户对应的终端。
例如,在一个移动支付应用的应用场景中,用户A约定转账给用户B共1000.00元,在用户A的身份验证通过的情况下,用户B需要对该交易进行确认,确认转账的发起人是否正确,以及转账金额是否正确等等。因此,在所述用户A的指纹信息验证通过时,将用户A的账户信息和转账金额1000.00元发送给用 户B,通知用户B对应的终端对相关的信息进行确认。
进一步地,在本实施例中,在对所述第一账户的指纹信息进行身份验证的步骤之后,该在账户之间进行业务数据转移的方法还包括:若所述第一账户的指纹信息验证不通过,终止所述业务数据转移;通知所述第一账户对应的终端。
若步骤S104中第一账户的身份验证不能通过,则代表发送该业务数据转移请求的用户不具备相应的业务数据转移权限,不能执行相应的业务数据转移,则终止该业务数据转移,并且将业务数据转移被终止的消息通知给发起该业务数据转移的发起方,即第一账户对应的终端。
步骤S106:接收所述第二账户对应的终端上传的所述第二账户的指纹信息。
具体的,在该业务数据转移的接收方,即第二账户对应的终端,对该业务数据转移进行确认时,服务器还需要对第二账户的身份进行验证,只有在第二账户的身份验证也通过时才能继续该业务数据转移的执行过程。第二账户对应的终端在接收到服务器发送的关于该业务数据转移的通知消息并进行确认时,需要输入相应的身份信息并发送给服务器进行身份验证,在本实施例中,需要输入的身份信息即为第二账户的指纹信息。
步骤S108:对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
在步骤S106中接收到第二账户对应的终端上传的第二账户的指纹信息之后,就对第二账户的指纹信息对第二账户进行身份验证。根据第二账户的账户信息获取与第二账户对应的预存的样本指纹信息。在本实施例中,对第二账户的指纹信息进行身份验证的过程,即为一个将接收到的第二账户的指纹信息,与第二账户预存的样本指纹信息进行匹配的过程。若二者是匹配的,则判定第二账户的指纹信息的身份验证通过,若二者是不匹配的,则判定第二账户的指纹信息是不匹配的。
在第二账户的身份验证通过的情况下,即表示所述业务数据转移的接收方即第二账户对应的用户具备有相应的权限,可以执行该业务数据转移,即可以根据该业务数据转移请求中对应的业务数值在第一账户和第二账户之间进行业务数据转移,完成该业务数据转移。
进一步地,根据所述业务数值在所述第一账户和所述第二账户之间进行业 务数据转移的步骤之后还包括:通知所述第一账户对应的终端和所述第二账户对应的终端所述业务数据转移已完成。
根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移,即代表该业务数据转移已被执行,此时进一步地通知第一账户对应的终端和第二账户对应的终端,告知业务数据转移已完成。具体来讲,通知第一账户对应的终端,业务数据转移已完成,相应的业务数值已从第一账户中扣除;通知第二账户对应的终端,业务数据转移已完成,相应的业务数值已转至第二账户中。
进一步地,在本实施例中,对所述第二账户的指纹信息进行身份验证的步骤之后还包括:若所述第二账户的指纹信息验证不通过,终止所述业务数据转移;通知所述第一账户和第二账户各自对应的终端。
若在步骤S108中,第二账户的身份验证不能通过,则代表接收该业务数据转移的用户不具备相应的权限,该业务数据转移存在安全隐患或其他问题,不能继续执行该业务数据转移,应当终止该业务数据转移的执行,并且将相关消息通知给相关用户,即通知第一账户对应的终端和第二账户对应的终端业务数据转移已被终止。
可选的,在该在账户之间进行业务数据转移的方法中,第一账户的指纹信息还可以为使用第一第三方公钥加密的指纹信息;对所述第一账户的指纹信息进行身份验证的步骤还包括:获取与所述第一第三方公钥对应的第一第三方私钥,使用所述第一第三方私钥将所述第一账户的加密的指纹信息进行解密;获取与所述第一账户对应的预存的样本指纹信息;将解密后的所述第一账户的指纹信息与所述第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第一账户的指纹信息验证通过。
具体的,在第一账户对应的终端将第一账户的指纹信息发送给服务器之前,通过加密模块对指纹信息进行加密处理,即发送给服务器的是加密后的指纹信息。在本实施例中,针对第一账户的指纹信息进行的加密可以是使用第三方公钥进行加密的,即使用第一第三公钥进行加密,例如,可以通过在PKI授权方获得PKI授权加密来实现加密。
因为服务器接收到的第一账户对应的终端上传的第一账户的指纹信息是加密的指纹信息,因此,服务器在对第一账户的指纹信息进行身份验证时,就需要先对加密信息进行解密。服务器根据第一第三方公钥对应的第一第三方私钥, 将加密的第一账户的指纹信息进行解密,以备在后续的身份验证中使用。根据在步骤S102中接收到的业务数据转移请求,获取上传该请求的账户的账户信息,即为第一账户的账户信息,然后根据第一账户的账户信息获取在服务器中预存的与第一账户对应的样本指纹信息。
在本实施例中,对第一账户的指纹信息进行身份验证的过程,即为将解密后的第一账户的指纹信息,与第一账户对应的预存的样本指纹信息进行匹配的过程。若二者是匹配的,则判定第一账户的指纹信息的身份验证通过,若二者是不匹配的,则判定第一账户的指纹信息是不匹配的。
可选的,所述第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;所述对所述第二账户的指纹信息进行身份验证的步骤还包括:获取与所述第二第三方公钥对应的第二第三方私钥,使用所述第二第三方私钥将所述第二账户的加密的指纹信息进行解密;根据所述第二账户获取预存的与第二账户对应的预存的样本指纹信息;将解密后的所述第二账户的指纹信息与所述第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第二账户的指纹信息验证通过。
具体的,在第二账户的对应终端将第二账户的指纹信息上传到服务器之前,通过加密模块对指纹信息进行加密处理,即发送给服务器的是加密后的指纹信息。在本实施例中,针对第二账户的指纹信息进行的加密是使用第三方公钥进行加密的,即使用第二第三公钥进行加密,例如,可以通过在PKI授权方获得PKI授权加密来实现加密。
因为服务器接收到的第二账户对应的终端上传的第二账户的指纹信息是加密的指纹信息,因此,服务器在对第二账户的指纹信息进行身份验证时,就需要先对加密信息进行解密。服务器根据第二第三方公钥对应的第二第三方私钥,将加密的第二账户的指纹信息进行解密,以备在后续的身份验证中使用。根据在步骤S102中接收到的业务数据转移请求携带的第二账户信息,根据第二账户的账户信息获取在服务器中预存的与第二账户对应的样本指纹信息。
在本实施例中,对第二账户的指纹信息进行身份验证的过程,即为将解密后的第二账户的指纹信息,与第二账户对应的预存的样本指纹信息进行匹配的过程。若二者是匹配的,则判定第二账户的指纹信息的身份验证通过,若二者是不匹配的,则判定第二账户的指纹信息是不匹配的。
在一个实施例中,为解决上述提到的传统技术中存在的执行用户的业务数据转移业务(例如移动支付业务)的过程中的安全性不足的技术问题,在一个实施例中,还提出了一种终端上的发起业务数据转移的装置和一种服务器上的在账户之间进行业务数据转移的装置。
具体的,该发起业务数据转移的装置如图4所示,包括:业务数据转移指令接收模块102、指纹信息获取模块104、业务数据转移请求生成模块106、业务数据转移请求上传模块108,其中:
业务数据转移指令接收模块102,用于接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户。
指纹信息获取模块104,用于通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与所述第一账户对应的指纹信息。
业务数据转移请求生成模块106,用于根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求。
业务数据转移请求上传模块108,用于将所述业务数据转移请求上传到服务器,由所述服务器接收所述第一账户对应的终端上传的所述业务数据转移请求,所述业务数据转移请求携带所述第二账户、所述业务数值和所述第一账户的指纹信息,由所述服务器对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,所述服务器通知所述第二账户对应的终端进行确认,接收所述第二账户对应的终端上传的所述第二账户的指纹信息,对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
具体的,该在账户之间进行业务数据转移的装置如图5所示,具体包括:
业务数据转移请求接收模块202,用于接收第一账户对应的终端上传的业务数据转移请求,业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息。
第一身份验证模块204,用于对第一账户的指纹信息进行身份验证,在第一账户的指纹信息验证通过时,通知第二账户对应的终端进行确认。
第二账户的指纹信息接收模块206,用于接收第二账户对应的终端上传的第 二账户的指纹信息。
第二身份验证模块208,用于对第二账户的指纹信息进行身份验证,在第二账户的指纹信息验证通过时,根据业务数值在第一账户和第二账户之间进行业务数据转移。
可选的,第一账户的指纹信息为使用第一第三方公钥加密的指纹信息;第一身份验证模块204还用于:获取与第一第三方公钥对应的第一第三方私钥,使用第一第三方私钥将第一账户的加密的指纹信息进行解密;获取与第一账户对应的预存的样本指纹信息;将解密后的第一账户的指纹信息与第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则第一账户的指纹信息验证通过。
可选的,第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;第二身份验证模块208还用于:获取与第二第三方公钥对应的第二第三方私钥,使用第二第三方私钥将第二账户的加密的指纹信息进行解密;根据第二账户获取预存的与第二账户对应的预存的样本指纹信息;将解密后的第二账户的指纹信息与第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则第二账户的指纹信息验证通过。
可选的,第一身份验证模块204还用于:在第一账户的指纹信息验证不通过时,终止业务数据转移;通知第一账户对应的终端。
可选的,第二身份验证模块208还用于:在第二账户的指纹信息验证不通过时,终止业务数据转移,通知第一账户和第二账户各自对应的终端。
可选的,第一身份验证模块204还用于:将第一账户和业务数值发送给第二账户对应的终端。
进一步地,该装置还包括业务数据转移已完成通知模块210,用于通知第一账户对应的终端和第二账户对应的终端业务数据转移已完成。
实施本发明实施例,将具有如下有益效果:
在上述一种在账户之间进行业务数据转移的方法及装置、和上述一种发起业务数据转移的方法及装置中,在进行业务数据转移如移动支付的过程中,需要服务器对发起方和接收方都对其指纹信息进行身份验证,只有在双方身份验证均通过的情况下,该业务数据转移才能完成。也就是说,一次业务数据转移 需要两次鉴权,从而提高了业务数据转移的安全性。
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。

Claims (16)

  1. 一种在账户之间进行业务数据转移的方法,其特征在于,包括:
    接收第一账户对应的终端上传的业务数据转移请求,所述业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息;
    对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,通知所述第二账户对应的终端进行确认;
    接收所述第二账户对应的终端上传的所述第二账户的指纹信息;
    对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
  2. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于:
    所述第一账户的指纹信息为使用第一第三方公钥加密的指纹信息;
    所述对所述第一账户的指纹信息进行身份验证的步骤还包括:
    获取与所述第一第三方公钥对应的第一第三方私钥,使用所述第一第三方私钥将所述第一账户的加密的指纹信息进行解密;
    获取与所述第一账户对应的预存的样本指纹信息;
    将解密后的所述第一账户的指纹信息与所述第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第一账户的指纹信息验证通过。
  3. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于,
    所述第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;
    所述对所述第二账户的指纹信息进行身份验证的步骤还包括:
    获取与所述第二第三方公钥对应的第二第三方私钥,使用所述第二第三方私钥将所述第二账户的加密的指纹信息进行解密;
    根据所述第二账户获取预存的与第二账户对应的预存的样本指纹信息;
    将解密后的所述第二账户的指纹信息与所述第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第二账户的指纹信息验证通过。
  4. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于,
    所述对所述第一账户的指纹信息进行身份验证的步骤之后还包括:
    若所述第一账户的指纹信息验证不通过,终止所述业务数据转移;
    通知所述第一账户对应的终端。
  5. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于,
    所述对所述第二账户的指纹信息进行身份验证的步骤之后还包括:
    若所述第二账户的指纹信息验证不通过,终止所述业务数据转移;
    通知所述第一账户和所述第二账户各自对应的终端。
  6. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于,所述通知所述第二账户对应的终端进行确认的步骤还包括:
    将所述第一账户和业务数值发送给第二账户对应的终端。
  7. 如权利要求1所述的在账户之间进行业务数据转移的方法,其特征在于,
    所述根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移的步骤之后还包括:
    通知所述第一账户对应的终端和所述第二账户对应的终端所述业务数据转移已完成。
  8. 一种在账户之间进行业务数据转移的装置,其特征在于,包括:
    业务数据转移请求接收模块,用于接收第一账户对应的终端上传的业务数据转移请求,所述业务数据转移请求携带第二账户、业务数值和第一账户的指纹信息;
    第一身份验证模块,用于对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,通知所述第二账户对应的终端进行确认;
    第二账户的指纹信息接收模块,用于接收所述第二账户对应的终端上传的所述第二账户的指纹信息;
    第二身份验证模块,用于对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述 第二账户之间进行业务数据转移。
  9. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在于:
    所述第一账户的指纹信息为使用第一第三方公钥加密的指纹信息;
    所述第一身份验证模块还用于:
    获取与所述第一第三方公钥对应的第一第三方私钥,使用所述第一第三方私钥将所述第一账户的加密的指纹信息进行解密;
    获取与所述第一账户对应的预存的样本指纹信息;
    将解密后的所述第一账户的指纹信息与所述第一账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第一账户的指纹信息验证通过。
  10. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在于,所述第二账户的指纹信息为使用第二第三方公钥加密的指纹信息;
    所述第二身份验证模块还用于:
    获取与所述第二第三方公钥对应的第二第三方私钥,使用所述第二第三方私钥将所述第二账户的加密的指纹信息进行解密;
    根据所述第二账户获取预存的与第二账户对应的预存的样本指纹信息;
    将解密后的所述第二账户的指纹信息与所述第二账户对应的预存的样本指纹信息进行匹配,若匹配成功,则所述第二账户的指纹信息验证通过。
  11. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在于,所述第一身份验证模块还用于:在所述第一账户的指纹信息验证不通过时,终止所述业务数据转移;通知所述第一账户对应的终端。
  12. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在于,所述第二身份验证模块还用于:
    在所述第二账户的指纹信息验证不通过时,终止所述业务数据转移,通知所述第一账户和所述第二账户各自对应的终端。
  13. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在 于,所述第一身份验证模块还用于:将所述第一账户和业务数值发送给第二账户对应的终端。
  14. 如权利要求8所述的在账户之间进行业务数据转移的装置,其特征在于,所述装置还包括业务数据转移已完成通知模块,用于通知所述第一账户对应的终端和所述第二账户对应的终端所述业务数据转移已完成。
  15. 一种发起业务数据转移的方法,其特征在于,包括:
    接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户;
    通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与所述第一账户对应的指纹信息;
    根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求;
    将所述业务数据转移请求上传到服务器,由所述服务器接收所述第一账户对应的终端上传的所述业务数据转移请求,所述业务数据转移请求携带所述第二账户、所述业务数值和所述第一账户的指纹信息,由所述服务器对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,所述服务器通知所述第二账户对应的终端进行确认,接收所述第二账户对应的终端上传的所述第二账户的指纹信息,对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
  16. 一种发起业务数据转移的装置,其特征在于,包括:
    业务数据转移指令接收模块,用于接收输入的业务数据转移指令,获取登录的第一账户,获取所述业务数据转移指令携带的业务数值和第二账户;
    指纹信息获取模块,用于通过指纹传感器检测输入的指纹输入事件,获取所述指纹输入事件对应的与所述第一账户对应的指纹信息;
    业务数据转移请求生成模块,用于根据所述第一账户、所述第二账户、所述业务数值和所述指纹信息生成对应的业务数据转移请求;
    业务数据转移请求上传模块,用于将所述业务数据转移请求上传到服务器,由所述服务器接收所述第一账户对应的终端上传的所述业务数据转移请求,所述业务数据转移请求携带所述第二账户、所述业务数值和所述第一账户的指纹信息,由所述服务器对所述第一账户的指纹信息进行身份验证,在所述第一账户的指纹信息验证通过时,所述服务器通知所述第二账户对应的终端进行确认,接收所述第二账户对应的终端上传的所述第二账户的指纹信息,对所述第二账户的指纹信息进行身份验证,在所述第二账户的指纹信息验证通过时,根据所述业务数值在所述第一账户和所述第二账户之间进行业务数据转移。
PCT/CN2015/088498 2015-07-30 2015-08-30 一种在账户之间进行业务数据转移的方法及装置 WO2017016039A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510459132.5 2015-07-30
CN201510459132.5A CN105550859A (zh) 2015-07-30 2015-07-30 一种在账户之间进行业务数据转移的方法及装置

Publications (1)

Publication Number Publication Date
WO2017016039A1 true WO2017016039A1 (zh) 2017-02-02

Family

ID=55830039

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/088498 WO2017016039A1 (zh) 2015-07-30 2015-08-30 一种在账户之间进行业务数据转移的方法及装置

Country Status (2)

Country Link
CN (1) CN105550859A (zh)
WO (1) WO2017016039A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369250A (zh) * 2020-03-06 2020-07-03 微民保险代理有限公司 基于联盟链的数据处理方法、装置、设备以及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529955A (zh) * 2016-10-19 2017-03-22 上海摩软通讯技术有限公司 一种支付方法及装置
CN108537050B (zh) * 2018-03-20 2021-12-14 中国建设银行股份有限公司 业务数据转移方法和相关装置
CN111626723A (zh) * 2020-06-04 2020-09-04 中国银行股份有限公司 一种账户标识的判断方法和***

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101324950A (zh) * 2008-07-23 2008-12-17 中国建设银行股份有限公司 一种通过手机实现转帐的方法和***
US20120158594A1 (en) * 2008-10-16 2012-06-21 China Unionpay Co., Ltd Transfer method of electronic cash
CN103065243A (zh) * 2011-10-19 2013-04-24 王晓辰 具有收、付双重功能的手机钱包

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986355B (zh) * 2010-10-29 2013-02-13 中国工商银行股份有限公司 一种银行卡交易权限管理方法、***及终端
CN103116844A (zh) * 2013-03-06 2013-05-22 李锦风 一种交易双方互相认证的近场支付方法
US9892413B2 (en) * 2013-09-05 2018-02-13 International Business Machines Corporation Multi factor authentication rule-based intelligent bank cards
CN103942688A (zh) * 2014-04-25 2014-07-23 天地融科技股份有限公司 数据安全交互***
CN103955828A (zh) * 2014-05-13 2014-07-30 陈业军 一种点对点支付***及方法
CN104217332A (zh) * 2014-08-29 2014-12-17 华为技术有限公司 一种支付验证方法、服务器及***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101324950A (zh) * 2008-07-23 2008-12-17 中国建设银行股份有限公司 一种通过手机实现转帐的方法和***
US20120158594A1 (en) * 2008-10-16 2012-06-21 China Unionpay Co., Ltd Transfer method of electronic cash
CN103065243A (zh) * 2011-10-19 2013-04-24 王晓辰 具有收、付双重功能的手机钱包

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369250A (zh) * 2020-03-06 2020-07-03 微民保险代理有限公司 基于联盟链的数据处理方法、装置、设备以及存储介质
CN111369250B (zh) * 2020-03-06 2023-09-05 微民保险代理有限公司 基于联盟链的数据处理方法、装置、设备以及存储介质

Also Published As

Publication number Publication date
CN105550859A (zh) 2016-05-04

Similar Documents

Publication Publication Date Title
US11770369B2 (en) System and method for identity verification across mobile applications
US11855983B1 (en) Biometric electronic signature authenticated key exchange token
CN106664208B (zh) 使用安全传输协议建立信任的***和方法
TWI667585B (zh) 一種基於生物特徵的安全認證方法及裝置
RU2649786C2 (ru) Мобильное платежное устройство на базе технологии биораспознавания, способ и устройство
CN106575326B (zh) 利用非对称加密实施一次性密码的***和方法
JP6648110B2 (ja) クライアントをデバイスに対して認証するシステム及び方法
TWI792320B (zh) 判定認證能力之查詢系統、方法及非暫態機器可讀媒體
US10810585B2 (en) Systems and methods for authenticating users in connection with mobile operations
US20190173873A1 (en) Identity verification document request handling utilizing a user certificate system and user identity document repository
US8527758B2 (en) Systems and methods for facilitating user identity verification over a network
CN106575281B (zh) 用于实施托管的验证服务的***和方法
JP2019508972A (ja) パスワードなしのコンピュータログインのサービス支援モバイルペアリングのためのシステム及び方法
CN113474774A (zh) 用于认可新验证器的***和方法
US11436597B1 (en) Biometrics-based e-signatures for pre-authorization and acceptance transfer
TWM595792U (zh) 跨平台授權存取資源的授權存取系統
WO2017016039A1 (zh) 一种在账户之间进行业务数据转移的方法及装置
US12008568B1 (en) Systems and methods for an authorized identification system
WO2024109551A1 (zh) 数字化支付处理方法、装置、设备、***及介质
US11405387B1 (en) Biometric electronic signature authenticated key exchange token
CN107735788B (zh) 自动供应设备以访问帐户
JP2017535893A (ja) 支払い検証方法、装置及びシステム
KR101625065B1 (ko) 휴대단말기에서의 사용자 인증방법
TWI753102B (zh) 實名認證服務系統及實名認證服務方法
WO2018113508A1 (zh) 基于密文的身份验证方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899391

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899391

Country of ref document: EP

Kind code of ref document: A1