WO2019085666A1 - 一种支付乘车费的方法及装置 - Google Patents

一种支付乘车费的方法及装置 Download PDF

Info

Publication number
WO2019085666A1
WO2019085666A1 PCT/CN2018/105951 CN2018105951W WO2019085666A1 WO 2019085666 A1 WO2019085666 A1 WO 2019085666A1 CN 2018105951 W CN2018105951 W CN 2018105951W WO 2019085666 A1 WO2019085666 A1 WO 2019085666A1
Authority
WO
WIPO (PCT)
Prior art keywords
account identifier
server
encrypted data
account
identifier
Prior art date
Application number
PCT/CN2018/105951
Other languages
English (en)
French (fr)
Inventor
张鸿
吴军
孙健康
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to SG11202001581VA priority Critical patent/SG11202001581VA/en
Priority to EP18874460.1A priority patent/EP3657417A4/en
Publication of WO2019085666A1 publication Critical patent/WO2019085666A1/zh
Priority to US16/743,120 priority patent/US11074575B2/en
Priority to PH12020500373A priority patent/PH12020500373A1/en
Priority to US17/359,685 priority patent/US11501282B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Definitions

  • the present specification relates to the field of information technology, and in particular, to a method and apparatus for paying a bus fare.
  • a terminal such as a mobile phone
  • NFC Near Field Communication
  • a terminal that implements a simulated bus card needs to have at least three hardware units: an NFC front-end chip, an NFC antenna, and a security chip.
  • the NFC front-end chip and the NFC antenna are used to implement NFC communication, and the account identification and account balance of the bus card are stored in the security chip in the form of hardware encryption, that is, the function of the security chip is to prevent the account balance from being illegally modified.
  • the user closes the terminal to the receiving device of the public transportation vehicle, and the receiving device establishes an NFC connection with the terminal, and the receiving device has the right to rewrite the account balance stored by the security chip in the terminal through the NFC connection (for example, rewrite the 100 yuan) For 98 yuan), to collect the ride fee.
  • the embodiment of the present specification provides a method and a device for paying a ride fee to solve the problem that the existing method for paying a ride fee is relatively expensive.
  • the user terminal establishes a near field communication NFC connection with the collection device of the public transportation;
  • the receiving device of the public transportation device establishes a near field communication NFC connection with the user terminal;
  • the encrypted data is obtained by encrypting, by the user terminal, an account identifier of the user;
  • the account identifier is sent to the server to cause the server to deduct the ride fee from the account corresponding to the account identifier.
  • the encryption module encrypts the account identifier of the user according to an encryption algorithm pre-agreed with the public transportation system to obtain encrypted data;
  • Transmitting module by using the NFC connection, transmitting the encrypted data to the payment device, so that the payment device decrypts the encrypted data to obtain the account identifier, and sends the account identifier to The server, in turn, causes the server to deduct the ride fee from the account corresponding to the account identifier.
  • Decrypting module decrypting the encrypted data to obtain an account identifier of the user
  • the sending module sends the account identifier to the server, so that the server deducts the fare fee from the account corresponding to the account identifier.
  • An apparatus for paying a bus fare includes one or more processors and a memory, the memory storing a program, and configured to perform the following steps by the one or more processors:
  • a device for charging a bus fare includes one or more processors and a memory, the memory storing a program, and configured to perform the following steps by the one or more processors:
  • the account identifier is sent to the server to cause the server to deduct the ride fee from the account corresponding to the account identifier.
  • the user terminal when the user rides the vehicle, the user terminal establishes a near field communication NFC connection with the collection device of the public transportation, and the user terminal encrypts the user.
  • the account identification is transmitted to the payment device, and the payment device can request the server to deduct the travel fee from the user's account.
  • the user terminal does not need to have a security chip, which saves the hardware cost.
  • the user's account balance is recorded and modified by the server, and the user can still take the public transportation by means of “brushing the mobile phone”.
  • 1 is a schematic diagram of a method of simulating a mobile phone as a bus card to pay a ride fee
  • FIG. 2 is a flow chart of a method for paying a ride fee according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of an apparatus for paying a bus fare provided by an embodiment of the present specification
  • FIG. 4 is a schematic diagram of an apparatus for paying a ride fee according to an embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of a device for paying a travel fee according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of an apparatus for paying a ride fee according to an embodiment of the present disclosure.
  • the current user terminal needs to have a hardware unit such as an NFC front-end chip, an NFC antenna, and a security chip, so that the user can take a public transportation such as a bus or a subway by "brushing the mobile phone".
  • a hardware unit such as an NFC front-end chip, an NFC antenna, and a security chip
  • the user terminal does not store the account balance of the user, but the server maintains the account of the user; on the other hand, the user terminal can utilize the user regardless of whether the user terminal has a security chip.
  • the NFC front-end chip and the NFC antenna provided by the terminal enable the user terminal to establish an NFC connection with the collection device of the public transportation vehicle, and the user terminal transmits the account identifier of the user to the payment device, and then the collection device requests the server to the account. Identify the corresponding account for debit.
  • FIG. 2 is a flow chart of a method for paying a ride fee according to an embodiment of the present disclosure, including the following steps:
  • S200 The user terminal establishes a near field communication NFC connection with the payment device of the public transportation.
  • the user terminal may be a smart device that can be applied to a mobile payment scenario, such as a mobile phone, a tablet computer, or a notebook computer.
  • the collection equipment of public transportation can be a subway gate, a card reader on a bus, etc., and the following is an example of the collection device being a subway gate.
  • the user can close the user terminal to the payment device.
  • the distance between the user terminal and the payment device is not greater than the NFC sensing distance, the user terminal and the payment device can establish an NFC connection.
  • the establishment of the NFC connection does not depend on the Internet or the local area network. Therefore, when both the user terminal and the payment device are offline, the two can still establish an NFC connection.
  • S202 The user terminal encrypts the account identifier of the user according to an encryption algorithm pre-agreed with the public transportation system to obtain encrypted data.
  • S204 The user terminal transmits the encrypted data to the payment device by using the NFC connection.
  • the user terminal may encrypt the user's account identifier and transmit the encrypted data to the payment device through the NFC connection. In this case, even if the encrypted data is intercepted by illegal elements during transmission, the criminal cannot decrypt the user's account identifier.
  • the encryption algorithm used by the user terminal to encrypt the account identifier may be an encryption algorithm applicable only to the user terminal and the collection device of the public transportation device for data transmission.
  • This encryption algorithm can be executed by a payment application installed on the user terminal, and the payment application and the public transportation system (such as the server of the subway company) can pre-agreed the encryption algorithm.
  • the payment device receives the encrypted data transmitted by the user terminal by using the NFC connection.
  • the payment device decrypts the encrypted data to obtain the account identifier.
  • the payment device decrypts the encrypted data to obtain the account identifier. Subsequently, the payment device can send the decrypted account identifier to the server, and the server can debit the account corresponding to the account identifier.
  • the server is a server corresponding to the payment application.
  • the payment device needs to pass when the user enters the station and the user leaves the station (when the user is on the bus, the user can get on and off the vehicle)
  • the NFC connection acquires the encrypted data transmitted by the user terminal.
  • the payment device records according to the decrypted account identifier.
  • the payment device calculates the fare fee according to the decrypted account identifier, and The account identification and the ride fee are sent to the server, and the server can deduct the ride fee from the account corresponding to the account identifier.
  • the receiving device When the subway to be used by the user is a mode of unified charging (assuming that no matter how many miles are taken, the unified charging is 2 yuan), the receiving device only needs to obtain the account identification when the user enters the station, and sends the account identification to the server, and the server The account corresponding to the account ID is deducted from the 2 yuan fare.
  • a user terminal having three hardware units of an NFC front end chip, an NFC antenna, and a security chip is equivalent to a bus card in which an account balance is stored, and the user closes the subway by placing the user terminal
  • the sensing area of the gate is to enter or exit, and the payment device will overwrite the account balance stored in the security chip of the user terminal to complete the deduction.
  • the account balance is not stored in the user terminal, and the payment device does not directly perform the debit operation, and the payment device actually requests the server to debit the user's account.
  • the user's account identifier is obtained by the user registering the account on the server. Therefore, the payment device needs to send the account identifier sent by the user terminal to the server to request the server to deduct the travel fee from the user's account, so that the payment device completes the payment.
  • User A can use the encrypted data obtained by encrypting the account ID of User B to enter the station. That is to say, when the user B enters the station, the user A can intercept the encrypted data transmitted by the user terminal of the user B to the payment device, and then use the encrypted data to enter the station, and the server also deducts the account of the user A.
  • the user terminal may acquire a timestamp corresponding to the current time, encrypt the account identifier of the user and the timestamp, and obtain encrypted data.
  • the payment device decrypts the encrypted data to obtain an account identifier and a timestamp.
  • the payment device can determine whether the time interval from the decrypted timestamp to the current time meets the specified condition, and if so, The account identifier is sent to the server, otherwise, the account identifier is refused to be sent to the server.
  • the specified condition may be a specified duration and may be specified as needed, such as 5 seconds.
  • the receiving device determines that the encrypted data is invalid due to the timeout, and the receiving device can refuse to send the account identifier to the server.
  • the encrypted data is obtained by the user terminal of the user A encrypting the account identifier and the time stamp corresponding to the current time
  • the user B can be prevented from intercepting the encrypted data and then pitted, but the user B can use the intercepted encrypted data.
  • User A enters the station he enters the station at another subway gate.
  • the user terminal may further acquire the device identifier of the payment device, encrypt the account identifier of the user, the timestamp corresponding to the current time, and the device identifier to obtain encrypted data.
  • the user terminal can obtain the device identifier by using an established NFC connection.
  • the payment device decrypts the encrypted data to obtain the account identifier, the time stamp, and the device identifier.
  • the payment device needs to determine whether the time interval from the timestamp obtained by the decryption to the current time meets the specified condition, and whether the device identifier obtained by the decryption is consistent with the device identifier of the device, if two judgment results are obtained. If yes, the account identifier is sent to the server, and if one of the determinations is no, the account identifier is refused to be sent to the server.
  • the user terminal may encrypt the account identifier and the timestamp corresponding to the current time to obtain encrypted data, and may also encrypt the account identifier and the device identifier of the payment device to obtain encrypted data.
  • the payment device when the payment device is in the online state, the payment device can control the portal opening and/or no error reporting while transmitting the account identification to the server, so as to allow the user to enter or board the vehicle.
  • the payment device refuses to send the account identification to the server, it can report an error and/or control the entrance to close to prevent the user from entering or getting on the bus.
  • the payment device When the payment device is offline, if the payment device refuses to send the account identification to the server, the payment device reports an error and/or the control portal is closed to prevent the user from entering or getting on the bus. If the payment device needs to send an account identifier to the service, the payment device may first store the account identifier to be sent, and control the portal to open and/or not report an error to allow the user to enter or board the vehicle. Then, the payment device can send the stored account identification to the server when it is connected to the network.
  • the user terminal does not need to have a security chip, which saves hardware costs.
  • the user's account balance is recorded and modified by the server, and the user can still take public transportation by "brushing the phone".
  • the user can also use the user terminal to approach the subway gate to enter the station and experience "touch payment”.
  • the embodiment of the present specification further provides a device for paying a ride fee, as shown in FIG. 3, including:
  • the encryption module 302 encrypts the account identifier of the user according to an encryption algorithm pre-agreed with the public transportation system to obtain encrypted data.
  • the transmission module 303 by using the NFC connection, transmitting the encrypted data to the payment device, so that the payment device decrypts the encrypted data to obtain the account identifier, and sends the account identifier Giving the server, and then causing the server to deduct the ride fee from the account corresponding to the account identifier.
  • the encryption module 302 obtains a timestamp corresponding to the current time, and encrypts the account identifier of the user and the timestamp to obtain encrypted data.
  • the cryptographic module 302 obtains the device identifier of the payment device through the NFC connection, and encrypts the user identifier and the device identifier to obtain encrypted data.
  • the embodiment of the present specification further provides another device for paying a ride fee, as shown in FIG. 4, including:
  • the receiving module 402 receives the encrypted data transmitted by the user terminal by using the NFC connection;
  • the decryption module 403 decrypts the encrypted data to obtain an account identifier of the user
  • the sending module 404 sends the account identifier to the server, so that the server deducts the fare from the account corresponding to the account identifier.
  • the decrypting module 403 decrypts the encrypted data to obtain the account identifier and a timestamp
  • the sending module 404 determines whether the time interval from the time corresponding to the time stamp to the current time meets the specified condition; if yes, the account identifier is sent to the server; otherwise, the account identifier is refused to be sent to the server.
  • the decrypting module 403 decrypts the encrypted data to obtain the account identifier and the device identifier.
  • the sending module 404 determines whether the decrypted device identifier is consistent with its own device identifier; if yes, the account identifier is sent to the server; otherwise, the account identifier is refused to be sent to the server.
  • the sending module 404 sends the account identifier to the server, and controls the portal to be opened and/or does not report an error; or, refuses to send the account identifier to the server, and reports an error and/or controls the portal to be closed.
  • the embodiment of the present specification further provides a device for paying a travel fee, as shown in FIG. 5, including one or more processors and a memory, and the memory is stored, as shown in FIG. There is a program and is configured to perform the following steps by the one or more processors:
  • the embodiment of the present specification further provides another device for paying a travel fee.
  • the processor includes one or more processors and a memory.
  • a program is stored and configured to perform the following steps by the one or more processors:
  • the account identifier is sent to the server to cause the server to deduct the ride fee from the account corresponding to the account identifier.
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor.
  • computer readable program code eg, software or firmware
  • examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
  • the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
  • Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
  • a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer.
  • the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital character assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device. Or a combination of any of these devices.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), multi-character versatile disc (DVD) or other optical storage
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable read only memory
  • flash memory or other memory technology
  • compact disk read only memory CD-ROM
  • DVD multi-character versatile disc
  • embodiments of the present specification can be provided as a method, system, or computer program product. Accordingly, the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware. Moreover, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the present specification can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Devices For Checking Fares Or Tickets At Control Points (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本说明书实施例公开了一种支付乘车费的方法及装置。当用户乘车时,用户终端与公共交通工具的收款设备建立近场通信NFC连接,用户终端将加密后的用户的账户标识传输给收款设备,收款设备就可以向服务器请求从用户的账户中扣除乘车费。

Description

一种支付乘车费的方法及装置 技术领域
本说明书涉及信息技术领域,尤其涉及一种支付乘车费的方法及装置。
背景技术
目前,利用终端(如手机)的近场通信(Near Field Communication,NFC)功能,将手机等终端模拟成公交卡,以通过“刷手机”的方式乘坐公共交通工具的方法已经出现,如图1所示。
一般的,实现模拟公交卡的终端至少需要具备以下三个硬件单元:NFC前端芯片、NFC天线、安全芯片。其中,NFC前端芯片和NFC天线用于实现NFC通信,公交卡的账户标识和账户余额以硬件加密的形式存储于安全芯片中,也就是说,安全芯片的作用是防止账户余额被非法修改。
使用时,用户将终端贴近公共交通工具的收款设备,收款设备就会与终端建立NFC连接,收款设备有权限通过NFC连接改写终端中的安全芯片存储的账户余额(例如将100元改写为98元),以收取乘车费。
基于现有技术,需要一种成本更低的支付乘车费的方法。
发明内容
本说明书实施例提供一种支付乘车费的方法及装置,以解决现有的支付乘车费的方法成本较高的问题。
为解决上述技术问题,本说明书实施例是这样实现的:
本说明书实施例提供的一种支付乘车费的方法,包括:
用户终端与公共交通工具的收款设备建立近场通信NFC连接;
根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书实施例提供的一种支付乘车费的方法,包括:
公共交通工具的收款设备与用户终端建立近场通信NFC连接;
通过所述NFC连接,接收所述用户终端传输的加密数据;所述加密数据是所述用户终端对用户的账户标识进行加密得到的;
对所述加密数据进行解密,得到用户的账户标识;
将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书实施例提供的一种支付乘车费的装置,包括:
建立模块,与公共交通工具的收款设备建立近场通信NFC连接;
加密模块,根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
传输模块,通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书实施例提供的一种支付乘车费的装置,包括:
建立模块,与用户终端建立近场通信NFC连接;
接收模块,通过所述NFC连接,接收所述用户终端传输的加密数据;
解密模块,对所述加密数据进行解密,得到用户的账户标识;
发送模块,将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书实施例提供的一种支付乘车费的设备,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处 理器执行以下步骤:
与公共交通工具的收款设备建立近场通信NFC连接;
根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书实施例提供的一种收取乘车费的设备,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处理器执行以下步骤:
与用户终端建立近场通信NFC连接;
通过所述NFC连接,接收所述用户终端传输的加密数据;
对所述加密数据进行解密,得到用户的账户标识;
将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
由以上本说明书实施例提供的技术方案可见,在本说明书实施例中,当用户乘车时,用户终端与公共交通工具的收款设备建立近场通信NFC连接,用户终端将加密后的用户的账户标识传输给收款设备,收款设备就可以向服务器请求从用户的账户中扣除乘车费。通过本说明书实施例,用户终端无须具备安全芯片,这节省了硬件成本,同时,用户的账户余额由服务器进行记录和修改,用户依然可以通过“刷手机”的方式乘坐公共交通工具。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是将手机模拟成公交卡支付乘车费的方法示意图;
图2是本说明书实施例提供的一种支付乘车费的方法流程图;
图3是本说明书实施例提供的一种支付乘车费的装置示意图;
图4是本说明书实施例提供的一种支付乘车费的装置示意图;
图5是本说明书实施例提供的一种支付乘车费的设备示意图;
图6是本说明书实施例提供的一种支付乘车费的设备示意图。
具体实施方式
如背景技术所述,目前的用户终端需要具备NFC前端芯片、NFC天线以及安全芯片等硬件单元,用户才能通过“刷手机”的方式乘坐公共汽车、地铁等公共交通工具。
但是,以用户终端是手机为例,一方面,要求手机具备安全芯片会导致手机的硬件成本过高;另一方面,市面上依然存在很多不具备安全芯片的手机,这些手机的用户无法享受“刷手机”乘坐公共交通工具的便利。
为此,在本说明书实施例中,一方面,用户终端不会存储用户的账户余额,而是由服务器对用户的账户进行维护;另一方面,不论用户终端是否具备安全芯片,都可以利用用户终端具备的NFC前端芯片和NFC天线,使用户终端与公共交通工具的收款设备建立NFC连接,由用户终端将用户的账户标识传输给收款设备,再由收款设备请求服务器对所述账户标识对应的账户进行扣款。
为了描述的方便,下文以公共交通工具是地铁为例展开说明。
为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。通过本说明书实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。
以下结合附图,详细说明本说明书各实施例提供的技术方案。
图2是本说明书实施例提供的支付乘车费的方法流程图,包括以下步骤:
S200:用户终端与公共交通工具的收款设备建立近场通信NFC连接。
在本说明书实施例中,用户终端可以是手机、平板电脑、笔记本电脑等能够应用于移动支付场景的智能设备。而公共交通工具的收款设备可以是地铁闸机、公共汽车上的刷卡器等,下文以收款设备是地铁闸机为例说明。
在本步骤中,用户可以将用户终端贴近收款设备,当用户终端和收款设备的距离不大于NFC感应距离时,用户终端和收款设备方可建立NFC连接。
需要说明的是,NFC连接的建立并不依赖于互联网或局域网,因此,用户终端和收款设备均离线时,二者依然可以建立NFC连接。
S202:用户终端根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据。
S204:用户终端通过所述NFC连接,将所述加密数据传输给所述收款设备。
在本说明书实施例中,为了防止用户的账户标识在传输过程中被不法分子截获,用户终端可以对用户的账户标识进行加密,通过NFC连接将加密数据传输给收款设备。这样的话,哪怕加密数据在传输过程中被不法分 子截获,不法分子也无法解密得到用户的账户标识。
需要说明的是,在步骤S102中,用户终端对账户标识进行加密所使用的加密算法,可以是仅适用于用户终端与公共交通工具的收款设备进行数据传输的加密算法。此加密算法可以由用户终端上安装的支付应用执行,支付应用和公共交通***(如地铁公司的服务器)可以预先对加密算法进行约定。
S206:收款设备通过所述NFC连接,接收所述用户终端传输的加密数据。
S208:收款设备对所述加密数据进行解密,得到所述账户标识。
S210:将所述账户标识发送给服务器,进行扣款。
在本说明书实施例中,收款设备对加密数据进行解密后,方可获取账户标识。随后,收款设备可以将解密得到的账户标识发送给服务器,服务器就可以从账户标识对应的账户中进行扣款。
其中,当用户终端上安装有支付应用,且由支付应用执行对账户标识的加密时,所述服务器是所述支付应用对应的服务器。
此外,当用户要乘坐的地铁是分段计费的模式时,收款设备在用户进站和用户出站(用户乘坐公共汽车时,可以是用户上车和下车时)时,都需要通过NFC连接获取用户终端传输的加密数据,在用户进站时,收款设备根据解密得到的账户标识进行记录,当用户出站时,收款设备根据解密得到的账户标识计算乘车费,并将账户标识和乘车费一并发送给服务器,服务器方可从账户标识对应的账户中扣除乘车费。
当用户要乘坐的地铁是统一计费(假设不论乘坐多少里程,统一计费2元)的模式时,收款设备仅需在用户进站时获得账户标识,将账户标识发送给服务器,服务器从账户标识对应的账户中扣除2元乘车费。
在现有的支付乘车费的方法中,具有NFC前端芯片、NFC天线、安全芯片这三个硬件单元的用户终端相当于一张公交卡,其中存储有账户余额,用户通过将用户终端贴近地铁闸机的感应区,以进站或出站,收款设备会 改写用户终端的安全芯片中存储的账户余额,以完成扣款。
而在本说明书实施例中,用户终端中并未存储账户余额,收款设备也并不会直接执行扣款操作,收款设备实际上是请求服务器从用户的账户中进行扣款。其中,用户的账户标识是用户在服务器上注册账户而获得的。因此,收款设备需要将用户终端发送的账户标识发送给服务器,以请求服务器从用户的账户中扣除乘车费,如此一来,收款设备就完成了收款。
此外,理论上用户A可以使用对用户B的账户标识进行加密得到的加密数据进站。也就是说,当用户B进站时,用户A可以截获用户B的用户终端传输给收款设备的加密数据,随后使用该加密数据进站,服务器也会对用户A的账户扣款。
为了防止这种情形发生,在步骤S202中,用户终端可以获取当前时间对应的时间戳,对用户的账户标识和所述时间戳进行加密,得到加密数据。在步骤S208中,收款设备对加密数据进行解密得到账户标识和时间戳,在步骤S210中,收款设备可以判断解密得到的时间戳到当前时间的时间间隔是否满足指定条件,若是,则将所述账户标识发送给服务器,否则,则拒绝将所述账户标识发送给服务器。所述指定条件可以是指定时长,可以根据需要指定,如5秒。
这样的话,用户B即便截获加密数据,随后使用加密数据进站,收款设备也会判断出该加密数据因超时而无效,收款设备可以拒绝将所述账户标识发送给服务器。
此外,虽然当加密数据是用户A的用户终端对账户标识和当前时间对应的时间戳加密得到的时,可以防止用户B截获加密数据随后进站,但是,用户B却可以使用截获的加密数据,在用户A进站的同一时间,于另一个地铁闸机处进站。
因此,进一步地,在步骤S202中,用户终端还可以获取所述收款设备的设备标识,对用户的账户标识、当前时间对应的时间戳和所述设备标识进行加密,得到加密数据。其中,用户终端可以通过建立的NFC连接获取 所述设备标识。在步骤S208中,收款设备对所述加密数据进行解密,得到所述账户标识、时间戳和所述设备标识。在步骤S210中,收款设备既需要判断解密得到的时间戳到当前时间的时间间隔是否满足指定条件,也需要判断解密得到的所述设备标识与自身的设备标识是否一致,若两个判断结果都为是,则将所述账户标识发送给服务器,若有一个判断结果为否,则拒绝将所述账户标识发送给服务器。
如此一来,用户B即便截获到用户A的加密数据,并在用户A进站的同时,于另一个地铁闸机处进站(或上另一辆公共汽车),另一个地铁闸机也会判断出解密加密数据得到的设备标识并不是自身的设备标识,因而拒绝将所述账户标识发送给服务器。
当然,上述采用时间戳和采用设备标识的技术手段可以分开使用。也即,用户终端可以对账户标识和当前时间对应的时间戳进行加密得到加密数据,也可以对账户标识和收款设备的设备标识进行加密得到加密数据。
此外,在本说明书实施例中,当收款设备是在线状态时,收款设备将账户标识发送给服务器的同时,可以控制入口开启和/或者不报错,以允许用户进站或上车。收款设备拒绝将账户标识发送给服务器的同时,可以报错和/或控制入口关闭,以阻止用户进站或上车。
当收款设备是离线状态时,若收款设备拒绝将账户标识发送给服务器,则收款设备报错和/或控制入口关闭,以阻止用户进站或上车即可。若收款设备需要向服务发送账户标识,则收款设备可以先存储待发送的账户标识,同时控制入口开启和/或者不报错,以允许用户进站或上车。然后,收款设备可以待连接到网络时,再向服务器发送存储的账户标识。
通过图2所示的方法,用户终端无须具备安全芯片,这节省了硬件成本,同时,用户的账户余额由服务器进行记录和修改,用户依然可以通过“刷手机”的方式乘坐公共交通工具。哪怕用户的用户终端不具有安全芯片,用户也同样可以使用用户终端贴近地铁闸机来进站,体验“触碰支付”。
基于图2所示的支付乘车费的方法,本说明书实施例还对应提供了一 种支付乘车费的装置,如图3所示,包括:
建立模块301,与公共交通工具的收款设备建立近场通信NFC连接;
加密模块302,根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
传输模块303,通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
所述加密模块302,获取当前时间对应的时间戳;对用户的账户标识和所述时间戳进行加密,得到加密数据。
所述加密模块302,通过所述NFC连接,获取所述收款设备的设备标识;对用户的账户标识和所述设备标识进行加密,得到加密数据。
基于图2所示的支付乘车费的方法,本说明书实施例还对应提供了另一种支付乘车费的装置,如图4所示,包括:
建立模块401,与用户终端建立近场通信NFC连接;
接收模块402,通过所述NFC连接,接收所述用户终端传输的加密数据;
解密模块403,对所述加密数据进行解密,得到用户的账户标识;
发送模块404,将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
所述解密模块403,对所述加密数据进行解密,得到所述账户标识和时间戳;
所述发送模块404,判断所述时间戳对应的时间到当前时间的时间间隔是否满足指定条件;若是,则将所述账户标识发送给服务器;否则,则拒绝将所述账户标识发送给服务器。
所述解密模块403,对所述加密数据进行解密,得到所述账户标识和设备标识;
所述发送模块404,判断解密得到的所述设备标识与自身的设备标识是否一致;若是,则将所述账户标识发送给服务器;否则,则拒绝将所述账户标识发送给服务器。
所述发送模块404,将所述账户标识发送给服务器,并控制入口开启和/或不报错;或,拒绝将所述账户标识发送给服务器,并报错和/或控制入口关闭。
基于图2所示的支付乘车费的方法,本说明书实施例还对应提供了一种支付乘车费的设备,如图5所示,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处理器执行以下步骤:
与公共交通工具的收款设备建立近场通信NFC连接;
根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
基于图2所示的支付乘车费的方法,本说明书实施例还对应提供了另一种支付乘车费的设备,如图6所示,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处理器执行以下步骤:
与用户终端建立近场通信NFC连接;
通过所述NFC连接,接收所述用户终端传输的加密数据;
对所述加密数据进行解密,得到用户的账户标识;
将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相 同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于图5和图6所示的设备而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字符***“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的***、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字符助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本发明的实施例可提供为方法、***、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的 形式。
本发明是参照根据本发明实施例的方法、设备(***)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器 (DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字符多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本说明书的实施例可提供为方法、***或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的 权利要求范围之内。

Claims (16)

  1. 一种支付乘车费的方法,包括:
    用户终端与公共交通工具的收款设备建立近场通信NFC连接;
    根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
    通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
  2. 根据权利要求1所述的方法,对用户的账户标识进行加密,得到加密数据,具体包括:
    获取当前时间对应的时间戳;
    对用户的账户标识和所述时间戳进行加密,得到加密数据。
  3. 根据权利要求1所述的方法,对用户的账户标识进行加密,得到加密数据,具体包括:
    通过所述NFC连接,获取所述收款设备的设备标识;
    对用户的账户标识和所述设备标识进行加密,得到加密数据。
  4. 一种支付乘车费的方法,包括:
    公共交通工具的收款设备与用户终端建立近场通信NFC连接;
    通过所述NFC连接,接收所述用户终端传输的加密数据;
    对所述加密数据进行解密,得到用户的账户标识;
    将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
  5. 根据权利要求4所述的方法,对所述加密数据进行解密,得到所述账户标识,具体包括:
    对所述加密数据进行解密,得到所述账户标识和时间戳;
    将所述账户标识发送给服务器,具体包括:
    判断所述时间戳对应的时间到当前时间的时间间隔是否满足指定条件;
    若是,则将所述账户标识发送给服务器;
    否则,则拒绝将所述账户标识发送给服务器。
  6. 根据权利要求4所述的方法,对所述加密数据进行解密,得到所述账户标识,具体包括:
    对所述加密数据进行解密,得到所述账户标识和设备标识;
    将所述账户标识发送给服务器,具体包括:
    判断解密得到的所述设备标识与自身的设备标识是否一致;
    若是,则将所述账户标识发送给服务器;
    否则,则拒绝将所述账户标识发送给服务器。
  7. 根据权利要求5或6所述的方法,将所述账户标识发送给服务器,具体包括:
    将所述账户标识发送给服务器,并控制入口开启和/或不报错;
    拒绝将所述账户标识发送给服务器,具体包括:
    拒绝将所述账户标识发送给服务器,并报错和/或控制入口关闭。
  8. 一种支付乘车费的装置,包括:
    建立模块,与公共交通工具的收款设备建立近场通信NFC连接;
    加密模块,根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
    传输模块,通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
  9. 根据权利要求8所述的装置,所述加密模块,获取当前时间对应的时间戳;对用户的账户标识和所述时间戳进行加密,得到加密数据。
  10. 根据权利要求8所述的装置,所述加密模块,通过所述NFC连接,获取所述收款设备的设备标识;对用户的账户标识和所述设备标识进行加密,得到加密数据。
  11. 一种支付乘车费的装置,包括:
    建立模块,与用户终端建立近场通信NFC连接;
    接收模块,通过所述NFC连接,接收所述用户终端传输的加密数据;
    解密模块,对所述加密数据进行解密,得到用户的账户标识;
    发送模块,将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
  12. 根据权利要求11所述的装置,所述解密模块,对所述加密数据进行解密,得到所述账户标识和时间戳;
    所述发送模块,判断所述时间戳对应的时间到当前时间的时间间隔是否满足指定条件;若是,则将所述账户标识发送给服务器;否则,则拒绝将所述账户标识发送给服务器。
  13. 根据权利要求11所述的装置,所述解密模块,对所述加密数据进行解密,得到所述账户标识和设备标识;
    所述发送模块,判断解密得到的所述设备标识与自身的设备标识是否一致;若是,则将所述账户标识发送给服务器;否则,则拒绝将所述账户标识发送给服务器。
  14. 根据权利要求12或13所述的装置,所述发送模块,将所述账户标识发送给服务器,并控制入口开启和/或不报错;或,拒绝将所述账户标识发送给服务器,并报错和/或控制入口关闭。
  15. 一种支付乘车费的设备,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处理器执行以下步骤:
    与公共交通工具的收款设备建立近场通信NFC连接;
    根据与公共交通***预先约定的加密算法,对用户的账户标识进行加密,得到加密数据;
    通过所述NFC连接,将所述加密数据传输给所述收款设备,以使所述收款设备对所述加密数据进行解密得到所述账户标识,并将所述账户标识发送给服务器,进而使所述服务器从所述账户标识对应的账户中扣除乘车费。
  16. 一种收取乘车费的设备,包括一个或多个处理器及存储器,所述存储器存储有程序,并且被配置成由所述一个或多个处理器执行以下步骤:
    与用户终端建立近场通信NFC连接;
    通过所述NFC连接,接收所述用户终端传输的加密数据;
    对所述加密数据进行解密,得到用户的账户标识;
    将所述账户标识发送给服务器,以使所述服务器从所述账户标识对应的账户中扣除乘车费。
PCT/CN2018/105951 2017-10-31 2018-09-17 一种支付乘车费的方法及装置 WO2019085666A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SG11202001581VA SG11202001581VA (en) 2017-10-31 2018-09-17 Method and apparatus for paying fare
EP18874460.1A EP3657417A4 (en) 2017-10-31 2018-09-17 METHOD AND DEVICE FOR PAYING A TICKET PRICE
US16/743,120 US11074575B2 (en) 2017-10-31 2020-01-15 Method and apparatus for paying fare
PH12020500373A PH12020500373A1 (en) 2017-10-31 2020-02-24 Method and apparatus for paying fare
US17/359,685 US11501282B2 (en) 2017-10-31 2021-06-28 Method and apparatus for paying fare

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711054359.7 2017-10-31
CN201711054359.7A CN107944857A (zh) 2017-10-31 2017-10-31 一种支付乘车费的方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/743,120 Continuation US11074575B2 (en) 2017-10-31 2020-01-15 Method and apparatus for paying fare

Publications (1)

Publication Number Publication Date
WO2019085666A1 true WO2019085666A1 (zh) 2019-05-09

Family

ID=61933055

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/105951 WO2019085666A1 (zh) 2017-10-31 2018-09-17 一种支付乘车费的方法及装置

Country Status (7)

Country Link
US (2) US11074575B2 (zh)
EP (1) EP3657417A4 (zh)
CN (1) CN107944857A (zh)
PH (1) PH12020500373A1 (zh)
SG (1) SG11202001581VA (zh)
TW (1) TWI773818B (zh)
WO (1) WO2019085666A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944857A (zh) * 2017-10-31 2018-04-20 阿里巴巴集团控股有限公司 一种支付乘车费的方法及装置
CN109285001A (zh) 2018-08-31 2019-01-29 阿里巴巴集团控股有限公司 可支付交通费用的设备、组合设备、***及方法
WO2020223932A1 (zh) * 2019-05-08 2020-11-12 深圳市欢太科技有限公司 离线支付方法、装置、电子设备及存储介质
CN113807959A (zh) * 2021-01-28 2021-12-17 刘高峰 一种防止数字资产近距离重复转移的方法及终端
CN115497177A (zh) * 2021-06-17 2022-12-20 深圳怡化电脑科技有限公司 公交付费方法、装置、电子设备、以及机器可读介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797476A (zh) * 2004-12-27 2006-07-05 中兴通讯股份有限公司 支付乘车费的通讯***及支付乘车费的方法
CN105512886A (zh) * 2015-12-04 2016-04-20 成都中联信通科技股份有限公司 一种基于nfc技术的金融ic卡在线支付方法
CN107944857A (zh) * 2017-10-31 2018-04-20 阿里巴巴集团控股有限公司 一种支付乘车费的方法及装置

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7527208B2 (en) * 2006-12-04 2009-05-05 Visa U.S.A. Inc. Bank issued contactless payment card used in transit fare collection
US8118223B2 (en) * 2006-09-28 2012-02-21 Visa U.S.A. Inc. Smart sign mobile transit fare payment
US8256666B2 (en) 2007-01-30 2012-09-04 Phil Dixon Processing transactions of different payment devices of the same issuer account
US20090119170A1 (en) * 2007-10-25 2009-05-07 Ayman Hammad Portable consumer device including data bearing medium including risk based benefits
US8307410B2 (en) * 2008-08-12 2012-11-06 Mastercard International Incorporated Systems, methods, and computer readable media for providing for secure offline data transfer between wireless smart devices
US9098843B2 (en) 2010-01-06 2015-08-04 Visa International Service Association System and method for temporarily enabling proprietary transit payments on a hotel room key
KR101765655B1 (ko) 2010-10-25 2017-08-24 삼성전자주식회사 휴대 단말기를 이용한 대중교통 요금 결제 방법 및 시스템
US10375573B2 (en) 2015-08-17 2019-08-06 Bytemark, Inc. Short range wireless translation methods and systems for hands-free fare validation
FR2972830B1 (fr) 2011-03-15 2014-01-10 Affiliated Computer Services Solutions France Systeme de controle de validation de titres de transport
US9704153B2 (en) * 2013-01-14 2017-07-11 Conduent Business Services, Llc System and method for enabling transactions on an associated network
WO2014124300A1 (en) * 2013-02-07 2014-08-14 Schlage Lock Company Llc A system and method for nfc peer-to-peer authentication and secure data transfer
CN103337022A (zh) 2013-06-05 2013-10-02 袁义青 一种公共交通电子***
KR101536580B1 (ko) 2013-08-27 2015-07-15 삼성에스디에스 주식회사 요금 지불 방법 및 그 장치
CN103533178A (zh) * 2013-10-28 2014-01-22 陕西高新实业有限公司 Nfc手机***
EP2950229B1 (en) * 2014-05-28 2018-09-12 Nxp B.V. Method for facilitating transactions, computer program product and mobile device
CN104021469A (zh) 2014-06-13 2014-09-03 捷德(中国)信息科技有限公司 进行支付交易的方法、设备以及***
US20160019726A1 (en) 2014-07-16 2016-01-21 Spx Corporation Fare collecting apparatus and method having wireless communication ability
US20160019727A1 (en) 2014-07-16 2016-01-21 Spx Corporation Transit Authority Fare Administration and Management System
US9426130B2 (en) * 2014-07-21 2016-08-23 Xiaomi Inc. Methods, devices and systems for anti-counterfeiting authentication
CA2956975A1 (en) 2014-08-11 2016-02-18 Cubic Corporation Smart ticketing in fare collection systems
US10009745B2 (en) * 2014-08-25 2018-06-26 Accenture Global Services Limited Validation in secure short-distance-based communication and enforcement system according to visual objects
CN104363199B (zh) * 2014-09-30 2017-10-27 熊文俊 基于时间同步码的安全认证方法及时间同步码模块
US10282919B2 (en) 2014-10-30 2019-05-07 Lg Cns Co., Ltd. System and method of paying fare of mobile vehicle
US9585079B2 (en) 2014-11-17 2017-02-28 Paypal, Inc. Wireless beacon devices for use in managing transportation service terminals
CN105989467A (zh) 2015-02-03 2016-10-05 阿里巴巴集团控股有限公司 无线支付方法与装置及交通工具乘坐费检验方法与***
FR3037754B1 (fr) * 2015-06-22 2017-07-28 Orange Gestion securisee de jetons electroniques dans un telephone mobile
EP3109818A1 (en) * 2015-06-25 2016-12-28 Mastercard International Incorporated Methods, devices, and systems for automatically detecting, tracking, and validating transit journeys
US20180211188A1 (en) 2015-08-17 2018-07-26 Bytemark, Inc. Methods and systems for hands-free fare validation and gateless transit
CN105096109A (zh) * 2015-08-31 2015-11-25 盛世铸成科技(天津)有限公司 一种乘车支付方法及***
US9330383B1 (en) * 2015-09-23 2016-05-03 Square, Inc. Message dispatcher for payment system
KR20170067179A (ko) 2015-12-07 2017-06-16 엔에이치엔엔터테인먼트 주식회사 콜택시 서비스 시스템 및 이를 이용한 콜택시 서비스 방법
KR101907958B1 (ko) * 2015-12-31 2018-10-16 한국전자통신연구원 출입 통제 방법 및 장치, 사용자 단말, 서버
CN108702294B (zh) * 2016-02-12 2022-04-05 维萨国际服务协会 采用位置匹配的认证***和方法
KR102586443B1 (ko) * 2016-03-24 2023-10-11 삼성전자주식회사 전자 결제 기능을 제공하는 전자 장치 및 그 동작 방법
WO2017216626A1 (en) 2016-06-15 2017-12-21 Manjalink Pte Ltd Systems and methods for providing interactions between users and transportation service providers in an integrated public and/or private transportation service platform
CN106251143B (zh) 2016-07-26 2019-08-20 中国地质大学(武汉) 一种基于nfc识别的安全验证方法及装置
CN106846506B (zh) 2017-01-25 2021-08-10 腾讯科技(深圳)有限公司 一种基于信息标识码进行信息验证的方法及***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1797476A (zh) * 2004-12-27 2006-07-05 中兴通讯股份有限公司 支付乘车费的通讯***及支付乘车费的方法
CN105512886A (zh) * 2015-12-04 2016-04-20 成都中联信通科技股份有限公司 一种基于nfc技术的金融ic卡在线支付方法
CN107944857A (zh) * 2017-10-31 2018-04-20 阿里巴巴集团控股有限公司 一种支付乘车费的方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3657417A4 *

Also Published As

Publication number Publication date
EP3657417A1 (en) 2020-05-27
TWI773818B (zh) 2022-08-11
US20200151704A1 (en) 2020-05-14
SG11202001581VA (en) 2020-03-30
TW201923672A (zh) 2019-06-16
EP3657417A4 (en) 2020-07-29
PH12020500373A1 (en) 2020-12-07
US11074575B2 (en) 2021-07-27
US20210342814A1 (en) 2021-11-04
CN107944857A (zh) 2018-04-20
US11501282B2 (en) 2022-11-15

Similar Documents

Publication Publication Date Title
WO2019085666A1 (zh) 一种支付乘车费的方法及装置
TWI723261B (zh) 資料儲存方法、資料查詢方法及裝置
RU2727098C1 (ru) Способ и устройство установки ключей и отправки данных
US20220207178A1 (en) Privacy enforcement via localized personalization
JP2022524362A (ja) Nfcを介してデータをクリップボードにコピーするためのタップ
KR20190115066A (ko) 블록체인-기반 트랜잭션 처리 방법 및 장치
TWI727212B (zh) Nfc可攜式設備的寫入、支付方法、裝置以及設備
TWI697854B (zh) 支付乘車費的方法、裝置及設備
TWI681313B (zh) 驗證身分的方法和系統、智能穿戴設備
US10475024B1 (en) Secure smart card transactions
WO2021179744A1 (zh) 扫码支付、信息发送和密钥管理方法、装置和设备
WO2021204067A1 (zh) 可验证声明的转发、获取
WO2020108145A1 (zh) 一种报警方法、装置及***
WO2019165875A1 (zh) 一种交易处理方法、服务器、客户端及***
CN111325558A (zh) 一种刷脸支付方法、装置和设备
JP2023524393A (ja) インテリジェントカードのロック解除
CN109191122B (zh) 一种获取交易信息凭证的方法及装置
CN113792346B (zh) 一种可信数据处理方法、装置及设备
WO2023155641A1 (zh) 数据的处理
US20180352042A1 (en) Providing Device Information to Third Party Without Identifying the Device
WO2020019985A1 (zh) 支付处理方法、装置、服务器及设备
WO2024152798A1 (zh) 一种数据风险评估的方法、装置、存储介质及电子设备
CN117094014A (zh) 一种业务处理方法、装置、存储介质及电子设备
CN114626944A (zh) 一种业务处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18874460

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018874460

Country of ref document: EP

Effective date: 20200218

NENP Non-entry into the national phase

Ref country code: DE