CN105096111A - No-card account transfer or withdrawal protection method and mobile phone system - Google Patents
No-card account transfer or withdrawal protection method and mobile phone system Download PDFInfo
- Publication number
- CN105096111A CN105096111A CN201510548550.1A CN201510548550A CN105096111A CN 105096111 A CN105096111 A CN 105096111A CN 201510548550 A CN201510548550 A CN 201510548550A CN 105096111 A CN105096111 A CN 105096111A
- Authority
- CN
- China
- Prior art keywords
- operating system
- dynamic code
- preset
- self
- atm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
- G06Q20/3255—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/16—Payments settled via telecommunication systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/351—Virtual cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The application discloses a no-card account transfer or withdrawal protection method and a mobile phone system. The no-card account transfer or withdrawal protection method comprises the following steps: after a second operation system receives a short message containing a dynamic code, a first operation system encrypts the dynamic code; then the second operation system judges whether the second operation system is in a preset range of one ATM machine; if the second operation system judges that the second operation system is in the preset range of the ATM machine, the first operation system judges whether a received decoding password is correct; and if the first operation system judges that the received decoding password is matched with a preset password, the first operation system displays the dynamic code in the short message, wherein the preset password is the personal body characteristic of a user. That is, the dynamic code can be obtained through a personal decoding password of the user only when the user is nearby the ATM machine, no-card operation of a bank card of the user by a non-user is avoided, and the property safety of the bank card of the user is ensured.
Description
Technical field
The application relates to electronic technology field, relates to a kind of without blocking the guard method and cell phone system of transferring accounts or withdrawing the money in particular.
Background technology
ATM (the AutomaticTellerMachine of each bank at present, ATM (Automatic Teller Machine)) machine substantially can provide and the business operation such as transfer accounts or withdraw the money without card, need during concrete operations to input the dynamic code in the password of bank card and the note of bank's transmission, because described dynamic code has mobility, and then can ensure without blocking the security of transferring accounts or withdrawing the money.
But in actual applications, described dynamic code is sent out by the mode of note and is checked, there is larger potential safety hazard.Such as, in mobile phone when virus, the information of described dynamic code can be stolen by long-range; Or when hand-set from stolen, the information of described dynamic code can stolen criminal utilize; Again or swindler various means can be utilized to extract dynamic code in user's hand, the property in user's bank card can be caused to occur safety problem.
If but require bank's modification flow process, be very difficult, will change together because relate to a lot of bank finance mechanism.So current transfer accounts or withdraw the money without card in operation, there is larger potential safety hazard to be improved.
Summary of the invention
In view of this, this application provides a kind of without blocking the guard method and cell phone system of transferring accounts or withdrawing the money, in order to solve the safety problem that in prior art, user's bank card exists when carrying out operating without card.
For achieving the above object, the application provides following technical scheme:
Without blocking the guard method of transferring accounts or withdrawing the money, be applied to cell phone system, described cell phone system comprises the first read-only operating system and the second operating system connected to the network; Described nothing is blocked the guard method of transferring accounts or withdrawing the money and is comprised:
Described second operating system receiving package is containing the note of dynamic code;
Described first operating system is encrypted described dynamic code;
Described second operating system judges whether self is in the preset range of certain ATM;
When in the preset range that described second operating system judges self to be in certain ATM, described first operating system judge the clear crytpographic key that receives whether with preset password match;
When described first operating system judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
Preferably, described preset password is: the iris feature of user, fingerprint characteristic or eyeprint feature.
Preferably, described second operating system judges that the step whether self is in the preset range of certain ATM comprises:
The site branch figure of ATM preset in the position of self and described first operating system is compared by global position system GPS by described second operating system, obtains the distance of self and immediate ATM;
Described second operating system judges whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
Preferably, also comprise after the step of the described dynamic code in the described note of display:
Described first operating system judges whether exceed Preset Time for the display of described dynamic code;
When described first operating system judges to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
Preferably, described Preset Time is 2 minutes.
A kind of cell phone system, comprising: the first read-only operating system and the second operating system connected to the network; Wherein:
The dynamic code that described first operating system is used for comprising in the note to described second operating system reception is encrypted;
Described second operating system is for judging whether self is in the preset range of certain ATM, when in the preset range that described second operating system judges self to be in certain ATM, by described first operating system judge the clear crytpographic key that receives whether with preset password match; When described first operating system judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
Preferably, described clear crytpographic key is: iris feature, fingerprint characteristic or eyeprint feature.
Preferably, described second operating system for judge self whether to be in certain ATM preset range in time, specifically for:
By global position system GPS, the site branch figure of ATM preset in the position of self and described first operating system is compared, obtain the distance of self and immediate ATM;
Judge whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
Preferably, described first operating system also for:
After described dynamic code in the described note of display, judge whether the display for described dynamic code exceedes Preset Time;
When judging to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
Preferably, described Preset Time is 2 minutes.
Known via above-mentioned technical scheme, it is a kind of without blocking the guard method of transferring accounts or withdrawing the money that the application openly provides, and after the second operating system receiving package is containing the note of dynamic code, is encrypted described dynamic code by the first operating system; Then judge whether self is in the preset range of certain ATM by described second operating system; When in the preset range that described second operating system judges self to be in certain ATM, judge that whether the clear crytpographic key received is correct by described first operating system; When described first operating system judges described clear crytpographic key and preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.Also namely can only be that the clear crytpographic key just by user obtains described dynamic code when user is near ATM, avoid non-user operating without card for user's bank card, ensure that the property safety in user's bank card.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only the embodiment of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to the accompanying drawing provided.
A kind of process flow diagram without blocking the guard method of transferring accounts or withdrawing the money that Fig. 1 provides for the application;
The process flow diagram of another guard method of transferring accounts without card or withdrawing the money that Fig. 2 provides for another embodiment of the application;
The structural representation of a kind of cell phone system that Fig. 3 provides for another embodiment of the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, be clearly and completely described the technical scheme in the embodiment of the present application, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
This application provides a kind of without blocking the guard method and cell phone system of transferring accounts or withdrawing the money, in order to solve the safety problem that in prior art, user's bank card exists when carrying out operating without card.
Described nothing is blocked the guard method of transferring accounts or withdrawing the money and is applied to cell phone system, and described cell phone system comprises the first read-only operating system and the second operating system connected to the network; The guard method that described nothing card is transferred accounts or withdrawn the money as shown in Figure 1, comprising:
S101, described second operating system receiving package are containing the note of dynamic code;
When user need carry out nothing card transfer accounts or withdraw the money time, bank can send a note, and described note comprises described dynamic code, described dynamic code be used for user carries out without card operate checking.Described second operating system receives described note, described note is stored in the storage area of described second operating system.
S102, described first operating system are encrypted described dynamic code;
Concrete, described first operating system in the storage area of described second operating system, can be encrypted described dynamic code; Or described note can be stored in the storage area of described first operating system by described first operating system, then is encrypted described dynamic code in the storage area of described first operating system.Described first operating system can be determined according to its concrete applied environment the mode that described dynamic code is encrypted, and is not specifically limited, all in the protection domain of the application herein.
S103, described second operating system judge whether self is in the preset range of certain ATM;
Described second operating system belongs to described cell phone system, and described cell phone system is the system in the mobile phone of user, when described second operating system judges self to be in the preset range of certain ATM, illustrates that the mobile phone of user is in the preset range of certain ATM.
S104, when in the preset range that described second operating system judges self to be in certain ATM, described first operating system judge the clear crytpographic key that receives whether with preset password match;
Concrete, described clear crytpographic key can be: the iris feature of user, fingerprint characteristic or eyeprint feature.
S105, when described first operating system judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
Preferably, described preset password is: the iris feature of user, fingerprint characteristic or eyeprint feature.
Described preset password is the physical trait of user, make described dynamic code can only be that user just can obtain, other obtain the people of the note comprising described dynamic code by various illegal means, also cannot obtain described dynamic code, and then cannot steal the property in user's bank card.
It is described without blocking the guard method of transferring accounts or withdrawing the money that the application openly provides; mobile phone is utilized to have the characteristic of dual system; described dynamic code, mobile phone and payment platform (ATM) are formed a closed chain in a short time; the dependence of three to substitute; when only having user's carrying mobile phone to be in the preset range of certain ATM; physical trait just by self obtains described dynamic code; avoid non-user operating without card for user's bank card, ensure that the property safety in user's bank card.
Preferably, step S103 comprises:
The site branch figure of ATM preset in the position of self and described first operating system is compared by global position system GPS by a, described second operating system, obtains the distance of self and immediate ATM;
B, described second operating system judge whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
Be preset with the site branch figure of the ATM of each bank in described first operating system, being compared by global position system GPS in the position of self and described site branch figure by described second operating system, can obtain the distance of self and immediate ATM.
Described predeterminable range can be the parameter preset in mobile phone, also can be that later stage user oneself carries out arranging according to actual conditions, be not specifically limited herein.
Certainly; described second operating system judges that the method whether self is in the preset range of certain ATM is also not limited to above-mentioned steps; can set depending on embody rule environment; just a kind of example herein, other can realize self whether being in determination methods in the preset range of certain ATM also in the protection domain of the application.
Preferably, as shown in Figure 2, also comprise after step S105:
S106, described first operating system judge whether exceed Preset Time for the display of described dynamic code;
S107, when described first operating system judges to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
Generally, the term of validity of described dynamic code is one day.
Preferably, described Preset Time is 2 minutes.
After the display of described dynamic code exceedes Preset Time, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code, checking of user and bank can be provided, the security without card operation can be increased.
Another embodiment of the present invention additionally provides a kind of cell phone system, as shown in Figure 3, comprising: the first read-only operating system 101 and the second operating system 102 connected to the network; Wherein:
First operating system 101 is encrypted for the dynamic code comprised in the note to the second operating system 102 reception;
Second operating system 102 is for judging whether self is in the preset range of certain ATM, when in the preset range that the second operating system 102 judges self to be in certain ATM, by the first operating system 101 judge the clear crytpographic key that receives whether with preset password match; When the first operating system 101 judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
Second operating system 102 is connected to the network, is also responsible for reception and the transmission of communication message.Second operating system 102 may meet with the attack of wooden horse or virus, but the read-only and not interconnection network of the first operating system 101 adopted due to user operation mobile phone, and the information in it can not be stolen by hacker, makes described cell phone system safer.
The described cell phone system that the application openly provides, utilize the characteristic of dual system, described dynamic code, mobile phone and payment platform (ATM) are formed a closed chain in a short time, the dependence of three to substitute, when only having user's carrying mobile phone to be in the preset range of certain ATM, physical trait just by self obtains described dynamic code, avoid non-user operating without card for user's bank card, ensure that the property safety in user's bank card.
Preferably, described clear crytpographic key is: the iris feature of user, fingerprint characteristic or eyeprint feature.
Preferably, the second operating system 102 for judge self whether to be in certain ATM preset range in time, specifically for:
Compared by the site branch figure of global position system GPS by the ATM preset in the position of self and the first operating system 101, obtain the distance of self and immediate ATM;
Judge whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
Preferably, the first operating system 101 also for:
After described dynamic code in the described note of display, judge whether the display for described dynamic code exceedes Preset Time;
When judging to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
Concrete principle of work is same as the previously described embodiments, repeats no more herein.
For aforesaid each embodiment of the method, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the application is not by the restriction of described sequence of movement, because according to the application, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the application is necessary.
In this instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually see.For device disclosed in embodiment, because it corresponds to the method disclosed in Example, so description is fairly simple, relevant part illustrates see method part.
It should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the application.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments.Therefore, the application can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.
Claims (10)
1., without blocking the guard method of transferring accounts or withdrawing the money, it is characterized in that, be applied to cell phone system, described cell phone system comprises the first read-only operating system and the second operating system connected to the network; Described nothing is blocked the guard method of transferring accounts or withdrawing the money and is comprised:
Described second operating system receiving package is containing the note of dynamic code;
Described first operating system is encrypted described dynamic code;
Described second operating system judges whether self is in the preset range of certain ATM;
When in the preset range that described second operating system judges self to be in certain ATM, described first operating system judge the clear crytpographic key that receives whether with preset password match;
When described first operating system judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
2. according to claim 1 without blocking the guard method of transferring accounts or withdrawing the money, it is characterized in that, described preset password is: the iris feature of user, fingerprint characteristic or eyeprint feature.
3. according to claim 1 without blocking the guard method of transferring accounts or withdrawing the money, it is characterized in that, described second operating system judges that the step whether self is in the preset range of certain ATM comprises:
The site branch figure of ATM preset in the position of self and described first operating system is compared by global position system GPS by described second operating system, obtains the distance of self and immediate ATM;
Described second operating system judges whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
4. the guard method of transferring accounts without card or withdrawing the money according to claim 1, is characterized in that, also comprises after the step of the described dynamic code in the described note of display:
Described first operating system judges whether exceed Preset Time for the display of described dynamic code;
When described first operating system judges to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
5. according to claim 1 without blocking the guard method of transferring accounts or withdrawing the money, it is characterized in that, described Preset Time is 2 minutes.
6. a cell phone system, is characterized in that, comprising: the first read-only operating system and the second operating system connected to the network; Wherein:
The dynamic code that described first operating system is used for comprising in the note to described second operating system reception is encrypted;
Described second operating system is for judging whether self is in the preset range of certain ATM, when in the preset range that described second operating system judges self to be in certain ATM, by described first operating system judge the clear crytpographic key that receives whether with preset password match; When described first operating system judges described clear crytpographic key and described preset password match, show the described dynamic code in described note; Described preset password is the physical trait of user.
7. cell phone system according to claim 6, is characterized in that, described clear crytpographic key is: iris feature, fingerprint characteristic or eyeprint feature.
8. cell phone system according to claim 6, is characterized in that, described second operating system for judge self whether to be in certain ATM preset range in time, specifically for:
By global position system GPS, the site branch figure of ATM preset in the position of self and described first operating system is compared, obtain the distance of self and immediate ATM;
Judge whether described distance is less than predeterminable range, if judge, described distance is less than predeterminable range, judges self to be in the preset range of described ATM.
9. cell phone system according to claim 6, is characterized in that, described first operating system also for:
After described dynamic code in the described note of display, judge whether the display for described dynamic code exceedes Preset Time;
When judging to exceed described Preset Time for the display of described dynamic code, encryption is re-started to described dynamic code, until be just decrypted described dynamic code after the term of validity of described dynamic code.
10. cell phone system according to claim 6, is characterized in that, described Preset Time is 2 minutes.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510548550.1A CN105096111A (en) | 2015-08-31 | 2015-08-31 | No-card account transfer or withdrawal protection method and mobile phone system |
PCT/CN2016/084106 WO2017036201A1 (en) | 2015-08-31 | 2016-05-31 | Protection method for cardless account transfer or deposit withdrawal, and mobile phone system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510548550.1A CN105096111A (en) | 2015-08-31 | 2015-08-31 | No-card account transfer or withdrawal protection method and mobile phone system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105096111A true CN105096111A (en) | 2015-11-25 |
Family
ID=54576478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510548550.1A Pending CN105096111A (en) | 2015-08-31 | 2015-08-31 | No-card account transfer or withdrawal protection method and mobile phone system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105096111A (en) |
WO (1) | WO2017036201A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915709A (en) * | 2016-04-14 | 2016-08-31 | 深圳市金立通信设备有限公司 | Communication connection establishing method and terminal |
WO2017036201A1 (en) * | 2015-08-31 | 2017-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Protection method for cardless account transfer or deposit withdrawal, and mobile phone system |
CN106548081A (en) * | 2016-10-28 | 2017-03-29 | 努比亚技术有限公司 | A kind of end message display packing and device |
CN108053220A (en) * | 2018-01-11 | 2018-05-18 | 平安科技(深圳)有限公司 | A kind of guard method, equipment and storage medium withdrawn the money without card |
CN110322235A (en) * | 2019-07-05 | 2019-10-11 | 中国工商银行股份有限公司 | It is a kind of based on mark realize inter-bank without card enchashment processing method and processing device |
TWI696136B (en) * | 2018-03-31 | 2020-06-11 | 華南商業銀行股份有限公司 | System and method for executing transaction based on a mobile communication device |
TWI748415B (en) * | 2018-03-31 | 2021-12-01 | 華南商業銀行股份有限公司 | System and method for executing transaction based on a mobile communication device |
CN115359604A (en) * | 2022-07-04 | 2022-11-18 | 南京银行股份有限公司 | Card-free cash withdrawal system and method based on optical communication technology |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1560801A (en) * | 2004-03-09 | 2005-01-05 | 欧阳世杰 | Disposable cipher protection careless electronic transaction payment method |
CN103077458A (en) * | 2012-09-24 | 2013-05-01 | 安徽杨凌科技有限公司 | ATM (automated teller machine) secure transaction authentication method based on position |
CN104573548A (en) * | 2014-12-22 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption and decryption methods and devices and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9886693B2 (en) * | 2009-03-30 | 2018-02-06 | Yuh-Shen Song | Privacy protected anti identity theft and payment network |
CN105096111A (en) * | 2015-08-31 | 2015-11-25 | 宇龙计算机通信科技(深圳)有限公司 | No-card account transfer or withdrawal protection method and mobile phone system |
-
2015
- 2015-08-31 CN CN201510548550.1A patent/CN105096111A/en active Pending
-
2016
- 2016-05-31 WO PCT/CN2016/084106 patent/WO2017036201A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1560801A (en) * | 2004-03-09 | 2005-01-05 | 欧阳世杰 | Disposable cipher protection careless electronic transaction payment method |
CN103077458A (en) * | 2012-09-24 | 2013-05-01 | 安徽杨凌科技有限公司 | ATM (automated teller machine) secure transaction authentication method based on position |
CN104573548A (en) * | 2014-12-22 | 2015-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption and decryption methods and devices and terminal |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017036201A1 (en) * | 2015-08-31 | 2017-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Protection method for cardless account transfer or deposit withdrawal, and mobile phone system |
CN105915709A (en) * | 2016-04-14 | 2016-08-31 | 深圳市金立通信设备有限公司 | Communication connection establishing method and terminal |
CN106548081A (en) * | 2016-10-28 | 2017-03-29 | 努比亚技术有限公司 | A kind of end message display packing and device |
CN108053220A (en) * | 2018-01-11 | 2018-05-18 | 平安科技(深圳)有限公司 | A kind of guard method, equipment and storage medium withdrawn the money without card |
CN108053220B (en) * | 2018-01-11 | 2019-07-02 | 平安科技(深圳)有限公司 | A kind of guard method, equipment and storage medium withdrawn the money without card |
WO2019136881A1 (en) * | 2018-01-11 | 2019-07-18 | 平安科技(深圳)有限公司 | Protection method and apparatus for cardless withdrawal and storage medium |
TWI696136B (en) * | 2018-03-31 | 2020-06-11 | 華南商業銀行股份有限公司 | System and method for executing transaction based on a mobile communication device |
TWI748415B (en) * | 2018-03-31 | 2021-12-01 | 華南商業銀行股份有限公司 | System and method for executing transaction based on a mobile communication device |
CN110322235A (en) * | 2019-07-05 | 2019-10-11 | 中国工商银行股份有限公司 | It is a kind of based on mark realize inter-bank without card enchashment processing method and processing device |
CN115359604A (en) * | 2022-07-04 | 2022-11-18 | 南京银行股份有限公司 | Card-free cash withdrawal system and method based on optical communication technology |
Also Published As
Publication number | Publication date |
---|---|
WO2017036201A1 (en) | 2017-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105096111A (en) | No-card account transfer or withdrawal protection method and mobile phone system | |
US11405781B2 (en) | System and method for mobile identity protection for online user authentication | |
CN108012268B (en) | SIM card for ensuring safe use of application software on mobile phone terminal | |
CN105741112B (en) | Network-based authentication payment device, authentication payment method and authentication payment system | |
CN102945526B (en) | A kind of device and method for improving mobile equipment on-line safety of payment | |
CN103136668A (en) | Terminal payment method, terminal and payment platform | |
CN103123706A (en) | Management method, device and system of bill payment for another | |
CN104462949B (en) | The call method and device of a kind of plug-in unit | |
CN103971241A (en) | Two-channel payment method and system | |
CN101842792A (en) | Method for protection of a chip card from unauthorized use, chip card and chip card terminal | |
CN101589569A (en) | Secure password distribution to a client device of a network | |
CN202353818U (en) | System for ensuring secure communication between vehicle-mounted communication equipment and wireless terminal | |
CN103914772A (en) | Wireless authentication method, system and device for mobile payment | |
CN103973711A (en) | Verification method and device | |
CN105184567A (en) | Information processing method, processing device and mobile terminal | |
CN104301886A (en) | Short message reading method and system, terminal and wearable device | |
CN104240077B (en) | A kind of coding encrypting device based on short-distance wireless communication technology | |
CN105574720A (en) | Secure information processing method and secure information processing apparatus | |
CN103002430A (en) | Method, device and system for binding terminal applications to terminal numbers | |
CN102473218B (en) | Method for generating an identifier | |
CN105225105A (en) | The method for security protection that NFC pays and system | |
CN104484801A (en) | Net bar safety payment method | |
CN104980913B (en) | Protect the method and terminal device of data information security in terminal device | |
JP6958564B2 (en) | Information processing equipment, computer programs | |
KR20230011801A (en) | User authentication system and transfer system using real-time proof of location based blockchain authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151125 |