WO2014161466A1 - 安全性信息交互系统、设备及方法 - Google Patents

安全性信息交互系统、设备及方法 Download PDF

Info

Publication number
WO2014161466A1
WO2014161466A1 PCT/CN2014/074508 CN2014074508W WO2014161466A1 WO 2014161466 A1 WO2014161466 A1 WO 2014161466A1 CN 2014074508 W CN2014074508 W CN 2014074508W WO 2014161466 A1 WO2014161466 A1 WO 2014161466A1
Authority
WO
WIPO (PCT)
Prior art keywords
security information
information interaction
security
auxiliary
resources
Prior art date
Application number
PCT/CN2014/074508
Other languages
English (en)
French (fr)
Inventor
胡莹
王丰
肖波
嵇文俊
孟宏文
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2014161466A1 publication Critical patent/WO2014161466A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/387Payment using discounts or coupons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates

Definitions

  • the present invention relates to an information interaction system, device and method, and more particularly to security information interaction Systems, equipment and methods.
  • auxiliary resources associated with information interaction Relevant parties (such as merchants) use security information to interact with terminals (for example POS machine) completes this specific security information interaction (such as payment transaction) online;
  • the related parties additionally use auxiliary resources (such as coupons) in paper form or electronic form to complete
  • the specific security information is associated with an auxiliary operation (eg, implementation of a coupon).
  • a security information interaction system, device, and method for auxiliary resources associated with information interaction are provided.
  • the present invention proposes to be able to perform in real time and / Or automatically interact with security information for auxiliary resources associated with specific security information interactions Systems, equipment and methods.
  • a security information interaction system includes:
  • the security information interaction terminal is based on a security letter from a user Interactive instructions and complete security through data interaction with external security carriers and data processing servers Information interaction process, and automatically executed with the security after the security information interaction process is completed The operation associated with the holistic information interaction process;
  • a data processing server interacting with the terminal by using the security information
  • the data interaction completes the security information interaction process and the interaction with the security information Process-associated operations.
  • the association with the security information interaction process The operations include operations on one or more auxiliary resources.
  • the security information interaction terminal is executed at startup An initialization operation, the initial operation including: constructing a login request based on input from a user and Transmitting a login request to the data processing server; receiving a response from the data processing server Resulting to complete the login process, wherein the response result includes configuration parameters and available auxiliary resources list of.
  • the data processing server receives the After the login request of the security information interaction terminal, the response result is constructed based on a predetermined rule, and the response is The result is transmitted back to the security information interaction terminal, wherein the response result includes configuration parameters to And a list of available auxiliary resources.
  • each of the list of available auxiliary resources is recorded Record information about one of the available auxiliary resources.
  • each of the list of available auxiliary resources is recorded Record contains at least one or more of the following: auxiliary resource identifier, auxiliary resource type, auxiliary resource Source validity period, nature of auxiliary resource usage, and screening rules.
  • the configuration parameter includes at least one of the following items Or multiple: auxiliary resource function switch, user confirmation switch, additional information input switch, print switch, The feedback mode indicator and the auxiliary resource usage condition after the auxiliary resource is acquired.
  • the security information interaction terminal further includes:
  • the user interface receiving a security information interaction instruction from the user and the The full-featured information interaction instruction is transmitted to the security information interaction processing device, wherein the security information interaction
  • the instruction includes information of a security information interaction process to be executed
  • the security information interaction processing device is based on the received The security information interaction instruction performs data interaction with the external security carrier via a communication interface Creating a security information interaction request, and transmitting the security information interaction request via the communication interface Sent to the data processing server to complete the security information interaction process;
  • the associated operation processing device Associated with the operation processing device, the associated operation processing device completes the security information interaction process Automatically performing operations associated with the security information interaction process;
  • the communication interface executing the security information interaction terminal and the external security payload Data communication between the entities and the security information interaction terminal and the data processing server.
  • the associated operation processing device is configured to perform auxiliary resource function switches and auxiliary resources according to the configuration parameters.
  • the associated operation implementation process includes: (1) if The user confirmation switch in the configuration parameter indicates that the user confirmation process is required, and the user is prompted to confirm whether Use one or more auxiliary resources selected, and if the user confirms the use of one or more selected a supplementary resource, then proceeds to step (2), otherwise, terminates the associated operation implementation process; (2) if said The additional information input switch in the configuration parameter indicates that additional information of the user needs to be collected, and the user is prompted to lose Enter the additional information, and if the input is successful, proceed to step (3), otherwise, terminate the associated operation Implementation process; (3) information of the selected one or more auxiliary resources and the completed security Information about sexual information interaction is recorded in the auxiliary resource usage log, and if one or more selected At least one of the records corresponding to the auxiliary resource includes a screening rule, and the user is prompted to correspond to the record.
  • auxiliary resource requires an additional evaluation operation performed by the data processing server 2; (4) If the print switch in the configuration parameter indicates that the completed security information interaction needs to be printed And the information associated with the selected one or more auxiliary resources, by printing Printing the information of the completed security information interaction and the selected one associated therewith Or information of a plurality of auxiliary resources and related prompt information; (5) if the auxiliary in the configuration parameter After the resource is acquired, the feedback mode indicator indicates that online feedback is required after one or more auxiliary resources are selected.
  • auxiliary resource usage log generated in step (3) Transferring the auxiliary resource usage log generated in step (3) to the data processing server and Setting the state of the auxiliary resource usage log generated in step (3) to "has feedback", and if The auxiliary resource acquisition feedback mode indicator in the configuration parameter indicates that one or more assistants are selected
  • the auxiliary resource usage log generated in step (3) is generated. State is set to "no feedback”, and then the secondary resource usage log batch with the status "not feedback” is periodically Transfer to the data processing server and set the status of the transferred secondary resource usage log to "Referred”.
  • the data processing server receives the auxiliary resource After using the log, perform the following operations for each auxiliary resource usage log: (1) Determine the auxiliary resource to make Whether to include filtering rules in the information of one or more auxiliary resources contained in the log, and if the package Including the filter rule, proceed to step (2) to perform additional evaluation operations, and if no filter rules are included Then, proceed to step (3); (2) determine the information of the relevant security information interaction process and Whether the information of the associated one or more auxiliary resources satisfies a predetermined screening rule, and if full Foot screening rules, record relevant information and notify relevant users, then proceed to step (3); (3) store The auxiliary resource uses the log and divides the category of the auxiliary resource usage log for the relevant party to retrieve, and Subsequent operations associated with the secondary resource usage log.
  • a security information interaction terminal is based on security from a user Sexual information interactive instructions and through data interaction with external security carriers and data processing servers a holistic information interaction process, and automatically executing the security information after the security information interaction process is completed The operations associated with the security information interaction process.
  • a data processing server that interacts with a security information terminal Data interaction completion security information interaction process and associated with the security information interaction process operating.
  • a security information interaction method includes the following steps:
  • the security information interaction terminal is based on the security information interaction instruction from the user and passes The data interaction between the external security carrier and the data processing server completes the security information interaction process;
  • the security information interaction terminal passes after the security information interaction process is completed
  • the data interaction with the data processing server automatically performs the interaction process with the security information Associated action.
  • the security information interaction system, device and method disclosed by the invention have the following advantages: (1) capable Auxiliary resources associated with specific security information interactions in real time and/or automatically; (2) Easy to operate and low in time and cost.
  • FIG. 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention.
  • FIG. 2 is a flow chart of a method of security information interaction in accordance with an embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a security information interaction system according to an embodiment of the present invention.
  • the security information interaction system disclosed by the present invention includes a security information interaction terminal 1, and data.
  • Process server 2 Wherein the security information interaction terminal 1 (for example, a POS machine) is based on User security information interactive instructions and through external security carriers (such as bank cards) and data processing services
  • the data interaction of the server 2 completes a security information interaction process (such as a payment transaction operation), and Automatically performing the process of interacting with the security information after the security information interaction process is completed Operation.
  • the data processing server 2 communicates with the data of the security information interaction terminal 1 Completing the security information interaction process with each other and the process of interacting with the security information Operation.
  • the security letter and the The operations associated with the interactivity process include operations for one or more ancillary resources (e.g., coupons).
  • ancillary resources e.g., coupons
  • the security information interaction The terminal 1 performs an initialization operation upon startup, the initialization operation including: based on a user (eg, The input of the operator constructs a login request and transmits the login request to the data processing server 2; receiving a response result from the data processing server 2 to complete the login process (eg, signing in The response result includes a configuration parameter and a list of available auxiliary resources (eg, one) List of one or more available coupons).
  • a user eg, The input of the operator constructs a login request and transmits the login request to the data processing server 2
  • receiving a response result from the data processing server 2 to complete the login process eg, signing in
  • the response result includes a configuration parameter and a list of available auxiliary resources (eg, one) List of one or more available coupons).
  • the data processing server 2 constructing based on a predetermined rule after receiving the login request from the security information interactive terminal 1 Responding to the result, and transmitting the response result back to the security information interaction terminal 1, wherein
  • the response results include configuration parameters and a list of available auxiliary resources (for example, one or more available optimizations) List of coupons).
  • the available auxiliary resources contains information about the corresponding available secondary resource.
  • the available auxiliary resources contains at least one or more of the following: a secondary resource identifier (example Such as coupon identifier), auxiliary resource type (such as coupon type), auxiliary resource validity period (for example) The coupon validity period), the nature of the auxiliary resource use (such as the coupon deduction amount or discount ratio) And screening rules.
  • the configuration parameter is at least One or more of the following: auxiliary resource function switch, user confirmation switch, additional information input Switch, print switch, feedback mode indicator after auxiliary resource acquisition, auxiliary resource usage conditions.
  • the security information interaction The terminal 1 further includes a user interface 3, a communication interface 4, a security information interaction processing device 5, and an association The processing device 6 is operated.
  • the user interface 3 receives the security information interaction instruction from the user and Transmitting the security information interaction instruction to the security information interaction processing device 5, wherein the security The sexual information interaction instruction contains information of the security information interaction process to be executed (for example, a letter of payment transaction) interest).
  • the security information interaction processing device 5 is based on the received security information interaction command Data interaction with the external security carrier (eg bank card) by the communication interface 4 and construction of security An information exchange request, and transmitting the security information interaction request to the office via the communication interface 4
  • the data processing server 2 is configured to complete the security information interaction process.
  • the associated operation processing device 6 is at Automatically performing the process of interacting with the security information after the completion of the security information interaction process The operation of the joint.
  • the communication interface 4 executes the security information interaction terminal 1 and the external security carrier Data communication between the security information interaction terminal 1 and the data processing server 2 is performed.
  • the security information is delivered After the mutual process is completed, the associated operation processing device 6 is configured according to the auxiliary resource function in the configuration parameter.
  • Can switch that is, whether the use of auxiliary resources is enabled
  • auxiliary resource usage conditions such as allowed branches
  • the type of payment transaction and the payment transaction start amount determine whether to conduct a behavior analysis operation, and if determined
  • To perform a behavior analysis operation perform a behavior analysis operation in the following manner: the completed security Information about the sexual information interaction process (eg, information about completed payment transactions) item by item with the available
  • Each record in the list of secondary resources is compared, and if the completed security information is The information of the inter-process matches the information related to the records in the list of available auxiliary resources (eg If the type of payment transaction matches, the auxiliary resource corresponding to the record is selected; if one or more Auxiliary resources are selected (for example, one or more different types of coupons can be selected), then the association is performed
  • the implementation process is performed to implement operations for the selected
  • the association operation is implemented.
  • the process includes: (1) if the user confirmation switch in the configuration parameter indicates that the user confirmation process is required, then Prompt the user to confirm the use of one or more secondary resources selected, and if the user confirms use If one or more auxiliary resources are selected, the process proceeds to step (2); otherwise, the terminating operation is terminated.
  • the additional information input switch in the configuration parameter indicates that a additional letter of the user needs to be collected Information (such as a mobile phone number) prompts the user to enter the additional information, and if the input is successful, then Go to step (3), otherwise, terminate the associated operation implementation process; (3) select one or more auxiliary
  • the information of the resource and the information of the completed security information interaction are recorded on the auxiliary resource use date.
  • Filtering rules eg, behavior screening criteria and/or user screening criteria, exemplarily, the behavior screening Conditions may include user list, time range, threshold amount, accumulated amount, and transaction amount, etc.
  • the user screening criteria may include the following items: unrestricted, sorted (ie, first-come, first-served according to quota restrictions) And), and random (that is, the mode of achieving the lottery)), prompting the user for the auxiliary resources corresponding to the record Use of the additional evaluation operations performed by the data processing server 2; (4) if The print switch in the configuration parameter indicates that the information of the completed security information interaction needs to be printed.
  • auxiliary resource in the configuration parameter is obtained
  • the post-feedback mode indicator indicates that online feedback is required after selecting one or more auxiliary resources, and will be in the step
  • the auxiliary resource usage log generated in (3) is transferred to the data processing server 2 and will be in step
  • the state of the auxiliary resource usage log generated in (3) is set to "followed", and if the configuration is The feedback mode indicator after the auxiliary resource acquisition in the parameter indicates that one or more auxiliary resources are needed.
  • auxiliary resource usage log generated in step (3) To batch feedback, set the status of the auxiliary resource usage log generated in step (3) to "not Feedback”, and then periodically batch transfer of auxiliary resource usage logs with a status of "not fed back" to the The data processing server 2 sets the status of the transmitted auxiliary resource usage log to "followed”.
  • the data processing server 2 After receiving the auxiliary resource usage log, perform the following operations for each auxiliary resource usage log: (1) Determine whether the information of one or more auxiliary resources included in the auxiliary resource usage log includes a sieve Select a rule, and if a filter rule is included, proceed to step (2) to perform an additional evaluation operation, And if the filtering rule is not included, proceed to step (3); (2) determine that the relevant security information has been interacted with Whether the information of the process and the information of one or more auxiliary resources associated therewith meet the predetermined Filtering rules (eg, pre-determining the screening rules by way of user configuration to pay for transactions and
  • the associated coupon can be as follows: whether the payment transaction uses a bank card, If a bank card is used and the relevant conditions are met, such as a merchant’s offer in the backend system configuration or The obtained coupon indicates that the discount can be obtained by means of transaction frequency or accumulated amount, etc., and the card is retrieved at Whether the transaction frequency or
  • the security information interaction system disclosed by the present invention has the following advantages: (1) capable of Auxiliary resources associated with specific security information interactions are used in real time and/or automatically; (2) operations Easy to do and time consuming and low cost.
  • the present invention discloses a security information interaction terminal 1, and the security information is delivered.
  • the mutual terminal 1 for example, a POS machine
  • the security carrier such as a bank card
  • the data processing server 2 to complete security information interaction a process (eg, a payment transaction operation) and automatically after the security information interaction process is completed Performing operations associated with the security information interaction process.
  • the operations associated with the information interaction process include operations for one or more auxiliary resources (eg, coupons) Work.
  • the security information interaction terminal 1 disclosed by the present invention performs an initialization operation at startup,
  • the initializing operation includes constructing a login request based on input from a user (eg, an operator) and Transmitting the login request to the data processing server 2; receiving from the data processing server 2 Response to complete the login process (eg, check-in process), where the response results include configuration A list of parameters and available auxiliary resources (such as a list of one or more available coupons).
  • the available auxiliary resources contains information about the corresponding available secondary resource.
  • the available assistance contains at least one or more of the following: Auxiliary Resource Identifier (eg coupon identifier), auxiliary resource type (eg coupon type), auxiliary resource validity period (eg Such as the validity period of the coupon), the nature of the use of auxiliary resources (such as the deductible amount of the coupon or the discount ratio) And screening rules.
  • Auxiliary Resource Identifier eg coupon identifier
  • auxiliary resource type eg coupon type
  • auxiliary resource validity period eg Such as the validity period of the coupon
  • the nature of the use of auxiliary resources such as the deductible amount of the coupon or the discount ratio
  • the configuration parameter is at least Includes one or more of the following: auxiliary resource function switch, user confirmation switch, additional information input Incoming switch, print switch, feedback mode indicator after auxiliary resource acquisition, auxiliary resource usage conditions.
  • the security information interaction terminal 1 disclosed by the present invention further includes a user interface 3, The message interface 4, the security information interaction processing device 5, and the associated operation processing device 6.
  • the user The interface 3 receives the security information interaction instruction from the user and transmits the security information interaction instruction To the security information interaction processing device 5, wherein the security information interaction instruction includes an security to be executed Information about the process of holistic information interaction (such as information about payment transactions).
  • the security information interaction processing The device 5 interacts with the external security via the communication interface 4 based on the received security information interaction instruction.
  • a carrier eg, a bank card
  • the communication interface 4 transmits the security information interaction request to the data processing server 2 to complete the security Fully sexual information interaction process.
  • the associated operation processing device 6 is completed in the security information interaction process
  • the operations associated with the security information interaction process are then automatically performed.
  • the communication interface 4 is executed Intersecting the security information interaction terminal 1 with the external security carrier and the security information Data communication between the mutual terminal 1 and the data processing server 2.
  • the security information is After the interaction process is completed, the associated operation processing device 6 is configured according to the auxiliary resources in the configuration parameters.
  • Function switch ie whether the use of auxiliary resources is enabled
  • auxiliary resource usage conditions eg allowed
  • perform a behavior analysis operation as follows: Information about the full-featured information interaction process (eg, information about completed payment transactions) item by item with the available Each record in the list of secondary resources is compared, and if the completed security information is complete
  • the information of the interaction process matches the information related to the records in the list of available auxiliary resources (eg If the type of payment transaction matches, the auxiliary resource corresponding to the record is selected; if one or more Auxiliary resources are selected (for example, one or more different types of coupons can be selected)
  • the operations are implemented to implement operations for the selected secondary resources (eg, the use
  • the association operation is implemented.
  • the process includes: (1) if the user confirmation switch in the configuration parameter indicates that a user confirmation process is required, Prompting the user to confirm whether to use the selected one or more auxiliary resources, and if the user confirms With the selected one or more auxiliary resources, proceed to step (2), otherwise, terminate the associated operation implementation Process; (2) if the additional information input switch in the configuration parameter indicates that an additional user needs to be collected Information (such as a mobile phone number) prompts the user to enter the additional information, and if the input is successful, then Go to step (3), otherwise, terminate the associated operation implementation process; (3) select one or more auxiliary The information of the help resource and the information of the completed security information interaction are recorded in the auxiliary resource use.
  • the selection criteria may include a user list, a time range, a threshold amount, a cumulative amount, and a transaction amount, etc.
  • the user screening condition may include the following items: unrestricted, sorted (ie, first come first according to the quota limit) First, and random (that is, the mode of achieving the lottery)), the user is prompted to the auxiliary resource corresponding to the record.
  • the use of the source requires an additional evaluation operation performed by the data processing server 2; (4) if The print switch in the configuration parameter indicates that the information about the completed security information interaction needs to be printed.
  • the post-feedback mode indicator indicates that online feedback is required after selecting one or more auxiliary resources, and will be in step
  • the auxiliary resource usage log generated in step (3) is transferred to the data processing server 2 and will be in step
  • the state of the auxiliary resource usage log generated in step (3) is set to "already feedback", and if the matching After the auxiliary resource is obtained in the parameter, the feedback mode indicator indicates that one or more auxiliary resources are selected. If batch feedback is required, the status of the auxiliary resource usage log generated in step (3) is set. "Not Feedback”, and then periodically batch transfer the secondary resource usage logs with the status "Not Feedback” to The data processing server 2 sets the status of the transmitted auxiliary resource usage log to "reverse" Feeding.”
  • the present invention discloses a data processing server 2, and the data processing server 2 Performing a security information interaction process and interacting with the data interaction with the security information interaction terminal 1 The operation associated with the security information interaction process.
  • the security information include operations for one or more auxiliary resources (eg, coupons).
  • the data processing server 2 disclosed by the present invention receives the security information from the security information. After the login request of the interactive terminal 1, construct a response result based on a predetermined rule, and transmit the response result Returning the security information interaction terminal 1 , wherein the response result includes configuration parameters and is available A list of secondary resources (such as a list of one or more available coupons).
  • the available auxiliary resources contains information about the corresponding available secondary resource.
  • the available auxiliary resources contains at least one or more of the following: a secondary resource identifier (for example Coupon identifier), auxiliary resource type (such as coupon type), auxiliary resource validity period (such as excellent The coupon validity period), the nature of the auxiliary resource use (such as the coupon deduction amount or discount ratio) Filter rules.
  • a secondary resource identifier for example Coupon identifier
  • auxiliary resource type such as coupon type
  • auxiliary resource validity period such as excellent The coupon validity period
  • the nature of the auxiliary resource use such as the coupon deduction amount or discount ratio
  • the configuration parameters include at least One or more of the following: auxiliary resource function switch, user confirmation switch, additional information input Off, print switch, feedback mode indicator after auxiliary resource acquisition, auxiliary resource usage conditions.
  • the data processing server 2 disclosed by the present invention receives the security information from the security information.
  • the auxiliary resource usage log of the interactive terminal 1 After the auxiliary resource usage log of the interactive terminal 1 is used, the following operations are performed for each auxiliary resource usage log: (1) determining whether the information of one or more auxiliary resources included in the auxiliary resource usage log is included Filter the rules, and if the filter rules are included, proceed to step (2) to perform additional evaluation operations, And if the filtering rule is not included, proceed to step (3); (2) determine that the relevant security information has been interacted with Whether the information of the process and the information of one or more auxiliary resources associated therewith meet the predetermined Filtering rules (eg, pre-determining the screening rules by way of user configuration to pay for transactions and
  • the associated coupon can be as follows: whether the payment transaction uses a bank card, If a bank card is used and the relevant conditions are met, such as a merchant’s offer in the backend system configuration or The obtained coupon indicates that the discount can be obtained by means of transaction frequency or accumulated amount, etc
  • the security information interaction method disclosed by the present invention comprises the following steps: (A1) security information interaction end
  • the end (such as a POS machine) interacts with instructions based on security information from the user and passes the security with the outside.
  • the data interaction between the body (such as a bank card) and the data processing server completes the security information interaction process (example Such as payment transaction operation);
  • the security information interaction terminal interacts with the security information Automatically performing the security with data interaction with the data processing server after completion of the process The operations associated with the information interaction process.
  • the security letter and the The operations associated with the interactivity process include operations for one or more ancillary resources (e.g., coupons).
  • ancillary resources e.g., coupons
  • the security information interaction The terminal performs an initialization operation upon startup, the initialization operation including: based on a user (eg, fucking Entering a login request and transmitting the login request to the data processing server; Receiving a response from the data processing server to complete the login process (eg, a check-in process), Wherein the response result includes a configuration parameter and a list of available auxiliary resources (eg one or more A list of available coupons).
  • a user eg, fucking Entering a login request and transmitting the login request to the data processing server
  • Receiving a response from the data processing server to complete the login process eg, a check-in process
  • the response result includes a configuration parameter and a list of available auxiliary resources (eg one or more A list of available coupons).
  • the data processing server Forming a response based on a predetermined rule upon receiving a login request from the security information interactive terminal Receiving the result and transmitting the response result back to the security information interaction terminal, wherein the response
  • the results include configuration parameters and a list of available ancillary resources (such as one or more available coupons) list of).
  • the available auxiliary resources contains information about the corresponding available secondary resource.
  • the available auxiliary resources contains at least one or more of the following: a secondary resource identifier (example Such as coupon identifier), auxiliary resource type (such as coupon type), auxiliary resource validity period (for example) The coupon validity period), the nature of the auxiliary resource use (such as the coupon deduction amount or discount ratio) And screening rules.
  • the configuration parameter is at least One or more of the following: auxiliary resource function switch, user confirmation switch, additional information input Switch, print switch, feedback mode indicator after auxiliary resource acquisition, auxiliary resource usage conditions.
  • the step (A1) includes: the security information interaction terminal receiving a security information interaction instruction from the user, where The security information interaction instruction includes information about a security information interaction process to be performed (eg, Information of the transaction transaction); the security information interaction terminal interacts based on the received security information Directing data interaction with the external security carrier (such as a bank card) and constructing security information interaction Requesting, and transmitting the security information interaction request to the data processing server for security sexual information interaction process.
  • the security information interaction terminal includes information about a security information interaction process to be performed (eg, Information of the transaction transaction); the security information interaction terminal interacts based on the received security information Directing data interaction with the external security carrier (such as a bank card) and constructing security information interaction Requesting, and transmitting the security information interaction request to the data processing server for security Sexual information interaction process.
  • the security information interaction terminal receiving a security information interaction instruction from the user, where The security information interaction instruction includes information about a security information interaction process to be performed (eg, Information of the transaction transaction); the security information interaction terminal interacts
  • the step (A2) includes: after the security information interaction process is completed, the security information interaction terminal root According to the auxiliary resource function switch in the configuration parameter (that is, whether the use function of the auxiliary resource is enabled) and Auxiliary resource usage conditions (such as the type of payment transaction allowed and the payment transaction start amount) are determined to be No behavior analysis operation, and if it is determined that a behavior analysis operation is required, it is performed as follows Behavior analysis operation: information about the completed security information interaction process (for example, completed branch) The information of the payment transaction is compared item by item with each record in the list of available auxiliary resources, And if the information of the completed security information interaction process is related to the available auxiliary resources If the information related to the records in the list matches (for example, the type of payment transaction matches), then the record office The corresponding auxiliary resource is selected; if one or more auxiliary resources are selected (for example, one or one may be selected) The plurality of different types of coupons), the associated operation implementation process is
  • the association operation is implemented.
  • the process includes: (1) if the user confirmation switch in the configuration parameter indicates that the user confirmation process is required, then Prompt the user to confirm the use of one or more secondary resources selected, and if the user confirms use If one or more auxiliary resources are selected, the process proceeds to step (2); otherwise, the terminating operation is terminated.
  • the additional information input switch in the configuration parameter indicates that a additional letter of the user needs to be collected Information (such as a mobile phone number) prompts the user to enter the additional information, and if the input is successful, then Go to step (3), otherwise, terminate the associated operation implementation process; (3) select one or more auxiliary
  • the information of the resource and the information of the completed security information interaction are recorded on the auxiliary resource use date.
  • Filtering rules eg, behavior screening criteria and/or user screening criteria, exemplarily, the behavior screening Conditions may include user list, time range, threshold amount, accumulated amount, and transaction amount, etc.
  • the user screening criteria may include the following items: unrestricted, sorted (ie, first-come, first-served according to quota restrictions) And), and random (that is, the mode of achieving the lottery)), prompting the user for the auxiliary resources corresponding to the record Use of the additional evaluation operations performed by the data processing server; (4) if the The print switch in the parameter indicates that the information about the completed security information interaction needs to be printed and Information about the selected one or more auxiliary resources associated therewith, printed by the printer Information about the completed security information interaction and one or more of the selected ones associated with it Resource information and related prompt information; (5) if the auxiliary resource in the configuration parameter is acquired
  • the feedback mode indicator indicates that online feedback is required after selecting one or more auxiliary resources, and will be in the step
  • the auxiliary resource usage log generated in (3) is transferred to the data processing server and will be in step
  • the state of the auxiliary resource usage log generated in (3) is set to "followed", and if the configuration is The feedback mode indicator after the auxiliary resource acquisition
  • auxiliary resource usage log generated in step (3) To batch feedback, set the status of the auxiliary resource usage log generated in step (3) to "not Feedback", and then periodically batch transfer of auxiliary resource usage logs with a status of "not fed back" to the The data processing server sets the status of the transferred secondary resource usage log to "Feedback".
  • the step (A2) includes: the data processing server is configured for each auxiliary resource after receiving the auxiliary resource usage log
  • the source uses the log to perform the following operations: (1) determining one or more of the auxiliary resource usage logs Whether the filtering rule is included in the information of the auxiliary resource, and if the filtering rule is included, proceed to step (2) To perform an additional evaluation operation, and if no screening rules are included, proceed to step (3); (2) determine Information about the associated security information interaction process and one or more auxiliary resources associated with it Whether the information satisfies a predetermined screening rule (for example, the screen is predetermined by means of user configuration) The rule is to take the payment transaction and the coupon associated with it as an example.
  • a predetermined screening rule for example, the screen is predetermined by means of user configuration
  • the screening process can be as follows: the payment Whether the transaction uses a bank card, if a bank card is used, and the relevant conditions are met, such as the merchant at the back end
  • the system-configured offers or coupons that have been obtained indicate that the transaction frequency or cumulative amount can be used. If the discount is obtained, the transaction frequency or accumulated amount of the card within the specified time range is retrieved. Required requirements), and if the screening rules are met, record relevant information and notify (eg via SMS) Or e-mail) related users, then proceed to step (3); (3) store the auxiliary resource usage Log and divide the category of the auxiliary resource usage log for the relevant party to retrieve and implement with the auxiliary resource Use subsequent actions associated with the log (such as the actual implementation of the coupon).
  • the security information interaction method disclosed by the present invention has the following advantages: (1) capable of Auxiliary resources associated with specific security information interactions are used in real time and/or automatically; (2) operations Easy to do and time consuming and low cost.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)

Abstract

本发明提出了安全性信息交互系统、设备及方法。所述方法包括:安全性信息交互终端基于来自用户的安全性信息交互指令并通过与外部安全载体和数据处理服务器的数据交互完成安全性信息交互过程;所述安全性信息交互终端在所述安全性信息交互过程完成之后通过与所述数据处理服务器的数据交互自动地执行与所述安全性信息交互过程相关联的操作。本发明所公开的安全性信息交互系统、设备及方法能够实时地和/或自动地使用与特定的安全性信息交互相关联的辅助资源。

Description

安全性信息交互系统、设备及方法 技术领域
本发明涉及信息交互系统、设备及方法,更具体地,涉及安全性信息交互 系统、设备及方法。
背景技术
目前,随着网络应用的日益广泛以及不同领域的业务种类的日益丰富,实 现与辅助资源(例如优惠券)相结合的安全性信息交互(例如支付交易)变得越 来越重要。
现有的安全性信息交互系统及方法通常以如下方式使用与特定的安全性 信息交互相关联的辅助资源:相关方(例如商户)使用安全性信息交互终端(例如 POS机)以联机的方式完成该特定的安全性信息交互(例如支付交易);随后所 述相关方另外地使用纸质形式的或电子形式的辅助资源(例如优惠券)完成与 该特定的安全性信息交互相关联的辅助操作(例如优惠券的实施)。
然而,现有的安全性信息交互系统及方法存在下列问题:需要手动地另外 使用与特定的安全性信息交互相关联的辅助资源,故操作繁琐并且时间消耗和 成本较高。
因此,存在如下需求:提供能够实时地和/或自动地使用与特定的安全性 信息交互相关联的辅助资源的安全性信息交互系统、设备及方法。
发明内容
为了解决上述现有技术方案所存在的问题,本发明提出了能够实时地和/ 或自动地使用与特定的安全性信息交互相关联的辅助资源的安全性信息交互 系统、设备及方法。
本发明的目的是通过以下技术方案实现的:
一种安全性信息交互系统,所述安全性信息交互系统包括:
安全性信息交互终端,所述安全性信息交互终端基于来自用户的安全性信 息交互指令并通过与外部安全载体和数据处理服务器的数据交互完成安全性 信息交互过程,并且在所述安全性信息交互过程完成之后自动地执行与所述安 全性信息交互过程相关联的操作;
数据处理服务器,所述数据处理服务器通过与所述安全性信息交互终端的 所述数据交互完成所述安全性信息交互过程以及所述与所述安全性信息交互 过程相关联的操作。
在上面所公开的方案中,优选地,所述与所述安全性信息交互过程相关联 的操作包括针对一个或多个辅助资源的操作。
在上面所公开的方案中,优选地,所述安全性信息交互终端在启动时执行 初始化操作,所述初始化操作包括:基于来自用户的输入构造登录请求并将所 述登录请求传送到所述数据处理服务器;接收来自所述数据处理服务器的响应 结果以完成登录过程,其中,所述响应结果包括配置参数以及可用的辅助资源 的列表。
在上面所公开的方案中,优选地,所述数据处理服务器在接收到来自所述 安全性信息交互终端的登录请求后基于预定的规则构造响应结果,并将所述响 应结果传送回所述安全性信息交互终端,其中,所述响应结果包括配置参数以 及可用的辅助资源的列表。
在上面所公开的方案中,优选地,所述可用的辅助资源的列表中的每个记 录包含所对应的一个可用的辅助资源的信息。
在上面所公开的方案中,优选地,所述可用的辅助资源的列表中的每个记 录至少包含下列项中的一个或多个:辅助资源标识符、辅助资源类型、辅助资 源有效期、辅助资源使用性质以及筛选规则。
在上面所公开的方案中,优选地,所述配置参数至少包括下列项中的一个 或多个:辅助资源功能开关、用户确认开关、附加信息输入开关、打印开关、 辅助资源获取后反馈方式指示符、辅助资源使用条件。
在上面所公开的方案中,优选地,所述安全性信息交互终端进一步包括:
用户接口,所述用户接口接收来自用户的安全性信息交互指令并将所述安 全性信息交互指令传送到安全性信息交互处理装置,其中所述安全性信息交互 指令包含待执行的安全性信息交互过程的信息;
安全性信息交互处理装置,所述安全性信息交互处理装置基于接收到的所 述安全性信息交互指令经由通信接口与所述外部安全载体进行数据交互并构 造安全性信息交互请求,以及经由所述通信接口将所述安全性信息交互请求传 送到所述数据处理服务器以完成安全性信息交互过程;
关联操作处理装置,所述关联操作处理装置在所述安全性信息交互过程完 成之后自动地执行与所述安全性信息交互过程相关联的操作;
通信接口,所述通信接口执行所述安全性信息交互终端与所述外部安全载 体之间以及所述安全性信息交互终端与所述数据处理服务器之间的数据通信。
在上面所公开的方案中,优选地,在所述安全性信息交互过程完成之后, 所述关联操作处理装置根据所述配置参数中的辅助资源功能开关和辅助资源 使用条件确定是否进行行为分析操作,并且如果确定需要进行行为分析操作,则 以如下方式执行行为分析操作:将所述已完成的安全性信息交互过程的信息逐 项地与所述可用的辅助资源的列表中的每个记录进行比较,并且如果所述已完 成的安全性信息交互过程的信息与所述可用的辅助资源的列表中的记录的相 关信息相匹配,则该记录所对应的辅助资源被选取;如果一个或多个辅助资源被 选取,则执行关联操作实施过程以实现针对所选取的辅助资源的操作。
在上面所公开的方案中,优选地,所述关联操作实施过程包括:(1)如果 所述配置参数中的用户确认开关指示需要用户确认过程,则提示用户确认是否 使用所选取的一个或多个辅助资源,并且如果用户确认使用所选取的一个或多 个辅助资源,则进入步骤(2),否则,终止关联操作实施过程;(2)如果所述 配置参数中的附加信息输入开关指示需要收集用户的附加信息,则提示用户输 入所述附加信息,并且如果输入成功,则进入步骤(3),否则,终止关联操作 实施过程;(3)将所选取的一个或多个辅助资源的信息以及所述已完成的安全 性信息交互的信息记录在辅助资源使用日志中,并且如果所选取的一个或多个 辅助资源所对应的记录中的至少一个包含筛选规则,则提示用户该记录所对应 的辅助资源的使用需要进行所述数据处理服务器2执行的附加的评估操作;(4) 如果所述配置参数中的打印开关指示需要打印所述已完成的安全性信息交互 的信息以及与其相关联的所述选取的一个或多个辅助资源的信息,则通过打印 机打印所述已完成的安全性信息交互的信息和与其相关联的所述选取的一个 或多个辅助资源的信息以及相关的提示信息;(5)如果所述配置参数中的辅助 资源获取后反馈方式指示符指示选取一个或多个辅助资源后需要联机反馈,则 将在步骤(3)中生成的所述辅助资源使用日志传送到所述数据处理服务器并 将在步骤(3)中生成的所述辅助资源使用日志的状态设置为“已反馈”,而如果 所述配置参数中的辅助资源获取后反馈方式指示符指示选取一个或多个辅助 资源后需要批量反馈,则将在步骤(3)中生成的所述辅助资源使用日志的状 态设置为“未反馈”,并随后周期性地将状态为“未反馈”的辅助资源使用日志批量 传送到所述数据处理服务器,并将已传送的辅助资源使用日志的状态设置为 “已反馈”。
在上面所公开的方案中,优选地,所述数据处理服务器在接收到辅助资源 使用日志后针对每个辅助资源使用日志执行如下操作:(1)确定该辅助资源使 用日志所包含的一个或多个辅助资源的信息中是否包含筛选规则,并且如果包 含筛选规则,则进入步骤(2)以执行附加的评估操作,而如果不包含筛选规 则,则进入步骤(3);(2)确定相关的安全性信息交互过程的信息以及与其相 关联的一个或多个辅助资源的信息是否满足预先确定的筛选规则,并且如果满 足筛选规则,则记录相关信息并通知相关用户,随后进入步骤(3);(3)储存 该辅助资源使用日志并划分该辅助资源使用日志的类别以供相关方检索,并实 施与该辅助资源使用日志相关联的后续操作。
本发明的目的也可以通过以下技术方案实现:
一种安全性信息交互终端,所述安全性信息交互终端基于来自用户的安全 性信息交互指令并通过与外部安全载体和数据处理服务器的数据交互完成安 全性信息交互过程,并且在所述安全性信息交互过程完成之后自动地执行与所 述安全性信息交互过程相关联的操作。
本发明的目的也可以通过以下技术方案实现:
一种数据处理服务器,所述数据处理服务器通过与安全性信息交互终端的 数据交互完成安全性信息交互过程以及与所述安全性信息交互过程相关联的 操作。
本发明的目的也可以通过以下技术方案实现:
一种安全性信息交互方法,所述安全性信息交互方法包括下列步骤:
(A1)安全性信息交互终端基于来自用户的安全性信息交互指令并通过与 外部安全载体和数据处理服务器的数据交互完成安全性信息交互过程;
(A2)所述安全性信息交互终端在所述安全性信息交互过程完成之后通过 与所述数据处理服务器的数据交互自动地执行与所述安全性信息交互过程相 关联的操作。
本发明所公开的安全性信息交互系统、设备及方法具有以下优点:(1)能 够实时地和/或自动地使用与特定的安全性信息交互相关联的辅助资源;(2) 操作简便并且时间消耗和成本较低。
附图说明
结合附图,本发明的技术特征以及优点将会被本领域技术人员更好地理 解,其中:
图1是根据本发明的实施例的安全性信息交互系统的示意性结构图;
图2是根据本发明的实施例的安全性信息交互方法的流程图。
具体实施方式
图1是根据本发明的实施例的安全性信息交互系统的示意性结构图。如图1 所示,本发明所公开的安全性信息交互系统包括安全性信息交互终端1、数据 处理服务器2。其中,所述安全性信息交互终端1(例如POS机)基于来自用 户的安全性信息交互指令并通过与外部安全载体(例如银行卡)和数据处理服 务器2的数据交互完成安全性信息交互过程(例如支付交易操作),并且在所述 安全性信息交互过程完成之后自动地执行与所述安全性信息交互过程相关联 的操作。所述数据处理服务器2通过与所述安全性信息交互终端1的所述数据交 互完成所述安全性信息交互过程以及所述与所述安全性信息交互过程相关联 的操作。
优选地,在本发明所公开的安全性信息交互系统中,所述与所述安全性信 息交互过程相关联的操作包括针对一个或多个辅助资源(例如优惠券)的操作。
优选地,在本发明所公开的安全性信息交互系统中,所述安全性信息交互 终端1在启动时执行初始化操作,所述初始化操作包括:基于来自用户(例如 操作人员)的输入构造登录请求并将所述登录请求传送到所述数据处理服务器 2;接收来自所述数据处理服务器2的响应结果以完成登录过程(例如签到过 程),其中,所述响应结果包括配置参数以及可用的辅助资源的列表(例如一 个或多个可用的优惠券的列表)。
优选地,在本发明所公开的安全性信息交互系统中,所述数据处理服务器 2在接收到来自所述安全性信息交互终端1的登录请求后基于预定的规则构造 响应结果,并将所述响应结果传送回所述安全性信息交互终端1,其中,所述 响应结果包括配置参数以及可用的辅助资源的列表(例如一个或多个可用的优 惠券的列表)。
优选地,在本发明所公开的安全性信息交互系统中,所述可用的辅助资源 的列表中的每个记录包含所对应的一个可用的辅助资源的信息。
示例性地,在本发明所公开的安全性信息交互系统中,所述可用的辅助资 源的列表中的每个记录至少包含下列项中的一个或多个:辅助资源标识符(例 如优惠券标识符)、辅助资源类型(例如优惠券类型)、辅助资源有效期(例如 优惠券有效期)、辅助资源使用性质(例如优惠券的抵扣金额或折扣比列)以 及筛选规则。
优选地,在本发明所公开的安全性信息交互系统中,所述配置参数至少包 括下列项中的一个或多个:辅助资源功能开关、用户确认开关、附加信息输入 开关、打印开关、辅助资源获取后反馈方式指示符、辅助资源使用条件。
优选地,在本发明所公开的安全性信息交互系统中,所述安全性信息交互 终端1进一步包括用户接口3、通信接口4、安全性信息交互处理装置5和关联 操作处理装置6。其中,所述用户接口3接收来自用户的安全性信息交互指令并 将所述安全性信息交互指令传送到安全性信息交互处理装置5,其中所述安全 性信息交互指令包含待执行的安全性信息交互过程的信息(例如支付交易的信 息)。所述安全性信息交互处理装置5基于接收到的所述安全性信息交互指令经 由通信接口4与所述外部安全载体(例如银行卡)进行数据交互并构造安全性 信息交互请求,以及经由所述通信接口4将所述安全性信息交互请求传送到所 述数据处理服务器2以完成安全性信息交互过程。所述关联操作处理装置6在所 述安全性信息交互过程完成之后自动地执行与所述安全性信息交互过程相关 联的操作。所述通信接口4执行所述安全性信息交互终端1与所述外部安全载体 之间以及所述安全性信息交互终端1与所述数据处理服务器2之间的数据通信。
优选地,在本发明所公开的安全性信息交互系统中,在所述安全性信息交 互过程完成之后,所述关联操作处理装置6根据所述配置参数中的辅助资源功 能开关(即辅助资源的使用功能是否开启)和辅助资源使用条件(例如允许的支 付交易的类型和支付交易起始金额)确定是否进行行为分析操作,并且如果确定 需要进行行为分析操作,则以如下方式执行行为分析操作:将所述已完成的安全 性信息交互过程的信息(例如已完成的支付交易的信息)逐项地与所述可用的 辅助资源的列表中的每个记录进行比较,并且如果所述已完成的安全性信息交 互过程的信息与所述可用的辅助资源的列表中的记录的相关信息相匹配(例如 支付交易的类型相匹配),则该记录所对应的辅助资源被选取;如果一个或多个 辅助资源被选取(例如可以选取一个或者多个不同类型的优惠券),则执行关联 操作实施过程以实现针对所选取的辅助资源的操作(例如优惠券的使用)。
优选地,在本发明所公开的安全性信息交互系统中,所述关联操作实施过 程包括:(1)如果所述配置参数中的用户确认开关指示需要用户确认过程,则 提示用户确认是否使用所选取的一个或多个辅助资源,并且如果用户确认使用 所选取的一个或多个辅助资源,则进入步骤(2),否则,终止关联操作实施过 程;(2)如果所述配置参数中的附加信息输入开关指示需要收集用户的附加信 息(例如手机号),则提示用户输入所述附加信息,并且如果输入成功,则进 入步骤(3),否则,终止关联操作实施过程;(3)将所选取的一个或多个辅助 资源的信息以及所述已完成的安全性信息交互的信息记录在辅助资源使用日 志中,并且如果所选取的一个或多个辅助资源所对应的记录中的至少一个包含 筛选规则(例如行为筛选条件和/或用户筛选条件,示例性地,所述行为筛选 条件可以包括用户列表、时间范围、门限金额、累积金额以及交易额度等,所 述用户筛选条件可以包括下列项:无限制、排序(即根据名额限制实行先到先 得)、以及随机(即实现抽奖的模式)),则提示用户该记录所对应的辅助资源 的使用需要进行所述数据处理服务器2执行的附加的评估操作;(4)如果所述 配置参数中的打印开关指示需要打印所述已完成的安全性信息交互的信息以 及与其相关联的所述选取的一个或多个辅助资源的信息,则通过打印机打印所 述已完成的安全性信息交互的信息和与其相关联的所述选取的一个或多个辅 助资源的信息以及相关的提示信息;(5)如果所述配置参数中的辅助资源获取 后反馈方式指示符指示选取一个或多个辅助资源后需要联机反馈,则将在步骤 (3)中生成的所述辅助资源使用日志传送到所述数据处理服务器2并将在步骤 (3)中生成的所述辅助资源使用日志的状态设置为“已反馈”,而如果所述配置 参数中的辅助资源获取后反馈方式指示符指示选取一个或多个辅助资源后需 要批量反馈,则将在步骤(3)中生成的所述辅助资源使用日志的状态设置为“未 反馈”,并随后周期性地将状态为“未反馈”的辅助资源使用日志批量传送到所述 数据处理服务器2,并将已传送的辅助资源使用日志的状态设置为“已反馈”。
优选地,在本发明所公开的安全性信息交互系统中,所述数据处理服务器 2在接收到辅助资源使用日志后针对每个辅助资源使用日志执行如下操作:(1) 确定该辅助资源使用日志所包含的一个或多个辅助资源的信息中是否包含筛 选规则,并且如果包含筛选规则,则进入步骤(2)以执行附加的评估操作, 而如果不包含筛选规则,则进入步骤(3);(2)确定相关的安全性信息交互过 程的信息以及与其相关联的一个或多个辅助资源的信息是否满足预先确定的 筛选规则(例如通过用户配置的方式预先确定所述筛选规则,以支付交易和与 其相关联的优惠券为例,筛选过程可以如下:该支付交易是否使用了银行卡, 如果使用了银行卡,且满足相关条件,如商户在后端系统配置的优惠活动或已 获取的优惠券表明可通过交易频度或累计金额等方式获取优惠,则检索该卡在 指定时间范围内的交易频度或累计金额是否满足预定的要求),并且如果满足 筛选规则,则记录相关信息并通知(例如通过短信或电子邮件的方式)相关用 户,随后进入步骤(3);(3)储存该辅助资源使用日志并划分该辅助资源使用 日志的类别以供相关方检索,并实施与该辅助资源使用日志相关联的后续操作 (例如实际实施优惠券的使用)。
由上可见,本发明所公开的安全性信息交互系统具有下列优点:(1)能够 实时地和/或自动地使用与特定的安全性信息交互相关联的辅助资源;(2)操 作简便并且时间消耗和成本较低。
如图1所示,本发明公开了一种安全性信息交互终端1,所述安全性信息交 互终端1(例如POS机)基于来自用户的安全性信息交互指令并通过与外部 安全载体(例如银行卡)和数据处理服务器2的数据交互完成安全性信息交互 过程(例如支付交易操作),并且在所述安全性信息交互过程完成之后自动地 执行与所述安全性信息交互过程相关联的操作。
优选地,在本发明所公开的安全性信息交互终端1中,所述与所述安全性 信息交互过程相关联的操作包括针对一个或多个辅助资源(例如优惠券)的操 作。
优选地,本发明所公开的安全性信息交互终端1在启动时执行初始化操作, 所述初始化操作包括:基于来自用户(例如操作人员)的输入构造登录请求并 将所述登录请求传送到所述数据处理服务器2;接收来自所述数据处理服务器2 的响应结果以完成登录过程(例如签到过程),其中,所述响应结果包括配置 参数以及可用的辅助资源的列表(例如一个或多个可用的优惠券的列表)。
优选地,在本发明所公开的安全性信息交互终端1中,所述可用的辅助资 源的列表中的每个记录包含所对应的一个可用的辅助资源的信息。
示例性地,在本发明所公开的安全性信息交互终端1中,所述可用的辅助 资源的列表中的每个记录至少包含下列项中的一个或多个:辅助资源标识符 (例如优惠券标识符)、辅助资源类型(例如优惠券类型)、辅助资源有效期(例 如优惠券有效期)、辅助资源使用性质(例如优惠券的抵扣金额或折扣比列) 以及筛选规则。
优选地,在本发明所公开的安全性信息交互终端1中,所述配置参数至少 包括下列项中的一个或多个:辅助资源功能开关、用户确认开关、附加信息输 入开关、打印开关、辅助资源获取后反馈方式指示符、辅助资源使用条件。
优选地,本发明所公开的安全性信息交互终端1进一步包括用户接口3、通 信接口4、安全性信息交互处理装置5和关联操作处理装置6。其中,所述用户 接口3接收来自用户的安全性信息交互指令并将所述安全性信息交互指令传送 到安全性信息交互处理装置5,其中所述安全性信息交互指令包含待执行的安 全性信息交互过程的信息(例如支付交易的信息)。所述安全性信息交互处理 装置5基于接收到的所述安全性信息交互指令经由通信接口4与所述外部安全 载体(例如银行卡)进行数据交互并构造安全性信息交互请求,以及经由所述 通信接口4将所述安全性信息交互请求传送到所述数据处理服务器2以完成安 全性信息交互过程。所述关联操作处理装置6在所述安全性信息交互过程完成 之后自动地执行与所述安全性信息交互过程相关联的操作。所述通信接口4执 行所述安全性信息交互终端1与所述外部安全载体之间以及所述安全性信息交 互终端1与所述数据处理服务器2之间的数据通信。
优选地,在本发明所公开的安全性信息交互终端1中,在所述安全性信息 交互过程完成之后,所述关联操作处理装置6根据所述配置参数中的辅助资源 功能开关(即辅助资源的使用功能是否开启)和辅助资源使用条件(例如允许的 支付交易的类型和支付交易起始金额)确定是否进行行为分析操作,并且如果确 定需要进行行为分析操作,则以如下方式执行行为分析操作:将所述已完成的安 全性信息交互过程的信息(例如已完成的支付交易的信息)逐项地与所述可用 的辅助资源的列表中的每个记录进行比较,并且如果所述已完成的安全性信息 交互过程的信息与所述可用的辅助资源的列表中的记录的相关信息相匹配(例 如支付交易的类型相匹配),则该记录所对应的辅助资源被选取;如果一个或多 个辅助资源被选取(例如可以选取一个或者多个不同类型的优惠券),则执行关 联操作实施过程以实现针对所选取的辅助资源的操作(例如优惠券的使用)。
优选地,在本发明所公开的安全性信息交互终端1中,所述关联操作实施 过程包括:(1)如果所述配置参数中的用户确认开关指示需要用户确认过程, 则提示用户确认是否使用所选取的一个或多个辅助资源,并且如果用户确认使 用所选取的一个或多个辅助资源,则进入步骤(2),否则,终止关联操作实施 过程;(2)如果所述配置参数中的附加信息输入开关指示需要收集用户的附加 信息(例如手机号),则提示用户输入所述附加信息,并且如果输入成功,则 进入步骤(3),否则,终止关联操作实施过程;(3)将所选取的一个或多个辅 助资源的信息以及所述已完成的安全性信息交互的信息记录在辅助资源使用 日志中,并且如果所选取的一个或多个辅助资源所对应的记录中的至少一个包 含筛选规则(例如行为筛选条件和/或用户筛选条件,示例性地,所述行为筛 选条件可以包括用户列表、时间范围、门限金额、累积金额以及交易额度等, 所述用户筛选条件可以包括下列项:无限制、排序(即根据名额限制实行先到 先得)、以及随机(即实现抽奖的模式)),则提示用户该记录所对应的辅助资 源的使用需要进行所述数据处理服务器2执行的附加的评估操作;(4)如果所 述配置参数中的打印开关指示需要打印所述已完成的安全性信息交互的信息 以及与其相关联的所述选取的一个或多个辅助资源的信息,则通过打印机打印 所述已完成的安全性信息交互的信息和与其相关联的所述选取的一个或多个 辅助资源的信息以及相关的提示信息;(5)如果所述配置参数中的辅助资源获 取后反馈方式指示符指示选取一个或多个辅助资源后需要联机反馈,则将在步 骤(3)中生成的所述辅助资源使用日志传送到所述数据处理服务器2并将在步 骤(3)中生成的所述辅助资源使用日志的状态设置为“已反馈”,而如果所述配 置参数中的辅助资源获取后反馈方式指示符指示选取一个或多个辅助资源后 需要批量反馈,则将在步骤(3)中生成的所述辅助资源使用日志的状态设置 为“未反馈”,并随后周期性地将状态为“未反馈”的辅助资源使用日志批量传送到 所述数据处理服务器2,并将已传送的辅助资源使用日志的状态设置为“已反 馈”。
如图1所示,本发明公开了一种数据处理服务器2,所述数据处理服务器2 通过与安全性信息交互终端1的数据交互完成安全性信息交互过程以及与所述 安全性信息交互过程相关联的操作。
优选地,在本发明所公开的数据处理服务器2中,所述与所述安全性信息 交互过程相关联的操作包括针对一个或多个辅助资源(例如优惠券)的操作。
优选地,本发明所公开的数据处理服务器2在接收到来自所述安全性信息 交互终端1的登录请求后基于预定的规则构造响应结果,并将所述响应结果传 送回所述安全性信息交互终端1,其中,所述响应结果包括配置参数以及可用 的辅助资源的列表(例如一个或多个可用的优惠券的列表)。
优选地,在本发明所公开的数据处理服务器2中,所述可用的辅助资源的 列表中的每个记录包含所对应的一个可用的辅助资源的信息。
示例性地,在本发明所公开的数据处理服务器2中,所述可用的辅助资源 的列表中的每个记录至少包含下列项中的一个或多个:辅助资源标识符(例如 优惠券标识符)、辅助资源类型(例如优惠券类型)、辅助资源有效期(例如优 惠券有效期)、辅助资源使用性质(例如优惠券的抵扣金额或折扣比列)以及 筛选规则。
优选地,在本发明所公开的数据处理服务器2中,所述配置参数至少包括 下列项中的一个或多个:辅助资源功能开关、用户确认开关、附加信息输入开 关、打印开关、辅助资源获取后反馈方式指示符、辅助资源使用条件。
优选地,本发明所公开的数据处理服务器2在接收到来自所述安全性信息 交互终端1的辅助资源使用日志后针对每个辅助资源使用日志执行如下操作: (1)确定该辅助资源使用日志所包含的一个或多个辅助资源的信息中是否包含 筛选规则,并且如果包含筛选规则,则进入步骤(2)以执行附加的评估操作, 而如果不包含筛选规则,则进入步骤(3);(2)确定相关的安全性信息交互过 程的信息以及与其相关联的一个或多个辅助资源的信息是否满足预先确定的 筛选规则(例如通过用户配置的方式预先确定所述筛选规则,以支付交易和与 其相关联的优惠券为例,筛选过程可以如下:该支付交易是否使用了银行卡, 如果使用了银行卡,且满足相关条件,如商户在后端系统配置的优惠活动或已 获取的优惠券表明可通过交易频度或累计金额等方式获取优惠,则检索该卡在 指定时间范围内的交易频度或累计金额是否满足预定的要求),并且如果满足 筛选规则,则记录相关信息并通知(例如通过短信或电子邮件的方式)相关用 户,随后进入步骤(3);(3)储存该辅助资源使用日志并划分该辅助资源使用 日志的类别以供相关方检索,并实施与该辅助资源使用日志相关联的后续操作 (例如实际实施优惠券的使用)。
图2是根据本发明的实施例的安全性信息交互方法的流程图。如图2所示, 本发明所公开的安全性信息交互方法包括下列步骤:(A1)安全性信息交互终 端(例如POS机)基于来自用户的安全性信息交互指令并通过与外部安全载 体(例如银行卡)和数据处理服务器的数据交互完成安全性信息交互过程(例 如支付交易操作);(A2)所述安全性信息交互终端在所述安全性信息交互过 程完成之后通过与所述数据处理服务器的数据交互自动地执行与所述安全性 信息交互过程相关联的操作。
优选地,在本发明所公开的安全性信息交互方法中,所述与所述安全性信 息交互过程相关联的操作包括针对一个或多个辅助资源(例如优惠券)的操作。
优选地,在本发明所公开的安全性信息交互方法中,所述安全性信息交互 终端在启动时执行初始化操作,所述初始化操作包括:基于来自用户(例如操 作人员)的输入构造登录请求并将所述登录请求传送到所述数据处理服务器; 接收来自所述数据处理服务器的响应结果以完成登录过程(例如签到过程), 其中,所述响应结果包括配置参数以及可用的辅助资源的列表(例如一个或多 个可用的优惠券的列表)。
优选地,在本发明所公开的安全性信息交互方法中,所述数据处理服务器 在接收到来自所述安全性信息交互终端的登录请求后基于预定的规则构造响 应结果,并将所述响应结果传送回所述安全性信息交互终端,其中,所述响应 结果包括配置参数以及可用的辅助资源的列表(例如一个或多个可用的优惠券 的列表)。
优选地,在本发明所公开的安全性信息交互方法中,所述可用的辅助资源 的列表中的每个记录包含所对应的一个可用的辅助资源的信息。
示例性地,在本发明所公开的安全性信息交互方法中,所述可用的辅助资 源的列表中的每个记录至少包含下列项中的一个或多个:辅助资源标识符(例 如优惠券标识符)、辅助资源类型(例如优惠券类型)、辅助资源有效期(例如 优惠券有效期)、辅助资源使用性质(例如优惠券的抵扣金额或折扣比列)以 及筛选规则。
优选地,在本发明所公开的安全性信息交互方法中,所述配置参数至少包 括下列项中的一个或多个:辅助资源功能开关、用户确认开关、附加信息输入 开关、打印开关、辅助资源获取后反馈方式指示符、辅助资源使用条件。
优选地,在本发明所公开的安全性信息交互方法中,所述步骤(A1)进 一步包括:所述安全性信息交互终端接收来自用户的安全性信息交互指令,其 中所述安全性信息交互指令包含待执行的安全性信息交互过程的信息(例如支 付交易的信息);所述安全性信息交互终端基于接收到的所述安全性信息交互 指令与所述外部安全载体(例如银行卡)进行数据交互并构造安全性信息交互 请求,以及将所述安全性信息交互请求传送到所述数据处理服务器以完成安全 性信息交互过程。
优选地,在本发明所公开的安全性信息交互方法中,所述步骤(A2)进 一步包括:在所述安全性信息交互过程完成之后,所述安全性信息交互终端根 据所述配置参数中的辅助资源功能开关(即辅助资源的使用功能是否开启)和 辅助资源使用条件(例如允许的支付交易的类型和支付交易起始金额)确定是 否进行行为分析操作,并且如果确定需要进行行为分析操作,则以如下方式执行 行为分析操作:将所述已完成的安全性信息交互过程的信息(例如已完成的支 付交易的信息)逐项地与所述可用的辅助资源的列表中的每个记录进行比较, 并且如果所述已完成的安全性信息交互过程的信息与所述可用的辅助资源的 列表中的记录的相关信息相匹配(例如支付交易的类型相匹配),则该记录所 对应的辅助资源被选取;如果一个或多个辅助资源被选取(例如可以选取一个或 者多个不同类型的优惠券),则执行关联操作实施过程以实现针对所选取的辅助 资源的操作(例如优惠券的使用)。
优选地,在本发明所公开的安全性信息交互方法中,所述关联操作实施过 程包括:(1)如果所述配置参数中的用户确认开关指示需要用户确认过程,则 提示用户确认是否使用所选取的一个或多个辅助资源,并且如果用户确认使用 所选取的一个或多个辅助资源,则进入步骤(2),否则,终止关联操作实施过 程;(2)如果所述配置参数中的附加信息输入开关指示需要收集用户的附加信 息(例如手机号),则提示用户输入所述附加信息,并且如果输入成功,则进 入步骤(3),否则,终止关联操作实施过程;(3)将所选取的一个或多个辅助 资源的信息以及所述已完成的安全性信息交互的信息记录在辅助资源使用日 志中,并且如果所选取的一个或多个辅助资源所对应的记录中的至少一个包含 筛选规则(例如行为筛选条件和/或用户筛选条件,示例性地,所述行为筛选 条件可以包括用户列表、时间范围、门限金额、累积金额以及交易额度等,所 述用户筛选条件可以包括下列项:无限制、排序(即根据名额限制实行先到先 得)、以及随机(即实现抽奖的模式)),则提示用户该记录所对应的辅助资源 的使用需要进行所述数据处理服务器执行的附加的评估操作;(4)如果所述配 置参数中的打印开关指示需要打印所述已完成的安全性信息交互的信息以及 与其相关联的所述选取的一个或多个辅助资源的信息,则通过打印机打印所述 已完成的安全性信息交互的信息和与其相关联的所述选取的一个或多个辅助 资源的信息以及相关的提示信息;(5)如果所述配置参数中的辅助资源获取后 反馈方式指示符指示选取一个或多个辅助资源后需要联机反馈,则将在步骤 (3)中生成的所述辅助资源使用日志传送到所述数据处理服务器并将在步骤 (3)中生成的所述辅助资源使用日志的状态设置为“已反馈”,而如果所述配置 参数中的辅助资源获取后反馈方式指示符指示选取一个或多个辅助资源后需 要批量反馈,则将在步骤(3)中生成的所述辅助资源使用日志的状态设置为“未 反馈”,并随后周期性地将状态为“未反馈”的辅助资源使用日志批量传送到所述 数据处理服务器,并将已传送的辅助资源使用日志的状态设置为“已反馈”。
优选地,在本发明所公开的安全性信息交互方法中,所述步骤(A2)进 一步包括:所述数据处理服务器在接收到辅助资源使用日志后针对每个辅助资 源使用日志执行如下操作:(1)确定该辅助资源使用日志所包含的一个或多个 辅助资源的信息中是否包含筛选规则,并且如果包含筛选规则,则进入步骤(2) 以执行附加的评估操作,而如果不包含筛选规则,则进入步骤(3);(2)确定 相关的安全性信息交互过程的信息以及与其相关联的一个或多个辅助资源的 信息是否满足预先确定的筛选规则(例如通过用户配置的方式预先确定所述筛 选规则,以支付交易和与其相关联的优惠券为例,筛选过程可以如下:该支付 交易是否使用了银行卡,如果使用了银行卡,且满足相关条件,如商户在后端 系统配置的优惠活动或已获取的优惠券表明可通过交易频度或累计金额等方 式获取优惠,则检索该卡在指定时间范围内的交易频度或累计金额是否满足预 定的要求),并且如果满足筛选规则,则记录相关信息并通知(例如通过短信 或电子邮件的方式)相关用户,随后进入步骤(3);(3)储存该辅助资源使用 日志并划分该辅助资源使用日志的类别以供相关方检索,并实施与该辅助资源 使用日志相关联的后续操作(例如实际实施优惠券的使用)。
由上可见,本发明所公开的安全性信息交互方法具有下列优点:(1)能够 实时地和/或自动地使用与特定的安全性信息交互相关联的辅助资源;(2)操 作简便并且时间消耗和成本较低。
尽管本发明是通过上述的优选实施方式进行描述的,但是其实现形式并不 局限于上述的实施方式。应该认识到:在不脱离本发明主旨和范围的情况下, 本领域技术人员可以对本发明做出不同的变化和修改。

Claims (14)

  1. 一种安全性信息交互系统,所述安全性信息交互系统包括:
    安全性信息交互终端,所述安全性信息交互终端基于来自用户的安全性信 息交互指令并通过与外部安全载体和数据处理服务器的数据交互完成安全性 信息交互过程,并且在所述安全性信息交互过程完成之后自动地执行与所述安 全性信息交互过程相关联的操作;
    数据处理服务器,所述数据处理服务器通过与所述安全性信息交互终端的 所述数据交互完成所述安全性信息交互过程以及所述与所述安全性信息交互 过程相关联的操作。
  2. 根据权利要求1所述的安全性信息交互系统,其特征在于,所述与所述 安全性信息交互过程相关联的操作包括针对一个或多个辅助资源的操作。
  3. 根据权利要求2所述的安全性信息交互系统,其特征在于,所述安全性 信息交互终端在启动时执行初始化操作,所述初始化操作包括:基于来自用户 的输入构造登录请求并将所述登录请求传送到所述数据处理服务器;接收来自 所述数据处理服务器的响应结果以完成登录过程,其中,所述响应结果包括配 置参数以及可用的辅助资源的列表。
  4. 根据权利要求3所述的安全性信息交互系统,其特征在于,所述数据处 理服务器在接收到来自所述安全性信息交互终端的登录请求后基于预定的规 则构造响应结果,并将所述响应结果传送回所述安全性信息交互终端,其中, 所述响应结果包括配置参数以及可用的辅助资源的列表。
  5. 根据权利要求4所述的安全性信息交互系统,其特征在于,所述可用的 辅助资源的列表中的每个记录包含所对应的一个可用的辅助资源的信息。
  6. 根据权利要求5所述的安全性信息交互系统,其特征在于,所述可用的 辅助资源的列表中的每个记录至少包含下列项中的一个或多个:辅助资源标识 符、辅助资源类型、辅助资源有效期、辅助资源使用性质以及筛选规则。
  7. 根据权利要求6所述的安全性信息交互系统,其特征在于,所述配置参 数至少包括下列项中的一个或多个:辅助资源功能开关、用户确认开关、附加 信息输入开关、打印开关、辅助资源获取后反馈方式指示符、辅助资源使用条 件。
  8. 根据权利要求7所述的安全性信息交互系统,其特征在于,所述安全性 信息交互终端进一步包括:
    用户接口,所述用户接口接收来自用户的安全性信息交互指令并将所述安 全性信息交互指令传送到安全性信息交互处理装置,其中所述安全性信息交互 指令包含待执行的安全性信息交互过程的信息;
    安全性信息交互处理装置,所述安全性信息交互处理装置基于接收到的所 述安全性信息交互指令经由通信接口与所述外部安全载体进行数据交互并构 造安全性信息交互请求,以及经由所述通信接口将所述安全性信息交互请求传 送到所述数据处理服务器以完成安全性信息交互过程;
    关联操作处理装置,所述关联操作处理装置在所述安全性信息交互过程完 成之后自动地执行与所述安全性信息交互过程相关联的操作;
    通信接口,所述通信接口执行所述安全性信息交互终端与所述外部安全载 体之间以及所述安全性信息交互终端与所述数据处理服务器之间的数据通信。
  9. 根据权利要求8所述的安全性信息交互系统,其特征在于,在所述安全 性信息交互过程完成之后,所述关联操作处理装置根据所述配置参数中的辅助 资源功能开关和辅助资源使用条件确定是否进行行为分析操作,并且如果确定 需要进行行为分析操作,则以如下方式执行行为分析操作:将所述已完成的安全 性信息交互过程的信息逐项地与所述可用的辅助资源的列表中的每个记录进 行比较,并且如果所述已完成的安全性信息交互过程的信息与所述可用的辅助 资源的列表中的记录的相关信息相匹配,则该记录所对应的辅助资源被选取;如 果一个或多个辅助资源被选取,则执行关联操作实施过程以实现针对所选取的 辅助资源的操作。
  10. 根据权利要求9所述的安全性信息交互系统,其特征在于,所述关联 操作实施过程包括:(1)如果所述配置参数中的用户确认开关指示需要用户确 认过程,则提示用户确认是否使用所选取的一个或多个辅助资源,并且如果用 户确认使用所选取的一个或多个辅助资源,则进入步骤(2),否则,终止关联 操作实施过程;(2)如果所述配置参数中的附加信息输入开关指示需要收集用 户的附加信息,则提示用户输入所述附加信息,并且如果输入成功,则进入步 骤(3),否则,终止关联操作实施过程;(3)将所选取的一个或多个辅助资源 的信息以及所述已完成的安全性信息交互的信息记录在辅助资源使用日志中, 并且如果所选取的一个或多个辅助资源所对应的记录中的至少一个包含筛选 规则,则提示用户该记录所对应的辅助资源的使用需要进行所述数据处理服务 器2执行的附加的评估操作;(4)如果所述配置参数中的打印开关指示需要打 印所述已完成的安全性信息交互的信息以及与其相关联的所述选取的一个或 多个辅助资源的信息,则通过打印机打印所述已完成的安全性信息交互的信息 和与其相关联的所述选取的一个或多个辅助资源的信息以及相关的提示信息; (5)如果所述配置参数中的辅助资源获取后反馈方式指示符指示选取一个或多 个辅助资源后需要联机反馈,则将在步骤(3)中生成的所述辅助资源使用日 志传送到所述数据处理服务器并将在步骤(3)中生成的所述辅助资源使用日 志的状态设置为“已反馈”,而如果所述配置参数中的辅助资源获取后反馈方式 指示符指示选取一个或多个辅助资源后需要批量反馈,则将在步骤(3)中生 成的所述辅助资源使用日志的状态设置为“未反馈”,并随后周期性地将状态为 “未反馈”的辅助资源使用日志批量传送到所述数据处理服务器,并将已传送的 辅助资源使用日志的状态设置为“已反馈”。
  11. 根据权利要求10所述的安全性信息交互系统,其特征在于,所述数 据处理服务器在接收到辅助资源使用日志后针对每个辅助资源使用日志执行 如下操作:(1)确定该辅助资源使用日志所包含的一个或多个辅助资源的信息 中是否包含筛选规则,并且如果包含筛选规则,则进入步骤(2)以执行附加 的评估操作,而如果不包含筛选规则,则进入步骤(3);(2)确定相关的安全 性信息交互过程的信息以及与其相关联的一个或多个辅助资源的信息是否满 足预先确定的筛选规则,并且如果满足筛选规则,则记录相关信息并通知相关 用户,随后进入步骤(3);(3)储存该辅助资源使用日志并划分该辅助资源使 用日志的类别以供相关方检索,并实施与该辅助资源使用日志相关联的后续操 作。
  12. 一种安全性信息交互终端,所述安全性信息交互终端基于来自用户的 安全性信息交互指令并通过与外部安全载体和数据处理服务器的数据交互完 成安全性信息交互过程,并且在所述安全性信息交互过程完成之后自动地执行 与所述安全性信息交互过程相关联的操作。
  13. 一种数据处理服务器,所述数据处理服务器通过与安全性信息交互终 端的数据交互完成安全性信息交互过程以及与所述安全性信息交互过程相关 联的操作。
  14. 一种安全性信息交互方法,所述安全性信息交互方法包括下列步骤:
    (A1)安全性信息交互终端基于来自用户的安全性信息交互指令并通过与 外部安全载体和数据处理服务器的数据交互完成安全性信息交互过程;
    (A2)所述安全性信息交互终端在所述安全性信息交互过程完成之后通 过与所述数据处理服务器的数据交互自动地执行与所述安全性信息交互过程 相关联的操作。
PCT/CN2014/074508 2013-04-02 2014-04-01 安全性信息交互系统、设备及方法 WO2014161466A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310112101.3 2013-04-02
CN201310112101.3A CN104102998A (zh) 2013-04-02 2013-04-02 安全性信息交互系统、设备及方法

Publications (1)

Publication Number Publication Date
WO2014161466A1 true WO2014161466A1 (zh) 2014-10-09

Family

ID=51657598

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/074508 WO2014161466A1 (zh) 2013-04-02 2014-04-01 安全性信息交互系统、设备及方法

Country Status (4)

Country Link
CN (1) CN104102998A (zh)
HK (1) HK1202963A1 (zh)
TW (1) TW201502840A (zh)
WO (1) WO2014161466A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751350A (zh) * 2015-03-12 2015-07-01 广东欧珀移动通信有限公司 一种信息显示方法及终端

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631371A (zh) * 2014-11-25 2016-06-01 南京斯代尔网络科技有限公司 安全性信息交互系统、设备及方法
CN107135194B (zh) * 2017-02-09 2021-02-02 中国银联股份有限公司 安全性信息交互方法及设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080147496A1 (en) * 2006-12-19 2008-06-19 General Electric Company System and method for providing promotions
CN102831740A (zh) * 2012-09-10 2012-12-19 北京融通远景科技发展有限公司 金融类红包电子券系统
CN102831534A (zh) * 2011-06-15 2012-12-19 郑幸鲲 电子购物券发布和效验系统及方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202632204U (zh) * 2012-01-11 2012-12-26 上海超易金融信息技术有限公司 安全性信息交互设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080147496A1 (en) * 2006-12-19 2008-06-19 General Electric Company System and method for providing promotions
CN102831534A (zh) * 2011-06-15 2012-12-19 郑幸鲲 电子购物券发布和效验系统及方法
CN102831740A (zh) * 2012-09-10 2012-12-19 北京融通远景科技发展有限公司 金融类红包电子券系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751350A (zh) * 2015-03-12 2015-07-01 广东欧珀移动通信有限公司 一种信息显示方法及终端

Also Published As

Publication number Publication date
HK1202963A1 (zh) 2015-10-09
TW201502840A (zh) 2015-01-16
CN104102998A (zh) 2014-10-15

Similar Documents

Publication Publication Date Title
US10102528B2 (en) Provisioning account numbers and cryptographic tokens
WO2017129083A1 (zh) 消息处理方法、装置、系统和计算机存储介质
US20210192502A1 (en) Secure account creation
US8977568B1 (en) Anonymous mobile payments
EP3079326B1 (en) Network payment method, apparatus and system
CN103246977A (zh) 一种电视支付信息发送、接收方法
CA2584143A1 (en) A method and system for regulating electronic mail
US20140156785A1 (en) Method and Apparatus for Generating User Notifications
JP5783960B2 (ja) 情報処理装置、情報処理方法、情報処理システム、及び、プログラム
CN108228363A (zh) 一种消息发送方法及装置
CN104767714A (zh) 一种关联用户资源信息的方法、终端及系统
CN105427169A (zh) 用于资源转移的安全性信息交互方法
US20160098699A1 (en) User-friendly mobile payments system
CN106961416A (zh) 资源的生成方法及装置
CN104166908B (zh) 支付方法及支付系统
WO2014161466A1 (zh) 安全性信息交互系统、设备及方法
KR20070020187A (ko) 전자거래를 수행하는 방법
CN102567908A (zh) 一种基于电子商务的数据处理方法及系统
KR101138938B1 (ko) 무선 단말을 이용한 금융서비스 제공 방법 및 금융서비스 서버
CN111311395B (zh) 公积金冲还贷业务的管理系统、方法、设备及存储介质
US20170187726A1 (en) Cross-domain message authentication
CN106656726B (zh) 一种业务处理方法和装置
WO2014048319A1 (zh) 安全性信息交互系统、设备及方法
CN107613496A (zh) 排号方法、系统及认证服务器
TWM530440U (zh) 交易認證系統

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14778565

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 22/01/2016 )

122 Ep: pct application non-entry in european phase

Ref document number: 14778565

Country of ref document: EP

Kind code of ref document: A1