WO2015103886A1 - Procédé, terminal, serveur et système de transfert de valeur numérique - Google Patents
Procédé, terminal, serveur et système de transfert de valeur numérique Download PDFInfo
- Publication number
- WO2015103886A1 WO2015103886A1 PCT/CN2014/085395 CN2014085395W WO2015103886A1 WO 2015103886 A1 WO2015103886 A1 WO 2015103886A1 CN 2014085395 W CN2014085395 W CN 2014085395W WO 2015103886 A1 WO2015103886 A1 WO 2015103886A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- graphic code
- user
- encrypted key
- request
- server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Definitions
- This application relates to the field of information processing technologies, and in particular, to a numerical value transferring method, terminal, server, and system.
- a user During online shopping, a user needs to input a bank card account of the user and then input a dynamic password, so as to implement online numerical value transferring, that is, a numerical value determined by the user is transferred from the bank card account of the user.
- the sound-wave based technology refers to a technology for transferring a numerical value using a sound wave. For example, when a user buys a commodity in a vending machine by using a mobile phone, the mobile phone broadcasts an ultrasonic wave. After receiving the sound wave, the vending machine automatically performs processing the user inputs and the password of the user of the mobile phone, and the vending machine dispenses the commodity.
- a method for generating a graphic code for an offline transaction is performed by a portable electronic device with display, memory and one or more processors.
- the method includes receiving a request to make an offline payment; and generating a graphic code using an encrypted key that corresponds to an account number of a user of the portable electronic device.
- the graphic code stores information identifying the encrypted key.
- the method also includes displaying the graphic code for visually transmitting the graphic code to a payee device that is distinct and separate from the portable electronic device.
- a portable electronic device for generating a graphic code for an offline transaction includes display, one or more processors, and memory storing one or more programs for execution by the one or more processors.
- the one or more programs including instructions for receiving a request to make an offline payment; and generating a graphic code using an encrypted key that corresponds to an account number of a user of the portable electronic device.
- the graphic code stores information identifying the encrypted key.
- the one or more programs also include instructions for displaying the graphic code for visually transmitting the graphic code to a payee device that is distinct and separate from the portable electronic device.
- a computer readable storage medium stores one or more programs for execution by one or more processors of a portable electronic device.
- the one or more programs include instructions for receiving a request to make an offline payment; and generating a graphic code using an encrypted key that corresponds to an account number of a user of the portable electronic device.
- the graphic code stores information identifying the encrypted key.
- the one or more programs also include instructions for displaying the graphic code for visually transmitting the graphic code to a payee device that is distinct and separate from the portable electronic device.
- Figure 1 is a schematic diagram of a method of a numerical value transfer according to some embodiments.
- Figure 2 is a schematic diagram of a method of a numerical value transfer according to some embodiments.
- Figure 3 is a schematic diagram of a method of a numerical value transfer according to some embodiments.
- Figure 4 is a schematic diagram of a terminal according to some embodiments.
- Figure 5 is a schematic diagram of a terminal according to some embodiments.
- Figure 6 is a schematic diagram of a terminal according to some embodiments.
- Figure 7 is a schematic diagram of a server according to some embodiments.
- Figure 8 is a schematic diagram of a server according to some embodiments.
- Figure 9 is a schematic diagram of a server according to some embodiments.
- Figure 10 is a schematic diagram of a terminal according some embodiments.
- Figure 11 is a schematic diagram of a server according to some embodiments.
- Figure 12 is a schematic diagram of an information processing system according to some embodiments.
- Figure 13 is a block diagram of a portable electronic device in accordance with some embodiments.
- Figure 14 illustrates a flow chart of an exemplary method for generating a graphic code in accordance with some embodiments.
- Some embodiments provide a numerical value transferring method, which can increase the speed of numerical value transferring. Some embodiments further provide a
- Figure 1 is a schematic diagram of a method of a numerical value transfer according to some embodiments. The method includes the following:
- Step S101 A first terminal obtains from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance.
- the step of obtaining from a server an encrypted key associated with a user account identifier may include: sending to the server a request for obtaining the encrypted key, where the request for obtaining the encrypted key carries the user account identifier, so that the server determines the corresponding encrypted key according to the user account identifier; and receiving the encrypted key sent by the server.
- the server generates the encrypted key according to the user account identifier.
- the first terminal can generate a graphic code by using the encrypted key.
- the graphic code may be a two-dimension code, which is safer than a graphic code that is generated with a user account. As a result, a second terminal cannot obtain the user account identifier when recognizing the graphic code.
- the graphic code is a two-dimension code
- the two- dimension code when a user needs to transfer to the second terminal a specified numerical value that is input in advance, the two- dimension code may be displayed on the first terminal, and then the second terminal transfers the specified numerical value by scanning the two-dimension code.
- Step SI 02 Generate the graphic code according to the encrypted key and information about a registered application account of the user, where the graphic code is used for numerical value transferring.
- the information about the registered application account may be about a WeChat account, and may also be about other registered application accounts.
- the graphic code may be valid within a certain time period and may also be valid only within a short time period, which can be set by the user as required.
- Step S 103 Display the graphic code when the user needs to transfer from the first terminal to the second terminal the specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- Point-of-service (POS) terminals must be added, after real-name registration and authorization, into a white list that is registered in advance. Only after this, can the POS terminals transfer a numerical value by recognizing a graphic code according to some embodiments.
- POS Point-of-service
- a first terminal obtains from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance.
- the first terminal generates a graphic code according to the encrypted key and information about a registered application account of a user, where the graphic code is used for numerical value transferring.
- the first terminal displays the graphic code when the user needs to transfer from the first terminal to a second terminal a specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- the first terminal generates the graphic code according to the encrypted key associated with the user account identifier and the information about the registered application account of the user, and then the second terminal transfers the numerical value by recognizing the graphic code. Therefore, compared with the prior art in which numerical value transferring can only be implemented by inputting a password, the speed of numerical value transferring is increased, because a manual entry of the numerical value is not needed at the time of transfer.
- the method may further include: determining whether the information about the registered application account of the user is in a user white list that is set in advance, where the user white list includes all information about registered application accounts that allows the encrypted key to be obtained.
- the step of obtaining from a server an encrypted key associated with a user account identifier includes: when the information about the registered application account of the user is in the user white list, obtaining from the server the encrypted key associated with the user account identifier.
- the user white list may also be registered in advance by the user. After authorization, the information about the registered application account of the user is added into the user white list, which is stored in the server.
- the first terminal may determine, by sending to the server a query request, whether the information about the registered application account of the user is in the user white list that is set in advance, where the information about the registered application account of the user is carried in the query request.
- the server sends a query response to the first terminal after finding the information about the registered application account of the user in the user white list, so as to notify the first terminal that the information about the registered application account of the user is in the user white list. In this way, only a user based on control by the user white list can implement offline numerical value transferring, thereby further improving the safety of offline numerical value transferring.
- FIG. 2 is a schematic diagram of a method of a numerical value transfer according to some embodiments.
- the method includes the following: [0045] Step S201 : Receive a request that is for obtaining an encrypted key and is sent by a first terminal, where the request for obtaining the encrypted key carries a user account identifier.
- Step S202 Determine the encrypted key associated with the user account identifier according to the user account identifier and an association that is between the user account identifier and the encrypted key and is established in advance.
- Step S203 Send the encrypted key to the first terminal.
- a server receives a request that is for obtaining an encrypted key and is sent by a first terminal, where the request for obtaining the encrypted key carries a user account identifier.
- the server determines the encrypted key associated with the user account identifier according to the user account identifier and an association that is between the user account identifier and the encrypted key and is established in advance.
- the server sends the encrypted key to the first terminal.
- the first terminal generates a graphic code according to the encrypted key associated with the user account identifier and information about a registered application account of a user, and then a second terminal transfers a numerical value by recognizing the graphic code. Therefore, compared with the prior art in which numerical value transferring can only be implemented by inputting a password, the speed of numerical value transferring is increased.
- the method may further include: receiving an account registering request sent by the first terminal, where the account registering request carries the user account identifier; generating the encrypted key according to the user account identifier; and establishing the association between the user account identifier and the encrypted key.
- the server When receiving the account registering request, the server generates the encrypted key according to the user account identifier. In this way, the first terminal can generate the graphic code by using the encrypted key.
- the graphic code may be a two-dimension code, which is safer than a graphic code that is generated with a user account. As a result, the second terminal cannot obtain the user account identifier when recognizing the graphic code.
- the server establishes the association between the user account identifier and the encrypted key.
- the method further includes: receiving an account revoking request sent by the first terminal, where the account revoking request carries the user account identifier; and deleting the association between the user account identifier and the encrypted key according to the user account identifier.
- the association between the user account identifier and the encrypted key may be displayed in a manner of a table, which is shown in Table 1 :
- Table 1 table of an association between a user account identifier and an encrypted key
- Figure 3 is a schematic diagram of a method of a numerical value transfer according to some embodiments.
- an application scenario is used as an example for describing an information processing process.
- Step S300 A first terminal sends to a server an account registering request, where the account registering request carries a user account identifier.
- Step S305 The server generates an encrypted key according to the user account identifier.
- the server generates the encrypted key according to the user account identifier.
- the first terminal can generate a graphic code by using the encrypted key.
- the graphic code may be a two-dimension code, which is safer than a graphic code that is generated with a user account. As a result, a second terminal cannot obtain the user account identifier when recognizing the graphic code.
- Step S310 The server establishes an association between the user account identifier and the encrypted key.
- Step S315 The first terminal sends to the server a request for obtaining the encrypted key, where the request for obtaining the encrypted key carries the user account identifier.
- the first terminal before the first terminal sends to the server the request for obtaining the encrypted key, it may be further determined whether information about a registered application account of a user is in a user white list that is set in advance, where the user white list includes all information about registered application accounts that allows the encrypted key to be obtained. [0062] When the information about the registered application account of the user is in the user white list, the first terminal sends to the server the request for obtaining the encrypted key.
- the user white list may also be registered in advance by the user. After authorization, the information about the registered application account of the user is added into the user white list, which is stored in the server.
- the first terminal may determine, by sending to the server a query request, whether the information about the registered application account of the user is in the user white list that is set in advance, where the information about the registered application account of the user is carried in the query request.
- the server sends a query response to the first terminal after finding the information about the registered application account of the user in the user white list, so as to notify the first terminal that the information about the registered application account of the user is in the user white list. In this way, only a user based on control by the user white list can implement offline numerical value transferring, thereby further improving the safety of offline numerical value transferring.
- Step S320 The server determines the encrypted key associated with the user account identifier according to the user account identifier.
- the association between the user account identifier and the encrypted key may be displayed in a manner of a table, which is shown in the foregoing Table 1.
- the server may find a corresponding encrypted key in Table 1.
- Step S325 The server sends the encrypted key to the first terminal.
- Step S330 The first terminal generates a graphic code according to the encrypted key and the information about the application registering account of the user, where the graphic code is used for numerical value transferring.
- the information about the registered application account may be a WeChat account, and may also be other registered application accounts.
- the graphic code may be valid within a certain time period and may also be valid only within a short time period, which can be set by the user as required.
- Step S335 When the user needs to transfer a specified numerical value that is input in advance, display the graphic code, so that a POS second terminal completes transferring of the specified numerical value according to the graphic code.
- Second terminals can only transfer a numerical value by recognizing a graphic code according to some embodiments when the second terminals are added, after real-name registration and authorization, into a white list that is registered in advance.
- a first terminal generates a graphic code according to an encrypted key associated with a user account identifier and information about a registered application account of a user, and then a second terminal transfers a numerical value by recognizing the graphic code. Therefore, compared with the prior art in which numerical value transferring can only be implemented by inputting a password, the speed of numerical value transferring is increased.
- Figure 4 is a schematic diagram of a terminal 40 according to some embodiments.
- the terminal 40 includes the following: an obtaining unit 401, configured to obtain from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance; a generating unit 402, configured to generate a graphic code according to the encrypted key obtained by the obtaining unit 401 and information about a registered application account of a user, where the graphic code is used for numerical value transferring; and a display unit 403, configured to display the graphic code generated by the generating unit 402 when the user needs to transfer from a first terminal to a second terminal a specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- the obtaining unit 401 obtains from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance.
- the generating unit 402 generates a graphic code according to the encrypted key obtained by the obtaining unit 401 and information about a registered application account of a user, where the graphic code is used for numerical value transferring.
- the display unit 403 displays the graphic code generated by the generating unit 402 when the user needs to transfer from a first terminal to a second terminal a specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- the terminal provided in some embodiments can generate the graphic code according to the encrypted key associated with the user account identifier and the information about the registered application account of the user, and then the second terminal transfers the numerical value by recognizing the graphic code. Therefore, compared with the prior art in which numerical value transferring can only be implemented by inputting a password, the speed of numerical value transferring is increased.
- FIG. 5 is a schematic diagram of a terminal according to some embodiments.
- the terminal 40 shown in Figure 5 is similar to the terminal 40 shown in Figure 4.
- the obtaining unit 401 includes: a sending subunit 4011, configured to send to the server a request for obtaining the encrypted key, where the request for obtaining the encrypted key carries the user account identifier, so that the server determines the corresponding encrypted key according to the user account identifier; and a receiving subunit 4012, configured to receive the encrypted key sent by the server after the sending subunit 4011 sends the request for obtaining the encrypted key.
- Figure 6 is a schematic diagram of a terminal according to some embodiments.
- the terminal 40 shown in Figure 6 is similar to the terminal 40 shown in Figure 4.
- the terminal 40 further includes a determining unit 404.
- the determining unit 404 is configured to: before the obtaining unit 401 obtains the encrypted key, determine whether the information about the registered application account of the user is in a user white list that is set in advance, where the user white list includes all information about registered application accounts that allows the encrypted key to be obtained.
- the obtaining unit 401 is configured to: when the determining unit 404 determines that the information about the registered application account of the user is in the user white list, obtain from the server the encrypted key associated with the user account identifier.
- FIG. 7 is a schematic diagram of a server 50 according to some embodiments.
- the server 50 includes a receiving unit 501, configured to receive a request that is for obtaining an encrypted key and is sent by a first terminal, where the request for obtaining the encrypted key carries a user account identifier; a determining unit 502, configured to determine the encrypted key associated with the user account identifier according to the user account identifier and an association that is between the user account identifier and the encrypted key and is established in advance; and a sending unit 503, configured to send to the first terminal the encrypted key determined by the determining unit 502.
- a receiving unit 501 receives a request that is for obtaining an encrypted key and is sent by a first terminal, where the request for obtaining the encrypted key carries a user account identifier.
- the determining unit 502 determines the encrypted key associated with the user account identifier according to the user account identifier received by the receiving unit 501 and an association that is between the user account identifier and the encrypted key and is established in advance.
- the sending unit 503 sends the encrypted key determined by the determining unit 502 to the first terminal.
- FIG. 8 is a schematic diagram of a server 50 according to some embodiments.
- the server 50 shown in Figure 8 is similar to the server 50 shown in Figure 7.
- the receiving unit 501 is further configured to receive an account registering request sent by the first terminal, where the account registering request carries the user account identifier.
- the server 50 further includes a generating unit 504, configured to generate the encrypted key according to the user account identifier received by the receiving unit 501; and an establishing unit 505, configured to establish an association between the user account identifier received by the receiving unit 501 and the encrypted key generated by the generating unit 504.
- Figure 9 is a schematic diagram of a server 50 according to some embodiments.
- the server 50 shown in Figure 9 is similar to the server 50 shown in Figure 7.
- the receiving unit 501 is further configured to receive an account revoking request sent by the first terminal, where the account revoking request carries the user account identifier.
- the server 50 further includes a deleting unit 506, configured to delete the association between the user account identifier and the encrypted key according to the user account identifier received by the receiving unit 501.
- Figure 10 is a schematic diagram of a terminal 1200 according to some embodiments.
- the terminal can be configured to implement the numerical value transferring method provided in the foregoing embodiments.
- the terminal 1200 may include an RF (Radio Frequency) circuit 110, a memory 120 including one or more computer readable storage mediums, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a Wi-Fi (wireless fidelity) module 170, a processor 180 including one or more processing cores, a power source 190, and the like.
- RF Radio Frequency
- a memory 120 including one or more computer readable storage mediums
- an input unit 130 a display unit 140
- a sensor 150 an audio circuit 160
- a Wi-Fi (wireless fidelity) module 170 the terminal structure shown in Figure 10 does not constitute a limitation on the terminal.
- the terminal may include components more or less than the components shown in Figure 10, combine some of the components, or adopt a different component arrangement.
- the RF circuit 110 may be configured to receive and send a signal during
- the RF circuit 110 After receiving downlink information of a base station, the RF circuit 110 sends the downlink information to one or more processors 180 for processing. In addition, the RF circuit 110 sends uplink data to the base station.
- the RF circuit 110 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillator, an SIM (Subscriber Identity Module) card, a transceiver, a coupler, a LNA (Low Noise Amplifier), a duplexer, and the like.
- the RF circuit 110 may further include, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillator, an SIM (Subscriber Identity Module) card, a transceiver, a coupler, a LNA (Low Noise Amplifier), a duplexer, and the like.
- the RF circuit 110 may further
- GSM Global System of Mobile communications
- GPRS General Packet Radio Service
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- LTE Long Term Evolution
- SMS Short Messaging Service
- the memory 120 may be configured to store a software program and module.
- the processor 180 performs functions and processes data by operating the software program and module stored in the memory 120.
- the memory 120 may mainly include a program storing area and a data storing area.
- the program storing area may store an operating system, an application program required by at least one function (for example, an audio playing function and a picture playing function), and the like.
- the data storing area may store data created according to use of the terminal 1200 (for example, audio data, and a phonebook) and the like.
- the memory 120 may include a highspeed random access memory, and may further include a non-volatile memory, for example, at least one disk storage device, a flash memories, or another volatile solid-state storage device.
- the memory 120 may further include a memory controller to control access of the processor 180 and the input unit 130 to the memory 120.
- the input unit 130 may be configured to receive input numerical or character information and generate keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control.
- the input unit 130 may include a touch-sensitive surface 131 and at least one other input device 132.
- the touch-sensitive surface 131 is also referred to as a touch display screen or a touch pad.
- the touch- sensitive surface 131 may collect a touch operation (for example, an operation performed by a user with any suitable object or attachment, such as a finger or a touch pen, on or near the touch-sensitive surface 131) performed by the user on or near the touch-sensitive surface 131 and drives a corresponding connecting apparatus according to a preset program.
- the touch-sensitive surface 131 may include two parts, namely, a touch detecting apparatus and a touch controller.
- the touch detecting apparatus detects a touch position of a user and a signal brought by a touch operation, and transmits the signal to the touch controller.
- the touch controller receives touch information from the touch detecting apparatus, converts the touch information to a touch point coordinate to send to the processor 180, and can receive and execute a command sent by the processor 180.
- the touch- sensitive surface 131 includes various types, such as a resistive touch- sensitive surface, a capacitive touch- sensitive surface, an infrared touch-sensitive surface, or a surface acoustic wave touch- sensitive surface.
- the input unit 130 may further include the at least one other input device 132.
- the at least one other input device 132 may include, but is not limited to, one or more of a physical keyboard, a functional key (for example, a volume control key or a switch key), a trackball, a mouse, a joystick and the like.
- the display unit 140 may be configured to display information input by a user, information provided to the user, or various graphic user interfaces of the terminal 1200, where the graphic user interfaces may include a picture, a text, an icon, a video, and any combination thereof.
- the display unit 140 may include a display panel 141.
- the display panel 141 may be configured in a form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), and the like.
- the touch- sensitive surface 131 may cover the display panel 141. After detecting a touch operation performed on or near the touch- sensitive surface 131, the touch- sensitive surface 131 transmits the touch operation to the processor 180 to determine a type of a touch event. Then, the processor 180 provides a corresponding visual output on the display panel 141 according to the type of the touch event.
- the touch- sensitive surface 131 and the display panel 141 perform input and output functions as two independent components, in some embodiments, the touch- sensitive surface 131 and the display panel 141 may be integrated to perform input and output functions.
- the terminal 1200 may further include at least one type of sensor 150, for example, a light sensor, a motion sensor, or another sensor.
- the light sensor may include an ambient light sensor and a proximity sensor.
- the ambient light sensor may adjust brightness of the display panel 141 according to brightness of ambient light.
- the proximity sensor may close the display panel 141 and/or backlight when the terminal 1200 moves near an ear.
- a gravity acceleration sensor as a type of motion sensor, can detect strength of accelerations of all directions (generally, three axes), and can detect strength and a direction of gravity in a stationary scenario.
- the gravity acceleration sensor may be configured for applications of recognizing a mobile phone position (for example, switch between portrait and landscape screens, related games, magnetometer calibration), and for related functions of vibration recognition (for example, a pedometer and knocking), and the like.
- the terminal 1200 may further be configured with other sensors, such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which is not described in detail herein.
- the audio circuit 160, a loudspeaker 161, a microphone 162 may provide an audio interface between a user and the terminal 1200.
- the audio circuit 160 may transmit an electrical signal obtained by converting received audio data to the loudspeaker 161, so that the loudspeaker 161 converts the electrical signal to a sound signal for outputting.
- the microphone 162 converts a collected sound signal to an electrical signal.
- the audio circuit 160 receives the electrical signal, converts the electrical signal to audio data, and outputs the audio data to the processor 180 for processing.
- the RF circuit 110 sends the audio data to another terminal, or outputs the audio data to the memory 120 for further processing.
- the audio circuit 160 may further include an earphone jack to provide communication between a peripheral earphone and the terminal 1200.
- Wi-Fi is a short-distance wireless transmission technology.
- the Wi-Fi module 170 enables a user to receive and send an email, browse a web page, access streaming media and the like on the terminal 1200, and provides the user with broadband Internet wireless access.
- Figure 10 shows the Wi-Fi module 170, it can be understood that the Wi-Fi module 170 is not necessarily a mandatory component of the terminal 1200, and may be omitted as needed.
- the processor 180 as a control center of the terminal 1200, is connected to all parts of a mobile phone through various interfaces and circuits, and executes various functions of the terminal 1200 and processes data by operating or executing software programs and/or modules stored in the memory 120 and invoking data stored in the memory 120, so as to perform overall monitoring on the mobile phone.
- the processor 180 may include one or more processing cores.
- the processor 180 may integrate an application processor and a modem processor.
- the application processor mainly processes an operating system, a user interface, an application program, and the like.
- the modem processor mainly processes wireless communication. It can be understood that the modem processor may also not be integrated into the processor 180.
- the terminal 1200 further includes the power source 190 (for example, a battery) that provides electricity to all components.
- the power source may be logically connected to the processor 180 by using a power source management system, which performs functions, such as charging, discharging, and power consumption management.
- the power source 190 may further include one or more of components, such as a direct current or an alternating current power source, a recharging system, a power source fault detecting circuit, a power source converter or inverter, and a power source state indicator.
- a camera, a blue tooth module, and the like may further be included in the terminal 1200, which is not described in detail herein.
- the display unit of the terminal is a touch screen display.
- the terminal further includes the memory and one or more programs, where the one or more programs are stored in the memory.
- the one or more programs configured for operating by one or more processors include instructions for performing the following operations: obtaining from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance; generating a graphic code according to the encrypted key and information about an application registering account of the user, where the graphic code is used for numerical value transferring; and displaying the graphic code when the user needs to transfer from a first terminal to a second terminal a specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- the memory of the terminal further includes instructions for performing the following operations: sending to the server a request for obtaining the encrypted key, where the request for obtaining the encrypted key carries the user account identifier, so that the server determines the corresponding encrypted key according to the user account identifier; and receiving the encrypted key sent by the server.
- the memory of the terminal further includes instructions for performing the following operations: determining whether the information about the registered application account of the user is in a user white list that is set in advance, where the user white list includes all information about registered application accounts that allows the encrypted key to be obtained; and when the information about the registered application account of the user is in the user white list, obtaining from the server the encrypted key associated with the user account identifier.
- the terminal obtains from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance.
- the terminal generates a graphic code according to the encrypted key and information about a registered application account of a user, where the graphic code is used for numerical value transferring.
- the terminal displays the graphic code when the user needs to transfer from a first terminal to a second terminal a specified numerical value that is input in advance, so that the second terminal completes transferring of the specified numerical value according to the graphic code.
- the terminal can generate the graphic code according to the encrypted key associated with the user account identifier and the information about the registered application account of the user, and then the numerical value is transferred by recognizing the graphic code, thereby increasing the speed of numerical value transferring.
- a computer readable storage medium may be the computer readable storage medium included in the memory in the foregoing embodiment, and may also be a computer readable storage medium that exists independently and is not assembled into the terminal.
- the computer readable storage medium stores one or more programs, where the one or more programs are used by one or more processors to execute a numerical value transferring method.
- the method includes: obtaining from a server an encrypted key associated with a user account identifier, where an association between the user account identifier and the encrypted key has been established in the server in advance; generating a graphic code according to the encrypted key and information about an application registering account of the user, where the graphic code is used for numerical value transferring; and when the user needs to transfer a specified numerical value that is input in advance, displaying the graphic code, so that a POS second terminal completes transferring of the specified numerical value according to the graphic code.
- the step of obtaining from a server an encrypted key associated with a user account identifier includes: sending to the server a request for obtaining the encrypted key, where the request for obtaining the encrypted key carries the user account identifier, so that the server determines the corresponding encrypted key according to the user account identifier; and receiving the encrypted key sent by the server.
- the method further includes: determining whether the information about the registered application account of the user is in a user white list that is set in advance, where the user white list includes all information about registered application accounts that allows the encrypted key to be obtained.
- the step of obtaining from a server an encrypted key associated with a user account identifier includes: when the information about the registered application account of the user is in the user white list, obtaining from the server the encrypted key associated with the user account identifier.
- FIG 11 is a schematic structural diagram of a server 50 according to some embodiments.
- the server 50 may include an input device 510, an output device 520, a processor 530, and a memory 540.
- the memory 540 may include a read-only memory and a random access memory, and provides an instruction and data for the processor 530.
- a part of the memory 540 may further include a non-volatile random access memory (NVRAM).
- NVRAM non-volatile random access memory
- the memory 540 stores the following elements, which may execute a module, a data structure, a set of them, or an extension set of them: an operating instruction: including various operating instructions and used to implement various operations; and an operating system: including various system programs and used to implement various basic services and process a task that is based on hardware.
- the processor 530 executes, by invoking the operating instruction (the operating instruction may be stored in an operating system) stored by the memory 540, the following operations: receiving, by the input device 510, a request that is for obtaining an encrypted key and is sent by a first terminal, where the request for obtaining the encrypted key carries a user account identifier; determining the encrypted key associated with the user account identifier according to the user account identifier and an association that is between the user account identifier and the encrypted key and is established in advance; and sending, by the output device 520, the encrypted key to the first terminal.
- the operating instruction may be stored in an operating system
- the server 50 can enable the first terminal generate a graphic code according to the encrypted key associated with the user account identifier and information about a registered application account of a user, and then the numerical value is transferred by recognizing the graphic code, thereby increasing the speed of numerical value transferring.
- the processor 530 controls an operation of the server 50, and the processor 530 may also be referred to as a central processing unit (CPU).
- the memory 540 may include a read-only memory and a random access memory, and provides an instruction and data to the processor 530.
- a part of the memory 540 may further include a non-volatile random access memory (NVRAM).
- NVRAM non-volatile random access memory
- all components of the server 50 are coupled by using a bus system 550, and besides a data bus, the bus system 550 may further include a power source bus, a control bus, a state signal bus, and the like. However, for ease of clear description, all types of buses in the diagram are marked as the bus system 550.
- the method disclosed in the foregoing embodiments may be performed by the processor 530, or in other words, may be implemented by the processor 530.
- the processor 530 may be an integrated circuit chip and has a signal processing capability. In an implementation process, steps in the method may be implemented by a hardware integrated logic circuit in the processor 530, or an instruction in the form of software.
- the processor 530 may be a general process unit, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), another programmable logic component, a discrete gate or a transistor logic device, or a discrete hardware component.
- DSP digital signal processor
- ASIC application-specific integrated circuit
- FPGA field-programmable gate array
- the processor 530 may implement or execute all methods, steps, and logic diagrams disclosed herein.
- the general process unit may be a micro-processor, or any conventional processor.
- the steps in the methods disclosed herein may be directly implemented by a hardware decoding processor, or may be implemented by combining hardware and software modules in a decoding processor.
- the software module may be located in a mature storage medium in the field, such as a random access memory, a flash memory, a read only memory, a programmable read only memory, an electrically erasable programmable memory, or a register.
- the storage medium is located in the memory 540, and the processor 530 reads information in the memory 540 and implements the foregoing steps in combination with hardware of the processor 530.
- the input device 510 is configured to receive an account registering request sent by the first terminal, where the account registering request carries the user account identifier.
- the processor 530 is configured to generate the encrypted key according to the user account identifier, and establish the association between the user account identifier and the encrypted key.
- the input device 510 is configured to receive an account revoking request sent by the first terminal, where the account revoking request carries the user account identifier.
- the processor 530 is configured to delete the association between the user account identifier and the encrypted key according to the user account identifier.
- Figure 12 is a schematic diagram of an information processing system according to some embodiments.
- the information processing system provided includes: a first terminal 40, a POS second terminal 60, and a server 50.
- the server 50 is configured to receive a request that is for obtaining the encrypted key and is sent by the first terminal, where the request for obtaining the encrypted key carries a user account identifier; determine the encrypted key associated with the user account identifier according to the user account identifier and an association that is between the user account identifier and the encrypted key and is established in advance; and send the encrypted key to the first terminal.
- the first terminal 40 is configured to obtain from the server the encrypted key associated with the user account identifier, where the association between the user account identifier and the encrypted key has been established in the server in advance; generate a graphic code according to the encrypted key and information about a registered application account of a user; where the graphic code is used for numerical value transferring; and display the graphic code when the user needs to transfer from the first terminal to a second terminal a specified numerical value that is input in advance.
- the second terminal 60 completes transferring of the specified numerical value according to the graphic code displayed by the first terminal.
- a first terminal can generate a graphic code according to an encrypted key associated with a user account identifier and information about a registered application account of a user, and then a second terminal transfers a numerical value by recognizing the graphic code. Therefore, compared with the prior art in which numerical value transferring can only be implemented by inputting a password, the speed of numerical value transferring is increased.
- Figure 13 is a block diagram of a portable electronic device 1300 in accordance with some embodiments. In some embodiments, the electronic device 1300 corresponds to the terminal 40 described above with respect to Figures 4-6.
- the device 1300 includes one or more processing units (also called herein “processors”) 1302, memory 1304, an input/output (I/O) interface 1306, and a network communications interface 1308. These components communicate with one another over one or more communication buses or signal lines 1310.
- the memory 1304, or the computer readable storage media of memory 1304 stores programs, modules, instructions, and data structures including all or a subset of: an operating system 1312, an I/O module 1314, a
- the one or more processors 1302 are coupled to the memory 1304 and operable to execute these programs, modules, and instructions, and reads/writes from/to the data structures.
- the processing units 1302 include one or more microprocessors, such as a single core or multi-core microprocessor. In some embodiments, the processing units 1302 include one or more general purpose processors. In some embodiments, the processing units 1302 include one or more special purpose processors.
- the memory 1304 includes high-speed random access memory, such as DRAM, SRAM, DDR RAM or other random access solid state memory devices.
- the memory 1304 includes non- volatile memory, such as one or more magnetic disk storage devices, optical disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
- the memory 1304 includes one or more storage devices remotely located from the processing units 1302.
- the memory 1304, or alternately the non- volatile memory device(s) within the memory 1304, comprises a computer readable storage medium.
- the memory 1304 comprises a non-transitory computer readable storage medium.
- the I/O interface 1306 couples one or more input/output devices, such as one or more displays, keyboards, touch-sensitive surfaces (such as a track pad or a touch-sensitive surface of the touch- sensitive display), speakers, and microphones, to the I/O module 1314 of the device 1300.
- the I/O interface 1306 and the I/O module 1314 also present outputs (e.g., sounds, images, text, etc.) to the user according to various program instructions implemented on the device 1300.
- the portable electronic device includes a display.
- the display is a touch-sensitive display.
- the network communications interface 1308 includes wired communication port(s) and/or wireless transmission and reception circuitry. The wired
- the communication port(s) receive and send communication signals via one or more wired interfaces, e.g., Ethernet, Universal Serial Bus (USB), FIREWIRE, etc.
- the wireless circuitry receives and sends RF signals and/or optical signals from/to communications networks and other communications devices.
- the wireless communications may use any of a plurality of communications standards, protocols and technologies, such as GSM, EDGE, CDMA, TDMA, Bluetooth, Wi-Fi, VoIP, Wi- MAX, or any other suitable communication protocol.
- the network communications interface 1308 enables communication between the device 1300 with networks, such as the Internet, an intranet and/or a wireless network, such as a cellular telephone network, a wireless local area network (LAN) and/or a metropolitan area network (MAN), and other devices.
- the communications module 1316 facilitates communications between the device 1300 and other devices (e.g., the payment server 2 illustrated in Figure 11) over the network communications interface 1308.
- the operating system 1312 e.g., Darwin, RTXC, LINUX,
- UNIX, OS X, WINDOWS, iOS, Android, or an embedded operating system such as VxWorks includes various software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage device control, power management, etc.) and facilitates communications between various hardware, firmware, and software components.
- general system tasks e.g., memory management, storage device control, power management, etc.
- the device 1300 is only one example, and that the device 1300 may have more or fewer components than shown, may combine two or more components, or may have a different configuration or arrangement of the components.
- the various components shown in Figure 13 may be implemented in hardware, software, firmware, including one or more signal processing and/or application specific integrated circuits, or a combination of thereof.
- the payment application 1320 stored in the memory 1304 includes the following modules or a subset or a superset thereof:
- User Input Module 1322 configured for receiving a user input (e.g., user selection of a user interface element that initiates an offline payment);
- Graphic Code Generation Module 1324 configured for generating a graphic code using an encrypted key that corresponds to an account number of a user of the device 1300;
- Graphic Code Display Module 1326 configured for displaying the graphic code for visually transmitting the graphic code to a payee device
- Server Request Module 1330 configured for sending to a server a request for the encrypted key
- Key Receiving Module 1332 configured for receiving the encrypted key from the server.
- Graphic Code Display Module 1326 includes User Interface Module 1328 configured for displaying user interfaces of the payment application 1320, such as a payment user interface (e.g., a user interface that includes a user interface element that initiates an offline payment).
- User Interface Module 1328 includes Graphic Code Display Module 1326.
- the memory 1304 stores user account information 1334 (e.g., an account number, such as a credit card account number, of a user of the device 1300).
- the memory 1304 stores encrypted key 1336 received from the server.
- the memory 1304 stores a graphic code 1338.
- Figure 14 illustrates a flow chart of an exemplary method 1400 for generating a graphic code in accordance with some embodiments.
- the method is performed by a portable electronic device (e.g., the first terminal 40 shown in Figure 12 or the portable electronic device 1300 shown in Figure 13) with display, memory and one or more processors.
- the device prior to receiving the request to make an offline payment, displays (1402) a payment user interface.
- An exemplary payment user interface includes an amount of payment, payee information, and a user interface element (e.g., a button labeled "Pay").
- the exemplary payment user interface may also include information about merchandise or service for which payment is to be made.
- the request to make an offline payment is received while displaying the payment user interface.
- the payment user interface is displayed on a touch- sensitive display.
- the device receives (1404) a request to make an offline payment. For example, in some embodiments, a user of the device activates the user interface element that initiates a payment process by touching the user interface element on the touch- sensitive display.
- the device prior to generating the graphic code, sends (1406) a request for an encrypted key to a server (e.g., the server 50 shown in Figure 12) that is located remotely from the portable electronic device; and, in response to sending the request, receives the encrypted key from the server.
- a server e.g., the server 50 shown in Figure 12
- the encrypted key has a predefined lifetime (e.g., 5 minutes, 10 minutes, 30 minutes, etc.). This prevents a subsequent user of the encrypted key by a malicious third-party for unauthorized transactions.
- sending the request for the encrypted key includes (1408) sending to the server an account number of a user of the portable electronic device 1300.
- the device sends the account number of the user that has been stored in the portable electronic device 1300 prior to receiving the request to make an offline payment.
- the encrypted key is a hash key that corresponds to the account number of the user in a hash table stored at the server.
- the device generates (1410) a graphic code using an encrypted key that corresponds to an account number of a user of the portable electronic device.
- the graphic code stores information identifying the encrypted key (e.g., graphic pattern that represents the encrypted key).
- the graphic code is a one-dimensional or two-dimensional bar code.
- the graphic code is a Quick Response Code (also called herein QR code).
- the graphic code does not include (1412) the account number of the user.
- the graphic code stores the encrypted key but not the account number of the user, so that the account number of the user is not directly made available to a payee device.
- the payee device e.g., the second terminal 60 shown in Figure 12
- the graphic code is generated (1414) in response to receiving the request to make the offline payment.
- the device does not store the graphic code prior to receiving the request to make the offline payment. This prevents a hacker from gaining unauthorized access to the device (e.g., using a malicious software) and retrieving the graphic code.
- the device displays (1416) the graphic code for visually transmitting the graphic code to a payee device that is distinct and separate from the portable electronic device.
- the device may be placed in front of a camera of the payee device, allowing the graphic code displayed on the display of the device to be scanned by the payee device.
- the payee device may extract the encrypted key from the scanned graphic code, and transmit the extracted encrypted key to the server to complete the payment process.
- the payee device is (1418) a vending machine. In some embodiments, the payee device is a cash register device.
- the phrase “if it is determined [that a stated condition precedent is true]” or “if [a stated condition precedent is true]” or “when [a stated condition precedent is true]” may be construed to mean “upon determining” or “in response to determining” or “in accordance with a determination” or “upon detecting” or “in response to detecting” that the stated condition precedent is true, depending on the context.
- stages that are not order dependent may be reordered and other stages may be combined or broken out. While some reordering or other groupings are specifically mentioned, others will be obvious to those of ordinary skill in the art and so do not present an exhaustive list of alternatives. Moreover, it should be recognized that the stages could be implemented in hardware, firmware, software or any combination thereof.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un dispositif électronique portable pour générer un code graphique pour une transaction hors ligne. Le dispositif électronique portable comprend un dispositif d'affichage, un ou plusieurs processeurs et une mémoire stockant un ou plusieurs programmes. Le dispositif électronique portable reçoit une requête pour réaliser un paiement hors ligne, et génère un code graphique à l'aide d'une clé chiffrée qui correspond à un numéro de compte d'un utilisateur du dispositif électronique portable. Le code graphique stocke des informations identifiant la clé chiffrée. Le dispositif électronique portable affiche le code graphique pour transmettre visuellement le code graphique à un dispositif de bénéficiaire qui est distinct et séparé du dispositif électronique portable. L'invention concerne également un procédé correspondant et un support d'informations lisible par ordinateur stockant un ou plusieurs programmes destinés à être exécutés par le dispositif électronique portable.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410006929.5A CN103716331B (zh) | 2014-01-07 | 2014-01-07 | 一种数值转移的方法、终端、服务器及系统 |
CN201410006929.5 | 2014-01-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015103886A1 true WO2015103886A1 (fr) | 2015-07-16 |
Family
ID=50408911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/085395 WO2015103886A1 (fr) | 2014-01-07 | 2014-08-28 | Procédé, terminal, serveur et système de transfert de valeur numérique |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103716331B (fr) |
WO (1) | WO2015103886A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113328970A (zh) * | 2020-02-28 | 2021-08-31 | 青岛海信传媒网络技术有限公司 | 接入电子设备的方法、装置、电子设备及存储介质 |
US11538004B2 (en) * | 2018-11-23 | 2022-12-27 | Advanced New Technologies Co., Ltd. | System and method for facilitating enhanced offline payment |
EP4140119A4 (fr) * | 2020-04-22 | 2023-03-29 | Visa International Service Association | Chiffrement secret en ligne |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103716331B (zh) * | 2014-01-07 | 2015-06-10 | 腾讯科技(深圳)有限公司 | 一种数值转移的方法、终端、服务器及系统 |
US9667424B2 (en) | 2014-06-26 | 2017-05-30 | Xiaomi Inc. | Methods and apparatuses for binding token key to account |
CN105740278B (zh) * | 2014-12-10 | 2019-04-09 | 阿里巴巴集团控股有限公司 | 一种数据处理方法和装置 |
CN106603596B (zh) * | 2015-10-15 | 2021-05-11 | 腾讯科技(深圳)有限公司 | 一种数值转移的方法、装置及系统 |
CN105389488B (zh) * | 2015-11-26 | 2019-06-28 | 腾讯科技(深圳)有限公司 | 身份认证方法及装置 |
CN107094159B (zh) * | 2016-02-18 | 2020-06-02 | 腾讯科技(深圳)有限公司 | 建立卡片与用户账号对应关系的方法和装置 |
CN109858580A (zh) * | 2018-12-18 | 2019-06-07 | 深圳市微付充科技有限公司 | 一种图形码的交互方法、电子设备及存储装置 |
CN111147481B (zh) * | 2019-12-25 | 2020-09-22 | 北京海泰方圆科技股份有限公司 | 一种数据处理系统、方法、装置、介质和设备 |
CN113256902B (zh) * | 2020-02-27 | 2024-07-12 | 深圳怡化电脑股份有限公司 | 敏感信息的安全输入方法、设备、系统及存储介质 |
CN113055169B (zh) * | 2021-03-29 | 2023-04-14 | 京东方科技集团股份有限公司 | 数据加密方法、装置、电子设备及存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722163A (zh) * | 2004-07-02 | 2006-01-18 | 维深巨合(北京)科技有限责任公司 | 通过手机传递交易信息的方法 |
CN101025806A (zh) * | 2006-02-20 | 2007-08-29 | 普天信息技术研究院 | 一种用移动通信终端进行费用支付的身份认证方法 |
CN101299286A (zh) * | 2007-04-30 | 2008-11-05 | 胡红雨 | 利用手机生成认证图形进行pos支付的方法及其系统和手机 |
CN102449651A (zh) * | 2011-01-21 | 2012-05-09 | 深圳市年年卡网络科技有限公司 | 基于图形的近距离支付系统及支付方法 |
US8177125B1 (en) * | 2010-12-15 | 2012-05-15 | Symantec Corporation | Automatic online checkout via mobile communication device with imaging system |
CN103269328A (zh) * | 2013-03-08 | 2013-08-28 | 陈景辉 | 一种基于图形信息交换的认证系统和方法 |
CN103716331A (zh) * | 2014-01-07 | 2014-04-09 | 腾讯科技(深圳)有限公司 | 一种数值转移的方法、终端、服务器及系统 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102655496A (zh) * | 2011-03-01 | 2012-09-05 | 阿里巴巴集团控股有限公司 | 一种登录方法、系统及装置 |
CN102821104B (zh) * | 2012-08-09 | 2014-04-16 | 腾讯科技(深圳)有限公司 | 授权的方法、装置和系统 |
CN102868696B (zh) * | 2012-09-18 | 2015-10-07 | 广州市动景计算机科技有限公司 | 多设备间通讯和信息同步方法及系统 |
CN102999837A (zh) * | 2012-12-03 | 2013-03-27 | 中国民生银行股份有限公司 | 电子货币交易处理方法和手机银行服务器 |
CN103457943B (zh) * | 2013-08-27 | 2016-10-26 | 小米科技有限责任公司 | 数值转移方法、终端、服务器及系统 |
-
2014
- 2014-01-07 CN CN201410006929.5A patent/CN103716331B/zh active Active
- 2014-08-28 WO PCT/CN2014/085395 patent/WO2015103886A1/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722163A (zh) * | 2004-07-02 | 2006-01-18 | 维深巨合(北京)科技有限责任公司 | 通过手机传递交易信息的方法 |
CN101025806A (zh) * | 2006-02-20 | 2007-08-29 | 普天信息技术研究院 | 一种用移动通信终端进行费用支付的身份认证方法 |
CN101299286A (zh) * | 2007-04-30 | 2008-11-05 | 胡红雨 | 利用手机生成认证图形进行pos支付的方法及其系统和手机 |
US8177125B1 (en) * | 2010-12-15 | 2012-05-15 | Symantec Corporation | Automatic online checkout via mobile communication device with imaging system |
CN102449651A (zh) * | 2011-01-21 | 2012-05-09 | 深圳市年年卡网络科技有限公司 | 基于图形的近距离支付系统及支付方法 |
CN103269328A (zh) * | 2013-03-08 | 2013-08-28 | 陈景辉 | 一种基于图形信息交换的认证系统和方法 |
CN103716331A (zh) * | 2014-01-07 | 2014-04-09 | 腾讯科技(深圳)有限公司 | 一种数值转移的方法、终端、服务器及系统 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11538004B2 (en) * | 2018-11-23 | 2022-12-27 | Advanced New Technologies Co., Ltd. | System and method for facilitating enhanced offline payment |
CN113328970A (zh) * | 2020-02-28 | 2021-08-31 | 青岛海信传媒网络技术有限公司 | 接入电子设备的方法、装置、电子设备及存储介质 |
EP4140119A4 (fr) * | 2020-04-22 | 2023-03-29 | Visa International Service Association | Chiffrement secret en ligne |
Also Published As
Publication number | Publication date |
---|---|
CN103716331A (zh) | 2014-04-09 |
CN103716331B (zh) | 2015-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015103886A1 (fr) | Procédé, terminal, serveur et système de transfert de valeur numérique | |
US9710846B2 (en) | Method, terminal, and server for submitting and processing order | |
EP3401864A1 (fr) | Procédé pour sélectionner une application de transaction, et terminal | |
AU2018399177B2 (en) | Electronic transaction method and terminal | |
WO2015101273A1 (fr) | Procédé de vérification de sécurité et dispositif et système associés | |
CN104852885B (zh) | 一种进行验证码验证的方法、装置和系统 | |
US11184754B2 (en) | Data sharing method and terminal | |
WO2016082194A1 (fr) | Procédé et appareil de traitement de messages | |
CN109257336B (zh) | 一种基于区块链的密码信息处理方法、终端设备 | |
CN104917796B (zh) | 信用账户创建装置、系统和方法 | |
CN107423099B (zh) | 键码烧写方法、服务器、终端、键码烧写系统及存储介质 | |
KR102314690B1 (ko) | 디바이스의 통신 연결 방법 및 그 장치 | |
WO2016078504A1 (fr) | Procédé et dispositif d'authentification d'identité | |
CN105303427A (zh) | 物品交换方法和装置 | |
WO2019128179A1 (fr) | Procédé et appareil de transmission de données entre terminaux mobiles, et terminal mobile | |
WO2018161540A1 (fr) | Procédé d'enregistrement d'empreintes digitales et produit associé | |
EP2866187B1 (fr) | Procédé, appareil et dispositif terminal pour transmettre des données NFC | |
CN104917905B (zh) | 陌生来电的处理方法、终端及服务器 | |
CN104202301B (zh) | 数值转移方法和装置 | |
CN104901992B (zh) | 一种资源转移的方法和装置 | |
US10476889B2 (en) | Information interaction method, apparatus and system | |
US20150256402A1 (en) | Method and apparatus for grouping personal electronic devices using information pattern code | |
US20190340601A1 (en) | Method And Mobile Device For Transmitting Data By Using Barcode | |
US9628716B2 (en) | Method for detecting content based on recognition area and electronic device thereof | |
WO2017000495A1 (fr) | Procédé et dispositif d'ajout de contacts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14877727 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 21/11/2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14877727 Country of ref document: EP Kind code of ref document: A1 |