WO2016123823A1 - 一种数据交互方法、设备和系统 - Google Patents
一种数据交互方法、设备和系统 Download PDFInfo
- Publication number
- WO2016123823A1 WO2016123823A1 PCT/CN2015/073449 CN2015073449W WO2016123823A1 WO 2016123823 A1 WO2016123823 A1 WO 2016123823A1 CN 2015073449 W CN2015073449 W CN 2015073449W WO 2016123823 A1 WO2016123823 A1 WO 2016123823A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- transaction
- identity code
- network terminal
- temporary
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
Definitions
- the present invention relates to the field of communications, and in particular, to a data interaction method, device, and system.
- online payment allows users to complete transactions without leaving their home. Although there are many kinds of online payment available, they are not well solved online security issues.
- credit card online payment when the user conducts a transaction, after the user inputs the transaction password of the credit card, the user terminal sends the transaction password to the network terminal, and the network terminal performs verification to determine whether the transaction password is correct, and if correct, completes For the transaction, the credit card will pay the amount to complete the transaction. Since the transaction password is unchanged for a long time in the above process, the transaction password is very easy to be intercepted during the transmission, so that the transaction is performed without the user's permission, thereby damaging the user's interests.
- Embodiments of the present invention provide a data interaction method, device, and system that can ensure secure transactions.
- the first aspect provides a data interaction method, which is applied to a user terminal, including:
- the second aspect provides a data interaction method, which is applied to a network terminal, and includes:
- a user terminal including:
- An acquiring unit configured to acquire a stored first temporary code, where the first temporary code is sent by a network terminal;
- a receiving unit configured to receive an identity code input by a user
- a calculating unit configured to calculate the first temporary code and the identity code according to a preset algorithm, to obtain a transaction password
- a sending unit configured to send the transaction password to the network terminal, so that the network terminal performs a transaction according to the transaction password
- the receiving unit is further configured to receive transaction success information and a second temporary code sent by the network terminal;
- an updating unit configured to update the first temporary code to the second temporary code.
- a network terminal including:
- a receiving unit configured to receive a first transaction password sent by the user terminal, where the first transaction
- the easy password is obtained by the user terminal calculating the first temporary code and the identity code according to a preset algorithm
- a calculating unit configured to determine, according to the stored correspondence between the first transaction password and the stored identity code, the identity code corresponding to the first transaction password
- a completion unit for completing a transaction according to the identity code
- a sending unit configured to send transaction success information and a second temporary code to the user terminal
- the calculating unit is further configured to calculate the second temporary code and the identity code according to a preset algorithm to obtain a second transaction password;
- a generating unit configured to generate a correspondence between the second transaction password and the identity code.
- a data interaction system including:
- a user terminal comprising a communication bus, an input device, an output device, a memory, and a processor, wherein:
- the memory stores a set of program codes, and the processor calls the program code stored in the memory to perform the following operations:
- the input device is configured to receive an identity code input by a user
- the processor is configured to calculate the first temporary code and the identity code according to a preset algorithm to obtain a transaction password
- the output device is configured to send the transaction password to the network terminal, so that the network terminal performs a transaction according to the transaction password;
- the input device is configured to receive transaction success information and a second temporary code sent by the network terminal;
- the processor is configured to update the first temporary code to the second temporary code.
- a network terminal comprising a communication bus, an input device, an output device, a memory, and a processor, wherein:
- the input device is configured to receive a first transaction password sent by the user terminal, where the first transaction password is that the user terminal calculates the first temporary code and the identity code according to a preset algorithm. Arrive
- the memory stores a set of program codes, and the processor calls the program code stored in the memory to perform the following operations:
- the output device is configured to send transaction success information and a second temporary code to the user terminal;
- the processor is further configured to calculate the second temporary code and the identity code according to a preset algorithm to obtain a second transaction password;
- the processor is further configured to generate a correspondence between the second transaction password and the identity code.
- Embodiments of the present invention provide a data interaction method, device, and system, which determine a transaction password according to a temporary code and an identity code; use the transaction password to perform a transaction, and after the transaction is completed, the network terminal sends a new temporary code for the next determination. transaction password.
- the user terminal receives a new random code, so that in the next transaction, a new transaction password is determined by the new random code and the identity code for the transaction.
- the transaction password is guaranteed to be different during each transaction. Even if the transaction password is intercepted, the intercepted transaction password cannot be used in the next transaction, so the interception becomes meaningless, thereby ensuring secure transactions.
- FIG. 1 is a flowchart of a data interaction method according to an embodiment of the present invention
- FIG. 2 is a flowchart of another data interaction method according to an embodiment of the present invention.
- FIG. 3 is a flowchart of still another data interaction method according to an embodiment of the present invention.
- Figure 4 is a schematic diagram of an online banking binding interface
- FIG. 5 is a schematic structural diagram of a user terminal according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of another user terminal according to an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of a network terminal according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of still another network terminal according to an embodiment of the present disclosure.
- FIG. 9 is a schematic structural diagram of a data interaction system according to an embodiment of the present invention.
- FIG. 10 is a schematic structural diagram of another user terminal according to an embodiment of the present disclosure.
- FIG. 11 is a schematic structural diagram of another network terminal according to an embodiment of the present invention.
- MD5 Message Digest Algorithm, the fifth edition of the message digest algorithm
- MD5 is mainly calculated and encrypted by collecting the information digest of the file. By encrypting with the MD5 algorithm, the file can obtain a unique MD5 value. This value is unique.
- MD5 is an algorithm that inputs indefinite length information and outputs a fixed length of 128-bits. After the program flow, four 32-bit data are generated and finally combined to form a 128-bit hash. The basic method is to perform the remainder, the remainder, the length adjustment, and the loop operation with the link variable. come to conclusion.
- the algorithm may include two parts, one is padding coding, and the other is algorithm implementation.
- the main loop of the algorithm implementation has four rounds (MD4 has only three rounds), and each round is very similar. The first round was performed 16 times.
- the embodiment of the present invention provides a data interaction method, which is applied to a user terminal, and the user terminal may include a mobile phone, a tablet computer, a notebook computer, a desktop computer, etc., as shown in FIG.
- Step 101 Acquire a stored first temporary code, where the first temporary code is sent by a network terminal.
- Step 102 Receive an identity code input by a user.
- Step 103 Calculate the first temporary code and the identity code according to a preset algorithm to obtain a transaction password.
- Step 104 Send the transaction password to the network terminal, so that the network terminal performs the transaction according to the transaction password.
- Step 105 Receive transaction success information and a second temporary code sent by the network terminal.
- Step 106 Update the first temporary code to a second temporary code.
- the user terminal receives a new random code, so that in the next transaction, a new transaction password is determined by the new random code and the identity code for the transaction. In this way, the transaction password is guaranteed to be different during each transaction. Even if the transaction password is intercepted, the intercepted transaction password cannot be used in the next transaction, so the interception becomes meaningless, thereby ensuring secure transactions.
- the preset algorithm includes MD5. It is worth noting that the preset algorithm can be updated regularly.
- the update of the preset algorithm is that the user terminal and the network terminal are simultaneously updated.
- the preset algorithm in this embodiment is not limited to this.
- the preset algorithm includes: sending binding information to the network terminal, where the binding information is bound according to a user before the first transaction, so that the network terminal performs network authentication according to the binding information. And sending the identity code and the third random code; receiving the identity code and the third random code sent by the network terminal; storing the third random code; and receiving the transaction failure information sent by the network terminal To the network Transmitting, by the terminal, the identity code; receiving transaction success information and a fourth random code sent by the network terminal; and updating the first temporary code by using the fourth temporary code.
- An embodiment of the present invention provides a data interaction method, as shown in FIG. 2, which may include:
- Step 201 Receive a first transaction password sent by the user terminal, where the first transaction password is obtained by the user terminal calculating the first temporary code and the identity code according to a preset algorithm.
- Step 202 Determine an identity code corresponding to the first transaction password according to the correspondence between the stored first transaction password and the stored identity code.
- Step 203 Complete the transaction according to the identity code.
- Step 204 Send transaction success information and a second temporary code to the user terminal.
- Step 205 Calculate a second temporary code and an identity code according to a preset algorithm to obtain a second transaction password.
- Step 206 Generate a correspondence between the second transaction password and the identity code.
- the user terminal will receive a new random code, so that in the next transaction, the new transaction code can be determined by the new random code and the identity code.
- the transaction password is guaranteed to be different during each transaction. Even if the transaction password is blocked, the intercepted transaction password cannot be used in the next transaction. Therefore, the interception becomes meaningless, thus ensuring secure transactions.
- the preset algorithm includes MD5. It is worth noting that the preset algorithm can be updated regularly.
- the preset algorithm includes: receiving binding information sent by the user terminal, where the binding information is bound according to a user before the first transaction; performing network authentication according to the binding information; if the authentication is successful, And sending the identity code and the third random code to the user terminal; calculating the third temporary code and the identity code according to a preset algorithm to obtain a third transaction password; generating the third transaction password and the identity code Corresponding relationship; after sending the transaction failure information to the user terminal, the method further includes: receiving the identity code sent by the user terminal; completing a transaction according to the identity code; and sending a fourth message to the user terminal a temporary code; calculating the fourth temporary code and the identity code according to a preset algorithm to obtain a fourth transaction password; and generating a correspondence between the fourth transaction password and the identity code.
- the embodiment of the present invention provides a data interaction method, which is applied to a data exchange system, and the system may include a user terminal and a network terminal, and the data exchange system is assumed to be a system for performing online payment.
- the user pays for the first time through a credit card to purchase items in the online store.
- the preset algorithm in this embodiment takes MD5 as an example. As shown in FIG. 3, the method includes:
- Step 301 The user terminal sends binding application information to the network terminal.
- the binding application information includes the user's online banking account number, credit card number, credit card password, ID number, name corresponding to the ID number, the verification code received by the user terminal, and the identity code input by the user.
- the verification code is a credit card verification code received by the user terminal after the user inputs the mobile phone number bound to the credit card.
- the interface of online banking binding is shown in Figure 4.
- the binding application information provided in this embodiment only serves as an example, and the binding application information is not limited thereto.
- Step 302 The network terminal binds the credit card to the online banking account by verifying the binding application information.
- the network terminal verifies whether the credit card number, the user ID number, the verification code, the credit card password, etc. match, and if the match, the credit card and the online banking account are bound, so that when the online transaction is performed through the online banking account, the binding can be used. Fixed credit card payment.
- Step 303 If the binding is successful, the network terminal sends the temporary code to the user terminal.
- the temporary code can be composed of numbers, letters, symbols, and the like.
- the temporary code is randomly generated by the user terminal and has no special meaning.
- Step 304 The user terminal saves the temporary code.
- Step 305 The network terminal calculates the temporary code and the identity code according to the MD5 to obtain a transaction password.
- Step 306 The network terminal generates a correspondence between the transaction password and the identity code according to the transaction password and the identity code.
- Step 307 The user terminal receives the identity code input by the user.
- the user can immediately perform online payment, and the user inputs the identity code on the payment interface of the user terminal.
- Step 308 The user terminal acquires the stored temporary code.
- Step 309 The user terminal calculates the temporary code and the identity code according to the MD5 to obtain a transaction password.
- Step 310 The user terminal sends a transaction password to the network terminal.
- Step 311 The network terminal determines an identity code corresponding to the transaction code according to the correspondence between the transaction password and the identity code.
- the received transaction password is different from the stored transaction password, the received transaction password is wrong and the transaction cannot be completed; if the received transaction password is the same as the stored transaction password, the identity code is obtained and the transaction is performed.
- Step 312 The network terminal performs a transaction according to the identity code.
- Step 313 The network terminal sends the transaction success information and the new temporary code to the user terminal.
- Step 314 The user terminal updates the previous temporary code with a new temporary code.
- Step 315 The network terminal sends a transaction failure information to the user terminal.
- Step 316 The user terminal sends an identity code to the network terminal.
- Step 317 The network terminal performs the transaction according to the identity code.
- Step 318 The network terminal sends the transaction success information and the new temporary code to the user terminal.
- the network terminal After step 313 or step 318, the network terminal also performs steps 305 and 306 accordingly, and the network terminal waits for the next transaction.
- the user terminal After each successful transaction through the transaction code, the user terminal will receive a new random code, so that the next transaction will use the new random code and the identity code to determine the new transaction password for trading, thus ensuring not only the transaction
- the transaction password is different during each transaction. Even if the transaction password is intercepted, the intercepted transaction password cannot be used in the next transaction, so the interception becomes meaningless; when the transaction fails, the user terminal can also send the identity code. The transaction, in this way, the user will not be able to trade because of the wrong transaction password.
- the embodiment of the present invention provides a user terminal 40, as shown in FIG. 5, which may include
- the obtaining unit 401 is configured to acquire the stored first temporary code, where the first temporary code is The network terminal sends.
- the receiving unit 402 is configured to receive an identity code input by the user.
- the calculating unit 403 is configured to calculate the first temporary code and the identity code according to a preset algorithm to obtain a transaction password.
- the sending unit 404 is configured to send the transaction password to the network terminal, so that the network terminal performs a transaction according to the transaction password.
- the receiving unit 402 is further configured to receive transaction success information and a second temporary code sent by the network terminal.
- the updating unit 405 is configured to update the first temporary code to the second temporary code.
- the user terminal will receive a new random code, so that in the next transaction, the new transaction code can be determined by the new random code and the identity code.
- the transaction password is guaranteed to be different during each transaction. Even if the transaction password is blocked, the intercepted transaction password cannot be used in the next transaction. Therefore, the interception becomes meaningless, thus ensuring secure transactions.
- the sending unit 404 is further configured to send binding information to the network terminal, where the binding information is used to pay binding according to the user before the first transaction, so that the network terminal performs the binding according to the binding information. After the network authentication, the identity code and the third random code are transmitted.
- the receiving unit 402 is further configured to receive the identity code and the third random code sent by the network terminal.
- the user terminal further includes: a storage unit 406, configured to store the third random code.
- the receiving unit 402 is further configured to receive transaction failure information sent by the network terminal.
- the sending unit 404 is further configured to send the identity code to the network terminal.
- the receiving unit 402 further receives transaction success information and a fourth random code sent by the network terminal.
- the updating unit 405 is further configured to update the first temporary code by using the fourth temporary code.
- the embodiment of the present invention provides a network terminal 50, as shown in FIG. 7, which may include:
- the receiving unit 501 is configured to receive a first transaction password sent by the user terminal, where the first transaction password is obtained by the user terminal calculating the first temporary code and the identity code according to a preset algorithm.
- the calculating unit 502 is configured to determine, according to the stored correspondence between the first transaction password and the stored identity code, the identity code corresponding to the first transaction password.
- the completion unit 503 is configured to complete the transaction according to the identity code.
- the sending unit 504 is configured to send the transaction success information and the second temporary code to the user terminal.
- the calculating unit 502 is further configured to calculate the second temporary code and the identity code according to a preset algorithm to obtain a second transaction password.
- the generating unit 505 is configured to generate a correspondence between the second transaction password and the identity code.
- the receiving unit 501 is configured to receive binding information sent by the user terminal, where the binding information is paid according to a user before the first transaction.
- the network terminal 50 further includes:
- the authentication unit 506 is configured to perform network authentication according to the binding information.
- the sending unit 504 is further configured to: when the authentication is successful, send the identity code and the third random code to the user terminal.
- the calculating unit 502 is further configured to determine a third transaction password according to the third temporary code and the identity code.
- the generating unit 505 is further configured to generate a correspondence between the third transaction password and the identity code.
- the receiving unit 501 is configured to receive the identity code sent by the user terminal.
- the completion unit 503 is further configured to complete the transaction according to the identity code.
- the sending unit 504 is further configured to send a fourth temporary code to the user terminal.
- the calculating unit 502 is further configured to determine a fourth transaction password according to the fourth temporary code and the identity code.
- the generating unit 505 is further configured to generate a correspondence between the fourth transaction password and the identity code.
- the embodiment of the present invention provides a data interaction system 60, as shown in FIG. 9, which may include:
- the user terminal 40 is configured to acquire the stored first temporary code, where the first temporary code is sent by the network terminal, receive the identity code input by the user, and calculate the first temporary code and the identity code according to a preset algorithm. Obtaining a transaction password; transmitting the transaction password to the network terminal, so that the network terminal performs a transaction according to the transaction password; receiving transaction success information and a second temporary code sent by the network terminal; A temporary code is updated to the second temporary code.
- the network terminal 50 is configured to receive a first transaction password sent by the user terminal, where the first transaction password is obtained by the user terminal calculating a first temporary code and an identity code according to a preset algorithm; Determining, by the correspondence between the transaction password and the stored identity code, the identity code corresponding to the first transaction password; completing the transaction according to the identity code; transmitting the transaction success information and the second temporary code to the user terminal; And the algorithm calculates the second temporary code and the identity code to obtain a second transaction password; and generates a correspondence between the second transaction password and the identity code.
- the user terminal will receive a new random code, so that in the next transaction, the new transaction code can be determined by the new random code and the identity code.
- the transaction password is guaranteed to be different during each transaction. Even if the transaction password is blocked, the intercepted transaction password cannot be used in the next transaction. Therefore, the interception becomes meaningless, thereby improving the security of online payment.
- the embodiment of the present invention provides a user terminal.
- the terminal may include: at least one input device 1003, at least one output device 1004, at least one processor 1001, such as a CPU, a memory 1005, and at least one bus 1002.
- the processor 1001 can be combined with the user terminal shown in FIG. 5 or FIG. 6.
- the bus 1002 is used to connect the input device 1003, the output device 1004, the processor 1001, and the memory 1005.
- the input device 1003 may specifically be a communication interface of the terminal, such as a network interface, and the network interface may include a standard wired interface or a wireless interface (such as a WI-FI interface).
- the output device 1004 may specifically be a communication interface of the terminal, such as a network interface, and the network interface may include a standard wired interface or a wireless interface (such as a WI-FI interface).
- the above memory 1005 may be a high speed RAM memory or a non-volatile memory such as a disk memory.
- the above-mentioned memory 1005 is further configured to store a set of program codes, and the input device 1003, the output device 1004, and the processor 1001 are configured to call the program code stored in the memory 1005, and perform the following operations:
- the processor 1001 is configured to acquire the stored first temporary code, where the first temporary code is sent by the network terminal;
- the input device 1003 is configured to receive an identity code input by a user
- the processor 1001 is configured to calculate the first temporary code and the identity code according to a preset algorithm to obtain a transaction password;
- the output device 1004 is configured to send the transaction password to the network terminal, so that the network terminal performs a transaction according to the transaction password;
- the input device 1003 is configured to receive transaction success information and a second temporary code sent by the network terminal;
- the processor 1001 is configured to update the first temporary code to the second temporary code.
- the preset algorithm includes:
- the output device 1004 sends binding information to the network terminal, and the binding information is sent according to the user before the first transaction, so that the network terminal sends the network after performing network authentication according to the binding information.
- An identity code and a third random code An identity code and a third random code
- the input device 1003 receives the identity code and the number sent by the network terminal Three random codes;
- the memory 1005 stores the third random code
- the method further includes:
- the input device 1003 receives transaction failure information sent by the network terminal
- the output device 1004 sends the identity code to the network terminal
- the input device 1003 receives the transaction success information and the fourth random code sent by the network terminal;
- the processor 1001 updates the first temporary code with the fourth temporary code.
- terminal introduced in the embodiment of the present invention may be used to implement some or all of the processes in the method embodiments introduced in conjunction with FIG. 1 and FIG.
- the embodiment of the present invention provides a network terminal.
- the network terminal may include: at least one input device 1103, at least one output device 1104, at least one processor 1101, such as a CPU, a memory 1105, and at least one bus. 1102.
- the processor 1101 can be combined with the network terminal shown in FIG. 7 or 8.
- the bus 1102 is used to connect the input device 1103, the output device 1104, the processor 1101, and the memory 1105.
- the input device 1103 may specifically be a communication interface of the terminal, such as a network interface, and the network interface may include a standard wired interface or a wireless interface (such as a WI-FI interface).
- the output device 1104 may specifically be a communication interface of the terminal, such as a network interface, and the network interface may include a standard wired interface or a wireless interface (such as a WI-FI interface).
- the above memory 1105 may be a high speed RAM memory or a non-volatile memory such as a disk memory.
- the memory 1105 is further configured to store a set of program codes, and the input device 1103, the output device 1104, and the processor 1101 are configured to call the program code stored in the memory 1105, and perform the following operations:
- the input device 1103 is configured to receive a first transaction password sent by the user terminal, where the first transaction password is obtained by the user terminal calculating a first temporary code and an identity code according to a preset algorithm;
- the processor 1101 determines, according to the stored correspondence between the first transaction password and the stored identity code, the identity code corresponding to the first transaction password;
- the processor 1101 completes a transaction according to the identity code
- the output device 1104 is configured to send transaction success information and a second temporary code to the user terminal;
- the processor 1101 is further configured to calculate the second temporary code and the identity code according to a preset algorithm to obtain a second transaction password;
- the processor 1101 is further configured to generate a correspondence between the second transaction password and the identity code.
- the preset algorithm includes:
- the input device 1103 receives binding information sent by the user terminal, and the binding information is paid according to a user before the first transaction;
- the processor 1101 performs network authentication according to the binding information.
- the output device 1104 sends the identity code and the third random code to the user terminal;
- the processor 1101 calculates the third temporary code and the identity code according to a preset algorithm, to obtain a third transaction password;
- the processor 1101 generates a correspondence between the third transaction password and the identity code
- the method further includes:
- the input device 1103 receives the identity code sent by the user terminal
- the processor 1101 completes a transaction according to the identity code
- the output device 1104 sends a fourth temporary code to the user terminal
- the processor 1101 calculates the fourth temporary code and the identity code according to a preset algorithm, to obtain a fourth transaction password;
- the processor 1101 generates a correspondence between the fourth transaction password and the identity code.
- terminal introduced in the embodiment of the present invention may be used to implement some or all of the processes in the method embodiments introduced in conjunction with FIG. 2 and FIG.
- the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
- the method includes the steps of the foregoing method embodiments; and the foregoing storage medium includes: a ROM, a RAM, a magnetic disk, or an optical disk, and the like, which can store program codes. medium.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (13)
- 一种数据交互方法,应用于用户终端,其特征在于,包括:获取已存储的第一临时码,所述第一临时码由网络终端发送;接收用户输入的身份码;根据预设算法计算所述第一临时码和所述身份码,得到交易密码;向所述网络终端发送所述交易密码,以便于所述网络终端根据所述交易密码进行交易;接收所述网络终端发送的交易成功信息和第二临时码;将所述第一临时码更新为所述第二临时码。
- 根据权利要求1所述的数据交互方法,其特征在于,所述预设算法包括:向所述网络终端发送绑定信息,所述绑定信息根据用户在首次交易之前支付绑定,以便于所述网络终端根据所述绑定信息进行网络认证之后,发送所述身份码和第三随机码;接收所述网络终端发送的所述身份码和所述第三随机码;存储所述第三随机码;所述向网络终端发送所述交易密码之后,所述方法还包括:接收所述网络终端发送的交易失败信息;向所述网络终端发送所述身份码;接收所述网络终端发送的交易成功信息和第四随机码;用所述第四临时码更新所述第一临时码。
- 一种数据交互方法,应用于网络终端,其特征在于,包括:接收用户终端发送的第一交易密码,所述第一交易密码是所述用户终端根据预设算法计算第一临时码和身份码得到的;根据已存储的所述第一交易密码和存储的身份码的对应关系,确定出第一交易密码对应的所述身份码;根据所述身份码完成交易;向所述用户终端发送交易成功信息和第二临时码;根据预设算法计算所述第二临时码和所述身份码,得到第二交易密码;生成所述第二交易密码和所述身份码的对应关系。
- 根据权利要求3所述的数据交互方法,其特征在于,所述预设算法包括:接收所述用户终端发送的绑定信息,所述绑定信息根据用户在首次交易之前支付绑定;根据所述绑定信息进行网络认证;若认证成功,则向用户终端发送所述身份码和第三随机码;根据预设算法计算所述第三临时码和所述身份码,得到第三交易密码;生成所述第三交易密码和所述身份码的对应关系;当向所述用户终端发送交易失败信息之后,所述方法还包括:接收所述用户终端发送的所述身份码;根据所述身份码完成交易;向所述用户终端发送第四临时码;根据预设算法计算所述第四临时码和所述身份码,得到第四交易密码;生成所述第四交易密码和所述身份码的对应关系。
- 一种用户终端,其特征在于,包括:获取单元,用于获取已存储的第一临时码,所述第一临时码由网络终端发送;接收单元,用于接收用户输入的身份码;计算单元,用于根据预设算法计算所述第一临时码和所述身份码,得到交易密码;发送单元,用于向所述网络终端发送所述交易密码,以便于所述网络终端根据所述交易密码进行交易;所述接收单元,还用于接收所述网络终端发送的交易成功信息和第二临时码;更新单元,用于将所述第一临时码更新为所述第二临时码。
- 根据权利要求5所述的用户终端,其特征在于,所述发送单元,还用于向所述网络终端发送绑定信息,所述绑定信息根据用户在首次交易之前支付绑定,以便于所述网络终端根据所 述绑定信息进行网络认证之后,发送所述身份码和第三随机码;所述接收单元,还用于接收所述网络终端发送的所述身份码和所述第三随机码;所述用户终端还包括:存储单元,用于存储所述第三随机码;所述接收单元,还用于接收所述网络终端发送的交易失败信息;所述发送单元,还用于向所述网络终端发送所述身份码;所述接收单元,还接收所述网络终端发送的交易成功信息和第四随机码;所述更新单元,还用于用所述第四临时码更新所述第一临时码。
- 一种网络终端,其特征在于,包括:接收单元,用于接收用户终端发送的第一交易密码,所述第一交易密码是所述用户终端根据预设算法计算第一临时码和身份码得到的;计算单元,用于根据已存储的所述第一交易密码和存储的身份码的对应关系,确定出第一交易密码对应的所述身份码;完成单元,用于根据所述身份码完成交易;发送单元,用于向所述用户终端发送交易成功信息和第二临时码;所述计算单元,还用于根据预设算法计算所述第二临时码和所述身份码,得到第二交易密码;生成单元,用于生成所述第二交易密码和所述身份码的对应关系。
- 根据权利要求7所述的网络终端,其特征在于,所述接收单元,用于接收所述用户终端发送的绑定信息,所述绑定信息根据用户在首次交易之前支付绑定;所述网络终端还包括:认证单元,用于根据所述绑定信息进行网络认证;所述发送单元,还用于当认证成功时,向用户终端发送所述身份码和第三随机码;所述计算单元,还用于根据预设算法计算所述第三临时码和所述身份码,得到第三交易密码;所述生成单元,还用于生成所述第三交易密码和所述身份码的对应关系;所述接收单元,用于接收所述用户终端发送的所述身份码;所述完成单元,还用于根据所述身份码完成交易;所述发送单元,还用于向所述用户终端发送第四临时码;所述计算单元,还用于根据预设算法计算所述第四临时码和所述身份码,得到第四交易密码;所述生成单元,还用于生成所述第四交易密码和所述身份码的对应关系。
- 一种数据交互系统,其特征在于,包括:权利要求5或6所述的用户终端;权利要求7或8所述的网络终端。
- 一种用户终端,其特征在于,所述用户终端包括通信总线、输入装置、输出装置、存储器以及处理器,其中:所述存储器中存储一组程序代码,且处理器调用存储器中存储的程序代码,用于执行以下操作:获取已存储的第一临时码,所述第一临时码由网络终端发送;所述输入装置,用于接收用户输入的身份码;所述处理器,用于根据预设算法计算所述第一临时码和所述身份码,得到交易密码;所述输出装置,用于向所述网络终端发送所述交易密码,以便于所述网络终端根据所述交易密码进行交易;所述输入装置,用于接收所述网络终端发送的交易成功信息和第二临时码;所述处理器,用于将所述第一临时码更新为所述第二临时码。
- 根据权利要求10所述的用户终端,其特征在于,所述预设算法包括:所述输出装置向所述网络终端发送绑定信息,所述绑定信息根据用户在首次交易之前支付绑定,以便于所述网络终端根据所述绑定信息进行网络认证之后,发送所述身份码和第三随机码;所述输入装置接收所述网络终端发送的所述身份码和所述第三随机码;所述存储器存储所述第三随机码;所述输出装置向网络终端发送所述交易密码之后,还包括:所述输入装置接收所述网络终端发送的交易失败信息;所述输出装置向所述网络终端发送所述身份码;所述输入装置接收所述网络终端发送的交易成功信息和第四随机码;所述处理器用所述第四临时码更新所述第一临时码。
- 一种网络终端,其特征在于,所述网络终端包括通信总线、输入装置、输出装置、存储器以及处理器,其中:所述输入装置,用于接收用户终端发送的第一交易密码,所述第一交易密码是所述用户终端根据预设算法计算第一临时码和身份码得到的;所述存储器中存储一组程序代码,且处理器调用存储器中存储的程序代码,用于执行以下操作:根据已存储的所述第一交易密码和存储的身份码的对应关系,确定出第一交易密码对应的所述身份码;根据所述身份码完成交易;所述输出装置,用于向所述用户终端发送交易成功信息和第二临时码;所述处理器,还用于根据预设算法计算所述第二临时码和所述身份码,得到第二交易密码;所述处理器,还用于生成所述第二交易密码和所述身份码的对应关系。
- 根据权利要求12所述的网络终端,其特征在于,所述预设算法包括:所述输入装置接收所述用户终端发送的绑定信息,所述绑定信息根据用户在首次交易之前支付绑定;所述处理器根据所述绑定信息进行网络认证;若认证成功,则所述输出装置向用户终端发送所述身份码和第三随机码;所述处理器根据预设算法计算所述第三临时码和所述身份码,得到第三交易密码;所述处理器生成所述第三交易密码和所述身份码的对应关系;当所述输出装置向所述用户终端发送交易失败信息之后,还包括:所述输入装置接收所述用户终端发送的所述身份码;所述处理器根据所述身份码完成交易;所述输出装置向所述用户终端发送第四临时码;所述处理器根据预设算法计算所述第四临时码和所述身份码,得到第四交易密码;所述处理器生成所述第四交易密码和所述身份码的对应关系。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510063868.0 | 2015-02-06 | ||
CN201510063868.0A CN104636920A (zh) | 2015-02-06 | 2015-02-06 | 一种数据交互方法、设备和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016123823A1 true WO2016123823A1 (zh) | 2016-08-11 |
Family
ID=53215637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/073449 WO2016123823A1 (zh) | 2015-02-06 | 2015-02-28 | 一种数据交互方法、设备和系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104636920A (zh) |
WO (1) | WO2016123823A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106611311A (zh) * | 2015-10-23 | 2017-05-03 | 镇江金软计算机科技有限责任公司 | 一种网络支付实现办法 |
CN106330883B (zh) * | 2016-08-19 | 2019-11-22 | 中国银联股份有限公司 | 基于快捷验证码的安全性信息交互方法 |
CN108924101A (zh) * | 2018-06-20 | 2018-11-30 | 北京车和家信息技术有限公司 | 一种数据库的操作方法及相关设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1466061A (zh) * | 2002-07-04 | 2004-01-07 | 张东旭 | 自动随机一次性密码提高网络交易安全的认证方法 |
CN1811813A (zh) * | 2006-03-02 | 2006-08-02 | 韩林 | 一种双因子动态密码认证的方法及系统 |
CN101286256A (zh) * | 2008-05-01 | 2008-10-15 | 包国文 | 自助式银行卡防盗系统及其数据处理方法 |
CN102663588A (zh) * | 2012-04-10 | 2012-09-12 | 中山爱科数字家庭产业孵化基地有限公司 | 一种基于ipv6的远程网络支付方法 |
CN103985036A (zh) * | 2014-05-09 | 2014-08-13 | 杭州晟元芯片技术有限公司 | 一种带生物特征的二维码支付方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101178802A (zh) * | 2006-11-08 | 2008-05-14 | 李东声 | 网络银行交易中动态密码的实现方法与电子签名装置 |
CN101291227A (zh) * | 2008-06-06 | 2008-10-22 | 薛明 | 一种密码输入方法、装置和系统 |
CN101727704A (zh) * | 2008-10-27 | 2010-06-09 | 李慧 | 移动银行终端专用掌上设备 |
CN101848090B (zh) * | 2010-05-11 | 2012-07-25 | 武汉珞珈新世纪信息有限公司 | 认证装置及利用其进行网上身份认证与交易的系统与方法 |
CN102868531B (zh) * | 2012-09-10 | 2015-03-04 | 武汉信安珞珈科技有限公司 | 一种网络交易认证系统和网络交易认证方法 |
-
2015
- 2015-02-06 CN CN201510063868.0A patent/CN104636920A/zh active Pending
- 2015-02-28 WO PCT/CN2015/073449 patent/WO2016123823A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1466061A (zh) * | 2002-07-04 | 2004-01-07 | 张东旭 | 自动随机一次性密码提高网络交易安全的认证方法 |
CN1811813A (zh) * | 2006-03-02 | 2006-08-02 | 韩林 | 一种双因子动态密码认证的方法及系统 |
CN101286256A (zh) * | 2008-05-01 | 2008-10-15 | 包国文 | 自助式银行卡防盗系统及其数据处理方法 |
CN102663588A (zh) * | 2012-04-10 | 2012-09-12 | 中山爱科数字家庭产业孵化基地有限公司 | 一种基于ipv6的远程网络支付方法 |
CN103985036A (zh) * | 2014-05-09 | 2014-08-13 | 杭州晟元芯片技术有限公司 | 一种带生物特征的二维码支付方法 |
Also Published As
Publication number | Publication date |
---|---|
CN104636920A (zh) | 2015-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11127016B2 (en) | Unique code for token verification | |
US20190179652A1 (en) | Helper software developer kit for native device hybrid applications | |
US11521203B2 (en) | Generating a cryptographic key based on transaction data of mobile payments | |
JP5766199B2 (ja) | 安全なモバイル決済処理 | |
TWI633506B (zh) | 一種訊息傳輸方法、裝置和系統 | |
US11838289B2 (en) | Systems and methods for activating an authentication token within a communication platform | |
US9336523B2 (en) | Managing a secure transaction | |
CN105787727B (zh) | 一种hce脱机支付系统及实现方法 | |
US20190306159A1 (en) | Time-based one-time password for device identification across different applications | |
US20190306156A1 (en) | Time-based one-time password for device identification across different applications | |
US11855985B2 (en) | Protected user information verification system | |
US20170213213A1 (en) | Enhanced authentication security applicable in an at least partially insecure network environment | |
WO2016123823A1 (zh) | 一种数据交互方法、设备和系统 | |
US9246677B2 (en) | Method and system for secure data communication between a user device and a server | |
WO2018098590A1 (en) | System and method for message recipient verification | |
CN106251132B (zh) | 一种hce脱机安全性提升系统及实现方法 | |
CN104917763B (zh) | 一种pin码缓存方法 | |
CN110546668B (zh) | 卡的交易的动态认证方法及系统 | |
CN109816525A (zh) | 一种数据处理方法及其装置、介质、终端 | |
KR101639548B1 (ko) | 객체 처리 시스템 및 방법 | |
CN106961417A (zh) | 基于密文的身份验证方法 | |
CN104917730A (zh) | 一种鉴权方法及系统、鉴权服务器 | |
US11842338B2 (en) | Payment encryption system | |
CN112541761B (zh) | 离线支付码的生成、扫描方法、生成装置以及扫描装置 | |
US20240126598A1 (en) | Task processing system, method, and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15880778 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15880778 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC , EPO FORM 1205A DATED 06.02.18. |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15880778 Country of ref document: EP Kind code of ref document: A1 |