WO2017036201A1 - 一种无卡转账或取款的保护方法及手机系统 - Google Patents

一种无卡转账或取款的保护方法及手机系统 Download PDF

Info

Publication number
WO2017036201A1
WO2017036201A1 PCT/CN2016/084106 CN2016084106W WO2017036201A1 WO 2017036201 A1 WO2017036201 A1 WO 2017036201A1 CN 2016084106 W CN2016084106 W CN 2016084106W WO 2017036201 A1 WO2017036201 A1 WO 2017036201A1
Authority
WO
WIPO (PCT)
Prior art keywords
operating system
dynamic code
preset
atm machine
distance
Prior art date
Application number
PCT/CN2016/084106
Other languages
English (en)
French (fr)
Inventor
梁文栋
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017036201A1 publication Critical patent/WO2017036201A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present application relates to the field of electronic technologies, and more particularly to a method for protecting cardless transfer or withdrawal and a mobile phone system.
  • ATM Automatic Teller Machine machines of various banks can basically provide business operations such as cardless transfer or withdrawal.
  • it is necessary to input the password of the bank card and the dynamic code in the short message sent by the bank because of the dynamics.
  • the code is variability, which in turn ensures the security of no card transfer or withdrawal.
  • the dynamic code is sent and viewed through a short message, and there is a large security risk.
  • the information of the dynamic code can be stolen remotely; or in the case where the mobile phone is stolen, the information of the dynamic code can be used by the thief; or the fraudster can use various means to take
  • the dynamic code in the user's hand can cause security problems in the property of the user's bank card.
  • the present application provides a cardless transfer or withdrawal protection method and a mobile phone system for solving the security problem existing in the prior art user bank card when performing cardless operation.
  • a cardless transfer or withdrawal protection method is applied to a mobile phone system, the mobile phone system includes a read-only first operating system and a second operating system connected to the network; and the card-free transfer or withdrawal protection method includes:
  • the second operating system receives a short message including a dynamic code
  • the first operating system encrypts the dynamic code
  • the second operating system determines whether it is within a preset range of an ATM machine
  • the first operating system determines whether the received decryption password matches the preset password
  • the first operating system determines that the decryption password matches the preset password, displaying the dynamic code in the short message; the preset password is a physical feature of the user.
  • the preset password is: a user's own iris feature, fingerprint feature or eye pattern feature.
  • the step of the second operating system determining whether it is within a preset range of an ATM machine comprises:
  • the second operating system compares its location with the preset network segmentation map of the ATM machine in the first operating system by the global positioning system GPS, and obtains the distance between itself and the nearest ATM machine;
  • the second operating system determines whether the distance is less than a preset distance, and if it is determined that the distance is less than a preset distance, determining that the distance is within a preset range of the ATM machine.
  • the method further includes:
  • the dynamic code is re-encrypted until the dynamic code expires, and the dynamic code is decrypted.
  • the preset time is 2 minutes.
  • a mobile phone system includes: a read-only first operating system and a second operating system connected to the network; wherein:
  • the first operating system is configured to encrypt a dynamic code included in a short message received by the second operating system
  • the second operating system is configured to determine whether it is within a preset range of an ATM machine, and when the second operating system determines that it is within a preset range of an ATM machine, the first operation Determining, by the system, whether the received decryption password matches the preset password; when the first operating system determines that the decryption password matches the preset password, displaying the dynamic code in the short message;
  • the password is the physical characteristics of the user.
  • the decryption password is: an iris feature, a fingerprint feature or an eye pattern feature.
  • the second operating system when used to determine whether it is within a preset range of an ATM machine, specifically:
  • the first operating system is further configured to:
  • the dynamic code When it is determined that the display of the dynamic code exceeds the preset time, the dynamic code is re-encrypted until the dynamic code expires, and the dynamic code is decrypted.
  • the preset time is 2 minutes.
  • the method for protecting cardless transfer or withdrawal is provided.
  • the second operating system After the second operating system receives the short message including the dynamic code, the dynamic code is encrypted by the first operating system; Determining, by the second operating system, whether it is within a preset range of an ATM machine; when the second operating system determines that it is within a preset range of an ATM machine, the first operating system determines Whether the received decryption password is correct; when the first operating system determines that the decryption password matches the preset password, the dynamic code in the short message is displayed; and the preset password is a physical feature of the user.
  • the dynamic code can be obtained by the user's own decryption password, thereby avoiding the non-user operation of the user's bank card without the user, and ensuring the property security in the user's bank card.
  • 1 is a flow chart of a method for protecting cardless transfer or withdrawal provided by the present application
  • FIG. 2 is a flowchart of another method for protecting a cardless transfer or withdrawal according to another embodiment of the present application
  • FIG. 3 is a schematic structural diagram of a mobile phone system according to another embodiment of the present disclosure.
  • the present invention provides a cardless transfer or withdrawal protection method and a mobile phone system for solving the security problem existing in the prior art user bank card when performing cardless operation.
  • the cardless transfer or withdrawal protection method is applied to a mobile phone system, the mobile phone system includes a read-only first operating system and a second operating system connected to the network; and the cardless transfer or withdrawal protection method is as shown in FIG. 1 Shown, including:
  • the second operating system receives a short message including a dynamic code.
  • the bank When the user needs to make a cardless transfer or withdrawal, the bank will send a short message containing the dynamic code, and the dynamic code is used for the user to perform the cardless operation verification.
  • the second operating system receives the short message, and stores the short message in a storage space of the second operating system.
  • the first operating system encrypts the dynamic code.
  • the first operating system may encrypt the dynamic code in a storage space of the second operating system; or the first operating system may store the short message in the first operation.
  • the dynamic code is encrypted in the storage space of the first operating system in the storage space of the system.
  • the manner in which the first operating system encrypts the dynamic code may be determined according to the specific application environment, and is not specifically limited herein, and is within the protection scope of the present application.
  • the second operating system determines whether it is within a preset range of an ATM machine.
  • the second operating system belongs to the mobile phone system, and the mobile phone system is a system in a user's mobile phone.
  • the second operating system determines that it is within a preset range of an ATM machine, the user's mobile phone is within a preset range of an ATM machine.
  • the first operating system determines whether the received decryption password matches a preset password.
  • the decryption password may be: an iris feature, a fingerprint feature, or an eye feature of the user.
  • the preset password is: a user's own iris feature, fingerprint feature or eye pattern feature.
  • the preset password is a physical feature of the user, so that the dynamic code can only be obtained by the user himself. Other people who obtain the short message including the dynamic code by various illegal means cannot obtain the dynamic code. In addition, it is impossible to steal the property in the user's bank card.
  • the cardless transfer or withdrawal protection method provided by the application discloses that the mobile phone has a dual system characteristic, and the dynamic code, the mobile phone and the payment platform (ATM machine) form a closed chain in a short period, the three The dependency relationship is not replaceable. Only when the user carries the mobile phone within the preset range of an ATM machine can the dynamic code be obtained through the physical characteristics of the user, thereby avoiding the cardless operation of the user's bank card by the non-user himself. The property in the user's bank card is guaranteed to be safe.
  • step S103 includes:
  • the second operating system compares the location of the second operating system with the preset network segment of the ATM machine in the first operating system by the GPS, and obtains the distance between itself and the nearest ATM machine;
  • the second operating system determines whether the distance is less than a preset distance, and if it is determined that the distance is less than a preset distance, determining that the distance is within a preset range of the ATM machine.
  • the first operating system is pre-configured with a branch point map of the ATM of each bank, and the second operating system compares its location with the branch point map by the global positioning system GPS, and can obtain itself The distance from the nearest ATM machine.
  • the preset distance may be a preset parameter in the mobile phone, or may be set by the user later according to actual conditions, and is not specifically limited herein.
  • the second operating system determines whether it is within a preset range of an ATM machine.
  • the method is not limited to the above steps, and may be set according to a specific application environment. Here, it is only an example, and other determination methods capable of realizing whether it is within a preset range of an ATM machine are also within the protection scope of the present application. .
  • the method further includes:
  • the first operating system determines whether the display of the dynamic code exceeds a preset time.
  • the dynamic code is valid for one day.
  • the preset time is 2 minutes.
  • the dynamic code After the dynamic code is displayed for more than the preset time, the dynamic code is re-encrypted until the dynamic code expires, and the dynamic code is decrypted, so that the user can check with the bank, and the number can be increased. Card operation security.
  • FIG. 3 Another embodiment of the present invention further provides a mobile phone system, as shown in FIG. 3, comprising: a read-only first operating system 101 and a second operating system 102 connected to the network; wherein:
  • the first operating system 101 is configured to encrypt the dynamic code included in the short message received by the second operating system 102.
  • the second operating system 102 is configured to determine whether it is within a preset range of an ATM machine. When the second operating system 102 determines that it is within a preset range of an ATM machine, the first operating system 101 determines the received content. Whether the decryption password matches the preset password; when the first operating system 101 determines that the decryption password matches the preset password, the dynamic code in the short message is displayed; the preset password is the user's own body feature.
  • the second operating system 102 is connected to the network and is also responsible for receiving and transmitting communication messages.
  • the second operating system 102 may be attacked by a Trojan or a virus, but since the first operating system 101 used by the user operating the mobile phone is read-only and is not connected to the network, the information therein is not stolen by the hacker, so that the mobile phone system is more For safety.
  • the mobile phone system uses the characteristics of the dual system to form the dynamic code, the mobile phone and the payment platform (ATM machine) into a closed chain in a short period, and the dependency relationship of the three is It can not be replaced. Only when the user carries the mobile phone within the preset range of an ATM machine can the dynamic code be obtained through his own physical characteristics, thereby avoiding the non-user operation of the user's bank card without the user, and ensuring the user. Property security in the bank card.
  • ATM machine payment platform
  • the decryption password is: a user's own iris feature, fingerprint feature or eye pattern feature.
  • the second operating system 102 is configured to determine whether it is within a preset range of an ATM machine, specifically:
  • the first operating system 101 is further configured to:
  • the dynamic code When it is determined that the display of the dynamic code exceeds the preset time, the dynamic code is re-encrypted until the dynamic code expires, and the dynamic code is decrypted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种无卡转账或取款的保护方法及手机系统,在第二操作系统接收包含动态码的短信(101)后,通过第一操作系统对所述动态码进行加密(102);然后由所述第二操作系统判断自身是否处于某个ATM机的预设范围内(103);当所述第二操作系统判断自身处于某个ATM机的预设范围内时,由所述第一操作系统判断接收的解密密码是否正确(104);当所述第一操作系统判断所述解密密码与预设密码匹配时,显示所述短信中的所述动态码(105);所述预设密码为用户本人的身体特征。也即只能是当用户本人在ATM机附近时,才能通过用户本人的解密密码得到所述动态码,避免了非用户本人对于用户银行卡的无卡操作,保证了用户银行卡内的财产安全。

Description

一种无卡转账或取款的保护方法及手机系统
本申请要求于2015年08月31日提交中国专利局,申请号为201510548550.1、发明名称为“一种无卡转账或取款的保护方法及手机系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及电子技术领域,更具体的说是涉及一种无卡转账或取款的保护方法及手机系统。
背景技术
目前各个银行的ATM(Automatic Teller Machine,自动柜员机)机基本都可以提供无卡转账或取款等业务操作,具体操作时需要输入银行卡的密码及银行发送的短信中的动态码,因为所述动态码具有变动性,进而可以保证无卡转账或取款的安全性。
但在实际应用中,所述动态码通过短信的方式被发送和查看,存在较大的安全隐患。例如手机中病毒的情况下,所述动态码的信息可以被远程窃取;或者手机被盗的情况下,所述动态码的信息可以被盗窃犯利用;再或者诈骗犯可以利用各种手段套取用户手里的动态码,都可以导致用户银行卡内的财产出现安全问题。
然而如果要求银行修改工作流程则是非常困难的,因为涉及到很多银行金融机构要一起变动。所以目前的无卡转账或取款操作中,存在较大的安全隐患有待改善。
发明内容
有鉴于此,本申请提供了一种无卡转账或取款的保护方法及手机系统,用以解决现有技术中用户银行卡在进行无卡操作时存在的安全问题。
为实现上述目的,本申请提供如下技术方案:
一种无卡转账或取款的保护方法,应用于手机系统,所述手机系统包括只读的第一操作系统及与网络连接的第二操作系统;所述无卡转账或取款的保护方法包括:
所述第二操作系统接收包含动态码的短信;
所述第一操作系统对所述动态码进行加密;
所述第二操作系统判断自身是否处于某个ATM机的预设范围内;
当所述第二操作系统判断自身处于某个ATM机的预设范围内时,所述第一操作系统判断接收的解密密码是否与预设密码匹配;
当所述第一操作系统判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
优选的,所述预设密码为:用户本人的虹膜特征、指纹特征或者眼纹特征。
优选的,所述第二操作系统判断自身是否处于某个ATM机的预设范围内的步骤包括:
所述第二操作系统通过全球定位系统GPS将自身的位置与所述第一操作系统内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
所述第二操作系统判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
优选的,在显示所述短信中的所述动态码的步骤之后还包括:
所述第一操作系统判断对于所述动态码的显示是否超过预设时间;
当所述第一操作系统判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
优选的,所述预设时间为2分钟。
一种手机系统,包括:只读的第一操作系统及与网络连接的第二操作系统;其中:
所述第一操作系统用于对所述第二操作系统接收的短信中包含的动态码进行加密;
所述第二操作系统用于判断自身是否处于某个ATM机的预设范围内,当所述第二操作系统判断自身处于某个ATM机的预设范围内时,由所述第一操 作系统判断接收的解密密码是否与预设密码匹配;当所述第一操作系统判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
优选的,所述解密密码为:虹膜特征、指纹特征或者眼纹特征。
优选的,所述第二操作系统用于判断自身是否处于某个ATM机的预设范围内时,具体用于:
通过全球定位系统GPS将自身的位置与所述第一操作系统内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
优选的,所述第一操作系统还用于:
在显示所述短信中的所述动态码之后,判断对于所述动态码的显示是否超过预设时间;
当判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
优选的,所述预设时间为2分钟。
经由上述的技术方案可知,本申请公开提供的一种无卡转账或取款的保护方法,在第二操作系统接收包含动态码的短信后,通过第一操作系统对所述动态码进行加密;然后由所述第二操作系统判断自身是否处于某个ATM机的预设范围内;当所述第二操作系统判断自身处于某个ATM机的预设范围内时,由所述第一操作系统判断接收的解密密码是否正确;当所述第一操作系统判断所述解密密码与预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。也即只能是当用户本人在ATM机附近时,才能通过用户本人的解密密码得到所述动态码,避免了非用户本人对于用户银行卡的无卡操作,保证了用户银行卡内的财产安全。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述 中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本申请提供的一种无卡转账或取款的保护方法的流程图;
图2为本申请另一实施例提供的另外一种无卡转账或取款的保护方法的流程图;
图3为本申请另一实施例提供的一种手机系统的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请提供了一种无卡转账或取款的保护方法及手机系统,用以解决现有技术中用户银行卡在进行无卡操作时存在的安全问题。
所述无卡转账或取款的保护方法应用于手机系统,所述手机系统包括只读的第一操作系统及与网络连接的第二操作系统;所述无卡转账或取款的保护方法如图1所示,包括:
S101、所述第二操作系统接收包含动态码的短信;
当用户需要进行无卡转账或者取款时,银行会发送一个短信,所述短信包含所述动态码,所述动态码用于用户进行无卡操作的验证。所述第二操作系统接收所述短信,将所述短信存储于所述第二操作系统的储存空间。
S102、所述第一操作系统对所述动态码进行加密;
具体的,所述第一操作系统可以在所述第二操作系统的储存空间内,对所述动态码进行加密;或者,所述第一操作系统可以将所述短信存储于所述第一操作系统的储存空间内,再在所述第一操作系统的储存空间内对所述动态码进行加密。所述第一操作系统对所述动态码进行加密的方式可以根据其具体的应用环境而定,此处不做具体限定,均在本申请的保护范围内。
S103、所述第二操作系统判断自身是否处于某个ATM机的预设范围内;
所述第二操作系统属于所述手机系统,所述手机系统为用户的手机内的系 统,所述第二操作系统判断自身处于某个ATM机的预设范围内时,说明用户的手机处于某个ATM机的预设范围内。
S104、当所述第二操作系统判断自身处于某个ATM机的预设范围内时,所述第一操作系统判断接收的解密密码是否与预设密码匹配;
具体的,所述解密密码可以为:用户本人的虹膜特征、指纹特征或者眼纹特征。
S105、当所述第一操作系统判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
优选的,所述预设密码为:用户本人的虹膜特征、指纹特征或者眼纹特征。
所述预设密码为用户本人的身体特征,使得所述动态码只能是用户本人才能得到,其他通过各种非法手段得到包含所述动态码的短信的人,也无法得到所述动态码,进而无法盗取用户银行卡内的财产。
本申请公开提供的所述无卡转账或取款的保护方法,利用手机具有双系统的特性,将所述动态码、手机及支付平台(ATM机)形成一个短期内一个封闭的链,三者的依赖关系是不可以替代,只有用户本人携带手机处于某个ATM机的预设范围内时,才能通过自身的身体特征得到所述动态码,避免了非用户本人对于用户银行卡的无卡操作,保证了用户银行卡内的财产安全。
优选的,步骤S103包括:
a、所述第二操作系统通过全球定位系统GPS将自身的位置与所述第一操作系统内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
b、所述第二操作系统判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
所述第一操作系统内预设有各个银行的ATM机的网点分部图,所述第二操作系统通过全球定位系统GPS将自身的位置与所述网点分部图进行比对,能够得到自身与最接近的ATM机的距离。
所述预设距离可以为手机内的预设参数,也可以为后期用户自己根据实际情况进行设置的,此处不做具体限定。
当然,所述第二操作系统判断自身是否处于某个ATM机的预设范围内的 方法也不限定于上述步骤,可以视具体应用环境进行设定,此处只是一种示例,其他能够实现自身是否处于某个ATM机的预设范围内的判断方法也在本申请的保护范围内。
优选的,如图2所示,在步骤S105之后还包括:
S106、所述第一操作系统判断对于所述动态码的显示是否超过预设时间;
S107、当所述第一操作系统判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
一般情况下,所述动态码的有效期为一天。
优选的,所述预设时间为2分钟。
当所述动态码的显示超过预设时间后,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密,能够提供用户与银行的核对,可以增加无卡操作的安全性。
本发明的另一实施例还提供了一种手机系统,如图3所示,包括:只读的第一操作系统101及与网络连接的第二操作系统102;其中:
第一操作系统101用于对第二操作系统102接收的短信中包含的动态码进行加密;
第二操作系统102用于判断自身是否处于某个ATM机的预设范围内,当第二操作系统102判断自身处于某个ATM机的预设范围内时,由第一操作系统101判断接收的解密密码是否与预设密码匹配;当第一操作系统101判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
第二操作系统102与网络连接,也负责通讯消息的接收和发送。第二操作系统102可能会遭遇木马或者病毒的袭击,但是由于用户操作手机采用的第一操作系统101只读且不连接网络,其内的信息不会被黑客盗取,使得所述手机系统更为安全。
本申请公开提供的所述手机系统,利用双系统的特性,将所述动态码、手机及支付平台(ATM机)形成一个短期内一个封闭的链,三者的依赖关系是 不可以替代,只有用户本人携带手机处于某个ATM机的预设范围内时,才能通过自身的身体特征得到所述动态码,避免了非用户本人对于用户银行卡的无卡操作,保证了用户银行卡内的财产安全。
优选的,所述解密密码为:用户本人的虹膜特征、指纹特征或者眼纹特征。
优选的,第二操作系统102用于判断自身是否处于某个ATM机的预设范围内时,具体用于:
通过全球定位系统GPS将自身的位置与第一操作系统101内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
优选的,第一操作系统101还用于:
在显示所述短信中的所述动态码之后,判断对于所述动态码的显示是否超过预设时间;
当判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
具体的工作原理与上述实施例相同,此处不再赘述。
对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的 其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种无卡转账或取款的保护方法,其特征在于,应用于手机系统,所述手机系统包括只读的第一操作系统及与网络连接的第二操作系统;所述无卡转账或取款的保护方法包括:
    所述第二操作系统接收包含动态码的短信;
    所述第一操作系统对所述动态码进行加密;
    所述第二操作系统判断自身是否处于某个ATM机的预设范围内;
    当所述第二操作系统判断自身处于某个ATM机的预设范围内时,所述第一操作系统判断接收的解密密码是否与预设密码匹配;
    当所述第一操作系统判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
  2. 根据权利要求1所述的无卡转账或取款的保护方法,其特征在于,所述预设密码为:用户本人的虹膜特征、指纹特征或者眼纹特征。
  3. 根据权利要求1所述的无卡转账或取款的保护方法,其特征在于,所述第二操作系统判断自身是否处于某个ATM机的预设范围内的步骤包括:
    所述第二操作系统通过全球定位系统GPS将自身的位置与所述第一操作系统内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
    所述第二操作系统判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
  4. 根据权利要求1所述的无卡转账或取款的保护方法,其特征在于,在显示所述短信中的所述动态码的步骤之后还包括:
    所述第一操作系统判断对于所述动态码的显示是否超过预设时间;
    当所述第一操作系统判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
  5. 根据权利要求1所述的无卡转账或取款的保护方法,其特征在于,所述预设时间为2分钟。
  6. 一种手机系统,其特征在于,包括:只读的第一操作系统及与网络连 接的第二操作系统;其中:
    所述第一操作系统用于对所述第二操作系统接收的短信中包含的动态码进行加密;
    所述第二操作系统用于判断自身是否处于某个ATM机的预设范围内,当所述第二操作系统判断自身处于某个ATM机的预设范围内时,由所述第一操作系统判断接收的解密密码是否与预设密码匹配;当所述第一操作系统判断所述解密密码与所述预设密码匹配时,显示所述短信中的所述动态码;所述预设密码为用户本人的身体特征。
  7. 根据权利要求6所述的手机系统,其特征在于,所述解密密码为:虹膜特征、指纹特征或者眼纹特征。
  8. 根据权利要求6所述的手机系统,其特征在于,所述第二操作系统用于判断自身是否处于某个ATM机的预设范围内时,具体用于:
    通过全球定位系统GPS将自身的位置与所述第一操作系统内预设的ATM机的网点分部图进行比对,得到自身与最接近的ATM机的距离;
    判断所述距离是否小于预设距离,若判断所述距离小于预设距离则判断自身处于所述ATM机的预设范围内。
  9. 根据权利要求6所述的手机系统,其特征在于,所述第一操作系统还用于:
    在显示所述短信中的所述动态码之后,判断对于所述动态码的显示是否超过预设时间;
    当判断对于所述动态码的显示超过所述预设时间时,对所述动态码重新进行加密,直至所述动态码的有效期过后才对所述动态码进行解密。
  10. 根据权利要求6所述的手机系统,其特征在于,所述预设时间为2分钟。
PCT/CN2016/084106 2015-08-31 2016-05-31 一种无卡转账或取款的保护方法及手机系统 WO2017036201A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510548550.1A CN105096111A (zh) 2015-08-31 2015-08-31 一种无卡转账或取款的保护方法及手机系统
CN201510548550.1 2015-08-31

Publications (1)

Publication Number Publication Date
WO2017036201A1 true WO2017036201A1 (zh) 2017-03-09

Family

ID=54576478

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084106 WO2017036201A1 (zh) 2015-08-31 2016-05-31 一种无卡转账或取款的保护方法及手机系统

Country Status (2)

Country Link
CN (1) CN105096111A (zh)
WO (1) WO2017036201A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096111A (zh) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 一种无卡转账或取款的保护方法及手机系统
CN105915709A (zh) * 2016-04-14 2016-08-31 深圳市金立通信设备有限公司 一种通信连接建立方法及终端
CN106548081A (zh) * 2016-10-28 2017-03-29 努比亚技术有限公司 一种终端信息显示方法及装置
CN108053220B (zh) * 2018-01-11 2019-07-02 平安科技(深圳)有限公司 一种无卡取款的保护方法、设备及存储介质
TWI696136B (zh) * 2018-03-31 2020-06-11 華南商業銀行股份有限公司 透過行動通訊裝置執行交易的系統及其方法
TWI748415B (zh) * 2018-03-31 2021-12-01 華南商業銀行股份有限公司 透過行動通訊裝置執行交易的系統及其方法
CN110322235A (zh) * 2019-07-05 2019-10-11 中国工商银行股份有限公司 一种基于标识实现的跨行无卡取现处理方法及装置
CN115359604A (zh) * 2022-07-04 2022-11-18 南京银行股份有限公司 一种基于光通信技术的无卡取现系统与方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1560801A (zh) * 2004-03-09 2005-01-05 欧阳世杰 一次性密码保护无卡式电子交易交付方法
US20100250410A1 (en) * 2009-03-30 2010-09-30 Yuh-Shen Song Cardless financial transactions system
CN103077458A (zh) * 2012-09-24 2013-05-01 安徽杨凌科技有限公司 基于位置的atm安全交易认证方法
CN104573548A (zh) * 2014-12-22 2015-04-29 宇龙计算机通信科技(深圳)有限公司 一种信息加密、解密方法、装置和终端
CN105096111A (zh) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 一种无卡转账或取款的保护方法及手机系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1560801A (zh) * 2004-03-09 2005-01-05 欧阳世杰 一次性密码保护无卡式电子交易交付方法
US20100250410A1 (en) * 2009-03-30 2010-09-30 Yuh-Shen Song Cardless financial transactions system
CN103077458A (zh) * 2012-09-24 2013-05-01 安徽杨凌科技有限公司 基于位置的atm安全交易认证方法
CN104573548A (zh) * 2014-12-22 2015-04-29 宇龙计算机通信科技(深圳)有限公司 一种信息加密、解密方法、装置和终端
CN105096111A (zh) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 一种无卡转账或取款的保护方法及手机系统

Also Published As

Publication number Publication date
CN105096111A (zh) 2015-11-25

Similar Documents

Publication Publication Date Title
WO2017036201A1 (zh) 一种无卡转账或取款的保护方法及手机系统
RU2710897C2 (ru) Способы безопасного генерирования криптограмм
US8843757B2 (en) One time PIN generation
EP3232410B1 (en) Payment system
KR102442663B1 (ko) 보안 원격 지불 거래 처리
US10546119B2 (en) Methods for securely storing sensitive data on mobile device
ES2951585T3 (es) Autenticación de transacciones usando un identificador de dispositivo móvil
TWI635412B (zh) Method, device and system for verifying user identity by using social relationship data
CN106716916B (zh) 认证系统和方法
RU2560810C2 (ru) Способ и система защиты информации от несанкционированного использования (ее варианты)
JP2023524393A (ja) インテリジェントカードのロック解除
US20170213213A1 (en) Enhanced authentication security applicable in an at least partially insecure network environment
CN102938033A (zh) 一种银行u盾增强安全性的系统及使用方法
US9871890B2 (en) Network authentication method using a card device
US20170330177A1 (en) Payment terminal authentication
CN107026734A (zh) 一种利用认证持续有效性进行密码管理的方法及系统
EP3320664B1 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
WO2016184087A1 (zh) 设备间的信息传输方法、系统和源终端、存储介质
CN104980913B (zh) 保护终端设备中数据信息安全的方法和终端设备
WO2015131860A1 (en) Method and system for securing bank account access
US20210209589A1 (en) Blockchain session key
WO2017108226A1 (en) Data security
Singh et al. Designing multifactor secure authentication architecture for financial transactions
KR20130054020A (ko) 출금 처리 방법 및 그 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16840630

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16840630

Country of ref document: EP

Kind code of ref document: A1