WO2018219010A1 - 一种空中发卡方法及装置 - Google Patents

一种空中发卡方法及装置 Download PDF

Info

Publication number
WO2018219010A1
WO2018219010A1 PCT/CN2018/078871 CN2018078871W WO2018219010A1 WO 2018219010 A1 WO2018219010 A1 WO 2018219010A1 CN 2018078871 W CN2018078871 W CN 2018078871W WO 2018219010 A1 WO2018219010 A1 WO 2018219010A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
card
verification
public key
verification code
Prior art date
Application number
PCT/CN2018/078871
Other languages
English (en)
French (fr)
Inventor
陈成超
冀乃庚
傅宜生
田丰
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2018219010A1 publication Critical patent/WO2018219010A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to an air card issuing method and apparatus.
  • TCL Trusted Service Management
  • TSM is a complete "air card issuance” and application management system based on "one card multi-application” technology.
  • TSM is an innovative mobile payment field.
  • the traditional TSM air card issuance process is based on the carrier partner client. It is initiated by the carrier partner client and completes the air card issuance in the carrier partner client interface.
  • the communication carrier and mobile phone manufacturer And Bluetooth wearable device manufacturers and the like are called carrier partners.
  • the user inputs the bank card number through the carrier partner client on the terminal, and the terminal sends the bank card number to the background of the carrier partner, and then sends it to the UnionPay TSM platform, and the bank number of the bank card is carried out by the UnionPay TSM platform. Test.
  • the user inputs the information such as the debit and credit element and the mobile phone number to the terminal, and initiates an air card issuance application through the carrier partner client, and the application is sent from the terminal to the carrier partner background, and then sent to the card issuer through the UnionPay TSM platform.
  • the card issuer returns the personalized data after passing the background verification.
  • the user initiates a request for obtaining a short message verification code through the terminal, and the request is sent from the terminal to the background of the carrier partner, and then sent to the background of the card issuer through the UnionPay TSM platform, and the card issuer returns the SMS verification code in the background.
  • the terminal After the terminal receives the SMS verification code, the user inputs the SMS verification code through the terminal to initiate a card activation request, and the activation request is sent from the terminal to the background of the carrier partner, and then sent to the background of the card issuer through the UnionPay TSM platform, and the card issuer receives the background in the background. After the verification is passed, the card is activated and feedback is given.
  • the above-mentioned air card issuance service takes a long time, the process is too complicated, and the user needs to perform many operational steps.
  • the application provides an air card issuing method and device, which is used to simplify the operation process of the air card issuance, reduce the number of user interactions, and shorten the time of the entire air card issuance.
  • the terminal encrypts the verification code and the user information by using the transmission public key to obtain a second card issuance application, including:
  • the terminal encrypts the verification code, the user information, the public key certificate, and the signed verification code by using the transmission public key to obtain a second card issuance request.
  • the card issuer client on the terminal performs information transmission with the secure carrier through a TSM control loaded by the terminal.
  • it also includes:
  • the TSM platform decrypts the second card issuance request by using a transmission private key corresponding to the transmission public key, and sends the user information to the sender's background after verifying the verification code; the user information is used by the user information Having the card issuer verify in the background and feedback the personalized data after passing;
  • the second card issuance application further includes:
  • the transmission public key to encrypt the public key certificate and the signed verification code, where the public key certificate is obtained by the terminal from the security carrier of the terminal according to the first card issuance request;
  • the verification code after the signature is that the terminal signs the verification code by using a private key certificate corresponding to the public key certificate;
  • it also includes:
  • the TSM platform receives the OTP sent by the terminal, and sends the OTP to the card issuer to perform OTP verification.
  • the embodiment of the present invention further provides an air card issuing device, including:
  • the first transceiver module is configured to request, by the trusted service management TSM platform, the verification information according to the first card issuance request, where the first card issuance application is received by the terminal by the card issuer client set on the terminal;
  • the verification information includes a verification code and a transmission public key;
  • An encryption module configured to encrypt the verification code and the user information by using the transmission public key to obtain a second card issuance request; the user information is pre-stored by the card issuer client;
  • the first transceiver module is further configured to send the second card issuance request to the TSM platform, where the second card issuance request is used to enable the TSM platform to use the transmission private key corresponding to the transmission public key.
  • the user information is sent to the sender's background; the user information is used to enable the card issuer to perform verification in the background and feedback the personalized data after passing;
  • the first activation module is configured to set a state of the card to an activated state according to the received personalized data.
  • an acquisition module is further included for:
  • the encryption module is configured to:
  • the obtaining module is further configured to:
  • the first transceiver module is further configured to send the OTP to the TSM platform, so that the TSM platform sends the OTP to the card issuer for background OTP verification.
  • the second transceiver module is configured to send verification information to the terminal according to the request of the terminal, where the request is sent to the TSM platform after the card issuer client set on the terminal receives the first card issuance request;
  • the verification information includes a verification code and a transmission public key;
  • a decrypting module configured to decrypt the second card issuing application by using a transmission private key corresponding to the transmission public key
  • a verification module configured to verify the verification code
  • the second transceiver module is further configured to send the user information to the card issuer background after the verification code is verified; the user information is used to enable the card issuer to perform verification in the background and feedback the individual after passing the verification Data
  • the second transceiver module is further configured to send the personalized data to the terminal;
  • the second activation module is configured to set the state of the card to an activated state after acquiring the activation notification of the terminal.
  • the transmission public key to encrypt the public key certificate and the signed verification code, where the public key certificate is obtained by the terminal from the security carrier of the terminal according to the first card issuance request;
  • the verification code after the signature is that the terminal signs the verification code by using a private key certificate corresponding to the public key certificate;
  • the verification module is configured to perform verification on the decrypted verification code by using the public key certificate
  • the second transceiver module is further configured to:
  • an embodiment of the present invention provides a computing device, including:
  • a memory for storing program instructions
  • an embodiment of the present invention provides a computer program product, which when executed on a computer, causes the computer to perform the method of any of the above.
  • FIG. 1 is a schematic structural diagram of a system applicable to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an air card issuing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flow chart of an air card issuing method according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an air card issuing device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another air card issuing device according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a computing device according to an embodiment of the present invention.
  • the terminal 101 may be an electronic device with a wireless communication function, such as a mobile phone, a tablet computer, or a dedicated handheld device, or may be a device connected to the Internet by a wired access method such as a personal computer (PC), a notebook computer, or a server.
  • the TSM server 102 and the issuer server 103 may be network devices such as computers.
  • the TSM server 102 or the issuer server 103 may be a standalone device or a server cluster formed by multiple servers.
  • the TSM server 102 and the card issuer server 103 can employ cloud computing technology for information processing.
  • the terminal 101 and the card issuer server 103 are connected to the TSM server 102, that is, the terminal 101 communicates with the issuer server 103 via the TSM server 102.
  • the terminal 101 can communicate with the TSM server 102 through an INTERNET network, or can be a mobile communication system such as a Global System for Mobile Communications (GSM), a long term evolution (LTE) system, or the TSM server 102. Communicate.
  • the TSM server 102 can communicate with the card issuer server 103 through the INTERNET network, or can be sent through a mobile communication system such as a Global System for Mobile Communications (GSM) or a long term evolution (LTE) system.
  • the party server 103 performs communication.
  • the embodiment of the present invention provides a preferred implementation manner, and the terminal 101 is used as an example for the mobile phone.
  • the issuer client and the UnionPay TSM control may be installed in the terminal 101 in advance.
  • FIG. 2 is a schematic flow chart showing an air card issuing method according to an embodiment of the present invention. As shown in FIG. 2, the method for air card issuance provided by the embodiment of the present invention includes the following steps:
  • Step 201 The terminal requests, according to the first card issuance application, the TCM platform to obtain the verification information, where the first card issuance application is received by the terminal by the card issuer client set on the terminal; the verification information includes a verification code and Transfer the public key.
  • Step 203 The terminal encrypts the verification code and the user information by using the transmission public key to obtain a second card issuance request; the user information is pre-stored by the card issuer client.
  • Step 204 The terminal sends the second card issuance request to the TSM platform.
  • Step 206 The TSM platform decrypts the second card issuance request by using a transmission private key corresponding to the transmission public key, and sends the user information to a background of the card issuer after verifying the verification code; User information is used to enable the card issuer to verify in the background and to feed back personalized data after passing.
  • Step 208 The terminal sets the state of the card to an activated state according to the received personalized data.
  • the card is provided with a card issuing party client, and the user sends a first card issuance request to the terminal through the card issuing client, and the terminal requests the TSM platform to obtain the verification information according to the first card issuance request, and the verification information includes the verification code. And transfer the public key.
  • the terminal After obtaining the verification information, the terminal encrypts the verification code and the user information by using the transmission public key, so as to obtain the second card issuance request, the user information is obtained from the card issuing party client, and the terminal can directly call the pre-stored user according to the first card issuance request. Information without the user having to re-enter.
  • the random number contained therein will also change, and the UnionPay TSM platform can be verified by the random number without determining that the received card-issuing application has been tampered with, thereby refusing to further process the card-issuing application.
  • the random number verification code generated by the UnionPay TSM platform ensures that the card issuance application has not been tampered with.
  • the UnionPay TSM platform provides a transmission public key, so that the terminal encrypts the sent application, thereby ensuring The security of the information during transmission.
  • the embodiment of the present invention also encrypts the random number verification code.
  • the method further includes:
  • the terminal signs the verification code by using a private key certificate corresponding to the public key certificate;
  • the terminal encrypts the verification code, the user information, the public key certificate, and the signed verification code by using the transmission public key to obtain a second card issuance request.
  • the UnionPay TSM platform After receiving the card issuance request sent by the terminal, the UnionPay TSM platform first uses the stored transmission private key to decrypt the card issuing application, and obtains the public key certificate, the random number verification code, the signed verification code, and the user information. The UnionPay TSM platform uses the public key certificate and the signed verification code to check the verification code. Specifically, the signed verification code can be decrypted by using the public key certificate, and then the decrypted verification code, the received verification code, and The cached verification codes in the TSM platform are compared. If the three are consistent, the verification is passed. The set of digital certificates generated in the security carrier ensures the security of the verification code, so that the verification code is not easily acquired and is not easily cracked, thereby ensuring that the verification code is not tampered and the replay attack can be avoided.
  • the TSM platform receives the OTP sent by the terminal, and sends the OTP to the card issuer to perform OTP verification.
  • the card issuing party verifies the received OTP in the background, and can verify whether the card issuing application is subjected to a replay attack according to whether the data in the OTP structure is tampered with. After the verification, the card issuer returns the personalized data to the terminal through the UnionPay TSM platform to activate the card.
  • the embodiment of the present invention also provides a two-layer anti-replay mechanism.
  • the first layer verifies the random number verification code for the UnionPay TSM platform, and determines that the information is not subjected to the replay attack by determining that the random number has not been tampered with.
  • the other layer is the card issuer background verification OTP, which is determined to be unreplayed by comparing the data in the OTP structure without being tampered with.
  • the card issuer client on the terminal performs information transmission with the secure carrier through a TSM control loaded by the terminal.
  • the security bearer and the issuer client do not directly transmit information, but are transparently transmitted through the TSM control.
  • the card issuer client receives the first card issue request, sends a message to the TSM control to obtain the public key certificate, and the TSM control transparently transmits the message to the security bearer, so that the security bearer sends the public key certificate to the TSM platform.
  • the security bearer signs the verification code by using the private key certificate
  • the verification code, the signed verification code, and the public key certificate are transparently transmitted to the card issuer client through the TSM control
  • the card issuer client determines the user information and utilizes the TSM platform.
  • the provided transmission public key encrypts the verification code, the user information, the public key certificate, and the signed verification code, thereby obtaining a second card issuing application.
  • Step 301 The terminal receives, by the card issuer client, a first card issue application initiated by the user.
  • Step 302 According to the first card issuance application, the TSM control requests the security bearer to obtain the public key certificate.
  • Step 303 The security bearer in the terminal requests the TSM platform to obtain the verification information, where the verification information includes a random number verification code and a transmission public key.
  • Step 305 The security bearer uses the private key certificate corresponding to the public key certificate to sign the random number verification code, and obtain the signed verification code.
  • Step 306 The security carrier sends the random number, the signed verification code, the public key certificate, and the transmission public key to the TSM control.
  • Step 307 The TSM control transparently transmits the random number, the signed verification code, the public key certificate, and the transmission public key to the card issuing party client.
  • Step 308 The card issuer client determines user information related to the card issuance application, and encrypts the user information, the random number, the signed verification code, and the public key certificate by using the transmission public key.
  • Step 309 The card issuer client determines the OTP, and sends the information encrypted by using the transmission public key and the OTP to the TSM control.
  • Step 310 The TSM control sends the information encrypted by the transmission public key and the OTP to the security carrier.
  • Step 311 The security bearer sends a second card issuance request and an OTP to the TSM platform, and the second card issuance application includes the information encrypted in step 310 and encrypted by using the transport public key.
  • Step 312 The TSM platform decrypts the encrypted information by using a transmission private key, and performs verification according to the random number and the signed verification code.
  • Step 313 After the verification is passed, the TSM platform sends a third card issuance application and an OTP to the card issuer client, where the third card application includes user information, a random number, a signed verification code, and a public key certificate.
  • Step 314 The issuer client also verifies the random number verification code and verifies the structure in the OTP to prevent the information from being tampered with. At the same time, the card issuer client also verifies the user information to determine the identity of the user.
  • Step 315 After the verification of the card issuer client, the personalized data is returned to the TSM platform.
  • Step 316 The TSM platform sends the personalized data to the terminal.
  • Step 317 The terminal performs a personalization process to activate the card.
  • Step 318 The terminal sends a personalized success notification to the TSM platform to notify the TSM platform that the activation is successful.
  • Step 319 the TSM platform performs a personalization process to activate the card.
  • Step 320 The TSM platform sends a personalized success notification to the card issuer background to notify the card issuer that the background activation is successful.
  • Step 321 The card issuing party activates the card in the background, and the card activation is completed.
  • FIG. 4 is a schematic structural diagram of an air card issuing device according to an embodiment of the present invention.
  • an air card issuing device includes:
  • the first transceiver module 401 is configured to request, by the trusted service management TSM platform, the verification information according to the first card issuance request, where the first card issuance request is received by the terminal by the card issuer client set on the terminal;
  • the verification information includes a verification code and a transmission public key;
  • the encryption module 402 is configured to encrypt the verification code and the user information by using the transmission public key to obtain a second card issuance request; the user information is pre-stored by the card issuer client;
  • the first transceiver module 401 is further configured to send the second card issuance request to the TSM platform, where the second card issuance application is used to enable the TSM platform to use a transmission private key corresponding to the transmission public key.
  • the user information is sent to the sender's background; the user information is used to enable the card issuer to perform verification in the background and feedback the personalized data after passing;
  • the first activation module 403 is configured to set a state of the card to an activated state according to the received personalized data.
  • the method further includes an obtaining module 404, configured to:
  • the encryption module 402 is configured to:
  • the verification code, the user information, the public key certificate, and the signed verification code are encrypted by using the transmission public key to obtain a second card issuance request.
  • the obtaining module 404 is further configured to:
  • the first transceiver module is further configured to send the OTP to the TSM platform, so that the TSM platform sends the OTP to the card issuer for background OTP verification.
  • the embodiment of the present invention further provides another air card issuing device, as shown in FIG. 5, including:
  • the second transceiver module 501 is configured to send, according to the request of the terminal, verification information to the terminal, where the request is sent to the TSM platform after the card issuer client set on the terminal receives the first card issuance request.
  • the verification information includes a verification code and a transmission public key;
  • the second transceiver module 501 is further configured to receive a second card issuance request sent by the terminal, where the second card issuance request is obtained by the terminal using the transmission public key to encrypt the verification code and user information.
  • the user information is pre-stored by the card issuer client;
  • the decryption module 502 is configured to decrypt the second card issuance request by using a transmission private key corresponding to the transmission public key;
  • a verification module 503, configured to verify the verification code
  • the second transceiver module 501 is further configured to send the user information to the card issuer background after the verification code is verified; the user information is used to enable the card issuer to perform verification in the background and pass the feedback after passing Personalized data;
  • the second transceiver module 501 is further configured to send the personalized data to the terminal;
  • the second activation module 504 is configured to set the state of the card to an active state after acquiring the activation notification of the terminal.
  • the second card issuance application further includes:
  • the transmission public key to encrypt the public key certificate and the signed verification code, where the public key certificate is obtained by the terminal from the security carrier of the terminal according to the first card issuance request;
  • the verification code after the signature is that the terminal signs the verification code by using a private key certificate corresponding to the public key certificate;
  • the verification module 503 is configured to perform verification of the decrypted verification code by using the public key certificate
  • the second transceiver module 501 is further configured to send the user information, the public key certificate, the verification code, and the signed verification code to the card issuer background after the verification is passed.
  • the second transceiver module 501 is further configured to:
  • FIG. 6 is a schematic structural diagram of a computing device according to an embodiment of the present invention.
  • the computing device may include a central processing unit 601 (Center Processing Unit, CPU), memory 602, input/output device 603, bus system 604, etc., the input device may include a keyboard, a mouse, a touch screen, etc., and the output device may include a display device such as a liquid crystal display (LCD), a cathode ray. Tube (Cathode Ray Tube, CRT) and the like.
  • CPU Center Processing Unit
  • memory 602 input/output device 603, bus system 604, etc.
  • the input device may include a keyboard, a mouse, a touch screen, etc.
  • the output device may include a display device such as a liquid crystal display (LCD), a cathode ray. Tube (Cathode Ray Tube, CRT) and the like.
  • LCD liquid crystal display
  • CRT cathode Ray Tube
  • Memory 602 can include read only memory (ROM) and random access memory (RAM) and provides program instructions and data stored in the memory to the processor.
  • ROM read only memory
  • RAM random access memory
  • the memory may be used to store a program of the method provided by any embodiment of the present invention, and the processor executes the method disclosed in any one of the embodiments according to the obtained program instruction by calling a program instruction stored in the memory. .
  • an embodiment of the present invention further provides a computer readable storage medium for storing computer program instructions for use in the above computing device, comprising a program for executing the method disclosed in any of the above embodiments.
  • the computer storage medium can be any available media or data storage device accessible by a computer, including but not limited to magnetic storage (eg, floppy disk, hard disk, magnetic tape, magneto-optical disk (MO), etc.), optical storage (eg, CD, DVD, BD, HVD, etc.), and semiconductor memories (for example, ROM, EPROM, EEPROM, non-volatile memory (NAND FLASH), solid-state hard disk (SSD)).
  • magnetic storage eg, floppy disk, hard disk, magnetic tape, magneto-optical disk (MO), etc.
  • optical storage eg, CD, DVD, BD, HVD, etc.
  • semiconductor memories for example, ROM, EPROM, EEPROM, non-volatile memory (NAND FLASH), solid-state hard disk (SSD)).
  • an embodiment of the present invention further provides a computer program product that, when run on a computer, causes the computer to perform the method disclosed in any of the above embodiments.
  • the card is provided with a card issuing party client, and the user sends a first card issuance request to the terminal through the card issuing client, and the terminal requests the TSM platform to obtain the verification information according to the first card issuance request, and the verification information includes the verification code. And transfer the public key.
  • the terminal After obtaining the verification information, the terminal encrypts the verification code and the user information by using the transmission public key, so as to obtain the second card issuance request, the user information is obtained from the card issuing party client, and the terminal can directly call the pre-stored user according to the first card issuance request. Information without the user having to re-enter.
  • the terminal sends the second card issuance request to the TSM platform, and the TSM platform decrypts the second card issuance request by using the transmission private key corresponding to the transmission public key, and verifies the verification code obtained after the decryption, and after the verification is passed, the user information is obtained.
  • the card issuer verifies the user information in the background to verify the identity of the user, and after the verification is passed, the personalized data is fed back.
  • the terminal sets the state of the card to an active state according to the received personalized data, thereby completing the air card issuance.
  • the user sends a card issuance application through the card issuing party client set on the terminal.
  • the card issuance application is directly transmitted from the terminal to the UnionPay TSM platform, and the carrier partner client and the carrier partner are skipped.
  • the card issuer client can directly call the pre-stored user information. Therefore, the embodiment of the present invention does not require the user to re-enter the user information, and further It simplifies the user's operation process and shortens the time for card issuance in the air.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

本发明实施例提供一种空中发卡方法及装置,包括:终端根据第一发卡申请,向可信服务管理 TSM 平台请求获取验证信息,第一发卡申请为设置在终端上的发卡方客户端接收;验证信息包括验证码和传输公钥;终端使用传输公钥对验证码和用户信息进行加密,得到第二发卡申请;终端向 TSM平台发送第二发卡申请,第二发卡申请用于使 TSM 平台使用传输公钥对应的传输私钥对第二发卡申请解密并验证通过后,将用户信息发送给发卡方后台;用户信息用于使发卡方后台进行验证并在通过后反馈个人化数据;终端根据接收的个人化数据,将卡片的状态设置为激活状态,可见,该方法可简化空中发卡的操作流程,缩短整个空中发卡的时间。

Description

一种空中发卡方法及装置
本申请要求在2017年5月31日提交中国专利局、申请号为201710398278.2、发明名称为“一种空中发卡方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种空中发卡方法及装置。
背景技术
银联TSM(Trusted Service Management,可信服务管理)是基于“一卡多应用”技术建立的一套完整的“空中发卡”和应用管理体系。通过TSM平台,发卡机构可安全、高效地将多张金融智能卡信息集中在手机或IC卡上,既方便用户携带、使用,又便于自身发卡和管理。TSM是一个创新性的移动支付领域,传统的TSM空中发卡流程都是基于载体合作方客户端,由载体合作方客户端发起并在载体合作方客户端界面完成空中发卡,通信运营商、手机厂商以及蓝牙可穿戴设备厂商等被称为载体合作方。
具体来说,通过载体合作方进行发卡申请,有以下流程:
1、用户通过终端上的载体合作方客户端输入银行卡卡号,终端将银行卡卡号发送到载体合作方后台,再发送到银联TSM平台,由银联TSM平台对该卡号进行银行卡的bin号校验。
2、校验通过后,用户向终端输入借贷记要素、手机号等信息,通过载体合作方客户端发起空中发卡申请,申请从终端发送到载体合作方后台,再通过银联TSM平台发送到发卡方后台,发卡方后台验证通过后返回个人化数据。
3、用户通过终端发起获取短信验证码请求,请求从终端发送到载体合作方后台,再通过银联TSM平台发送到发卡方后台,发卡方后台反馈短信验证 码。
4、终端收到短信验证码后,用户通过终端输入短信验证码,发起卡片激活请求,激活请求从终端发送到载体合作方后台,再通过银联TSM平台发送到发卡方后台,发卡方后台收到验证通过后将卡片激活,并进行反馈。
上述空中发卡业务的时间较长,过程过于复杂,需要用户执行的操作步骤较多。
发明内容
本申请提供一种空中发卡方法及装置,用以简化空中发卡的操作流程,减少用户的交互次数,缩短整个空中发卡的时间。
第一方面,本发明实施例提供一种空中发卡方法,包括:
终端根据第一发卡申请,向可信服务管理TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥;
所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息从所述发卡方客户端获取;
所述终端向所述TSM平台发送所述第二发卡申请,所述第二发卡申请用于使所述TSM平台使用所述传输公钥对应的传输私钥对所述第二发卡申请解密并验证通过后,将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
所述终端根据接收的所述个人化数据,将卡片的状态设置为激活状态。
可选的,所述向TSM平台请求获取验证信息之前,还包括:
所述终端根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请,包括:
所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
所述终端使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名后的所述验证码进行加密,得到第二发卡申请。
可选的,所述终端根据所述第一发卡申请,获取安全载体的公钥证书,包括:
所述终端上的所述发卡方客户端通过所述终端装载的TSM控件与所述安全载体进行信息传递。
可选的,还包括:
所述终端根据所述第一发卡申请确定动态口令OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
所述终端向所述TSM平台发送所述OTP,以使所述TSM平台将所述OTP发送给所述发卡方后台进行OTP验证。
第二方面,基于同样的发明构思,本发明实施例还提供另一种空中发卡方法,包括:
TSM平台根据终端的请求,向所述终端发送验证信息,所述请求为设置在所述终端上的发卡方客户端接收到第一发卡申请后向所述TSM平台发送的;所述验证信息包括验证码和传输公钥;
所述TSM平台接收所述终端发送的第二发卡申请,所述第二发卡申请为所述终端使用所述传输公钥对所述验证码和用户信息进行加密而获得;所述用户信息为所述发卡方客户端预先存储的;
所述TSM平台利用所述传输公钥对应的传输私钥对所述第二发卡申请解密,并在对所述验证码验证通过后将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
所述TSM平台将所述个人化数据发送给所述终端,并在获取所述终端的激活通知后,将卡片的状态设置为激活状态。
可选的,所述第二发卡申请还包括:
使用所述传输公钥对公钥证书和签名后的所述验证码进行加密,所述公钥证书为所述终端根据所述第一发卡申请从所述终端的安全载体中获取的; 所述签名后的所述验证码为所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
所述在验证通过后将所述用户信息发送给发卡方后台,包括:
所述TSM平台利用所述公钥证书对解密后的验证码进行验签,并在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
可选的,还包括:
所述TSM平台接收所述终端发送的OTP,并将所述OTP发送给所述发卡方后台进行OTP验证。
第三方面,基于同样的发明构思,本发明实施例进一步地提供一种空中发卡装置,包括:
第一收发模块,用于根据第一发卡申请,向可信服务管理TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥;
加密模块,用于使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息为所述发卡方客户端预先存储的;
所述第一收发模块,还用于向所述TSM平台发送所述第二发卡申请,所述第二发卡申请用于使所述TSM平台使用所述传输公钥对应的传输私钥对所述第二发卡申请解密并验证通过后,将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
第一激活模块,用于根据接收的所述个人化数据,将卡片的状态设置为激活状态。
可选的,还包括获取模块,用于:
根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
所述加密模块,用于:
使用所述公钥证书对应的私钥证书对所述验证码进行签名;
使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名 后的所述验证码进行加密,得到第二发卡申请。
可选的,所述获取模块,还用于:
根据所述第一发卡申请确定动态口令OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
所述第一收发模块,还用于向所述TSM平台发送所述OTP,以使所述TSM平台将所述OTP发送给所述发卡方后台进行OTP验证。
第四方面,基于同样的发明构思,本发明实施例进一步地提供另一种空中发卡装置,包括:
第二收发模块,用于根据终端的请求,向所述终端发送验证信息,所述请求为设置在所述终端上的发卡方客户端接收到第一发卡申请后向所述TSM平台发送的;所述验证信息包括验证码和传输公钥;
所述第二收发模块,还用于接收所述终端发送的第二发卡申请,所述第二发卡申请为所述终端使用所述传输公钥对所述验证码和用户信息进行加密而获得;所述用户信息从所述发卡方客户端获取;
解密模块,用于利用所述传输公钥对应的传输私钥对所述第二发卡申请解密;
验证模块,用于对所述验证码进行验证;
所述第二收发模块,还用于在对所述验证码验证通过后将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
所述第二收发模块,还用于将所述个人化数据发送给所述终端;
第二激活模块,用于获取所述终端的激活通知后,将卡片的状态设置为激活状态。
可选的,所述第二发卡申请还包括:
使用所述传输公钥对公钥证书和签名后的所述验证码进行加密,所述公钥证书为所述终端根据所述第一发卡申请从所述终端的安全载体中获取的;所述签名后的所述验证码为所述终端使用所述公钥证书对应的私钥证书对所 述验证码进行签名;
所述验证模块,用于利用所述公钥证书对解密后的验证码进行验签;
所述第二收发模块,还用于在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
可选的,所述第二收发模块,还用于:
接收所述终端发送的OTP,并将所述OTP发送给所述发卡方后台进行OTP验证。
第五方面,本发明实施例提供一种计算设备,包括:
存储器,用于存储程序指令;
处理器,用于调用所述存储器中存储的程序指令,按照获得的程序执行上述任一项所述的方法。
第六方面,本发明实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使所述计算机执行上述任一项所述的方法。
第七方面,本发明实施例提供一种计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一项所述的方法。
综上所述,本发明实施例中,终端上设置有发卡方客户端,用户通过发卡方客户端向终端发出第一发卡申请,终端根据第一发卡申请,向TSM平台请求获取验证信息,该验证信息包括验证码和传输公钥。终端获取到验证信息后,使用传输公钥对验证码和用户信息进行加密,从而得到第二发卡申请,用户信息从发卡方客户端中获取,终端可以根据第一发卡申请直接调用预先存储的用户信息,而无需用户重新输入。终端将第二发卡申请发送给TSM平台,TSM平台利用与传输公钥对应的传输私钥对第二发卡申请进行解密,并对解密后得到的验证码进行验证,在验证通过后,将用户信息发送给发卡方后台。发卡方后台对用户信息进行验证从而核实用户的身份,在验证通过后,反馈个人化数据。终端根据接收的个人化数据,将卡片的状态设置为激活状态,从而完成空中发卡。本发明实施例中,用户通过终端上设置的发卡方客 户端发出发卡申请,相较于现有技术,发卡申请直接从终端传输到银联TSM平台,跳过了载体合作方客户端以及载体合作方后台,且通过传输公钥加密保障申请的安全性,无需再执行短信激活和验证的步骤,优化了空中发卡的流程,减少了终端与后台之间的交互次数,缩短了整个空中发卡过程的时间。此外,用户通过发卡方客户端进行空中发卡申请后,由于发卡方客户端可以直接调用预先存储的用户信息,因此,相较于现有技术,本发明实施例无需用户再重新输入用户信息,进一步简化了用户的操作过程,缩短了空中发卡的时间。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例适用的一种系统架构示意图;
图2为本发明实施例提供的一种空中发卡方法的流程示意图;
图3为本发明具体实施例中一种空中发卡方法的流程示意图;
图4为本发明实施例提供的一种空中发卡装置的结构示意图;
图5为本发明实施例提供的另一种空中发卡装置的结构示意图;
图6为本发明实施例提供的一种计算设备的结构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
如图1所示,本发明实施例所适用的一种系统架构,包括终端101、TSM服务器102、发卡方服务器103。其中,TSM服务器102位于银联TSM平台,发卡方服务器103位于发卡银行后台。终端101上内置有安全芯片,可以提供NFC(Near Field Communication,近距离无线通信技术)功能,终端101上还设置有银联TSM控件以及发卡方客户端,发卡方客户端为应用程序(Application,简称APP),用户通过登录发卡方的应用程序发起空中发卡申请。银联TSM控件提供发卡方客户端的接口,以使终端101可以与TSM服务器102对接。
终端101可以是手机、平板电脑或者是专用的手持设备等具有无线通信功能的电子设备,也可以是个人计算机(personal computer,简称PC),笔记本电脑,服务器等有线接入方式连接上网的设备。TSM服务器102和发卡方服务器103可以是计算机等网络设备。TSM服务器102或发卡方服务器103可以是一个独立的设备,也可以是多个服务器所形成的服务器集群。优选地,TSM服务器102和发卡方服务器103可以采用云计算技术进行信息处理。
终端101与发卡方服务器103之间连接TSM服务器102,即终端101通过TSM服务器102与发卡方服务器103通信。终端101可以通过INTERNET网络与TSM服务器102进行通信,也可以通过全球移动通信系统(Global System for Mobile Communications,简称GSM)、长期演进(long term evolution,简称LTE)系统等移动通信系统与TSM服务器102进行通信。TSM服务器102可以通过INTERNET网络与发卡方服务器103进行通信,也可以通过全球移动通信系统(Global System for Mobile Communications,简称GSM)、长期演进(long term evolution,简称LTE)系统等移动通信系统与发卡方服务器103进行通信。
本发明实施例提供一种优选的实施方式,以终端101为手机为例进行介绍。本发明实施例中可预先在终端101中安装发卡方客户端以及银联TSM控件。
图2示例性示出了本发明实施例提供的一种空中发卡方法的流程示意图。 如图2所示,本发明实施例提供的空中发卡方法,包括以下步骤:
步骤201、终端根据第一发卡申请,向TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥。
步骤202、TSM平台根据终端的请求,向所述终端发送验证信息。
步骤203、所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息为所述发卡方客户端预先存储的。
步骤204、所述终端向所述TSM平台发送所述第二发卡申请。
步骤205、所述TSM平台接收所述终端发送的第二发卡申请。
步骤206、所述TSM平台利用所述传输公钥对应的传输私钥对所述第二发卡申请解密,并在对所述验证码验证通过后将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据。
步骤207、所述TSM平台将所述个人化数据发送给所述终端。
步骤208、所述终端根据接收的所述个人化数据,将卡片的状态设置为激活状态。
步骤209、所述TSM平台在获取所述终端的激活通知后,将卡片的状态设置为激活状态。
本发明实施例中,终端上设置有发卡方客户端,用户通过发卡方客户端向终端发出第一发卡申请,终端根据第一发卡申请,向TSM平台请求获取验证信息,该验证信息包括验证码和传输公钥。终端获取到验证信息后,使用传输公钥对验证码和用户信息进行加密,从而得到第二发卡申请,用户信息从发卡方客户端中获取,终端可以根据第一发卡申请直接调用预先存储的用户信息,而无需用户重新输入。终端将第二发卡申请发送给TSM平台,TSM平台利用与传输公钥对应的传输私钥对第二发卡申请进行解密,并对解密后得到的验证码进行验证,在验证通过后,将用户信息发送给发卡方后台。发卡方后台对用户信息进行验证从而核实用户的身份,在验证通过后,反馈个 人化数据。终端根据接收的个人化数据,将卡片的状态设置为激活状态,从而完成空中发卡。本发明实施例中,用户通过终端上设置的发卡方客户端发出发卡申请,相较于现有技术,发卡申请直接从终端传输到银联TSM平台,跳过了载体合作方客户端以及载体合作方后台,且通过传输公钥加密保障申请的安全性,无需再执行短信激活和验证的步骤,优化了空中发卡的流程,减少了终端与后台之间的交互次数,缩短了整个空中发卡过程的时间。此外,用户通过发卡方客户端进行空中发卡申请后,由于发卡方客户端可以直接调用预先存储的用户信息,因此,相较于现有技术,本发明实施例无需用户再重新输入用户信息,进一步简化了用户的操作过程,缩短了空中发卡的时间。
需要说明的是,发卡方客户端可以是在用户首次登陆后就存储用户信息,也可以是每次登录都从发卡方后台获取,或者是定期推送更新等等,具体的获取方式取决于发卡方自身的实现机制,不同银行的用户信息的获取方式不同。
此外,本发明实施例中的空中发卡流程不涉及载体合作方,因此对载体合作方具有较高的兼容性,可以兼容所有的载体合作方。
上述终端向TSM平台申请的验证信息中包含的验证码可以为随机数,该随机数由银联TSM平台根据终端的申请随机产生的,且每次产生的随机数均不重复,这样可以防止重放交易。终端随后向银联TSM平台发送的发卡申请中包含该随机数。银联TSM平台可以通过对随机数进行验证来保证信息的安全,银联TSM平台在对该随机数验证过后,立即将随机数从缓存中销毁,确保每个发卡申请获取到的随机数不重复。若该发卡申请遭到恶意篡改,则其中包含的随机数也会随之改变,则银联TSM平台即可由随机数验证不通过确定接收到的发卡申请已被篡改,从而拒绝进一步处理该发卡申请。
本发明实施例中,一方面通过银联TSM平台产生的随机数验证码确保发卡申请未被篡改,另一方面,银联TSM平台提供传输公钥,以使终端将发送的申请进行加密,从而保证了信息在传输过程中的安全。
为了进一步保证信息的安全性,本发明实施例还对随机数验证码进行加 密。所述向TSM平台请求获取验证信息之前,还包括:
所述终端根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请,包括:
所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
所述终端使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名后的所述验证码进行加密,得到第二发卡申请。
所述在验证通过后将所述用户信息发送给发卡方后台,包括:
所述TSM平台利用所述公钥证书对解密后的验证码进去验签,并在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
上述公钥证书由终端中的安全载体产生,该安全载体可以为eSE(嵌入式安全模块)芯片。安全载体中产生一组随机加密密钥,即公钥证书和私钥证书。从银联TSM平台获取的验证码在终端的安全载体中被私钥证书进行签名。之后,终端利用银联TSM平台发送的传输公钥,对验证码、公钥证书以及签名后的验证码进行加密,并将这些信息发送给TSM平台。银联TSM平台接收到终端发送的发卡申请后,首先利用存储的传输私钥,将发卡申请进行解密,得到公钥证书、随机数验证码、签名后的验证码以及用户信息。银联TSM平台利用公钥证书以及签名后的验证码对验证码进行验签,具体可以为利用公钥证书对签名后的验证码进行解密,然后将解密后的验证码、接收到的验证码以及TSM平台中缓存的验证码进行对比,若三者一致,则验证通过。安全载体中产生的这组数字证书保证了验证码的安全性,使得验证码不易被获取且不易被破解,从而保证验证码不被篡改,可以避免重放攻击。
本发明实施例设置了两套独立的密钥体系。一套为TSM平台产生的传输公钥和传输私钥,可以保证用户信息在传输过程中的安全性。另一套为终端的安全载体生成的公钥证书和私钥证书,用于对随机数验证码进行加密,保 证了随机数的安全,从而保证发卡申请的安全,进一步地,通过对随机数验证码进行签名和验签,来防止交易重放。。
为了避免重放攻击,本发明实施例除了对随机数验证码进行验签,还利用OTP(One-Time Password,动态口令)进行验证。本发明实施例还包括:
所述终端根据所述第一发卡申请确定OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
所述终端向所述TSM平台发送所述OTP;
所述TSM平台接收所述终端发送的OTP,并将所述OTP发送给所述发卡方后台进行OTP验证。
OTP是根据专门的算法每隔60秒生成一个与时间相关的、不可预测的随机数字组合,每个口令只能使用一次,可以有效保护交易和登录的认证安全,OTP无需人为地定期更换密码,安全省事。本发明实施例中,发卡方后台可通过OTP进行另一层防重放验证。终端通过发卡方客户端获取OTP,发卡方后台保留了该OTP结构。终端将包含了OTP的发卡申请,发送给银联TSM平台,银联TSM平台对发卡申请验证通过后,再将发卡申请连同OTP发送给发卡方后台。发卡方后台对接受到的OTP进行验证,可以根据OTP结构中数据是否被篡改来验证该发卡申请是否受到重放攻击。发卡方后台在验证通过后,通过银联TSM平台向终端返回个人化数据,以激活卡片。
由此,本发明实施例除了两套独立的密钥体系,还设置了两层防重放机制。一层为银联TSM平台验证随机数验证码,通过确定随机数未被篡改来确定信息未受到重放攻击。另一层为发卡方后台验证OTP,通过对比OTP结构中数据未被篡改来确定未受到重放攻击。
此外,为了保证信息在终端中的安全,本发明实施例中所述终端根据所述第一发卡申请,获取安全载体的公钥证书,包括:
所述终端上的所述发卡方客户端通过所述终端装载的TSM控件与所述安全载体进行信息传递。
具体来说,在终端之中,安全载体和发卡方客户端不直接传递信息,而 是均通过TSM控件进行透传。例如,发卡方客户端接收到第一发卡申请,向TSM控件发送消息获取公钥证书,TSM控件将该消息透传给安全载体,从而安全载体将公钥证书发送给TSM平台。另外,安全载体利用私钥证书对验证码签名后,将验证码、签名后的验证码以及公钥证书通过TSM控件透传给发卡方客户端,发卡方客户端确定用户信息,并利用TSM平台提供的传输公钥对验证码、用户信息、公钥证书和签名后的验证码进行加密,从而得到第二发卡申请。
为了更清楚地理解本发明,下面以具体的实施例对上述流程进行详细描述,具体步骤如图3所示,包括:
步骤301、终端通过发卡方客户端接收用户发起的第一发卡申请。
步骤302、根据第一发卡申请,TSM控件向安全载体请求获取公钥证书。
步骤303、终端中的安全载体向TSM平台请求获取验证信息,其中,验证信息中包括随机数验证码以及传输公钥。
步骤304、发卡方客户端向终端反馈验证信息。
步骤305、安全载体利用公钥证书对应的私钥证书对随机数验证码进行签名,得到签名后的验证码。
步骤306、安全载体将随机数、签名后的验证码、公钥证书和传输公钥发送给TSM控件。
步骤307、TSM控件将随机数、签名后的验证码、公钥证书和传输公钥透传发卡方客户端。
步骤308、发卡方客户端确定发卡申请相关的用户信息,并利用传输公钥将用户信息、随机数、签名后的验证码、公钥证书进行加密。
步骤309、发卡方客户端确定OTP,将利用传输公钥加密后的信息以及OTP发送给TSM控件。
步骤310、TSM控件将利用传输公钥加密后的信息以及OTP发送给安全载体。
步骤311、安全载体向TSM平台发出第二发卡申请和OTP,第二发卡申 请中包括步骤310中接收到的利用传输公钥加密后的信息。
步骤312、TSM平台利用传输私钥将加密后的信息解密,并根据随机数以及签名后的验证码进行验签。
步骤313、在验证通过后,TSM平台向发卡方客户端发送第三发卡申请和OTP,第三发卡申请中包括用户信息、随机数、签名后的验证码和公钥证书。
步骤314、发卡方客户端同样对随机数验证码进行验证,并验证OTP中的结构,防止信息被篡改。同时,发卡方客户端还对用户信息进行核实,确定用户身份。
步骤315、发卡方客户端验证通过后,向TSM平台返回个人化数据。
步骤316、TSM平台向终端发送个人化数据。
步骤317、终端执行个人化过程,将卡片激活。
步骤318、终端向TSM平台发送个人化成功通知,通知TSM平台激活成功。
步骤319、TSM平台执行个人化过程,将卡片激活。
步骤320、TSM平台向发卡方后台发送个人化成功通知,通知发卡方后台激活成功。
步骤321、发卡方后台将卡片激活,卡片激活完成。
图4示例性示出了本发明实施例提供的一种空中发卡装置的结构示意图。
如图4所示,本发明实施例提供的一种空中发卡装置,包括:
第一收发模块401,用于根据第一发卡申请,向可信服务管理TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥;
加密模块402,用于使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息为所述发卡方客户端预先存储的;
所述第一收发模块401,还用于向所述TSM平台发送所述第二发卡申请,所述第二发卡申请用于使所述TSM平台使用所述传输公钥对应的传输私钥对 所述第二发卡申请解密并验证通过后,将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
第一激活模块403,用于根据接收的所述个人化数据,将卡片的状态设置为激活状态。
可选的,还包括获取模块404,用于:
根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
所述加密模块402,用于:
使用所述公钥证书对应的私钥证书对所述验证码进行签名;
使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名后的所述验证码进行加密,得到第二发卡申请。
可选的,所述获取模块404,还用于:
根据所述第一发卡申请确定动态口令OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
所述第一收发模块,还用于向所述TSM平台发送所述OTP,以使所述TSM平台将所述OTP发送给所述发卡方后台进行OTP验证。
基于相同的发明构思,本发明实施例还提供另一种空中发卡装置,如图5所示,包括:
第二收发模块501,用于根据终端的请求,向所述终端发送验证信息,所述请求为设置在所述终端上的发卡方客户端接收到第一发卡申请后向所述TSM平台发送的;所述验证信息包括验证码和传输公钥;
所述第二收发模块501,还用于接收所述终端发送的第二发卡申请,所述第二发卡申请为所述终端使用所述传输公钥对所述验证码和用户信息进行加密而获得;所述用户信息为所述发卡方客户端预先存储的;
解密模块502,用于利用所述传输公钥对应的传输私钥对所述第二发卡申请解密;
验证模块503,用于对所述验证码进行验证;
所述第二收发模块501,还用于在对所述验证码验证通过后将所述用户信 息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
所述第二收发模块501,还用于将所述个人化数据发送给所述终端;
第二激活模块504,用于获取所述终端的激活通知后,将卡片的状态设置为激活状态。
可选的,所述第二发卡申请还包括:
使用所述传输公钥对公钥证书和签名后的所述验证码进行加密,所述公钥证书为所述终端根据所述第一发卡申请从所述终端的安全载体中获取的;所述签名后的所述验证码为所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
所述验证模块503,用于利用所述公钥证书对解密后的验证码进行验签;
所述第二收发模块501,还用于在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
可选的,所述第二收发模块501,还用于:
接收所述终端发送的OTP,并将所述OTP发送给所述发卡方后台进行OTP验证。
基于相同的发明构思,本发明实施例还提供一种计算设备,如图6所示,为本发明实施例提供的一种计算设备的结构示意图,该计算设备可以包括中央处理器601(Center Processing Unit,CPU)、存储器602、输入/输出设备603、总线系统604等,输入设备可以包括键盘、鼠标、触摸屏等,输出设备可以包括显示设备,如液晶显示器(Liquid Crystal Display,LCD)、阴极射线管(Cathode Ray Tube,CRT)等。
存储器602可以包括只读存储器(ROM)和随机存取存储器(RAM),并向处理器提供存储器中存储的程序指令和数据。在本发明实施例中,存储器可以用于存储本发明任一实施例所提供的方法的程序,处理器通过调用存储器存储的程序指令,按照获得的程序指令执行上述任一实施例所公开的方法。
基于相同的发明构思,本发明实施例还提供一种计算机可读存储介质,用于存储为上述计算设备所用的计算机程序指令,其包含用于执行上述任一实施例所公开的方法的程序。
所述计算机存储介质可以是计算机能够存取的任何可用介质或数据存储设备,包括但不限于磁性存储器(例如软盘、硬盘、磁带、磁光盘(MO)等)、光学存储器(例如CD、DVD、BD、HVD等)、以及半导体存储器(例如ROM、EPROM、EEPROM、非易失性存储器(NAND FLASH)、固态硬盘(SSD))等。
基于相同的发明构思,本发明实施例还提供一种计算机程序产品,当其在计算机上运行时,使得计算机执行上述任一实施例所公开的方法。
由上述内容可以看出:
本发明实施例中,终端上设置有发卡方客户端,用户通过发卡方客户端向终端发出第一发卡申请,终端根据第一发卡申请,向TSM平台请求获取验证信息,该验证信息包括验证码和传输公钥。终端获取到验证信息后,使用传输公钥对验证码和用户信息进行加密,从而得到第二发卡申请,用户信息从发卡方客户端中获取,终端可以根据第一发卡申请直接调用预先存储的用户信息,而无需用户重新输入。终端将第二发卡申请发送给TSM平台,TSM平台利用与传输公钥对应的传输私钥对第二发卡申请进行解密,并对解密后得到的验证码进行验证,在验证通过后,将用户信息发送给发卡方后台。发卡方后台对用户信息进行验证从而核实用户的身份,在验证通过后,反馈个人化数据。终端根据接收的个人化数据,将卡片的状态设置为激活状态,从而完成空中发卡。本发明实施例中,用户通过终端上设置的发卡方客户端发出发卡申请,相较于现有技术,发卡申请直接从终端传输到银联TSM平台,跳过了载体合作方客户端以及载体合作方后台,且通过传输公钥加密保障申请的安全性,无需再执行短信激活和验证的步骤,优化了空中发卡的流程,减少了终端与后台之间的交互次数,缩短了整个空中发卡过程的时间。此外,用户通过发卡方客户端进行空中发卡申请后,由于发卡方客户端可以直接调 用预先存储的用户信息,因此,相较于现有技术,本发明实施例无需用户再重新输入用户信息,进一步简化了用户的操作过程,缩短了空中发卡的时间。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包括这些改动和变型在内。

Claims (19)

  1. 一种空中发卡方法,其特征在于,包括:
    终端根据第一发卡申请,向可信服务管理TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥;
    所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息从所述发卡方客户端获取;
    所述终端向所述TSM平台发送所述第二发卡申请,所述第二发卡申请用于使所述TSM平台使用所述传输公钥对应的传输私钥对所述第二发卡申请解密并验证通过后,将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
    所述终端根据接收的所述个人化数据,将卡片的状态设置为激活状态。
  2. 如权利要求1所述的方法,其特征在于,所述向TSM平台请求获取验证信息之前,还包括:
    所述终端根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
    所述终端使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请,包括:
    所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
    所述终端使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名后的所述验证码进行加密,得到第二发卡申请。
  3. 如权利要求2所述的方法,其特征在于,所述终端根据所述第一发卡申请,获取安全载体的公钥证书,包括:
    所述终端上的所述发卡方客户端通过所述终端装载的TSM控件与所述安全载体进行信息传递。
  4. 如权利要求1至3任一项所述的方法,其特征在于,还包括:
    所述终端根据所述第一发卡申请确定动态口令OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
    所述终端向所述TSM平台发送所述OTP,以使所述TSM平台将所述OTP发送给所述发卡方后台进行OTP验证。
  5. 一种空中发卡方法,其特征在于,包括:
    TSM平台根据终端的请求,向所述终端发送验证信息,所述请求为设置在所述终端上的发卡方客户端接收到第一发卡申请后向所述TSM平台发送的;所述验证信息包括验证码和传输公钥;
    所述TSM平台接收所述终端发送的第二发卡申请,所述第二发卡申请为所述终端使用所述传输公钥对所述验证码和用户信息进行加密而获得;所述用户信息为所述发卡方客户端预先存储的;
    所述TSM平台利用所述传输公钥对应的传输私钥对所述第二发卡申请解密,并在对所述验证码验证通过后将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
    所述TSM平台将所述个人化数据发送给所述终端,并在获取所述终端的激活通知后,将卡片的状态设置为激活状态。
  6. 如权利要求5所述的方法,其特征在于,所述第二发卡申请还包括:
    使用所述传输公钥对公钥证书和签名后的所述验证码进行加密,所述公钥证书为所述终端根据所述第一发卡申请从所述终端的安全载体中获取的;所述签名后的所述验证码为所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
    所述在验证通过后将所述用户信息发送给发卡方后台,包括:
    所述TSM平台利用所述公钥证书对解密后的验证码进行验签,并在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
  7. 如权利要求5或6所述的方法,其特征在于,还包括:
    所述TSM平台接收所述终端发送的OTP,并将所述OTP发送给所述发 卡方后台进行OTP验证。
  8. 一种空中发卡装置,其特征在于,包括:
    第一收发模块,用于根据第一发卡申请,向可信服务管理TSM平台请求获取验证信息,所述第一发卡申请为所述终端通过设置在所述终端上的发卡方客户端接收;所述验证信息包括验证码和传输公钥;
    加密模块,用于使用所述传输公钥对所述验证码和用户信息进行加密,得到第二发卡申请;所述用户信息为所述发卡方客户端预先存储的;
    所述第一收发模块,还用于向所述TSM平台发送所述第二发卡申请,所述第二发卡申请用于使所述TSM平台使用所述传输公钥对应的传输私钥对所述第二发卡申请解密并验证通过后,将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
    第一激活模块,用于根据接收的所述个人化数据,将卡片的状态设置为激活状态。
  9. 如权利要求8所述的装置,其特征在于,还包括获取模块,用于:
    根据所述第一发卡申请,获取所述终端的安全载体中存储的公钥证书;
    所述加密模块,用于:
    使用所述公钥证书对应的私钥证书对所述验证码进行签名;
    使用所述传输公钥对所述验证码、所述用户信息、所述公钥证书和签名后的所述验证码进行加密,得到第二发卡申请。
  10. 如权利要求8或9所述的装置,其特征在于,所述获取模块,还用于:
    根据所述第一发卡申请确定动态口令OTP,所述OTP为所述发卡方客户端根据所述第一发卡申请生成的;
    所述第一收发模块,还用于向所述TSM平台发送所述OTP,以使所述TSM平台将所述OTP发送给所述发卡方后台进行OTP验证。
  11. 一种空中发卡装置,其特征在于,包括:
    第二收发模块,用于根据终端的请求,向所述终端发送验证信息,所述 请求为设置在所述终端上的发卡方客户端接收到第一发卡申请后向所述TSM平台发送的;所述验证信息包括验证码和传输公钥;
    所述第二收发模块,还用于接收所述终端发送的第二发卡申请,所述第二发卡申请为所述终端使用所述传输公钥对所述验证码和用户信息进行加密而获得;所述用户信息从所述发卡方客户端获取;
    解密模块,用于利用所述传输公钥对应的传输私钥对所述第二发卡申请解密;
    验证模块,用于对所述验证码进行验证;
    所述第二收发模块,还用于在对所述验证码验证通过后将所述用户信息发送给发卡方后台;所述用户信息用于使所述发卡方后台进行验证并在通过后反馈个人化数据;
    所述第二收发模块,还用于将所述个人化数据发送给所述终端;
    第二激活模块,用于获取所述终端的激活通知后,将卡片的状态设置为激活状态。
  12. 如权利要求11所述的装置,其特征在于,所述第二发卡申请还包括:
    使用所述传输公钥对公钥证书和签名后的所述验证码进行加密,所述公钥证书为所述终端根据所述第一发卡申请从所述终端的安全载体中获取的;所述签名后的所述验证码为所述终端使用所述公钥证书对应的私钥证书对所述验证码进行签名;
    所述验证模块,用于利用所述公钥证书对解密后的验证码进行验签;
    所述第二收发模块,还用于在验证通过后将所述用户信息、所述公钥证书、所述验证码以及所述签名后的所述验证码发送给所述发卡方后台。
  13. 如权利要求11或12所述的装置,其特征在于,所述第二收发模块,还用于:
    接收所述终端发送的OTP,并将所述OTP发送给所述发卡方后台进行OTP验证。
  14. 一种计算设备,其特征在于,包括:
    存储器,用于存储程序指令;
    处理器,用于调用所述存储器中存储的程序指令,按照获得的程序执行如权利要求1至4任一项所述的方法。
  15. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使所述计算机执行权利要求1至4任一项所述的方法。
  16. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得计算机执行如权利要求1至4任一项所述的方法。
  17. 一种计算设备,其特征在于,包括:
    存储器,用于存储程序指令;
    处理器,用于调用所述存储器中存储的程序指令,按照获得的程序执行如权利要求5至7任一项所述的方法。
  18. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机可执行指令,所述计算机可执行指令用于使所述计算机执行权利要求5至7任一项所述的方法。
  19. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得计算机执行如权利要求5至7任一项所述的方法。
PCT/CN2018/078871 2017-05-31 2018-03-13 一种空中发卡方法及装置 WO2018219010A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710398278.2 2017-05-31
CN201710398278.2A CN107274283B (zh) 2017-05-31 2017-05-31 一种空中发卡方法及装置

Publications (1)

Publication Number Publication Date
WO2018219010A1 true WO2018219010A1 (zh) 2018-12-06

Family

ID=60065341

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/078871 WO2018219010A1 (zh) 2017-05-31 2018-03-13 一种空中发卡方法及装置

Country Status (3)

Country Link
CN (1) CN107274283B (zh)
TW (1) TWI715833B (zh)
WO (1) WO2018219010A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274283B (zh) * 2017-05-31 2020-09-08 中国银联股份有限公司 一种空中发卡方法及装置
CN109492371B (zh) * 2018-10-26 2021-01-26 中国联合网络通信集团有限公司 一种数字证书空发方法及装置
CN110830930B (zh) * 2019-11-19 2021-09-24 东北石油大学 验证码防探嗅处理方法和装置
CN111464295B (zh) * 2020-03-30 2022-11-15 中国工商银行股份有限公司 银行卡制卡方法及装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329786A (zh) * 2007-06-20 2008-12-24 中国银联股份有限公司 移动终端获取银行卡磁道信息或支付应用的方法及系统
CN103067160A (zh) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 一种加密sd卡的动态密钥生成的方法及系统
US20140344153A1 (en) * 2013-05-15 2014-11-20 Thanigaivel Ashwin Raj Mobile tokenization hub
CN104850990A (zh) * 2015-05-27 2015-08-19 拉卡拉支付有限公司 一种支付方法及系统、key终端和key支撑系统
CN105024874A (zh) * 2014-04-29 2015-11-04 中国银联股份有限公司 基于可信服务管理平台的离线仿真系统
EP3057047A1 (en) * 2015-02-12 2016-08-17 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
CN107274283A (zh) * 2017-05-31 2017-10-20 中国银联股份有限公司 一种空中发卡方法及装置

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459902A (zh) * 2007-12-13 2009-06-17 中兴通讯股份有限公司 一种移动支付的可信服务管理者系统及方法
US8843125B2 (en) * 2010-12-30 2014-09-23 Sk C&C System and method for managing mobile wallet and its related credentials
CN102708618B (zh) * 2012-04-28 2014-05-07 郑州信大捷安信息技术股份有限公司 安全在线远程非接触式ic卡写卡充值方法
CN105117904A (zh) * 2014-11-17 2015-12-02 中兴通讯股份有限公司 移动终端支付交易的方法、移动终端、服务提供商及系统
CN104580256A (zh) * 2015-02-02 2015-04-29 北京嘀嘀无限科技发展有限公司 通过用户设备登录和验证用户身份的方法及设备
CA2930705C (en) * 2015-08-27 2019-06-11 Samsung Pay, Inc. Mobile checkout systems and methods
CN106254323A (zh) * 2016-07-27 2016-12-21 恒宝股份有限公司 一种ta和se的交互方法、ta、se及tsm平台
CN106296174A (zh) * 2016-08-08 2017-01-04 东信和平科技股份有限公司 一种基于hce技术的小额支付卡装置及其实现方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101329786A (zh) * 2007-06-20 2008-12-24 中国银联股份有限公司 移动终端获取银行卡磁道信息或支付应用的方法及系统
CN103067160A (zh) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 一种加密sd卡的动态密钥生成的方法及系统
US20140344153A1 (en) * 2013-05-15 2014-11-20 Thanigaivel Ashwin Raj Mobile tokenization hub
CN105024874A (zh) * 2014-04-29 2015-11-04 中国银联股份有限公司 基于可信服务管理平台的离线仿真系统
EP3057047A1 (en) * 2015-02-12 2016-08-17 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
CN104850990A (zh) * 2015-05-27 2015-08-19 拉卡拉支付有限公司 一种支付方法及系统、key终端和key支撑系统
CN107274283A (zh) * 2017-05-31 2017-10-20 中国银联股份有限公司 一种空中发卡方法及装置

Also Published As

Publication number Publication date
TW201903678A (zh) 2019-01-16
CN107274283A (zh) 2017-10-20
TWI715833B (zh) 2021-01-11
CN107274283B (zh) 2020-09-08

Similar Documents

Publication Publication Date Title
JP7043701B2 (ja) ソフトウェアアプリケーションの信頼を最初に確立し、かつ定期的に確認するシステム及び方法
US12008560B2 (en) On-boarding server for authorizing an entity to effect electronic payments
EP2556624B1 (en) Credential provision and proof system
JP2022508010A (ja) 非接触カードの暗号化認証のためのシステムおよび方法
US11080961B2 (en) Contactless card personal identification system
WO2018219010A1 (zh) 一种空中发卡方法及装置
JP2022501872A (ja) 非接触カードの暗号化認証のためのシステムおよび方法
US11100511B1 (en) Application-based point of sale system in mobile operating systems
US20210360030A1 (en) Enabling communications between applications in a mobile operating system
CN114070614A (zh) 身份认证方法、装置、设备、存储介质和计算机程序产品
US20180240111A1 (en) Security architecture for device applications
KR102547682B1 (ko) Puf기반 otp를 이용하여 사용자 인증을 지원하는 서버 및 그 동작 방법
EP3937454A1 (en) Secure end-to-end pairing of secure element to mobile device
US20220311627A1 (en) Systems and methods for transaction card-based authentication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18809774

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18809774

Country of ref document: EP

Kind code of ref document: A1