WO2020062784A1 - 安全支付方法、装置、服务器及存储介质 - Google Patents

安全支付方法、装置、服务器及存储介质 Download PDF

Info

Publication number
WO2020062784A1
WO2020062784A1 PCT/CN2019/077366 CN2019077366W WO2020062784A1 WO 2020062784 A1 WO2020062784 A1 WO 2020062784A1 CN 2019077366 W CN2019077366 W CN 2019077366W WO 2020062784 A1 WO2020062784 A1 WO 2020062784A1
Authority
WO
WIPO (PCT)
Prior art keywords
short message
verification code
verification
user
verification information
Prior art date
Application number
PCT/CN2019/077366
Other languages
English (en)
French (fr)
Inventor
甘水宝
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020062784A1 publication Critical patent/WO2020062784A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • G06Q20/3255Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Definitions

  • the present application relates to the field of mobile communication technologies, and in particular, to a secure payment method, device, server, and storage medium.
  • a dynamic mobile phone text message verification code is used to verify the user information.
  • the text message verification code has become the most important now because it is convenient and easy to use and has a wide coverage. Means of mobile payment authentication.
  • the user is an elderly person or child, due to the lack of safety awareness of the elderly person and child, it is easy to consume in the application through a simple text message verification method without the guidance or control of a guardian.
  • a secure payment method includes:
  • a secure payment device includes:
  • a receiving module configured to receive a payment request sent by a user mobile terminal and generate verification information according to the payment request, wherein the verification information includes user verification information and guardian verification information;
  • a sending module configured to send the verification information to a corresponding operator platform, and send the user verification information and the guardian verification information in the verification information to the mobile terminal corresponding to the user and the guardian respectively through the operator platform;
  • a confirmation module configured to confirm whether the verification code passes the verification after receiving the verification code sent by the user mobile terminal according to the verification information, wherein the verification code includes a first short message random verification in the user verification information Code and the second short message random verification code in the guardian verification information;
  • An execution module is configured to execute a payment transaction when it is confirmed that the verification code passes verification.
  • a server includes a processor and a memory, and the processor implements the following steps when executing at least one computer-readable instruction stored in the memory:
  • a non-volatile readable storage medium stores at least one computer-readable instruction.
  • the at least one computer-readable instruction is executed by a processor, the following steps are implemented:
  • the present application provides a secure payment method, device, server, and storage medium.
  • the application receives a payment request sent by a user's mobile terminal, and generates verification information according to the payment request.
  • the verification information includes the user. Verification information and guardian verification information; sending the verification information to the corresponding operator platform, the carrier platform forwarding the verification information to the mobile terminal corresponding to the user and the guardian; receiving the verification code sent by the user's mobile terminal, and Confirming whether the verification code passes verification, wherein the verification code includes a first short message random verification code in user verification information and a second short message random verification code in guardian verification information; and when it is confirmed that the verification code is accurate Only when online transactions are allowed to continue.
  • the user's guardian can be notified that the user is currently performing online transaction behaviors and needs the guardian's verification information to ensure the normal execution of online transactions. Effectively ensure the security of the account funds of users with weak protection awareness (such as the elderly).
  • FIG. 1 is an application environment architecture diagram of a first preferred embodiment of the secure payment method of the present application.
  • FIG. 2 is a flowchart of a first preferred embodiment of the secure payment method of the present application.
  • FIG. 3 is a functional block diagram of the first preferred embodiment of the secure payment device of the present application.
  • FIG. 4 is a schematic structural diagram of a preferred embodiment of a server in at least one example of the present application.
  • FIG. 1 it is an application environment architecture diagram of the first preferred embodiment of the secure payment method of the present application.
  • the secure payment method of the present application is applied in an environment composed of a mobile terminal 1, a server 2, and an operator platform 3.
  • the mobile terminal 1, the server 2 and the operator platform 3 are connected through a wired or wireless network communication connection.
  • the wired network may be any type of traditional wired communication, such as the Internet and a local area network.
  • the wireless network may be any type of traditional wireless communication, such as radio, wireless fidelity (WIFI), cellular, satellite, and broadcast.
  • WIFI wireless fidelity
  • Wireless communication technologies may include, but are not limited to, Global System for Mobile Communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband code division multiple access (W-CDMA), CDMA2000, IMT Single Carrier, Enhanced Data Rate GSM Evolution (Enhanced Data Rates for GSM Evolution, EDGE), Long-Term Evolution (LTE) , Advanced Long Term Evolution Technology, Time-Division LTE (TD-LTE), Fifth Generation Mobile Communication Technology (5G), High Performance Radio Local Area Network (High Performance Radio Local Area Network, HiperLAN), High Performance Radio Wide Area Network (High Performance, Radio Wide Area, HiperWAN), Local Multipoint Distribution Service (LMDS), Worldwide Interoperability for Microwave Access (WiMAX), ZigBee, Bluetooth, Orthogonal Frequency Division Multiplexing (Flash Orthogonal Freq) uency-Division Multiplexing (Flash-OFDM), High-capacity Spatial Division Multiple Access (HC-SDMA), Universal Mobile Telecommunications System (UMTS), Universal Mobile Telecommunication
  • the mobile terminal 1 may include a personal computer (PC), a personal digital assistant (PDA), a wireless handheld device, a tablet computer, a smart phone, and the like.
  • PC personal computer
  • PDA personal digital assistant
  • the above-mentioned mobile terminal 1 is only an example, and is not exhaustive, including but not limited to the above-mentioned mobile terminal.
  • the mobile terminal 1 can perform human-computer interaction with a user by using a keyboard, a mouse, a remote controller, a touch pad, or a voice control device.
  • an application is installed on the mobile terminal 1.
  • the mobile terminal 1 may send a payment request to a server through the application.
  • the server 2 may be a banking system server, such as a Ping An Bank system server.
  • the application program may be any third-party application installed in the operating system of the mobile terminal 1, such as WeChat, Weibo, iQiyi, Youku, Health 160, JD, Baidu Nuomi, Baidu Maps, Cool Dog Music, NetEase Cloud Music, mobile Taobao and other applications.
  • This plan does not limit this.
  • the operating system includes an Android system, a Symbian system, a Windows system, an iOS (mobile operating system developed by Apple Inc.) system, and the like.
  • the mobile terminal 1 further includes a display screen, and the display screen may have a touch function, such as a liquid crystal (Crystal Display) LCD display or an organic light-emitting diode (OLED) display.
  • the display screen is used to display content such as the application program interface.
  • the server 2 is a device capable of automatically performing numerical calculations and / or information processing according to an instruction set or stored in advance, and its hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), digital processor (Digital Signal Processor, DSP), embedded equipment, etc.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • DSP Digital Signal Processor
  • the operator platform 3 is a provider of network services, and may be China Telecom, China Mobile, or China Unicom.
  • FIG. 2 is a flowchart of a first preferred embodiment of the secure payment method of the present application. According to different requirements, the execution order in the flowchart can be changed, and some steps can be omitted.
  • Step S21 Receive a payment request sent by a user mobile terminal, and generate verification information according to the payment request, where the verification information includes user verification information and guardian verification information.
  • the mobile terminal when a user performs a payment operation through an application in a mobile terminal, the mobile terminal sends a payment request to the server, and the server receives the payment request and generates verification information according to the payment request.
  • guardian verification information there may be one or more guardian verification information.
  • the user mobile terminal may display an option on the display screen for whether or not a guardian verification is required for the user to select. If the user selects an option that requires guardian verification, when the user mobile terminal sends a payment request to the server, the server Generate user verification information and guardian verification information according to the payment request. Understandably, in order to ensure the security of elderly accounts, the default selection is to require guardian verification.
  • the verification information includes a short message random verification code.
  • the server After receiving the payment request, the server generates a short message random verification code within a predetermined time, and inserts the short message random verification code into a short message template to generate verification information. It can be understood that the short message template is stored in the database of the server in advance. The server also saves the generated short message random verification code in the database.
  • the server generates a first short message random verification code within a predetermined time, and inserts the first short message random verification code into a first short message template to generate user verification information;
  • the server also generates a second short message random verification code within a predetermined time, and inserts the second short message random verification code into a second short message template to generate guardian verification information.
  • the guardian verification information is used to notify the guardian of the user that the user is performing online trading activities.
  • the user authentication information is different from the guardian authentication information.
  • the server also stores the first short message random verification code and the second short message random verification code in the database.
  • the short message random verification code is generally not encrypted. Then, once a verification code leak occurs, it is very likely to cause significant losses to the user's funds account.
  • the short message random verification code may be encrypted before being sent to the mobile terminal.
  • only the first short message random verification code needs to be encrypted, so as to ensure the security of the user account funds.
  • the first short message random verification code is encrypted by adding an encryption server.
  • the server first receives the payment request and parses the payment request, and generates a first short message random verification code and a second
  • the short message random verification code is inserted into the first short message template to generate user verification information
  • the second short message random verification code is inserted into the second short message template to generate guardian verification information.
  • the server sends the user authentication information to the encryption server.
  • the encryption server first stores the user authentication information, then calls an encryption key to encrypt the first short message random authentication code in the user authentication information, and then sends the encrypted user authentication information to the user's mobile terminal
  • the corresponding operator platform forwards the encrypted user authentication information to the user's mobile terminal through the operator platform.
  • the user's mobile terminal After receiving the user verification information, the user's mobile terminal directly extracts the first short message random verification code in the encrypted user verification information and submits the first short message random verification in the encrypted user verification information. Code to the encryption server.
  • the encryption server decrypts the first short message random verification code in the encrypted user authentication information using the mobile terminal's private key and the encryption server's public key to decrypt the original user authentication information, and the encryption server decrypts the decrypted message. Compare the original user authentication information with the previously saved user authentication information to determine whether the verification code is incorrect.
  • the encryption algorithm for encrypting the first short message random verification code in the user verification information includes, but is not limited to, a symmetric encryption algorithm, an asymmetric encryption algorithm, and a Hash algorithm.
  • the verification code can be effectively protected when it is transmitted by SMS, and even if it is stolen, it cannot be decrypted.
  • the process of receiving the verification code by the mobile terminal can allow the user to feel that the payment is taking place.
  • the user authentication information only needs to be encrypted to ensure the security of the funds of the user account.
  • Step S22 Send the verification information to a corresponding operator platform, and send the user verification information and the guardian verification information in the verification information to the mobile terminal corresponding to the user and the guardian respectively through the operator platform.
  • the server sends the user verification information to an operator platform corresponding to a user mobile terminal, and sends the guardian verification information to an operator platform corresponding to a guardian mobile terminal.
  • a mobile phone number of the user is reserved in the server.
  • the user's mobile phone number corresponds to a bank card number of the bank card.
  • a mobile phone number of at least one guardian needs to be reserved.
  • Each mobile phone number has its own carrier platform.
  • the server can send verification information to the corresponding carrier platform according to the user's mobile phone number and the guardian's mobile phone number.
  • the carrier platform then forwards the verification information to the corresponding carrier platform.
  • the server may send the user authentication information to the mobile communication platform, and the mobile communication platform forwards the user authentication information to the user's mobile terminal;
  • the server may send the guardian verification information to the Unicom communication platform, and the Unicom communication platform forwards the guardian verification information to the guardian's mobile terminal.
  • Step S23 Receive a verification code sent by the mobile terminal according to the verification information, and confirm whether the verification code passes the verification.
  • the verification code includes a first short message random verification code and a guardian verification in the user verification information.
  • the second short message random verification code in the message.
  • the user is prompted on the display interface to enter the first random short message verification code and the second random short message verification code in the verification information, and receive the After the user enters the first random short message verification code and the second random short message verification code, the first random short message verification code and the second random short message verification code are sent to a server.
  • the guardian verification information or the second short message random verification code may be forwarded to the mobile terminal corresponding to the user, so as to facilitate the user to input all
  • the second short message random verification code is described.
  • the server may further receive a verification code sent by the user mobile terminal according to the user verification information, and simultaneously receive a verification code sent by the guardian mobile terminal according to the guardian verification information, and confirm the verification code sent according to the user verification information and Whether the verification code sent by the guardian verification message is verified.
  • the user may send the first short message random verification code and the second short message random verification code to a server, the server The received first short message random verification code and the second short message random verification code are compared with the short message random verification code stored in the database to confirm whether the verification code passes the verification.
  • step S24 is performed
  • step S24 a payment transaction is executed.
  • the secure payment method includes receiving a payment request sent by a user's mobile terminal, and generating verification information according to the payment request, wherein the verification information includes user verification information and guardian verification information;
  • the verification information to a corresponding operator platform, the operator platform forwards the verification information to a mobile terminal corresponding to a user and a guardian;
  • the verification code includes a first short message random verification code in the user verification information and a second short message random verification code in the guardian verification information; and the online transaction is allowed to continue to execute only when the verification code is confirmed to be accurate.
  • the user's guardian can be notified that the user is currently performing online transaction behaviors and needs the guardian's verification information to ensure the normal execution of online transactions. Effectively ensure the security of the account funds of users with weak protection awareness (such as the elderly).
  • this solution can also encrypt the first SMS verification code. It can not only add public key algorithm encryption protection to the payment communication between the payment service server and the mobile terminal during the payment process, but also ensure that the information related to payment verification cannot be easily leaked or stolen, which effectively eliminates the traditional short message messages.
  • the various potential risks that occur during transmission and reception without encryption play a corresponding protective role against attacks such as wireless monitoring.
  • FIG. 3 is a functional block diagram of the first preferred embodiment of the secure payment device of the present application.
  • the secure payment device 30 runs in a server.
  • the secure payment device 30 may include a plurality of functional modules composed of program code segments.
  • the program code of each program segment in the secure payment device 30 may be stored in a memory and executed by at least one processor to perform a payment function.
  • the secure payment device 30 may be divided into a plurality of functional modules according to functions performed by the secure payment device 30.
  • the functional modules may include a receiving module 301, a sending module 302, a confirmation module 303, and an execution module 304.
  • the module referred to in the present application refers to a series of computer-readable instruction segments that can be executed by at least one processor and can perform fixed functions, which are stored in a memory. In some embodiments, functions of each module will be described in detail in subsequent embodiments.
  • the receiving module 301 is configured to receive a payment request sent by a user mobile terminal, and generate verification information according to the payment request, where the verification information includes user verification information and guardian verification information.
  • the mobile terminal when a user performs a payment operation through an application in a mobile terminal, the mobile terminal sends a payment request to the server, and the server receives the payment request and generates verification information according to the payment request.
  • guardian verification information there may be one or more guardian verification information.
  • the verification information of the guardian can be added to the mobile terminal for supervision and supervision.
  • the user mobile terminal may display an option on the display screen for whether or not a guardian verification is required for the user to select. If the user selects an option that requires guardian verification, when the user mobile terminal sends a payment request to the server, the server Generate user verification information and guardian verification information according to the payment request. Understandably, in order to ensure the security of elderly accounts, the default selection is to require guardian verification.
  • the verification information includes a short message random verification code.
  • the server After receiving the payment request, the server generates a short message random verification code within a predetermined time, and inserts the short message random verification code into a short message template to generate verification information. It can be understood that the short message template is stored in the database of the server in advance. The server also saves the generated short message random verification code in the database.
  • the server generates a first short message random verification code within a predetermined time, and inserts the first short message random verification code into a first short message template to generate user verification information;
  • the server also generates a second short message random verification code within a predetermined time, and inserts the second short message random verification code into a second short message template to generate guardian verification information.
  • the guardian verification information is used to notify the user's guardian that the user is performing online trading activities.
  • the user authentication information is different from the guardian authentication information.
  • the server also stores the first short message random verification code and the second short message random verification code in the database.
  • the short message random verification code is generally not encrypted. Then, once a verification code leak occurs, it is very likely to cause significant losses to the user's funds account.
  • the short message random verification code may be encrypted before being sent to the mobile terminal.
  • only the first short message random verification code needs to be encrypted, so as to ensure the security of the user account funds.
  • the first short message random verification code is encrypted by adding an encryption server.
  • the server first receives the payment request and parses the payment request, and generates a first short message random verification code and a second
  • the short message random verification code is inserted into the first short message template to generate user verification information
  • the second short message random verification code is inserted into the second short message template to generate guardian verification information.
  • the server sends the user authentication information to the encryption server.
  • the encryption server first stores the user authentication information, then calls an encryption key to encrypt the first short message random authentication code in the user authentication information, and then sends the encrypted user authentication information to the user's mobile terminal
  • the corresponding operator platform forwards the encrypted user authentication information to the user's mobile terminal through the operator platform.
  • the user's mobile terminal After receiving the user verification information, the user's mobile terminal directly extracts the first short message random verification code in the encrypted user verification information and submits the first short message random verification in the encrypted user verification information. Code to the encryption server.
  • the encryption server decrypts the first short message random verification code in the encrypted user authentication information using the mobile terminal's private key and the encryption server's public key to decrypt the original user authentication information, and the encryption server decrypts the decrypted message. Compare the original user authentication information with the previously saved user authentication information to determine whether the verification code is incorrect.
  • the encryption algorithm for encrypting the first short message random verification code in the user verification information includes, but is not limited to, a symmetric encryption algorithm, an asymmetric encryption algorithm, and a Hash algorithm.
  • the verification code can be effectively protected when it is transmitted by SMS, and even if it is stolen, it cannot be decrypted.
  • the process of receiving the verification code by the mobile terminal can allow the user to feel that the payment is taking place.
  • the user authentication information only needs to be encrypted to ensure the security of the funds of the user account.
  • the sending module 302 is configured to send the verification information to a corresponding operator platform, and send the user verification information and the guardian verification information in the verification information to the mobile terminals corresponding to the user and the guardian respectively through the operator platform.
  • the server sends the user authentication information to the operator platform corresponding to the user mobile terminal, and sends the guardian authentication information to the operator platform corresponding to the guardian mobile terminal.
  • a mobile phone number of the user is reserved in the server.
  • the user's mobile phone number corresponds to a bank card number of the bank card.
  • a mobile phone number of at least one guardian needs to be reserved.
  • Each mobile phone number has its own carrier platform.
  • the server can send verification information to the corresponding carrier platform according to the user's mobile phone number and the guardian's mobile phone number.
  • the carrier platform then forwards the verification information to the corresponding carrier platform.
  • the server may send the user authentication information to the mobile communication platform, and the mobile communication platform forwards the user authentication information to the user's mobile terminal;
  • the server may send the guardian verification information to the Unicom communication platform, and the Unicom communication platform forwards the guardian verification information to the guardian's mobile terminal.
  • the confirmation module 303 is configured to confirm whether the verification code passes the verification after receiving the verification code sent by the mobile terminal according to the verification information, where the verification code includes a first short message random in the user verification information. The second short message random verification code in the verification code and the guardian verification information.
  • the user is prompted on the display interface to enter the first random short message verification code and the second random short message verification code in the verification information, and receive the After the user enters the first random short message verification code and the second random short message verification code, the first random short message verification code and the second random short message verification code are sent to a server.
  • the guardian verification information or the second short message random verification code may be forwarded to the mobile terminal corresponding to the user, so as to facilitate the user to input all
  • the second short message random verification code is described.
  • the user may send the first short message random verification code and the second short message random verification code to a server, the server The received first short message random verification code and the second short message random verification code are compared with the short message random verification code stored in the database to confirm whether the verification code passes the verification.
  • the verification code is verified.
  • the execution module 304 is configured to execute a payment transaction when the verification code is accurate.
  • the secure payment device 30 receives a payment request sent by a user's mobile terminal and generates verification information according to the payment request, wherein the verification information includes user verification information and guardian verification information; sending The verification information is transmitted to the corresponding operator platform, and the operator platform forwards the verification information to the mobile terminal corresponding to the user and the guardian; receives the verification code sent by the user's mobile terminal, and confirms whether the verification code passes the verification
  • the verification code includes a first short message random verification code in the user verification information and a second short message random verification code in the guardian verification information
  • the online transaction is allowed to continue to execute only when the verification code is confirmed to be accurate .
  • the user's guardian can be notified that the user is currently performing online transaction behaviors and needs the guardian's verification information to ensure the normal execution of online transactions. Effectively ensure the security of the account funds of users with weak protection awareness (such as the elderly).
  • this solution can also encrypt the first SMS verification code. It can not only add public key algorithm encryption protection to the payment communication between the payment service server and the mobile terminal during the payment process, but also ensure that the information related to payment verification cannot be easily leaked or stolen, which effectively eliminates the traditional short message messages.
  • the various potential risks that occur during transmission and reception without encryption play a corresponding protective role against attacks such as wireless monitoring.
  • the above integrated unit implemented in the form of a software functional module may be stored in a non-volatile readable storage medium.
  • the above software function module is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a dual-screen device, or a network device) or a processor to execute the various embodiments described in this application. Part of the method.
  • FIG. 4 is a schematic structural diagram of a preferred embodiment of a server in at least one example of the present application.
  • the server 2 includes a database 41, a memory 42, at least one processor 43, computer-readable instructions 44 stored in the memory 42 and executable on the at least one processor 43, and at least one communication bus 45.
  • the computer-readable instructions 44 may be divided into one or more modules / units, and the one or more modules / units are stored in the memory 42 and processed by the at least one processor 43 Execute to complete this application.
  • the one or more modules / units may be a series of computer-readable instruction instruction segments capable of performing specific functions, and the instruction segments are used to describe the execution process of the computer-readable instructions 44 in the server 2.
  • the server 2 is a device capable of automatically performing numerical calculations and / or information processing according to an instruction set or stored in advance, and its hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), digital processor (Digital Signal Processor, DSP), embedded equipment, etc.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • DSP Digital Signal Processor
  • embedded equipment etc.
  • the schematic diagram 4 is only an example of the server 2 and does not constitute a limitation on the server 2. It may include more or fewer components than shown in the figure, or combine some components or different components.
  • the server 2 may further include an input / output device, a network access device, a bus, and the like.
  • the database 41 is a warehouse established on the server 2 to organize, store and manage data according to a data structure. Databases are generally divided into three types: hierarchical database, network database and relational database. In this embodiment, the database 41 is configured to store the first short message random verification code and the second short message random verification code.
  • the at least one processor 43 may be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSPs), and application-specific integrated circuits (ASICs). ), Ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the processor 43 may be a microprocessor, or the processor 43 may be any conventional processor, etc.
  • the processor 43 is a control center of the server 2 and uses various interfaces and lines to connect the entire server 2 The various parts.
  • the memory 42 may be configured to store the computer-readable instructions 44 and / or modules / units, and the processor 43 may execute or execute the computer-readable instructions and / or modules / units stored in the memory 42 and
  • the data stored in the memory 42 is called to implement various functions of the server 2.
  • the memory 42 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), etc .; the storage data area may be Data (such as audio data, phone book, etc.) created according to the use of the server 2 are stored.
  • the memory 42 may include a high-speed random access memory, and may also include a non-volatile memory, such as a hard disk, an internal memory, a plug-in hard disk, a Smart Memory Card (SMC), and a Secure Digital (SD).
  • a non-volatile memory such as a hard disk, an internal memory, a plug-in hard disk, a Smart Memory Card (SMC), and a Secure Digital (SD).
  • SSD Secure Digital
  • flash memory card Flash card
  • flash memory device at least one disk storage device, flash memory device, or other volatile solid-state storage device.
  • the memory 42 stores program code
  • the at least one processor 43 can call the program code stored in the memory 42 to perform related functions.
  • each module (the receiving module 301, the sending module 302, the confirmation module 303, and the execution module 304) described in FIG. 3 is a program code stored in the memory 42 and executed by the at least one processor 43 So as to realize the functions of the various modules to achieve the purpose of secure payment.
  • the modules / units integrated in the server 2 When the modules / units integrated in the server 2 are implemented in the form of software functional units and sold or used as independent products, they can be stored in a non-volatile readable storage medium. Based on this understanding, this application implements all or part of the processes in the methods of the above embodiments, and can also be completed by computer-readable instructions instructing related hardware.
  • the computer-readable instructions can be stored in a non-volatile memory. In the read storage medium, when the computer-readable instructions are executed by a processor, the steps of the foregoing method embodiments can be implemented.
  • the computer-readable instructions include computer-readable instruction codes, and the computer-readable instruction codes may be in a source code form, an object code form, an executable file, or some intermediate form.
  • the non-volatile readable medium may include: any entity or device capable of carrying the computer-readable instruction code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), electric carrier signals, telecommunication signals, and software distribution media.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • electric carrier signals telecommunication signals
  • telecommunication signals and software distribution media.
  • the content contained in the non-volatile readable medium may be appropriately increased or decreased according to the requirements of legislation and patent practice in the jurisdictions. For example, in some jurisdictions, according to legislation and patent practices, non- Volatile readable media does not include electrical carrier signals and telecommunication signals.
  • the server 2 may further include a power source (such as a battery) for supplying power to various components.
  • the power source may be logically connected to the at least one processor 43 through a power management system, so as to implement management through the power management system. Charge, discharge, and power management functions.
  • the power source may also include one or more DC or AC power sources, a recharging system, a power failure detection circuit, a power converter or inverter, a power source status indicator, and any other components.
  • the server 2 may further include a Bluetooth module, a Wi-Fi module, and the like, and details are not described herein again.
  • each functional unit in each embodiment of the present application may be integrated in the same processing unit, or each unit may exist separately physically, or two or more units may be integrated in the same unit.
  • the integrated unit can be implemented in the form of hardware, or in the form of hardware plus software functional modules.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种安全支付方法、安全支付装置、服务器及存储介质,所述方法包括:接收用户移动终端发送的支付请求,并根据该支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息(S21);发送所述验证信息至对应的运营商平台,所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端(S22);接收移动终端根据所述验证信息发送的验证码并确认该验证码是否通过验证(S23);及当确认该验证码通过验证时,执行支付交易(S24)。该方法能够有效地保证自身防护意识弱的用户(如老年人)的账户资金安全。

Description

安全支付方法、装置、服务器及存储介质
本申请要求于2018年09月29日提交中国专利局,申请号为201811151530.0申请名称为“安全支付方法、装置、服务器及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及移动通信技术领域,具体涉及一种安全支付方法、装置、服务器及存储介质。
背景技术
目前,用户利用互联网消费的情况越来越多,利用互联网消费通常需要在互联网线上完成支付。在现有的互联网线上支付中,例如支付宝支付、微信支付等,均为无卡支付,即在交易过程中无需实体卡参与,而是由用户在支付平台注册账户,通过用户的互联网支付平台账户发起支付交易,支付过程中的交易敏感数据例如支付密码等使用软加密进行保护,互联网支付平台通过调用银行系统的无磁无密交易进行扣款。并且,随着通信技术的发展,移动终端上带有支付功能的应用程序越来越多,其中大多数应用程序都要求用户将银行卡号提交给应用程序,并授权所述应用程序从所述卡上扣除费用。
现有技术中,在应用程序从用户银行卡上扣除费用时,会采用动态手机短信验证码的方式来验证用户信息,所述短信验证码因其方便易用、覆盖面广,已经成为当下最主要的移动支付认证手段。然而,当所述用户为老年人或儿童时,由于老年人和儿童缺乏安全意识,容易出现在没有监护人指导或管制时,通过简单的短信验证方式在应用程序中消费的情况。
申请内容
鉴于以上内容,有必要提出一种安全支付方法、装置、服务器及存储介质,能够有效地保证自身防护意识弱的用户(如老年人)的账户资金安全。
一种安全支付方法,所述方法包括:
接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
当确认所述验证码通过验证时,执行支付交易。
一种安全支付装置,所述装置包括:
接收模块,用于接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
发送模块,用于发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
确认模块,用于在接收所述用户移动终端根据所述验证信息发送的验证码后,确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
执行模块,用于在确认所述验证码通过验证时,执行支付交易。
一种服务器,所述服务器包括处理器和存储器,所述处理器用于执行存储器中存储的至少一个计算机可读指令时实现以下步骤:
接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
当确认所述验证码通过验证时,执行支付交易。
一种非易失性可读存储介质,所述非易失性可读存储介质存储有至少一个计算机可读指令,所述至少一个计算机可读指令被处理器执行时实现以下步骤:
接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
当确认所述验证码通过验证时,执行支付交易。
由以上技术方案可知,本申请提供一种安全支付方法、装置、服务器及存储介质,通过接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;发送所述验证信息至对应的运营商平台,所述运营商平台转发所述验证信息至用户和监护人对应的移动终端;接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及当确认所述验证码准确时, 才允许网上交易继续执行。可以通知用户的监护人,用户当前正在执行网上交易行为,并且需要监护人的验证信息才能保证网上交易的正常执行。有效地保证了自身防护意识弱的用户(如老年人)的账户资金安全。
附图说明
图1是本申请安全支付方法的第一较佳实施例的应用环境架构图。
图2是本申请安全支付方法的第一较佳实施例的流程图。
图3是本申请安全支付装置的第一较佳实施例的功能模块图。
图4是本申请至少一个实例中服务器的较佳实施例的结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
如图1所示,是本申请的安全支付方法的第一较佳实施例的应用环境架构图。
本申请的安全支付方法应用在移动终端1、服务器2和运营商平台3构成的环境中。所述移动终端1、服务器2和运营商平台3之间通过有线或无线网络通信连接。所述有线网络可以为传统有线通讯的任何类型,例如因特网、局域网。所述无线网络可以为传统无线通讯的任何类型,例如无线电、无线保真(Wireless Fidelity,WIFI)、蜂窝、卫星、广播等。无线通讯技术可以包括,但不限于,全球移动通信系统(Global System for Mobile Communications,GSM)、通用分组无线业务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA),宽带码分多址(W-CDMA)、CDMA2000、IMT单载波(IMT Single Carrier)、增强型数据速率GSM演进(Enhanced Data Rates for GSM Evolution,EDGE)、长期演进技术(Long-Term Evolution,LTE)、高级长期演进技术、时分长期演进技术(Time-Division LTE,TD-LTE)、第五代移动通信技术(5G)、高性能无线电局域网(High Performance Radio Local Area Network,HiperLAN)、高性能无线电广域网(High Performance Radio Wide Area Network,HiperWAN)、本地多点派发业务(Local Multipoint Distribution Service,LMDS)、全微波存取全球互通(Worldwide Interoperability for Microwave Access,WiMAX)、紫蜂协议(ZigBee)、蓝牙、正交频分复用技术(Flash Orthogonal Frequency-Division Multiplexing,Flash-OFDM)、大容量空分多路存取(High Capacity Spatial Division Multiple Access,HC-SDMA)、通用移动电信系统(Universal Mobile Telecommunications System,UMTS)、通用移动电信系统时分双工(UMTS Time-Division Duplexing,UMTS-TDD)、演进式高速分组接入(Evolved High Speed Packet Access,HSPA+)、时分同 步码分多址(Time Division Synchronous Code Division Multiple Access,TD-SCDMA)、演进数据最优化(Evolution-Data Optimized,EV-DO)、数字增强无绳通信(Digital Enhanced Cordless Telecommunications,DECT)及其他。
所述移动终端1可以包括个人计算机(Personal Computer,PC)、个人数字助理(Personal Digital Assistant,PDA)、无线手持设备、平板电脑(Tablet Computer)、智能手机等。上述移动终端1仅是举例,而非穷举,包含但不限于上述移动终端。所述移动终端1可以与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互。
在本实施例中,所述移动终端1上安装有应用程序,当用户需要通过所述应用程序进行移动支付时,所述移动终端1可通过所述应用程序向服务器发送支付请求。所述服务器2可以是银行系统服务器,如平安银行系统服务器。
所述应用程序可以是安装于移动终端1的操作系统中任一第三方应用,例如微信、微博、爱奇艺、优酷、健康160、京东、百度糯米、百度地图、酷狗音乐、网易云音乐、手机淘宝等应用。本方案对此不作限定。其中,所述操作系统包括Android系统、塞班系统、Windows系统、ios(苹果公司开发的移动操作系统)系统等。
所述移动终端1还包括显示屏,所述显示屏可以具有触摸功能,如液晶(Liquid Crystal Display,LCD)显示屏或有机发光二极管(Organic Light-Emitting Diode,OLED)显示屏。所述显示屏用于显示所述应用程序界面等内容。
所述服务器2是一种能够按照事先设定或存储的指令,自动进行数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(应用程序lication Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。
所述运营商平台3是提供网络服务的供应商,可以是中国电信、中国移动或者中国联通。
图2是本申请安全支付方法的第一较佳实施例的流程图。根据不同的需求,所述流程图中的执行顺序可以改变,某些步骤可以省略。
步骤S21、接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息。
具体地,在用户通过移动终端中的应用程序进行支付操作时,所述移动终端发送支付请求至所述服务器,所述服务器接收所述支付请求,并根据所述支付请求生成验证信息。
在本实施方式中,所述监护人验证信息可以为一个,也可以为多个。为了保障老年人不会因为诈骗信息等通过移动支付方式付款给不法分子,从而造成重大损失,可以在移动终端进行移动支付的过程中增加监护人的验证信 息来进行监督。
优选地,所述用户移动终端可以在显示屏中显示是否需要监护人验证的选项供用户选择,若用户选择需要监护人验证的选项,则在所述用户移动终端发送支付请求至服务器时,所述服务器根据所述支付请求生成用户验证信息和监护人验证信息。可以理解的是,为了保证老年人账户安全,默认选择为需要监护人验证。
优选地,所述验证信息包括短信息随机验证码。具体地,所述服务器在接收到支付请求后,在预定时间内生成短信息随机验证码,并将所述短信息随机验证码插入短信模板中生成验证信息。可以理解的是,所述短信模板预先保存在所述服务器的数据库中。所述服务器还将生成的所述短信息随机验证码保存在所述数据库中。
所述短信模板的格式是预先设置好的,例如短信模板的格式=固定内容+变量,其中,所述变量为短信息随机验证码,所述固定内容可以包括收款人、交易金额等。
具体地,所述服务器在预定时间内生成第一短信息随机验证码,并将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息;
所述服务器还在预定时间内生成第二短信息随机验证码,并将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。
所述监护人验证信息用于通知用户的监护人所述用户在执行网上交易活动。
所述用户验证信息与所述监护人验证信息不相同。
所述服务器还将所述第一短信息随机验证码与所述第二短信随机验证码保存在所述数据库中。
现有技术中,为了保证短信息随机验证码的时效性,一般不会对所述短信息随机验证码进行加密处理。然后一旦出现验证码泄露事件,就极有可能对用户的资金账户造成重大损失。
因此,在本实施方式中,可以对所述短信息随机验证码进行加密处理后再发送至移动终端。在本实施方式中,仅需要对所述第一短信息随机验证码进行加密,以此保证用户账户资金的安全。
在本实施方式中,通过增加一加密服务器对所述第一短信息随机验证码进行加密。
具体地,当用户使用移动终端向服务器提交支付请求之后,所述服务器首先接收支付请求并解析所述支付请求,并根据所述支付请求在预定时间内生成第一短信息随机验证码和第二短信息随机验证码,再将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息,将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。所述服务器发送所述用户验证信息至所述加密服务器。所述加密服务器先存储所述用户验证信息,接着调用加密密钥对所述用户验证信息中的第一短信息随机验证码进行加密,之后发送所述加密后的用户验证信息至用户的移动终端对应的运营商平台, 通过所述运营商平台转发加密后的用户验证信息至用户的移动终端。所述用户的移动终端接收所述用户验证信息后,直接提取加密后的用户验证信息中的第一短信息随机验证码,并提交所述加密后的用户验证信息中的第一短信息随机验证码至所述加密服务器。所述加密服务器将加密后的用户验证信息中的第一短信息随机验证码分别使用移动终端的私钥和加密服务器的公钥进行解密,得到原始用户验证信息,所述加密服务器再将解密后的原始用户验证信息与之前保存的用户验证信息中进行比对,以此来判断所述验证码是否有误。
优选的,对所述用户验证信息中的第一短信息随机验证码进行加密的加密算法包括,但不限于,对称加密算法、非对称加密算法和Hash算法。
这样验证码通过短信方式进行传递时就能够得到有效防护,即使被窃取也无法被解密,同时移动终端接收到验证码的过程也能让用户感知到支付正在发生。
可以理解的是,在本实施方式中,仅需要对所述用户验证信息进行加密,以此保证用户账户资金的安全。
步骤S22、发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端。
在本实施方式中,所述服务器发送所述用户验证信息至用户移动终端对应的运营商平台,和发送所述监护人验证信息至监护人移动终端对应的运营商平台。
现有技术中,当用户在银行办理银行卡时会在所述服务器中预留用户手机号码。所述用户手机号码与所述银行卡的银行卡号对应。在本实施方式中,用户在银行办理银行卡时在所述服务器中除了预留用户手机号码外,还需要预留至少一位监护人的手机号码。每个手机号码均有自身归属的运营商平台,所述服务器可根据用户手机号码及监护人手机号码分别发送验证信息至对应的运营商平台,所述运营商平台再转发所述验证信息至对应的移动终端。
例如,当用户手机号码对应的运营商平台为移动通信平台时,所述服务器可向移动通信平台发送所述用户验证信息,所述移动通信平台再转发所述用户验证信息至用户的移动终端;当监护人手机号码对应的运营商平台为联通通信平台时,所述服务器可向联通通信平台发送所述监护人验证信息,所述联通通信平台再转发所述监护人验证信息至监护人的移动终端。
步骤S23、接收所述移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码。
在本实施方式中,在所述移动终端接收运营商平台发送的验证信息后,在显示界面提示用户输入验证信息中的第一随机短信息验证码和第二随机短信息验证码,并在接收用户输入的所述第一随机短信息验证码和第二随机短信息验证码后,发送所述第一随机短信息验证码和第二随机短信息验证码至 服务器。
可以理解的是,当监护人对应的移动终端接收到所述监护人验证信息时,可以将所述监护人验证信息或第二短信息随机验证码转发至所述用户对应的移动终端,以方便用户输入所述第二短信息随机验证码。
在一实施方式中,所述服务器还可以接收用户移动终端根据用户验证信息发送的验证码,同时接收监护人移动终端根据监护人验证信息发送的验证码,并确认根据用户验证信息发送的验证码和根据监护人验证信息发送的验证码是否通过验证。
当用户的移动终端获取所述第一短信息随机验证码和第二短信息随机验证码后,可以发送所述第一短信息随机验证码和第二短信息随机验证码至服务器,所述服务器比对接收的第一短信息随机验证码和第二短信息随机验证码与保存在数据库中的短信息随机验证码,来确认所述验证码是否通过验证。
当所述第一短信息随机验证码与保存在数据库中的第一短信息随机验证码一致,且所述第二短信息随机验证码与保存在数据库中的第二短信随机验证码一致时,说明验证码通过验证,执行步骤S24;
当所述第一短信息随机验证码与保存在数据库中的第一短信息随机验证码不一致,或所述第二短信息随机验证码与保存在数据库中的第二短信随机验证码不一致时,说明验证码无法通过验证,拒绝执行交易,结束流程。
步骤S24,执行支付交易。
综上所述,本申请提供的安全支付方法,包括接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;发送所述验证信息至对应的运营商平台,所述运营商平台转发所述验证信息至用户和监护人对应的移动终端;接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及当确认所述验证码准确时,才允许网上交易继续执行。可以通知用户的监护人,用户当前正在执行网上交易行为,并且需要监护人的验证信息才能保证网上交易的正常执行。有效地保证了自身防护意识弱的用户(如老年人)的账户资金安全。
并且本方案还可以对第一短信验证码进行加密。既可以在支付过程中对支付业务服务器和移动终端之间的支付通信加入公开密钥算法的加密防护,又保证了支付验证的相关信息不被轻易泄露或盗取,有效杜绝了传统短信消息在传送和接收过程中未加密而出现的各种潜在风险,对于无线监听等攻击行为起到了相应的防护作用。
以上所述,仅是本申请的具体实施方式,但本申请的保护范围并不局限于此,对于本领域的普通技术人员来说,在不脱离本申请创造构思的前提下,还可以做出改进,但这些均属于本申请的保护范围。
下面结合图3和图4,分别对实现上述安全支付方法的服务器的功能模 块及硬件结构进行介绍。
图3是本申请安全支付装置的第一较佳实施例的功能模块图。
在一些实施例中,所述安全支付装置30运行于服务器中。所述安全支付装置30可以包括多个由程序代码段所组成的功能模块。所述安全支付装置30中的各个程序段的程序代码可以存储于存储器中,并由至少一个处理器所执行,以执行支付功能。
本实施例中,所述安全支付装置30根据其所执行的功能,可以被划分为多个功能模块。所述功能模块可以包括:接收模块301、发送模块302、确认模块303及执行模块304。本申请所称的模块是指一种能够被至少一个处理器所执行并且能够完成固定功能的一系列计算机可读指令段,其存储在存储器中。在一些实施例中,关于各模块的功能将在后续的实施例中详述。
所述接收模块301用于接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息。
具体地,在用户通过移动终端中的应用程序进行支付操作时,所述移动终端发送支付请求至所述服务器,所述服务器接收所述支付请求,并根据所述支付请求生成验证信息。
在本实施方式中,所述监护人验证信息可以为一个,也可以为多个。为了保障老年人不会因为诈骗信息等通过移动支付方式付款给不法分子,从而造成重大损失,可以在移动终端进行移动支付的过程中增加监护人的验证信息来进行监督。
优选地,所述用户移动终端可以在显示屏中显示是否需要监护人验证的选项供用户选择,若用户选择需要监护人验证的选项,则在所述用户移动终端发送支付请求至服务器时,所述服务器根据所述支付请求生成用户验证信息和监护人验证信息。可以理解的是,为了保证老年人账户安全,默认选择为需要监护人验证。
优选地,所述验证信息包括短信息随机验证码。具体地,所述服务器在接收到支付请求后,在预定时间内生成短信息随机验证码,并将所述短信息随机验证码插入短信模板中生成验证信息。可以理解的是,所述短信模板预先保存在所述服务器的数据库中。所述服务器还将生成的所述短信息随机验证码保存在所述数据库中。
所述短信模板的格式是预先设置好的,例如短信模板的格式=固定内容+变量,其中,所述变量为短信息随机验证码,所述固定内容可以包括收款人、交易金额等。
具体地,所述服务器在预定时间内生成第一短信息随机验证码,并将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息;
所述服务器还在预定时间内生成第二短信息随机验证码,并将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。
所述监护人验证信息用于通知用户的监护人所述用户在执行网上交易 活动。
所述用户验证信息与所述监护人验证信息不相同。
所述服务器还将所述第一短信息随机验证码与所述第二短信随机验证码保存在所述数据库中。
现有技术中,为了保证短信息随机验证码的时效性,一般不会对所述短信息随机验证码进行加密处理。然后一旦出现验证码泄露事件,就极有可能对用户的资金账户造成重大损失。
因此,在本实施方式中,可以对所述短信息随机验证码进行加密处理后再发送至移动终端。在本实施方式中,仅需要对所述第一短信息随机验证码进行加密,以此保证用户账户资金的安全。
在本实施方式中,通过增加一加密服务器对所述第一短信息随机验证码进行加密。
具体地,当用户使用移动终端向服务器提交支付请求之后,所述服务器首先接收支付请求并解析所述支付请求,并根据所述支付请求在预定时间内生成第一短信息随机验证码和第二短信息随机验证码,再将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息,将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。所述服务器发送所述用户验证信息至所述加密服务器。所述加密服务器先存储所述用户验证信息,接着调用加密密钥对所述用户验证信息中的第一短信息随机验证码进行加密,之后发送所述加密后的用户验证信息至用户的移动终端对应的运营商平台,通过所述运营商平台转发加密后的用户验证信息至用户的移动终端。所述用户的移动终端接收所述用户验证信息后,直接提取加密后的用户验证信息中的第一短信息随机验证码,并提交所述加密后的用户验证信息中的第一短信息随机验证码至所述加密服务器。所述加密服务器将加密后的用户验证信息中的第一短信息随机验证码分别使用移动终端的私钥和加密服务器的公钥进行解密,得到原始用户验证信息,所述加密服务器再将解密后的原始用户验证信息与之前保存的用户验证信息中进行比对,以此来判断所述验证码是否有误。
优选的,对所述用户验证信息中的第一短信息随机验证码进行加密的加密算法包括,但不限于,对称加密算法、非对称加密算法和Hash算法。
这样验证码通过短信方式进行传递时就能够得到有效防护,即使被窃取也无法被解密,同时移动终端接收到验证码的过程也能让用户感知到支付正在发生。
可以理解的是,在本实施方式中,仅需要对所述用户验证信息进行加密,以此保证用户账户资金的安全。
所述发送模块302用于发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端。
在本实施方式中,所述服务器发送所述用户验证信息至用户移动终端对 应的运营商平台,和发送所述监护人验证信息至监护人移动终端对应的运营商平台。
现有技术中,当用户在银行办理银行卡时会在所述服务器中预留用户手机号码。所述用户手机号码与所述银行卡的银行卡号对应。在本实施方式中,用户在银行办理银行卡时在所述服务器中除了预留用户手机号码外,还需要预留至少一位监护人的手机号码。每个手机号码均有自身归属的运营商平台,所述服务器可根据用户手机号码及监护人手机号码分别发送验证信息至对应的运营商平台,所述运营商平台再转发所述验证信息至对应的移动终端。
例如,当用户手机号码对应的运营商平台为移动通信平台时,所述服务器可向移动通信平台发送所述用户验证信息,所述移动通信平台再转发所述用户验证信息至用户的移动终端;当监护人手机号码对应的运营商平台为联通通信平台时,所述服务器可向联通通信平台发送所述监护人验证信息,所述联通通信平台再转发所述监护人验证信息至监护人的移动终端。
所述确认模块303用于在接收所述移动终端根据所述验证信息发送的验证码后,确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码。
在本实施方式中,在所述移动终端接收运营商平台发送的验证信息后,在显示界面提示用户输入验证信息中的第一随机短信息验证码和第二随机短信息验证码,并在接收用户输入的所述第一随机短信息验证码和第二随机短信息验证码后,发送所述第一随机短信息验证码和第二随机短信息验证码至服务器。
可以理解的是,当监护人对应的移动终端接收到所述监护人验证信息时,可以将所述监护人验证信息或第二短信息随机验证码转发至所述用户对应的移动终端,以方便用户输入所述第二短信息随机验证码。
当用户的移动终端获取所述第一短信息随机验证码和第二短信息随机验证码后,可以发送所述第一短信息随机验证码和第二短信息随机验证码至服务器,所述服务器比对接收的第一短信息随机验证码和第二短信息随机验证码与保存在数据库中的短信息随机验证码,来确认所述验证码是否通过验证。
当所述第一短信息随机验证码与保存在数据库中的第一短信息随机验证码一致,且所述第二短信息随机验证码与保存在数据库中的第二短信随机验证码一致时,说明验证码通过验证。
当所述第一短信息随机验证码与保存在数据库中的第一短信息随机验证码不一致,或所述第二短信息随机验证码与保存在数据库中的第二短信随机验证码不一致时,说明验证码无法通过验证,拒绝执行交易。
所述执行模块304用于在确认验证码准确时,执行支付交易。
综上所述,本申请提供的安全支付装置30,通过接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;发送所述验证信息至对应的运营商平台, 所述运营商平台转发所述验证信息至用户和监护人对应的移动终端;接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及当确认所述验证码准确时,才允许网上交易继续执行。可以通知用户的监护人,用户当前正在执行网上交易行为,并且需要监护人的验证信息才能保证网上交易的正常执行。有效地保证了自身防护意识弱的用户(如老年人)的账户资金安全。
并且本方案还可以对第一短信验证码进行加密。既可以在支付过程中对支付业务服务器和移动终端之间的支付通信加入公开密钥算法的加密防护,又保证了支付验证的相关信息不被轻易泄露或盗取,有效杜绝了传统短信消息在传送和接收过程中未加密而出现的各种潜在风险,对于无线监听等攻击行为起到了相应的防护作用。
上述以软件功能模块的形式实现的集成的单元,可以存储在一个非易失性可读取存储介质中。上述软件功能模块存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,双屏设备,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的部分。
图4本申请至少一个实例中服务器的较佳实施例的结构示意图。
所述服务器2包括:数据库41、存储器42、至少一个处理器43、存储在所述存储器42中并可在所述至少一个处理器43上运行的计算机可读指令44及至少一条通讯总线45。
所述至少一个处理器43执行所述计算机可读指令44时实现上述安全支付方法实施例中的步骤。
示例性的,所述计算机可读指令44可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器42中,并由所述至少一个处理器43执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机可读指令指令段,所述指令段用于描述所述计算机可读指令44在所述服务器2中的执行过程。
所述服务器2是一种能够按照事先设定或存储的指令,自动进行数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(应用程序lication Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。本领域技术人员可以理解,所述示意图4仅仅是服务器2的示例,并不构成对服务器2的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述服务器2还可以包括输入输出设备、网络接入设备、总线等。
所述数据库(Database)41是按照数据结构来组织、存储和管理数据的建立在所述服务器2上的仓库。数据库通常分为层次式数据库、网络式数据库和关系式数据库三种。在本实施方式中,所述数据库41用于存储所述第一短信息随机验证码与所述第二短信随机验证码。
所述至少一个处理器43可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。所述处理器43可以是微处理器或者所述处理器43也可以是任何常规的处理器等,所述处理器43是所述服务器2的控制中心,利用各种接口和线路连接整个服务器2的各个部分。
所述存储器42可用于存储所述计算机可读指令44和/或模块/单元,所述处理器43通过运行或执行存储在所述存储器42内的计算机可读指令和/或模块/单元,以及调用存储在存储器42内的数据,实现所述服务器2的各种功能。所述存储器42可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据服务器2的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器42可以包括高速随机存取存储器,还可以包括非易失性存储器,例如硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
所述存储器42中存储有程序代码,且所述至少一个处理器43可调用所述存储器42中存储的程序代码以执行相关的功能。例如,图3中所述的各个模块(接收模块301、发送模块302、确认模块303及执行模块304)是存储在所述存储器42中的程序代码,并由所述至少一个处理器43所执行,从而实现所述各个模块的功能以达到安全支付的目的。
所述服务器2集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个非易失性可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性可读存储介质中,所述计算机可读指令在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机可读指令包括计算机可读指令代码,所述计算机可读指令代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述非易失性可读介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述非易失性可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,非易失性可读介质不包括电载波信号和电信信号。
尽管未示出,所述服务器2还可以包括给各个部件供电的电源(比如电池),优选的,电源可以通过电源管理系统与所述至少一个处理器43逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。所述服务器2还可以包括蓝牙模块、Wi-Fi模块等,在此不再赘述。
应所述了解,所述实施例仅为说明之用,在专利申请范围上并不受此结构的限制。
在本申请所提供的几个实施例中,应所述理解到,所揭露的电子设备和方法,可以通过其它的方式实现。例如,以上所描述的电子设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
另外,在本申请各个实施例中的各功能单元可以集成在相同处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在相同单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。
最后应说明的是,以上实施例仅用以说明本申请的技术方案而非限制,尽管参照较佳实施例对本申请进行了详细说明,本领域的普通技术人员应当理解,可以对本申请的技术方案进行修改或等同替换,而不脱离本申请技术方案的精神范围。

Claims (20)

  1. 一种安全支付方法,其特征在于,所述方法包括:
    接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
    发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
    接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
    当确认所述验证码通过验证时,执行支付交易。
  2. 如权利要求1所述的安全支付方法,其特征在于,所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息包括:
    接收用户移动终端发送的支付请求;
    在预定时间内生成所述第一短信息随机验证码和所述第二短信息随机验证码;
    将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息;且
    将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。
  3. 如权利要求2所述的安全支付方法,其特征在于,所述方法还包括:保存所述第一短信息随机验证码与所述第二短信随机验证码至服务器中的数据库。
  4. 如权利要求3所述的安全支付方法,其特征在于,所述接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证包括:
    接收所述移动终端发送的第一短信息随机验证码和第二短信息随机验证码,比对接收的第一短信息随机验证码和第二短信息随机验证码与保存在数据库中的第一短信息随机验证码与所述第二短信随机验证码是否一致;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码一致,且接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码一致时,确认验证码通过验证,执行支付交易;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码不一致,或接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码不一致时,确认验证码无法通过验证,拒绝执行支付交易。
  5. 如权利要求1所述的安全支付方法,其特征在于,所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息后,所述方法还包括对用户验证信息中的第一短信息随机验证码进行加密。
  6. 如权利要求5所述的安全支付方法,其特征在于,在所述接收所述用户移动终端发送的验证码之后,所述方法还包括解密接收的用户验证信息中的第 一短信息随机验证码。
  7. 如权利要求5所述的安全支付方法,其特征在于,对用户验证信息中的第一短信息随机验证码进行加密的加密算法包括对称加密算法、非对称加密算法和Hash算法。
  8. 一种安全支付装置,其特征在于,所述装置包括:
    接收模块,用于接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
    发送模块,用于发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
    确认模块,用于在接收所述用户移动终端根据所述验证信息发送的验证码后,确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
    执行模块,用于在确认所述验证码通过验证时,执行支付交易。
  9. 一种服务器,其特征在于,所述服务器包括处理器和存储器,所述处理器用于执行存储器中存储的至少一个计算机可读指令时实现以下步骤:
    接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
    发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
    接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
    当确认所述验证码通过验证时,执行支付交易。
  10. 如权利要求9所述的服务器,其特征在于,在所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息时,所述处理器执行所述至少一个计算机可读指令时以实现以下步骤:
    接收用户移动终端发送的支付请求;
    在预定时间内生成所述第一短信息随机验证码和所述第二短信息随机验证码;
    将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息;且
    将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。
  11. 如权利要求10所述的服务器,其特征在于,所述处理器执行所述至少一个计算机可读指令还实现以下步骤:
    保存所述第一短信息随机验证码与所述第二短信随机验证码至服务器中的数据库。
  12. 如权利要求11所述的服务器,其特征在于,所述接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证时,所述处理器执行所述至 少一个计算机可读指令以实现以下步骤:
    接收所述移动终端发送的第一短信息随机验证码和第二短信息随机验证码,比对接收的第一短信息随机验证码和第二短信息随机验证码与保存在数据库中的第一短信息随机验证码与所述第二短信随机验证码是否一致;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码一致,且接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码一致时,确认验证码通过验证,执行支付交易;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码不一致,或接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码不一致时,确认验证码无法通过验证,拒绝执行支付交易。
  13. 如权利要求9所述的服务器,其特征在于,在所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息之后,所述处理器执行所述至少一个计算机可读指令还实现以下步骤:
    对用户验证信息中的第一短信息随机验证码进行加密。
  14. 如权利要求13所述的服务器,其特征在于,在所述接收所述用户移动终端发送的验证码之后,所述处理器执行所述至少一个计算机可读指令还实现以下步骤:
    解密接收的用户验证信息中的第一短信息随机验证码。
  15. 一种非易失性可读存储介质,其特征在于,所述非易失性可读存储介质存储有至少一个计算机可读指令,所述至少一个计算机可读指令被处理器执行时实现以下步骤:
    接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息,其中,所述验证信息包括用户验证信息和监护人验证信息;
    发送所述验证信息至对应的运营商平台,通过所述运营商平台将所述验证信息中的用户验证信息和监护人验证信息分别发送至用户和监护人对应的移动终端;
    接收所述用户移动终端根据所述验证信息发送的验证码,并确认所述验证码是否通过验证,其中,所述验证码包括用户验证信息中的第一短信息随机验证码和监护人验证信息中的第二短信息随机验证码;及
    当确认所述验证码通过验证时,执行支付交易。
  16. 如权利要求15所述的存储介质,其特征在于,在所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息时,所述至少一个计算机可读指令被所述处理器执行以实现以下步骤:
    接收用户移动终端发送的支付请求;
    在预定时间内生成所述第一短信息随机验证码和所述第二短信息随机验证码;
    将所述第一短信息随机验证码插入第一短信模板中生成用户验证信息;且
    将所述第二短信息随机验证码插入第二短信模板中生成监护人验证信息。
  17. 如权利要求16所述的存储介质,其特征在于,所述至少一个计算机可 读指令被所述处理器执行还实现以下步骤:
    保存所述第一短信息随机验证码与所述第二短信随机验证码至服务器中的数据库。
  18. 如权利要求17所述的存储介质,其特征在于,所述接收所述用户移动终端发送的验证码,并确认所述验证码是否通过验证时,所述至少一个计算机可读指令被所述处理器执行以实现以下步骤:
    接收所述移动终端发送的第一短信息随机验证码和第二短信息随机验证码,比对接收的第一短信息随机验证码和第二短信息随机验证码与保存在数据库中的第一短信息随机验证码与所述第二短信随机验证码是否一致;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码一致,且接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码一致时,确认验证码通过验证,执行支付交易;
    当接收的第一短信息随机验证码与保存在数据库中的第一短信息随机验证码不一致,或接收的第二短信息随机验证码与保存在数据库中的第二短信随机验证码不一致时,确认验证码无法通过验证,拒绝执行支付交易。
  19. 如权利要求15所述的存储介质,其特征在于,在所述接收用户移动终端发送的支付请求,并根据所述支付请求生成验证信息之后,所述至少一个计算机可读指令被所述处理器执行还实现以下步骤:
    对用户验证信息中的第一短信息随机验证码进行加密。
  20. 如权利要求19所述的存储介质,其特征在于,在所述接收所述用户移动终端发送的验证码之后,所述至少一个计算机可读指令被所述处理器执行还实现以下步骤:
    解密接收的用户验证信息中的第一短信息随机验证码。
PCT/CN2019/077366 2018-09-29 2019-03-07 安全支付方法、装置、服务器及存储介质 WO2020062784A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811151530.0A CN109146489A (zh) 2018-09-29 2018-09-29 安全支付方法、装置、服务器及存储介质
CN201811151530.0 2018-09-29

Publications (1)

Publication Number Publication Date
WO2020062784A1 true WO2020062784A1 (zh) 2020-04-02

Family

ID=64814009

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/077366 WO2020062784A1 (zh) 2018-09-29 2019-03-07 安全支付方法、装置、服务器及存储介质

Country Status (2)

Country Link
CN (1) CN109146489A (zh)
WO (1) WO2020062784A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021180885A1 (en) 2020-03-11 2021-09-16 Ospedale San Raffaele S.R.L. Treatment of stem cell deficiency
EP4371613A2 (en) 2018-02-26 2024-05-22 Ospedale San Raffaele S.r.l. Compounds for use in the treatment of ocular pain

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146489A (zh) * 2018-09-29 2019-01-04 平安科技(深圳)有限公司 安全支付方法、装置、服务器及存储介质
CN112446706A (zh) * 2020-11-09 2021-03-05 宿州职业技术学院 一种面向老年用户使用的电子商务联动支付方法
CN112866225A (zh) * 2021-01-12 2021-05-28 中国工商银行股份有限公司 验证方法、验证装置、电子设备和存储介质
CN112968892B (zh) * 2021-02-19 2023-01-06 中国工商银行股份有限公司 信息的验证方法、装置、计算设备和介质
CN112990927B (zh) * 2021-04-27 2024-03-08 中国工商银行股份有限公司 支付验证方法、系统、设备、计算机系统及存储介质
CN113379411A (zh) * 2021-06-22 2021-09-10 天津蓝卡健康科技有限公司 一种用于老年人支付系统的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162517A (zh) * 2006-10-11 2008-04-16 中国民生银行股份有限公司 基于订单的支付信息处理方法
CN103971239A (zh) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 一种验证方法及装置
CN104077689A (zh) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 一种信息验证的方法、相关装置及系统
CN109146489A (zh) * 2018-09-29 2019-01-04 平安科技(深圳)有限公司 安全支付方法、装置、服务器及存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358439A (zh) * 2017-07-07 2017-11-17 广东欧珀移动通信有限公司 应用支付方法、装置及终端设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101162517A (zh) * 2006-10-11 2008-04-16 中国民生银行股份有限公司 基于订单的支付信息处理方法
CN104077689A (zh) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 一种信息验证的方法、相关装置及系统
CN103971239A (zh) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 一种验证方法及装置
CN109146489A (zh) * 2018-09-29 2019-01-04 平安科技(深圳)有限公司 安全支付方法、装置、服务器及存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4371613A2 (en) 2018-02-26 2024-05-22 Ospedale San Raffaele S.r.l. Compounds for use in the treatment of ocular pain
WO2021180885A1 (en) 2020-03-11 2021-09-16 Ospedale San Raffaele S.R.L. Treatment of stem cell deficiency

Also Published As

Publication number Publication date
CN109146489A (zh) 2019-01-04

Similar Documents

Publication Publication Date Title
WO2020062784A1 (zh) 安全支付方法、装置、服务器及存储介质
CN111193695B (zh) 一种第三方账号登录的加密方法、装置及存储介质
US11488234B2 (en) Method, apparatus, and system for processing order information
US8984604B2 (en) Locally stored phishing countermeasure
US20190050551A1 (en) Systems and methods for authenticating users
CN112866228B (zh) 一种控制web系统越权访问的方法和装置
US20150281362A1 (en) System for mobile application notary service
US20160197897A1 (en) Cross-client communication method
US9954837B2 (en) Method of multi-factor authenication during encrypted communications
US20140115340A1 (en) Unique device identifier provision method and apparatus
CN112287372B (zh) 用于保护剪贴板隐私的方法和装置
JP6552714B2 (ja) データ処理方法およびシステム、ならびにウェアラブル電子デバイス
WO2015074599A1 (zh) 登录服务的方法、装置及设备
US20150142659A1 (en) Method, apparatus and system for mobile payment
WO2020253197A1 (zh) 虚拟用户识别卡的管理方法、装置、终端设备及存储介质
WO2020088323A1 (zh) 一种能力开放方法及装置
CN113032753B (zh) 身份验证的方法及装置
WO2015186072A1 (en) Encryption and decryption of data between a communications device and smart card with near field communication function
US20240062198A1 (en) Security Chip for Digital Currency Storage, and Application Method for Security Chip for Digital Currency Storage
CN111212058A (zh) 一种手机验证码登录方法、装置及系统
US9270649B1 (en) Secure software authenticator data transfer between processing devices
CN112995322B (zh) 信息传输通道建立方法、装置、存储介质以及终端
CN109324843A (zh) 一种指纹处理系统、方法及指纹设备
TW201717596A (zh) 藍牙設備進行配對的方法及裝置
CN116546500B (zh) 终端能力识别方法、系统、电子设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19867004

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19867004

Country of ref document: EP

Kind code of ref document: A1