WO2020063138A1 - 获得虚拟银行卡支付权限的方法、系统、电子设备和介质 - Google Patents

获得虚拟银行卡支付权限的方法、系统、电子设备和介质 Download PDF

Info

Publication number
WO2020063138A1
WO2020063138A1 PCT/CN2019/099986 CN2019099986W WO2020063138A1 WO 2020063138 A1 WO2020063138 A1 WO 2020063138A1 CN 2019099986 W CN2019099986 W CN 2019099986W WO 2020063138 A1 WO2020063138 A1 WO 2020063138A1
Authority
WO
WIPO (PCT)
Prior art keywords
payment
bank card
virtual bank
present disclosure
virtual
Prior art date
Application number
PCT/CN2019/099986
Other languages
English (en)
French (fr)
Inventor
孙泽平
聂学贤
Original Assignee
京东数字科技控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东数字科技控股有限公司 filed Critical 京东数字科技控股有限公司
Publication of WO2020063138A1 publication Critical patent/WO2020063138A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the present disclosure relates to the field of Internet technology, and more particularly, to a method, system, electronic device, and medium for obtaining payment authority for a virtual bank card.
  • flash payment is a payment method that uses Near Field Communication (NFC) to realize payment.
  • NFC Near Field Communication
  • the present disclosure provides a method, a system, an electronic device, and a medium for obtaining payment authority of a virtual bank card.
  • An aspect of the present disclosure provides a method for obtaining a virtual bank card payment authority, including receiving a user operation, and determining whether a client device has a near field communication function in response to the user operation, and having a near field communication function.
  • the payment identifier is based on The card information of the virtual bank card is encrypted and generated, and is used to enable other devices to determine the corresponding virtual bank card used for payment by acquiring the payment identifier.
  • the method further includes obtaining a number of payment identifiers remaining in the virtual bank card, where the number is less than a preset In the case of a threshold, at least one of the payment identifiers is acquired, so that the number of payment identifiers included in the virtual bank card is the preset number.
  • the method further includes obtaining current user information, and determining, based on the current user information, whether user information corresponding to a virtual bank card already stored in the client device is consistent with the current user information, And in the case of inconsistency, clearing the virtual bank card and user information corresponding to the virtual bank card stored in the client device.
  • sending the application request for the virtual bank card includes, when the near field communication function is provided, obtaining authentication information of the client device, based on The authentication information sends a request to open a payment account, and sends an application request for a virtual bank card if the payment account is successfully opened, wherein the payment account is opened based on user information in an application.
  • the assets in the virtual bank card include at least one payment asset corresponding to the user information in the application program, wherein the payment asset includes the user information in the application program.
  • Virtual assets include at least one payment asset corresponding to the user information in the application program, wherein the payment asset includes the user information in the application program.
  • the method further includes setting the virtual bank card as a default payment bank card, and sending a notification to the user that the default payment bank card is the virtual bank card.
  • Another aspect of the present disclosure provides a system for obtaining payment authority for a virtual bank card including a receiving module for receiving a user operation, and a determining module for determining whether a client device has a near field communication function in response to the user operation.
  • the sending module is configured to send a request for applying for a virtual bank card if it has a near field communication function
  • the first obtaining module is configured to obtain the payment account of the payment account if the application request meets the application conditions.
  • a virtual bank card and a preset number of payment identifiers, the payment identifier is encrypted and generated based on the card information of the virtual bank card, and is used to enable other devices to determine the corresponding virtual used for payment by acquiring the payment identifier.
  • Bank card is used to enable other devices to determine the corresponding virtual used for payment by acquiring the payment identifier.
  • the system further includes a second acquisition module for acquiring the number of payment identifiers remaining in the virtual bank card,
  • the third obtaining module is configured to obtain at least one payment identifier when the number is less than a preset threshold, so that the number of payment identifiers included in the virtual bank card is the preset number.
  • the system further includes a fourth acquisition module for acquiring current user information, and a determination module for determining a user corresponding to the virtual bank card that has been stored in the client device based on the current user information Whether the information is consistent with the current user information, and the clearing module is configured to clear the virtual bank card stored in the client device and the user information corresponding to the virtual bank card in the case of inconsistency.
  • the sending module includes an obtaining sub-module for obtaining authentication information of the client device when the near-field communication function is provided, and the first sending sub-module is configured to send based on the authentication information.
  • the request for opening a payment account the second sending sub-module is configured to send a request for applying for a virtual bank card when the payment account is successfully opened, wherein the payment account is opened based on user information in the application.
  • the assets in the virtual bank card include at least one payment asset corresponding to the user information in the application program, wherein the payment asset includes the user information in the application program.
  • Virtual assets include at least one payment asset corresponding to the user information in the application program, wherein the payment asset includes the user information in the application program.
  • the system further includes a setting module for setting the virtual bank card as a default payment bank card, and sending a notification to the user that the default payment bank card is the virtual bank card.
  • Another aspect of the present disclosure provides an electronic device including one or more processors and a storage device for storing one or more programs, wherein when the one or more programs are used by the one or more programs, When the processor executes, the one or more processors are caused to execute the method of any one of the foregoing.
  • Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, implement the method as described above.
  • Another aspect of the present disclosure provides a computer program including computer-executable instructions that, when executed, implement the method as described above.
  • the problem of potential security risks of virtual bank card payments can be at least partially solved, and thus the technical effect of improving the security of virtual bank card payments can be achieved.
  • FIG. 1A and 1B schematically illustrate an application scenario of obtaining a virtual bank card payment right according to an embodiment of the present disclosure
  • FIG. 2 schematically illustrates a flowchart of a method for obtaining payment authority of a virtual bank card according to an embodiment of the present disclosure
  • FIG. 3 schematically illustrates a flowchart of sending an application request for a virtual bank card with a near field communication function according to an embodiment of the present disclosure
  • FIG. 4 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure
  • FIG. 5 schematically illustrates a flowchart of a method for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure
  • FIG. 6 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure
  • FIG. 7 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure
  • FIG. 8 schematically illustrates a block diagram of a system for obtaining payment authority of a virtual bank card according to an embodiment of the present disclosure
  • FIG. 9 schematically illustrates a block diagram of a system for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure.
  • FIG. 10 schematically illustrates a block diagram of a system for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure
  • FIG. 11 schematically illustrates a block diagram of a transmitting module according to an embodiment of the present disclosure
  • FIG. 12 schematically illustrates a block diagram of a system for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure.
  • FIG. 13 schematically illustrates a block diagram of an electronic device suitable for implementing the method described above according to an embodiment of the present disclosure.
  • An embodiment of the present disclosure provides a method for obtaining payment authority of a virtual bank card, including receiving a user operation, and determining whether a client device has a near field communication function in response to the user operation.
  • an application request for the virtual bank card is sent, and if the application request meets the application conditions, the virtual bank card of the payment account and a preset number of payment identifiers are obtained, and the payment identifier is based on the
  • the card information of the virtual bank card is encrypted and generated, and is used to enable other devices to determine the corresponding virtual bank card used for payment by acquiring the payment identifier.
  • FIG. 1A and 1B schematically illustrate an application scenario of obtaining a virtual bank card payment right according to an embodiment of the present disclosure.
  • FIG. 1A and FIG. 1B are merely examples of application scenarios to which the embodiments of the present disclosure can be applied, to help those skilled in the art understand the technical content of the present disclosure, but it does not mean that the embodiments of the present disclosure cannot Used in other scenarios.
  • the application scenario includes a terminal device 100.
  • the terminal device 100 may be installed with a shopping application 110, and the shopping application 110 includes a control 111.
  • the user can click on the control 111 to apply for a virtual bank card supporting flash payment.
  • the terminal device 100 also acquires a preset number of payment identities while acquiring the virtual bank card 200.
  • the payment identifier is encrypted and generated based on the card information of the virtual bank card 200, and is used to enable other devices, such as a POSE machine, to obtain the payment identifier to determine the corresponding virtual bank card used for payment.
  • FIG. 2 schematically illustrates a flowchart of a method for obtaining payment authority of a virtual bank card according to an embodiment of the present disclosure.
  • the method includes operations S210 to S240.
  • operation S210 a user operation is received.
  • operation S220 in response to the user operation, it is determined whether the client device has a function of near field communication.
  • the method generates a payment identifier corresponding to the virtual bank card by encrypting the virtual bank card, thereby making payment according to the payment identifier, and improving the security of the payment.
  • operation S210 for example, in the scenario shown in FIG. 1A, it may be an operation of receiving a user clicking the control 111.
  • operation S220 for example, in the scenario shown in FIG. 1A, it may be determined whether the terminal device 100 has a near field communication function after receiving a user's click operation.
  • sending the application request for the virtual bank card may be, for example, a payment software package provided by the shopping application 110 installed on the terminal device 100 calls a UnionPay payment software package, and a UnionPay payment software package calls UnionPay As a payment server, the UnionPay payment server invokes the server of the shopping application 110 to send an application request for a virtual bank card to the server of the shopping application 110.
  • FIG. 3 schematically illustrates a flowchart of sending an application request for a virtual bank card with a near field communication function according to an embodiment of the present disclosure.
  • the method includes operations S231 to S233.
  • a request for opening a payment account is sent based on the authentication information.
  • the authentication information of the client device may be a payment software package provided by the shopping application 110 installed on the terminal device 100, calling a UnionPay payment software package,
  • the UnionPay payment software package collects device information of the terminal device 100, and issues authentication information according to the device information.
  • the authentication information may be, for example, a token.
  • a request to open a payment account is sent to the server of the shopping application 110 based on the authentication information.
  • the server of the shopping application 110 obtains the authentication information and communicates with the UnionPay server, so that the UnionPay server verifies whether the authentication information is valid.
  • the shopping application 110 opens a payment account based on the user information.
  • a verification successful message is sent to the UnionPay server, and a virtual bank card is generated by UnionPay and sent to the terminal device 100.
  • the terminal device 100 obtains the virtual bank card, it also obtains a preset number of payment identifiers, so as to perform payment according to the payment identifier. For example, when the terminal device 100 approaches the POSE machine for payment, the POSE obtains a payment identification, so that the background of the POSE determines the virtual bank card to be used according to the payment identification.
  • FIG. 4 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure.
  • the method further includes operations S410 and S420 on the basis of the foregoing embodiment.
  • the payment identification is consumed.
  • each use of a virtual bank card consumes a payment identification.
  • UnionPay issues payment identifiers again, and re-checks account information when issuing payment identifiers, such as verifying payment passwords and device information, thereby further improving Payment security.
  • the payment software package of a shopping application may obtain the number of payment identifiers remaining in the virtual bank card.
  • a payment software package that can be a shopping application applies for a payment identifier from UnionPay to prevent the payment identifier from being empty, resulting in payment failure.
  • FIG. 5 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure.
  • the method further includes operations S510 to S530 on the basis of the foregoing embodiment.
  • operation S520 it is determined whether the user information corresponding to the virtual bank card already stored in the client device is consistent with the current user information based on the current user information.
  • This method can clear the virtual bank card that has been saved in the client device, and prevents the virtual bank card previously created by other users from being used by the current user.
  • the method is applied to a shopping application to obtain user information for logging in to the shopping application.
  • operation S520 it may be, for example, determining whether a virtual bank card of another user of the shopping application has been stored in the terminal device.
  • the virtual bank card of the other user and the user information corresponding to the virtual bank card may be deleted.
  • the assets in the virtual bank card include at least one payment asset corresponding to the user information in the application program, wherein the payment asset includes the user information in the application program.
  • Virtual assets For example, the method is applied to a shopping application, and the assets in the virtual bank card include at least part of the payment assets added by the user in the shopping application, for example, multiple bank cards.
  • the payment assets include the user's virtual assets in the application, such as the user's vault, white bar, and steel goblets in the application.
  • FIG. 6 schematically illustrates a flowchart of a method for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure.
  • the method further includes operation S610 on the basis of the foregoing embodiment.
  • the virtual bank card is set as a default payment bank card, and a notification is sent to the user that the default payment bank card is the virtual bank card.
  • This method automatically sets the virtual bank card as the default payment bank card and sends a notification to the user, which improves the user experience.
  • FIG. 7 schematically illustrates a flowchart of a method for obtaining a virtual bank card payment right according to another embodiment of the present disclosure.
  • this embodiment includes a flash payment SDK (Software Development Kit) 710, a UnionPay SDK 720, a UnionPay flash payment cloud platform 730, a shopping application 740, and a shopping application virtual payment server 750.
  • flash payment SDK Software Development Kit
  • UnionPay SDK 720
  • UnionPay flash payment cloud platform 730
  • shopping application 740 720
  • shopping application virtual payment server 750 750
  • the client has a flash payment SDK 710 and a UnionPay SDK 720 installed. FlashPay SDK 710 and UnionPay SDK 720 respectively verify whether the client supports NFC and obtain a judgment result, similar to performing operation S220.
  • the UnionPay SDK 720 collects device information, and the UnionPay flash payment cloud platform 730 issues a token. After the flash payment SDK 710 obtains the token, the shopping application 740 checks whether the account has changed, similar to the implementation Operation S520. If the account has not been changed, the initialization of the UnionPay service is performed. If the account is changed, clear the virtual bank card and virtual bank card information stored on the client, and initialize the UnionPay service after clearing.
  • an account opening request is sent to the shopping application virtual payment server 750, and the account opening request includes a token to verify the legitimacy of the user according to the token. It is similar to performing operation S232.
  • the verification of the legitimacy of the user by the shopping application virtual payment server 750 may include, for example, verifying whether the user is a real name, whether to sign a contract with the shopping application platform and the bank of the shopping application, and the like.
  • the shopping application virtual payment server 750 verifies the legitimacy of the user identity, including, for example, device information, user account information, and the like.
  • the UnionPay service is activated so that the UnionPay service generates a virtual bank card.
  • Obtaining a virtual bank card and writing the card information of the virtual bank card to the mobile phone is similar to performing operation S240.
  • the shopping application After obtaining the virtual bank card, the shopping application selects the virtual bank card as the default payment payment bank card, and sends a notification to the user that the default payment bank card is the virtual bank card. It is similar to performing operation S610.
  • FIG. 8 schematically illustrates a block diagram of a system 800 for obtaining payment authority for a virtual bank card according to an embodiment of the present disclosure.
  • the system 800 for obtaining payment authority for a virtual bank card includes a receiving module 810, a determining module 820, a sending module 830, and a first obtaining module 840.
  • the receiving module 810 receives a user operation similarly to performing operation S210 described above with reference to FIG. 2.
  • the determination module 820 is similar to performing operation S220 described above with reference to FIG. 2, and determines whether the client device has a near field communication function in response to the user operation.
  • the sending module 830 similar to performing the operation S230 described above with reference to FIG. 2, and having a near field communication function, sends a request for applying for a virtual bank card.
  • the first obtaining module 840 is similar to performing operation S240 described above with reference to FIG. 2, and obtains a virtual bank card and a preset number of payment identifiers of the payment account if the application request meets application conditions.
  • FIG. 9 schematically illustrates a block diagram of a system 900 for obtaining payment authority for a virtual bank card according to another embodiment of the present disclosure.
  • the system 900 for obtaining payment authority for a virtual bank card further includes a second obtaining module 910 and a third obtaining module 920 on the basis of the foregoing embodiment.
  • the second obtaining module 910 obtains the number of payment identifiers remaining in the virtual bank card similarly to the operation S410 described above with reference to FIG. 4.
  • the third obtaining module 920 is similar to performing operation S420 described above with reference to FIG. 4, and when the number is less than a preset threshold, obtaining at least one of the payment identifiers so that the payment identifier included in the virtual bank card The number is the preset number.
  • FIG. 10 schematically illustrates a block diagram of a system 1000 for obtaining payment authority for a virtual bank card according to another embodiment of the present disclosure.
  • the system 1000 for obtaining payment authority of a virtual bank card further includes a fourth obtaining module 1010, a determining module 1020, and a clearing module 1030 on the basis of the foregoing embodiment.
  • the fourth obtaining module 1010 obtains current user information similarly to performing operation S510 described above with reference to FIG. 5.
  • the determination module 1020 determines, based on the current user information, whether the user information corresponding to the virtual bank card already stored in the client device is consistent with the current user information.
  • the clearing module 1030 is similar to performing operation S530 described above with reference to FIG. 5. In the case of inconsistency, clearing the virtual bank card and the user information corresponding to the virtual bank card stored in the client device.
  • FIG. 11 schematically illustrates a block diagram of a sending module 830 according to an embodiment of the present disclosure.
  • the sending module 830 includes an obtaining sub-module 831, a first sending sub-module 832, and a second sending sub-module 833.
  • the acquisition sub-module 831 is similar to performing operation S231 described above with reference to FIG. 3, and acquires authentication information of the client device if it has a near field communication function.
  • the first sending sub-module 832 similar to performing operation S232 described above with reference to FIG. 3, sends a request for opening a payment account based on the authentication information.
  • the second sending sub-module 833 is similar to performing operation S233 described above with reference to FIG. 3.
  • sending a request for applying for a virtual bank card wherein the payment account is based on an application program.
  • the user information is activated.
  • FIG. 12 schematically illustrates a block diagram of a system 1200 for obtaining payment authority of a virtual bank card according to another embodiment of the present disclosure.
  • the system 1200 for obtaining payment authority for a virtual bank card further includes a setting module 1210 on the basis of the foregoing embodiment.
  • the setting module 1210 sets the virtual bank card as a default payment bank card, and sends a notification to the user that the default payment bank card is the virtual bank card.
  • At least some of the modules, sub-modules, units, sub-units, or at least a part of any of the functions according to the embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into multiple modules.
  • any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be at least partially implemented as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), System-on-chip, system-on-substrate, system-on-package, application-specific integrated circuit (ASIC), or any other reasonable means of hardware or firmware that can integrate or package the circuit, or software, hardware, and firmware Any one of the implementation manners or an appropriate combination of any of them may be implemented.
  • FPGA field programmable gate array
  • PLA programmable logic array
  • ASIC application-specific integrated circuit
  • any one of the implementation manners or an appropriate combination of any of them may be implemented.
  • one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be at least partially implemented as computer program modules, and when the computer program modules are executed, corresponding functions may be performed.
  • first sending sub-module 832, the second sending sub-module 833, and the setting module 1210 can be combined into one module, or any one of them can be split into multiple modules.
  • at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module.
  • the receiving module 810, the determining module 820, the sending module 830, the first obtaining module 840, the second obtaining module 910, the third obtaining module 920, the fourth obtaining module 1010, the determining module 1020, and the clearing module 1030 At least one of the acquisition sub-module 831, the first transmission sub-module 832, the second transmission sub-module 833, and the setting module 1210 may be at least partially implemented as a hardware circuit, such as a field programmable gate array (FPGA), programmable logic Array (PLA), system-on-chip, system-on-substrate, system-on-package, application-specific integrated circuit (ASIC), or any other reasonable means of integrating or packaging the circuit, such as hardware or firmware, or software , Hardware, and firmware in any one of the three implementations or any appropriate combination of them.
  • FPGA field programmable gate array
  • PLA programmable logic Array
  • ASIC application-specific integrated circuit
  • At least one of the first sending sub-module 832, the second sending sub-module 833, and the setting module 1210 may be at least partially implemented as a computer program module, and when the computer program module is executed, a corresponding function may be performed.
  • FIG. 13 schematically illustrates a block diagram of an electronic device suitable for implementing the method described above according to an embodiment of the present disclosure.
  • the electronic device shown in FIG. 13 is only an example, and should not impose any limitation on the functions and use ranges of the embodiments of the present disclosure.
  • the electronic device 1300 includes a processor 1301 that can be loaded into a random access memory (RAM) 1303 according to a program stored in a read-only memory (ROM) 1302 or from a storage portion 1308.
  • the program performs various appropriate actions and processes.
  • the processor 1301 may include, for example, a general-purpose microprocessor (for example, a CPU), an instruction set processor and / or an associated chipset and / or a special-purpose microprocessor (for example, an application-specific integrated circuit (ASIC)), and so on.
  • the processor 1301 may further include on-board memory for cache use.
  • the processor 1301 may include a single processing unit or multiple processing units for performing different actions of the method flow according to the embodiment of the present disclosure.
  • the processors 1301, ROM 1302, and RAM 1303 are connected to each other through a bus 1304.
  • the processor 1301 executes various operations of the method flow according to the embodiment of the present disclosure by executing programs in the ROM 1302 and / or the RAM 1303. It should be noted that the program may also be stored in one or more memories other than the ROM 1302 and the RAM 1303.
  • the processor 1301 may also execute various operations of the method flow according to the embodiment of the present disclosure by executing a program stored in the one or more memories.
  • the electronic device 1300 may further include an input / output (I / O) interface 1305, and the input / output (I / O) interface 1305 is also connected to the bus 1304.
  • the electronic device 1300 may further include one or more of the following components connected to the I / O interface 1305: an input portion 1306 including a keyboard, a mouse, and the like; including, such as a cathode ray tube (CRT), a liquid crystal display (LCD), and the like; and An output section 1307 of a speaker or the like; a storage section 1308 including a hard disk or the like; and a communication section 1309 including a network interface card such as a LAN card, a modem, or the like.
  • the communication section 1309 performs communication processing via a network such as the Internet.
  • the driver 1310 is also connected to the I / O interface 1305 as needed.
  • a removable medium 1311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1310 as needed, so that a computer program read therefrom is installed into the storage section 1308 as needed.
  • the method flow according to the embodiment of the present disclosure may be implemented as a computer software program.
  • embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable storage medium, the computer program containing program code for performing a method shown in a flowchart.
  • the computer program may be downloaded and installed from a network through the communication section 1309, and / or installed from a removable medium 1311.
  • the processor 1301 executes the processor 1301
  • the above functions defined in the system of the embodiment of the present disclosure are executed.
  • the systems, devices, devices, modules, units, and the like described above may be implemented by computer program modules.
  • the present disclosure also provides a computer-readable storage medium, which may be included in the device / apparatus / system described in the above embodiments; or may exist alone without being assembled into the device / Device / system.
  • the computer-readable storage medium carries one or more programs, and when the one or more programs are executed, the method according to the embodiment of the present disclosure is implemented.
  • the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, but is not limited to, a portable computer disk, a hard disk, a random access memory (RAM), and a read-only memory (ROM). , Erasable programmable read-only memory (EPROM or flash memory), portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in combination with an instruction execution system, apparatus, or device.
  • the computer-readable storage medium may include one or more memories other than ROM 1302 and / or RAM 1303 and / or ROM 1302 and RAM 1303 described above.
  • each block in the flowchart or block diagram may represent a module, a program segment, or a part of code, which contains one or more of the logic functions used to implement the specified logic.
  • Executable instructions may also occur in a different order than those marked in the drawings. For example, two successively represented boxes may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram or flowchart, and combinations of blocks in the block diagram or flowchart can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with A combination of dedicated hardware and computer instructions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本公开提供了一种获得虚拟银行卡支付权限的方法,包括接收用户操作,响应于所述用户操作,确定客户端设备是否具备近场通信的功能,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求,以及在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。本公开的另一方面还提供了一种获得虚拟银行卡支付权限的系统、电子设备和计算机可读存储介质。

Description

获得虚拟银行卡支付权限的方法、系统、电子设备和介质 技术领域
本公开涉及互联网技术领域,更具体地,涉及一种获得虚拟银行卡支付权限的方法、系统、电子设备和介质。
背景技术
随着互联网技术的发展,支付方式越来越多,例如二维码支付、手机钱包、闪付等,丰富的支付方式为线下支付带来了诸多便利。例如,闪付是一种利用近场通信(Near Field Communication,NFC)功能实现支付的支付方式,两个支持NFC的设备靠拢,它们便会自动启动网络通信功能,实现非接触式移动支付,极大地简化了支付流程,提高了用户体验。
在实现本公开构思的过程中,发明人发现现有技术中至少存在如下问题:利用近场通信功能实现支付的支付方式例如闪付,存在安全隐患。
发明内容
有鉴于此,本公开提供了一种获得虚拟银行卡支付权限的方法、系统、电子设备和介质。
本公开的一个方面提供了一种用于获得虚拟银行卡支付权限方法,包括接收用户操作,响应于所述用户操作,确定客户端设备是否具备近场通信的功能,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求,以及在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
根据本公开的实施例,在所述虚拟银行卡被使用后,所述支付标识被消耗,所述方法还包括获取所述虚拟银行卡中剩余的支付标识的数量,在所述数量小于预设阈值的情况下,获取至少一个所述支付标识,以使所述虚拟银行卡包括的支 付标识的数量为所述预设数量。
根据本公开的实施例,所述方法还包括获取当前用户信息,基于所述当前用户信息,确定所述客户端设备中已经存储的虚拟银行卡对应的用户信息与所述当前用户信息是否一致,以及在不一致的情况下,清除所述客户端设备中存储的虚拟银行卡以及与该虚拟银行卡对应的用户信息。
根据本公开的实施例,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求包括,在具备近场通信的功能的情况下,获取所述客户端设备的认证信息,基于所述认证信息,发送开通支付账户的请求,以及在所述支付账户成功开通的情况下,发送申请虚拟银行卡的申请请求,其中,所述支付账户是基于应用程序中的用户信息开通的。
根据本公开的实施例,虚拟银行卡中的资产包括所述应用程序中与所述用户信息对应的至少一种支付资产,其中,所述支付资产包括所述用户信息在所述应用程序中的虚拟资产。
根据本公开的实施例,所述方法还包括将所述虚拟银行卡设置为默认支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。
本公开的另一个方面提供了一种获得虚拟银行卡支付权限的系统包括,接收模块用于接收用户操作,确定模块用于响应于所述用户操作,确定客户端设备是否具备近场通信的功能,发送模块用于在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求,以及第一获取模块用于在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
根据本公开的实施例,在所述虚拟银行卡被使用后,所述支付标识被消耗,所述系统还包括,第二获取模块用于获取所述虚拟银行卡中剩余的支付标识的数量,第三获取模块用于在所述数量小于预设阈值的情况下,获取至少一个所述支付标识,以使所述虚拟银行卡包括的支付标识的数量为所述预设数量。
根据本公开的实施例,所述系统还包括第四获取模块用于获取当前用户信息,确定模块用于基于所述当前用户信息,确定所述客户端设备中已经存储的虚拟银行卡对应的用户信息与所述当前用户信息是否一致,以及清除模块用于在不一致 的情况下,清除所述客户端设备中存储的虚拟银行卡以及与该虚拟银行卡对应的用户信息。
根据本公开的实施例,发送模块包括获取子模块用于在具备近场通信的功能的情况下,获取所述客户端设备的认证信息,第一发送子模块用于基于所述认证信息,发送开通支付账户的请求,第二发送子模块用于在所述支付账户成功开通的情况下,发送申请虚拟银行卡的申请请求,其中,所述支付账户是基于应用程序中的用户信息开通的。
根据本公开的实施例,虚拟银行卡中的资产包括所述应用程序中与所述用户信息对应的至少一种支付资产,其中,所述支付资产包括所述用户信息在所述应用程序中的虚拟资产。
根据本公开的实施例,所述系统还包括设置模块用于将所述虚拟银行卡设置为默认支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。
本公开的另一方面提供了一种电子设备,包括一个或多个处理器,存储装置,用于存储一个或多个程序,其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行上述任意一项的方法。
本公开的另一方面提供了一种计算机可读存储介质,存储有计算机可执行指令,所述指令在被执行时用于实现如上所述的方法。
本公开的另一方面提供了一种计算机程序,所述计算机程序包括计算机可执行指令,所述指令在被执行时用于实现如上所述的方法。
根据本公开的实施例,可以至少部分地解决虚拟银行卡支付存在安全隐患的问题,并因此可以实现提高虚拟银行卡支付的安全性的技术效果。
附图说明
通过以下参照附图对本公开实施例的描述,本公开的上述以及其他目的、特征和优点将更为清楚,在附图中:
图1A和图1B示意性示出了根据本公开实施例的获得虚拟银行卡支付权限的应用场景;
图2示意性示出了根据本公开实施例的获得虚拟银行卡支付权限的方法的流程图;
图3示意性示出了根据本公开实施例的在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求的流程图;
图4示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图;
图5示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图;
图6示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图;
图7示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图;
图8示意性示出了根据本公开的实施例的获得虚拟银行卡支付权限的系统的框图;
图9示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统的框图;
图10示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统的框图;
图11示意性示出了根据本公开实施例的发送模块的框图;
图12示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统的框图;以及
图13示意性示出了根据本公开实施例的适于实现上文描述的方法的电子设备的方框图。
具体实施方式
以下,将参照附图来描述本公开的实施例。但是应该理解,这些描述只是示例性的,而并非要限制本公开的范围。在下面的详细描述中,为便于解释,阐述了许多具体的细节以提供对本公开实施例的全面理解。然而,明显地,一个或多个实施例在没有这些具体细节的情况下也可以被实施。此外,在以下说明中,省略了对公知结构和技术的描述,以避免不必要地混淆本公开的概念。
在此使用的术语仅仅是为了描述具体实施例,而并非意在限制本公开。在此 使用的术语“包括”、“包含”等表明了所述特征、步骤、操作和/或部件的存在,但是并不排除存在或添加一个或多个其他特征、步骤、操作或部件。
在此使用的所有术语(包括技术和科学术语)具有本领域技术人员通常所理解的含义,除非另外定义。应注意,这里使用的术语应解释为具有与本说明书的上下文相一致的含义,而不应以理想化或过于刻板的方式来解释。
在使用类似于“A、B和C等中至少一个”这样的表述的情况下,一般来说应该按照本领域技术人员通常理解该表述的含义来予以解释(例如,“具有A、B和C中至少一个的系统”应包括但不限于单独具有A、单独具有B、单独具有C、具有A和B、具有A和C、具有B和C、和/或具有A、B、C的系统等)。在使用类似于“A、B或C等中至少一个”这样的表述的情况下,一般来说应该按照本领域技术人员通常理解该表述的含义来予以解释(例如,“具有A、B或C中至少一个的系统”应包括但不限于单独具有A、单独具有B、单独具有C、具有A和B、具有A和C、具有B和C、和/或具有A、B、C的系统等)。本领域技术人员还应理解,实质上任意表示两个或更多可选项目的转折连词和/或短语,无论是在说明书、权利要求书还是附图中,都应被理解为给出了包括这些项目之一、这些项目任一方、或两个项目的可能性。例如,短语“A或B”应当被理解为包括“A”或“B”、或“A和B”的可能性。
本公开的实施例提供了一种获得虚拟银行卡支付权限的方法,包括接收用户操作,响应于所述用户操作,确定客户端设备是否具备近场通信的功能,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求,以及在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
图1A和图1B示意性示出了根据本公开实施例的获得虚拟银行卡支付权限的应用场景。需要注意的是,图1A和图1B所示仅为可以应用本公开实施例的应用场景的示例,以帮助本领域技术人员理解本公开的技术内容,但并不意味着本公开实施例不可以用于其他场景。
如图1A所示,该应用场景中包括终端设备100,终端设备100例如可以安装有一购物类应用110,购物类应用110包括控件111。用户可以通过点击控件111 来申请支持闪付的虚拟银行卡。
如图1B所示,用户根据购物类应用110的提示执行了某些操作后,成功申请到了虚拟银行卡200。根据本公开的实施例,终端设备100在获取了虚拟银行卡200的同时,还获取到预设数量的支付标识。该支付标识是根据虚拟银行卡200的卡信息加密生成的,用于使其他设备例如POSE机通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
图2示意性示出了根据本公开实施例的获得虚拟银行卡支付权限的方法的流程图。
如图2所示,该方法包括在操作S210~S240。
在操作S210,接收用户操作。
在操作S220,响应于所述用户操作,确定客户端设备是否具备近场通信的功能。
在操作S230,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求。
在操作S240,在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
该方法通过对虚拟银行卡加密,生成与该虚拟银行卡对应的支付标识,从而根据支付标识进行支付,提高了支付的安全性。
根据本公开的实施例,在操作S210,例如在图1A所示的情景中,可以是接收用户点击控件111的操作。
根据本公开的实施例,在操作S220,例如在图1A所示的情景中,可以是在接收到用户的点击操作后,确定终端设备100是否具备近场通信的功能。
根据本公开的实施例,在操作S230,发送申请虚拟银行卡的申请请求例如可以是,终端设备100上安装的购物类应用110提供的支付软件包调用银联支付软件包,银联支付软件包调用银联支付服务器,银联支付服务器调用购物类应用110的服务器,从而向购物类应用110的服务器发送申请虚拟银行卡的申请请求。
图3示意性示出了根据本公开实施例的在具备近场通信的功能的情况下,发 送申请虚拟银行卡的申请请求的流程图。
如图3所示,该方法包括操作S231~S233。
在操作S231,在具备近场通信的功能的情况下,获取所述客户端设备的认证信息。
在操作S232,基于所述认证信息,发送开通支付账户的请求。
在操作S233,在所述支付账户成功开通的情况下,发送申请虚拟银行卡的申请请求,其中,所述支付账户是基于应用程序中的用户信息开通的。
根据本公开的实施例,在操作S231,客户端设备的认证信息,例如在图1A所示的情景中可以是终端设备100上安装的购物类应用110提供的支付软件包调用银联支付软件包,由银联支付软件包采集终端设备100的设备信息,根据设备信息下发认证信息,认证信息例如可以是令牌。
根据本公开的实施例,在操作S232,基于所述认证信息,向购物类应用110的服务器发送开通支付账户的请求。
根据本公开的实施例,购物类应用110的服务器获取到认证信息,与银联服务器通信,以使银联服务器验证认证信息是否有效。
根据本公开的实施例,在操作S233,在上述认证信息有效的情况下,购物类应用110基于用户信息开通支付账户。
返回参考图2,在操作S240,例如可以是在购物类应用110验证申请请求满足申请条件的情况下,向银联服务器发送验证成功的消息,由银联生成虚拟银行卡,并发送到终端设备100。终点设备100在获取到虚拟银行卡的同时,还会获取到预设数量的支付标识,从而根据支付标识进行支付。例如,当终端设备100靠近POSE机以支付时,POSE获取到支付标识,从而使POSE的后台根据支付标识确定需要使用的虚拟银行卡。
图4示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图。
如图4所示,该方法在前述实施例的基础上还包括操作S410和S420。
在操作S410,获取所述虚拟银行卡中剩余的支付标识的数量。
在操作S420,在所述数量小于预设阈值的情况下,获取至少一个所述支付标识,以使所述虚拟银行卡包括的支付标识的数量为所述预设数量。
根据本公开的实施例,在所述虚拟银行卡被使用后,所述支付标识被消耗。例如,每次使用虚拟银行卡均消耗一个支付标识。通过消耗支付标识,使得支付标识的数量小于预设阈值时,银联再次下发支付标识,在下发支付标识时会对账户信息再次校验,例如校验支付密码、设备信息等,进而进一步提高了支付的安全性。
根据本公开的实施例,在操作S410,例如可以是购物类应用的支付软件包获取虚拟银行卡中剩余的支付标识的数量。
根据本公开的实施例,在操作S420,例如可以是购物类应用的支付软件包向银联申请支付标识,以避免支付标识为空,导致无法支付。
图5示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图。
如图5所示,该方法在前述实施例的基础上还包括操作S510~S530。
在操作S510,获取当前用户信息。
在操作S520,基于所述当前用户信息,确定所述客户端设备中已经存储的虚拟银行卡对应的用户信息与所述当前用户信息是否一致。
在操作S530,在不一致的情况下,清除所述客户端设备中存储的虚拟银行卡以及与该虚拟银行卡对应的用户信息。
该方法能够清除客户端设备中已经保存的虚拟银行卡,避免其他用户之前创建的虚拟银行卡被当前用户使用。
根据本公开的实施例,在操作S510,例如该方法应用于一购物类应用,获取登录该购物类应用的用户信息。
根据本公开的实施例,在操作S520,例如可以是确定终端设备中是否已经存储了该购物类应用的其他用户的虚拟银行卡。
根据本公开的实施例,在操作S530,例如可以是在存在其他用户的虚拟银行卡的情况下,将其他用户的虚拟银行卡以及与该虚拟银行卡对应的用户信息删除。
根据本公开的实施例,虚拟银行卡中的资产包括所述应用程序中与所述用户信息对应的至少一种支付资产,其中,所述支付资产包括所述用户信息在所述应用程序中的虚拟资产。例如,该方法应用于一购物类应用,虚拟银行卡中的资产包括用户在该购物类应用中添加的至少部分支付资产,例如,多张银行卡。根据 本公开的实施例,支付资产包括该用户在该应用程序中的虚拟资产,例如用户在该应用程序中的金库、白条、钢镚。
图6示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图。
如图6所示,该方法在前述实施例的基础上还包括操作S610。
在操作S610,将所述虚拟银行卡设置为默认支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。
该方法自动虚拟银行卡设置为默认支付银行卡,并向用户发送通知,提高了用户体验。
图7示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的方法的流程图。
如图7所示,在该实施例中包括闪付SDK(Software Development Kit,软件开发工具包)710、银联SDK 720、银联闪付云平台730、购物应用程序740和购物应用程序虚拟支付服务器750。
如图7所示,例如客户端安装有闪付SDK 710和银联SDK 720。闪付SDK 710和银联SDK 720分别验证客户端是否支持NFC,获得判断结果,类似于执行操作S220。
在支持NFC的情况下,注册银联服务,银联SDK 720采集设备信息,由银联闪付云平台730下发token,闪付SDK 710获得token后,购物应用程序740校验账户是否变更,类似于执行操作S520。若账户未变更,则执行初始化银联服务。若账户被变更,则清除客户端存储的虚拟银行卡以及虚拟银行卡信息,清除后初始化银联服务。
在启动银联服务后,向购物应用程序虚拟支付服务器750发送开户请求,所述开户请求包括token,以根据token验证用户的合法性。类似于执行操作S232。根据本公开的实施例,购物应用程序虚拟支付服务器750验证用户的合法性例如可以包括验证用户是否实名,是否与购物应用平台以及该购物应用的银行签约等。
在开户成功后,发送申卡请求,类似于执行操作S230。根据本公开的实施例,购物应用程序虚拟支付服务器750验证用户身份的合法性,例如包括设备信息、用户账户信息等。
在申卡成功后,激活银联服务,使银联服务生成虚拟银行卡。
获取虚拟银行卡,并将虚拟银行卡的卡信息写入手机,类似于执行操作S240。
在获取到虚拟银行卡后,购物应用将该虚拟银行卡选为默认支付支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。类似于执行操作S610。
图8示意性示出了根据本公开的实施例的获得虚拟银行卡支付权限的系统800的框图。
如图8所示,获得虚拟银行卡支付权限的系统800包括接收模块810、确定模块820、发送模块830以及第一获取模块840。
接收模块810,类似于执行上文参考图2描述的操作S210,接收用户操作。
确定模块820,类似于执行上文参考图2描述的操作S220,响应于所述用户操作,确定客户端设备是否具备近场通信的功能。
发送模块830,类似于执行上文参考图2描述的操作S230,在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求。
第一获取模块840,类似于执行上文参考图2描述的操作S240,在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识。
图9示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统900的框图。
如图9所示,获得虚拟银行卡支付权限的系统900在前述实施例的基础上还包括第二获取模块910和第三获取模块920。
第二获取模块910,类似于执行上文参考图4描述的操作S410,获取所述虚拟银行卡中剩余的支付标识的数量。
第三获取模块920,类似于执行上文参考图4描述的操作S420,在所述数量小于预设阈值的情况下,获取至少一个所述支付标识,以使所述虚拟银行卡包括的支付标识的数量为所述预设数量。
图10示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统1000的框图。
如图10所示,获得虚拟银行卡支付权限的系统1000在前述实施例的基础上还包括第四获取模块1010、确定模块1020和清除模块1030。
第四获取模块1010,类似于执行上文参考图5描述的操作S510,获取当前用户信息。
确定模块1020,类似于执行上文参考图5描述的操作S520,基于所述当前用户信息,确定所述客户端设备中已经存储的虚拟银行卡对应的用户信息与所述当前用户信息是否一致。
清除模块1030,类似于执行上文参考图5描述的操作S530,在不一致的情况下,清除所述客户端设备中存储的虚拟银行卡以及与该虚拟银行卡对应的用户信息。
图11示意性示出了根据本公开实施例的发送模块830的框图。
如图11所示,发送模块830包括获取子模块831、第一发送子模块832和第二发送子模块833。
获取子模块831,类似于执行上文参考图3描述的操作S231,在具备近场通信的功能的情况下,获取所述客户端设备的认证信息。
第一发送子模块832,类似于执行上文参考图3描述的操作S232,基于所述认证信息,发送开通支付账户的请求。
第二发送子模块833,类似于执行上文参考图3描述的操作S233,在所述支付账户成功开通的情况下,发送申请虚拟银行卡的申请请求,其中,所述支付账户是基于应用程序中的用户信息开通的。
图12示意性示出了根据本公开另一实施例的获得虚拟银行卡支付权限的系统1200的框图。
如图12所示,获得虚拟银行卡支付权限的系统1200在前述实施例的基础上还包括设置模块1210。
设置模块1210,类似于执行上文参考图6描述的操作S610,将所述虚拟银行卡设置为默认支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。
根据本公开的实施例的模块、子模块、单元、子单元中的任意多个、或其中任意多个的至少部分功能可以在一个模块中实现。根据本公开实施例的模块、子模块、单元、子单元中的任意一个或多个可以被拆分成多个模块来实现。根据本公开实施例的模块、子模块、单元、子单元中的任意一个或多个可以至少被部分 地实现为硬件电路,例如现场可编程门阵列(FPGA)、可编程逻辑阵列(PLA)、片上系统、基板上的系统、封装上的系统、专用集成电路(ASIC),或可以通过对电路进行集成或封装的任何其他的合理方式的硬件或固件来实现,或以软件、硬件以及固件三种实现方式中任意一种或以其中任意几种的适当组合来实现。或者,根据本公开实施例的模块、子模块、单元、子单元中的一个或多个可以至少被部分地实现为计算机程序模块,当该计算机程序模块被运行时,可以执行相应的功能。
例如,接收模块810、确定模块820、发送模块830、第一获取模块840、第二获取模块910、第三获取模块920、第四获取模块1010、确定模块1020、清除模块1030、获取子模块831、第一发送子模块832、第二发送子模块833和设置模块1210中的任意多个可以合并在一个模块中实现,或者其中的任意一个模块可以被拆分成多个模块。或者,这些模块中的一个或多个模块的至少部分功能可以与其他模块的至少部分功能相结合,并在一个模块中实现。根据本公开的实施例,接收模块810、确定模块820、发送模块830、第一获取模块840、第二获取模块910、第三获取模块920、第四获取模块1010、确定模块1020、清除模块1030、获取子模块831、第一发送子模块832、第二发送子模块833和设置模块1210中的至少一个可以至少被部分地实现为硬件电路,例如现场可编程门阵列(FPGA)、可编程逻辑阵列(PLA)、片上系统、基板上的系统、封装上的系统、专用集成电路(ASIC),或可以通过对电路进行集成或封装的任何其他的合理方式等硬件或固件来实现,或以软件、硬件以及固件三种实现方式中任意一种或以其中任意几种的适当组合来实现。或者,接收模块810、确定模块820、发送模块830、第一获取模块840、第二获取模块910、第三获取模块920、第四获取模块1010、确定模块1020、清除模块1030、获取子模块831、第一发送子模块832、第二发送子模块833和设置模块1210中的至少一个可以至少被部分地实现为计算机程序模块,当该计算机程序模块被运行时,可以执行相应的功能。
图13示意性示出了根据本公开实施例的适于实现上文描述的方法的电子设备的方框图。图13示出的电子设备仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。
如图13所示,根据本公开实施例的电子设备1300包括处理器1301,其可以 根据存储在只读存储器(ROM)1302中的程序或者从存储部分1308加载到随机访问存储器(RAM)1303中的程序而执行各种适当的动作和处理。处理器1301例如可以包括通用微处理器(例如CPU)、指令集处理器和/或相关芯片组和/或专用微处理器(例如,专用集成电路(ASIC)),等等。处理器1301还可以包括用于缓存用途的板载存储器。处理器1301可以包括用于执行根据本公开实施例的方法流程的不同动作的单一处理单元或者是多个处理单元。
在RAM 1303中,存储有电子设备1300操作所需的各种程序和数据。处理器1301、ROM 1302以及RAM 1303通过总线1304彼此相连。处理器1301通过执行ROM 1302和/或RAM 1303中的程序来执行根据本公开实施例的方法流程的各种操作。需要注意,所述程序也可以存储在除ROM 1302和RAM 1303以外的一个或多个存储器中。处理器1301也可以通过执行存储在所述一个或多个存储器中的程序来执行根据本公开实施例的方法流程的各种操作。
根据本公开的实施例,电子设备1300还可以包括输入/输出(I/O)接口1305,输入/输出(I/O)接口1305也连接至总线1304。电子设备1300还可以包括连接至I/O接口1305的以下部件中的一项或多项:包括键盘、鼠标等的输入部分1306;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1307;包括硬盘等的存储部分1308;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1309。通信部分1309经由诸如因特网的网络执行通信处理。驱动器1310也根据需要连接至I/O接口1305。可拆卸介质1311,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1310上,以便于从其上读出的计算机程序根据需要被安装入存储部分1308。
根据本公开的实施例,根据本公开实施例的方法流程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读存储介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分1309从网络上被下载和安装,和/或从可拆卸介质1311被安装。在该计算机程序被处理器1301执行时,执行本公开实施例的系统中限定的上述功能。根据本公开的实施例,上文描述的系统、设备、装置、模块、单元等可以通过计算机程序模块来实现。
本公开还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上 述实施例中描述的设备/装置/系统中所包含的;也可以是单独存在,而未装配入该设备/装置/系统中。上述计算机可读存储介质承载有一个或者多个程序,当上述一个或者多个程序被执行时,实现根据本公开实施例的方法。
根据本公开的实施例,计算机可读存储介质可以是非易失性的计算机可读存储介质,例如可以包括但不限于:便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。例如,根据本公开的实施例,计算机可读存储介质可以包括上文描述的ROM 1302和/或RAM 1303和/或ROM 1302和RAM 1303以外的一个或多个存储器。
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
本领域技术人员可以理解,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合或/或结合,即使这样的组合或结合没有明确记载于本公开中。特别地,在不脱离本公开精神和教导的情况下,本公开的各个实施例和/或权利要求中记载的特征可以进行多种组合和/或结合。所有这些组合和/或结合均落入本公开的范围。
以上对本公开的实施例进行了描述。但是,这些实施例仅仅是为了说明的目的,而并非为了限制本公开的范围。尽管在以上分别描述了各实施例,但是这并不意味着各个实施例中的措施不能有利地结合使用。本公开的范围由所附权利要 求及其等同物限定。不脱离本公开的范围,本领域技术人员可以做出多种替代和修改,这些替代和修改都应落在本公开的范围之内。

Claims (9)

  1. 一种获得虚拟银行卡支付权限的方法,包括:
    接收用户操作;
    响应于所述用户操作,确定客户端设备是否具备近场通信的功能;
    在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求;以及
    在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
  2. 根据权利要求1所述的方法,其中,在所述虚拟银行卡被使用后,所述支付标识被消耗,所述方法还包括:
    获取所述虚拟银行卡中剩余的支付标识的数量;
    在所述数量小于预设阈值的情况下,获取至少一个所述支付标识,以使所述虚拟银行卡包括的支付标识的数量为所述预设数量。
  3. 根据权利要求1所述的方法,还包括:
    获取当前用户信息;
    基于所述当前用户信息,确定所述客户端设备中已经存储的虚拟银行卡对应的用户信息与所述当前用户信息是否一致;以及
    在不一致的情况下,清除所述客户端设备中存储的虚拟银行卡以及与该虚拟银行卡对应的用户信息。
  4. 根据权利要求1所述的方法,其中,所述在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求包括:
    在具备近场通信的功能的情况下,获取所述客户端设备的认证信息;
    基于所述认证信息,发送开通支付账户的请求;以及
    在所述支付账户成功开通的情况下,发送申请虚拟银行卡的申请请求,其中,所述支付账户是基于应用程序中的用户信息开通的。
  5. 根据权利要求4所述的方法,其中,所述虚拟银行卡中的资产包括:
    所述应用程序中与所述用户信息对应的至少一种支付资产,其中,所述支付资产包括所述用户信息在所述应用程序中的虚拟资产。
  6. 根据权利要求1所述的方法,还包括:
    将所述虚拟银行卡设置为默认支付银行卡,并向用户发送默认支付银行卡为该虚拟银行卡的通知。
  7. 一种获得虚拟银行卡支付权限的系统,包括:
    接收模块,用于接收用户操作;
    确定模块,用于响应于所述用户操作,确定客户端设备是否具备近场通信的功能;
    发送模块,用于在具备近场通信的功能的情况下,发送申请虚拟银行卡的申请请求;以及
    第一获取模块,用于在所述申请请求满足申请条件的情况下,获取所述支付账户的虚拟银行卡和预设数量的支付标识,所述支付标识是根据所述虚拟银行卡的卡信息加密生成的,用于使其他设备通过获取所述支付标识,来确定支付所使用的相应的虚拟银行卡。
  8. 一种电子设备,包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序,
    其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如权利要求1~6所述任意一项的方法。
  9. 一种计算机可读存储介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行如权利要求1~6所述任意一项的方法。
PCT/CN2019/099986 2018-09-28 2019-08-09 获得虚拟银行卡支付权限的方法、系统、电子设备和介质 WO2020063138A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811144152.3 2018-09-28
CN201811144152.3A CN110969437B (zh) 2018-09-28 2018-09-28 获得虚拟银行卡支付权限的方法、系统、电子设备和介质

Publications (1)

Publication Number Publication Date
WO2020063138A1 true WO2020063138A1 (zh) 2020-04-02

Family

ID=69949554

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/099986 WO2020063138A1 (zh) 2018-09-28 2019-08-09 获得虚拟银行卡支付权限的方法、系统、电子设备和介质

Country Status (2)

Country Link
CN (1) CN110969437B (zh)
WO (1) WO2020063138A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706045A (zh) * 2021-09-02 2021-11-26 工银科技有限公司 资金支付方法、装置、设备、介质和程序产品

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112288425B (zh) * 2020-12-23 2021-04-13 中国银联股份有限公司 支付功能开通方法、终端设备、服务器、系统及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046486A (zh) * 2015-07-17 2015-11-11 百度在线网络技术(北京)有限公司 基于nfc的移动支付方法和装置
CN106104601A (zh) * 2016-06-22 2016-11-09 北京小米移动软件有限公司 虚拟卡片激活方法及装置
US20160359832A1 (en) * 2013-12-06 2016-12-08 Hierstar (Suzhou)., Ltd. Virtual device authorization method and device
CN106845971A (zh) * 2015-12-03 2017-06-13 中国电信股份有限公司 用于提升电子钱包安全性的方法、装置和系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130060694A1 (en) * 2011-09-06 2013-03-07 Rawllin International Inc. Unified account handling system
US20140229375A1 (en) * 2013-02-11 2014-08-14 Groupon, Inc. Consumer device payment token management
CN104765999B (zh) * 2014-01-07 2020-06-30 腾讯科技(深圳)有限公司 一种对用户资源信息进行处理的方法、终端及服务器
CN106062798A (zh) * 2015-02-13 2016-10-26 华为技术有限公司 一种账户信息管理的方法及装置
US9892396B2 (en) * 2015-03-19 2018-02-13 International Business Machines Corporation Multi-point authentication for payment transactions
US10664821B2 (en) * 2015-07-22 2020-05-26 Mastercard International Incorporated Multi-mode payment systems and methods
KR101727458B1 (ko) * 2015-08-20 2017-04-19 주식회사 한국엔에프씨 실물 금융카드 및 출금계좌 인증을 통한 모바일 뱅킹 계좌 이체 시스템 및 방법
KR20170106713A (ko) * 2016-03-14 2017-09-22 삼성전자주식회사 카드 운용 정보 처리 방법 및 이를 지원하는 전자 장치
CN106600266A (zh) * 2016-12-05 2017-04-26 深圳前海微众银行股份有限公司 基于sdk的移动支付方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160359832A1 (en) * 2013-12-06 2016-12-08 Hierstar (Suzhou)., Ltd. Virtual device authorization method and device
CN105046486A (zh) * 2015-07-17 2015-11-11 百度在线网络技术(北京)有限公司 基于nfc的移动支付方法和装置
CN106845971A (zh) * 2015-12-03 2017-06-13 中国电信股份有限公司 用于提升电子钱包安全性的方法、装置和系统
CN106104601A (zh) * 2016-06-22 2016-11-09 北京小米移动软件有限公司 虚拟卡片激活方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113706045A (zh) * 2021-09-02 2021-11-26 工银科技有限公司 资金支付方法、装置、设备、介质和程序产品
CN113706045B (zh) * 2021-09-02 2024-05-10 工银科技有限公司 资金支付方法、装置、设备、介质和程序产品

Also Published As

Publication number Publication date
CN110969437B (zh) 2024-04-16
CN110969437A (zh) 2020-04-07

Similar Documents

Publication Publication Date Title
US11050729B2 (en) Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
US20230291571A1 (en) Dynamic management and implementation of consent and permissioning protocols using container-based applications
US20230351356A1 (en) Systems and method for payment transaction processing with payment application driver
US10445491B2 (en) Confirming the identity of integrator applications
KR102381153B1 (ko) 신원 정보에 기초한 암호화 키 관리
WO2017012223A1 (zh) 基于nfc的移动支付方法和装置
CN110826043B (zh) 一种数字身份申请系统及方法、身份认证系统及方法
CN106899552A (zh) 认证方法,认证终端以及系统
US20210014064A1 (en) Method and apparatus for managing user authentication in a blockchain network
JP2018504789A (ja) 決済認証システム、方法及び装置
CN111832005B (zh) 应用授权方法、应用授权装置和电子设备
US10325260B2 (en) System, method and computer program product for secure peer-to-peer transactions
US10635820B1 (en) Update policy-based anti-rollback techniques
WO2017206747A1 (zh) 移动支付方法、装置及系统
WO2019209905A1 (en) Identity credential verification techniques
CN111192186A (zh) 政务处理的方法、装置、计算机设备和存储介质
CN110401630B (zh) 交易凭证的验证方法、装置、电子设备和介质
WO2020063138A1 (zh) 获得虚拟银行卡支付权限的方法、系统、电子设备和介质
WO2017035799A1 (zh) 一种移动终端的支付认证方法、装置及移动终端
WO2016150034A1 (zh) 一种虚拟sim卡的管理方法、装置和系统
CN112687042B (zh) 认证方法、认证装置和电子设备
CN110889106A (zh) 配置方法、装置、系统、计算机可读存储介质
US20180174142A1 (en) Managing product returns associated with a user device
CN105187447A (zh) 一种终端安全登录方法
KR102048025B1 (ko) 인증 프로토콜에 기반하여 문서를 안전하고 편리하게 승인하는 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19867060

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19867060

Country of ref document: EP

Kind code of ref document: A1