[go: up one dir, main page]

CN108830586A - Apparatus and method for settlement and payment using mobile device - Google Patents

Apparatus and method for settlement and payment using mobile device Download PDF

Info

Publication number
CN108830586A
CN108830586A CN201810371537.7A CN201810371537A CN108830586A CN 108830586 A CN108830586 A CN 108830586A CN 201810371537 A CN201810371537 A CN 201810371537A CN 108830586 A CN108830586 A CN 108830586A
Authority
CN
China
Prior art keywords
mobile device
payment
user
secure element
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810371537.7A
Other languages
Chinese (zh)
Inventor
谢祥臻
许良盛
潘昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RFCyber Corp
Original Assignee
RFCyber Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by RFCyber Corp filed Critical RFCyber Corp
Publication of CN108830586A publication Critical patent/CN108830586A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a device and a method for settling payment by using a mobile device. The method comprises the following steps: providing a software module executing on a first mobile device embedded with a secure element, wherein said secure element has been personalized, said software module being configured via said secure element, said first mobile device comprising data relating to an electronic bill; receiving a payment request from a second mobile device upon approval by a user of the second mobile device of payment for the wirelessly transmitted electronic bill from the first mobile device, wherein the second mobile device is a near field communication device for executing an application in communication with a software module in the first mobile device to read the data from the first mobile device; verifying the payment request; sending a payment response to a user of the first mobile device after the payment request is processed. In this way, quick settlement payments can be made at the point of sale using the mobile device.

Description

使用移动装置结算支付的装置和方法Apparatus and method for settlement and payment using mobile device

本专利申请是专利申请号为:201310109741.9,发明名称为:使用移动装 置结算支付的装置和方法,申请日为:2013年03月31日,的中国发明专利申 请的分案申请。This patent application is a divisional application of the Chinese invention patent application with the patent application number: 201310109741.9, the title of the invention: a device and method for settlement and payment using a mobile device, and the filing date: March 31, 2013.

【技术领域】【Technical field】

本发明通常涉及电子商务领域,特别地,本发明涉及利用一个移动装 置在近场通信范围内(near field communication range)从另一个移动装置读取电 子账单(bill)或发票(invoice)以在移动装置上结算支付(payment)的装置和方法。The present invention generally relates to the field of electronic commerce, and in particular, the present invention relates to utilizing a mobile device to read electronic bills or invoices from another mobile device within the near field communication Apparatus and method for on-device settlement of payment.

【背景技术】【Background technique】

对于许多信用卡或借记卡交易,消费者(customer)在因购买而结账时会 请求一个账单,这样开始了支付过程。出纳员(cashier)或服务工作人员将一个账 单带给所述客户核实。随后,所述消费者会拿出信用卡或借记卡给所述服务工作 人员。所述服务工作人员将所述信用卡或借记卡带至销售点(Point of Sales)柜台 以开始交易支付。随后,所述服务工作人员会拿回一个收据给所述消费者签名以 批准所述交易。这是一个漫长的过程,通常需要花费几分钟甚至更长时间,所述 服务工作人员不得不同时照顾多个支付交易。此外,在借记卡交易的情况下,当 在所述销售点上进行的交易需要使用身份证号码时,所述流程可能会更为麻烦。For many credit or debit card transactions, the customer requests a statement when checking out for the purchase, thus beginning the payment process. A cashier or service worker brings a bill to the customer for verification. The customer then presents a credit or debit card to the service worker. The service worker brings the credit or debit card to the Point of Sales counter to initiate payment for the transaction. The service worker then takes back a receipt for the consumer to sign to approve the transaction. This is a lengthy process, often taking several minutes or more, and the service worker has to attend to multiple payment transactions at the same time. Furthermore, in the case of debit card transactions, the process may be more cumbersome when the transaction at the point of sale requires the use of an identification number.

因此确实有必要简化所述支付流程。随着移动装置的发展,可以预见 的是很多客户都会随身携带一个移动装置。这样,就有机会使用移动装置在销售 点(POS)上快速的结算支付。There is therefore a real need to simplify the payment process. With the development of mobile devices, it is foreseeable that many customers will carry a mobile device with them. In this way, there is an opportunity to quickly settle payments at the point of sale (POS) using a mobile device.

【发明内容】【Content of invention】

本部分的目的在于概述本发明的实施例的一些方面以及简要介绍一些 较佳实施例。在本部分以及本申请的说明书摘要和发明名称中可能会做些简化或 省略以避免使本部分、说明书摘要和发明名称的目的模糊,而这种简化或省略不 能用于限制本发明的范围。The purpose of this section is to outline some aspects of embodiments of the invention and to briefly describe some preferred embodiments. Some simplifications or omissions may be made in this section, as well as in the abstract and titles of this application, to avoid obscuring the purpose of this section, abstract and titles, and such simplifications or omissions should not be used to limit the scope of the invention.

本发明提供使用移动装置结算支付的装置和方法,其可以使得消费者 使用移动装置进行快速、方便的结算支付。本发明涉及与移动装置相关的技术, 该移动装置可以用来结算在电子账单中的费用。根据本发明的一个方面,嵌入有 安全元件的移动装置可以生成或载入一个电子账单。将所述移动装置带给携带有NFC移动装置的消费者,包括所述电子账单和有关所述移动装置或他的所有者 的其他信息的数据以无线的方式被读入所述NFC移动装置。在用户核实了应付 金额,并批准了所述支付后,所述NFC移动装置与支付网关或支付网络进行通 讯,所述支付网络用来根据选择的支付方式处理所述支付。The invention provides a device and method for settlement and payment using a mobile device, which can enable consumers to use the mobile device to perform quick and convenient settlement and payment. The present invention relates to technologies related to mobile devices that can be used to settle charges in electronic bills. According to one aspect of the invention, a mobile device embedded with a secure element can generate or load an electronic bill. The mobile device is brought to a consumer carrying an NFC mobile device, and data including the electronic bill and other information about the mobile device or its owner is wirelessly read into the NFC mobile device. After the user verifies the amount due and approves the payment, the NFC mobile device communicates with a payment gateway or payment network for processing the payment according to the selected payment method.

根据本发明的另一个方面,所述移动装置是一个非接触卡或用于生成 所述电子账单的移动销售点装置的部分。本发明的一个实施例可以在商家和消费 者之间的支付流程会涉及多次接触的应用中提供预料不到的有益效果。这样的一 个应用就是在餐馆中的支付过程,其中在最后费用确定前,先给消费者一个账单 以供其核实,并给其增加小费的机会。所述消费者使用所述NFC装置利用在所 述销售点装置上选择的支付方法完成支付,而不需要与商家的进一步接触。According to another aspect of the invention, said mobile device is a contactless card or part of a mobile point of sale device for generating said electronic bill. An embodiment of the present invention may provide unexpected benefits in applications where multiple touches may be involved in the payment flow between the merchant and the consumer. One such application is the payment process in restaurants, where the customer is given a bill for verification and the opportunity to add a tip before the final bill is determined. The consumer completes payment using the NFC device using the payment method selected on the point-of-sale device without further contact with the merchant.

根据本发明的另一个方面,消费者使用他/她的移动装置通过一个支付 网络结算支付,其中所述支付网络可以是现有的支付基础设施(比如,转账或信 用和借记卡)。当将费用转账至商家的指定账户时,给所述商家发送一个支付响 应。According to another aspect of the invention, a consumer uses his/her mobile device to settle a payment through a payment network, where the payment network can be an existing payment infrastructure (e.g., money transfer or credit and debit cards). When the fee is transferred to the designated account of the merchant, a payment response is sent to the merchant.

根据本发明的另一个方面,消费者使用的NFC移动装置是他自己的电 子钱包。这样,在所述NFC移动装置收到并显现所述电子账单后,所述消费者 可以操作他自己的NFC移动装置来结算所述电子账单中的费用。According to another aspect of the invention, the NFC mobile device used by the consumer is his own electronic wallet. In this way, after the NFC mobile device receives and presents the electronic bill, the consumer can operate his own NFC mobile device to settle the charges in the electronic bill.

根据本发明的另一个方面,所述消费者使用的移动装置是NFC装置, 其属于移动支付生态系统中的一部分,在移动支付生态系统中的各方互相配合工 作以使得移动支付生态系统顺利运行。通过提供可信服务管理(Trusted Service Management,简称TSM)的服务器,可以远程的个人化所述移动装置的安全元 件,各种应用在经由可信服务管理器(比如TSM服务器)配置后可以被下载、更 新、管理或替换。其中的一个名为智能账单管理的模块被下载并安装于商家使用 的销售点装置或NFC装置上。所述模块用来帮助商家(他的装置)和消费者(他的 移动装置)之间的通讯及数据交换,其中消费者使用的移动装置也安装有与智能 账单支付相关的应用。According to another aspect of the present invention, the mobile device used by the consumer is an NFC device, which belongs to a part of the mobile payment ecosystem, and all parties in the mobile payment ecosystem work together to make the mobile payment ecosystem run smoothly . By providing a Trusted Service Management (TSM) server, the secure element of the mobile device can be remotely personalized, and various applications can be downloaded after being configured by a trusted service manager (such as a TSM server) , update, manage or replace. One of these modules, called Smart Bill Management, is downloaded and installed on the point-of-sale device or NFC device used by the merchant. The module is used to facilitate the communication and data exchange between the merchant (his device) and the consumer (his mobile device), where the mobile device used by the consumer is also installed with applications related to smart bill payment.

与现有技术相比,本发明的一个重要特征、优点和好处是利用NFC移 动装置读取关于电子账单的数据以结算所述电子账单的费用。本发明可以实现为 一个单独的装置、服务器、系统或系统的一部分。One of the important features, advantages and benefits of the present invention compared to the prior art is the use of NFC mobile devices to read data about electronic bills to settle charges for said electronic bills. The invention can be implemented as a single device, server, system or part of a system.

在一个优选的实施例中,本发明是一种结算支付的方法,所述方法包 括:提供在嵌入有安全元件的第一移动装置上执行的软件模块,其中所述安全元 件已经被个人化,经由所述安全元件配置所述软件模块,所述第一移动装置包括 有关于一个电子账单的数据;在第二移动装置的用户批准了针对从所述第一移动 装置无线的传输来的电子账单的支付后,接收来自所述第二移动装置的支付请 求,其中所述第二移动装置是近场通信装置,其用来执行与所述第一移动装置中 的软件模块进行通讯的一个应用以从所述第一移动装置读取所述数据;实所述支 付请求;和,在所述支付请求被处理后,发送支付响应给所述第一移动装置的用 户。In a preferred embodiment, the invention is a method of settling payments, said method comprising: providing a software module executed on a first mobile device embedded with a secure element, wherein said secure element has been personalized, configuring said software module via said secure element, said first mobile device comprising data on an electronic bill; a user at a second mobile device authorizing the electronic bill for wireless transmission from said first mobile device After payment, receiving a payment request from the second mobile device, wherein the second mobile device is a near field communication device, which is used to execute an application that communicates with a software module in the first mobile device to reading the data from the first mobile device; implementing the payment request; and, after the payment request is processed, sending a payment response to a user of the first mobile device.

作为本发明的一个优选的实施例,所述核实所述支付请求包括:当所 述第二移动装置的用户提供的结算金额少于所述电子账单上的应付金额时,发送 拒绝信息给所述第二移动装置;或,当所述第二移动装置的用户提供的结算金额 等于或大于所述电子账单上的应付金额时,继续支付流程。As a preferred embodiment of the present invention, the verification of the payment request includes: when the settlement amount provided by the user of the second mobile device is less than the payable amount on the electronic bill, sending a rejection message to the The second mobile device; or, when the settlement amount provided by the user of the second mobile device is equal to or greater than the payable amount on the electronic bill, continue the payment process.

根据本发明的另一个实施例,本发明是一种结算支付的网关,所述网关 包括:一个门户和一个服务器,所述门户提供在嵌入有安全元件的第一移动装置 上执行的软件模块,其中所述安全元件已经被个人化,经由所述安全元件配置所 述软件模块,所述第一移动装置包括有关于一个电子账单的数据。所述服务器包 括:一个处理器和与所述处理器连接的存储器,其用来存储在所述处理器上执行 的代码,以使得所述服务器能够执行如下操作:在第二移动装置的用户批准了针 对从所述第一移动装置无线的传输来的电子账单的支付后,接收来自所述第二移 动装置的支付请求,其中所述第二移动装置是近场通信装置,其用来执行与所述 第一移动装置中的软件模块进行通讯的一个应用以从所述第一移动装置读取所 述数据;核实所述支付请求;和,在所述支付请求被处理后,发送支付响应给所 述第一移动装置的用户。According to another embodiment of the present invention, the present invention is a gateway for settlement and payment, said gateway comprising: a portal and a server, said portal providing a software module executed on a first mobile device embedded with a secure element, Where said secure element has been personalized via which said software module is configured, said first mobile device comprises data relating to an electronic bill. The server includes a processor and memory coupled to the processor for storing code executed on the processor to enable the server to perform the following operations: receiving a payment request from the second mobile device after payment of the electronic bill wirelessly transmitted from the first mobile device, wherein the second mobile device is a near field communication device configured to perform a communication with an application in which the software module in the first mobile device communicates to read the data from the first mobile device; verify the payment request; and, after the payment request is processed, send a payment response to A user of the first mobile device.

与现有技术相比,本发明中消费者可以利用其NFC移动装置读取关于 电子账单的数据以结算所述电子账单的费用,从而实现了快速、方便的支付。Compared with the prior art, in the present invention, consumers can utilize their NFC mobile devices to read data about electronic bills to settle the expenses of said electronic bills, thereby realizing fast and convenient payment.

【附图说明】【Description of drawings】

接下来的具体实施方式、后面的权利要求以及附图将有助于了解本发 明的具体特征,各实施例以及优点,其中:The specific features, embodiments and advantages of the invention will be aided in the ensuing detailed description, the following claims and the accompanying drawings, in which:

图1示出了根据本发明的一个实施例的系统架构,其中支付网络表示 由金融机构提供的结算支付的服务或网络的集合;Fig. 1 shows a system architecture according to one embodiment of the present invention, wherein a payment network represents a collection of services or networks for settlement payments provided by financial institutions;

图2A示出了一个移动支付生态系统,其中移动支付生态系统中的相关 方(parties)依次被列出;Figure 2A shows a mobile payment ecosystem, wherein the relevant parties (parties) in the mobile payment ecosystem are listed in turn;

图2B示出了根据本发明的一个实施例的配置一个或多个应用的流程或 过程;Figure 2B shows a flow or process for configuring one or more applications according to one embodiment of the present invention;

图2C示出了当配置一个应用时不同方之间交互的数据流程;Figure 2C shows the data flow of interactions between different parties when configuring an application;

图2D示出了在配置一个应用过程中准备应用数据时不同方交互的数据 流程;Fig. 2D shows the data flow of different parties interacting when preparing application data in configuring an application process;

图2E示出了锁定或非使能一个已安装应用的流程或过程;FIG. 2E shows a flow or process of locking or disabling an installed application;

图2F根据本发明的一个具体实施例,示出了便携装置作为电子钱包执 行电子商务和移动商务时的架构示意图;Figure 2F shows a schematic diagram of the architecture of a portable device as an electronic wallet when performing e-commerce and mobile commerce according to a specific embodiment of the present invention;

图3A示出了有关模块相互作用,以完成前述电子钱包由授权人进行个 人化处理的结构图;Fig. 3 A has shown relevant module interaction, to complete the structural diagram that aforementioned electronic purse is carried out personalized processing by authorizer;

图3B示出了有关模块相互作用,以完成前述电子钱包由其用户进行个 人化处理的结构图;Fig. 3 B shows the interaction of relevant modules, to complete the structural diagram that the aforementioned electronic wallet is carried out by its user for personalization;

图3C根据本发明的一个具体实施例,示出了个人化电子钱包的流程或 过程图;Figure 3C shows a flow or process diagram of a personalized electronic wallet according to a specific embodiment of the present invention;

图4A和图4B根据本发明的一个具体实施例,一同示出了给电子钱包 筹资、注资、载入或充值时的流程或过程;Figure 4A and Figure 4B, according to a specific embodiment of the present invention, together show the flow or process when raising funds, injecting funds, loading or recharging the electronic wallet;

图4C示出了有关模块相互作用,以完成图4A和图4B中所示过程的 结构示意图;Fig. 4C shows the interaction of relevant modules to complete the structural representation of the process shown in Fig. 4A and Fig. 4B;

图5A根据本发明的一个具体实施例,示出了第一种便携设备的架构示 意图,使之能够在蜂窝通信网络(比如,3G、LTE或GPRS网络)上执行电子商 务和移动商务的各种功能;Fig. 5A shows a schematic diagram of the structure of the first portable device according to a specific embodiment of the present invention, enabling it to perform various e-commerce and mobile commerce on a cellular communication network (for example, 3G, LTE or GPRS network) Function;

图5B根据本发明的另一个具体实施例,示出了第二种便携设备的架构 示意图,使之能够在有线和/或无线数据网络(例如国际互联网)上执行电子商务和 移动商务的各种功能;Fig. 5B shows a schematic diagram of the structure of the second portable device according to another specific embodiment of the present invention, enabling it to perform various types of e-commerce and mobile commerce on wired and/or wireless data networks (such as the Internet) Function;

图5C是一幅流程图,根据本发明的一个具体实施例,说明了使图5A 中的便携设备能够运行一个或多个服务提供商提供的服务应用的过程示意图;FIG. 5C is a flowchart illustrating a schematic diagram of a process for enabling the portable device in FIG. 5A to run service applications provided by one or more service providers according to a specific embodiment of the present invention;

图6A根据本发明的一个具体实施例,展示了一个架构示意图,其中的 便携设备能够作为移动销售点执行电子商务和移动商务;Figure 6A shows a schematic diagram of an architecture according to a specific embodiment of the present invention, wherein the portable device can be used as a mobile point of sale to perform e-commerce and mobile commerce;

图6B根据本发明的一个具体实施例,展示了一个架构示意图,其中的 便携设备能够作为移动销售点在网络上执行交易上传操作;Fig. 6B shows a schematic diagram of an architecture according to a specific embodiment of the present invention, wherein the portable device can perform a transaction upload operation on the network as a mobile point of sale;

图6C是一幅流程图,根据本发明的一个具体实施例,说明了使用用作 移动销售点的便携设备和支持电子代币的单功能卡装置,执行移动商务的过程示 意图;Figure 6C is a flow diagram illustrating the process of performing mobile commerce using a portable device used as a mobile point of sale and a single function card device supporting electronic tokens, according to an embodiment of the present invention;

图6D是一幅流程图,说明了使用用作移动销售点的便携设备以及支持 电子代币的多功能卡装置,执行移动商务的过程示意图;Figure 6D is a flow chart illustrating the process of performing mobile commerce using a portable device used as a mobile point of sale and a multi-function card device supporting electronic tokens;

图7描述了便携设备用于电子票务应用时的结构示意图;Fig. 7 has described the structure schematic diagram when portable device is used for electronic ticketing application;

图8A示出了由一个业务运作或安排的TSM所涉及的多方的示意图;Figure 8A shows a schematic diagram of the parties involved in a TSM operated or arranged by a business;

图8B示出了在一个实施例中的TSM的各方之间的有关操作过程;Figure 8B shows the relevant operational procedures between the parties of the TSM in one embodiment;

图8C示出了一个示例的TSM中在各方之间建立互相同意协议的工作 流程;Figure 8C shows the workflow for establishing a mutual agreement between parties in an example TSM;

图8D示出了SE发行者和TSM之间ISD映射(mapping)的数据流 程;Figure 8D shows the data flow of ISD mapping (mapping) between SE issuer and TSM;

图8E示出了在TSM、SE发行者和服务提供者之间的相应数据流程;Figure 8E shows the corresponding data flow between TSM, SE issuer and service provider;

图8F示出了由SE发行者批准一个应用的数据流程;Figure 8F shows the data flow for approving an application by the SE issuer;

图8G示出了替换安全元件的流程;以及Figure 8G shows the process of replacing a secure element; and

图9示出了个人化的安全元件的一个账户的显示屏的快照示例。Fig. 9 shows an example of a snapshot of a display screen of an account of a personalized secure element.

图10示出了根据本发明的结算支付的流程或过程图,其中在软件中或 在软件和硬件的结合中实现所述过程;Figure 10 shows a flow or process diagram of settlement payment according to the present invention, wherein the process is implemented in software or in a combination of software and hardware;

【具体实施方式】【Detailed ways】

本发明的详细描述主要通过程序、步骤、逻辑块、过程或其他象征性 的描述来直接或间接地模拟本发明技术方案的运作。为透彻的理解本发明,在接 下来的描述中陈述了很多特定细节。而在没有这些特定细节时,本发明则可能仍 可实现。所属领域内的技术人员使用此处的这些描述和陈述向所属领域内的其他 技术人员有效的介绍他们的工作本质。换句话说,为避免混淆本发明的目的,由 于熟知的方法和程序已经容易理解,因此它们并未被详细描述。The detailed description of the present invention directly or indirectly simulates the operation of the technical solution of the present invention mainly through procedures, steps, logic blocks, processes or other symbolic descriptions. In the ensuing description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. Yet the invention may be practiced without these specific details. These descriptions and representations herein are used by those skilled in the art to effectively convey the substance of their work to others skilled in the art. In other words, for the purpose of avoiding obscuring the present invention, well-known methods and procedures have not been described in detail since they have been readily understood.

此处所称的“一个实施例”或“实施例”是指可包含于本发明至少一个实现 方式中的特定特征、结构或特性。在本说明书中不同地方出现的“在一个实施例 中”并非均指同一个实施例,也不是单独的或选择性的与其他实施例互相排斥的 实施例。此外,表示一个或多个实施例的方法、流程图或功能框图中的模块顺序 并非固定的指代任何特定顺序,也不构成对本发明的限制。本文中的密钥集是指 一组密钥。本发明中“卡”也可以称之为卡片。本文中的支付也有付款、需要付 出的款项等含义。Reference herein to "one embodiment" or "an embodiment" refers to a particular feature, structure or characteristic that can be included in at least one implementation of the present invention. "In one embodiment" appearing in different places in this specification does not all refer to the same embodiment, nor is it a separate or selective embodiment that is mutually exclusive with other embodiments. Furthermore, the order of blocks in a method, flowchart, or functional block diagram representing one or more embodiments does not necessarily refer to any particular order nor constitute a limitation on the invention. A keyset in this context refers to a set of keys. "Card" in the present invention can also be referred to as a card. Payment in this article also has meanings such as payment and money that needs to be paid.

下面参考图1-图10来介绍本发明的各个实施例。然而,所属领域内的 普通技术人员容易理解的是这里根据这些附图列出的细节描述仅仅是解释性的, 本发明并不仅限于这些实施例。Various embodiments of the present invention are described below with reference to FIGS. 1-10 . However, those of ordinary skill in the art will readily appreciate that the detailed descriptions set forth herein with reference to these figures are for explanatory purposes only, and the present invention is not limited to these embodiments.

当具有近场通信(Near Field Communication,简称NFC)功能的移 动电话用于诸如支付服务、交通票务、信用服务、物理访问控制和其他令人兴奋 的新服务时,NFC显示出重大的商机。为了支持这种快速演变的商务环境,各 种NFC功能的移动电话或装置(或称为NFC装置)正在发展以支持日常生活中的 各种应用。NFC presents a significant business opportunity when mobile phones with Near Field Communication (NFC) capabilities are used for services such as payment services, transportation ticketing, credit services, physical access control and other exciting new services. In order to support such a rapidly evolving business environment, various NFC-enabled mobile phones or devices (or called NFC devices) are being developed to support various applications in daily life.

图1示出了根据本发明的一个实施例的一个系统架构100。网络102 表示由金融机构提供的结算支付的服务或网络的集合。换句话说,它是一个提供 电子转账或结算支付服务的系统。传统支付中采用的现金替代是可兑现的文件, 比如汇票(draft)(例如支票(check))和跟单信用证(documentary credit),比如信用 证。随着计算机和电子通讯的出现,很多可选择的电子支付系统开始出现,这包 括借记卡、信用卡、电子资金转账(electronic funds transfer)、直接信用(direct credits)、直接借记(direct debits)、网上银行和电子商务支付(payment)系统。 支付系统用来替代在国内或国际交易时提出现金,其包括由银行或其他金融机构 提供的主要服务。FIG. 1 shows a system architecture 100 according to an embodiment of the present invention. Network 102 represents a collection of services or networks provided by financial institutions to settle payments. In other words, it is a system that provides electronic transfer or settlement payment services. Alternatives to cash used in traditional payments are cashable documents such as drafts (eg checks) and documentary credits such as letters of credit. With the advent of computers and electronic communications, many alternative electronic payment systems have emerged, including debit cards, credit cards, electronic funds transfer, direct credits, direct debits , online banking and e-commerce payment (payment) system. A payment system used as an alternative to presenting cash in domestic or international transactions, including the primary services provided by banks or other financial institutions.

所述支付系统或网络102可以是物理的或电子的,其具有它自己的规 程和协议。已经全球使用的支付系统的一个例子是Visa或Master卡、真正的全 球信用卡(trueglobal credit card)和自动柜员机(automated teller machine)网络。 商家和消费者都使用支付系统来结算交易。The payment system or network 102 may be physical or electronic, with its own procedures and protocols. An example of a payment system that has been used globally is the Visa or Master card, a true global credit card and automated teller machine network. Both merchants and consumers use payment systems to settle transactions.

根据一个实施例,智能账单支付网关104包括服务器或服务器的集合, 简称网关或服务器104,它用来提供一个应用(或称程序),所述应用可以由用户 安装于其移动装置中以享受本发明带来的好处。在这里,所述应用可以被命名为 智能账单支付(smart billpayment)程序,所述应用被发布至互联网上,可以从指 定地方(比如一个服务器的入口或门户(portal))下载。用户使用移动装置下载所述 应用,并将其安装在所述移动装置中。可以自动的或手动的执行所述应用以批准 针对显示的电子账单的支付,其中根据所述移动装置的安全元件与另一个移动装 置的交互数据产生所述电子账单。另有特别说明的除外,“计算装置”、“移动装置”、 “手持装置”、“移动电话”、“智能电话”、“手持电话”或类似用语将在本文中可互 相替代的使用,然而所属领域内的普通技术人员能够理解上述词汇也可以指其他 装置,比如可穿戴手表、平板电脑、笔记本电脑、具有NFC能力的其他便携式 装置。According to one embodiment, smart bill payment gateway 104 includes a server or a collection of servers, referred to as gateway or server 104, which is used to provide an application (or program) that can be installed by users in their mobile devices to enjoy this service. The benefits of the invention. Here, the application can be named as a smart bill payment program, and the application is published on the Internet and can be downloaded from a designated place (such as a server entrance or portal). The user downloads the application using a mobile device and installs it in the mobile device. The application may be executed automatically or manually to approve payment of a displayed electronic bill generated from interaction data of the mobile device's secure element with another mobile device. Unless otherwise specified, "computing device", "mobile device", "handheld device", "mobile phone", "smart phone", "handheld phone" or similar terms will be used interchangeably herein, however Those of ordinary skill in the art can understand that the above words can also refer to other devices, such as wearable watches, tablet computers, notebook computers, and other portable devices with NFC capabilities.

附图标记106是指销售点(point of sale,简称POS)装置。基于实现, 所述POS装置106可以是单独装置(single device)或具有一个或多个便携式装 置(比如非接触卡)的静止装置。所述装置106的一个目的是产生电子账单 (electronic bill or invoice),该电子账单会被装载至一个便携式装置108(比如非 接触卡或NFC装置),该便携式装置108可以用来与消费者的NFC装置接触以 结算所述电子账单。Reference numeral 106 refers to a point of sale (POS for short) device. Depending on implementation, the POS device 106 may be a single device or a stationary device with one or more portable devices such as contactless cards. One purpose of the device 106 is to generate electronic bills (electronic bills or invoices), which are loaded onto a portable device 108 (such as a contactless card or NFC device) that can be used to communicate with a customer's The NFC device is touched to settle the electronic bill.

根据一个实施例,所述POS装置是一个嵌入有安全元件(secure element)的单独装置。所述单独装置可以是NFC装置,所述NFC装置用来输入 信息以生成一个电子账单。比如,消费者在餐馆中点了几盘菜,出纳员在所述 NFC装置中输入各个菜的单价以生成一个电子账单,该电子账单显示了包括税 费的总价,有时还可以包括一些小贴士。出纳员或服务员将所述NFC装置拿给 所述消费者以批准和支付。根据另一个实施例,所述POS装置包括对应图1中 的106的静止装置和对应图1中的108的一个或多个非接触卡(contactlesscard)。所述出纳员使用所述静止装置输入收费信息以生成电子账单。将所述电 子账单装载入所述非接触卡,随后将装载有所述电子账单的非接触卡带给所述消 费者以批准和支付。在下文的描述中,除非特别说明,POS装置可以指任何一 种例子,下面假设其是一个单独装置进行介绍。这里给出的细节描述,使得所属 领域内的普通技术人员能够充分理解在实现本发明的一个实施例时,使用哪种 POS装置。According to one embodiment, said POS device is a single device embedded with a secure element. The separate device may be an NFC device used to enter information to generate an electronic bill. For example, a consumer orders several dishes in a restaurant, and the cashier inputs the unit price of each dish in the NFC device to generate an electronic bill, which shows the total price including taxes and fees, and sometimes can also include some minor items. Tips. A cashier or waiter presents the NFC device to the customer for approval and payment. According to another embodiment, the POS device includes a stationary device corresponding to 106 in FIG. 1 and one or more contactless cards corresponding to 108 in FIG. 1 . The teller uses the stationary device to enter billing information to generate an electronic bill. The electronic bill is loaded onto the contactless card, and the contactless card loaded with the electronic bill is then brought to the customer for approval and payment. In the following description, unless otherwise specified, the POS device can refer to any example, and the following assumes that it is a single device for introduction. The detailed description given here enables those of ordinary skill in the art to fully understand which POS device to use when implementing an embodiment of the present invention.

如下面进一步描述的那样,所述POS装置嵌入有一个安全元件。所述 安全元件可以提供在两个装置间支持安全数据通讯所属需要的安全和保密性,以 帮助服务器和移动装置之间的通讯。总的来说,安全元件是一个防篡改平台(比 如单片安全微控制器),其能够根据由一批精心确定的可信任当专家(well-identified trusted authorities)提出的规则和安全要求安全的管理各种应用 和他们的机密的和加密的数据(比如密钥管理)。安全元件的常见形式包括:嵌入 安全元件的通用集成电路卡(Universal IntegratedCircuit Card,UICC)和 mircroSD卡(microSD card)。所述UICC和microSD卡都是移除的。在一个实 施例中,软件模块(soft module)被设置来作为一个安全元件,通过重写其内的一 些或全部组件来可以更新所述安全元件。不管什么形式,每个形式都可以针对不 同商业实现,满足不同市场需求。对于使用的安全元件,必须要将其个人化。个 人化一个安全元件的细节描述请参看审查中的申请号为13/749,696的美国专利 申请。As described further below, the POS device has a secure element embedded therein. The secure element can facilitate communication between the server and the mobile device by providing the security and privacy required to support secure data communication between the two devices. In general, a secure element is a tamper-resistant platform (such as a single-chip secure microcontroller) that is able to be secure according to rules and security requirements set by a carefully identified group of trusted experts (well-identified trusted authorities). Manage various applications and their confidential and encrypted data (such as key management). Common forms of secure elements include: universal integrated circuit cards (Universal Integrated Circuit Card, UICC) and microSD cards (microSD cards) embedded with secure elements. Both the UICC and the microSD card are removed. In one embodiment, a software module (soft module) is configured as a secure element that can be updated by rewriting some or all components within it. Regardless of the form, each form can be implemented for different businesses and meet different market needs. For a secure element to be used, it must be personalized. Details of personalizing a secure element are described in co-pending U.S. patent application Ser. No. 13/749,696.

根据一个实施例,软件模块(比如一个JAVA程序applet)在这里是指智 能账单支付程序(smart bill payment applet),其对应上文描述的一个应用,将其 装载入所述POS装置106中,通过所述POS装置中的安全元件配置所述智能 账单支付程序。所述软件模块可以由运营所述网关或服务器104的服务提供者 发布,通过无线或有线网络被下载至一个NFC装置。一旦下载,所述软件模块 必须经由所述服务提供者才能被配置,随后可以与所述服务器104进行安全数 据的交互。审查中的申请号为13/749,96的美国专利申请描述了通过个人化的安 全元件配置一个应用的细节,具体请参考此专利申请。According to one embodiment, a software module (such as a JAVA program applet) refers to a smart bill payment applet (smart bill payment applet), which corresponds to an application described above, and is loaded into the POS device 106, The smart bill payment program is configured through a secure element in the POS device. The software modules may be distributed by a service provider operating the gateway or server 104 and downloaded to an NFC device via a wireless or wired network. Once downloaded, the software modules must be configured via the service provider, and then secure data exchanges with the server 104 are possible. Pending U.S. Patent Application No. 13/749,96 describes the details of configuring an application through a personalized secure element, to which reference is made.

图10示出了根据本发明的一个实施例的结算支付的流程或过程120。 所述过程120可以实现为软件或软件和硬件的结合。没有任何隐含的限制,结 合图1能够更好的理解所述过程120。FIG. 10 illustrates a flow or process 120 of settling payments according to one embodiment of the present invention. The process 120 can be implemented as software or a combination of software and hardware. Without any implied limitation, the process 120 can be better understood in conjunction with FIG. 1 .

为了方便所述过程120的描述,假设一个消费者(customer)在餐馆中 进餐,所述餐馆已经安装了包括一个静止装置的POS装置,出纳员在所述静止 装置中管理/输入各种收费数据以为所述消费者产生一个电子账单。所述POS装 置还包括与一个或多个无接触卡交换数据的读写器。换句话说,所述出纳员在所 述静止装置上输入必要的信息后可以产生一个电子账单,并可以将所述电子账单 装载入一个非接触性卡。In order to facilitate the description of the process 120, assume that a consumer (customer) eats in a restaurant, and the restaurant has installed a POS device including a static device in which the cashier manages/inputs various charging data An electronic bill is generated for the customer. The POS device also includes a reader/writer for exchanging data with one or more contactless cards. In other words, the teller can generate an electronic bill after entering the necessary information on the stationary device, and can load the electronic bill into a contactless card.

在进餐结尾时,服务生让一个出纳员在对应图1中的106的POS机上 准备好一个电子账单。所述POS机产生一个电子账单,并在操作122中将所述 电子账单传送至非接触卡,其中所述非接触卡嵌入有个人化安全元件和经过所述 个人化的安全元件配置的智能账单支付程序或应用。在操作124中,所述服务 生将所述非接触卡带给所述消费者。在操作126中,所述消费者使用他的移动 装置读取所述非接触卡。如上描述,假设所述消费者的移动装置也已经安装有相 应的智能账单支付应用,所述消费者的移动装置在近距离内检测到所述非接触卡 时,会执行所述智能账单支付应用,并在操作128中从所述非接触卡中读取关 于所述电子账单的数据,随后在所述移动装置的显示屏上显示所述电子账单以供 所述消费者核实。与通常在屏幕上看到的传统账单不同,在所述非接触性卡中的 并被传输至所述移动装置中的所述电子账单包括与所述餐馆或所述商家相关的 注册用户的安全信息。所述安全信息包括但不限于所述餐馆的银行信息和账户、 在所述非接触卡或所述POS机中的安全元件的标识符。在一个实施例中,所述 数据还包括地址或链接(比如移动电话号码),通过它在所述支付结算完成后所述 商家得到一个通知(比如支付响应)。在实现时,所述通知可以以短信或电子邮件 的方式发送至指定移动装置。At the end of the meal, the waiter asks a cashier to prepare an electronic bill on the POS machine corresponding to 106 in Figure 1 . The POS machine generates an electronic bill, and transmits the electronic bill to a contactless card in operation 122, wherein the contactless card is embedded with a personalized security element and a smart bill configured with the personalized security element payment program or application. In operation 124, the waiter brings the contactless card to the customer. In operation 126, the customer reads the contactless card using his mobile device. As described above, assuming that the consumer’s mobile device has already installed the corresponding smart bill payment application, when the consumer’s mobile device detects the contactless card within a short distance, it will execute the smart bill payment application , and read data about the electronic bill from the contactless card in operation 128, and then display the electronic bill on the display screen of the mobile device for verification by the consumer. Unlike traditional bills typically seen on a screen, the electronic bill in the contactless card and transmitted to the mobile device includes the registered user's secure information. The secure information includes, but is not limited to, the restaurant's bank information and account, an identifier on the contactless card or a secure element in the POS machine. In one embodiment, said data also includes an address or link (such as a mobile phone number) through which said merchant is notified (such as a payment response) after said payment settlement has been completed. When implemented, the notification can be sent to the designated mobile device in the form of a short message or email.

在看到显示屏上显示的电子账单后,所述消费者可以选择一个方法以 结算所述电子账单。基于实现,所述消费者可以选择通过已经安装于所述移动装 置上的电子钱包应用来结算所述电子账单,也可以选择通过现金、传统的信用或 借记卡、电子转账/支付或其他方式来结算所述电子账单。通过电子钱包的结算 方式将在下文中详细描述。After seeing the electronic bill displayed on the display screen, the consumer can select a method to settle the electronic bill. Based on implementation, the consumer can choose to settle the electronic bill through the electronic wallet application already installed on the mobile device, and can also choose to settle the electronic bill by cash, traditional credit or debit card, electronic transfer/payment or other means to settle the electronic bill. The method of settlement through e-wallets will be described in detail below.

图10示出了使用所述电子支付的一个实施例,所述电子支付是如图 1所示的支付网关102提供的转账服务的一种。在操作130中,所述消费者已 经选择了安装的智能账单支付应用提供的电子支付,并输入需要为所述电子账单 支付的金额。需要知道的是,所述消费者可以输入较所述电子账单中应付金额更 多的金额以作为给所述餐馆提供的服务的小费。一旦所述消费者输入总的金额, 在操作132中,消费者的移动装置中的智能账单支付应用发送一个支付请求给 所述服务器104以进行处理,所述支付请求包括关于所述电子账单的数据。如 下文进一步所描述的,在一个实施例中,在所述移动装置和所述网关或服务器104之间的数据交换是在安全通道中进行的,所述安全通道是根据关于所述电子 账单的数据中的安全信息建立的。Fig. 10 shows an embodiment of using the electronic payment, which is a kind of transfer service provided by the payment gateway 102 shown in Fig. 1 . In operation 130, the consumer has selected the electronic payment provided by the installed smart bill payment application, and input the amount that needs to be paid for the electronic bill. It should be appreciated that the customer may enter an amount greater than the amount due on the electronic bill as a tip for services provided by the restaurant. Once the customer enters the total amount, in operation 132 the smart bill payment application on the customer's mobile device sends a payment request to the server 104 for processing, the payment request including information on the electronic bill data. As described further below, in one embodiment, data exchange between the mobile device and the gateway or server 104 takes place over a secure channel according to The security information in the data is established.

在收到所述支付请求后,在操作134中,所述服务器104用来核实由 所述消费者输入的金额是否能够覆盖所述电子账单中的费用。如果所述金额小于 在所述电子账单中所需支付的费用时,比如,所述消费者可能输入了一个错误数 额或在打字时输入错误,所述服务器104将会退回所述支付请求给所述移动装 置。在接收到拒绝信息后,在所述移动装置中的智能账单支付应用将会显示所述 拒绝信息以提示给所述消费者,这样所述消费者可以采取一个适当的步骤以继续 所述支付流程。如果所述金额等于或大于所述电子账单中应付的金额(比如所述 消费者希望在所述费用外另给一部分小费),所述服务器104将在操作136中继 续所述支付请求。After receiving the payment request, in operation 134, the server 104 is used to verify whether the amount input by the customer can cover the charge in the electronic bill. If the amount is less than the amount required to be paid in the electronic bill, for example, the customer may have entered an incorrect amount or made an error when typing, the server 104 will return the payment request to the mobile device. After receiving the rejection message, the smart bill payment application in the mobile device will display the rejection message as a reminder to the consumer so that the consumer can take an appropriate step to continue the payment process . If the amount is equal to or greater than the amount due on the electronic bill (e.g., the customer wishes to tip a portion of the charge), the server 104 will proceed with the payment request in operation 136.

如图10所示,所述服务器104接收到由所述消费者批准的支付请求后, 继续联合所述支付网络102处理所述支付请求。在一个实施例中,所述服务器 104提供类似在美国和其他国家常用的贝宝(Paypal)或主要在中国使用的支付宝 (Alipay)的支付服务。在操作138中,一旦所述交易完成或失败,所述服务器104 会发送一个通知给所述商家(比如餐馆)。As shown in FIG. 10 , after receiving the payment request approved by the consumer, the server 104 continues to cooperate with the payment network 102 to process the payment request. In one embodiment, the server 104 provides a payment service similar to Paypal commonly used in the United States and other countries or Alipay mainly used in China. In operation 138, the server 104 sends a notification to the merchant (eg, restaurant) upon completion or failure of the transaction.

如上指出的,在一个实施例中,图1中的所述NFC装置110被设置来 用作电子钱包,其可以用来直接结算显示在其显示屏上的费用。电子钱包在移动 支付生态系统中如何工作将在下文中详细描述。As noted above, in one embodiment, the NFC device 110 in Figure 1 is configured to function as an electronic wallet, which can be used to directly settle charges displayed on its display screen. How e-wallets work in the mobile payment ecosystem will be described in detail below.

现在参考图2A所示,其示出了一个移动生态系统200,其中参与入所 述移动生态系统中的相关方依次列出。在一个实施例中,允许一个NFC装置从 相应指定服务器202(比如应用管理提供者)中下载或安装一个或多个应用,其中 这些应用是由应用开发者204最初开发出来,并由服务提供者210、应用管理提 供者202或其他相关方发布。假设有安全元件提供者208提供的安全元件206 已经经由TSM或可信赖第三方(比如,金融机构212)个人化。Referring now to FIG. 2A , which shows a mobile ecosystem 200, the parties involved in the mobile ecosystem are listed in order. In one embodiment, an NFC device is allowed to download or install one or more applications from a corresponding specified server 202 (such as an application management provider) originally developed by an application developer 204 and provided by a service provider 210. The application management provider 202 or other relevant parties publish. It is assumed that the secure element 206 provided by the secure element provider 208 has been personalized via the TSM or a trusted third party (eg, the financial institution 212 ).

一旦在所述NFC装置上安装上一个应用(比如,在所述NFC装置110 中的智能账单支付应用或在图1中的POS装置106中的智能账单支付应用), 下一步将是通过所述安全元件配置所述应用。应用的配置过程可以以几种方式开 始。其中的一种方式是一个安全元件拥有者在移动装置上从TSM入口中选择一 个应用,并开始配置过程。另一种方式是所述安全元件拥有者在移动装置上接收 来自代表应用提供者的TSM的应用配置通知。Once an application is installed on the NFC device (such as the smart bill payment application in the NFC device 110 or the smart bill payment application in the POS device 106 in FIG. The secure element configures the application. The configuration process for an application can begin in several ways. One way of doing this is for an SE owner to select an application from the TSM portal on the mobile device and start the provisioning process. Another way is for the secure element owner to receive an application configuration notification on the mobile device from a TSM on behalf of the application provider.

所述TSM或应用提供者可以在TSM入口或门户上发布他们的应用, 以供下载到具有安全元件和/或签订用户请求(比如SE拥有者)的移动装置上。在 一个实施例中,所述TSM为多个SE发行者提供云服务。这样,来自各个服务 提供者的许多应用可以从TSM入口处获取。然而,当登入所述TSM入口时, 安全元件拥有者只可以看那些经过他的安全元件提供者认证的应用。基于安全元 件和服务提供者之间的协议,使用安全元件的ISD密钥集或服务提供者的指定 的SSD密钥集可以实现应用的下载/安装/个人化。如果在所述安全元件中并未安 装有SSD密钥集,则可以在一个应用安装的过程中安装它。The TSM or application provider can publish their applications on the TSM portal or portal for download to mobile devices with secure elements and/or subscription user requests (such as SE owners). In one embodiment, the TSM provides cloud services for multiple SE issuers. In this way, many applications from various service providers can be obtained from the TSM portal. However, when logged into the TSM portal, the SE owner can only view those applications that are authenticated by his SE provider. Based on the agreement between the secure element and the service provider, the download/installation/personalization of the application can be achieved using the secure element's ISD key set or the service provider's designated SSD key set. If the SSD key set is not installed in the secure element, it can be installed during an application installation.

所述TSM知晓安全元件针对各个SSD的存储状态。基于SSD的存储 分配策略和所述安全元件的存储状态,对于在应用商店中的针对各种SSD的可 用应用可以标记为不同的指示,比如“可以安装”或“安装存储不足”。这样可以防 止用户不必要的失败。The TSM knows the storage status of the secure element for each SSD. Based on the storage allocation policy of the SSD and the storage status of the secure element, the available applications for various SSDs in the application store can be marked with different indications, such as "can be installed" or "insufficient storage for installation". This prevents unnecessary failures for users.

一旦在一个NFC装置上安装一个应用,所述应用自己启动配置过程, 或TSM服务器通过蜂窝网络或无线数据网络给所述NFC装置发送配置通知。 根据所述NFC装置的类型,有很多种发送消息(PUSH message,或称为推广消 息)的方式以使得所述NFC装置开始所述配置过程。发送方法的一个例子包括短 信发送或安卓谷歌发送。一旦用户收到所述通知,所述配置过程开始。在认为合 适的时候,将详细描述配置过程。Once an application is installed on an NFC device, the application starts the configuration process by itself, or the TSM server sends a configuration notification to the NFC device via a cellular network or a wireless data network. According to the type of the NFC device, there are many ways to send a message (PUSH message, or push message) to make the NFC device start the configuration process. An example of a sending method includes SMS sending or Android Google sending. Once the user receives the notification, the configuration process begins. The configuration process will be described in detail as deemed appropriate.

作为所述应用配置的一个部分,TSM服务器执行一些保护性机制。一 个是防止安全元件意外锁定。另一个是如果在安全元件中没有足够存储空间时阻 止应用的下载。在一些实例中,在安全通道建立期间如果有太多的相互认证失败, 则安全元件可能永久性锁定自己。为了防止所述安全元件意外锁定,当在两方 (entities)之间建立安全通道时,所述TSM持续跟踪安全元件和TSM之间的认证 失败的数目。在一个实施例中,如果达到预定极限,所述TSM将拒绝任何进一 步的请求。如果在服务中心手动的重启所述安全元件,所述TSM可以继续处理 SE请求。As part of the application configuration, the TSM server implements some protective mechanisms. One is to prevent accidental locking of the safety element. Another is to prevent the download of the application if there is not enough storage space in the secure element. In some instances, the secure element may lock itself permanently if there are too many mutual authentication failures during secure channel establishment. To prevent accidental locking of the secure element, the TSM keeps track of the number of authentication failures between the secure element and the TSM when a secure channel is established between the two entities. In one embodiment, if a predetermined limit is reached, the TSM will deny any further requests. If the secure element is manually restarted at the service center, the TSM can continue to process SE requests.

所述TSM也持续跟踪每个安全元件的存储使用。所述TSM基于由所 述SE发行者分配给每个服务提供者的存储分配决定一个应用是否可以安装于一 个安全元件上。根据一个实施例,有三种类型的策略:The TSM also keeps track of the storage usage of each secure element. The TSM determines whether an application can be installed on a secure element based on the storage allocation assigned to each service provider by the SE issuer. According to one embodiment, there are three types of policies:

●预分配一个固定存储空间,这是保证空间;●Pre-allocate a fixed storage space, which is guaranteed space;

●预分配一个最小存储空间,这是保证最小空间(暗示所述容量在一些 情况下可以被扩展);● pre-allocate a minimum storage space, which is the guaranteed minimum space (implying that the capacity can be expanded in some cases);

●最大努力(比如,合同规定,需要安全元件发行者使用他最大的努力 执行他的责任,以使得用户得到的利益最大化)。• Best efforts (eg contractually stipulates that the secure element issuer is required to use his best efforts to perform his obligations in order to maximize the benefit to the user).

在一个实施例中,所述安全元件发行者使用所述TSM网页入口完成这 项工作。In one embodiment, the secure element issuer does this using the TSM web portal.

1.对于一批安全元件,所述安全元件发行者可以为服务提供者预分配一个 存储策略以通过TSM网页入口安装它的应用;1. For a batch of secure elements, the secure element issuer can pre-allocate a storage policy for the service provider to install its application through the TSM webpage portal;

2.当移动装置请求安装一个应用时,TSM服务器认证相应的服务提供者 的空间是否符合它的存储策略;如果不符合,则拒绝这个请求;否则,所述TSM 服务器将处理所述配置请求;2. When the mobile device requests to install an application, whether the space of TSM server authentication corresponding service provider meets its storage policy; If not, then reject this request; Otherwise, described TSM server will process described configuration request;

3.如果配置成功,所述TSM将积累这个应用服务的存储大小。3. If the configuration is successful, the TSM will accumulate the storage size of this application service.

当一个移动用户订阅一个移动应用(假如它已经安装),在所述应用使用 之前该应用需要经由移动装置上的安全元件配置。在一个实施例中,所述配置过 程包括四个主要阶段;When a mobile user subscribes to a mobile application (if it is already installed), the application needs to be configured via the secure element on the mobile device before said application can be used. In one embodiment, the configuration process includes four main phases;

●如果需要,在所述安全元件上创建补充安全域(SSD);- Create a Supplementary Security Domain (SSD) on said secure element, if required;

●在所述安全元件上下载并安装一个应用;- downloading and installing an application on said secure element;

●在所述安全元件个人化所述应用;personalize said application in said secure element;

●下载UI(用户界面)组件至移动装置上。• Download UI (User Interface) components onto the mobile device.

图2B示出了根据本发明的一个实施例的配置一个或多个应用的流程或 过程220。所述过程220可以实现为软件或软件和硬件的组合。在一个实施例中, 所述应用配置过程220需要进入在移动装置上的配置管理器(比如代理)以与其内 的安全元件交互。Figure 2B illustrates a flow or process 220 for configuring one or more applications, according to one embodiment of the invention. The process 220 can be implemented as software or a combination of software and hardware. In one embodiment, the application configuration process 220 requires access to a configuration manager (such as an agent) on the mobile device to interact with the secure element within it.

如图2B所示,在操作222处,所述应用配置过程220可以是自动或 手动开始。比如,假设它还未被配置,用户可以通过选择一个已安装应用去订购 相关服务以启动所述配置过程,或在激活所述已安装应用时启动所述配置过程。 在另一个实施例中,应用提供者发送一个信息(比如短信)至所述移动电话以开始 所述配置过程。As shown in Figure 2B, at operation 222, the application configuration process 220 may be started automatically or manually. For example, assuming it has not been configured, the user can initiate the configuration process by selecting an installed application to subscribe to related services, or when activating the installed application. In another embodiment, the application provider sends a message, such as a text message, to said mobile phone to start said configuration process.

在任何情况下,所述程序220进入操作224,从移动装置的安全元件 中提取所述装置信息(比如,CPLC)后,与专用服务器(比如TSM服务器或由应 用发行者运营的服务器)建立通信。在操作226处,所述装置信息与识别应用的 标识符一起被传送至所述服务器。在操作228,所述服务器首先基于所述装置信 息识别所述安全元件的发行者,以在230操作中确定是所述安全元件是否已经 被个人化。如果所述安全元件还未被个人化,所述过程220进入操作232,以个 人化所述安全元件,所述操作232的一个实施例可以根据图10中的过程110来 实现。In any case, the program 220 proceeds to operation 224 to establish communication with a dedicated server (such as a TSM server or a server operated by the application publisher) after extracting the device information (such as CPLC) from the secure element of the mobile device. . At operation 226, the device information is transmitted to the server along with an identifier identifying the application. In operation 228, the server first identifies the issuer of the secure element based on the device information to determine in operation 230 whether the secure element has been personalized. If the secure element has not been personalized, the process 220 proceeds to operation 232 to personalize the secure element, one embodiment of which may be implemented in accordance with process 110 of FIG. 10 .

现假设移动装置中的安全元件已经被个人化。所述过程220进入操作 234,在这里使用派生ISD与所述安全元件建立安全通道。根据谁为ISD提供硬 件安全模块HSM(比如TSM或SE发行者),所述服务器将联系所述硬件安全模 块去为所述安全元件计算派生ISD,并使用该派生ISD与所述安全元件建立安全 通道。随后,在操作中236,所述服务器检查是否有与该应用相关的一个SSD。 如果该应用没有一个对应的SSD,所述服务器将检查数据库看它是否已经安装 于所述安全元件上。如果需要SSD安装,所述流程220进入240去安装所述SSD。在一个实施例中,提醒所述用户所述SSD(密钥)的安装。在操作238,假 设用户拒绝安装所述SSD,所述过程220停止并进入操作222,重新开始所述 配置过程220。Now assume that the secure element in the mobile device has been personalized. The process 220 proceeds to operation 234, where a secure channel is established with the secure element using the derived ISD. Depending on who provides the hardware security module HSM for the ISD (such as TSM or SE issuer), the server will contact the hardware security module to calculate a derived ISD for the secure element, and use this derived ISD to establish a secure aisle. Then, in operation 236, the server checks to see if there is an SSD associated with the application. If the application does not have a corresponding SSD, the server will check the database to see if it is already installed on the secure element. If SSD installation is required, the process 220 proceeds to 240 to install the SSD. In one embodiment, the user is reminded of the installation of the SSD (key). At operation 238, assuming the user refuses to install the SSD, the process 220 stops and proceeds to operation 222, where the configuration process 220 is restarted.

现假设在操作240中执行安装SSD过程。安装所述SSD与安装ISD 类似。所述TSM服务器联系其内有主SSD密钥的硬件安全模块HSM,为所述 安全元件计算派生SSD密钥集。所述主SSD密钥可以在TSM、服务提供者、 或安全元件发行者中,这主要取决于各方是如何协定的。Assume now that an SSD installation process is performed in operation 240 . Installing said SSD is similar to installing an ISD. The TSM server contacts the hardware security module HSM that has the master SSD key in it, and calculates and derives the SSD key set for the secure element. The master SSD key can be in the TSM, service provider, or secure element issuer, depending on how the parties agree.

为了在安全元件中下载/安装应用,在操作242,所述服务器用来使用 派生SSD与所述安全元件建立安全通道。在一个实施例中,这类似于如何基于 派生ISD建立安全通道。在操作244,准备所述应用的数据,它的细节将在下文 详细描述。根据一个实施例,所述服务器联系所述服务提供者,以准备存储数据 应用协议数据单元APDUs。根据安装于移动装置中一个应用,所述服务器可以 重复发布存储数据以个人化所述应用。假如成功执行了所述配置程序,包括一个 适当接口(比如,每个移动装置的应用的用户接口)的额外数据可以被下载。在操 作246,所述服务器向一个应用提供者通知已经配置的应用的状态。根据一个实 施例和上文所述,图2C示出了当配置一个应用时不同方之间交互的数据流程 250。In order to download/install applications in the secure element, at operation 242 the server is configured to establish a secure channel with the secure element using a derivative SSD. In one embodiment, this is similar to how secure channels are established based on derived ISDs. In operation 244, data for the application is prepared, the details of which will be described in detail below. According to one embodiment, said server contacts said service provider to prepare stored data Application Protocol Data Units (APDUs). According to an application installed in the mobile device, the server may repeatedly distribute stored data to personalize the application. Provided the configuration procedure is successfully executed, additional data including an appropriate interface (e.g., the user interface of each mobile device's application) may be downloaded. In operation 246, the server notifies an application provider of the status of the configured application. Figure 2C illustrates a data flow 250 of interactions between different parties when configuring an application, according to one embodiment and as described above.

如图2B中的操作244,配置应用的一个重要应用在于为目标安全元件 准备定制应用数据。比如,对于电子钱包应用,该应用的个人化数据包括基于安 全元件的装置信息(比如CPLC信息)产生的各种个人化交易密钥。为了搬运电子 钱包,个人化数据的部分包括源自Mifare卡片的标识符的Mifare访问密钥,所 述服务器既可以个人化Java卡片应用,也可以个人化Mifare4Mobile服务对象。 通常,至少有两种不同的准备数据的方式,以方便随后的交易。As operation 244 in Figure 2B, an important application of the configuration application consists in preparing custom application data for the target secure element. For example, for an electronic wallet application, the personalized data of the application includes various personalized transaction keys generated based on the device information (such as CPLC information) of the secure element. In order to carry the electronic wallet, the part of the personalization data includes the Mifare access key derived from the identifier of the Mifare card, and the server can personalize both the Java card application and the Mifare4Mobile service object. Typically, there are at least two different ways of preparing data to facilitate subsequent transactions.

为了数据准备,本发明的一个实施例支持与所述服务提供者交互的两 种模式以计算个人化应用数据。对于第一种模式,所述TSM服务器不直接访问 与服务提供者关联的硬件安全模块。所述服务提供者可以使与它的硬件安全模块 交互的服务器产生应用密钥(比如,传输、电子钱包或Mifare密钥)。所述TSM 数据准备实现是使用应用程序接口(API)或服务器提供的协议去请求派生应用密 钥(derived application key)。第二种模式是数据准备实现可以直接访问与服务提 供者相关的硬件安全模块以产生应用密钥。For data preparation, an embodiment of the present invention supports two modes of interaction with the service provider to calculate personalized application data. For the first mode, the TSM server does not directly access the hardware security module associated with the service provider. The service provider can have a server interacting with its hardware security module generate application keys (e.g. transport, e-wallet or Mifare keys). The implementation of the TSM data preparation is to use the application programming interface (API) or the protocol provided by the server to request a derived application key (derived application key). The second mode is that the data preparation implementation can directly access the hardware security module related to the service provider to generate the application key.

根据一个实施例,图2D示出了在配置一个应用过程中准备应用数据时 不同方交互的数据流程255。图2D为第一模式,其中所述TSM服务器不直接 访问与服务提供者关联的硬件安全模块。除了所述应用数据准备实现将直接与服 务提供者的硬件安全模块交互外,第二种模式具有相似的流程。According to one embodiment, Figure 2D shows a data flow 255 for different parties interacting in preparing application data during provisioning of an application. Figure 2D is a first mode, wherein the TSM server does not directly access the hardware security module associated with the service provider. The second mode has a similar process except that the application data preparation implementation will directly interact with the service provider's hardware security module.

除了支持配置过程,本发明的一个实施例还支持安全元件的寿命周期 管理。所述寿命周期管理包括但不限于,安全元件锁定、安全元件解锁和应用删 除(非使能)。可以通过TSM通知来开始这些活动。在移动装置的实际使用中, 图2E示出了锁定已安装应用的流程或过程260。一个NFC装置可能已经安装 了一定数量的运行于安全元件上的应用。因为一些原因(比如,长时间没有活动 或期满),一个应用需要由其发行者或提供者非使能或锁定。In addition to supporting the configuration process, an embodiment of the invention also supports lifecycle management of secure elements. The life cycle management includes, but is not limited to, secure element locking, secure element unlocking, and application deletion (disabled). These activities can be initiated through TSM notifications. In actual use of the mobile device, Figure 2E shows a flow or process 260 of locking installed applications. An NFC device may have installed a certain number of applications running on the secure element. For some reason (eg, long periods of inactivity or expiration), an application needs to be disabled or locked by its publisher or provider.

图2E示出了非使能一个已安装应用的过程260。非使能一个已安装应 用的过程260开始于操作262。在一个实施例中,所述过程260由操作者通过 TSM网页入口手动启动。在另一个实施例中,所述过程260由服务提供者内部 工作流程(比如使用TSM网页服务API)自动启动。一旦所述过程260启动,发 送一条信息至一个NFC装置(比如移动装置内),其内的一个应用需要被非使能。 在实现时,这样的消息可以有不同格式。在一个实施例中,所述消息是一个PUSH 命令。在另一个实施例中,所述消息是一个通过网络传递至所述NFC装置内的 TCP/IP请求。在操作264中,服务器(比如TSM服务器)发送所述消息。在实现 时,这样的一个消息包括标识将被锁定或非使能的应用的标识符。在接收到这样 的消息时,在操作266,所述NFC装置上的卡管理器代理(card manager proxy) 用来通过回复一条信息来认证这样的信息是否确实来自它的原始发行者或提供 者。在一个实施例中,将所述消息发送至TSM服务器进行认证。如果认证失败, 即对这样的查询没有回应,所述过程260将结束。FIG. 2E illustrates the process 260 of disabling an installed application. The process 260 of disabling an installed application begins at operation 262. In one embodiment, the process 260 is manually initiated by an operator through the TSM web portal. In another embodiment, the process 260 is automatically initiated by the service provider's internal workflow (such as using the TSM web services API). Once the process 260 is initiated, a message is sent to an NFC device (such as within a mobile device) that an application within it needs to be disabled. Such messages MAY have different formats when implemented. In one embodiment, the message is a PUSH command. In another embodiment, said message is a TCP/IP request passed over a network into said NFC device. In operation 264, a server, such as a TSM server, sends the message. When implemented, such a message includes an identifier identifying the application to be locked or disabled. Upon receipt of such a message, at operation 266, the card manager proxy on the NFC device is used to authenticate that such information is indeed from its original issuer or provider by replying with a message. In one embodiment, the message is sent to the TSM server for authentication. If the authentication fails, ie there is no response to such a query, the process 260 will end.

假设所述认证通过,即来自所述装置的针对所述应用的提供者的查询 收到了回复确认,所述原始请求被证明是真实的。通常,在操作268,这样的回 复确认包括将要锁定的应用的标识符。所述TSM服务器用来建立一个与安全元 件的安全通道。随后,所述TSM服务器通过所述卡管理器代理为所述安全元件 准备适当的APDUs(比如SET STATUS(设置状态),或/和DELETE(删除))。在 操作270,所述装置向所述安全元件发出操作请求,以锁定特定应用。Assuming the authentication passes, i.e. a query from the device for the provider of the application receives a reply acknowledgment, the original request is proven authentic. Typically, at operation 268, such a reply confirmation includes an identifier of the application to be locked. The TSM server is used to establish a secure channel with the secure element. The TSM server then prepares the appropriate APDUs (such as SET STATUS, or/and DELETE) for the secure element via the card manager agent. In operation 270, the device sends an operation request to the secure element to lock a specific application.

不管怎样,响应所述命令,在步骤272,所述安全元件SE锁定或非使 能所述应用。根据一个实施例,所述SE被致使与应用分离,这样使得该已安装 的应用不再能使用所述安全元件。在操作274,所述安全元件用来发出确认以通 知相关方,这个应用不再运行于所述装置中了。在一个实施例中,所述确认发送 至TMS服务器,所述TMS服务器中有一个记录哪些应用安装于哪些装置中以 及每个应用的相应状态的数据库。所述数据库根据来自所述安全元件的确认 (acknowledgement)进行更新。In any case, in response to the command, in step 272, the secure element SE locks or disables the application. According to one embodiment, said SE is caused to disassociate from the application, such that said secure element can no longer be used by the installed application. At operation 274, the secure element is used to issue a confirmation to notify interested parties that the application is no longer running on the device. In one embodiment, the acknowledgment is sent to a TMS server that has a database that records which applications are installed on which devices and the corresponding status of each application. The database is updated according to acknowledgments from the secure element.

图2E示出了非使能或锁定已安装应用的流程或过程。对于本领域内的 普通技术人员来说,其它操作,比如解锁或使能一个已安装应用,延长一个已安 装应用的期限,是与图2E示出的过程相似的。FIG. 2E shows a flow or process of disabling or locking installed applications. For those of ordinary skill in the art, other operations, such as unlocking or enabling an installed application, extending the time limit of an installed application, are similar to the process shown in Figure 2E.

参照图2F,图2F根椐本发明的一个具体实施例,展示了便携设备作 为电子钱包执行电子商务和移动商务时的架构示意图280。所述图280包括内嵌 了智能卡模块的便携式电话282。此类便携式电话的一个实例是支持近距离通信 (NFC,Near FieldCommunication),并且包含SmartMX(SMX)模块的便携式电 话。需要注意的是安全元件和应用可以是集成的。除非特别说明,接下来的描述 将不会指出哪个部分来执行安全元件的功能,哪个部分来作为应用。本领域内的 普通技术人员应该可以理解的是根据下文给定的详细描述合适的部分或功能将 被执行。Referring to Fig. 2F, Fig. 2F is based on a specific embodiment of the present invention, which shows a schematic diagram 280 of the architecture when the portable device is used as an electronic wallet to perform e-commerce and mobile commerce. The diagram 280 includes a cellular phone 282 with an embedded smart card module. An example of such a cellular phone is a cellular phone that supports Near Field Communication (NFC) and includes a SmartMX (SMX) module. Note that secure elements and applications can be integrated. Unless otherwise specified, the following description will not indicate which part performs the function of the secure element and which part is used as an application. It will be understood by those skilled in the art that an appropriate part or function will be implemented according to the detailed description given below.

所述SMX模块预先装载有Mifare模拟器288(即单功能卡),以用来存 储数值(values)。所述便携式电话装有非接触界面(例如ISO14443RFID),以 允许所述便携式电话起到标签的作用。此外,所述SMX模块是能够运行Java applet程序的Java卡片(JavaCard)。所述电子钱应用包被设置为能够通过密 码访问所述Mifare模拟器的数据结构,所述密码由所述访问密钥在所述安全元 件被个人化时经过适当的转换后得到。The SMX module is pre-loaded with a Mifare emulator 288 (i.e. a single function card) for storing values. The cellular phone is equipped with a contactless interface (e.g. ISO14443 RFID) to allow the cellular phone to function as a tag. In addition, the SMX module is a Java card (JavaCard) capable of running Java applet programs. The electronic wallet application package is configured to be able to access the data structure of the Mifare emulator through a password obtained after appropriate conversion of the access key when the secure element is personalized.

所述便携式电话282中提供了电子钱包管理器MIDlet程序284。为了 实现移动商务,所述MIDlet程序284充当了电子钱包applet程序286及一个或 多个支付网络和服务器290之间的通信代理,以使各方之间的交易顺利进行。 此处所说的MIDlet程序是适合在便携设备上运行的软件组件。所述电子钱包管 理器MIDlet程序284可以被实现为Java便携式电话上的“MIDlet程序”,或个人 数字助理(PDA)设备上的“可执行应用程序”。所述电子钱包管理器MIDlet程序 284的功能之一是接入无线网络,并与运行在相同的设备或外部智能卡上的电子 钱包applet程序进行通信。此外,MIDlet程序284还被设置为可以提供管理功能,例如更改个人识别号码(PIN)、查看电子钱包余额和交易历史日志。在一例 应用中卡片发行商提供了用于支持和认证在卡片和对应服务器(亦即支付服务器) 之间进行的任意交易的安全识别模块(SAM)292。如图2F所示,应用协议数 椐模块(APDU)命令由能够访问安全识别模块(SAM)292的服务器290所创建, 其中所述APDU模块是读取器和卡片之间的通信模块。所述APDU模块的构造 根据ISO7816标准制定。通常,APDU命令被嵌入网络消息中并被传送至所述 服务器290或所述电子钱包applet程序286以接受处理。An electronic wallet manager MIDlet program 284 is provided in the portable phone 282 . In order to realize mobile commerce, the MIDlet program 284 acts as a communication agent between the electronic wallet applet program 286 and one or more payment networks and servers 290, so that transactions between parties can proceed smoothly. The MIDlet program mentioned here is a software component suitable for running on a portable device. The Wallet Manager MIDlet program 284 may be implemented as a "MIDlet program" on a Java portable phone, or as an "application executable" on a Personal Digital Assistant (PDA) device. One of the functions of the electronic wallet manager MIDlet program 284 is to access the wireless network and communicate with the electronic wallet applet program running on the same device or an external smart card. In addition, the MIDlet program 284 is configured to provide administrative functions, such as changing a personal identification number (PIN), viewing wallet balances and transaction history logs. In one example application the card issuer provides a Secure Identity Module (SAM) 292 for supporting and authenticating any transaction between the card and the corresponding server (i.e. the payment server). As shown in Figure 2F, an Application Protocol Data Module (APDU) command is created by a server 290 that has access to a Secure Identity Module (SAM) 292, which is the communication module between the reader and the card. The structure of the APDU module is formulated according to the ISO7816 standard. Typically, APDU commands are embedded in network messages and sent to the server 290 or the Wallet applet 286 for processing.

为了进行电子商务,在计算机(未示出)上运行的web代理294负责与 一个非接触读取器(例如一个ISO 14443RFID读取器)以及所述网络服务器290 交互。在实际操作中,所述代理294通过所述非接触读取器296向在便携式电 话282上运行的所述电子钱包applet程序286发送APDU命令,或通过相同途 径从所述电子钱包applet程序286处接收相应回复。另一方面,所述代理294 可生成网络请求(例如HTTP)并从所述支付服务器290处接收相应回复。A web agent 294 running on a computer (not shown) is responsible for interacting with a contactless reader (such as an ISO 14443 RFID reader) and said web server 290 for electronic commerce. In actual operation, the agent 294 sends an APDU command to the electronic wallet applet program 286 running on the portable phone 282 through the non-contact reader 296, or sends an APDU command from the electronic wallet applet program 286 through the same route. Receive the corresponding reply. Alternatively, the proxy 294 may generate network requests (eg, HTTP) and receive corresponding responses from the payment server 290 .

当个人化便携式电话282时,图3A中的结构图300展示了相关模块 互相作用,以完成电子钱包由授权人进行个人化的过程。图3B中的结构图320 展示了相关模块互相作用,以完成如图2F所示的电子钱包由其用户进行个人化 的过程。When personalizing the cellular phone 282, the block diagram 300 in Figure 3A shows the interaction of the relevant modules to complete the personalization of the e-purse by the authorized person. The block diagram 320 in Figure 3B shows the interaction of the relevant modules to complete the process of personalization of the e-wallet by its user as shown in Figure 2F.

图3C中的流程或过程图350展示了根据本发明的一个具体实施例, 个人化电子钱包applet程序的过程。图3C建议与图3A和图3B结合起来一同 理解。过程图350可以通过软件、硬件或软硬件结合的方式实现。The flowchart or process diagram 350 in FIG. 3C shows the process of personalizing the electronic wallet applet program according to a specific embodiment of the present invention. Figure 3C is suggested to be understood together with Figure 3A and Figure 3B. The process diagram 350 can be realized by software, hardware or a combination of software and hardware.

如前所述,电子钱包管理器建立于已经个人化的安全元件之上,以提 供个人化电子钱包applet程序时所需的安全机制。在实际操作中,安全域被用 来建立连接个人化应用服务器与所述电子钱包applet程序的安全通道。根据一 个具体实施例,经过个人化并被存入所述电子钱包applet程序的关键数据包括 一个或多个操作密钥(例如载入或充值密钥和购买密钥),预设的个人识别号码, 管理密钥(例如阻塞解除PIN密钥和重新载入PIN密钥),以及密码〔例如来自 Mifare的密码〕。As mentioned above, the electronic wallet manager is built on the already personalized secure element to provide the security mechanism required for personalizing the electronic wallet applet program. In actual operation, the security domain is used to establish a secure channel connecting the personalization application server and the electronic wallet applet program. According to a specific embodiment, the key data that is personalized and stored in the electronic wallet applet program includes one or more operation keys (such as loading or recharging keys and purchase keys), preset personal identification numbers , manage keys (such as blocking unblocking PIN keys and reloading PIN keys), and passwords (such as those from Mifare).

假定用户想要个人化内嵌在便携设备(例如一台便携式电话)中的电 子钱包applet程序。在图3C的步骤352中,个人化过程被启动。根据具体实 现的不同,个人化过程可能在便携设备内的模块中实现,并由手动或自动方式激 活,也可能实现为由授权人(通常是与卡片发行商有联系的人员)启动的一个物理 过程。如图3A所示,授权人启动个人化过程304,以个人化用户的电子钱包applet 程序,所述个人化过程304在现有的(existing)新电子钱包安全识别模块306 和现有的安全识别模块308上,通过作为界面的非接触读取器310来进行。卡 片管理器311执行至少两项功能:(1)通过安全域建立安全通道,以在卡片个 人化过程中,安装和个人化外部应用程序〔例如电子钱包applet程序〕;以及 〔2〕创建安全措施(例如个人识别号码),以在后续的操作中保护所述应用程序。 作为所述个人化过程使用个人化应用服务器304的结果,所述电子钱包applet 程序312和模拟器314被个人化。Assume that a user wants to personalize an electronic wallet applet program embedded in a portable device such as a portable phone. In step 352 of Figure 3C, the personalization process is initiated. Depending on the implementation, the personalization process may be implemented in a module within the portable device and activated manually or automatically, or as a physical activation initiated by an authorized person (usually someone connected to the card issuer). process. As shown in FIG. 3A, the authorizer starts a personalization process 304 to personalize the user's electronic wallet applet program. Module 308 is performed through a contactless reader 310 as an interface. The card manager 311 performs at least two functions: (1) establishes a secure channel through the secure domain to install and personalize external applications (e.g., an electronic wallet applet) during the card personalization process; and (2) establishes security measures (such as a personal identification number) to protect the application in subsequent operations. The Wallet applet 312 and emulator 314 are personalized as a result of the personalization process using the personalization application server 304 .

相似地,如图3B所示,电子钱包用户希望启动个人化过程,以通过无 线方式(例如通过图2中的移动商务路径)个人化电子钱包applet程序。与图 3A不同,图3B允许所述个人化过程由手动或自动方式激活。例如,便携式电 话上装有一个装置,如果该装置被按下,则激活所述个人化过程。在另一种方案 中,“未个人化”的状态提示可被提交给用户以启动所述个人化过程。如前所述, 便携设备中的MIDlet程序322〔即一个服务管理器〕充当代理以协助支付服务 器324与电子钱包applet程序312以及模拟器314之间的通信,其中支付服务器324拥有访问现有的新电子钱包安全识别模块306和现有的安全识别模块 308的权限。经过所述个人化过程,电子钱包applet程序312和模拟器314被 个人化。Similarly, as shown in FIG. 3B, an e-wallet user wishes to initiate a personalization process to personalize an e-wallet applet over the air (e.g., through the mobile commerce path in FIG. 2). Unlike Figure 3A, Figure 3B allows the personalization process to be activated manually or automatically. For example, a cellular phone is provided with a device which, if pressed, activates the personalization process. In another approach, a status prompt of "not personalized" may be presented to the user to initiate the personalization process. As previously mentioned, the MIDlet program 322 (i.e., a service manager) in the portable device acts as a proxy to facilitate communication between the payment server 324, which has access to existing New e-wallet security identification module 306 and existing security identification module 308 permissions. Through the personalization process, the electronic wallet applet 312 and the emulator 314 are personalized.

现在转回参见图3C,在图3A中所示的个人化过程被启动以后,非接 触读取器310被激活并在步骤354中从设备内的智能卡中读取标签标识符(ID) (即RFID标签ID)和关键数据。通过应用安全域(例如卡片发行商的默认安全 设置),在步骤356中建立连接新电子钱包安全识别模块(例如图3A中的安全 识别模块306)与便携设备中电子钱包applet程序(例如图3A中的电子钱包 applet程序312)的安全通道。Referring back now to FIG. 3C, after the personalization process shown in FIG. 3A is initiated, the contactless reader 310 is activated and reads the tag identifier (ID) (i.e. RFID tag ID) and key data. By applying the security domain (such as the default security setting of the card issuer), in step 356, a connection is established between the new electronic wallet security identification module (such as the security identification module 306 in Figure 3A) and the electronic wallet applet program (such as Figure 3A The safe channel of the electronic wallet applet program 312) in.

全球平台的每个应用安全域都包括三个DES密钥。例如:Each application security domain of the global platform includes three DES keys. E.g:

密钥1:255/1/DES-ECB/404142434445464748494a4b4c4d4e4fKey 1: 255/1/DES-ECB/404142434445464748494a4b4c4d4e4f

密钥2:255/2/DES-ECB/404142434445464748494a4b4c4d4e4fKey 2: 255/2/DES-ECB/404142434445464748494a4b4c4d4e4f

密钥3:255/3/DES-ECB/404142434445464748494a4b4c4d4e4fKey 3: 255/3/DES-ECB/404142434445464748494a4b4c4d4e4f

安全域被用来为两个实体之间的安全会话生成会话密钥,所述两个实体可 以是卡片管理器applet程序和主应用程序(host application),其中所述主应用 程序可能是桌面机中的个人化应用程序,也可能是由后端服务器提供的网络化的 个人化服务。The security domain is used to generate session keys for a secure session between two entities, such as a card manager applet and a host application, which may be a desktop computer Personalized applications in , may also be networked personalized services provided by back-end servers.

默认的应用域可由卡片发行商安装,并分配给不同的应用/服务提供商。 各应用程序所有者可在个人化过程之前(或在所述过程的最初阶段)变更各自密 钥组的数值。之后应用程序可以使用所述的新密钥组来创建用于执行个人化过程 的安全通道。Default application domains can be installed by the card issuer and assigned to different application/service providers. Each application owner may change the values of their respective key sets prior to (or during the initial stages of) the personalization process. The application can then use said new set of keys to create a secure channel for performing the personalization process.

通过由应用提供商的应用安全域建立的所述安全通道,第一组数据可 被个人化并存入电子钱包applet程序。第二组数椐同样可以通过同一条通道进 行个人化。但是,如果所述数据保存在不同的安全识别模块中,则一条使用相同 密钥组(或不同密钥组)的新的安全通道可被用于个人化所述第二组数据。Through said secure channel established by the application security domain of the application provider, the first set of data can be personalized and stored in the electronic wallet applet program. A second set of numbers can likewise be personalized through the same channel. However, if said data is stored in a different secure identity module, a new secure channel using the same set of keys (or a different set of keys) can be used to personalize said second set of data.

在步骤358中,通过新电子钱包安全识别模块306生成一组电子钱包 操作密钥和个人识别号码,以用于新电子钱包安全识别模块与电子钱包applet 程序之间的数据交换,并在实质上个人化所述电子钱包applet程序。In step 358, a group of electronic wallet operation keys and personal identification numbers are generated by the new electronic wallet security identification module 306 for data exchange between the new electronic wallet security identification module and the electronic wallet applet program, and in essence Personalize the electronic wallet applet program.

在步骤360中第二条安全通道在现有安全识别模块(例如图3A中的安 全识别模块308)与便携设备中的电子钱包applet程序(例如图3A中的电子钱 包applet程序312〕之间被建立。步骤362中使用所述现有安全识别模块和标 签ID生成一组转换后的密钥。所述转换后的密钥保存在所述模拟器中以用于之 后的数据访问认证。步骤358中使用所述现有安全识别模块和标签ID生成一组 MF密码,并将所述密码存入电子钱包applet程序以用于之后的数据访问认证。 上述操作全部完成后,所述电子钱包,包括所述电子钱包applet程序和对应的 模拟器,将被设置为“已个人化”状态。In step 360, the second security channel is established between the existing security identification module (such as the security identification module 308 in FIG. 3A ) and the electronic wallet applet program in the portable device (such as the electronic wallet applet program 312 in FIG. 3A ] Set up.Use described existing security identification module and tag ID to generate one group of converted key in step 362.The key after described conversion is preserved in described emulator for data access authentication afterwards.Step 358 Use the existing security identification module and tag ID to generate a group of MF passwords, and store the passwords into the electronic wallet applet program for subsequent data access authentication. After all the above operations are completed, the electronic wallet includes The electronic wallet applet program and the corresponding simulator will be set to the "personalized" state.

基于本发明的一个具体实施例,图4A和图4B一起展示了为电子钱包 筹资或注资的流程或过程图400。过程400通过图2中的移动商务路径实施。 为了更好地理解过程400,图4C展示了一幅具有代表性的方块图450,图中相 关方块相互作用以完成所述的过程400。根据本发明实际应用的不同情况,所述 过程400可能通过软件、硬件、或软硬件结合的方式实现。Figures 4A and 4B together illustrate a flow or process diagram 400 for funding or injecting funds into an electronic wallet, according to a specific embodiment of the present invention. Process 400 is implemented through the mobile commerce path in FIG. 2 . To better understand process 400, FIG. 4C shows a representative block diagram 450 of related blocks that interact to accomplish process 400 as described. According to different situations of the actual application of the present invention, the process 400 may be implemented by software, hardware, or a combination of software and hardware.

假设用户得到了一台安装了电子钱包的便携设备(例如一台便携式电 话〕。所述用户希望从银行的账户中向所述电子钱包注入资金。在步骤402,所 述用户输入一组个人识别号码(PIN)。假定所述个人识别号码有效,便携设备中 的电子钱包管理器被激活,并在步骤404中发起请求(也被称为空中(OTA, Over-the-Air)充值请求)。在步骤406中便携设备内的MIDlet程序向电子钱包 applet程序发送请求,图4C中描绘了所述步骤406中电子钱包管理器MIDlet 程序434与电子钱包applet程序436之间通信的过程。Assuming that the user has obtained a portable device (such as a portable phone) with an electronic wallet installed. The user wishes to inject funds into the electronic wallet from the account of the bank. In step 402, the user enters a set of personal identification Number (PIN). Assuming that the personal identification number is valid, the electronic wallet manager in the portable device is activated and initiates a request in step 404 (also known as an OTA (Over-the-Air) recharge request). In step 406, the MIDlet program in the portable device sends a request to the electronic wallet applet program. FIG. 4C depicts the communication process between the electronic wallet manager MIDlet program 434 and the electronic wallet applet program 436 in step 406.

在步骤408中,电子钱包applet程序生成用于回应所述MIDlet程序请 求的回复。收到所述回复后,所述MIDlet程序将所述回复通过蜂窝通信网络发 送至支付网络和服务器。如图4C所示,电子钱包管理器MIDlet程序434与电 子钱包applet程序436通信以获取回复,所述回复随即被发送至支付网络和服 务器440。在步骤410,过程400需要核实所述回复的有效性。如果所述回复无 法被核实,过程400将终止。如果所述回复被核实为有效,则过程400进入步 骤412并查对银行中相对应的账户。如果所述账户的确存在,资金过户请求将被启动。在步骤414中,所述银行收到所述请求后会返回回复以回应所述请求。 通常,所述支付网络和服务器与所述银行之间的信息交换需遵守网络协议〔例如 国际互联网使用的HTTP协议〕。In step 408, the electronic wallet applet program generates a reply for responding to the request of the MIDlet program. After receiving the reply, the MIDlet program sends the reply to the payment network and the server through the cellular communication network. As shown in FIG. 4C , the Wallet Manager MIDlet program 434 communicates with the Wallet applet program 436 to obtain a reply, which is then sent to the payment network and server 440. At step 410, process 400 needs to verify the validity of the reply. If the reply cannot be verified, process 400 will terminate. If the reply is verified as valid, the process 400 proceeds to step 412 and checks the corresponding account in the bank. If the account in question does exist, a funds transfer request will be initiated. In step 414, the bank will return a reply to respond to the request after receiving the request. Usually, the information exchange between the payment network and the server and the bank needs to comply with network protocols (such as the HTTP protocol used by the Internet).

在步骤416中,所述银行返回的回复被传送至支付网络和服务器。在 步骤418中,MIDlet程序从所述回复中提取出处APDU命令并将所述命令转发 给电子钱包applet程序。在步骤420中所述电子钱包applet程序核实所述命令, 如果所述命令被核实为已被授权,则将该命令发送至步骤420中的模拟器,同 时更新交易日志。步骤422中生成标签(ticket)以用来制定向所述支付服务器 发送的回复(例如APDU格式的回复)。在步骤424中,所述支付服务器收到回 复后更新并向所述MIDlet程序发送成功状态信息,同时保存所述APDU回复以 便以后查对。In step 416, the reply returned by the bank is sent to the payment network and server. In step 418, the MIDlet program extracts the source APDU command from the reply and forwards the command to the Wallet applet program. In step 420 the e-wallet applet verifies the command, and if the command is verified as authorized, the command is sent to the emulator in step 420 and the transaction log is updated. In step 422, a ticket is generated to formulate a reply (such as a reply in APDU format) sent to the payment server. In step 424, after receiving the reply, the payment server updates and sends success status information to the MIDlet program, and saves the APDU reply for later checking.

如图4C所示,支付网络和服务器440收到电子钱包管理器MIDlet程 序434发出的回复,并与安全识别模块444核实所述回复最初是由经过授权的 电子钱包applet程序436所发出。所述回复被核实之后,支付网络和服务器440 向提供资金的银行442发出请求,假定用户432在所述银行中有帐户。所述银 行会核实并授权所述请求,然后按照预定的消息格式返回授权号码。从银行442 接收到所述回复之后,支付服务器440会向MIDlet程序434发送一个网络回复 以拒绝或批准所述请求。As shown in Figure 4C, the payment network and server 440 receive the reply sent by the electronic wallet manager MIDlet program 434, and verify with the security identification module 444 that the reply was originally issued by the authorized electronic wallet applet program 436. After the reply is verified, the payment network and server 440 sends a request to the funding bank 442, assuming the user 432 has an account with the bank. The bank will verify and authorize the request, and then return an authorization number in a predetermined message format. After receiving the reply from the bank 442, the payment server 440 will send a network reply to the MIDlet program 434 to deny or approve the request.

电子钱包管理器434核实所述网络回复的有效性(例如是否是APDU 格式),然后向模拟器438发送命令并更新交易日志。至此,电子钱包applet 程序436完成了所需的步骤并向而MIDlet程序434返回一个回复,所述MIDlet 程序434再向支付服务器440转发一条内嵌(APDU)回复的网络请求。The electronic wallet manager 434 verifies the validity of the network reply (eg, whether it is in APDU format), and then sends a command to the emulator 438 and updates the transaction log. So far, the electronic wallet applet program 436 completes the required steps and returns a reply to the MIDlet program 434 , and the MIDlet program 434 forwards a network request embedded in (APDU) reply to the payment server 440 .

尽管过程400被描述为向电子钱包中注入资金,本领域中的其他技术 人员能够容易地得出使用电子钱包通过网络进行购买的过程与过程400本质上 是一样的结论,因此所述进行购买的过程不再在此单独讨论。Although the process 400 is described as injecting funds into the electronic wallet, other skilled in the art can easily draw the conclusion that the process of using the electronic wallet to purchase through the network is essentially the same as the process 400, so the process of making the purchase The process is not discussed separately here.

根据本发明的一个具体实施例,图5A中展示了使便携设备530能够在 蜂窝通信网络520(例如一个GPRS网络)上进行电子商务和移动商务的第一个 示例架构500。所述便携设备530由基带524和安全元件529(例如智能卡) 组成。所述便携设备的一个实例是支持近距离通信或近场通信(NFC,Near Field Communication)的便携设备(例如便携式电话或个人数字助理(PDA))。所述 基带524提供了一个电子平台或环境(例如微型版Java(JME,JavaMicro Edition),或移动信息设备框架(MIDP,Mobile Information Device Profile)),在其上可执行或运行应用MIDlet程序523和服务器管理器522。所述安全元件 529包含有全球平台(GP)卡片管理器526,模拟器528以及其他组件比如个 人识别号码管理器〔未示出〕。A first example architecture 500 for enabling a portable device 530 to conduct electronic commerce and m-commerce over a cellular communication network 520 (e.g., a GPRS network) is shown in FIG. 5A, according to a specific embodiment of the present invention. The portable device 530 consists of a baseband 524 and a secure element 529 (eg a smart card). An example of the portable device is a portable device (such as a portable phone or a personal digital assistant (PDA)) that supports short-range communication or near field communication (NFC, Near Field Communication). The baseband 524 provides an electronic platform or environment (such as a miniature version of Java (JME, JavaMicro Edition), or a mobile information device framework (MIDP, Mobile Information Device Profile)), on which the application MIDlet program 523 and the application MIDlet program 523 and Server Manager 522 . The secure element 529 includes a Global Platform (GP) card manager 526, an emulator 528 and other components such as a pin manager (not shown).

为支持所述便携设备530执行电子商务和移动商务,需要在其上预先 安装和设置一个或多个服务/应用。服务管理器522的一个实例(例如一个有图 形用户界面的MIDlet程序)需要被激活。在一个具体实施例中,服务管理器522 可以被下载并安装。在另一个具体实施例中,服务管理器522可以被预先载入。 无论采用何种方式,一旦服务管理器522被激活,包含各种服务的目录列表将 被显示。所述目录列表可能包含与用户的签约信息有关的服务项目,也可能包括 独立于用户签约信息的推荐项目。所述目录列表可从目录服务器512上的目录 库502中得到。目录服务器512为各种可能向注册者提供产品和/或服务的服务 提供者(例如安装服务器,个人化服务器)起到了交流中心(central hub)的作 用(如黄页功能)。所述目录服务器512的黄页功能可以包括服务规划信息(例 如服务收费,开始日期,结束日期等〕、安装、个人化和/或MIDlet程序下载地 点(如国际互联网地址)。所述安装和个人化过程可能是由两个不同的商业实体 所提供,比如所述安装过程可能由安全元件529的发行商所提供,而所述个人 化过程可能由持有特定应用程序的应用处理密钥的服务提供商所提供。In order to support the portable device 530 to perform e-commerce and mobile commerce, one or more services/applications need to be pre-installed and configured on it. An instance of the service manager 522 (such as a MIDlet program with a graphical user interface) needs to be activated. In one particular embodiment, service manager 522 can be downloaded and installed. In another embodiment, the service manager 522 may be pre-loaded. Either way, once the service manager 522 is activated, a directory listing containing various services will be displayed. The directory list may include service items related to the user's subscription information, and may also include recommended items independent of the user's subscription information. The directory listing is available from directory repository 502 on directory server 512. Directory server 512 acts as a central hub (e.g., yellow pages function) for various service providers (e.g., installation servers, personalization servers) that may offer products and/or services to registrants. The yellow pages function of the directory server 512 can include service planning information (such as service charges, start date, end date, etc.), installation, personalization and/or MIDlet program download location (such as Internet address). The installation and personalization The process may be provided by two different commercial entities, for example the installation process may be provided by the publisher of the secure element 529, while the personalization process may be provided by a service that holds the application processing key for the specific application provided by the merchant.

根据一个具体实施例,服务管理器522被配置为通过蜂窝通信网络520 连接服务提供商的一个或多个服务器514。假定用户已经从呈现给他的服务目录 中选择了一个应用。在所述一台或多台服务器514与全球平台管理器526之间 将建立一条安全通道518,以安装/下载所述用户选择的应用applet程序527, 然后再个人化此应用applet程序527及可选的模拟器528,并最终下载应用 MIDlet程序523。Applet程序库504和MIDlet程序库506分别提供一般的应用 applet程序和应用MIDlet程序。全球平台安全识别模块516和应用程序安全识 别模块517被用来建立安全通道518以进行个人化操作。According to a particular embodiment, the service manager 522 is configured to connect to the one or more servers 514 of the service provider through the cellular communication network 520 . It is assumed that the user has selected an application from the catalog of services presented to him. A secure channel 518 will be established between the one or more servers 514 and the global platform manager 526 to install/download the application applet 527 selected by the user, then personalize the application applet 527 and enable Selected emulator 528, and finally download application MIDlet program 523. Applet library 504 and MIDlet library 506 provide general application applet programs and application MIDlet programs, respectively. The global platform security identification module 516 and the application program security identification module 517 are used to establish a security channel 518 to carry out personalized operations.

根据本发明的另一个具体实施例,图5B展示了使便携设备530能够在 公共网络521上执行电子商务和移动商务的第二个示例架构540。所述第二个架 构540中的大多数组件本质上与图5A第一个架构500中的组件相类似。不同之 处在于第一个架构500是基于蜂窝通信网络520上的操作,而第二个架构540 则使用了公共网络521〔例如国际互联网)。所述公共网络521可能包括局域网 (LAN,Local Area Network)、一个广域网(WAN,Wide AreaNetwork)、WiFi (IEEE 802.11)无线连接、一个Wi-Max(IEEE802.16)无线连接等。为了在所述公共网络521上进行服务操作,服务管理器532的一个实例(即与服务管 理器MIDlet程序522功能相同或相似的实例)将被安装在接入公共网络521的 计算机538上。所述计算机538可以是桌面个人电脑(PC)、笔记本电脑、或 其他能运行服务管理器532的所述实例,并接入公共网络521的计算设备。所 述计算机538和便携设备530之间的连接通过一个非接触读取器534来进行。 服务管理器532充当了代理的角色,以协助服务提供商的一个或多个服务器514 与全球平台卡片管理器526之间,通过安全通道519进行的安装和个人化过程。Figure 5B illustrates a second example architecture 540 that enables a portable device 530 to perform electronic commerce and mobile commerce over a public network 521, according to another specific embodiment of the present invention. Most of the components in the second architecture 540 are similar in nature to those in the first architecture 500 of Figure 5A. The difference is that the first architecture 500 is based on operations over a cellular communication network 520, while the second architecture 540 uses a public network 521 (such as the Internet). The public network 521 may include a local area network (LAN, Local Area Network), a wide area network (WAN, Wide Area Network), a WiFi (IEEE 802.11) wireless connection, a Wi-Max (IEEE802.16) wireless connection, and the like. In order to perform service operations on the public network 521, an instance of the service manager 532 (i.e. an instance with the same or similar function as the service manager MIDlet program 522) will be installed on a computer 538 connected to the public network 521. The computer 538 may be a desktop personal computer (PC), a laptop, or other computing device capable of running the instance of the service manager 532 and connected to the public network 521. The connection between the computer 538 and the portable device 530 is made via a contactless reader 534. The service manager 532 acts as a proxy to facilitate the installation and personalization process between the service provider's server(s) 514 and the Global Platform Card Manager 526 over the secure channel 519 .

图5C是一张流程图,根据本发明的一个具体实施例,描绘了使便携设 备能够进行电子商务和移动商务功能的过程550。所述过程550根据具体实现的 不同,可以通过软件、硬件、或软硬件结合的方式实现。为了更好地理解所述过 程550,以下的描述中将引用若干较早的图示,尤其是图5A和图5B。Figure 5C is a flowchart depicting a process 550 for enabling electronic commerce and m-commerce functionality on a portable device, according to one embodiment of the present invention. The process 550 may be implemented by software, hardware, or a combination of software and hardware according to different implementations. To better understand the process 550, reference will be made to several earlier figures in the following description, particularly Figures 5A and 5B.

在过程550开始之前,服务管理器522或532的一个实例已被下载或 预装在便携设备530或计算机538上。在步骤552,服务管理器被激活并向服 务提供商处的服务器514发送服务请求。在用户被识别以及便携设备被核实为 有效之后,在步骤554中,所述过程550依据便携设备530的用户的签约 (subscription)信息提供服务/应用程序的目录列表。例如,所述列表可能包含移 动销售点应用程序、电子钱包应用程序、电子票务应用程序、以及其他商业化的 服务。然后一个服务/应用程序被从所述目录列表中选中。例如,电子钱包或移动销售点可被选中用来配置便携设备530。作为对用户选择的回应,过程550 在步骤556下载并安装所述被选中的服务/应用程序。例如,电子钱包applet应 用程序(即应用applet程序527)从applet程序库504中下载并安装在安全元 件529中。所述下载或安装的路径可以是安全通道518或519。在步骤558中, 如果需要,过程550将个人化所述已被下载的应用applet程序和所述模拟器 528。一些被下载的应用applet程序不需要被个人化,另外一些则需要个人化。 在一个具体实施例中,移动销售点应用applet程序(“销售点安全识别模块(POS SAM)”)需要被个人化,则以下信息或数据组是必须提供的:Before process 550 begins, an instance of service manager 522 or 532 has been downloaded or pre-installed on portable device 530 or computer 538. At step 552, the service manager is activated and sends a service request to the server 514 at the service provider. After the user is identified and the portable device is verified as valid, in step 554, the process 550 provides a directory listing of services/applications based on the subscription information of the user of the portable device 530. For example, the list might include mobile point-of-sale applications, e-wallet applications, e-ticketing applications, and other commercialized services. A service/application is then selected from the directory listing. For example, an electronic wallet or mobile point of sale may be selected to configure portable device 530 . In response to the user selection, process 550 downloads and installs the selected service/application at step 556 . For example, the electronic wallet applet application program (i.e. the application applet program 527) is downloaded from the applet program library 504 and installed in the secure element 529. The path for downloading or installing may be a secure channel 518 or 519 . In step 558, process 550 personalizes the downloaded application applet and the emulator 528, if desired. Some downloaded application applets do not need to be personalized, others do. In one embodiment, the mobile point-of-sale application applet ("Point-of-Sale Security Identification Module (POS SAM)") needs to be personalized, then the following information or data sets must be provided:

(a)唯一基于底层安全元件独特标识符的安全识别模块ID;(a) Unique security identification module ID based on the unique identifier of the underlying security element;

(b)一组借记主密钥(debit master key);(b) a set of debit master keys;

(c)一个转换后的消息加密密钥;(c) a converted message encryption key;

(d)一个转换后的消息识别密钥;(d) a converted message identification key;

(e)每笔线下交易的备注部分可以被允许的最大长度;(e) The maximum allowed length of the remarks section of each offline transaction;

(f)一个转换后的批量交易密钥;以及(f) a transformed bulk transaction key; and

(g)一个全球平台个人识别号码(GP PIN)。(g) A Global Platform Personal Identification Number (GP PIN).

在另一个具体实施例中,为单功能卡片个人化电子钱包applet程序时, 不仅需要将特定数据(即个人识别号码、转换后的密钥、开始日期、结束日期等) 配置在电子钱包中,而且还要将模拟器设置为可以在开放的系统中工作。最后, 在步骤560中,过程550下载并根据选择启动应用MIDlet程序523。所述应用 applet程序中的某些个人化数据可被访问和显示,或由用户提供。所述过程550 在所有服务/应用组件均被下载、安装和个人化后结束。In another specific embodiment, when personalizing the electronic wallet applet program for a single-function card, it is not only necessary to configure specific data (i.e. personal identification number, converted key, start date, end date, etc.) in the electronic wallet, Also set up the emulator to work in an open system. Finally, in step 560, process 550 downloads and launches application MIDlet program 523 upon selection. Certain personalization data in the application applet may be accessed and displayed, or provided by the user. The process 550 ends after all service/application components have been downloaded, installed and personalized.

根据一个具体实施例,使便携设备530能够作为一个移动销售点来使 用的一个代表性过程如下:According to a specific embodiment, a representative process for enabling portable device 530 to function as a mobile point of sale is as follows:

(a)接入安装服务器(即服务提供商的一台服务器514),并请求所述服务器 建立第一条安全通道(例如安全通道518),以连接一个发行商域〔即applet程 序库504〕与运行于安全元件529上的全球平台卡片管理器526;(a) Access the installation server (i.e. a server 514 of the service provider), and request said server to set up the first secure channel (eg secure channel 518) to connect to a publisher domain (i.e. the applet library 504) with the Global Platform Card Manager 526 running on the Secure Element 529;

(b)接收一条或多条网络消息,所述消息中包含封装销售点安全识别模块 applet程序(例如来自applet程序库504的一个Java Cap文件)的若干APDU请 求;(b) receiving one or more network messages, including some APDU requests of encapsulating point-of-sale security identification module applet program (such as a Java Cap file from applet program library 504) in the message;

(c)从接收到的所述网络消息中提取所述APDU请求;(c) extracting the APDU request from the received network message;

(d)向全球平台卡片管理器526按照正确的顺序发送提取出的APDU请求, 以在安全元件529上安装销售点安全识别模块(即应用applet程序527);(d) send the extracted APDU request to the global platform card manager 526 according to the correct order, so as to install the point-of-sale security identification module (i.e. the application applet program 527) on the secure element 529;

(e)接入一个个人化服务器〔即一台服务提供商的服务器514〕,以开通第二 条连接个人化服务器与新下载的applet程序(即销售点安全识别模块)之间的 安全通道(根据服务器和/或路径的不同,所述安全通道可能是也可能不是安全 通道518)。(e) access a personalization server (i.e. a service provider's server 514), to open the second secure channel connecting the personalization server and the newly downloaded applet program (i.e. the point-of-sale security identification module) ( Depending on the server and/or path, the secure channel may or may not be a secure channel 518).

(f)接收一条或多条网络消息以获得一个或多个单独的“数据存储 APDU(STORE DATAAPTU)”;(f) receive one or more network messages to obtain one or more individual "data storage APDU (STORE DATAAPTU)";

(g)提取并发送所述“数据存储APDU(STORE DATA APTU)”,以个人化销售 点安全识别模块;以及(g) extracting and sending said "STORE DATA APDU" to personalize the point-of-sale security identification module; and

(h)下载并启动销售点管理器(即应用MIDlet过程序523)。(h) Download and start the point of sale manager (ie apply the MIDlet process 523).

图6A展示了一个代表性的架构600,根椐本发明的一个具体实施例, 其中便携设备630作为移动销售点,以执行电子商务和移动商务。所述便携设 备630由基带624和安全元件629组成。销售点管理器623被下载并安装在所 述基带624中,销售点安全识别模块628则被个人化并安装在安全元件629中, 以使便携设备630能够充当移动销售点的角色。这样实时的交易639可以在支 持移动销售点的便携设备630与支持电子代币的装置636(例如单功能卡片或 支持电子钱包的移动设备)之间进行。所述电子代币可能代表设备中的电子货币 (e-money)、电子购物券(e-coupon)、电子票(e-ticket)、电子凭单(e-voucher) 或任何其他形式的支付代币。Figure 6A illustrates a representative architecture 600 in which a portable device 630 acts as a mobile point of sale to perform electronic commerce and mobile commerce, according to an embodiment of the present invention. The portable device 630 consists of a baseband 624 and a secure element 629. A point of sale manager 623 is downloaded and installed in the baseband 624 and a point of sale security identification module 628 is personalized and installed in the secure element 629 to enable the portable device 630 to act as a mobile point of sale. Such a real-time transaction 639 can be conducted between a mobile point-of-sale enabled portable device 630 and an electronic token enabled device 636 (such as a single function card or an e-wallet enabled mobile device). The e-token may represent e-money, e-coupon, e-ticket, e-voucher or any other form of payment token in the device .

实时交易639可以在线下进行(即不将便携设备接入后端销售点交易 处理服务器613)。但是,在特定的实际情况中,例如交易量超过了预定的门限 时,或支持电子代币的设备636需要充值或虚拟充值时,或(单一或批量)交 易上传时,所述便携设备630可以通过蜂窝网络520接入所述后端销售点交易 处理服务器613。The real-time transaction 639 can be performed offline (i.e. without connecting the portable device to the back-end point-of-sale transaction processing server 613). However, in specific practical situations, such as when the transaction volume exceeds a predetermined threshold, or when the device 636 supporting electronic tokens needs to be recharged or virtual recharged, or when (single or batch) transactions are uploaded, the portable device 630 can The backend point of sale transaction processing server 613 is accessed through the cellular network 520 .

累积的线下交易记录需要被上传至后端销售点交易处理服务器613进 行处理。所述上传操作由通过安全通道618接入销售点交易处理服务器613的 便携设备630执行。与所述安装和个人化过程相似,上传操作可以经由两条不 同的路线执行:蜂窝通信网络520;或公共网络521。图6A描绘了所述第一条 路线。The accumulated offline transaction records need to be uploaded to the back-end point-of-sale transaction processing server 613 for processing. The uploading operation is performed by a portable device 630 that accesses the point-of-sale transaction processing server 613 through a secure channel 618. Similar to the installation and personalization process described, the upload operation can be performed via two different routes: the cellular communication network 520; or the public network 521. Figure 6A depicts the first route.

所述第二条路线如图6B所示,根椐本发明的一个具体实施例,图6B 展示了一个代表性的架构640,其中便携设备630作为移动销售点并在公共网络 521上执行交易批量上传的操作。所述移动销售点中的线下交易记录一般被堆积 保存在销售点安全识别模块628中的交易日志中。所述交易日志由非接触读取 器634所读取并存入安装在计算机638中的销售点代理633。所述销售点代理 633再在公共网络521上通过安全通道619接入销售点交易处理服务器613。 每个包含一条或多条交易记录的上传操作都标记为一个单独的批量上传操作。销 售点安全识别模块628、非接触读取器634以及销售点代理632三者之间的数 据通信釆用格式并包含所述交易记录。封装APDU(例如HTTP)的网络消息则 被用于销售点代理632和销售点交易处理服务器613之间的通信。The second route is shown in FIG. 6B, which shows a representative architecture 640 according to one embodiment of the present invention, wherein the portable device 630 acts as a mobile point of sale and executes transaction batches over the public network 521. The upload operation. The offline transaction records in the mobile point of sale are generally accumulated and stored in the transaction log in the point of sale security identification module 628. The transaction log is read by a contactless reader 634 and stored in a point-of-sale agent 633 installed in a computer 638. The point-of-sale agent 633 then accesses the point-of-sale transaction processing server 613 through a secure channel 619 on the public network 521. Each upload that contains one or more transactions is marked as a separate bulk upload. Data communications between the point of sale secure identification module 628, the contactless reader 634, and the point of sale agent 632 are formatted and include the transaction record. Network messages encapsulating APDUs (e.g., HTTP) are then used for communications between the point-of-sale agent 632 and the point-of-sale transaction processing server 613.

在一个具体实施例中,一个来自销售点管理器623或销售点代理633 的具有代表性的批量上传过程包括:In one particular embodiment, a representative bulk upload process from a point of sale manager 623 or point of sale agent 633 includes:

(a)向销售点安全识别模块628发送请求以发起批量上传操作;(a) sending a request to the point-of-sale secure identification module 628 to initiate a bulk upload operation;

(b)在所述销售点安全识别模块628同意所述批量上传请求后,从所述销售 点安全识别模块628中被标记的“一批”或“一组”中以APDU命令的形式取回累积 的交易记录;(b) After the point-of-sale security identification module 628 agrees to the bulk upload request, retrieve it in the form of an APDU command from the "batch" or "group" marked in the point-of-sale security identification module 628 accumulated transaction records;

(c)创建一条或多条包含所述取回的APDU命令的网络消息;(c) creating one or more network messages comprising the retrieved APDU command;

(d)通过安全通道619将所述一条或多条网络消息发送至销售点交易处理服 务器613;(d) sending the one or more network messages to the point-of-sale transaction processing server 613 via the secure channel 619;

(e)从所述销售点交易处理服务器613中接收确认签名消息;(e) receiving a confirmation signature message from said point-of-sale transaction processing server 613;

(f)将所述确认签名消息以APDU的形式转送至所述销售点安全识别模块 628以进行核实,然后删除经确认已被上传的交易记录;以及(f) transfer the confirmed signature message to the point-of-sale security identification module 628 in the form of APDU for verification, and then delete the confirmed uploaded transaction record; and

(g)如果所述同一“批”或“组”中仍然有其他未被上传的交易记录,则重复步骤 (b)至步骤(f)。(g) If there are still other unuploaded transaction records in the same "batch" or "group", repeat steps (b) to (f).

图6C展示了一幅流程图,根据本发明的一个具体实施例,描绘了使用 充当移动销售点的便携设备630与作为单功能卡片使用并支持电子代币的装置 636进行移动商务的过程650。为了更便于理解,最好将过程650与之前的图示, 尤其是图6A和图6B关联起来一同考察。所述过程650可以用软件、硬件、或 软硬结合的方式实现。Figure 6C shows a flowchart depicting a process 650 for conducting mobile commerce using a portable device 630 acting as a mobile point of sale and a device 636 acting as a single function card and supporting electronic tokens, according to an embodiment of the present invention. For easier understanding, it is best to examine process 650 in relation to the previous illustrations, especially FIGS. 6A and 6B . The process 650 can be realized by software, hardware, or a combination of software and hardware.

当支持电子代币装置(例如Mifare卡片或支持电子钱包并模拟单功能 卡片的便携式电话)的持有者,希望通过移动销售点(即便携设备630)购买物 品或订购服务时,过程650(例如图6A中的销售点管理器623所执行的过程〉便 会被启动。在步骤652,便携设备630读取所述支持电子代币的装置并取回电子 代币(例如Mifare卡片的标签ID)。然后,过程650在步骤654中核实所述取 回的电子代币是否有效。如果图6A中支持电子代币的装置636是单功能卡片(例 如Mifare),则由销售点管理器623执行的所述核实过程包括:(i)读取所述卡片 的卡片标识(ID),所述卡片标识保存在不受保护或仅受公知密钥保护的区域上;(ii)向销售点安全识别模块628发送包含所述卡片标识的请求;(iii)接收一个或多 个由销售点安全识别模块628生成的转换后密钥〔例如用于交易计数、发行商 数据等的密钥〕。如果所述接收到的一个或多个转换后密钥为无效,即所述取回 的电子代币为无效,则结束过程650。否则过程650将沿着“是”分支推进至步骤 656,在步骤656中将判定在所述取回的电子代币中是否有足够的余额以支付当 前交易所需的费用。如果步骤656判定的结果为“否”,过程650可以选择提议所 述持有者在步骤657中为其电子代币充值(即载入、注入或筹集资金)。如果所述 持有者选择“否定”所述提议,则过程650结束。否则如果所述持有者同意为所述 支持电子代币的装置进行实时充值,则过程650在步骤658中执行充值或虛拟充值操作。之后过程650返回步骤656。如果在电子代币中有足够的币余额,过 程650在步骤660中从支持电子代币装置636的电子代币中扣除或借记完成所 述购买需要支付的数额。在所述单功能卡片的情况中,所述一个或多个转换后密 钥被用来授权所述扣除操作。最后在步骤662,销售点安全识别模块628中积累 的一个或多个线下交易记录被上传至销售点交易处理服务器613进行处理。所 述上传操作可通过蜂窝通信网络520或公共域网络521对单个交易或批量交易 进行。When the holder of an electronic token device (such as a Mifare card or a portable phone that supports an electronic wallet and simulates a single-function card) wishes to purchase an item or order a service through a mobile point of sale (i.e., a portable device 630), the process 650 (such as The process> carried out by the point of sale manager 623 among Fig. 6A just can be started.In step 652, portable device 630 reads the device that supports electronic token and gets back electronic token (such as the label ID of Mifare card) The process 650 then verifies whether the retrieved electronic token is valid in step 654. If the electronic token supporting device 636 in FIG. The verification process includes: (i) reading the card's card identification (ID), which is stored on an area that is not protected or protected only by a known key; 628 sends a request containing the card identification; (iii) receives one or more transformed keys (such as keys for transaction counts, issuer data, etc.) generated by the point-of-sale security identification module 628. If the If the received one or more converted keys are invalid, i.e. the retrieved electronic token is invalid, then end process 650. Otherwise, process 650 will advance to step 656 along the "yes" branch, in step 656 It will be determined whether there is sufficient balance in the electronic tokens retrieved to pay the required fees for the current transaction. If the result of step 656 determination is "no", process 650 can choose to propose that the holder is in step 657 If the holder chooses to "deny" the offer, process 650 ends. Otherwise, if the holder agrees to support the electronic token If the device of the token performs real-time recharge, the process 650 performs a recharge or virtual recharge operation in step 658. After that, the process 650 returns to step 656. If there is enough currency balance in the electronic token, the process 650 receives the electronic token from the supporting electronic token in step 660. The amount required to complete the purchase is debited or debited from the electronic token of the token device 636. In the case of the single function card, the one or more converted keys are used to authorize the debiting operation .Finally in step 662, one or more offline transaction records accumulated in the point-of-sale security identification module 628 are uploaded to the point-of-sale transaction processing server 613 for processing. The upload operation can be performed through the cellular communication network 520 or the public domain network 521 Do it on a single transaction or in batches.

图4A中的过程400描述了前述的充值操作。虚拟充值操作是所述充值 操作的特殊类型,通常被赞助人或捐助者用来提高电子代币的信用额度。为了能 够使用虚拟充值操作,所述赞助人需要设立一个账户,并将所述账户与支持电子 代币的装置(例如单功能卡片、多功能卡片、支持电子代币的便携式电话等等)绑 定。例如,由商业实体(例如企业、银行等等)提供的线上账户。一旦所述赞助 人向所述线上账户中充入了电子代币,支持电子代币装置的持有者便能在接入 移动销售点时从所述线上账户中收到电子代币。多种不同的安全措施将被贯彻 执行以确保所述虚拟充值操作是安全而且可靠的。所述虚拟充值的一个具有代表 性的应用情景是父(母)亲(即赞助人)可以向一个线上账户中充入电子代币, 所述线上账户与一位儿童(即设备持有人)的便携式电话(即支持电子代币的装 置)相连接,因此当所述儿童在移动销售点购买物品时,所述儿童就能收到所述 被充入的电子代币。除了此处描述的各种电子商务和移动商务功能以外,销售点 管理器623还被设置为可提供多种查询操作,例如,(a)检查销售点安全识别模 块中累积的未形成批量(即未被上传)的收支记录,(b)列出销售点安全识别模块 中的未形成批量的交易日志,(c)显示保存在销售点安全识别模块中的特定交易 的细节,(d)检查支持电子代币的装置的当前余额,(e)列出支持电子代币的装置 的交易日志,以及(f)显示支持电子代币的装置的特定交易的细节。Process 400 in FIG. 4A describes the aforementioned top-up operation. A virtual top-up operation is a special type of said top-up operation, which is usually used by patrons or donors to increase the credit limit of electronic tokens. In order to be able to use the virtual recharge operation, the patron needs to set up an account and bind the account with a device that supports electronic tokens (such as a single-function card, a multi-function card, a mobile phone that supports electronic tokens, etc.) . For example, online accounts provided by commercial entities (eg, businesses, banks, etc.). Once the patron has loaded the online account with electronic tokens, the holder of the electronic token enabled device can receive electronic tokens from the online account when accessing a mobile point of sale. Various security measures will be implemented to ensure that the virtual top-up operation is safe and secure. A representative application scenario of the virtual top-up is that the parent (ie, the patron) can charge electronic tokens into an online account that is connected to a child (ie, the device holder) (i.e., a device that supports electronic tokens) so that the child can receive the charged electronic tokens when the child purchases items at the mobile point of sale. In addition to the various e-commerce and m-commerce functions described herein, the point-of-sale manager 623 is also configured to provide a variety of query operations, such as (a) checking the accumulated unformed batches in the point-of-sale security identification module (i.e. not uploaded), (b) lists the unbatched transaction log in the point of sale security identification module, (c) displays the details of a specific transaction stored in the point of sale security identification module, (d) checks The current balance of the e-token enabled device, (e) lists the transaction log of the e-token enabled device, and (f) displays details of a particular transaction of the e-token enabled device.

图6D中的流程图,根据本发明的一个具体实施例,描绘了使用可充当 移动销售点的便携设备630与作为多功能卡片使用并支持电子代币的装置636, 进行移动商务的具有代表性的过程670。为了更便于理解,最好将过程670与之 前的图示,尤其是图6A和图6B联系起来一同考察。所述过程670可以用软件、 硬件、或软硬结合的方式实现。The flowchart in FIG. 6D depicts a representative process for conducting mobile commerce using a portable device 630 that acts as a mobile point of sale and a device 636 that acts as a multi-function card and supports electronic tokens, according to an embodiment of the present invention. The process 670. For better understanding, process 670 is best considered in conjunction with the previous illustrations, particularly Figures 6A and 6B. The process 670 can be implemented by software, hardware, or a combination of software and hardware.

当支持电子代币装置636(例如多功能卡片或支持电子钱包并模拟多功 能卡片的便携式电话)的持有者希望通过移动销售点(即便携设备630)购买物 品或订购服务时,过程670(例如图6A中销售点管理器623所执行的过程)便会 被启动。在步骤672,过程670向支持电子代币的装置636发送初始购买请求。 购买费用与所述初始购买请求(例如命令)一同发送。然后过程670进行至判 定步骤674。当支持电子代币的装置636中没有足够的余额时,销售点管理器 623将收到拒绝所述初始购买请求的回应消息。结果是过程670由于所述购买 请求被拒绝而结束。如果支持电子代节的装置636中有足够的余额,判定步骤 674的结果为“是”,过程670将沿着“是”分支进行至步骤676。从支持电子代币 的装置636那里收到的回复(例如APDU命令)将被转发至销售点安全识别模 块628。所述回复中的信息包括电子代币密钥的版本,以及将被用于建立安全通 道的随机数,所述安全通道将连接支持电子代币的装置636上的applet程序(例 如电子钱包applet)与便携设备630上安装的销售点安全识别模块628。然后, 在步骤678,过程670收到由销售点安全识别模块628为了回应所述转发回复 (即步骤676中的回复)而生成的借记请求(例如APDU命令)。所述借记请求 包含消息识别代码(MAC,Message Authentication Code)以便applet程序〔即 电子钱包applet程序〕核实即将进行的借记操作,其中所述即将进行的借记操 作是为了回应步骤680中发送的借记请求而进行的。过程670推进到步骤682, 收到所述借记操作的确认消息。所述确认消息中包含被销售点安全识别模块628 和销售点交易处理服务器613分别用来核实和处理的附加消息识别代码。接下 来在步骤684,所述借记确认消息被转发至销售点安全识别模块628以进行核 实。一旦所述消息识别代码被核实为有效,并且购买交易被记录在销售点安全识 别模块628中,所述被记录的交易在步骤686中被显示,然后过程670结束。 需要注意的是前述电子商务交易可在线下或线上通过销售点交易处理服务器 613进行。并且当支持电子代币的装置中的余额不足时,可以按照图4A和图4B 中描绘的过程400执行充值或注资操作。Process 670 ( A process such as that performed by point-of-sale manager 623 in FIG. 6A) will be initiated. At step 672 , the process 670 sends an initial purchase request to the electronic token enabled device 636 . A purchase fee is sent with the initial purchase request (eg, order). Process 670 then proceeds to decision step 674. When there is insufficient balance in the electronic token enabled device 636, the point of sale manager 623 will receive a response message denying the initial purchase request. The result is that process 670 ends with the purchase request being denied. If there is sufficient balance in the device 636 supporting electronic savings, the result of decision step 674 is "Yes", and process 670 will follow the "Yes" branch to step 676. Responses (e.g., APDU commands) received from the e-token enabled device 636 are forwarded to the point-of-sale security identification module 628. The information in the reply includes the version of the e-token key, and a random number that will be used to establish a secure channel to an applet on the e-token enabled device 636 (e.g., an e-wallet applet) and the point-of-sale security identification module 628 installed on the portable device 630 . Then, at step 678, the process 670 receives a debit request (eg, an APDU command) generated by the point of sale security identification module 628 in response to the forward reply (ie, the reply at step 676). The debit request includes a message identification code (MAC, Message Authentication Code) so that the applet program (i.e. the electronic wallet applet program) can verify the upcoming debit operation, wherein the upcoming debit operation is to respond to the message sent in step 680 for debit requests. Process 670 proceeds to step 682, where a confirmation message for the debit operation is received. The confirmation message includes an additional message identification code that is used by the point of sale security identification module 628 and the point of sale transaction processing server 613 for verification and processing, respectively. Next at step 684, the debit confirmation message is forwarded to the point of sale secure identification module 628 for verification. Once the message identification code is verified as valid and the purchase transaction is recorded in the point of sale security identification module 628, the recorded transaction is displayed in step 686 and process 670 ends. It should be noted that the aforementioned e-commerce transactions can be conducted offline or online through the point-of-sale transaction processing server 613. And when the balance in the electronic token supporting device is insufficient, a top-up or funding operation may be performed according to the process 400 depicted in FIGS. 4A and 4B .

图7展示了便携设备被用于电子票务应用时的具有代表性的设置。便 携设备730被配置为包括电子钱包724。当所述便携设备730的拥有者或持有 人希望购买参加一个特定活动的票据(例如音乐会票、球赛门票等)时,所述拥 有者可使用电子钱包724通过一个电子票服务提供商720购票。所述电子票服 务提供商720可联系传统的票房预定系统716或线上票务应用程序710来预定 和购买所述票据。之后电子代币(例如电子货币)被从便携设备730的电子钱 包724中扣除,以向信用/借记系统714(例如金融机构,银行)支付票据购买费用。安全识别模块718被接入所述电子票务服务提供商720,以确保便携设备 730中的电子钱包724被正确识别。在收到付款确认后,电子票通过空中连接(例 如蜂窝通信网络)被传送至便携设备730,并以电子化的方式被存储在安全元件 726上,例如以电子票代码、密钥或密码的方式。之后,当所述便携设备730 的拥有者,即所述电子票的持有者出席所述特定活动时,所述电子票持有者只需 要让入口登记读取器734读取便携设备730中保存的电子票代码或密钥。在一 个具体实施例中,所述入口登记读取器734是一个非接触读取器(例如遵守ISO 14443的超短距离耦合装置)。所述便携设备730是支持近距离通信(NFC)的移动电话。Figure 7 shows a representative setup when a portable device is used for an electronic ticketing application. Portable device 730 is configured to include an electronic wallet 724. When the owner or holder of the portable device 730 wishes to purchase tickets for a particular event (such as concert tickets, ball game tickets, etc.), the owner can use the electronic wallet 724 to pass through an electronic ticket service provider 720. buy tickets. The electronic ticket service provider 720 may contact a conventional box office reservation system 716 or an online ticketing application 710 to reserve and purchase the tickets. Electronic tokens (e.g., electronic money) are then deducted from the electronic wallet 724 of the portable device 730 to pay for the ticket purchase to a credit/debit system 714 (e.g., a financial institution, bank). The security identification module 718 is connected to the electronic ticket service provider 720 to ensure that the electronic wallet 724 in the portable device 730 is correctly identified. After receipt of payment confirmation, the electronic ticket is transmitted to the portable device 730 over the air (such as a cellular communication network) and stored electronically on the secure element 726, such as in the form of an electronic ticket code, key or password. Way. Afterwards, when the owner of the portable device 730, that is, the holder of the electronic ticket, attends the specific event, the electronic ticket holder only needs to let the entrance registration reader 734 read the information in the portable device 730. Saved e-ticket code or key. In one embodiment, the entry registration reader 734 is a non-contact reader (eg, an ISO 14443 compliant ultra-short range coupling device). The portable device 730 is a mobile phone supporting Near Field Communication (NFC).

现在参考图8A所示,其示出了在一个实施例中的由一个业务运行或安 排的TSM所涉及的多方(multiple parties)的示意图。TSM运营团队802包括 负责为用户管理账户的管理者(administration,简称admin,或称之为管理器或 管理),这些用户已经通过TSM或其他任务个人化了他们的安全元件。在一个实 施例中,所述TSM运营团队802包括管理所述账户的一些人,管理系统资源(比 如管理HSM,创建HSM索引(index)和GP密钥映射)的一些人。此外,所述 团队还负责从一个或多个SE制造者离线输入默认ISD信息。所述团队还包括被 称为鉴定工程师(certification engineer)的一些人,它们负责根据应用批准流程(application approval process)与服务提供者和SE发行者合作。所述TSM销 售团队804,其也被称为业务账户管理者,其负责销售和TSM的供应商(vendor) 的账户管理。所述团队804中的一些成员可以只为所述SE制造者工作,一些成 员可以只为所述SE发行者工作,其他人可以为多个类型的供应商工作。所述 TSM合作服务团队806,也可以被称为支持工程师,其负责为TSM的供应商(比 如SE发行者和服务提供者)提供技术支持。所述TSM合作服务团队806,不 直接与移动用户联系,但是却可以帮助合作伙伴分析审计日志(audit logs)。所 述供应商808包括SE发行者、SE制造者和服务提供者中的一个或多个。SE 发行者负责安全元件的发行,并拥有所述安全元件的ISD。SE发行者与所述TSM 团队一起工作,如果需要其可以为服务提供者安装额外的SSD。SE制造者,顾 名思义,用来负责制造所述安全元件,并在安全元件内安装默认ISD。它也可以 与TSM团队一起工作,提供这些默认的ISD密钥集。所述服务提供者负责开发NFC移动应用。来自所述服务提供者的应用示例包括但不限于交通钱包、银行 电子钱包和信用卡。小服务提供者可以是提供用作房间密钥的应用的那些人。Reference is now made to FIG. 8A, which shows a schematic diagram of the multiple parties involved in a TSM run or scheduled by a service, in one embodiment. The TSM operations team 802 includes administrators (administration, admin for short, or manager or admin) who are responsible for managing accounts for users who have personalized their secure elements through TSM or other tasks. In one embodiment, the TSM operations team 802 includes someone who manages the account, someone who manages system resources (such as managing HSMs, creating HSM indexes and GP key maps). In addition, the team is also responsible for offline input of default ISD information from one or more SE manufacturers. The team also includes people called certification engineers who work with service providers and SE issuers according to the application approval process. The TSM sales team 804, also known as business account managers, is responsible for sales and account management for TSM's vendors. Some members of the team 804 may only work for the SE manufacturer, some may only work for the SE issuer, and others may work for multiple types of suppliers. The TSM cooperative service team 806, which can also be referred to as a support engineer, is responsible for providing technical support to suppliers of TSM (such as SE issuers and service providers). The TSM cooperative service team 806 does not directly contact the mobile user, but can help partners analyze audit logs (audit logs). The suppliers 808 include one or more of SE issuers, SE manufacturers, and service providers. SE issuers are responsible for the issuance of SEs and own the ISDs of said SEs. The SE publisher works with the TSM team, who can install additional SSDs for service providers if needed. The SE maker, as the name suggests, is responsible for manufacturing the SE and installing a default ISD within the SE. It can also work with the TSM team to provide these default ISD key sets. The service provider is responsible for developing NFC mobile applications. Examples of applications from such service providers include, but are not limited to, transit wallets, bank e-wallets, and credit cards. Small service providers may be those who provide applications used as room keys.

图8B示出了在一个实施例中的TSM涉及的各方之间的相关关操作过 程。所述操作的描述没有在这里详细描述以避免模糊本发明的一个实施例的重 点。图8C示出了一个示例的TSM中在各方之间建立互相同意协议的工作流程。 SE发行者或服务提供者要求TSM保存其GP密钥集。在一个实施例中,对于 SE发行者来说,这个GP密钥集最有可能被用作ISD。对于服务提供者来说, 这个GP密钥集被用作SSD。如图8C所示,创建密钥集的过程涉及在HSM中 创建密钥和在TSM系统中创建映射(mapping)。所述映射的有效范围将被设置 到合约失效日期(contract expiring date)。总体来讲,HSM密钥索引(key index) 不能在同一时间对于多个映射有效。Figure 8B illustrates the correlation process between the parties involved in the TSM in one embodiment. The description of the operations is not described in detail here to avoid obscuring the focus of one embodiment of the invention. FIG. 8C illustrates an example workflow in TSM for establishing a mutual consent agreement between parties. SE issuers or service providers require TSM to keep their GP key sets. In one embodiment, this GP key set is most likely to be used as the ISD for the SE issuer. For the service provider, this GP key set is used as SSD. As shown in Figure 8C, the process of creating a key set involves creating keys in the HSM and creating mappings in the TSM system. The validity range of the mapping will be set to the contract expiring date. In general, the HSM key index (key index) cannot be valid for multiple mappings at the same time.

当所述密钥集将要期满时,可以进行更新。所述更新流程与图8C中所 示的创建过程相似。根据一个实施例,在所述密钥集期满的几个月前,所述TSM 将会定期的给所述密钥集的拥有者将发送通知。一旦所述密钥集的拥有者更新所 述合约,则停止所述通知。所述密钥集的拥有者可以通过创建一个工作请求或项 目来开始所述更新过程。一个可靠的TSM业务账户管理者批准或拒绝所述工作 项目。在接收到所述已经被批准的工作项目时,所述TSM管理者根据所述更新 的合约更新所述密钥集的期满日期。When the key set is about to expire, it can be renewed. The update flow is similar to the creation process shown in Figure 8C. According to one embodiment, the TSM will periodically send a notification to the owner of the key set several months before the key set expires. Once the owner of the key set updates the contract, the notification stops. The owner of the key set can start the update process by creating a work request or project. A trusted TSM business account manager approves or rejects the work item. Upon receipt of the approved work item, the TSM manager updates the expiration date of the key set according to the updated contract.

相似的,所述密钥集可以较早的期满或结束。所述结束流程与图8C所 示的创建流程类似。所述密钥集拥有者可以请求在一个未来日期停止所述密钥 集。所述可靠的TSM业务账户管理者将会立即核实,并批准或拒绝所述请求。 所述TSM管理者设置所述映射的期满日期为指定日期。所述TSM为其他供应 商再生所述HSM密钥索引。保存审计日志以记录所述交易的痕迹。Similarly, the key set may expire or end earlier. The ending flow is similar to the creation flow shown in Fig. 8C. The keyset owner may request that the keyset be discontinued at a future date. The trusted TSM business account administrator will immediately verify and approve or deny the request. The TSM administrator sets the expiration date of the mapping to a specified date. The TSM regenerates the HSM key index for other providers. Audit logs are kept to record traces of said transactions.

图8D示出了SE发行者和TSM之间ISD映射的数据流程。总体来说, 所述ISD映射由每个SE发行者直接管理。SE发行者能够创建一个映射去绑定 一个外部或内部密钥集至一个ISD密钥索引(index)。外部密钥集是未存在于 与TSM相关的HSM中的密钥集,内部密钥集是存在于所述HSM中的密钥集。 通常,所述SE发行者应该不需要指定默认ISD,由于默认ISD是来自所述SE 制造者的。然而,如果需要,SE发行者可以选择去重写这个默认ISD。Figure 8D shows the data flow of ISD mapping between SE issuer and TSM. In general, the ISD map is managed directly by each SE issuer. SE issuers can create a mapping to bind an external or internal key set to an ISD key index. An external key set is a key set not present in the HSM associated with the TSM, and an internal key set is a key set present in said HSM. Normally, the SE issuer should not need to specify a default ISD, since the default ISD is from the SE manufacturer. However, SE issuers may choose to override this default ISD if desired.

如图8D所示,所述SE发行者为卡操作系统(Card OS)创建了一个ISD 映射去绑定密钥集和ISD密钥索引(比如从1-127的范围)。如果密钥集不是 不外部的,所述TSM将确保与它的HSM的密钥集映射存在。在操作时,所述 SE发行者可以直接修改或删除所述ISD映射。如上文所述,SE制造者具有所 述安全元件的默认ISD信息。所述TSM为SE制造者提供批量和实时方式去共 享这些信息。基于与TSM的协议,所述SE制造者可以使用批量或实时方式, 其已经被描述过了。As shown in Figure 8D, the SE issuer creates an ISD map for the Card OS to bind the key set and the ISD key index (eg range from 1-127). If the keyset is not external, the TSM will ensure that a keyset mapping with its HSM exists. In operation, the SE issuer can directly modify or delete the ISD map. As mentioned above, the SE manufacturer has default ISD information for the secure element. The TSM provides batch and real-time means for SE manufacturers to share this information. Based on the agreement with TSM, the SE manufacturer can use batch or real-time mode, which has been described.

为了安全原因,所述服务提供者(service provider,简称SP)为了个 人化他的应用可能希望有他们自己的SSD。所述SSD映射由SE发行者创建以 绑定分配给所述服务提供者的一个密钥索引至SP密钥集。图8E示出了在TSM、 SE发行者、服务提供者之间的相应数据流程。类似于所述SSD的创建,服务 提供者可以请求所述SE发行者去删除一个SSD映射。所述工作流程与所述SSD 创建过程基本类似。For security reasons, the service provider (SP) may wish to have their own SSD in order to personalize his application. The SSD map is created by the SE issuer to bind a key index assigned to the service provider to the SP key set. FIG. 8E shows the corresponding data flow among TSM, SE issuer, and service provider. Similar to the creation of the SSD, the service provider can request the SE issuer to delete an SSD mapping. The described workflow is basically similar to the described SSD creation process.

如上文所示,服务提供者为用户提供的应用。在移动用户订购和下载 一个应用前,需要批准或发布所述应用。例如,服务提供者需要提交一个应用给 SE发行者和TSM以待批准。图8F示出了由SE发行者批准一个应用的数据流 程。如果需要专用SSD,所述服务提供者可以如上预先请求一个SSD,或在请 求中指出。在批准的应用对于普通大众可用之前,所述服务提供者或所述SE发 行者可以启动所述公开过程。在所述TSM中为用户公开所述应用前,两方都必 须同意。随后,通知所述供应商所述应用的日期和有效性。As shown above, the application provided by the service provider for the user. Before a mobile user can order and download an application, the application needs to be approved or published. For example, a service provider needs to submit an application to the SE issuer and TSM for approval. Figure 8F shows the data flow for approving an application by the SE issuer. If a dedicated SSD is required, the service provider can pre-request one as above, or indicate it in the request. The service provider or the SE issuer may initiate the publication process before the approved application is available to the general public. Both parties must agree before the application is published for the user in the TSM. Subsequently, the supplier is notified of the date and validity of the application.

在一些实例中,安全元件需要被替换。在移动用户或他的SE发行者请 求时,可以替换所述安全元件。通常,为了更多服务和更大的存储空间需要更新 安全元件。应当注意以下三点:In some instances, the secure element needs to be replaced. Said secure element can be replaced at the request of the mobile user or his SE issuer. Usually, the SE needs to be updated for more services and larger storage space. The following three points should be noted:

●对于这些应用,需要从老的安全元件中迁移出他们的应用状况,所 述老的安全元件需要仍能被应用访问(通过TSM);● For these applications, their application status needs to be migrated from the old secure element, which needs to still be accessible by the application (via TSM);

●对于不需要状态迁移的这些应用,所述TSM仅仅需要重新设置和 个人化所述应用;- For those applications that do not require state migration, the TSM only needs to reset and personalize the application;

●然而,如果一个应用,其状态在安全元件中,但是不支持状态迁移, 所述TSM不能迁移他们的状态。对于这些应用,他们将被以第二 种方式对待(即,所述应用必须被重新设置和个人化)。• However, if an application whose state is in the SE but does not support state migration, the TSM cannot migrate their state. For these applications, they will be treated in the second way (i.e. the application must be reset and personalized).

图8G示出了替换安全元件的流程。安全元件发行者通知TSM关于:Fig. 8G shows the process of replacing the secure element. The SE issuer notifies TSM about:

●SE发行者通知TSM关于SE替换请求;The SE issuer notifies TSM about the SE replacement request;

●TSM与服务提供者协作以准备APDU命令,以收集在老的SE上的 应用的状态;The TSM cooperates with the service provider to prepare APDU commands to collect the state of the application on the old SE;

●对于每个应用,TSM执行命令所述APDU命令以提取应用状态, 并锁定所述应用;● For each application, TSM executes the command APDU command to extract the application state, and locks the application;

●TSM通知移动用户去物理的改变新的安全元件。移动用户可以改变 他/她的主意去撤销或返回(rollback)所述替换请求。在这个步骤 之后将没有撤销或返回;• The TSM notifies the mobile user to physically change the new secure element. The mobile user can change his/her mind to cancel or rollback the replacement request. There will be no revocation or return after this step;

●如果它还没有被处理,TSM将更新所述默认ISD;● TSM will update the default ISD if it has not been processed;

●与服务提供者协作,TSM将安装和个人化或配置每个应用。如果需 要,TSM将为服务提供者安装所述SSD。基于所述服务提供者的 静态数据和动态应用状态准备所述个人化数据。• In collaboration with the service provider, the TSM will install and personalize or configure each application. TSM will install the SSD for the service provider if required. The personalization data is prepared based on the service provider's static data and dynamic application state.

如图9所示,其示出了个人化的安全元件的一个账户的显示屏的快照 示例。如所述菜单(menu),所述账户维持(mantains)有已经个人化的安全元 件的详细信息。此外,所述账户包括一系列配置的应用和安全密钥。也可以维持 其他信息,比如应用拥有者(开发所述应用的人)、TSM的可靠联系、SE日志 和应用日志。As shown in Figure 9, which shows an example of a snapshot of the display screen of an account of a personalized secure element. Like the menu, the account maintains details of secure elements that have been personalized. Additionally, the account includes a set of configured applications and security keys. Other information may also be maintained, such as the application owner (the person who developed the application), trusted connections to the TSM, SE logs, and application logs.

本发明更适合采用软件形式实现,但也可用硬件或软硬件结合的形式 实现。本发明也可被实现为计算机可读媒体上的可被计算机读取的代码。所述计 算机可读媒体是任何可以保存能够被计算机系统读取的数据的数椐存储装置。计 算机可读媒体的实例包括只读存储器,随机存取存储器,CD光盘(CD-ROM), 数字化视频光盘(DVD),磁带,光学数据存储装置,以及载波。所述计算机可 读媒体也可分布在通过网络相连的多台计算机系统中,这样所述可被计算机读取 的代码将以分布式的方式存储和运行。The present invention is more suitable to be implemented in the form of software, but it can also be implemented in the form of hardware or a combination of software and hardware. The present invention can also be embodied as codes on a computer readable medium that can be read by a computer. The computer readable medium is any data storage device that can store data that can be read by a computer system. Examples of computer readable media include read only memory, random access memory, compact disc (CD-ROM), digital video disc (DVD), magnetic tape, optical data storage devices, and carrier waves. The computer-readable medium can also be distributed among multiple computer systems connected via a network, so that the computer-readable code will be stored and executed in a distributed manner.

上述说明已经充分揭露了本发明的具体实施方式。需要指出的是,熟 悉该领域的技术人员对本发明的具体实施方式所做的任何改动均不脱离本发明 的权利要求书的范围。相应地,本发明的权利要求的范围也并不仅仅局限于前述 具体实施方式。The above description has fully disclosed the specific implementation manners of the present invention. It should be pointed out that any changes made by those skilled in the art to the specific embodiments of the present invention do not depart from the scope of the claims of the present invention. Accordingly, the scope of the claims of the present invention is not limited only to the foregoing specific embodiments.

Claims (14)

1.一种结算支付的方法,其特征在于,其包括:1. A method for settlement and payment, characterized in that it comprises: 提供在嵌入有安全元件的第一移动装置上执行的软件模块,其中所述安全元件已经被个人化,经由所述安全元件配置所述软件模块,所述第一移动装置包括有关于一个电子账单的数据;Providing a software module for execution on a first mobile device embedded with a secure element, wherein said secure element has been personalized, said software module is configured via said secure element, said first mobile device comprising information relating to an electronic bill The data; 在第二移动装置的用户批准了针对从所述第一移动装置无线的传输来的电子账单的支付后,接收来自所述第二移动装置的支付请求,其中所述第二移动装置是近场通信装置,其用来执行与所述第一移动装置中的软件模块进行通讯的一个应用以从所述第一移动装置读取所述数据;After a user of a second mobile device approves payment for an electronic bill wirelessly transmitted from the first mobile device, receiving a payment request from the second mobile device, wherein the second mobile device is a near field communication means for executing an application in communication with a software module in said first mobile device to read said data from said first mobile device; 核实所述支付请求;和verify said payment request; and 在所述支付请求被处理后,发送支付响应给所述第一移动装置的用户。After the payment request is processed, a payment response is sent to the user of the first mobile device. 2.根据权利要求1所述的方法,其特征在于:所述第二移动装置包括显示屏,当所述数据进入所述第二移动装置时,利用所述显示屏显示所述电子账单。2. The method of claim 1, wherein the second mobile device includes a display screen, and the electronic bill is displayed using the display screen when the data is entered into the second mobile device. 3.根据权利要求2所述的方法,其特征在于:所述核实所述支付请求包括:3. The method according to claim 2, wherein said verifying said payment request comprises: 当所述第二移动装置的用户提供的结算金额少于所述电子账单上的应付金额时,发送拒绝信息给所述第二移动装置;或When the settlement amount provided by the user of the second mobile device is less than the payable amount on the electronic bill, sending a rejection message to the second mobile device; or 当所述第二移动装置的用户提供的结算金额等于或大于所述电子账单上的应付金额时,继续支付流程。When the settlement amount provided by the user of the second mobile device is equal to or greater than the payable amount on the electronic bill, the payment process is continued. 4.根据权利要求3所述的方法,其特征在于:所述数据还包括所述个人化的安全元件的标识符,所述核实所述支付请求还包括:4. The method of claim 3, wherein the data further includes an identifier of the personalized secure element, and the verifying the payment request further comprises: 核实所述第二移动装置的用户是否维持有用于结算所述电子账单的账户和所述安全元件的标识符是否已被认证,verifying whether the user of the second mobile device maintains an account for settlement of the electronic bill and whether the identifier of the secure element has been authenticated, 所述方法还包括:与金融机构交互加密信息以将所述第二移动装置的用户提供的结算金额转账给所述第一移动装置的用户的指定账户,该金融机构持有所述第二移动装置的用户的账户;一旦收到所述结算金额到达所述指定账户的确认信息,产生所述支付响应。The method further includes: exchanging encrypted information with a financial institution holding the second mobile device to transfer the settlement amount provided by the user of the second mobile device to a designated account of the user of the first mobile device. The account of the user of the device; upon receiving confirmation that the settlement amount has reached the designated account, generating the payment response. 5.根据权利要求1所述的方法,其特征在于:所述第一移动装置是非接触卡和用于产生所述电子账单的销售点装置的部分,所述非接触卡装载有所述电子账单,所述数据还包括所述个人化的安全元件的标识符和所述第一移动装置的用户的标识符,以方便借助可信服务管理的服务通过转账来结算在所述电子账单中的费用,5. The method of claim 1, wherein said first mobile device is part of a contactless card and a point of sale device for generating said electronic bill, said contactless card being loaded with said electronic bill , said data further comprising an identifier of said personalized secure element and an identifier of a user of said first mobile device to facilitate settlement of charges in said electronic bill by means of a service managed by a trusted service , 所述第二移动装置包括由金融机构提供资金的电子钱包,所述第二移动装置嵌入有模拟器以进行货币交易。The second mobile device includes an electronic wallet funded by a financial institution, the second mobile device having an emulator embedded therein for currency transactions. 6.根据权利要求5所述的方法,其特征在于:所述电子钱包由运行于所述第二移动装置上的程序来支持,经过所述第二移动装置的安全元件配置所述程序,所述方法还包括:6. The method according to claim 5, characterized in that: the electronic wallet is supported by a program running on the second mobile device, and the program is configured through the security element of the second mobile device, so The method also includes: 在所述程序和安全识别模块或支付服务器之间建立第一安全通道;establishing a first secure channel between the program and the secure identification module or payment server; 建立第二安全通道以在所述程序和原来用于发布所述程序的安全识别模块之间以及在所述模拟器和所述安全识别模块之间交换各种数据。A second secure channel is established to exchange various data between the program and the security identification module originally used to issue the program and between the simulator and the security identification module. 7.根据权利要求6所述的方法,其特征在于:其还包括:7. The method of claim 6, further comprising: 在所述第二移动装置上输入并收到有效个人身份号码后,开始来自所述程序的请求;Initiating a request from said program upon entry and receipt of a valid PIN on said second mobile device; 给一个支付服务器传输一个响应,该支付服务器被配置的用来核实所述响应是否来自一个经过认证的程序,其中所述支付服务器进一步与金融机构通讯以批准一个交易。A response is transmitted to a payment server configured to verify that the response is from an authenticated program, wherein the payment server further communicates with the financial institution to approve a transaction. 8.一种结算支付的网关,所述网关包括:8. A gateway for settlement and payment, said gateway comprising: 一个门户,其提供在嵌入有安全元件的第一移动装置上执行的软件模块,其中所述安全元件已经被个人化,经由所述安全元件配置所述软件模块,所述第一移动装置包括有关于一个电子账单的数据;A portal providing a software module executed on a first mobile device embedded with a secure element, wherein said secure element has been personalized, said software module configured via said secure element, said first mobile device comprising Data relating to an electronic bill; 一个服务器包括:A server consists of: 一个处理器,a processor, 与所述处理器连接的存储器,其用来存储在所述处理器上执行的代码,以使得所述服务器能够执行如下操作:A memory connected to the processor for storing codes executed on the processor, so that the server can perform the following operations: 在第二移动装置的用户批准了针对从所述第一移动装置无线的传输来的电子账单的支付后,接收来自所述第二移动装置的支付请求,其中所述第二移动装置是近场通信装置,其用来执行与所述第一移动装置中的软件模块进行通讯的一个应用以从所述第一移动装置读取所述数据;After a user of a second mobile device approves payment for an electronic bill wirelessly transmitted from the first mobile device, receiving a payment request from the second mobile device, wherein the second mobile device is a near field communication means for executing an application in communication with a software module in said first mobile device to read said data from said first mobile device; 核实所述支付请求;和verify said payment request; and 在所述支付请求被处理后,发送支付响应给所述第一移动装置的用户。After the payment request is processed, a payment response is sent to the user of the first mobile device. 9.根据权利要求8所述的网关,其特征在于:所述第二移动装置包括显示屏,当所述数据进入所述第二移动装置时,利用所述显示屏显示所述电子账单。9. The gateway according to claim 8, wherein said second mobile device includes a display screen for displaying said electronic bill when said data enters said second mobile device. 10.根据权利要求9所述的网关,其特征在于:所述核实所述支付请求包括:10. The gateway according to claim 9, wherein said verifying said payment request comprises: 当所述第二移动装置的用户提供的结算金额少于所述电子账单上的应付金额时,发送拒绝信息给所述第二移动装置;或When the settlement amount provided by the user of the second mobile device is less than the payable amount on the electronic bill, sending a rejection message to the second mobile device; or 当所述第二移动装置的用户提供的结算金额等于或大于所述电子账单上的应付金额时,继续支付流程。When the settlement amount provided by the user of the second mobile device is equal to or greater than the payable amount on the electronic bill, the payment process is continued. 11.根据权利要求10所述的网关,其特征在于:所述数据还包括所述个人化的安全元件的标识符,所述核实所述支付请求还包括:11. The gateway according to claim 10, wherein said data further includes an identifier of said personalized secure element, and said verifying said payment request further comprises: 核实所述第二移动装置的用户是否维持有用于结算所述电子账单的账户和所述安全元件的标识符是否已被认证,verifying whether the user of the second mobile device maintains an account for settlement of the electronic bill and whether the identifier of the secure element has been authenticated, 所述方法还包括:与金融机构交互加密信息以将所述第二移动装置的用户提供的结算金额转账给所述第一移动装置的用户的指定账户,该金融机构持有所述第二移动装置的用户的账户;一旦收到所述结算金额到达所述指定账户的确认信息,产生所述支付响应。The method further includes: exchanging encrypted information with a financial institution holding the second mobile device to transfer the settlement amount provided by the user of the second mobile device to a designated account of the user of the first mobile device. The account of the user of the device; upon receiving confirmation that the settlement amount has reached the designated account, generating the payment response. 12.根据权利要求8所述的网关,其特征在于:所述第一移动装置是非接触卡和用于产生所述电子账单的销售点装置的部分,所述非接触卡装载有所述电子账单,所述数据还包括所述个人化的安全元件的标识符和所述第一移动装置的用户的标识符,以方便借助可信服务管理的服务通过转账来结算在所述电子账单中的费用。12. The gateway of claim 8, wherein said first mobile device is part of a contactless card and a point of sale device for generating said electronic bill, said contactless card being loaded with said electronic bill , said data further comprising an identifier of said personalized secure element and an identifier of a user of said first mobile device, to facilitate settlement of charges in said electronic bill by transfer by means of a service managed by a trusted service . 13.根据权利要求8所述的网关,其特征在于:所述第二移动装置包括由金融机构提供资金的电子钱包,所述第二移动装置嵌入有模拟器以进行货币交易,所述电子钱包由运行于所述第二移动装置上的程序来支持,经过所述第二移动装置的安全元件配置所述程序,所述方法还包括:13. The gateway of claim 8, wherein said second mobile device includes an electronic wallet funded by a financial institution, said second mobile device embedding an emulator for currency transactions, said electronic wallet Supported by a program running on the second mobile device configured via a secure element of the second mobile device, the method further comprising: 在所述程序和安全识别模块或支付服务器之间建立第一安全通道;establishing a first secure channel between the program and the secure identification module or payment server; 建立第二安全通道以在所述程序和原来用于发布所述程序的安全识别模块之间以及在所述模拟器和所述安全识别模块之间交换各种数据。A second secure channel is established to exchange various data between the program and the security identification module originally used to issue the program and between the emulator and the security identification module. 14.根据权利要求13所述的网关,其特征在于:其还包括:14. The gateway according to claim 13, further comprising: 在所述第二移动装置上输入并收到有效个人身份号码后,开始来自所述程序的请求;Initiating a request from said program upon entry and receipt of a valid PIN on said second mobile device; 给一个支付服务器传输一个响应,该支付服务器被配置的用来核实所述响应是否来自一个经过认证的程序,其中所述支付服务器进一步与金融机构通讯以批准一个交易。A response is transmitted to a payment server configured to verify that the response is from an authenticated program, wherein the payment server further communicates with the financial institution to approve a transaction.
CN201810371537.7A 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device Pending CN108830586A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201261618802P 2012-04-01 2012-04-01
US61/618,802 2012-04-01
CN2013101097419A CN103258266A (en) 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN2013101097419A Division CN103258266A (en) 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device

Publications (1)

Publication Number Publication Date
CN108830586A true CN108830586A (en) 2018-11-16

Family

ID=48962167

Family Applications (4)

Application Number Title Priority Date Filing Date
CN2013101097419A Pending CN103258266A (en) 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device
CN201810371519.9A Pending CN108764865A (en) 2012-04-01 2013-03-31 A method and system for mobile payment
CN201810371537.7A Pending CN108830586A (en) 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device
CN201810371928.9A Pending CN108846661A (en) 2012-04-01 2013-03-31 Mobile device and method for implementing mobile payment between two mobile devices

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN2013101097419A Pending CN103258266A (en) 2012-04-01 2013-03-31 Apparatus and method for settlement and payment using mobile device
CN201810371519.9A Pending CN108764865A (en) 2012-04-01 2013-03-31 A method and system for mobile payment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810371928.9A Pending CN108846661A (en) 2012-04-01 2013-03-31 Mobile device and method for implementing mobile payment between two mobile devices

Country Status (1)

Country Link
CN (4) CN103258266A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024027869A1 (en) * 2022-08-01 2024-02-08 Giesecke+Devrient Advance52 Gmbh Secure element, method for registering tokens, and token reference register

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424696A (en) * 2013-09-02 2015-03-18 陈业军 Wearable mobile payment equipment and payment method
CN104571930B (en) * 2013-10-10 2018-01-30 中国移动通信集团公司 A kind of management method of security domain memory space, system and apply open platform device more
US11580518B2 (en) * 2014-01-03 2023-02-14 Apple Inc. Disabling mobile payments for lost electronic devices
EP2955872B1 (en) * 2014-06-12 2016-10-12 Nxp B.V. Method for configuring a secure element, key derivation program, computer program product and configurable secure element
CN107409160B (en) * 2015-03-11 2021-04-20 Em微电子-马林有限公司 Terminal-connected device for programming and managing function selection
CN105512874A (en) * 2015-09-01 2016-04-20 上海易码信息科技有限公司 Online to offline mobile payment method for wearable devices
CN105550869A (en) * 2015-10-30 2016-05-04 东莞酷派软件技术有限公司 NFC-based remote payment method, system and intelligent terminal
CN106888448B (en) * 2015-12-15 2020-08-04 中国移动通信集团公司 Application download method, secure element and terminal
CN105761073A (en) * 2016-01-29 2016-07-13 广东小天才科技有限公司 Mobile payment method and mobile payment device based on wearable equipment
CN107330685B (en) * 2016-04-29 2021-03-05 中国电信股份有限公司 NFC-based communication method and TSM system
CN108200078B (en) * 2018-01-18 2021-01-05 中国建设银行股份有限公司 Downloading and installing method of signature authentication tool and terminal equipment
CN108665377A (en) * 2018-05-22 2018-10-16 韶关市易通车联电子商务有限公司 Reward method, apparatus, server and readable storage medium storing program for executing are beaten in linkage based on high in the clouds
CN112561509A (en) * 2020-12-07 2021-03-26 常青藤科技河北有限公司 Payment method with electronic key and device thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001008113A1 (en) * 1999-07-22 2001-02-01 Visa International Service Association Internet payment, authentication and loading system using virtual smart card
KR20080027541A (en) * 2006-09-25 2008-03-28 에스케이 텔레콤주식회사 Payment service system and control method using mobile communication terminal and mobile communication terminal and operation method therefor
CN101295394A (en) * 2007-04-23 2008-10-29 美国通宝科技有限公司 Method and apparatus for providing electronic commerce and mobile commerce
US20110251892A1 (en) * 2010-04-09 2011-10-13 Kevin Laracey Mobile Phone Payment Processing Methods and Systems

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070031367A (en) * 2006-04-17 2007-03-19 (주)로이츠나인 Pointing device with security
US8118218B2 (en) * 2006-09-24 2012-02-21 Rich House Global Technology Ltd. Method and apparatus for providing electronic purse
CN101419726A (en) * 2007-10-22 2009-04-29 朗讯科技公司 Taxi fee payment system and method
JP2012505475A (en) * 2008-10-06 2012-03-01 ビボテック インコーポレーテッド System, method, and computer-readable medium for payment and non-payment virtual card transfer between mobile devices
WO2010056207A2 (en) * 2008-11-13 2010-05-20 Chong Beng Yap Method and system for paperless mobile billing and payment collection
US20100125495A1 (en) * 2008-11-17 2010-05-20 Smith Steven M System and method of providing a mobile wallet at a mobile telephone
CN101576983A (en) * 2009-06-16 2009-11-11 深圳市星龙基电子技术有限公司 Electronic payment method and system based on mobile terminal
CN101719247A (en) * 2009-11-30 2010-06-02 刘宜云 System and method for payment based on non-contact handheld payment terminal
CN102222293A (en) * 2011-06-01 2011-10-19 程永生 Mobile payment method, mobile terminal and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001008113A1 (en) * 1999-07-22 2001-02-01 Visa International Service Association Internet payment, authentication and loading system using virtual smart card
KR20080027541A (en) * 2006-09-25 2008-03-28 에스케이 텔레콤주식회사 Payment service system and control method using mobile communication terminal and mobile communication terminal and operation method therefor
CN101295394A (en) * 2007-04-23 2008-10-29 美国通宝科技有限公司 Method and apparatus for providing electronic commerce and mobile commerce
US20110251892A1 (en) * 2010-04-09 2011-10-13 Kevin Laracey Mobile Phone Payment Processing Methods and Systems

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024027869A1 (en) * 2022-08-01 2024-02-08 Giesecke+Devrient Advance52 Gmbh Secure element, method for registering tokens, and token reference register

Also Published As

Publication number Publication date
CN108764865A (en) 2018-11-06
CN103258266A (en) 2013-08-21
CN108846661A (en) 2018-11-20

Similar Documents

Publication Publication Date Title
US11004061B2 (en) Method and apparatus for payments between two mobile devices
US11018724B2 (en) Method and apparatus for emulating multiple cards in mobile devices
US11790332B2 (en) Mobile telephone transfer of funds
CN103117856B (en) Method and apparatus for configuring applications in a mobile device
CN103186858B (en) trusted service management method
CN108830586A (en) Apparatus and method for settlement and payment using mobile device
US20130139230A1 (en) Trusted Service Management Process
US9240009B2 (en) Mobile devices for commerce over unsecured networks
CN107087432B (en) Remote server encrypted data reservation system and method
CN103530775B (en) Method and system for providing a controllable trusted service management platform
CN103268249B (en) Method and device for simulating multiple cards in mobile device
US20120130838A1 (en) Method and apparatus for personalizing secure elements in mobile devices
US20120129452A1 (en) Method and apparatus for provisioning applications in mobile devices
CN103208065A (en) Method and apparatus for personalizing a secure element in a mobile device
US10210516B2 (en) Mobile devices for commerce over unsecured networks
CN107004195A (en) The safe handling of data
WO2017160877A1 (en) Technical architecture supporting tokenized payments
US20160335618A1 (en) Method and apparatus for providing e-commerce and m-commerce
CN104966196B (en) Method and apparatus for providing e-commerce and mobile commerce
US20170011391A1 (en) Method and apparatus for mobile payment
CN103325036B (en) Mobile device for conducting secure transactions over an unsecure network
KR102010013B1 (en) Non-facing transaction and payment method, management server using virtual payment information
WO2017180360A1 (en) System and method for providing token based employee corporate cards
KR20180089136A (en) Electronic transation method and system using virtual payment information
US12387211B2 (en) System and method using resource provider application on mobile device as an access device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination