CN105469253A - Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption - Google Patents

Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption Download PDF

Info

Publication number
CN105469253A
CN105469253A CN201510799024.2A CN201510799024A CN105469253A CN 105469253 A CN105469253 A CN 105469253A CN 201510799024 A CN201510799024 A CN 201510799024A CN 105469253 A CN105469253 A CN 105469253A
Authority
CN
China
Prior art keywords
mobile phone
payment method
merge
vocal print
facial characteristics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510799024.2A
Other languages
Chinese (zh)
Inventor
李云
陈庞森
孙山林
周卓伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Aerospace Technology
Original Assignee
Guilin University of Aerospace Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Aerospace Technology filed Critical Guilin University of Aerospace Technology
Priority to CN201510799024.2A priority Critical patent/CN105469253A/en
Publication of CN105469253A publication Critical patent/CN105469253A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a handset NFC safety payment method based on integrated voiceprint and face characteristic encryption. The method is characterized by comprising steps that, image acquisition and voice acquisition are carried out; the acquired image and the acquired voice are respectively processed; integrated processing on a face characteristic vector and a voice characteristic vector is carried out to acquire a characteristic vector P; the characteristic vector P is compressed to be in 256-bit bytes, and a characteristic vector T is acquired; the characteristic vector T is taken as a secret key and is stored in a handset as an initiation end, and the characteristic vector T is transmitted by utilizing a Diffie-Hellman key exchange algorithm to a target end; the characteristic vector T is taken as a symmetric secret key by two communication parties to carry out encryption communication. The method is carried out in an NFC point-to-point mode, and through the method, information safety interaction during handset NFC payment can be realized.

Description

The mobile phone NFC safe payment method encrypted is merged based on vocal print and facial characteristics
Technical field
The present invention relates to mobile-phone payment security fields, specifically a kind of based on vocal print and facial characteristics merge encrypt mobile phone NFC (NearFieldCommunication, be called for short NFC, near-field communication) safe payment method.
Background technology
Mobile phone not only has the feature that mobile communication, is not limited by space-time whenever and wherever possible, and also have the advantages such as popularization, portability and personalization, this is all that mobile phone provides the foundation as Mobile payment terminal.The mobile phone that popularity rate constantly raises by mobile phone wallet and the large high-tech product of bank card two merge, and provide the up-to-date means of payment and bring great convenience to daily life for people.
NFC technique is one of present extensively studied the short distance wireless communication technology, the advantages such as it is little that it has power consumption, convenient and swift.This technology is by merging development and application mutually in the near-field payment system of mobile terminal with network and tether-free technologies.Along with NFC technique development is constantly perfect, utilizes this technology to realize finance trade function on a mobile communication terminal, make payment transaction become more quick.
In the end of the year 2013, China mobile user has exceeded 12.35 hundred million, and near field payment register user is more than 6,000 ten thousand.The international mainstream such as Samsung, HTC cell phone manufacturer clearly represents, using the standard configuration of NFC technique as following mobile phone.Same by the end of the year 2013, the whole nation has 2,940,000 POS (pointofsale is abbreviated as POS) can accept financial IC (integratedcircuit the is abbreviated as IC) card that " QuickPass " identify.Noncontact accepts POS and is mostly laid on the small amounts such as fast food, public transport, food market quickly through field, and mobile payment industry development situation is good.
But the NFC ad hoc mode itself used when mobile phone NFC pays is without any encryption feature, by special radio-frequency apparatus, NFC interactive information can be intercepted, cause the information leakage of user, so still there are some safety problems when mobile phone NFC pays.
Summary of the invention
The object of the invention is for the deficiencies in the prior art, and provide a kind of and merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics.This method can realize the secure interactive of information when mobile phone NFC pays.
The technical scheme realizing the object of the invention is:
Merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is carried out data compression, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
Step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate;
Described Face datection adopts Hidden Markov Model (HMM);
Described face characteristic extracts and adopts active apparent model;
Described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing;
Described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
Step 3) in, the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
Step 4) in, data compression uses Huffman encoding.
Step 5) in, described enlightening luxuriant and rich with fragrance Herman Diffie-Hellman flow process is:
When NFC session establishment, the NFCID3 of stochastic generation is sent to originating end by destination end,
Originating end stochastic generation Big prime a, p, calculate A according to formula (1), and A, p be sent to destination end,
A=2 amodp(1)
Destination end stochastic generation Big prime b, calculates B according to formula (2), and B is sent to originating end,
B=2 bmodp(2)
Destination end and originating end calculate each self-generating K according to formula (3) and formula (4) respectively,
K=A bmodp(3)
K=B amodp(4)
Factor K is utilized to obtain 256 AES symmetric keys according to Secure Hash Algorithm;
Originating end stochastic generation random number INounce is also sent to destination end;
Destination end stochastic generation random number TNounce is also sent to originating end;
Originating end and destination end are used for 256 symmetric key KEY of AES encryption separately according to formula (5) each self-generating,
KEY=SHA2(INonce:NFCID3:K:TNonce)(5)
In formula, SHA is Secure Hash Algorithm (SecureHashAlgorithm is called for short SHA);
Originating end utilizes AES symmetric key to be encrypted the proper vector T after compression and is transferred to destination end;
Destination end obtains the proper vector T after compressing and it can be used as the key of subsequent communications after decoding.
The information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
This method is carried out under NFC ad hoc mode, and this method can realize the secure interactive of information when mobile phone NFC pays.
Accompanying drawing explanation
Fig. 1 is embodiment method flow schematic diagram.
Embodiment
Below in conjunction with drawings and Examples, content of the present invention is set forth, but be not limitation of the invention.
Embodiment:
With reference to Fig. 1, merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is carried out data compression, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
Step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate;
Described Face datection adopts Hidden Markov Model (HMM);
Described face characteristic extracts and adopts active apparent model;
Described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing;
Described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
Step 3) in, the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
Step 4) in, data compression uses Huffman encoding.
Step 5) in, described enlightening luxuriant and rich with fragrance Herman Diffie-Hellman flow process is:
When NFC session establishment, the NFCID3 of stochastic generation is sent to originating end by destination end,
Originating end stochastic generation Big prime a, p, calculate A according to formula (1), and A, p be sent to destination end,
A=2 amodp(1)
Destination end stochastic generation Big prime b, calculates B according to formula (2), and B is sent to originating end,
B=2 bmodp(2)
Destination end and originating end calculate each self-generating K according to formula (3) and formula (4) respectively,
K=A bmodp(3)
K=B amodp(4)
Factor K is utilized to obtain 256 AES symmetric keys according to Secure Hash Algorithm;
Originating end stochastic generation random number INounce is also sent to destination end;
Destination end stochastic generation random number TNounce is also sent to originating end;
Originating end and destination end are used for 256 symmetric key KEY of AES encryption separately according to formula (5) each self-generating,
KEY=SHA2(INonce:NFCID3:K:TNonce)(5)
In formula, SHA is Secure Hash Algorithm (SecureHashAlgorithm is called for short SHA);
Originating end utilizes AES symmetric key to be encrypted the proper vector T after compression and is transferred to destination end;
Destination end obtains the proper vector T after compressing and it can be used as the key of subsequent communications after decoding.
The information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
This method is carried out under NFC ad hoc mode.

Claims (9)

1. merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is compressed, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
2. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate.
3. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described Face datection adopts Hidden Markov Model (HMM).
4. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described face characteristic extracts and adopts active apparent model.
5. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing.
6. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
7. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 3), the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
8. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 4), data compression uses Huffman encoding.
9. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 5), the information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
CN201510799024.2A 2015-11-19 2015-11-19 Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption Pending CN105469253A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510799024.2A CN105469253A (en) 2015-11-19 2015-11-19 Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510799024.2A CN105469253A (en) 2015-11-19 2015-11-19 Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption

Publications (1)

Publication Number Publication Date
CN105469253A true CN105469253A (en) 2016-04-06

Family

ID=55606920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510799024.2A Pending CN105469253A (en) 2015-11-19 2015-11-19 Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption

Country Status (1)

Country Link
CN (1) CN105469253A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222719A (en) * 2019-05-10 2019-09-10 中国科学院计算技术研究所 A kind of character recognition method and system based on multiframe audio-video converged network
CN110363148A (en) * 2019-07-16 2019-10-22 中用科技有限公司 A kind of method of face vocal print feature fusion verifying
CN111756758A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Face-brushing payment data transmission system and method
CN111814128A (en) * 2020-09-01 2020-10-23 北京远鉴信息技术有限公司 Identity authentication method, device, equipment and storage medium based on fusion characteristics
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060093208A1 (en) * 2004-10-29 2006-05-04 Fayin Li Open set recognition using transduction
CN101261677A (en) * 2007-10-18 2008-09-10 周春光 New method-feature extraction layer amalgamation for face and iris
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area
US20110221567A1 (en) * 2006-02-17 2011-09-15 Lehnert Thomas R Biometric identification and analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060093208A1 (en) * 2004-10-29 2006-05-04 Fayin Li Open set recognition using transduction
US20110221567A1 (en) * 2006-02-17 2011-09-15 Lehnert Thomas R Biometric identification and analysis
CN101261677A (en) * 2007-10-18 2008-09-10 周春光 New method-feature extraction layer amalgamation for face and iris
CN101674299A (en) * 2009-10-16 2010-03-17 西安电子科技大学 Method for generating key based on amalgamation of multiple features in encryption area

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
中国无线电电子学文摘: "自动化技术_计算机技术", 《中国无线电电子学文摘》 *
倪国强等: "基于神经网络的数据融合技术的新进展", 《北京理工大学学报》 *
宋锐等: "自适应估计模糊参数的最大后验概率超分辨率复原算法", 《西安交通大学学报》 *
章红燕: "基于Fuzzy Vault的多生物特征加密方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 *
郭华: "基于神经网络的声纹识别系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 *
郭静: "基于指纹与虹膜特征级融合的加密模型研究", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222719A (en) * 2019-05-10 2019-09-10 中国科学院计算技术研究所 A kind of character recognition method and system based on multiframe audio-video converged network
CN110222719B (en) * 2019-05-10 2021-09-24 中国科学院计算技术研究所 Figure identification method and system based on multi-frame audio and video fusion network
CN110363148A (en) * 2019-07-16 2019-10-22 中用科技有限公司 A kind of method of face vocal print feature fusion verifying
CN111756758A (en) * 2020-06-28 2020-10-09 中国银行股份有限公司 Face-brushing payment data transmission system and method
CN111814128A (en) * 2020-09-01 2020-10-23 北京远鉴信息技术有限公司 Identity authentication method, device, equipment and storage medium based on fusion characteristics
CN111814128B (en) * 2020-09-01 2020-12-11 北京远鉴信息技术有限公司 Identity authentication method, device, equipment and storage medium based on fusion characteristics
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN115378591B (en) * 2022-07-18 2023-04-07 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion

Similar Documents

Publication Publication Date Title
CN105469253A (en) Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption
TWI676947B (en) Payment authentication method and authentication system based on face recognition and HCE
CN104834849B (en) Dual-factor identity authentication method and system based on Application on Voiceprint Recognition and recognition of face
US20150006390A1 (en) Using steganography to perform payment transactions through insecure channels
US20160048670A1 (en) Systems and methods to generate authorization data based on biometric data and non-biometric data
US20080313082A1 (en) Method and apparatus for proximity payment provisioning between a wireless communication device and a trusted party
TW201428529A (en) A fingerprint authentication system and fingerprint authentication method based on the near field communication (NFC)
CN101873583A (en) Mobile certificate device and control method thereof
CN102314731A (en) Mobile payment method and equipment for implementing same
CN103391201A (en) System and method for realizing smart card authentication based on voiceprint recognition
WO2017035898A1 (en) Fingerprint characteristic template encrypted storage method and system for mobile terminal
CN105550928B (en) System and method for remote account opening of commercial bank network
CN107370601B (en) Intelligent terminal, system and method integrating multiple security authentications
CN115336223A (en) Optimized private biometric matching
CN104751154A (en) Fingerprint safe encryption method based on intelligent mobile information device
AU2017319373A1 (en) Payment method and payment system based on security authentication mechanism
CN102254287A (en) Bank business mobile processing system and method
CN102592377A (en) Method for realizing finance card terminal by Bluetooth mobile phone
CN103258264A (en) Payment method and device based on NFC
CN104240077B (en) A kind of coding encrypting device based on short-distance wireless communication technology
CN104898410B (en) A kind of smartwatch recharge method
WO2013174325A2 (en) Method and apparatus for implementing mobile payment
CN101635076B (en) A kind of transaction system and implementation method
CN101552830A (en) Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof
WO2016086708A1 (en) Payment verification method, apparatus and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160406

WD01 Invention patent application deemed withdrawn after publication