CN105469253A - Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption - Google Patents
Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption Download PDFInfo
- Publication number
- CN105469253A CN105469253A CN201510799024.2A CN201510799024A CN105469253A CN 105469253 A CN105469253 A CN 105469253A CN 201510799024 A CN201510799024 A CN 201510799024A CN 105469253 A CN105469253 A CN 105469253A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- payment method
- merge
- vocal print
- facial characteristics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a handset NFC safety payment method based on integrated voiceprint and face characteristic encryption. The method is characterized by comprising steps that, image acquisition and voice acquisition are carried out; the acquired image and the acquired voice are respectively processed; integrated processing on a face characteristic vector and a voice characteristic vector is carried out to acquire a characteristic vector P; the characteristic vector P is compressed to be in 256-bit bytes, and a characteristic vector T is acquired; the characteristic vector T is taken as a secret key and is stored in a handset as an initiation end, and the characteristic vector T is transmitted by utilizing a Diffie-Hellman key exchange algorithm to a target end; the characteristic vector T is taken as a symmetric secret key by two communication parties to carry out encryption communication. The method is carried out in an NFC point-to-point mode, and through the method, information safety interaction during handset NFC payment can be realized.
Description
Technical field
The present invention relates to mobile-phone payment security fields, specifically a kind of based on vocal print and facial characteristics merge encrypt mobile phone NFC (NearFieldCommunication, be called for short NFC, near-field communication) safe payment method.
Background technology
Mobile phone not only has the feature that mobile communication, is not limited by space-time whenever and wherever possible, and also have the advantages such as popularization, portability and personalization, this is all that mobile phone provides the foundation as Mobile payment terminal.The mobile phone that popularity rate constantly raises by mobile phone wallet and the large high-tech product of bank card two merge, and provide the up-to-date means of payment and bring great convenience to daily life for people.
NFC technique is one of present extensively studied the short distance wireless communication technology, the advantages such as it is little that it has power consumption, convenient and swift.This technology is by merging development and application mutually in the near-field payment system of mobile terminal with network and tether-free technologies.Along with NFC technique development is constantly perfect, utilizes this technology to realize finance trade function on a mobile communication terminal, make payment transaction become more quick.
In the end of the year 2013, China mobile user has exceeded 12.35 hundred million, and near field payment register user is more than 6,000 ten thousand.The international mainstream such as Samsung, HTC cell phone manufacturer clearly represents, using the standard configuration of NFC technique as following mobile phone.Same by the end of the year 2013, the whole nation has 2,940,000 POS (pointofsale is abbreviated as POS) can accept financial IC (integratedcircuit the is abbreviated as IC) card that " QuickPass " identify.Noncontact accepts POS and is mostly laid on the small amounts such as fast food, public transport, food market quickly through field, and mobile payment industry development situation is good.
But the NFC ad hoc mode itself used when mobile phone NFC pays is without any encryption feature, by special radio-frequency apparatus, NFC interactive information can be intercepted, cause the information leakage of user, so still there are some safety problems when mobile phone NFC pays.
Summary of the invention
The object of the invention is for the deficiencies in the prior art, and provide a kind of and merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics.This method can realize the secure interactive of information when mobile phone NFC pays.
The technical scheme realizing the object of the invention is:
Merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is carried out data compression, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
Step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate;
Described Face datection adopts Hidden Markov Model (HMM);
Described face characteristic extracts and adopts active apparent model;
Described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing;
Described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
Step 3) in, the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
Step 4) in, data compression uses Huffman encoding.
Step 5) in, described enlightening luxuriant and rich with fragrance Herman Diffie-Hellman flow process is:
When NFC session establishment, the NFCID3 of stochastic generation is sent to originating end by destination end,
Originating end stochastic generation Big prime a, p, calculate A according to formula (1), and A, p be sent to destination end,
A=2
amodp(1)
Destination end stochastic generation Big prime b, calculates B according to formula (2), and B is sent to originating end,
B=2
bmodp(2)
Destination end and originating end calculate each self-generating K according to formula (3) and formula (4) respectively,
K=A
bmodp(3)
K=B
amodp(4)
Factor K is utilized to obtain 256 AES symmetric keys according to Secure Hash Algorithm;
Originating end stochastic generation random number INounce is also sent to destination end;
Destination end stochastic generation random number TNounce is also sent to originating end;
Originating end and destination end are used for 256 symmetric key KEY of AES encryption separately according to formula (5) each self-generating,
KEY=SHA2(INonce:NFCID3:K:TNonce)(5)
In formula, SHA is Secure Hash Algorithm (SecureHashAlgorithm is called for short SHA);
Originating end utilizes AES symmetric key to be encrypted the proper vector T after compression and is transferred to destination end;
Destination end obtains the proper vector T after compressing and it can be used as the key of subsequent communications after decoding.
The information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
This method is carried out under NFC ad hoc mode, and this method can realize the secure interactive of information when mobile phone NFC pays.
Accompanying drawing explanation
Fig. 1 is embodiment method flow schematic diagram.
Embodiment
Below in conjunction with drawings and Examples, content of the present invention is set forth, but be not limitation of the invention.
Embodiment:
With reference to Fig. 1, merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is carried out data compression, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
Step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate;
Described Face datection adopts Hidden Markov Model (HMM);
Described face characteristic extracts and adopts active apparent model;
Described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing;
Described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
Step 3) in, the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
Step 4) in, data compression uses Huffman encoding.
Step 5) in, described enlightening luxuriant and rich with fragrance Herman Diffie-Hellman flow process is:
When NFC session establishment, the NFCID3 of stochastic generation is sent to originating end by destination end,
Originating end stochastic generation Big prime a, p, calculate A according to formula (1), and A, p be sent to destination end,
A=2
amodp(1)
Destination end stochastic generation Big prime b, calculates B according to formula (2), and B is sent to originating end,
B=2
bmodp(2)
Destination end and originating end calculate each self-generating K according to formula (3) and formula (4) respectively,
K=A
bmodp(3)
K=B
amodp(4)
Factor K is utilized to obtain 256 AES symmetric keys according to Secure Hash Algorithm;
Originating end stochastic generation random number INounce is also sent to destination end;
Destination end stochastic generation random number TNounce is also sent to originating end;
Originating end and destination end are used for 256 symmetric key KEY of AES encryption separately according to formula (5) each self-generating,
KEY=SHA2(INonce:NFCID3:K:TNonce)(5)
In formula, SHA is Secure Hash Algorithm (SecureHashAlgorithm is called for short SHA);
Originating end utilizes AES symmetric key to be encrypted the proper vector T after compression and is transferred to destination end;
Destination end obtains the proper vector T after compressing and it can be used as the key of subsequent communications after decoding.
The information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
This method is carried out under NFC ad hoc mode.
Claims (9)
1. merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, comprise the steps:
1) image capture and voice collecting: carry out image capture with mobile phone camera; Voice collecting is carried out with mobile phone microphone;
2) voice of the image of catching and collection are processed respectively: the process of image comprises the extraction of Image semantic classification, Face datection and face characteristic and obtains face feature vector; Speech processes comprises voice pre-service and speech feature extraction, obtains speech feature vector;
3) face feature vector and speech feature vector are carried out fusion treatment, obtain proper vector P;
4) proper vector P is compressed, be compressed to 256 bit bytes, obtain proper vector T;
5) using proper vector T as key storage in mobile phone as originating end, and be delivered to destination end with the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening;
6) proper vector T is encrypted communication as symmetric key by communicating pair.
2. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, the super-resolution algorithms that described Image semantic classification adopts the process adaptive that degrades based on posterior information to estimate.
3. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described Face datection adopts Hidden Markov Model (HMM).
4. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described face characteristic extracts and adopts active apparent model.
5. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described voice pre-service comprises: sample quantization, pre-emphasis, get sound frame and windowing.
6. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, step 2) in, described speech feature extraction is the mel-frequency cepstrum coefficient extracted.
7. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 3), the fusion of proper vector is the Feature-level fusion algorithm based on neural network.
8. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 4), data compression uses Huffman encoding.
9. according to claim 1ly merge the mobile phone NFC safe payment method encrypted based on vocal print and facial characteristics, it is characterized in that, in step 5), the information interaction of the luxuriant and rich with fragrance Herman Diffie-Hellman of enlightening can by either party.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510799024.2A CN105469253A (en) | 2015-11-19 | 2015-11-19 | Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510799024.2A CN105469253A (en) | 2015-11-19 | 2015-11-19 | Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105469253A true CN105469253A (en) | 2016-04-06 |
Family
ID=55606920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510799024.2A Pending CN105469253A (en) | 2015-11-19 | 2015-11-19 | Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105469253A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222719A (en) * | 2019-05-10 | 2019-09-10 | 中国科学院计算技术研究所 | A kind of character recognition method and system based on multiframe audio-video converged network |
CN110363148A (en) * | 2019-07-16 | 2019-10-22 | 中用科技有限公司 | A kind of method of face vocal print feature fusion verifying |
CN111756758A (en) * | 2020-06-28 | 2020-10-09 | 中国银行股份有限公司 | Face-brushing payment data transmission system and method |
CN111814128A (en) * | 2020-09-01 | 2020-10-23 | 北京远鉴信息技术有限公司 | Identity authentication method, device, equipment and storage medium based on fusion characteristics |
CN115378591A (en) * | 2022-07-18 | 2022-11-22 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060093208A1 (en) * | 2004-10-29 | 2006-05-04 | Fayin Li | Open set recognition using transduction |
CN101261677A (en) * | 2007-10-18 | 2008-09-10 | 周春光 | New method-feature extraction layer amalgamation for face and iris |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
US20110221567A1 (en) * | 2006-02-17 | 2011-09-15 | Lehnert Thomas R | Biometric identification and analysis |
-
2015
- 2015-11-19 CN CN201510799024.2A patent/CN105469253A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060093208A1 (en) * | 2004-10-29 | 2006-05-04 | Fayin Li | Open set recognition using transduction |
US20110221567A1 (en) * | 2006-02-17 | 2011-09-15 | Lehnert Thomas R | Biometric identification and analysis |
CN101261677A (en) * | 2007-10-18 | 2008-09-10 | 周春光 | New method-feature extraction layer amalgamation for face and iris |
CN101674299A (en) * | 2009-10-16 | 2010-03-17 | 西安电子科技大学 | Method for generating key based on amalgamation of multiple features in encryption area |
Non-Patent Citations (6)
Title |
---|
中国无线电电子学文摘: "自动化技术_计算机技术", 《中国无线电电子学文摘》 * |
倪国强等: "基于神经网络的数据融合技术的新进展", 《北京理工大学学报》 * |
宋锐等: "自适应估计模糊参数的最大后验概率超分辨率复原算法", 《西安交通大学学报》 * |
章红燕: "基于Fuzzy Vault的多生物特征加密方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 * |
郭华: "基于神经网络的声纹识别系统设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 * |
郭静: "基于指纹与虹膜特征级融合的加密模型研究", 《中国优秀硕士学位论文全文数据库 信息科技辑(月刊)》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222719A (en) * | 2019-05-10 | 2019-09-10 | 中国科学院计算技术研究所 | A kind of character recognition method and system based on multiframe audio-video converged network |
CN110222719B (en) * | 2019-05-10 | 2021-09-24 | 中国科学院计算技术研究所 | Figure identification method and system based on multi-frame audio and video fusion network |
CN110363148A (en) * | 2019-07-16 | 2019-10-22 | 中用科技有限公司 | A kind of method of face vocal print feature fusion verifying |
CN111756758A (en) * | 2020-06-28 | 2020-10-09 | 中国银行股份有限公司 | Face-brushing payment data transmission system and method |
CN111814128A (en) * | 2020-09-01 | 2020-10-23 | 北京远鉴信息技术有限公司 | Identity authentication method, device, equipment and storage medium based on fusion characteristics |
CN111814128B (en) * | 2020-09-01 | 2020-12-11 | 北京远鉴信息技术有限公司 | Identity authentication method, device, equipment and storage medium based on fusion characteristics |
CN115378591A (en) * | 2022-07-18 | 2022-11-22 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
CN115378591B (en) * | 2022-07-18 | 2023-04-07 | 咚咚数字科技有限公司 | Anonymous biological characteristic key transmission method based on fusion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105469253A (en) | Handset NFC safety payment method based on integrated voiceprint and face characteristic encryption | |
TWI676947B (en) | Payment authentication method and authentication system based on face recognition and HCE | |
CN104834849B (en) | Dual-factor identity authentication method and system based on Application on Voiceprint Recognition and recognition of face | |
US20150006390A1 (en) | Using steganography to perform payment transactions through insecure channels | |
US20160048670A1 (en) | Systems and methods to generate authorization data based on biometric data and non-biometric data | |
US20080313082A1 (en) | Method and apparatus for proximity payment provisioning between a wireless communication device and a trusted party | |
TW201428529A (en) | A fingerprint authentication system and fingerprint authentication method based on the near field communication (NFC) | |
CN101873583A (en) | Mobile certificate device and control method thereof | |
CN102314731A (en) | Mobile payment method and equipment for implementing same | |
CN103391201A (en) | System and method for realizing smart card authentication based on voiceprint recognition | |
WO2017035898A1 (en) | Fingerprint characteristic template encrypted storage method and system for mobile terminal | |
CN105550928B (en) | System and method for remote account opening of commercial bank network | |
CN107370601B (en) | Intelligent terminal, system and method integrating multiple security authentications | |
CN115336223A (en) | Optimized private biometric matching | |
CN104751154A (en) | Fingerprint safe encryption method based on intelligent mobile information device | |
AU2017319373A1 (en) | Payment method and payment system based on security authentication mechanism | |
CN102254287A (en) | Bank business mobile processing system and method | |
CN102592377A (en) | Method for realizing finance card terminal by Bluetooth mobile phone | |
CN103258264A (en) | Payment method and device based on NFC | |
CN104240077B (en) | A kind of coding encrypting device based on short-distance wireless communication technology | |
CN104898410B (en) | A kind of smartwatch recharge method | |
WO2013174325A2 (en) | Method and apparatus for implementing mobile payment | |
CN101635076B (en) | A kind of transaction system and implementation method | |
CN101552830A (en) | Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof | |
WO2016086708A1 (en) | Payment verification method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160406 |
|
WD01 | Invention patent application deemed withdrawn after publication |