CN105844468A - Mobile-terminal ultra-low power consumption and high safety communication method - Google Patents
Mobile-terminal ultra-low power consumption and high safety communication method Download PDFInfo
- Publication number
- CN105844468A CN105844468A CN201610153443.3A CN201610153443A CN105844468A CN 105844468 A CN105844468 A CN 105844468A CN 201610153443 A CN201610153443 A CN 201610153443A CN 105844468 A CN105844468 A CN 105844468A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- terminal
- information
- user
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3229—Use of the SIM of a M-device as secure element
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to the data communication technology field and especially relates to a mobile-terminal ultra-low power consumption and high safety communication method and a high-safety online payment method. The mobile-terminal ultra-low power consumption and high safety communication method comprises the following steps that a standard verification information of a user is prefabricated in a SIM unit of a mobile terminal; when a first communication module in the mobile terminal receives an identity verification request, an identity information acquisition module of the mobile terminal acquires identity information of a current user; whether the identity information matches with the standard verification information is determined, and a determination result is formed and output.
Description
Technical field
The present invention relates to data communication technology field, particularly relate to a kind of mobile terminal super low-power consumption
Communication means and the on-line payment of high security with high security.
Background technology
Traditional mobile terminal, such as mobile phone, typically utilize when carrying out authentication and specifically add
Decipherment algorithm and key carry out identification, but are as the development of information technology, and encryption and decryption is calculated
The attack that method suffers gets more and more, and carries out authentication hence with enciphering and deciphering algorithm and key
Traditional mobile terminal is more and more dangerous, if the key that user carries out authentication is stolen
Take or artificially revealed, then unprincipled fellow will utilize the key of user to carry out identity to recognize
Card, replaces user send corresponding instruction or perform corresponding operation, thus user is caused one
Fixed loss, the safety carrying out authentication hence with enciphering and deciphering algorithm and key has been got over
Come the lowest.Due to the uniqueness of biological characteristic, the most increasing mobile terminal manufacturer starts
Biometrics identification technology is utilized to carry out authentication, such as fingerprint recognition, iris identification etc.,
Therefore increasing mobile terminal uses living things feature recognition to carry out authentication, such as Fructus Mali pumilae
Mobile phone, Samsung mobile phone use fingerprint recognition to carry out authentication.
The most increasing mobile terminal such as mobile phone is equipped with biomedical information acquisition module, uses
The biological information at family is typically stored in the flash memory in high in the clouds or mobile phone, but by user
Biological information be stored in the flash memory in high in the clouds or mobile phone and dangerous, because user
Biological information still may be stolen by hacker, so that user suffers a loss.
For mobile terminals such as smart mobile phones, being the most all made up of two processors, being respectively should
By processor and baseband processor, along with smart mobile phone function is more and more and application program is got over
Coming the most complicated, application processor and baseband processor in smart mobile phone all will realize advanced person's
Under technology condition, the advanced work such as such as 28nm/20nm/16nm/10nm/7nm FinFET
Skill, but it is as reducing of process, the leakage current of CMOS is increasing, therefore to
Save smart mobile phone power consumption, in the standby state application processor or/and baseband processor all
Can be switched off, therefore smart mobile phone took long enough when standby mode transfers mode of operation to
The startup time, because data need the flash memory from mobile phone to be transported in the internal memory in mobile phone, then
By application processor or/and baseband processor.Such as mobile currently with smart mobile phone etc.
It is more and more universal that terminal carries out small amount payment, is converted to carry out little from standby mode at smart mobile phone
When volume pays, the information of user needs to be transported in smart mobile phone from the flash memory of smart mobile phone
In depositing, by application processor or/and baseband processor completes small amount payment, therefore from standby
State to application processor or/and baseband processor completes small amount payment takes long enough, when
After completing to pay, application processor, or/and baseband processor is closed, enters standby mode,
If the frequency of small amount payment is the highest, completes small amount payment every time and be required for long time, and
And the application processor that needs ceaselessly to open and close in smart mobile phone is or/and Base-Band Processing
Device, therefore all starts the application processor in smart mobile phone when each small amount payment or/and base
Provided with processor power consumption is bigger.
Summary of the invention
For the deficiencies in the prior art, the present invention provides a kind of mobile terminal super low-power consumption and Gao An
The communication means of full property and the on-line payment of high security.
A kind of mobile terminal super low-power consumption and the communication means of high security, the SIM of mobile terminal
Unit under described mobile terminal is in standby mode according to identity information and criterion validation information
Formation judged result exports;Described communication means includes:
Step A1, in described SIM unit, it is prefabricated with the described criterion validation information of user;
Step A2, receive authentication request when the first communication module in described mobile terminal
Time, the identity information acquisition module of described mobile terminal obtains the described identity letter of active user
Breath;
Step A3, judge whether described identity information mates described criterion validation information, and formed
One judged result output.
Preferably, described standby mode is that the screen of described mobile terminal is closed, no
Showing any information, screen is in off-position.
Preferably, in described step A1, specifically include:
Step A11, described SIM unit receive described criterion validation information, and to described standard
Checking information is encrypted and stores.
Preferably, in described step A3, specifically include:
Step A31: described SIM unit receives described identity information;
Step A32, described SIM unit are believed according to described identity information and described criterion validation
Breath, is formed described judged result and is exported by described first communication module.
Preferably, before described step A2, a transaction terminal sends described authentication please
Ask to described mobile terminal.
Preferably, after described step A3, described first communication module sends described judgement
Result is to described transaction terminal, after described transaction terminal completes to pay according to described judged result,
When described mobile terminal is in mode of operation next time, described mobile terminal shows and described
Pay the Transaction Information that authentication request matches.
Preferably, described mode of operation is on screen after electric-opening, the base band of described mobile terminal
Processor powers on, i.e. can be by network formats such as GSM, CDMA or LTE with extraneous
Equipment carries out data exchange.
Preferably, described criterion validation information is biological information.
Preferably, described first communication module and described transaction terminal are by short haul connection mode
Communicate, such as bluetooth or wifi or ZigBee or NFC.
Preferably, before described step A2, in a high in the clouds, pre-stored is tested with described identity
The emergency operation instruction that card request is corresponding, an identity authentication terminal sends described authentication please
Ask to described first communication module.
Preferably, after described step A3, when described identity information and described criterion validation
Information matches, described first communication module sends described judged result to described authentication eventually
End, described identity authentication terminal forwards described judged result to described high in the clouds, and described high in the clouds performs
Described emergency operation instructs.
A kind of on-line payment of high security, including terminal unit and the first mobile terminal,
One payment application is installed in described terminal unit, described first mobile terminal at least wraps
Include an identity information acquisition module, SIM unit;On-line payment includes:
Step B1, described terminal unit need pay based on described payment application time,
Output one payment authentication request;
Step B2, described first mobile terminal pass sequentially through a second communication module, Base-Band Processing
Device or application processor receive described authentication request, and lead to according to described authentication request
Cross identity information acquisition module obtain and send identity information;
Step B3, described SIM unit receive described identity information, and combine prefabricated standard and test
Card information forms a judged result output;
Step B4, described terminal unit receive described judged result, are true in described judged result
Time, confirm to pay.
Preferably, also include that Third-party payment platform, described on-line payment also include:
Step B5, after described step B4, described terminal unit perform confirm delivery operation
After, the finance account of both sides is done by Third-party payment platform according to described payment authentication request
Process operation accordingly.
Preferably, described terminal unit is mobile terminal or fixed terminal.
Compared with prior art, the invention have the advantage that
(1) mobile terminal realizes its payment transaction under being in standby mode, in the first communication mould
Block receive payment authentication request time, obtain user identity information, SIM unit according to
The identity information of user judges with criterion validation information, and forms a judged result output,
Outside payment terminal obtains this judged result, when judged result is true time, performs delivery operation,
When judged result is fictitious time, terminate delivery operation.Process in the application not enabled in mobile terminal
Device is or/and complete in the case of baseband processor to pay, and power consumption is relatively low, simultaneously by standard identity
Checking information is stored in SIM unit, it is to avoid standard identity checking information is stolen, and improves
The safety paid.
(2) means of payment on a kind of line based on mobile terminal, it is adaptable to the first mobile terminal
There is no corresponding acquisition module, the mobile terminal of SIM unit, can be single by means of having collection
Unit, the second mobile terminal of SIM unit complete transaction.On the one hand can make up first moves end
The partial function defect of end, on the other hand can improve the safety of transaction.
(3) means of payment on a kind of line based on mobile terminal, it is adaptable to comprise acquisition module,
The mobile terminal of SIM unit, stores criterion validation information by SIM unit, improves transaction
Safety.
Accompanying drawing explanation
Fig. 1 is the structure chart of the mobile terminal of the method that the present invention proposes;
Fig. 2 is the structure chart of the off-line transaction pattern that the present invention proposes;
Fig. 3 is the block diagram of the off-line transaction pattern that the present invention proposes;
Fig. 4 is the structure chart of the first online trading pattern that the present invention proposes;
Fig. 5 is the knot of the 3rd energy area in the first online trading pattern that the present invention proposes
Composition;
Fig. 6 is the identification step figure of the first online trading pattern that the present invention proposes;
Fig. 7 is the structure chart of the optional first online trading pattern that the present invention proposes;
Fig. 8 is the structure chart of the second online trading pattern that the present invention proposes;
Fig. 9 is the identification step figure of the second online trading pattern that the present invention proposes;
Figure 10-Figure 12 is that the super low-power consumption model application that proposes of the present invention is in the knot of particular case
Composition;
Figure 13 is the flow chart of the communication means of the present invention a kind of mobile terminal super low-power consumption.
Detailed description of the invention
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as this
The restriction of invention.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the technical side in the embodiment of the present invention
Case is clearly and completely described, it is clear that described embodiment is only the present invention one
Divide embodiment rather than whole embodiments.Based on the embodiment in the present invention, this area is general
The every other enforcement that logical technical staff is obtained on the premise of not making creative work
Example, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, the embodiment in the present invention and embodiment
In feature can be mutually combined.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as this
The restriction of invention.
Embodiment one
As shown in figure 13, the communication means of a kind of mobile terminal super low-power consumption, SIM unit exists
Described mobile terminal is under standby mode to be formed according to identity information and criterion validation information to be sentenced
Disconnected result output, described standby mode is that the screen of described mobile terminal is closed, no
Showing any information, screen is in off-position, but is not limited to state described above;Concrete bag
Include:
Step A1, in described SIM unit, it is prefabricated with the described criterion validation information of user;
Step A2, receive authentication request when the first communication module in described mobile terminal
Time, the identity information acquisition module of described mobile terminal obtains the described identity letter of active user
Breath;
Step A3, judge whether described identity information mates described criterion validation information, and formed
One judged result output.
It should be noted that in the present embodiment when this mobile terminal receives authentication request,
And all need not open the baseband processor in conventional solution when exporting judged result,
Because opening baseband processor to need bigger power consumption, and the application being by a first communication module
Directly receive authentication request, reduce the communication power consumption of mobile terminal.
Embodiment two
The present embodiment proposes and a kind of is not starting the application processor of mobile terminal or/and base band
Processor and high security and the method completing small amount payment of super low-power consumption, by by biology
Characteristic information is stored in the embedded non-volatile memory of SIM (SIM unit),
Thus ensure being perfectly safe of criterion validation information (illustrating below) with biological information,
By adding a first communication module, mobile terminal is recognized with external identity by first communication module
Card terminal (transaction terminal) communicates, and first communication module enters with external identity certification terminal
Row communication communication protocol be short-range wireless communication protocol, such as NFC, RF, BLE and
ZigBee etc., by having present embodiment ensure that being perfectly safe of finger print information, simultaneously can be
Do not enable the application processor in mobile terminal or/and complete small amount in the case of baseband processor
Pay.
Utilize the structure of mobile terminal of the method that the present embodiment proposes as shown in Figure 1, Fig. 1
Middle 1_1 is baseband processor, and baseband processor is mainly responsible for mobile terminal (can be mobile phone)
Network service with other equipment and the process of data, 1_2 is second communication module, this nothing
The transmission of data that line communication module is responsible between mobile phone and the external world, such as mobile phone use GSM or
The network formats of person LTE carries out data exchange, 1_3 by second communication module and other equipment
For biological information acquisition module (identity information acquisition module), for identity information (after
Literary composition illustrate with biological information) collection, described collecting biological feature information module
1_3 may be located at some button of mobile terminal, and (these buttons can be that physical button can also be
Virtual key) below, the finger print acquisition module of the most described i Phone is positioned at mobile phone
Under Home key;Described collecting biological feature information module 1_3 can also be positioned at mobile terminal screen
Below Mu.1_4 is first communication module, when mobile terminal needs to carry out authentication,
Mobile terminal is communicated with extraneous identity authentication terminal by first communication module, and optimum the
The communication protocol that one communication module and external identity certification terminal communicate is short-distance wireless
Communication protocol, such as NFC, RF, BLE, ZigBee etc., 1_5 is that SIM unit (can
To be SIM), for identification and the storage of biological information of identity, 1_6 is for mobile
Other ingredients of terminal.In the method that the present embodiment proposes, the biological characteristic letter of user
Breath is stored in the embedded non-volatile memory of SIM, because the safety etc. of SIM
Level is the highest, thereby ensure that user fingerprints information the one of identity information (finger print information can be)
Be perfectly safe, wherein, first communication module and SIM 1_5 can be made in chip piece
On, it is also possible to do not do on one chip.One first energy area is here proposed, for complete
Becoming authentication during small amount payment, described first energy area is at least by following module group
Become, respectively 1_3 collecting biological feature information module, 1_4 wireless communication module 1 and 1_5
SIM.In mobile terminal, other modules in addition to the first energy area module belong to the second energy
Amount region.What the present embodiment proposed utilizes biological information to carry out the method for authentication independently
In other third-party authentication modes, although other third-party authentication modes can also utilize life
Thing characteristic information carries out identification, but user biological characteristic information is stored in high in the clouds or clothes
In business device, possibility is compromised or is stolen, and in the method that the present embodiment proposes, by using
The embedded non-volatile of the SIM 1_5 that family biological information is stored in mobile terminal is deposited
In reservoir, it is ensured that being perfectly safe of user biological characteristic information.
The method proposed based on the present embodiment, proposes a kind of off-line transaction method of super low-power consumption.
Under this trade mode, the first energy area of mobile terminal is opened, and the second energy area closes
Closing, i.e. the application processor in mobile terminal is or/and baseband processor is all to close, therefore
The advantage that this kind of off-line transaction method that the present embodiment proposes has super low-power consumption.The present embodiment carries
As shown in Figure 2, in figure, 2_1 is transaction terminal to the concrete structure of the off-line transaction method gone out,
For sending communication request to mobile terminal and asking user to carry out authentication, here conclude the business
Terminal can be POS, subway gate etc..In figure, 2_2 is the of the mobile terminal of user
One energy area (under this kind of off-line transaction pattern, open by the first energy area of mobile terminal
And the second energy area is closed, the most only depict the first energy of mobile terminal
Region), the ingredient of the first energy area 2_2 is already described above, the most no longer
Repeat.Described wireless communication module 1 in described first energy area 2_2 is for mobile terminal
With communicating of described transaction terminal 2_1, conclude the business eventually to described for authentication result is sent
End 2_1, described collecting biological feature information module 2_3 is adopted for user biological characteristic information
Collection, described SIM 2_5 for the storage of biological information, perform encryption and decryption operation and
The task of authentication, according to specific algorithm, the most described collecting biological feature information module
The user biological of storage in user biological characteristic information that 2_3 collects and described SIM 2_5
Characteristic information matches, and user authentication could pass through.
Now citing illustrates, and user A is buyer, and trade company B is the owner of commodity,
Before introducing the step that the method utilizing the present embodiment to propose carries out off-line transaction, first should have
Following steps: 1, user A supplements with money in SIM, for the payment of commodity;2, user
Some commodity of A Yao Mai trade company B;3, the telecommunications the 3rd concluded the business for user A and trade company B
Side's payment platform;Assume that user A and trade company B all sets on the Third-party payment platform of telecommunications
Putting corresponding accounts information, this accounts information can be SIM account or bank card account
Family, it is assumed that the account that user A and trade company B is arranged on this payment platform is respectively account A
With account B, the price of the commodity that user A buys trade company B is X, when user A buys business
During the commodity of family B, the corresponding goods of account A of telecommunications Third-party payment platform deduction user A
Money X, increases corresponding payment for goods X in account B of trade company B.
The present embodiment propose off-line transaction pattern step as shown in Figure 3:
Step one: trade company B transaction terminal 2_1 initiates communication request to user's A mobile terminal
And ask user A to carry out authentication;
Step 2: collecting biological feature information module 2_3 in user's A mobile terminal gathers
The biological information of user A input is for subscriber authentication;
Step 3: according to specific algorithm, biological information is adopted by SIM module 2_5
The biological information of the user A that collection module 2_3 collects moves with being stored in user A
Biological information in dynamic terminal SIM embedded non-volatile memory compares
Relatively and coupling;
Step 4: SIM module 2_5 passes through radio communication mold according to the result of comparison match
Block 1 is to the transaction terminal feedback information of trade company B, if collecting biological feature information mould
The biological information of the user A that block 2_3 collects and be stored in user A and move end
Biological information in end SIM nonvolatile memory does not mates, SIM mould
Block 2_5 feeds back to mono-error message of transaction terminal 2_1, and transaction flow terminates, instead
It, if the user A's that collects of collecting biological feature information module 2_3 is biological special
Reference ceases and is stored in the SIM embedded non-volatile storage of user's A mobile terminal
Biometric information matches in device, continues next step operation;
Step 5: user A is in the transaction terminal 2_1 input validation information of trade company B;
Step 6: telecommunications Third-party payment platform confirms whether account A of user A meets and hands over
Easy condition: if user A is on telecommunications Third-party payment platform in current transaction
Account A meet transaction condition (such as the remaining sum of account A of user A more than should
The price of payment for merchandise), then conclude the business specifically, telecommunications third party transaction platform
Corresponding payment for goods in deduction buyer's account, and on merchant account, increase corresponding goods
Money, payment for goods here refers to the price of commodity;If user A in current transaction
Account A be unsatisfactory for transaction condition (the such as remaining sum of account A of user A is less than
Answer the price of payment for merchandise), then the transaction terminal 2_1 of trade company B sends mistake letter
Breath, represents current Fail Transaction;After having concluded the business, when the second energy of mobile terminal
Region powers on, and (i.e. entering mode of operation from standby mode, described mode of operation is screen
After upper electric-opening, the baseband processor of described mobile terminal powers on, and i.e. can pass through
The network formats such as GSM, CDMA or LTE and external device carry out data exchange) after,
Historical transactional information will beam back user by baseband processor and wireless communication module 2
The mobile terminal of A.
Embodiment three
Relative to the off-line transaction pattern of the super low-power consumption that embodiment two proposes, the present embodiment carries again
Go out two kinds of online trading patterns, the respectively first online trading pattern and the second online trading mould
Formula, illustrates both online trading patterns separately below.
First online trading pattern is that user uses the such as computer of the other-end in addition to mobile terminal
Buying the situation of commodity, as shown in Figure 4, in accompanying drawing 4,4_1 is that user purchases to concrete structure
Buying commodity and use terminal, this terminal is the other-end in addition to mobile terminal, such as computer etc.,
4_2 is telecommunications third party transaction platform, and 4_3 is trade company.In the traditional case, Yong Hu
Buy and when commodity pay, need input password to carry out authentication, but owing to password may
It is stolen and cracks, the most traditionally utilizing password to carry out the safety of authentication also
The highest.And in the first online trading pattern that the present embodiment proposes, user is at immobile terminal
When purchase commodity pay, user is needed to carry out body at mobile terminal input biological information
Part checking, because the biological information of user is stored in the embedded non-volatile of SIM
In memorizer, safety is the highest, will not reveal, and therefore can ensure that the absolute safety of transaction.
In described first online trading pattern, at least the first energy area, base in mobile terminal
Provided with processor and wireless communication module 2 are opened, here by first in described mobile terminal
Energy area, baseband processor and wireless communication module 2 are referred to as the 3rd energy area, i.e. exist
In this online trading pattern, the 3rd energy area should be opened, the knot of the 3rd energy area
Composition is as shown in Figure 5.
First online trading pattern carries out the step of authentication as shown in Figure 6:
Step one: customer mobile terminal passes through baseband processor 5_1 and wireless communication module 2
Reception subscriber authentication is asked;
Step 2: collecting biological feature information module 5_3 in customer mobile terminal gathers to be used
The biological information of family input is verified for identity information;
Step 3: according to specific algorithm, biological information is adopted by SIM module 5_5
The biological information of user that collection module 5_3 collects and be stored in user and move end
End SIM embedded non-volatile memory in biological information compare and
Coupling;
Step 4: mobile terminal is sent by baseband processor 5_1 and wireless communication module 2
Authentication result.
Optionally, the present embodiment propose the first online trading pattern not only by base band at
The checking that reason device 5_1 carries out user identity with wireless communication module 2 communicates, it is also possible to by moving
Application processor and wireless communication module 2 in dynamic terminal carry out subscriber authentication, specifically tie
As shown in Figure 7, in figure, to be user use 7_1 structure when buying commodity in addition to mobile terminal
Other-end, it is assumed herein that user buy commodity use terminal be computer, 7_1_1 is
A certain application program _ A in computer, for moving end by user authentication request transmission to user
End, 7_2 is telecommunications third party transaction platform, and 7_3 is trade company, and 7_4 is customer mobile terminal,
7_4_1 is a certain application program _ B of customer mobile terminal, is used for receiving application program _ A and sends out
The ID authentication request sent.
User uses computer to buy commodity, when user is when paying, by opening on computer
Application program _ A, this application program _ A by authenticating user identification request pass through short-distance wireless
Communication protocol sends to customer mobile terminal, and such as bluetooth, ZigBee etc., user opens shifting
The application processor of dynamic terminal and application program _ B, the application program of customer mobile terminal _ B receives
After asking to authenticating user identification, user's collecting biological feature information module by mobile terminal
Input user biological characteristic information carries out authentication, according to specific algorithm, SIM module
The biological information of the user that collecting biological feature information module is collected and be stored in use
Biological information in the mobile terminal SIM embedded non-volatile memory of family compares
Relatively and coupling, end user's mobile terminal sends authentication by wireless communication module 2 and ties
Really.
Second online trading pattern is the situation that user passes through mobile terminal purchase commodity, the most such as
Shown in accompanying drawing 8, in figure, 8_1 is the mobile terminal that user buys that commodity use, and 8_2 is telecommunications
Third party transaction platform, 8_3 is trade company.Under the second online trading pattern, user moves end
The first energy area and the second energy area in end are all opened, described second online trading pattern
Authentication mode when paying is identical with the first online trading pattern, is all that user is led to
Crossing input biological information and carry out authentication, this kind of auth method makes compared to tradition
By more safety and reliable for the auth method of password.The body of the second online trading pattern
Part verification step is as shown in Figure 9:
Step one: customer mobile terminal receives subscriber authentication request;
Step 2: it is defeated that the collecting biological feature information module in customer mobile terminal gathers user
The biological information entered is verified for identity information;
Step 3: according to specific algorithm, SIM module is by collecting biological feature information mould
The biological information of the user that block collects and be stored in customer mobile terminal SIM
Biological information in embedded non-volatile memory compares and mates;
Step 4: mobile terminal sends authentication result.
Under the second online trading pattern, user can by baseband processor in mobile terminal and
Wireless communication module 2 is received authentication request and can also be processed by application in mobile terminal
Device and wireless communication module 2 receive authentication request.
As off-line transaction pattern foregoing in the present embodiment, in described off-line transaction pattern
Under, the first energy area in mobile terminal is opened, and the second energy area is closed, mobile terminal
The power consumption consumed is the lowest, therefore can be needed in some by the model application of this super low-power consumption
The particular case of super low-power consumption.These particular cases needing super low-power consumption are entered by example below
Row explanation.
Embodiment four
When a certain user runs into emergency, needing to perform emergency operation, user needs to use and moves
Dynamic terminal (such as mobile phone) sends the request signal performing emergency operation, but now user makes
The electricity of mobile terminal the lowest (such as user has just opened the screen of mobile terminal, mobile eventually
End will shut down because electricity exhausts), the most traditionally user can not successfully send
Perform the request signal of emergency operation.Run in this case user, utilize the present embodiment to carry
The structure chart of the method gone out as shown in Figure 10 because in the mobile terminal of user only first
Energy area is opened, and therefore only depicts the first energy range of customer mobile terminal in accompanying drawing 10
Territory, as shown in 10_1 in figure, in figure, 10_1_1 is biological information acquisition module, 10_1_2
For wireless communication module 1,10_1_3 is SIM module, and 10_2 is the identity in communication station
Certification terminal, described identity authentication terminal is for the radio communication mold in the mobile terminal of user
Block 1 communicates, optimum described identity authentication terminal and the radio communication in the mobile terminal of user
The communication protocol of module 1 communication is short-range wireless communication protocol, such as NFC, BLE etc.,
Described identity authentication terminal 10_2 is connected with 10_3 high in the clouds by certain form, such as passes through
The mode of network, stores in advance user in described high in the clouds 10_3 and in case of emergency should perform
Operation, such as dial rescuing telephone etc., compare traditional use specific key and carry out identity knowledge
Not, the present embodiment utilizes biological information to carry out identification, more safety with reliable.
Utilizing the method that the present embodiment proposes, user runs into emergency and needs to perform emergency operation
Time step as shown in Figure 11:
Step one: user finds neighbouring communication station, identity authentication terminal 10_2 sends communication
Request Concurrency goes out ID authentication request;
Step 2: user's collecting biological feature information module 10_1_1 by mobile terminal
Input biological information;
Step 3: according to specific algorithm, SIM module 10_1_3 is by biological information
The biological information of the user that acquisition module 10_1_1 collects and be stored in user
Biological information in mobile terminal SIM embedded non-volatile memory is carried out
Compare and coupling;
Step 4: user biological characteristic information certification is passed through, the channel radio of customer mobile terminal
Letter module 1 sends authentication result to identity authentication terminal 10_2 of communication station;
Step 5: after identity authentication terminal 10_2 of communication station receives identity authentication result, to
High in the clouds 10_3 sends the request of the emergency operation performing user's pre-stored;
Step 6: high in the clouds 10_3 performs the emergency operation of user's pre-stored.
The way that explanation the present embodiment of giving one example below proposes application under specific circumstances.
The mobile terminal assuming a certain user A is mobile phone, the collecting biological feature information mould in mobile phone
Block is finger print acquisition module, and user A is lost when out on tours, needs to send emergency relief
Signal, but the electricity in the mobile phone of now user A is only left 1%, is not enough to support user
Sending rescue signal, the most traditionally, user A can not successfully send rescue letter
Number, utilize the method that the present embodiment proposes, user A to send the step such as accompanying drawing of rescue signal
Shown in 12:
Step one: user A finds neighbouring communication station, the identity authentication terminal in communication station
Send communication request and send ID authentication request;
Step 2: the user A finger print acquisition module input finger print information by mobile phone;
Step 3: according to specific algorithm, finger print acquisition module is collected by SIM module
The finger print information of user A and to be stored in user's A SIM cards of mobile phones embedded non-volatile
Finger print information in property memorizer compares and mates;
Step 4: user fingerprints authentification of message passes through, the wireless communication module of user's A mobile phone
1 sends authentication result to the identity authentication terminal of communication station;
Step 5: after the identity authentication terminal of communication station receives identity authentication result, to high in the clouds
Send the request performing emergency operation;
Step 6: high in the clouds sends the distress signal that user A prestores.
Give some instances below and the application of the present embodiment is described.For off-line transaction pattern, it is assumed that
The mobile terminal that user A uses is mobile phone, and the collecting biological feature information module in mobile phone is
Finger print acquisition module, i.e. this mobile phone use fingerprint to carry out identification, and user A is buying business
During product, the electricity of mobile phone has remained little, and is such as 1%, traditionally, user
A needs to light the screen of mobile phone when using mobile-phone payment after using purchase commodity, opens mobile phone
Baseband processor or/and application processor pays, but now mobile phone electricity is the lowest,
Traditionally there will be the situation causing mobile phone shutdown owing to electricity is too low, say, that this
Time can not complete to pay, and utilize the method that the present embodiment proposes, user A props up carrying out
Fu Shi, need not open baseband processor or/and application processor, without the screen lighting mobile phone
Curtain, the now transaction terminal transmission subscriber authentication of trade company B is asked to the mobile phone of user A,
Then user A is by the finger print acquisition module input finger print information in mobile phone, according to specifically
Algorithm, the fingerprint of the user A that finger print acquisition module is collected by the SIM module in mobile phone
Information and the fingerprint being stored in the SIM embedded non-volatile memory of user's A mobile phone
Information compares and mates, if user authentication information is passed through, the mobile phone of user A passes through
Wireless communication module 1 sends the authentication result transaction terminal to trade company B, then telecommunications
Tripartite's payment platform will deduct corresponding goods in account A that user A sets up on the platform
Money, and in account B that trade company B sets up on the platform, increase corresponding payment for goods, thus
Completing delivery operation, use mobile phone to carry out the operation paid compared to tradition, the present embodiment proposes
The method power consumption when carrying out delivery operation extremely low, and safer.
For off-line transaction pattern, give one example the most again and illustrate.Public affairs in city at present
Hand over taking of the biggest facility brought with the trip that subway is people, current city bus and subway
With being all to be paid by specific smart card (mass transit card and subway card), manufacture these intelligence
Can the certain cost of calorie requirement and also these smart cards do not have identity recognition function, once lose,
User will be lost accordingly.Utilize the method that the present embodiment proposes, utilize in mobile phone
First energy area pays, it is assumed that the collecting biological feature information module in mobile phone is fingerprint
Acquisition module.First give in SIM and supplement with money, when needs are taken transit bus or during subway, by hands
Above the POS that machine is placed on bus or subway gate, the POS on bus or
Gate on person's subway sends the request signal mobile phone to user of subscriber authentication, then uses
Family is by the finger print acquisition module input finger print information in mobile phone, according to specific algorithm, mobile phone
In the SIM module finger print information of user that finger print acquisition module is collected and be stored in
Finger print information in the SIM embedded non-volatile memory of user mobile phone compare and
Coupling, if user authentication information is passed through, the mobile phone of user is sent by wireless communication module 1
Authentication result is to the POS on bus or subway gate, then telecommunications third party prop up
Pay platform and will deduct corresponding expense in the account that user sets up on the platform, and in public transport
The account that company or MTR set up on the platform increases corresponding expense.
The application of the online trading pattern that explanation the present embodiment of giving one example below proposes.When with
When family is traded needing to pay, under online trading pattern traditionally, user needs
Input payment cipher carries out the checking of identity, but this kind of means of payment dangerous, if used
The payment cipher at family is stolen, then user will be made to cause certain property loss, be to make
Carry out authentication with the finger print information of user, but the finger print information of user be stored in high in the clouds,
It is likely to be stolen, the most also and dangerous.Utilize the method that the present embodiment proposes, it is assumed that
Collecting biological feature information module in mobile phone is finger print acquisition module, when user is traded needing
Time to be paid, mobile phone receives subscriber authentication information, the then fingerprint collecting in user mobile phone
Module gathers the finger print information of user's input and is used for authentication, according to specific algorithm, user
The finger print information of the user that finger print acquisition module is collected by the SIM module in mobile phone and depositing
Storage finger print information in SIM cards of mobile phones embedded non-volatile memory compare and
Joining, then mobile phone sends authentication result, if the verification passes, then telecommunications third party prop up
Pay platform and will deduct corresponding expense in the account that user sets up on the platform, and in trade company
The account set up on the platform increases corresponding expense.Utilize on the line that the present embodiment proposes
It is safer that trade mode compares traditional online trading pattern.
In sum, the present invention propose a kind of do not start mobile terminal application processor or
/ and baseband processor and high security and the method completing small amount payment of super low-power consumption, logical
Cross and biological information is stored in SIM, thus ensure the absolute of biological information
Safety, by adding a wireless communication module, mobile terminal by this wireless communication module with outer
Portion's identity authentication terminal communicates, by having present embodiment ensure that the abampere of finger print information
Entirely, simultaneously can be at the application processor not enabled in mobile terminal or/and baseband processor
In the case of complete small amount payment.
The foregoing is only preferred embodiment of the present invention, not thereby limit the enforcement of the present invention
Mode and protection domain, to those skilled in the art, it should can appreciate that all utilizations
Equivalent that description of the invention and diagramatic content are made and obviously change gained
The scheme arrived, all should be included in protection scope of the present invention.
Claims (10)
1. a mobile terminal super low-power consumption and the communication means of high security, it is characterised in that:
The SIM unit of mobile terminal under described mobile terminal is in standby mode according to identity information
Judged result output is formed with criterion validation information;Described communication means includes:
Step A1, in described SIM unit, it is prefabricated with the described criterion validation information of user;
Step A2, receive authentication request when the first communication module in described mobile terminal
Time, the identity information acquisition module of described mobile terminal obtains the described identity letter of active user
Breath;
Step A3, judge whether described identity information mates described criterion validation information, and formed
One judged result output.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that: in described step A1, specifically include:
Step A11, described SIM unit receive described criterion validation information, and to described standard
Checking information is encrypted and stores.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that: in described step A3, specifically include:
Step A31: described SIM unit receives described identity information;
Step A32, described SIM unit are believed according to described identity information and described criterion validation
Breath, is formed described judged result and is exported by described first communication module.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that
Before described step A2, a transaction terminal sends described authentication request to described
Mobile terminal.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that:
After described step A3, described first communication module sends described judged result to institute
State transaction terminal, after described transaction terminal completes to pay according to described judged result, in described shifting
When dynamic terminal is in mode of operation next time, described mobile terminal shows to be tested with described payment identity
The Transaction Information that card request matches.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that: described criterion validation information is biological information.
Mobile terminal super low-power consumption the most according to claim 1 and the communication party of high security
Method, it is characterised in that:
Before described step A2, pre-stored and described authentication request phase in a high in the clouds
Corresponding emergency operation instruction, an identity authentication terminal sends described authentication request to described
First communication module.
Mobile terminal super low-power consumption the most according to claim 7 and the communication party of high security
Method, it is characterised in that:
After described step A3, when described identity information and described criterion validation information matches,
Described first communication module sends described judged result to described identity authentication terminal, described identity
Certification terminal forwards described judged result to described high in the clouds, and described high in the clouds performs described emergency operation
Instruction.
9. the on-line payment of a high security, it is characterised in that include terminal unit and
First mobile terminal, installs a payment application in described terminal unit, and described first moves
Dynamic terminal at least includes an identity information acquisition module, SIM unit;On-line payment bag
Include:
Step B1, described terminal unit need pay based on described payment application time,
Output one payment authentication request;
Step B2, described first mobile terminal pass sequentially through a second communication module, Base-Band Processing
Device or application processor receive described authentication request, and lead to according to described authentication request
Cross identity information acquisition module obtain and send identity information;
Step B3, described SIM unit receive described identity information, and combine prefabricated standard and test
Card information forms a judged result output;
Step B4, described terminal unit receive described judged result, are true in described judged result
Time, confirm to pay.
The on-line payment of high security the most according to claim 9, its feature exists
In: also include that Third-party payment platform, described on-line payment also include:
Step B5, after described step B4, described terminal unit perform confirm delivery operation
After, the finance account of both sides is done by Third-party payment platform according to described payment authentication request
Process operation accordingly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610153443.3A CN105844468A (en) | 2016-03-17 | 2016-03-17 | Mobile-terminal ultra-low power consumption and high safety communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610153443.3A CN105844468A (en) | 2016-03-17 | 2016-03-17 | Mobile-terminal ultra-low power consumption and high safety communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844468A true CN105844468A (en) | 2016-08-10 |
Family
ID=56587148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610153443.3A Pending CN105844468A (en) | 2016-03-17 | 2016-03-17 | Mobile-terminal ultra-low power consumption and high safety communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844468A (en) |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108064393A (en) * | 2016-09-06 | 2018-05-22 | 苹果公司 | For the user interface of stored value accounts |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
CN110224830A (en) * | 2018-03-02 | 2019-09-10 | 北京华虹集成电路设计有限责任公司 | A kind of Internet of Things safety certifying method and system |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US10796294B2 (en) | 2017-05-16 | 2020-10-06 | Apple Inc. | User interfaces for peer-to-peer transfers |
US10909524B2 (en) | 2018-06-03 | 2021-02-02 | Apple Inc. | User interfaces for transfer accounts |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11100498B2 (en) | 2018-06-03 | 2021-08-24 | Apple Inc. | User interfaces for transfer accounts |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11169830B2 (en) | 2019-09-29 | 2021-11-09 | Apple Inc. | Account management user interfaces |
US11221744B2 (en) | 2017-05-16 | 2022-01-11 | Apple Inc. | User interfaces for peer-to-peer transfers |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11681537B2 (en) | 2019-09-29 | 2023-06-20 | Apple Inc. | Account management user interfaces |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US12118562B2 (en) | 2020-05-29 | 2024-10-15 | Apple Inc. | Configuring an account for a second user identity |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101192284A (en) * | 2006-11-28 | 2008-06-04 | 北京握奇数据系统有限公司 | Remote payment method and system based on signing on mobile equipment |
CN102257524A (en) * | 2008-10-06 | 2011-11-23 | 维沃科技公司 | Systems, methods, and computer readable media for payment and non-payment virtual card transfer between mobile devices |
CN102955956A (en) * | 2011-08-25 | 2013-03-06 | 深圳光启高等理工研究院 | Mobile communication system, mobile communication method and mobile terminal device based on RFID-SIM card (radio frequency identification device-subscriber identity module card) |
CN104579670A (en) * | 2013-10-28 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Mobile terminal authentication method and mobile terminal |
CN104699507A (en) * | 2015-03-16 | 2015-06-10 | 上海与德通讯技术有限公司 | Starting method and device of application program |
CN105162782A (en) * | 2015-08-28 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | User biological characteristic storage method, device and terminal |
CN105184557A (en) * | 2015-08-14 | 2015-12-23 | 中国联合网络通信集团有限公司 | Payment authentication method and system |
-
2016
- 2016-03-17 CN CN201610153443.3A patent/CN105844468A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101192284A (en) * | 2006-11-28 | 2008-06-04 | 北京握奇数据系统有限公司 | Remote payment method and system based on signing on mobile equipment |
CN102257524A (en) * | 2008-10-06 | 2011-11-23 | 维沃科技公司 | Systems, methods, and computer readable media for payment and non-payment virtual card transfer between mobile devices |
CN102955956A (en) * | 2011-08-25 | 2013-03-06 | 深圳光启高等理工研究院 | Mobile communication system, mobile communication method and mobile terminal device based on RFID-SIM card (radio frequency identification device-subscriber identity module card) |
CN104579670A (en) * | 2013-10-28 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Mobile terminal authentication method and mobile terminal |
CN104699507A (en) * | 2015-03-16 | 2015-06-10 | 上海与德通讯技术有限公司 | Starting method and device of application program |
CN105184557A (en) * | 2015-08-14 | 2015-12-23 | 中国联合网络通信集团有限公司 | Payment authentication method and system |
CN105162782A (en) * | 2015-08-28 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | User biological characteristic storage method, device and terminal |
Cited By (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US11734708B2 (en) | 2015-06-05 | 2023-08-22 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
CN108064393B (en) * | 2016-09-06 | 2022-07-26 | 苹果公司 | User interface for stored value accounts |
CN108064393A (en) * | 2016-09-06 | 2018-05-22 | 苹果公司 | For the user interface of stored value accounts |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11995171B2 (en) | 2016-10-25 | 2024-05-28 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11049088B2 (en) | 2017-05-16 | 2021-06-29 | Apple Inc. | User interfaces for peer-to-peer transfers |
US10796294B2 (en) | 2017-05-16 | 2020-10-06 | Apple Inc. | User interfaces for peer-to-peer transfers |
US11222325B2 (en) | 2017-05-16 | 2022-01-11 | Apple Inc. | User interfaces for peer-to-peer transfers |
US11221744B2 (en) | 2017-05-16 | 2022-01-11 | Apple Inc. | User interfaces for peer-to-peer transfers |
US11797968B2 (en) | 2017-05-16 | 2023-10-24 | Apple Inc. | User interfaces for peer-to-peer transfers |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
CN110224830A (en) * | 2018-03-02 | 2019-09-10 | 北京华虹集成电路设计有限责任公司 | A kind of Internet of Things safety certifying method and system |
US11100498B2 (en) | 2018-06-03 | 2021-08-24 | Apple Inc. | User interfaces for transfer accounts |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US10909524B2 (en) | 2018-06-03 | 2021-02-02 | Apple Inc. | User interfaces for transfer accounts |
US11900355B2 (en) | 2018-06-03 | 2024-02-13 | Apple Inc. | User interfaces for transfer accounts |
US11514430B2 (en) | 2018-06-03 | 2022-11-29 | Apple Inc. | User interfaces for transfer accounts |
US11669896B2 (en) | 2019-03-24 | 2023-06-06 | Apple Inc. | User interfaces for managing an account |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US11610259B2 (en) | 2019-03-24 | 2023-03-21 | Apple Inc. | User interfaces for managing an account |
US11688001B2 (en) | 2019-03-24 | 2023-06-27 | Apple Inc. | User interfaces for managing an account |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
US11681537B2 (en) | 2019-09-29 | 2023-06-20 | Apple Inc. | Account management user interfaces |
US11169830B2 (en) | 2019-09-29 | 2021-11-09 | Apple Inc. | Account management user interfaces |
US12118562B2 (en) | 2020-05-29 | 2024-10-15 | Apple Inc. | Configuring an account for a second user identity |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105844468A (en) | Mobile-terminal ultra-low power consumption and high safety communication method | |
US10440575B2 (en) | Protection of a security element coupled to an NFC circuit | |
KR100511317B1 (en) | Fraud protection method and apparatus for contactless card in mobile communication terminal | |
US8107881B2 (en) | Wireless translation device | |
CN108012268A (en) | A kind of mobile phone terminal SIM card and the method for safe handling App, medium | |
CN101917216A (en) | System and method for realizing safe mobile application by adopting Bluetooth intelligent card | |
US20150242844A1 (en) | System and method for secure remote access and remote payment using a mobile device and a powered display card | |
CN104794613B (en) | A kind of mobile device authentication method based on point-of-sale terminal | |
CN101256694A (en) | Method for automatically charging for electronic purse of near-field communication terminal | |
CN109120412A (en) | A kind of preservation of block chain key and exchange system based on smart card | |
CN102437870B (en) | IC card information shares implementation method, system and device | |
CN203250329U (en) | Smart subscriber identity module card and card reader thereof | |
Jovanovic et al. | Analysis of the latest trends in mobile commerce using the NFC technology | |
CN104008481A (en) | Loading-in-air system and method based on non-contact type mobile payment mobile phone terminal | |
CN107197427A (en) | A kind of new blue-tooth intelligence IC-card and its method of commerce | |
CN102054313A (en) | Transparent forwarding-based method and system for dual-band wireless payment authentication | |
KR102193696B1 (en) | Method for Providing Safety Login based on One Time Code by using User’s Card | |
KR101972972B1 (en) | Method for Operating Medium Division Style One Time Code by using Near Field Communication | |
KR102276916B1 (en) | Method for Authenticating Non-Faced Transaction by using Near Field Communication Card for Generating One Time Password | |
KR20160006646A (en) | Method for Authenticating Non-Faced Transaction by using Near Field Communication Card for Generating One Time Password | |
KR20160093197A (en) | Method for Processing Mobile Payment by using Contactless Media | |
KR102268471B1 (en) | Method for Authenticating Non-Faced Transaction by using Transaction Information and Near Field Communication Card for Generating One Time Password | |
CN104348812B (en) | A kind of method and apparatus of NFC terminal on-line authentication | |
CN111222864A (en) | Internet of vehicles safety payment method, system, storage medium and vehicle machine | |
CN208141463U (en) | A kind of attendance student card with dynamic two-dimension code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |