CN105939195A - Transaction method and system - Google Patents

Transaction method and system Download PDF

Info

Publication number
CN105939195A
CN105939195A CN201610127889.9A CN201610127889A CN105939195A CN 105939195 A CN105939195 A CN 105939195A CN 201610127889 A CN201610127889 A CN 201610127889A CN 105939195 A CN105939195 A CN 105939195A
Authority
CN
China
Prior art keywords
information
biological
equipment
certified
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610127889.9A
Other languages
Chinese (zh)
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610127889.9A priority Critical patent/CN105939195A/en
Publication of CN105939195A publication Critical patent/CN105939195A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention provides a transaction method and system. The transaction method comprises the steps of establishing communication connection with a second device through a biological body by a first device after the biological body enters a preset range of the first device; receiving authentication information broadcasted by the second device through the communication device by the first device; acquiring biological characteristic information of the biological body by the first device after the biological body enters the preset range of the first device; sending the biological characteristic information and the authentication information to a background by the first device; authenticating the to-be-authenticated information and the biological characteristic information based on the authentication mark information by the background so as to obtain an authentication result and sending the authentication result to the first device; and carrying out a transaction process by the first device when the authentication result indicates that the authentication is passed.

Description

A kind of method of commerce and system
Technical field
The present invention relates to a kind of E-Payment field, particularly relate to a kind of method of commerce and system.
Background technology
E-Payment is compared and is paid in cash, and the advantage such as has safely, quickly, reliable.POS is as a kind of payment terminal, quilt In applying to widely pay by mails.Existing POS has plenty of the holder's magnetic strip information being read bank card by card reader, Being inputted dealing money by POS operator, holder is brush bank card in POS, inputs password, POS the most again These information are uploaded to bank backstage, complete on-line transaction.As can be seen here, in existing E-Payment flow process, Yong Huxu Performing twice operation, be put in POS by bank card for the first time and be connected with POS foundation, user needs input for the second time Password, operating process is complicated.
It addition, conventionally, as the identical probability of some biological characteristic of different people is the least, such as, fingerprint, because of This, biological characteristic is often used as the password of user.In this applications, in order to protect the safety of user, biological special in checking During reference breath, judge that the threshold value of matching rate arranges the highest by being used for, to avoid the account of user to be illegally used, but this In the case of Zhong, the information gathering out due to the biological characteristic of user under different conditions there may be nuance, such as, uses The fingerprint at family is in the case of finger is dried and moistens, and the finger print data that same fingerprint collecting obtains is likely to differ, thus can Even same user can occur, when needs input password, real fingerprint is considered false fingerprint, thus refuses user's Request, needs user again to input, and in the case of having, may result in user needs input many times, the most legal The identified failed probability of user is the highest, reduces Consumer's Experience, and in the related, the technical scheme solving this problem is main To optimize fingerprint matching algorithm, but the premise of these schemes to be the finger print data gathered complete, accurately, for the fingerprint number gathered According to being the finger print data different situations gathered with storage, can not play a role.
Summary of the invention
Present invention seek to address that the problems referred to above.
A kind of method of commerce of offer is provided;
Another object of the present invention is to provide a kind of transaction system.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of method of commerce, including: after biological limbs enter the preset range of the first equipment, the One equipment sets up communication connection by biological limbs and the second equipment;First equipment receives the second device broadcasts by communication connection Authentication information, authentication information includes certification identification information and information to be certified;The preset range of the first equipment is entered at biological limbs Persistent period in, the first equipment gathers the biological information of biological limbs;First equipment sends biological information to backstage And authentication information;Backstage receives biological information and the authentication information that the first equipment sends, according to certification identification information pair Information to be certified and biological information are authenticated, and obtain authentication result, and send authentication result to the first equipment;First Equipment receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow.
Additionally, treat authentication information according to certification identification information and biological information is authenticated, obtain authentication result and include: Obtain the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and utilize digital authenticating factor pair to be certified Information carries out whether the matching rate of digital authenticating and detection biological characteristic validation information and biological information is more than preset value, Utilize digital authenticating factor pair information to be certified carry out digital authenticating by and biological information and biological characteristic validation information When joining rate more than preset value, obtaining authentication result is that certification is passed through.
Additionally, utilize digital authenticating factor pair information to be certified to carry out digital authenticating and detection biological characteristic validation information with biological The matching rate of characteristic information includes: after utilizing digital authenticating factor pair information to be certified to carry out, digital authenticating passes through, detection biology Whether signature verification information is more than preset value with the matching rate of biological information.
Additionally, biological information includes: finger print information and/or venous information;First equipment gathers the biological characteristic of biological limbs Information includes: in the case of being contacted by biological limbs and the first equipment, gathers biological limbs and the contact site of the first equipment Biological information.
Additionally, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;Wherein, When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Letter to be certified When breath is for cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic password Time, the digital authenticating factor is the certification password being authenticated dynamic password.
Another aspect of the present invention also provides for a kind of transaction system, including: the first equipment, for entering the first equipment at biological limbs Preset range after, the first equipment is set up with the second equipment by biological limbs and is communicated to connect;Receive second by communication connection to set The authentication information of standby broadcast, authentication information includes certification identification information and information to be certified;The first equipment is entered at biological limbs In the persistent period of preset range, the first equipment gathers the biological information of biological limbs;And biological characteristic is sent to backstage Information and authentication information;Backstage, for receiving biological information and the authentication information that the first equipment sends, according to certification Identification information treats authentication information and biological information is authenticated, and obtains authentication result, and sends certification to the first equipment Result;First equipment, be additionally operable to receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow Journey.
Additionally, backstage, specifically for obtaining the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and Digital authenticating factor pair information to be certified is utilized to carry out digital authenticating and detection biological characteristic validation information and biological information Whether matching rate, more than preset value, passes through and biological characteristic letter utilizing digital authenticating factor pair information to be certified to carry out digital authenticating When the matching rate of breath and biological characteristic validation information is more than preset value, obtaining authentication result is that certification is passed through.
Additionally, backstage, specifically for utilizing digital authenticating factor pair information to be certified to carry out after digital authenticating passes through, detection is raw Whether thing signature verification information is more than preset value with the matching rate of biological information.
Additionally, biological information includes: finger print information and/or venous information;First equipment, specifically for by biological limb In the case of body and the contact of the first equipment, gather the biological information of the contact site of biological limbs and the first equipment.
Additionally, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;Wherein, When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Letter to be certified When breath is for cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic password Time, the digital authenticating factor is the certification password being authenticated dynamic password.
As seen from the above technical solution provided by the invention, after biological limbs enter the preset range of the first equipment, such as, When biological limbs are the hand of user, by once-through operation, (this operation can be contact the first equipment or set near first user Standby), the first equipment can obtain the authentication information of the second equipment and collect biological information, simplifies number of operations, reduces The complexity that scheme realizes.Meanwhile, by authentication information being verified and biological information being verified, it may be determined that The legitimacy of the second equipment and the legitimacy of biological information owning user, if being verified explanation to authentication information Two equipment are legitimate device, if it is second that biological information is verified this biological information owning user of explanation The lawful owner of equipment, now can verify and show that this user uses oneself legal legitimate device having, improve certification Accuracy, and after certification is passed through, the first equipment performs transaction flow, and then improves the safety of transaction.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the required accompanying drawing used in embodiment being described below It is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain other accompanying drawings according to these accompanying drawings.
The flow chart of the method for commerce that Fig. 1 provides for the embodiment of the present invention 1;
The structural representation of the transaction system that Fig. 2 provides for the embodiment of the present invention 1.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, Obviously, described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Reality based on the present invention Execute example, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into Protection scope of the present invention.
In describing the invention, it is to be understood that term " " center ", " longitudinally ", " laterally ", " on ", D score, " front ", Orientation or the position relationship of the instruction such as " afterwards ", "left", "right", " vertically ", " level ", " top ", " end ", " interior ", " outward " are base In orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description rather than instruction or hint institute The device that refers to or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to the present invention Restriction.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or quantity or position.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " install ", " being connected ", " connect " and should be interpreted broadly, connect for example, it may be fixing, it is also possible to be to removably connect, or be integrally connected;Permissible It is to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be two The connection of individual element internal.For the ordinary skill in the art, can understand that above-mentioned term is in the present invention with concrete condition In concrete meaning.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Embodiment 1
The present embodiment provides a kind of method of commerce, as it is shown in figure 1, the method includes:
101, enter the preset range of the first equipment at biological limbs after, the first equipment is set up logical by biological limbs and the second equipment Letter connects.
Biological limbs, such as, can be the limbs on human body, such as hand, wrist, eye, face etc.;
First equipment, such as, can be payment devices, including POS, ATM etc.;
Second equipment, such as, can be the wearable devices such as intelligent wristwatch, intelligent glasses, Intelligent bracelet, can wear (permissible It is close to biological epidermis or does not fits with biological epidermis) on biological limbs, or in implantable organism.
The preset range of the first equipment refers to that the efficient communication scope of the first equipment, biological limbs enter the preset range of the first equipment After can be arrived by the first equipment Inspection, or the second equipment on biological limbs can detect the first equipment.
The implementation that first equipment uses human body communication technology to set up communication connection by biological limbs and the second equipment is as follows: example As, the biological limbs wearing the second equipment enter the preset range of the first equipment, and contact the first equipment so that the first equipment By forming communication path between biological limbs and the second equipment, thus realizing setting up communication connection, now biological limbs are equivalent to Wired conductor.Or and for example, the biological limbs wearing the second equipment enter the preset range of the first equipment, near the first equipment, During the electric field change that the first equipment Inspection to the second equipment is produced by biological limbs, it is achieved set up communication connection, certainly, it is possible to During with the electric field change of to be the second equipment by biological limbs detect the first equipment, it is achieved set up communication connection, now biological limb Body is equivalent to the external antenna of the second equipment.
In the present embodiment, utilize biological limbs as the transmission medium of data signal, it is possible to achieve two equipment are by biological limbs The information of (such as human body) is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, human body leads to During letter, signal is through human body transmission, and outside noise is the least on its impact, has low-power consumption, high security and lower people The advantages such as body infringement.
102, the first equipment receives the authentication information of the second device broadcasts by communication connection, and authentication information includes certification identification information With information to be certified;
Second equipment produces broadcast singal according to predetermined period, or the second equipment Inspection is to after the electric field change of the first equipment, opens Begin to produce broadcast singal.This broadcast singal carries authentication information, can be coupled into based on this broadcast singal of human body communication technology Biological limbs, are externally broadcasted by biological limbs.When the first equipment and the second equipment set up communication connection by biological limbs After, the first equipment can receive second equipment authentication information by biological limbs broadcast.
Authentication information includes certification identification information and information to be certified, and this certification identification information can be the identification information of the first equipment Or bank card number etc..Information to be certified includes: electronic signature information, cipher-text information or dynamic password.
Wherein, information to be certified can be that the second equipment self generates, and the generating mode of such as electronic signature information is such as by the Two equipment use the private key of the second equipment to sign preset value, obtain signature value, using signature value and preset value as electronics label Name information, this preset value can be random number, identification information etc.;It is right that the generating mode of cipher-text information is such as used by the second equipment Claim algorithm (such as MAC calculating) to utilize symmetric key that preset value is encrypted and obtain ciphertext value (such as MAC value), will Ciphertext value and preset value are as cipher-text information, and this preset value can be random number, identification information etc.;The generating mode of dynamic password E.g. second equipment is based on time or dynamic password based on challenging value generation.
Information to be certified can also is that what the second equipment received from authenticating device, the authentication means (example such as associated with the second equipment Such as KEY) generate information to be certified, and by wired mode (usb or audio connector) or wireless network (such as WIFI, Bluetooth, infrared, NFC) information to be certified is sent to the second equipment.The electric signing tools associated with the second equipment generates and treats It is identical that authentication information mode can generate information mode to be certified with the second equipment, does not repeats them here.
103, in the persistent period of the preset range entering the first equipment at biological limbs, the first equipment gathers the biology of biological limbs Characteristic information;
Biological information includes at least one of: finger print information, iris information, face information and venous information.
This first equipment is provided with the module for gathering biological information, such as, finger print acquisition module, at human body In finger enters into the preset range of the first equipment and when touching the finger print acquisition module of the first equipment, gather the finger of this finger Stricture of vagina, and for example, venous collection module, it is used in the wrist of human body enters into the preset range of the first equipment and touches vein During acquisition module, gather the venous information in this wrist, the most such as, iris capturing module, set for entering into first at human eye In standby preset range and when being positioned at iris capturing region, gather the iris information of this human eye, the most such as, face recognition module, In the preset range entering into the first equipment at face and when being positioned at face pickup area, gather the face information of this face.
Wherein, when biological information is finger print information and/or venous information, the first equipment gathers the biological characteristic letter of biological limbs Being accomplished by the preset range being entered the first equipment by biological limbs and feelings that biological limbs and the first equipment contact of breath Under condition, gather the biological information of the contact site of biological limbs and the first equipment.
Above-mentioned steps 101-102 is once to be contacted the first equipment by user or once set near first with the realization of step 103 For having triggered.Such as, the user's hand wearing the second equipment (such as watch) touches the collection biology spy of the first equipment During the module of reference breath, or enter but not in contact with during to the pickup area of module gathering biological information of the first equipment, First equipment receives the authentication information of the second device broadcasts by biological limbs (user's hand), and collects biological limbs simultaneously Biological information.
By an operating of contacts of user or near operating the authentication information that just can obtain the second equipment simultaneously in the present embodiment And biological information, user operation can be simplified, reduce the complexity that scheme realizes.
Step 101-102 and step 103 do not have dividing of succession upon execution, and such as, step 101 and 102 can be in step Before rapid 103, or after step 103, or can also carry out simultaneously.
104, the first equipment sends biological information and authentication information to backstage.
It is biological special that first equipment can pass through wireless network (WIFI, mobile network etc.) or cable network mode sends to backstage Reference breath and authentication information, backstage such as bank backstage, Third-party payment backstage.The friendship that first equipment can be initiated by backstage Easily process.
105, backstage receives biological information and the authentication information that the first equipment sends, according to certification identification information to be certified Information and biological information are authenticated, and obtain authentication result, and send authentication result to the first equipment.
Wherein, treat authentication information according to certification identification information and biological information is authenticated, obtain the reality of authentication result As follows: to obtain the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and utilize the digital authenticating factor Treat authentication information and whether carry out digital authenticating and detection biological characteristic validation information with the matching rate of biological information more than pre- If value, utilize digital authenticating factor pair information to be certified carry out digital authenticating by and biological information and biological characteristic validation When the matching rate of information is more than preset value, obtaining authentication result is that certification is passed through.
This step includes two kinds of certifications: utilize the digital authenticating that digital authenticating factor pair information to be certified is carried out, and pass through Whether detection biological characteristic validation information is more than the biological information certification that preset value is carried out with the matching rate of biological information.
Below, respectively digital authenticating and biological information certification are introduced respectively:
(1) digital authenticating: utilize digital authenticating factor pair information to be certified to carry out digital authenticating.
When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Wait to recognize When card information is cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic During password, the digital authenticating factor is the certification password being authenticated dynamic password.
Such as, information to be certified is electronic signature information, utilizes the realization side that digital authenticating factor pair information to be certified is authenticated Formula may is that the PKI that the first equipment utilization certification identification information is corresponding carries out sign test to electronic signature information.In the manner, the One equipment is previously stored with the digital certificate of multiple equipment, according to certification identification information can with access authentication identification information corresponding The digital certificate of two equipment, obtains PKI from the digital certificate of the second equipment.Electronic signature information sign test is passed through by the first equipment Illustrate that this authentication information is from the second legal equipment.
Such as, information to be certified is cipher-text information;The implementation utilizing digital authenticating factor pair information to be certified to be authenticated can To be: cipher-text information is authenticated by the symmetric key that the first equipment utilization certification identification information is corresponding, such as, the first equipment profit Being decrypted the ciphertext value in cipher-text information with symmetric key, value deciphering obtained compares with the preset value in cipher-text information The most consistent, or utilize symmetric key that the preset value in cipher-text information is encrypted, the value that encryption is obtained and ciphertext value Compare the most consistent.In the manner, prestore in the first equipment and the second equipment identical symmetric key and identical symmetry Cipher key calculation algorithm, this symmetric key, such as MAC computational algorithm.First equipment to cipher-text information certification by illustrating that this is recognized Card information is from the second legal equipment.
And for example, information to be certified is dynamic password;The implementation utilizing digital authenticating factor pair information to be certified to be authenticated can To be: the second equipment uses based on time or certification password based on challenging value generation, and comparison receives dynamic password and generation Certification password the most consistent.In the manner, the first equipment and the second equipment are adopted and are generated dynamic password in a like fashion, and first Equipment to dynamic password authentication by illustrating that this authentication information is from the second legal equipment.
(2) biological information certification: whether detection biological characteristic validation information and the matching rate of biological information be more than default Value
Wherein, the first equipment prestores the biological characteristic validation information of multiple validated user, each biological characteristic validation information To there being certification identification information.The biological characteristic validation information that this certification identification information is corresponding can be found by certification identification information. Can verify that user is by the matching rate (similarity degree) of detection biological characteristic validation information with the biological information received No is validated user.In prior art, detection biological characteristic validation information is more than with the matching rate of the biological information received During specified threshold (such as, 99%, 90% etc.), then it is assumed that biological information certification is passed through.Illegal for avoiding the occurrence of User is also by the situation of certification, and in prior art, this specified threshold generally arranges higher, the most easily occur validated user without Method identification and the problem that causes authentification failure.The application in order to reduce the probability of validated user authentification failure, the preset value taked Less than specified threshold of the prior art, when detection biological characteristic validation information and the matching rate of biological information are more than default During value (such as, matching rate is more than preset value but less than specified threshold of the prior art), by combining above-mentioned utilization numeral Certification factor pair information to be certified carries out the result of digital authenticating to determine final authentication result.Such as, if detection is biological special The matching rate levying checking information and biological information is more than preset value, utilizes digital authenticating factor pair information to be certified to carry out numeral When the result of certification is passed through, then it is assumed that the certification to user is passed through;If detection biological characteristic validation information and biological information Matching rate more than preset value, utilize digital authenticating factor pair information to be certified to carry out the result of digital authenticating obstructed out-of-date, then recognize For the certification of user is not passed through.Owing to the accuracy rate of digital authenticating is higher, thus biological characteristic authentication is tied mutually with digital authenticating Conjunction can reduce the probability of validated user authentification failure.
It should be noted that above-mentioned digital authenticating and biological information certification do not have dividing of precedence upon execution.Such as may be used Biological information certification is performed after digital authenticating passes through again to first carry out, or, it is also possible to first carry out biological information certification Perform digital authenticating after by again, or both are carried out simultaneously.This is not restricted.
The present embodiment is by verifying authentication information and verifying biological information, if tested authentication information Card is by illustrating that the second equipment is legitimate device, if biological information is verified this biological information institute of explanation Belonging to user is the lawful owner of the second equipment, now can verify draw this user use oneself legal have legal set Standby, improve the accuracy of certification, reduce the identified failed probability of the most legal user.
106, first equipment receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow.
After first equipment receives authentication result, if certification is passed through, second equipment that illustrates is legal and this biological information Owning user is the lawful owner of the second equipment, and the second equipment that namely this biological information owning user uses is oneself The legitimate device having, then perform transaction flow.Such as, when small amount exempts from close payment, watch (the second equipment) is worn User's hand is by once touching POS (the first equipment), and POS sets up communication connection, POS by user's hand with watch Machine receives authentication information that watch sends and POS collects fingerprint or the venous information of user's hand, and POS is by certification Information and the fingerprint of user's hand or venous information send to backstage, and authentication information is verified and to user's hand by backstage Fingerprint or venous information are verified, if backstage is verified explanation to authentication information, the second equipment is legitimate device, If fingerprint or the venous information of user's hand are verified and illustrate that this user is that the legal of the second equipment has by backstage Person, now can verify and show that this user uses oneself legal legitimate device having, authentication result is returned to POS by backstage Machine, POS authentication result be certification pass through time, perform transaction flow, such as, small amount payment operate, operation etc. of transferring accounts.
In the present embodiment, it is seen then that in the present embodiment, after biological limbs enter the preset range of the first equipment, such as, biological When limbs are the hand of user, user passes through once-through operation (this operation can be contact the first equipment or close first equipment), First equipment can obtain the authentication information of the second equipment and collect biological information, simplifies number of operations, reduces scheme The complexity realized.Meanwhile, by authentication information being verified and biological information being verified, if certification is believed It is legitimate device that breath carries out being verified explanation the second equipment, if it is special that biological information is verified this biology of explanation Reference breath owning user is the lawful owner of the second equipment, now can verify that showing that this user uses oneself legal has Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment performs transaction flow, and then improves friendship Easy safety.
Embodiment 2
The embodiment of the present invention provides a kind of transaction system, and this system uses above-mentioned method of commerce to realize transaction, as in figure 2 it is shown, should System includes: the first equipment the 11, second equipment 12 and backstage 13.Wherein, the first equipment and the second equipment pass through human body communication Technology communicates, and the second equipment and backstage are communicated by wireless communication technology or cable communicating technology.
First equipment 11, after the preset range entering the first equipment 11 at biological limbs, the first equipment 11 is by biological limb Body and the second equipment 12 set up communication connection;The authentication information of the second equipment 12 broadcast, authentication information is received by communication connection Including certification identification information and information to be certified;In the persistent period of the preset range entering the first equipment 11 at biological limbs, the One equipment 11 gathers the biological information of biological limbs;And send biological information and authentication information to backstage 13;
Backstage 13, for receiving biological information and the authentication information that the first equipment 11 sends, according to certification identification information Treat authentication information and biological information is authenticated, obtain authentication result, and send authentication result to the first equipment 11;
First equipment 11, be additionally operable to receive backstage 13 send authentication result, authentication result be certification pass through time, perform friendship Easily flow process.
In the present embodiment, by authentication information being verified and biological information being verified, if authentication information is entered It is legitimate device that row is verified explanation the second equipment 12, if be verified biological information, this biological characteristic is described Information owning user is the lawful owner of the second equipment 12, now can verify that showing that this user uses oneself legal has Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment 11 performs transaction flow, and then improves The safety of transaction.
Exemplary, backstage 13, specifically for obtaining the digital authenticating factor corresponding to certification identification information and biological characteristic validation letter Breath, and utilize digital authenticating factor pair information to be certified to carry out digital authenticating and detection biological characteristic validation information and biological characteristic Whether the matching rate of information, more than preset value, passes through and biological utilizing digital authenticating factor pair information to be certified to carry out digital authenticating When the matching rate of characteristic information and biological characteristic validation information is more than preset value, obtaining authentication result is that certification is passed through.
Exemplary, backstage 13, specifically for utilizing digital authenticating factor pair information to be certified to carry out after digital authenticating passes through, Whether detection biological characteristic validation information is more than preset value with the matching rate of biological information.
Exemplary, biological information includes: finger print information and/or venous information;
First equipment 11, specifically in the case of being contacted with the first equipment 11 by biological limbs, gather biological limbs and The biological information of the contact site of the first equipment 11.
Exemplary, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Exemplary, when information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information is carried out sign test PKI;When information to be certified is cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;To be certified When information is dynamic password, the digital authenticating factor is the certification password being authenticated dynamic password.
This system performs the method for commerce of the present embodiment 1, and the function that in this system, the first equipment realizes may refer in embodiment 1 The associated description of the first equipment in method of commerce, the function that in this system, the second equipment realizes may refer to counterparty in embodiment 1 The associated description of the second equipment in method, the function that in this system, backstage realizes may refer in embodiment 1 backstage in method of commerce Associated description.
In the present embodiment, after biological limbs enter the preset range of the first equipment, such as, when biological limbs are the hand of user, User is by once-through operation (this operation can be contact the first equipment or close first equipment), and the first equipment can obtain second The authentication information of equipment and collect biological information, simplifies number of operations, reduces the complexity that scheme realizes.
It addition, this transaction system is by verifying authentication information and verifying biological information, if certification is believed It is legitimate device that breath carries out being verified explanation the second equipment, if it is special that biological information is verified this biology of explanation Reference breath owning user is the lawful owner of the second equipment, now can verify that showing that this user uses oneself legal has Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment performs transaction flow, and then improves friendship Easy safety.
Any process described otherwise above or method describe and are construed as in flow chart or at this, represent include one or The module of code, fragment or the part of the executable instruction of the more steps for realizing specific logical function or process, and The scope of the preferred embodiment of the present invention includes other realization, wherein can not be by order that is shown or that discuss, including root According to involved function by basic mode simultaneously or in the opposite order, performing function, this should be by embodiments of the invention institute Belong to those skilled in the art to be understood.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.In above-mentioned enforcement In mode, multiple steps or method can be with storing the software or firmware that in memory and be performed by suitable instruction execution system Realize.Such as, if realized with hardware, with the most the same, available following technology well known in the art In any one or their combination realize: have and patrol for the discrete of logic gates that data signal is realized logic function Collect circuit, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate Array (FPGA) etc..
Those skilled in the art are appreciated that it is permissible for realizing all or part of step that above-described embodiment method carries Instructing relevant hardware by program to complete, described program can be stored in a kind of computer-readable recording medium, this journey Sequence upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be each Unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module is the most permissible The form using hardware realizes, it would however also be possible to employ the form of software function module realizes.If described integrated module is with software merit Can the form of module realize and as independent production marketing or when using, it is also possible to be stored in the storage of embodied on computer readable and be situated between In matter.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " concrete example ", Or specific features, structure, material or the feature that the description of " some examples " etc. means to combine this embodiment or example describes comprises In at least one embodiment or example of the present invention.In this manual, the schematic representation to above-mentioned term not necessarily refers to It is identical embodiment or example.And, the specific features of description, structure, material or feature can at any one or Multiple embodiments or example combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is exemplary, Being not considered as limiting the invention, those of ordinary skill in the art is in the case of without departing from the principle of the present invention and objective Above-described embodiment can be changed within the scope of the invention, revise, replace and modification.The scope of the present invention is by appended power Profit requires and equivalent limits.

Claims (10)

1. a method of commerce, it is characterised in that including:
After biological limbs enter the preset range of the first equipment, described first equipment is built with described second equipment by biological limbs Vertical communication connection;
Described first equipment receives the authentication information of described second device broadcasts by described communication connection, and described authentication information includes Certification identification information and information to be certified;
In the persistent period of the preset range entering the first equipment at described biological limbs, described first equipment gathers described biological limb The biological information of body;
Described first equipment sends described biological information and described authentication information to backstage;
Described backstage receives described biological information and the described authentication information that described first equipment sends, according to described certification Described information to be certified and described biological information are authenticated by identification information, obtain authentication result, and to described first Equipment sends described authentication result;
Described first equipment receive described backstage send described authentication result, described authentication result be certification pass through time, perform Transaction flow.
Method the most according to claim 1, it is characterised in that
According to described certification identification information, described information to be certified and described biological information are authenticated, obtain certification knot Fruit includes:
Obtain the digital authenticating factor corresponding to described certification identification information and biological characteristic validation information, and utilize described digital authenticating Information to be certified described in factor pair carries out digital authenticating and detects described biological characteristic validation information and described biological information Whether matching rate, more than preset value, passes through and institute utilizing information to be certified described in described digital authenticating factor pair to carry out digital authenticating When stating the biological information matching rate with described biological characteristic validation information more than preset value, obtaining authentication result is that certification is passed through.
Method the most according to claim 2, it is characterised in that described utilize described in described digital authenticating factor pair to be certified Information carries out digital authenticating and detects the matching rate of described biological characteristic validation information and described biological information and include:
After digital authenticating passes through utilizing information to be certified described in described digital authenticating factor pair to carry out, detect described biological characteristic and test Whether card information is more than preset value with the matching rate of described biological information.
Method the most according to claim 1 and 2, it is characterised in that described biological information includes: finger print information and / or venous information;
Described first equipment gathers the biological information of described biological limbs and includes: by biological limbs and described first equipment In the case of contact, gather the described biological information of described biological limbs and the contact site of described first equipment.
Method the most according to claim 1 and 2, it is characterised in that
Described information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Wherein, when described information to be certified is electronic signature information, the described digital authenticating factor is for enter described electronic signature information The PKI of row sign test;When described information to be certified is cipher-text information, the described digital authenticating factor is for recognize described cipher-text information The symmetric key of card;When described information to be certified is dynamic password, the described digital authenticating factor is for recognize described dynamic password The certification password of card.
6. a transaction system, it is characterised in that including:
First equipment, after the preset range entering the first equipment at biological limbs, described first equipment by biological limbs with Described second equipment sets up communication connection;By described communication connection receive described second device broadcasts authentication information, described in recognize Card information includes certification identification information and information to be certified;When described biological limbs enter preset range lasting of the first equipment In, described first equipment gathers the biological information of described biological limbs;And described biological information is sent to backstage And described authentication information;
Described backstage, for receiving described biological information and the described authentication information that described first equipment sends, according to institute State certification identification information described information to be certified and described biological information are authenticated, obtain authentication result, and to institute First equipment of stating sends described authentication result;
Described first equipment, is additionally operable to receive the described authentication result that described backstage sends, is that certification is passed through in described authentication result Time, perform transaction flow.
System the most according to claim 6, it is characterised in that
Described backstage, specifically for obtaining the digital authenticating factor corresponding to described certification identification information and biological characteristic validation information, And utilize information to be certified described in described digital authenticating factor pair carry out digital authenticating and detect described biological characteristic validation information with Whether the matching rate of described biological information, more than preset value, enters utilizing information to be certified described in described digital authenticating factor pair Row number certification by and the matching rate of described biological information and described biological characteristic validation information more than preset value time, obtain Authentication result is that certification is passed through.
System the most according to claim 6, it is characterised in that described backstage, specifically for utilizing described digital authenticating Information to be certified described in factor pair carries out after digital authenticating passes through, detecting described biological characteristic validation information and believing with described biological characteristic Whether the matching rate of breath is more than preset value.
9. according to the system described in any one of claim 6-8, it is characterised in that described biological information includes: fingerprint is believed Breath and/or venous information;
Described first equipment, specifically for, in the case of being contacted with described first equipment by biological limbs, gathering described biology The described biological information of the contact site of limbs and described first equipment.
10. according to the system described in any one of claim 6-8, it is characterised in that
Described information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Wherein, when described information to be certified is electronic signature information, the described digital authenticating factor is for enter described electronic signature information The PKI of row sign test;When described information to be certified is cipher-text information, the described digital authenticating factor is for recognize described cipher-text information The symmetric key of card;When described information to be certified is dynamic password, the described digital authenticating factor is for recognize described dynamic password The certification password of card.
CN201610127889.9A 2016-03-07 2016-03-07 Transaction method and system Pending CN105939195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610127889.9A CN105939195A (en) 2016-03-07 2016-03-07 Transaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610127889.9A CN105939195A (en) 2016-03-07 2016-03-07 Transaction method and system

Publications (1)

Publication Number Publication Date
CN105939195A true CN105939195A (en) 2016-09-14

Family

ID=57151277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610127889.9A Pending CN105939195A (en) 2016-03-07 2016-03-07 Transaction method and system

Country Status (1)

Country Link
CN (1) CN105939195A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603229A (en) * 2016-12-26 2017-04-26 北京小米移动软件有限公司 Method and device for generating signature information
WO2017152815A1 (en) * 2016-03-07 2017-09-14 李明 Identity authentication method and system
CN107545421A (en) * 2016-06-27 2018-01-05 李明 Determine the method and system and method for commerce and system of payment mechanism
CN110400378A (en) * 2019-07-23 2019-11-01 甘肃万华金慧科技股份有限公司 A kind of parking station online management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN204667407U (en) * 2015-06-09 2015-09-23 武汉天喻信息产业股份有限公司 A kind of wearable device and system realizing safety identification authentication
CN105245341A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Remote identity authentication method and system and remote account opening method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN204667407U (en) * 2015-06-09 2015-09-23 武汉天喻信息产业股份有限公司 A kind of wearable device and system realizing safety identification authentication
CN105245341A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Remote identity authentication method and system and remote account opening method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017152815A1 (en) * 2016-03-07 2017-09-14 李明 Identity authentication method and system
CN107545421A (en) * 2016-06-27 2018-01-05 李明 Determine the method and system and method for commerce and system of payment mechanism
CN106603229A (en) * 2016-12-26 2017-04-26 北京小米移动软件有限公司 Method and device for generating signature information
CN106603229B (en) * 2016-12-26 2019-11-26 北京小米支付技术有限公司 Signing messages generation method and device
CN110400378A (en) * 2019-07-23 2019-11-01 甘肃万华金慧科技股份有限公司 A kind of parking station online management system

Similar Documents

Publication Publication Date Title
EP3428818B1 (en) Identity authentication method and system
JP4602606B2 (en) Authentication processing system, authentication processing method, authentication device, and computer program
KR102089201B1 (en) Payment method and system
WO2017167037A1 (en) Payment authentication method and authentication system based on face recognition and hce
CN109314545B (en) Wireless communication system with auxiliary antenna
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
CN105991654A (en) Authorization authentication method, device and system
CN105939336A (en) Identity authentication method and system
CN105939195A (en) Transaction method and system
CN105991653A (en) Identity authentication method and device
CN105991652A (en) Identity authentication method and system
WO2019010669A1 (en) Method, apparatus and system for identity validity verification
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
US10785218B2 (en) Authorization authentication method, device and system
CN107548059A (en) A kind of authentication method and system
CN105989488B (en) Payment method and system
CN105989497A (en) Payment method and system
JP2006268871A (en) Authentication device and authentication processing method
CN103902860A (en) Double authentication method and system
CN105989496A (en) Trading method and equipment
CN115099799B (en) Transaction processing method and system for digital RMB
JP6790839B2 (en) Secure element, UIM card, authentication method, and authentication program
KR20170142983A (en) Method for Providing Appointed Service by using Biometric Information
CN107292608A (en) A kind of eID move transaction devices of encrypting fingerprint
JP2008065850A (en) System and method for processing authorization, and authorization device, and computer program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160914

RJ01 Rejection of invention patent application after publication