CN105939195A - Transaction method and system - Google Patents
Transaction method and system Download PDFInfo
- Publication number
- CN105939195A CN105939195A CN201610127889.9A CN201610127889A CN105939195A CN 105939195 A CN105939195 A CN 105939195A CN 201610127889 A CN201610127889 A CN 201610127889A CN 105939195 A CN105939195 A CN 105939195A
- Authority
- CN
- China
- Prior art keywords
- information
- biological
- equipment
- certified
- certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention provides a transaction method and system. The transaction method comprises the steps of establishing communication connection with a second device through a biological body by a first device after the biological body enters a preset range of the first device; receiving authentication information broadcasted by the second device through the communication device by the first device; acquiring biological characteristic information of the biological body by the first device after the biological body enters the preset range of the first device; sending the biological characteristic information and the authentication information to a background by the first device; authenticating the to-be-authenticated information and the biological characteristic information based on the authentication mark information by the background so as to obtain an authentication result and sending the authentication result to the first device; and carrying out a transaction process by the first device when the authentication result indicates that the authentication is passed.
Description
Technical field
The present invention relates to a kind of E-Payment field, particularly relate to a kind of method of commerce and system.
Background technology
E-Payment is compared and is paid in cash, and the advantage such as has safely, quickly, reliable.POS is as a kind of payment terminal, quilt
In applying to widely pay by mails.Existing POS has plenty of the holder's magnetic strip information being read bank card by card reader,
Being inputted dealing money by POS operator, holder is brush bank card in POS, inputs password, POS the most again
These information are uploaded to bank backstage, complete on-line transaction.As can be seen here, in existing E-Payment flow process, Yong Huxu
Performing twice operation, be put in POS by bank card for the first time and be connected with POS foundation, user needs input for the second time
Password, operating process is complicated.
It addition, conventionally, as the identical probability of some biological characteristic of different people is the least, such as, fingerprint, because of
This, biological characteristic is often used as the password of user.In this applications, in order to protect the safety of user, biological special in checking
During reference breath, judge that the threshold value of matching rate arranges the highest by being used for, to avoid the account of user to be illegally used, but this
In the case of Zhong, the information gathering out due to the biological characteristic of user under different conditions there may be nuance, such as, uses
The fingerprint at family is in the case of finger is dried and moistens, and the finger print data that same fingerprint collecting obtains is likely to differ, thus can
Even same user can occur, when needs input password, real fingerprint is considered false fingerprint, thus refuses user's
Request, needs user again to input, and in the case of having, may result in user needs input many times, the most legal
The identified failed probability of user is the highest, reduces Consumer's Experience, and in the related, the technical scheme solving this problem is main
To optimize fingerprint matching algorithm, but the premise of these schemes to be the finger print data gathered complete, accurately, for the fingerprint number gathered
According to being the finger print data different situations gathered with storage, can not play a role.
Summary of the invention
Present invention seek to address that the problems referred to above.
A kind of method of commerce of offer is provided;
Another object of the present invention is to provide a kind of transaction system.
For reaching above-mentioned purpose, technical scheme is specifically achieved in that
One aspect of the present invention provides a kind of method of commerce, including: after biological limbs enter the preset range of the first equipment, the
One equipment sets up communication connection by biological limbs and the second equipment;First equipment receives the second device broadcasts by communication connection
Authentication information, authentication information includes certification identification information and information to be certified;The preset range of the first equipment is entered at biological limbs
Persistent period in, the first equipment gathers the biological information of biological limbs;First equipment sends biological information to backstage
And authentication information;Backstage receives biological information and the authentication information that the first equipment sends, according to certification identification information pair
Information to be certified and biological information are authenticated, and obtain authentication result, and send authentication result to the first equipment;First
Equipment receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow.
Additionally, treat authentication information according to certification identification information and biological information is authenticated, obtain authentication result and include:
Obtain the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and utilize digital authenticating factor pair to be certified
Information carries out whether the matching rate of digital authenticating and detection biological characteristic validation information and biological information is more than preset value,
Utilize digital authenticating factor pair information to be certified carry out digital authenticating by and biological information and biological characteristic validation information
When joining rate more than preset value, obtaining authentication result is that certification is passed through.
Additionally, utilize digital authenticating factor pair information to be certified to carry out digital authenticating and detection biological characteristic validation information with biological
The matching rate of characteristic information includes: after utilizing digital authenticating factor pair information to be certified to carry out, digital authenticating passes through, detection biology
Whether signature verification information is more than preset value with the matching rate of biological information.
Additionally, biological information includes: finger print information and/or venous information;First equipment gathers the biological characteristic of biological limbs
Information includes: in the case of being contacted by biological limbs and the first equipment, gathers biological limbs and the contact site of the first equipment
Biological information.
Additionally, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;Wherein,
When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Letter to be certified
When breath is for cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic password
Time, the digital authenticating factor is the certification password being authenticated dynamic password.
Another aspect of the present invention also provides for a kind of transaction system, including: the first equipment, for entering the first equipment at biological limbs
Preset range after, the first equipment is set up with the second equipment by biological limbs and is communicated to connect;Receive second by communication connection to set
The authentication information of standby broadcast, authentication information includes certification identification information and information to be certified;The first equipment is entered at biological limbs
In the persistent period of preset range, the first equipment gathers the biological information of biological limbs;And biological characteristic is sent to backstage
Information and authentication information;Backstage, for receiving biological information and the authentication information that the first equipment sends, according to certification
Identification information treats authentication information and biological information is authenticated, and obtains authentication result, and sends certification to the first equipment
Result;First equipment, be additionally operable to receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow
Journey.
Additionally, backstage, specifically for obtaining the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and
Digital authenticating factor pair information to be certified is utilized to carry out digital authenticating and detection biological characteristic validation information and biological information
Whether matching rate, more than preset value, passes through and biological characteristic letter utilizing digital authenticating factor pair information to be certified to carry out digital authenticating
When the matching rate of breath and biological characteristic validation information is more than preset value, obtaining authentication result is that certification is passed through.
Additionally, backstage, specifically for utilizing digital authenticating factor pair information to be certified to carry out after digital authenticating passes through, detection is raw
Whether thing signature verification information is more than preset value with the matching rate of biological information.
Additionally, biological information includes: finger print information and/or venous information;First equipment, specifically for by biological limb
In the case of body and the contact of the first equipment, gather the biological information of the contact site of biological limbs and the first equipment.
Additionally, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;Wherein,
When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Letter to be certified
When breath is for cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic password
Time, the digital authenticating factor is the certification password being authenticated dynamic password.
As seen from the above technical solution provided by the invention, after biological limbs enter the preset range of the first equipment, such as,
When biological limbs are the hand of user, by once-through operation, (this operation can be contact the first equipment or set near first user
Standby), the first equipment can obtain the authentication information of the second equipment and collect biological information, simplifies number of operations, reduces
The complexity that scheme realizes.Meanwhile, by authentication information being verified and biological information being verified, it may be determined that
The legitimacy of the second equipment and the legitimacy of biological information owning user, if being verified explanation to authentication information
Two equipment are legitimate device, if it is second that biological information is verified this biological information owning user of explanation
The lawful owner of equipment, now can verify and show that this user uses oneself legal legitimate device having, improve certification
Accuracy, and after certification is passed through, the first equipment performs transaction flow, and then improves the safety of transaction.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the required accompanying drawing used in embodiment being described below
It is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area
From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain other accompanying drawings according to these accompanying drawings.
The flow chart of the method for commerce that Fig. 1 provides for the embodiment of the present invention 1;
The structural representation of the transaction system that Fig. 2 provides for the embodiment of the present invention 1.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described,
Obviously, described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Reality based on the present invention
Execute example, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into
Protection scope of the present invention.
In describing the invention, it is to be understood that term " " center ", " longitudinally ", " laterally ", " on ", D score, " front ",
Orientation or the position relationship of the instruction such as " afterwards ", "left", "right", " vertically ", " level ", " top ", " end ", " interior ", " outward " are base
In orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description rather than instruction or hint institute
The device that refers to or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to the present invention
Restriction.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or quantity or position.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " install ", " being connected ",
" connect " and should be interpreted broadly, connect for example, it may be fixing, it is also possible to be to removably connect, or be integrally connected;Permissible
It is to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be two
The connection of individual element internal.For the ordinary skill in the art, can understand that above-mentioned term is in the present invention with concrete condition
In concrete meaning.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Embodiment 1
The present embodiment provides a kind of method of commerce, as it is shown in figure 1, the method includes:
101, enter the preset range of the first equipment at biological limbs after, the first equipment is set up logical by biological limbs and the second equipment
Letter connects.
Biological limbs, such as, can be the limbs on human body, such as hand, wrist, eye, face etc.;
First equipment, such as, can be payment devices, including POS, ATM etc.;
Second equipment, such as, can be the wearable devices such as intelligent wristwatch, intelligent glasses, Intelligent bracelet, can wear (permissible
It is close to biological epidermis or does not fits with biological epidermis) on biological limbs, or in implantable organism.
The preset range of the first equipment refers to that the efficient communication scope of the first equipment, biological limbs enter the preset range of the first equipment
After can be arrived by the first equipment Inspection, or the second equipment on biological limbs can detect the first equipment.
The implementation that first equipment uses human body communication technology to set up communication connection by biological limbs and the second equipment is as follows: example
As, the biological limbs wearing the second equipment enter the preset range of the first equipment, and contact the first equipment so that the first equipment
By forming communication path between biological limbs and the second equipment, thus realizing setting up communication connection, now biological limbs are equivalent to
Wired conductor.Or and for example, the biological limbs wearing the second equipment enter the preset range of the first equipment, near the first equipment,
During the electric field change that the first equipment Inspection to the second equipment is produced by biological limbs, it is achieved set up communication connection, certainly, it is possible to
During with the electric field change of to be the second equipment by biological limbs detect the first equipment, it is achieved set up communication connection, now biological limb
Body is equivalent to the external antenna of the second equipment.
In the present embodiment, utilize biological limbs as the transmission medium of data signal, it is possible to achieve two equipment are by biological limbs
The information of (such as human body) is mutual.Compared with traditional bluetooth, WIFI, radio frequency and the wireless communication technology such as infrared, human body leads to
During letter, signal is through human body transmission, and outside noise is the least on its impact, has low-power consumption, high security and lower people
The advantages such as body infringement.
102, the first equipment receives the authentication information of the second device broadcasts by communication connection, and authentication information includes certification identification information
With information to be certified;
Second equipment produces broadcast singal according to predetermined period, or the second equipment Inspection is to after the electric field change of the first equipment, opens
Begin to produce broadcast singal.This broadcast singal carries authentication information, can be coupled into based on this broadcast singal of human body communication technology
Biological limbs, are externally broadcasted by biological limbs.When the first equipment and the second equipment set up communication connection by biological limbs
After, the first equipment can receive second equipment authentication information by biological limbs broadcast.
Authentication information includes certification identification information and information to be certified, and this certification identification information can be the identification information of the first equipment
Or bank card number etc..Information to be certified includes: electronic signature information, cipher-text information or dynamic password.
Wherein, information to be certified can be that the second equipment self generates, and the generating mode of such as electronic signature information is such as by the
Two equipment use the private key of the second equipment to sign preset value, obtain signature value, using signature value and preset value as electronics label
Name information, this preset value can be random number, identification information etc.;It is right that the generating mode of cipher-text information is such as used by the second equipment
Claim algorithm (such as MAC calculating) to utilize symmetric key that preset value is encrypted and obtain ciphertext value (such as MAC value), will
Ciphertext value and preset value are as cipher-text information, and this preset value can be random number, identification information etc.;The generating mode of dynamic password
E.g. second equipment is based on time or dynamic password based on challenging value generation.
Information to be certified can also is that what the second equipment received from authenticating device, the authentication means (example such as associated with the second equipment
Such as KEY) generate information to be certified, and by wired mode (usb or audio connector) or wireless network (such as WIFI,
Bluetooth, infrared, NFC) information to be certified is sent to the second equipment.The electric signing tools associated with the second equipment generates and treats
It is identical that authentication information mode can generate information mode to be certified with the second equipment, does not repeats them here.
103, in the persistent period of the preset range entering the first equipment at biological limbs, the first equipment gathers the biology of biological limbs
Characteristic information;
Biological information includes at least one of: finger print information, iris information, face information and venous information.
This first equipment is provided with the module for gathering biological information, such as, finger print acquisition module, at human body
In finger enters into the preset range of the first equipment and when touching the finger print acquisition module of the first equipment, gather the finger of this finger
Stricture of vagina, and for example, venous collection module, it is used in the wrist of human body enters into the preset range of the first equipment and touches vein
During acquisition module, gather the venous information in this wrist, the most such as, iris capturing module, set for entering into first at human eye
In standby preset range and when being positioned at iris capturing region, gather the iris information of this human eye, the most such as, face recognition module,
In the preset range entering into the first equipment at face and when being positioned at face pickup area, gather the face information of this face.
Wherein, when biological information is finger print information and/or venous information, the first equipment gathers the biological characteristic letter of biological limbs
Being accomplished by the preset range being entered the first equipment by biological limbs and feelings that biological limbs and the first equipment contact of breath
Under condition, gather the biological information of the contact site of biological limbs and the first equipment.
Above-mentioned steps 101-102 is once to be contacted the first equipment by user or once set near first with the realization of step 103
For having triggered.Such as, the user's hand wearing the second equipment (such as watch) touches the collection biology spy of the first equipment
During the module of reference breath, or enter but not in contact with during to the pickup area of module gathering biological information of the first equipment,
First equipment receives the authentication information of the second device broadcasts by biological limbs (user's hand), and collects biological limbs simultaneously
Biological information.
By an operating of contacts of user or near operating the authentication information that just can obtain the second equipment simultaneously in the present embodiment
And biological information, user operation can be simplified, reduce the complexity that scheme realizes.
Step 101-102 and step 103 do not have dividing of succession upon execution, and such as, step 101 and 102 can be in step
Before rapid 103, or after step 103, or can also carry out simultaneously.
104, the first equipment sends biological information and authentication information to backstage.
It is biological special that first equipment can pass through wireless network (WIFI, mobile network etc.) or cable network mode sends to backstage
Reference breath and authentication information, backstage such as bank backstage, Third-party payment backstage.The friendship that first equipment can be initiated by backstage
Easily process.
105, backstage receives biological information and the authentication information that the first equipment sends, according to certification identification information to be certified
Information and biological information are authenticated, and obtain authentication result, and send authentication result to the first equipment.
Wherein, treat authentication information according to certification identification information and biological information is authenticated, obtain the reality of authentication result
As follows: to obtain the digital authenticating factor corresponding to certification identification information and biological characteristic validation information, and utilize the digital authenticating factor
Treat authentication information and whether carry out digital authenticating and detection biological characteristic validation information with the matching rate of biological information more than pre-
If value, utilize digital authenticating factor pair information to be certified carry out digital authenticating by and biological information and biological characteristic validation
When the matching rate of information is more than preset value, obtaining authentication result is that certification is passed through.
This step includes two kinds of certifications: utilize the digital authenticating that digital authenticating factor pair information to be certified is carried out, and pass through
Whether detection biological characteristic validation information is more than the biological information certification that preset value is carried out with the matching rate of biological information.
Below, respectively digital authenticating and biological information certification are introduced respectively:
(1) digital authenticating: utilize digital authenticating factor pair information to be certified to carry out digital authenticating.
When information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information carries out the PKI of sign test;Wait to recognize
When card information is cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;Information to be certified is dynamic
During password, the digital authenticating factor is the certification password being authenticated dynamic password.
Such as, information to be certified is electronic signature information, utilizes the realization side that digital authenticating factor pair information to be certified is authenticated
Formula may is that the PKI that the first equipment utilization certification identification information is corresponding carries out sign test to electronic signature information.In the manner, the
One equipment is previously stored with the digital certificate of multiple equipment, according to certification identification information can with access authentication identification information corresponding
The digital certificate of two equipment, obtains PKI from the digital certificate of the second equipment.Electronic signature information sign test is passed through by the first equipment
Illustrate that this authentication information is from the second legal equipment.
Such as, information to be certified is cipher-text information;The implementation utilizing digital authenticating factor pair information to be certified to be authenticated can
To be: cipher-text information is authenticated by the symmetric key that the first equipment utilization certification identification information is corresponding, such as, the first equipment profit
Being decrypted the ciphertext value in cipher-text information with symmetric key, value deciphering obtained compares with the preset value in cipher-text information
The most consistent, or utilize symmetric key that the preset value in cipher-text information is encrypted, the value that encryption is obtained and ciphertext value
Compare the most consistent.In the manner, prestore in the first equipment and the second equipment identical symmetric key and identical symmetry
Cipher key calculation algorithm, this symmetric key, such as MAC computational algorithm.First equipment to cipher-text information certification by illustrating that this is recognized
Card information is from the second legal equipment.
And for example, information to be certified is dynamic password;The implementation utilizing digital authenticating factor pair information to be certified to be authenticated can
To be: the second equipment uses based on time or certification password based on challenging value generation, and comparison receives dynamic password and generation
Certification password the most consistent.In the manner, the first equipment and the second equipment are adopted and are generated dynamic password in a like fashion, and first
Equipment to dynamic password authentication by illustrating that this authentication information is from the second legal equipment.
(2) biological information certification: whether detection biological characteristic validation information and the matching rate of biological information be more than default
Value
Wherein, the first equipment prestores the biological characteristic validation information of multiple validated user, each biological characteristic validation information
To there being certification identification information.The biological characteristic validation information that this certification identification information is corresponding can be found by certification identification information.
Can verify that user is by the matching rate (similarity degree) of detection biological characteristic validation information with the biological information received
No is validated user.In prior art, detection biological characteristic validation information is more than with the matching rate of the biological information received
During specified threshold (such as, 99%, 90% etc.), then it is assumed that biological information certification is passed through.Illegal for avoiding the occurrence of
User is also by the situation of certification, and in prior art, this specified threshold generally arranges higher, the most easily occur validated user without
Method identification and the problem that causes authentification failure.The application in order to reduce the probability of validated user authentification failure, the preset value taked
Less than specified threshold of the prior art, when detection biological characteristic validation information and the matching rate of biological information are more than default
During value (such as, matching rate is more than preset value but less than specified threshold of the prior art), by combining above-mentioned utilization numeral
Certification factor pair information to be certified carries out the result of digital authenticating to determine final authentication result.Such as, if detection is biological special
The matching rate levying checking information and biological information is more than preset value, utilizes digital authenticating factor pair information to be certified to carry out numeral
When the result of certification is passed through, then it is assumed that the certification to user is passed through;If detection biological characteristic validation information and biological information
Matching rate more than preset value, utilize digital authenticating factor pair information to be certified to carry out the result of digital authenticating obstructed out-of-date, then recognize
For the certification of user is not passed through.Owing to the accuracy rate of digital authenticating is higher, thus biological characteristic authentication is tied mutually with digital authenticating
Conjunction can reduce the probability of validated user authentification failure.
It should be noted that above-mentioned digital authenticating and biological information certification do not have dividing of precedence upon execution.Such as may be used
Biological information certification is performed after digital authenticating passes through again to first carry out, or, it is also possible to first carry out biological information certification
Perform digital authenticating after by again, or both are carried out simultaneously.This is not restricted.
The present embodiment is by verifying authentication information and verifying biological information, if tested authentication information
Card is by illustrating that the second equipment is legitimate device, if biological information is verified this biological information institute of explanation
Belonging to user is the lawful owner of the second equipment, now can verify draw this user use oneself legal have legal set
Standby, improve the accuracy of certification, reduce the identified failed probability of the most legal user.
106, first equipment receive backstage send authentication result, authentication result be certification pass through time, perform transaction flow.
After first equipment receives authentication result, if certification is passed through, second equipment that illustrates is legal and this biological information
Owning user is the lawful owner of the second equipment, and the second equipment that namely this biological information owning user uses is oneself
The legitimate device having, then perform transaction flow.Such as, when small amount exempts from close payment, watch (the second equipment) is worn
User's hand is by once touching POS (the first equipment), and POS sets up communication connection, POS by user's hand with watch
Machine receives authentication information that watch sends and POS collects fingerprint or the venous information of user's hand, and POS is by certification
Information and the fingerprint of user's hand or venous information send to backstage, and authentication information is verified and to user's hand by backstage
Fingerprint or venous information are verified, if backstage is verified explanation to authentication information, the second equipment is legitimate device,
If fingerprint or the venous information of user's hand are verified and illustrate that this user is that the legal of the second equipment has by backstage
Person, now can verify and show that this user uses oneself legal legitimate device having, authentication result is returned to POS by backstage
Machine, POS authentication result be certification pass through time, perform transaction flow, such as, small amount payment operate, operation etc. of transferring accounts.
In the present embodiment, it is seen then that in the present embodiment, after biological limbs enter the preset range of the first equipment, such as, biological
When limbs are the hand of user, user passes through once-through operation (this operation can be contact the first equipment or close first equipment),
First equipment can obtain the authentication information of the second equipment and collect biological information, simplifies number of operations, reduces scheme
The complexity realized.Meanwhile, by authentication information being verified and biological information being verified, if certification is believed
It is legitimate device that breath carries out being verified explanation the second equipment, if it is special that biological information is verified this biology of explanation
Reference breath owning user is the lawful owner of the second equipment, now can verify that showing that this user uses oneself legal has
Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment performs transaction flow, and then improves friendship
Easy safety.
Embodiment 2
The embodiment of the present invention provides a kind of transaction system, and this system uses above-mentioned method of commerce to realize transaction, as in figure 2 it is shown, should
System includes: the first equipment the 11, second equipment 12 and backstage 13.Wherein, the first equipment and the second equipment pass through human body communication
Technology communicates, and the second equipment and backstage are communicated by wireless communication technology or cable communicating technology.
First equipment 11, after the preset range entering the first equipment 11 at biological limbs, the first equipment 11 is by biological limb
Body and the second equipment 12 set up communication connection;The authentication information of the second equipment 12 broadcast, authentication information is received by communication connection
Including certification identification information and information to be certified;In the persistent period of the preset range entering the first equipment 11 at biological limbs, the
One equipment 11 gathers the biological information of biological limbs;And send biological information and authentication information to backstage 13;
Backstage 13, for receiving biological information and the authentication information that the first equipment 11 sends, according to certification identification information
Treat authentication information and biological information is authenticated, obtain authentication result, and send authentication result to the first equipment 11;
First equipment 11, be additionally operable to receive backstage 13 send authentication result, authentication result be certification pass through time, perform friendship
Easily flow process.
In the present embodiment, by authentication information being verified and biological information being verified, if authentication information is entered
It is legitimate device that row is verified explanation the second equipment 12, if be verified biological information, this biological characteristic is described
Information owning user is the lawful owner of the second equipment 12, now can verify that showing that this user uses oneself legal has
Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment 11 performs transaction flow, and then improves
The safety of transaction.
Exemplary, backstage 13, specifically for obtaining the digital authenticating factor corresponding to certification identification information and biological characteristic validation letter
Breath, and utilize digital authenticating factor pair information to be certified to carry out digital authenticating and detection biological characteristic validation information and biological characteristic
Whether the matching rate of information, more than preset value, passes through and biological utilizing digital authenticating factor pair information to be certified to carry out digital authenticating
When the matching rate of characteristic information and biological characteristic validation information is more than preset value, obtaining authentication result is that certification is passed through.
Exemplary, backstage 13, specifically for utilizing digital authenticating factor pair information to be certified to carry out after digital authenticating passes through,
Whether detection biological characteristic validation information is more than preset value with the matching rate of biological information.
Exemplary, biological information includes: finger print information and/or venous information;
First equipment 11, specifically in the case of being contacted with the first equipment 11 by biological limbs, gather biological limbs and
The biological information of the contact site of the first equipment 11.
Exemplary, information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Exemplary, when information to be certified is electronic signature information, the digital authenticating factor is that electronic signature information is carried out sign test
PKI;When information to be certified is cipher-text information, the digital authenticating factor is the symmetric key being authenticated cipher-text information;To be certified
When information is dynamic password, the digital authenticating factor is the certification password being authenticated dynamic password.
This system performs the method for commerce of the present embodiment 1, and the function that in this system, the first equipment realizes may refer in embodiment 1
The associated description of the first equipment in method of commerce, the function that in this system, the second equipment realizes may refer to counterparty in embodiment 1
The associated description of the second equipment in method, the function that in this system, backstage realizes may refer in embodiment 1 backstage in method of commerce
Associated description.
In the present embodiment, after biological limbs enter the preset range of the first equipment, such as, when biological limbs are the hand of user,
User is by once-through operation (this operation can be contact the first equipment or close first equipment), and the first equipment can obtain second
The authentication information of equipment and collect biological information, simplifies number of operations, reduces the complexity that scheme realizes.
It addition, this transaction system is by verifying authentication information and verifying biological information, if certification is believed
It is legitimate device that breath carries out being verified explanation the second equipment, if it is special that biological information is verified this biology of explanation
Reference breath owning user is the lawful owner of the second equipment, now can verify that showing that this user uses oneself legal has
Legitimate device, improve the accuracy of certification, and after certification is passed through, the first equipment performs transaction flow, and then improves friendship
Easy safety.
Any process described otherwise above or method describe and are construed as in flow chart or at this, represent include one or
The module of code, fragment or the part of the executable instruction of the more steps for realizing specific logical function or process, and
The scope of the preferred embodiment of the present invention includes other realization, wherein can not be by order that is shown or that discuss, including root
According to involved function by basic mode simultaneously or in the opposite order, performing function, this should be by embodiments of the invention institute
Belong to those skilled in the art to be understood.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.In above-mentioned enforcement
In mode, multiple steps or method can be with storing the software or firmware that in memory and be performed by suitable instruction execution system
Realize.Such as, if realized with hardware, with the most the same, available following technology well known in the art
In any one or their combination realize: have and patrol for the discrete of logic gates that data signal is realized logic function
Collect circuit, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate
Array (FPGA) etc..
Those skilled in the art are appreciated that it is permissible for realizing all or part of step that above-described embodiment method carries
Instructing relevant hardware by program to complete, described program can be stored in a kind of computer-readable recording medium, this journey
Sequence upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be each
Unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module is the most permissible
The form using hardware realizes, it would however also be possible to employ the form of software function module realizes.If described integrated module is with software merit
Can the form of module realize and as independent production marketing or when using, it is also possible to be stored in the storage of embodied on computer readable and be situated between
In matter.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, reference term " embodiment ", " some embodiments ", " example ", " concrete example ",
Or specific features, structure, material or the feature that the description of " some examples " etc. means to combine this embodiment or example describes comprises
In at least one embodiment or example of the present invention.In this manual, the schematic representation to above-mentioned term not necessarily refers to
It is identical embodiment or example.And, the specific features of description, structure, material or feature can at any one or
Multiple embodiments or example combine in an appropriate manner.
Although above it has been shown and described that embodiments of the invention, it is to be understood that above-described embodiment is exemplary,
Being not considered as limiting the invention, those of ordinary skill in the art is in the case of without departing from the principle of the present invention and objective
Above-described embodiment can be changed within the scope of the invention, revise, replace and modification.The scope of the present invention is by appended power
Profit requires and equivalent limits.
Claims (10)
1. a method of commerce, it is characterised in that including:
After biological limbs enter the preset range of the first equipment, described first equipment is built with described second equipment by biological limbs
Vertical communication connection;
Described first equipment receives the authentication information of described second device broadcasts by described communication connection, and described authentication information includes
Certification identification information and information to be certified;
In the persistent period of the preset range entering the first equipment at described biological limbs, described first equipment gathers described biological limb
The biological information of body;
Described first equipment sends described biological information and described authentication information to backstage;
Described backstage receives described biological information and the described authentication information that described first equipment sends, according to described certification
Described information to be certified and described biological information are authenticated by identification information, obtain authentication result, and to described first
Equipment sends described authentication result;
Described first equipment receive described backstage send described authentication result, described authentication result be certification pass through time, perform
Transaction flow.
Method the most according to claim 1, it is characterised in that
According to described certification identification information, described information to be certified and described biological information are authenticated, obtain certification knot
Fruit includes:
Obtain the digital authenticating factor corresponding to described certification identification information and biological characteristic validation information, and utilize described digital authenticating
Information to be certified described in factor pair carries out digital authenticating and detects described biological characteristic validation information and described biological information
Whether matching rate, more than preset value, passes through and institute utilizing information to be certified described in described digital authenticating factor pair to carry out digital authenticating
When stating the biological information matching rate with described biological characteristic validation information more than preset value, obtaining authentication result is that certification is passed through.
Method the most according to claim 2, it is characterised in that described utilize described in described digital authenticating factor pair to be certified
Information carries out digital authenticating and detects the matching rate of described biological characteristic validation information and described biological information and include:
After digital authenticating passes through utilizing information to be certified described in described digital authenticating factor pair to carry out, detect described biological characteristic and test
Whether card information is more than preset value with the matching rate of described biological information.
Method the most according to claim 1 and 2, it is characterised in that described biological information includes: finger print information and
/ or venous information;
Described first equipment gathers the biological information of described biological limbs and includes: by biological limbs and described first equipment
In the case of contact, gather the described biological information of described biological limbs and the contact site of described first equipment.
Method the most according to claim 1 and 2, it is characterised in that
Described information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Wherein, when described information to be certified is electronic signature information, the described digital authenticating factor is for enter described electronic signature information
The PKI of row sign test;When described information to be certified is cipher-text information, the described digital authenticating factor is for recognize described cipher-text information
The symmetric key of card;When described information to be certified is dynamic password, the described digital authenticating factor is for recognize described dynamic password
The certification password of card.
6. a transaction system, it is characterised in that including:
First equipment, after the preset range entering the first equipment at biological limbs, described first equipment by biological limbs with
Described second equipment sets up communication connection;By described communication connection receive described second device broadcasts authentication information, described in recognize
Card information includes certification identification information and information to be certified;When described biological limbs enter preset range lasting of the first equipment
In, described first equipment gathers the biological information of described biological limbs;And described biological information is sent to backstage
And described authentication information;
Described backstage, for receiving described biological information and the described authentication information that described first equipment sends, according to institute
State certification identification information described information to be certified and described biological information are authenticated, obtain authentication result, and to institute
First equipment of stating sends described authentication result;
Described first equipment, is additionally operable to receive the described authentication result that described backstage sends, is that certification is passed through in described authentication result
Time, perform transaction flow.
System the most according to claim 6, it is characterised in that
Described backstage, specifically for obtaining the digital authenticating factor corresponding to described certification identification information and biological characteristic validation information,
And utilize information to be certified described in described digital authenticating factor pair carry out digital authenticating and detect described biological characteristic validation information with
Whether the matching rate of described biological information, more than preset value, enters utilizing information to be certified described in described digital authenticating factor pair
Row number certification by and the matching rate of described biological information and described biological characteristic validation information more than preset value time, obtain
Authentication result is that certification is passed through.
System the most according to claim 6, it is characterised in that described backstage, specifically for utilizing described digital authenticating
Information to be certified described in factor pair carries out after digital authenticating passes through, detecting described biological characteristic validation information and believing with described biological characteristic
Whether the matching rate of breath is more than preset value.
9. according to the system described in any one of claim 6-8, it is characterised in that described biological information includes: fingerprint is believed
Breath and/or venous information;
Described first equipment, specifically for, in the case of being contacted with described first equipment by biological limbs, gathering described biology
The described biological information of the contact site of limbs and described first equipment.
10. according to the system described in any one of claim 6-8, it is characterised in that
Described information to be certified at least includes one of following information: electronic signature information, cipher-text information or dynamic password;
Wherein, when described information to be certified is electronic signature information, the described digital authenticating factor is for enter described electronic signature information
The PKI of row sign test;When described information to be certified is cipher-text information, the described digital authenticating factor is for recognize described cipher-text information
The symmetric key of card;When described information to be certified is dynamic password, the described digital authenticating factor is for recognize described dynamic password
The certification password of card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610127889.9A CN105939195A (en) | 2016-03-07 | 2016-03-07 | Transaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610127889.9A CN105939195A (en) | 2016-03-07 | 2016-03-07 | Transaction method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105939195A true CN105939195A (en) | 2016-09-14 |
Family
ID=57151277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610127889.9A Pending CN105939195A (en) | 2016-03-07 | 2016-03-07 | Transaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105939195A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603229A (en) * | 2016-12-26 | 2017-04-26 | 北京小米移动软件有限公司 | Method and device for generating signature information |
WO2017152815A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Identity authentication method and system |
CN107545421A (en) * | 2016-06-27 | 2018-01-05 | 李明 | Determine the method and system and method for commerce and system of payment mechanism |
CN110400378A (en) * | 2019-07-23 | 2019-11-01 | 甘肃万华金慧科技股份有限公司 | A kind of parking station online management system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873244A (en) * | 2012-12-13 | 2014-06-18 | 航天信息股份有限公司 | Identity authentication method and system in mobile payment based on fingerprint identification |
CN204667407U (en) * | 2015-06-09 | 2015-09-23 | 武汉天喻信息产业股份有限公司 | A kind of wearable device and system realizing safety identification authentication |
CN105245341A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Remote identity authentication method and system and remote account opening method and system |
-
2016
- 2016-03-07 CN CN201610127889.9A patent/CN105939195A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873244A (en) * | 2012-12-13 | 2014-06-18 | 航天信息股份有限公司 | Identity authentication method and system in mobile payment based on fingerprint identification |
CN204667407U (en) * | 2015-06-09 | 2015-09-23 | 武汉天喻信息产业股份有限公司 | A kind of wearable device and system realizing safety identification authentication |
CN105245341A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Remote identity authentication method and system and remote account opening method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017152815A1 (en) * | 2016-03-07 | 2017-09-14 | 李明 | Identity authentication method and system |
CN107545421A (en) * | 2016-06-27 | 2018-01-05 | 李明 | Determine the method and system and method for commerce and system of payment mechanism |
CN106603229A (en) * | 2016-12-26 | 2017-04-26 | 北京小米移动软件有限公司 | Method and device for generating signature information |
CN106603229B (en) * | 2016-12-26 | 2019-11-26 | 北京小米支付技术有限公司 | Signing messages generation method and device |
CN110400378A (en) * | 2019-07-23 | 2019-11-01 | 甘肃万华金慧科技股份有限公司 | A kind of parking station online management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3428818B1 (en) | Identity authentication method and system | |
JP4602606B2 (en) | Authentication processing system, authentication processing method, authentication device, and computer program | |
KR102089201B1 (en) | Payment method and system | |
WO2017167037A1 (en) | Payment authentication method and authentication system based on face recognition and hce | |
CN109314545B (en) | Wireless communication system with auxiliary antenna | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN105991654A (en) | Authorization authentication method, device and system | |
CN105939336A (en) | Identity authentication method and system | |
CN105939195A (en) | Transaction method and system | |
CN105991653A (en) | Identity authentication method and device | |
CN105991652A (en) | Identity authentication method and system | |
WO2019010669A1 (en) | Method, apparatus and system for identity validity verification | |
CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
US10785218B2 (en) | Authorization authentication method, device and system | |
CN107548059A (en) | A kind of authentication method and system | |
CN105989488B (en) | Payment method and system | |
CN105989497A (en) | Payment method and system | |
JP2006268871A (en) | Authentication device and authentication processing method | |
CN103902860A (en) | Double authentication method and system | |
CN105989496A (en) | Trading method and equipment | |
CN115099799B (en) | Transaction processing method and system for digital RMB | |
JP6790839B2 (en) | Secure element, UIM card, authentication method, and authentication program | |
KR20170142983A (en) | Method for Providing Appointed Service by using Biometric Information | |
CN107292608A (en) | A kind of eID move transaction devices of encrypting fingerprint | |
JP2008065850A (en) | System and method for processing authorization, and authorization device, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160914 |
|
RJ01 | Rejection of invention patent application after publication |