CN106209787A - Auth method and system in a kind of wireless communication procedure - Google Patents

Auth method and system in a kind of wireless communication procedure Download PDF

Info

Publication number
CN106209787A
CN106209787A CN201610491163.3A CN201610491163A CN106209787A CN 106209787 A CN106209787 A CN 106209787A CN 201610491163 A CN201610491163 A CN 201610491163A CN 106209787 A CN106209787 A CN 106209787A
Authority
CN
China
Prior art keywords
information
server
mobile terminal
user
pressing
Prior art date
Application number
CN201610491163.3A
Other languages
Chinese (zh)
Inventor
苏维璐
张林海
Original Assignee
宁波市由乐讯通讯科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宁波市由乐讯通讯科技有限公司 filed Critical 宁波市由乐讯通讯科技有限公司
Priority to CN201610491163.3A priority Critical patent/CN106209787A/en
Publication of CN106209787A publication Critical patent/CN106209787A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transaction
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0861Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or paths for security, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Abstract

Auth method in a kind of wireless communication procedure, including: S1, frequent address information is set in the server, server obtains the transaction request information of the user that mobile terminal sends, from customer transaction solicited message, obtain user network information, judge whether user is in conventional address according to user network information and conventional address information;Jump to step S3 in this way, otherwise jump to step S2;S2, server send user authentication request message to mobile terminal, and finger print information and the pressing information of user are identified by mobile terminal, finger print information and pressing information all by checking time, the result information is sent to server and jumps to step S5;When finger print information and pressing information are the most not verified, the result information are sent to server and jump to step S6;S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;S6, server judge that authentication is not passed through, and terminate this method flow process.

Description

Auth method and system in a kind of wireless communication procedure

Technical field

The present invention relates to wireless communication technology field, particularly to auth method in a kind of wireless communication procedure and be System.

Background technology

On-line payment refers to that when the seller and the buyer are traded by the e-commerce website on the Internet, bank is that it carries A kind of business for the service of online capital settlement.It for enterprises and individuals provide one safely, quickly, convenient ecommerce Applied environment and online capital settlement instrument.On-line payment not only helps enterprise to achieve quickly collecting of sales payment, shortens In the gathering cycle, the most also provide consumption online payment and settlement mode for individual Web bank client, make client be truly realized foot Do not go out family, shopping online.

When carrying out on-line payment, the authentication of user is the emphasis being related to payment safety.In prior art, past Carry out authentication toward combining bio-identification by password, but password also exist stolen defect, and biological characteristic due to There is uniqueness, and cannot be carried out change, therefore there is also the defect being illegally used.

Summary of the invention

In view of this, auth method and system during the present invention proposes a kind of wireless communication procedure.

Auth method in a kind of wireless communication procedure, it comprises the steps:

S1, arranging frequent address information in the server, server obtains the transaction request information of the user that mobile terminal sends, from Customer transaction solicited message obtains user network information, judges that user is according to user network information and conventional address information No it is in conventional address;Jump to step S3 in this way, otherwise jump to step S2;

S2, server send user authentication request message to mobile terminal, and mobile terminal is to the finger print information of user and pressing information Be identified, finger print information and pressing information all by checking time, the result information is sent to server and redirects To step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3; When only pressing information is by checking, the result information is sent to server and jumps to step S4;At finger print information And pressing information the most not verified time, the result information is sent to server and jumps to step S6;

S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, When being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, by close Code the result information is sent to server and jumps to step S6;

S4, server send short-message verification information and password authentification solicited message, the mobile terminal user to receiving to mobile terminal The password of input and short-message verification information verifying, when both of which is verified, password that user is inputted and The result information of short-message verification information is sent to server and jumps to step S5;Otherwise, by user input password with And the result information of short-message verification information is sent to server and jumps to step S6;

S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;

S6, server judge that authentication is not passed through, and terminate this method flow process.

In wireless communication procedure of the present invention in auth method, described pressing information includes:

User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;

User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.

In wireless communication procedure of the present invention in auth method, judged each by mobile terminal pressure inductor Whether the press pressure value of individual area pressed is more than activation threshold value.

In wireless communication procedure of the present invention in auth method, described step S6 also includes that server judges Authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate this method stream Journey.

The present invention also provides for authentication system in a kind of wireless communication procedure, and it includes such as lower unit:

Address judging unit, for arranging frequent address information in the server, server obtains the user's of mobile terminal transmission Transaction request information, obtains user network information from customer transaction solicited message, according to user network information and conventional ground Location information judges whether user is in conventional address;Jump to individual event authentication unit in this way, otherwise jump to first authentication unit;

First authentication unit, for sending user authentication request message, the mobile terminal finger to user by server to mobile terminal Stricture of vagina information and pressing information are identified, finger print information and pressing information all by checking time, by the result information It is sent to server and jumps to performance element of concluding the business;When being verified when only finger print information, the result information is sent out Deliver to server and jump to individual event authentication unit;When only pressing information is by checking, the result information is sent to Server also jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result is believed Breath is sent to server and jumps to terminate unit;

Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, it is defeated that mobile terminal receives user The password that enters also is verified, when being verified, password authentification object information is sent to server and jumps to transaction and hold Row unit;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;

Bi-directional verification unit, is used for by server to mobile terminal transmission short-message verification information and password authentification solicited message, The password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, will The password of user's input and the result information of short-message verification information are sent to server and jump to performance element of concluding the business; Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate list Unit;

Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;

Terminate unit, be used for when server judges that authentication is not passed through, and terminate native system function.

In wireless communication procedure of the present invention in authentication system, described pressing information includes:

User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;

User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.

In wireless communication procedure of the present invention in authentication system, judged each by mobile terminal pressure inductor Whether the press pressure value of individual area pressed is more than activation threshold value.

In wireless communication procedure of the present invention in authentication system, described termination unit also includes that server is sentenced Disconnected authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate native system merit Energy.

Implement auth method and system in the wireless communication procedure that the present invention provides compared with prior art have with Lower beneficial effect: by distinguishing various scenes, use different authentication policys, it is possible to while satisfied checking convenience, enter The authentication of row different safety class;Additionally, by user fingerprints information being divided into multiple area pressed, and preset multiple The pressing activation threshold value of area pressed and pressing order information, and by pre-to area pressed information and pressing activation threshold value information Exist on mobile terminal;User time enterprising row presses in mobile terminal, first determines whether that the press pressure value of each area pressed is No more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge pressing order letter Breath is the most correct, when pressing order information and being correct, it is judged that pressing information is by checking so that other people cannot get a glimpse of testing of user Card process, safe coefficient is high.

Accompanying drawing explanation

Fig. 1 be the embodiment of the present invention wireless communication procedure in the structured flowchart of authentication system.

Detailed description of the invention

Auth method in a kind of wireless communication procedure, it comprises the steps:

S1, arranging frequent address information in the server, server obtains the transaction request information of the user that mobile terminal sends, from Customer transaction solicited message obtains user network information, judges that user is according to user network information and conventional address information No it is in conventional address;Jump to step S3 in this way, otherwise jump to step S2;

S2, server send user authentication request message to mobile terminal, and mobile terminal is to the finger print information of user and pressing information Be identified, finger print information and pressing information all by checking time, the result information is sent to server and redirects To step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3; When only pressing information is by checking, the result information is sent to server and jumps to step S4;At finger print information And pressing information the most not verified time, the result information is sent to server and jumps to step S6;

S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, When being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, by close Code the result information is sent to server and jumps to step S6;

S4, server send short-message verification information and password authentification solicited message, the mobile terminal user to receiving to mobile terminal The password of input and short-message verification information verifying, when both of which is verified, password that user is inputted and The result information of short-message verification information is sent to server and jumps to step S5;Otherwise, by user input password with And the result information of short-message verification information is sent to server and jumps to step S6;

S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;

S6, server judge that authentication is not passed through, and terminate this method flow process.

In wireless communication procedure of the present invention in auth method, described pressing information includes:

User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;

User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.

In wireless communication procedure of the present invention in auth method, judged each by mobile terminal pressure inductor Whether the press pressure value of individual area pressed is more than activation threshold value.Alternatively, the pressure sensitive identical with iphone6s can be used Device judges.

In wireless communication procedure of the present invention in auth method, described step S6 also includes that server judges Authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate this method stream Journey.

As it is shown in figure 1, the present invention also provides for authentication system in a kind of wireless communication procedure, it includes such as lower unit:

Address judging unit, for arranging frequent address information in the server, server obtains the user's of mobile terminal transmission Transaction request information, obtains user network information from customer transaction solicited message, according to user network information and conventional ground Location information judges whether user is in conventional address;Jump to individual event authentication unit in this way, otherwise jump to first authentication unit;

First authentication unit, for sending user authentication request message, the mobile terminal finger to user by server to mobile terminal Stricture of vagina information and pressing information are identified, finger print information and pressing information all by checking time, by the result information It is sent to server and jumps to performance element of concluding the business;When being verified when only finger print information, the result information is sent out Deliver to server and jump to individual event authentication unit;When only pressing information is by checking, the result information is sent to Server also jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result is believed Breath is sent to server and jumps to terminate unit;

Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, it is defeated that mobile terminal receives user The password that enters also is verified, when being verified, password authentification object information is sent to server and jumps to transaction and hold Row unit;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;

Bi-directional verification unit, is used for by server to mobile terminal transmission short-message verification information and password authentification solicited message, The password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, will The password of user's input and the result information of short-message verification information are sent to server and jump to performance element of concluding the business; Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate list Unit;

Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;

Terminate unit, be used for when server judges that authentication is not passed through, and terminate native system function.

In wireless communication procedure of the present invention in authentication system, described pressing information includes:

User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;

User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.

In wireless communication procedure of the present invention in authentication system, judged each by mobile terminal pressure inductor Whether the press pressure value of individual area pressed is more than activation threshold value.

In wireless communication procedure of the present invention in authentication system, described termination unit also includes that server is sentenced Disconnected authentication is not passed through, and points out to mobile terminal and does not passes through information and freeze mobile terminal preset exchange hour and terminate native system merit Energy.

Implement auth method and system in the wireless communication procedure that the present invention provides compared with prior art have with Lower beneficial effect: by distinguishing various scenes, use different authentication policys, it is possible to while satisfied checking convenience, enter The authentication of row different safety class;Additionally, by user fingerprints information being divided into multiple area pressed, and preset multiple The pressing activation threshold value of area pressed and pressing order information, and by pre-to area pressed information and pressing activation threshold value information Exist on mobile terminal;User time enterprising row presses in mobile terminal, first determines whether that the press pressure value of each area pressed is No more than activation threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge pressing order letter Breath is the most correct, when pressing order information and being correct, it is judged that pressing information is by checking so that other people cannot get a glimpse of testing of user Card process, safe coefficient is high.

It is understood that for the person of ordinary skill of the art, can conceive according to the technology of the present invention and do Go out other various corresponding changes and deformation, and all these change all should belong to the protection model of the claims in the present invention with deformation Enclose.

Claims (8)

1. auth method in a wireless communication procedure, it is characterised in that it comprises the steps:
S1, arranging frequent address information in the server, server obtains the transaction request information of the user that mobile terminal sends, from Customer transaction solicited message obtains user network information, judges that user is according to user network information and conventional address information No it is in conventional address;Jump to step S3 in this way, otherwise jump to step S2;
S2, server send user authentication request message to mobile terminal, and mobile terminal is to the finger print information of user and pressing information Be identified, finger print information and pressing information all by checking time, the result information is sent to server and redirects To step S5;When being verified when only finger print information, the result information is sent to server and jumps to step S3; When only pressing information is by checking, the result information is sent to server and jumps to step S4;At finger print information And pressing information the most not verified time, the result information is sent to server and jumps to step S6;
S3, server send password authentification solicited message to mobile terminal, and mobile terminal receives the password of user's input and verifies, When being verified, password authentification object information is sent to server and jumps to step S5;When checking is not passed through, by close Code the result information is sent to server and jumps to step S6;
S4, server send short-message verification information and password authentification solicited message, the mobile terminal user to receiving to mobile terminal The password of input and short-message verification information verifying, when both of which is verified, password that user is inputted and The result information of short-message verification information is sent to server and jumps to step S5;Otherwise, by user input password with And the result information of short-message verification information is sent to server and jumps to step S6;
S5, server judge that authentication is passed through, and terminate this method flow process after completing transaction;
S6, server judge that authentication is not passed through, and terminate this method flow process.
2. auth method in wireless communication procedure as claimed in claim 1, it is characterised in that described pressing information bag Include:
User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.
3. auth method in wireless communication procedure as claimed in claim 2, it is characterised in that by mobile terminal feeling of stress Whether the press pressure value of each area pressed is more than activation threshold value to answer device to judge.
4. auth method in the wireless communication procedure as described in any one of claims 1 to 3, it is characterised in that described step Rapid S6 also includes that server judges that authentication is not passed through, and does not passes through information to mobile terminal prompting and freezes the default transaction in mobile terminal Time also terminates this method flow process.
5. authentication system in a wireless communication procedure, it is characterised in that it includes such as lower unit:
Address judging unit, for arranging frequent address information in the server, server obtains the user's of mobile terminal transmission Transaction request information, obtains user network information from customer transaction solicited message, according to user network information and conventional ground Location information judges whether user is in conventional address;Jump to individual event authentication unit in this way, otherwise jump to first authentication unit;
First authentication unit, for sending user authentication request message, the mobile terminal finger to user by server to mobile terminal Stricture of vagina information and pressing information are identified, finger print information and pressing information all by checking time, by the result information It is sent to server and jumps to performance element of concluding the business;When being verified when only finger print information, the result information is sent out Deliver to server and jump to individual event authentication unit;When only pressing information is by checking, the result information is sent to Server also jumps to bi-directional verification unit;When finger print information and pressing information are the most not verified, the result is believed Breath is sent to server and jumps to terminate unit;
Individual event authentication unit, for sending password authentification solicited message by server to mobile terminal, it is defeated that mobile terminal receives user The password that enters also is verified, when being verified, password authentification object information is sent to server and jumps to transaction and hold Row unit;When checking is not passed through, password authentification object information is sent to server and jumps to terminate unit;
Bi-directional verification unit, is used for by server to mobile terminal transmission short-message verification information and password authentification solicited message, The password of mobile terminal user's input to receiving and short-message verification information verifying, when both of which is verified, will The password of user's input and the result information of short-message verification information are sent to server and jump to performance element of concluding the business; Otherwise, password user inputted and the result information of short-message verification information are sent to server and jump to terminate list Unit;
Transaction performance element, for judging that authentication is passed through by server, and terminates native system function after completing transaction;
Terminate unit, be used for when server judges that authentication is not passed through, and terminate native system function.
6. authentication system in wireless communication procedure as claimed in claim 5, it is characterised in that described pressing information bag Include:
User fingerprints information is divided into multiple area pressed, and presets pressing activation threshold value and the pressing of multiple area presseds Order information, and area pressed information and pressing activation threshold value information are pre-stored on mobile terminal;
User time enterprising row presses in mobile terminal, first determines whether that whether the press pressure value of each area pressed is more than triggering Threshold value;When the press pressure value of each area pressed is all higher than activation threshold value, continue to judge to press order information the most correct, When pressing order information and being correct, it is judged that pressing information is by checking.
7. authentication system in wireless communication procedure as claimed in claim 6, it is characterised in that by mobile terminal feeling of stress Whether the press pressure value of each area pressed is more than activation threshold value to answer device to judge.
8. authentication system in the wireless communication procedure as described in any one of claim 5 to 7, it is characterised in that described end Stop element also includes that server judges that authentication is not passed through, and does not passes through information to mobile terminal prompting and freezes the default friendship in mobile terminal The easy time also terminates native system function.
CN201610491163.3A 2016-06-29 2016-06-29 Auth method and system in a kind of wireless communication procedure CN106209787A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610491163.3A CN106209787A (en) 2016-06-29 2016-06-29 Auth method and system in a kind of wireless communication procedure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610491163.3A CN106209787A (en) 2016-06-29 2016-06-29 Auth method and system in a kind of wireless communication procedure

Publications (1)

Publication Number Publication Date
CN106209787A true CN106209787A (en) 2016-12-07

Family

ID=57461132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610491163.3A CN106209787A (en) 2016-06-29 2016-06-29 Auth method and system in a kind of wireless communication procedure

Country Status (1)

Country Link
CN (1) CN106209787A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107293072A (en) * 2017-07-09 2017-10-24 杭州力谱科技有限公司 A kind of ATM automatic teller machines

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664877A (en) * 2012-03-30 2012-09-12 北京千橡网景科技发展有限公司 Method and device for exception handling in login process
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105404875A (en) * 2015-11-30 2016-03-16 南昌欧菲生物识别技术有限公司 Fingerprint recognition apparatus, fingerprint recognition method and terminal device for same
US20160164870A1 (en) * 2014-02-07 2016-06-09 Bank Of America Corporation User authentication based on fob/indicia scan

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664877A (en) * 2012-03-30 2012-09-12 北京千橡网景科技发展有限公司 Method and device for exception handling in login process
US20160164870A1 (en) * 2014-02-07 2016-06-09 Bank Of America Corporation User authentication based on fob/indicia scan
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105404875A (en) * 2015-11-30 2016-03-16 南昌欧菲生物识别技术有限公司 Fingerprint recognition apparatus, fingerprint recognition method and terminal device for same

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107293072A (en) * 2017-07-09 2017-10-24 杭州力谱科技有限公司 A kind of ATM automatic teller machines

Similar Documents

Publication Publication Date Title
US5870723A (en) Tokenless biometric transaction authorization method and system
US7319987B1 (en) Tokenless financial access system
AU2004255011C1 (en) Managing activation of cardholders in a secure authentication program
US10049360B2 (en) Secure communication of payment information to merchants using a verification token
US8332323B2 (en) Server device for controlling a transaction, first entity and second entity
US7577616B2 (en) Method and apparatus of secure authentication and electronic payment through mobile communication tool
AU2007281028B2 (en) Transaction authorisation system and method
US8296228B1 (en) Dual transaction authorization system and method
US8799088B2 (en) System and method for verifying user identity information in financial transactions
US7941835B2 (en) Multi-mode credential authorization
US7392388B2 (en) Systems and methods for identity verification for secure transactions
US6985608B2 (en) Tokenless electronic transaction system
KR100603960B1 (en) Mobile Terminal Authentication Method and Mobile Terminal
CN1265292C (en) Electronic transaction system and methods therefor
US20090113205A1 (en) Method and apparatus for the secure identification of the owner of a portable device
US20120116976A1 (en) Verification of portable consumer device for 3-d secure services
US20110238573A1 (en) Cardless atm transaction method and system
US7774076B2 (en) System and method for validation of transactions
EP2783319B1 (en) Providing verification of user identification information
US8752125B2 (en) Authentication method
US8443200B2 (en) Biometric verification for electronic transactions over the web
JP5642932B2 (en) Authentication and verification services for third-party vendors using mobile devices
US20110178926A1 (en) Remote Variable Authentication Processing
US7558407B2 (en) Tokenless electronic transaction system
ES2284667T3 (en) Procedure for payment through the mobile phone at any points of sale or services.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination