CN107146086A - The method and mobile terminal of authentication - Google Patents

The method and mobile terminal of authentication Download PDF

Info

Publication number
CN107146086A
CN107146086A CN201710436026.4A CN201710436026A CN107146086A CN 107146086 A CN107146086 A CN 107146086A CN 201710436026 A CN201710436026 A CN 201710436026A CN 107146086 A CN107146086 A CN 107146086A
Authority
CN
China
Prior art keywords
risk
authentication
trading activity
hardware
scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710436026.4A
Other languages
Chinese (zh)
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minghua Alliance Technology Co Ltd
Original Assignee
Beijing Minghua Alliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Minghua Alliance Technology Co Ltd filed Critical Beijing Minghua Alliance Technology Co Ltd
Priority to CN201710436026.4A priority Critical patent/CN107146086A/en
Publication of CN107146086A publication Critical patent/CN107146086A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention is applied to communication technical field there is provided a kind of method of authentication and mobile terminal, and methods described includes:Read the authentication Scheme Choice strategy pre-set;It is preferential that authentication is carried out using the hardware SE authentications scheme based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy;If the authentication Scheme Choice strategy is for convenience of quick preference strategy, preferential to carry out authentication using the authentication scheme based on non-hardware medium.Pass through the present invention, authentication can be carried out using the safest hardware SE authentications scheme based on hardware medium with prioritizing selection, can also prioritizing selection authentication is carried out using the authentication scheme based on non-hardware medium, therefore can be with compromise between security and Consumer's Experience.The method for overcoming the authentication of prior art offer can not compromise between security and the problem of Consumer's Experience.

Description

The method and mobile terminal of authentication
Technical field
The invention belongs to the method and mobile terminal of communication technical field, more particularly to a kind of authentication.
Background technology
At present, during mobile payment, to ensure that security has diversified safety guarantee scheme to ensure user The legitimacy of identity.These safety guarantee schemes have different modes of operation, possess different safe classes, go for Different application scenarios.
Wherein, hardware security module (Secure Element, SE) authentication scheme based on hardware medium, due to having Special hardware medium, more safe and reliable, but need extra hardware spending, operating experience may also can be worse.
Authentication scheme based on non-hardware medium, such as soft TOKEN schemes and other schemes, such as mobile phone identifying code Scheme, can be more convenient compared to hardware SE schemes, but security may be worse, especially under the scene of block trade, Safety guarantee may be not enough.
However, in process of the present invention is realized, inventor has found that the method for the authentication that prior art is provided at least is deposited In following problem:
During mobile payment, the method for the authentication that prior art is provided is merely using based on the hard of hardware medium Part SE authentications scheme or based on non-hardware medium authentication scheme, it is impossible to compromise between security and Consumer's Experience.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of method, device and mobile terminal of authentication, existing to solve The method for the authentication that technology is provided can not compromise between security and the problem of Consumer's Experience.
First aspect includes there is provided a kind of method of authentication, methods described:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy SE authentications scheme carries out authentication;
It is preferential using based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme carry out authentication.
Further, it is described preferential using the hardware SE authentications scheme progress authentication bag based on hardware medium Include:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, after the authentication scheme progress authentication used based on non-hardware medium, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding Transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, the preferential authentication scheme progress authentication used based on non-hardware medium includes:
If the trading activity carried out is low-risk trading activity, using the authentication scheme based on non-hardware medium Carry out authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Second aspect includes there is provided a kind of mobile terminal, the mobile terminal:
Tactful read module, for reading the authentication Scheme Choice strategy pre-set;
First authentication module, if being safe preference strategy for the authentication Scheme Choice strategy, preferentially Authentication is carried out using the hardware SE authentications scheme based on hardware medium;
Second authentication module, if for the authentication Scheme Choice strategy for convenience of quick preference strategy, It is preferential that authentication is carried out using the authentication scheme based on non-hardware medium.
Further, first authentication module includes:
First authentication unit, if for there is hardware SE, using the hardware SE authentication schemes based on hardware medium Carry out authentication;
Second authentication unit, if in the absence of hardware SE, being entered using the authentication scheme based on non-hardware medium Row authentication.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, first authentication module also includes:
Unit is forbidden in first transaction, for before confirming to pay, judging whether carried out trading activity is excessive risk Trading activity, if it is, forbidding transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, second authentication module includes:
3rd authentication unit, if the trading activity for being carried out is low-risk trading activity, using based on non-hardware The authentication scheme of medium carries out authentication;
, if being high-risk transactions behavior for the trading activity carried out, and there is hardware SE, then adopt in the 4th authentication unit Authentication is carried out with the hardware SE authentications scheme based on hardware medium;
Unit is forbidden in second transaction, if the trading activity for being carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbid transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
The third aspect is there is provided a kind of mobile terminal, including memory, processor and is stored in the memory and can The computer program run on the processor, it is characterised in that realized described in the computing device during computer program Following steps:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy SE authentications scheme carries out authentication;
It is preferential using based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme carry out authentication.
Further, it is described preferential using the hardware SE authentications scheme progress authentication bag based on hardware medium Include:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, after the authentication scheme progress authentication used based on non-hardware medium, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding Transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, the preferential authentication scheme progress authentication used based on non-hardware medium includes:
If the trading activity carried out is low-risk trading activity, using the authentication scheme based on non-hardware medium Carry out authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Fourth aspect has calculating there is provided a kind of computer-readable recording medium, the computer-readable recording medium storage Machine program, the computer program realizes following steps when being executed by processor:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy SE authentications scheme carries out authentication;
It is preferential using based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme carry out authentication.
Further, it is described preferential using the hardware SE authentications scheme progress authentication bag based on hardware medium Include:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
Trading activity is divided into low-risk trading activity and excessive risk according further to the risk class of trading activity Trading activity, after the authentication scheme progress authentication used based on non-hardware medium, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding Transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, the preferential authentication scheme progress authentication used based on non-hardware medium includes:
If the trading activity carried out is low-risk trading activity, using the authentication scheme based on non-hardware medium Carry out authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
The beneficial effect that the embodiment of the present invention exists compared with prior art is:The embodiment of the present invention is according to the identity of reading Proof scheme selection strategy, can carry out identity with the safest hardware SE authentications scheme based on hardware medium of prioritizing selection Checking, can also authentication scheme of the prioritizing selection based on non-hardware medium carry out authentication, therefore safety can be taken into account Property and Consumer's Experience.Overcome prior art offer authentication method can not compromise between security and Consumer's Experience ask Topic.
Furthermore it is possible to be tested with reference to the hardware SE authentications scheme based on hardware medium and the identity based on non-hardware medium The advantage of card scheme.High-risk transactions behavior must be verified by the hardware SE authentication schemes based on hardware medium;It is low Risk trade behavior can select the authentication scheme based on non-hardware medium to carry out authentication.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art In required for the accompanying drawing that uses be briefly described, it should be apparent that, drawings in the following description are only some of the present invention Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is the schematic flow diagram of the method for the authentication that first embodiment of the invention is provided;
Fig. 2 is the schematic block diagram for the mobile terminal that second embodiment of the invention is provided.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
It should be noted that the mobile terminal of the embodiment of the present invention can be mobile phone, PDA, mobile PC etc..
The realization of the present invention is described in detail below in conjunction with specific embodiment:
Embodiment one
Fig. 1 shows the exemplary flow of the method for the authentication that the embodiment of the present invention one is provided, and this method is applied to move Dynamic terminal, details are as follows:
In step S101, the authentication Scheme Choice strategy pre-set is read.
In embodiments of the present invention, an authentication Scheme Choice strategy, the authentication side can be pre-set Case selection strategy includes safe preference policies and convenient and swift preference strategy.Before authentication is carried out, mobile terminal can To read the authentication Scheme Choice strategy, different authentications is used according to the authentication Scheme Choice strategy Scheme carries out authentication.
In step s 102, if the authentication Scheme Choice strategy is safe preference strategy, preferential use is based on The hardware SE authentications scheme of hardware medium carries out authentication.
In embodiments of the present invention, mobile terminal reads the authentication Scheme Choice strategy pre-set, if described Authentication selection strategy is safe preference policies, then detects whether there is hardware SE, if there is hardware SE, then can be with Authentication is directly carried out using the hardware SE authentications scheme based on hardware medium, to ensure the security of transaction.
If detected in the absence of hardware SE, using the authentication scheme based on non-hardware medium.Wherein, based on non- The authentication scheme of hardware medium includes soft TOKEN authentications scheme, identifying code authentication scheme etc., does not limit herein System.
Wherein it is possible to which trading activity is divided into low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity.
Preferably, after authentication is carried out using the authentication scheme based on non-hardware medium, before confirming to pay, Need to judge whether used authentication scheme matches with the risk class of the trading activity carried out, if using being based on The authentication scheme of non-hardware medium carries out authentication, but the trading activity carried out is high-risk transactions behavior, then prohibits Only merchandise, to ensure the security of transaction.
Wherein, high-risk transactions behavior is the trading activity that value-at-risk is more than default risk threshold value.
Wherein, the assessment of transaction risk typically integrates various information to complete.For example:The small amount of money is general compared to the big amount of money Risk is relatively low, and the size amount of money can be set as the case may be, for example, can be great Jin more than 500 yuan with 500 yuan for boundary line Volume, is otherwise the small amount of money, and the present invention is not limited the specific amount of money;Merchandised in permanent residence relatively low compared to strange land risk;It is fixed Customer action it is relatively low compared to abnormal user's movement risk, fixed customer action can often be transferred accounts fixation to someone Amount of money etc., the present invention is not limited the type of specifically fixed customer action.Obtained specifically, how to carry out risk assessment The value-at-risk of each trading activity, and determine that trading activity is high-risk transactions behavior or low according to value-at-risk and risk threshold value Risk trade behavior, is not limited in embodiments of the present invention, and only its result need to be utilized in the present invention.
In step s 103, it is preferential to use if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme based on non-hardware medium carries out authentication.
In embodiments of the present invention, mobile terminal reads the authentication Scheme Choice strategy pre-set, if described Authentication selection strategy is convenient and swift selection strategy, then can preferentially use the authentication scheme based on non-hardware medium Carry out authentication.Specifically, the risk class of carried out trading activity can first be read, according to the trading activity carried out Risk class determine that carried out trading activity is low-risk trading activity or high-risk transactions behavior, if carried out Trading activity is low-risk trading activity, then directly carries out authentication using the authentication scheme based on non-hardware medium, To ensure the convenient, fast property of transaction.
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;If the trading activity carried out is high-risk transactions behavior, but in the absence of hard Part SE, then forbid transaction, to ensure the security of transaction.
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Wherein, for low-risk trading activity, directly select and carried out using the authentication scheme based on non-hardware medium Authentication, it is ensured that transaction it is convenient and swift.Only high-risk transactions behavior is just selected using based on the hard of hardware medium Part SE authentications scheme carries out authentication, is increased without hardware spending unnecessary, and ensure that the security of transaction.
By the embodiment of the present invention, according to the authentication Scheme Choice strategy of reading, it can be used and most pacified with prioritizing selection The full hardware SE authentications scheme based on hardware medium carries out authentication, to ensure the security of authentication, also may be used With prioritizing selection, using most convenient, efficiently the authentication scheme based on non-hardware medium carries out authentication, therefore can be simultaneous Security and Consumer's Experience are turned round and look at, the method for overcoming the authentication of prior art offer can not compromise between security and Consumer's Experience The problem of.
In addition, when authentication Scheme Choice strategy is safe and efficient preferential, bank or other Facultys of Finance can be combined The security risk assessment united to trading activity, the verification mode paid according to the risk class of trading activity, dynamic select.Low wind Dangerous trading activity can be increased without the hardware spending being not necessarily to, and ensure that friendship without using hardware SE authentication schemes Easy is safe and efficient;High-risk transactions behavior must use hardware SE authentication schemes, it is ensured that the security of transaction.
It should be understood that in embodiments of the present invention, the size of the sequence number of above-mentioned each process is not meant to the elder generation of execution sequence Afterwards, the execution sequence of each process should be determined with its function and internal logic, the implementation process structure without tackling the embodiment of the present invention Limited into any.
Can one of ordinary skill in the art will appreciate that realizing that all or part of step in the various embodiments described above method is To instruct the hardware of correlation to complete by program, corresponding program can be stored in a computer read/write memory medium In, described storage medium, such as ROM/RAM, disk or CD.
Embodiment two
Fig. 2 shows the schematic block diagram for the mobile terminal 2 that the embodiment of the present invention two is provided, and for convenience of description, only shows The part related to the embodiment of the present invention is gone out.The mobile terminal 2 includes:Tactful read module 21, the first authentication mould The authentication module 23 of block 22 and second.
Wherein, tactful read module 21, for reading the authentication Scheme Choice strategy pre-set;
First authentication module 22, it is excellent if being safe preference strategy for the authentication Scheme Choice strategy Authentication is first carried out using the hardware SE authentications scheme based on hardware medium;
Second authentication module 23, if for the authentication Scheme Choice strategy for convenience of quick preference strategy, It is then preferential that authentication is carried out using the authentication scheme based on non-hardware medium.
Specifically, first authentication module 22 includes:
First authentication unit, if for there is hardware SE, using the hardware SE authentication schemes based on hardware medium Carry out authentication;
Second authentication unit, if in the absence of hardware SE, being entered using the authentication scheme based on non-hardware medium Row authentication.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, first authentication module 22 also includes:
Unit is forbidden in first transaction, for before confirming to pay, judging whether carried out trading activity is excessive risk Trading activity, if it is, forbidding transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Specifically, trading activity is divided into low-risk trading activity and excessive risk friendship according to the risk class of trading activity Easy to be, second authentication module 23 includes:
3rd authentication unit, if the trading activity for being carried out is low-risk trading activity, using based on non-hardware The authentication scheme of medium carries out authentication;
, if being high-risk transactions behavior for the trading activity carried out, and there is hardware SE, then adopt in the 4th authentication unit Authentication is carried out with the hardware SE authentications scheme based on hardware medium;
Unit is forbidden in second transaction, if the trading activity for being carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbid transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Yet another embodiment of the invention additionally provides another mobile terminal, and the mobile terminal includes:Memory, processor And it is stored in the computer program that can be run in the memory and on the processor, meter described in the computing device Following steps are realized during calculation machine program:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy SE authentications scheme carries out authentication;
It is preferential using based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme carry out authentication.
Specifically, the preferential hardware SE authentications scheme progress authentication used based on hardware medium includes:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, after the authentication scheme progress authentication used based on non-hardware medium, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding Transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Specifically, trading activity is divided into low-risk trading activity and excessive risk friendship according to the risk class of trading activity Easy to be, the preferential authentication scheme progress authentication used based on non-hardware medium includes:
If the trading activity carried out is low-risk trading activity, using the authentication scheme based on non-hardware medium Carry out authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Mobile terminal provided in an embodiment of the present invention can be applied in foregoing corresponding embodiment of the method one, details referring to The description of above-described embodiment one, will not be repeated here.
Yet another embodiment of the invention additionally provides a kind of computer-readable recording medium, and the computer-readable recording medium can To be the computer-readable recording medium included in the memory in above-described embodiment;Can also be individualism, it is unassembled Enter the computer-readable recording medium in terminal.The computer-readable recording medium storage has one or more than one journey Sequence, one or more than one program is used for performing an information processing side by one or more than one processor Method, the described method comprises the following steps:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy SE authentications scheme carries out authentication;
It is preferential using based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Authentication scheme carry out authentication.
Specifically, the preferential hardware SE authentications scheme progress authentication used based on hardware medium includes:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
Further, trading activity is divided into by low-risk trading activity and excessive risk according to the risk class of trading activity Trading activity, after the authentication scheme progress authentication used based on non-hardware medium, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding Transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Specifically, trading activity is divided into low-risk trading activity and excessive risk friendship according to the risk class of trading activity Easy to be, the preferential authentication scheme progress authentication used based on non-hardware medium includes:
If the trading activity carried out is low-risk trading activity, using the authentication scheme based on non-hardware medium Carry out authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using based on hardware medium Hardware SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, high-risk transactions row For be value-at-risk be more than default risk threshold value trading activity.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
, can be with several embodiments provided herein, it should be understood that disclosed systems, devices and methods Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, such as multiple units or component Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (16)

1. a kind of method of authentication, it is characterised in that methods described includes:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware security based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy Module SE authentications scheme carries out authentication;
It is preferential to use the body based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Part proof scheme carries out authentication.
2. the method as described in claim 1, it is characterised in that the preferential hardware SE identity of the use based on hardware medium is tested Card scheme, which carries out authentication, to be included:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
3. method as claimed in claim 2, it is characterised in that be divided into trading activity according to the risk class of trading activity Low-risk trading activity and high-risk transactions behavior, described using the authentication scheme progress identity based on non-hardware medium After checking, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding handing over Easily;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
4. the method as described in claim 1, it is characterised in that be divided into trading activity according to the risk class of trading activity Low-risk trading activity and high-risk transactions behavior, it is described preferential using the authentication scheme progress body based on non-hardware medium Part checking includes:
If the trading activity carried out is low-risk trading activity, carried out using the authentication scheme based on non-hardware medium Authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using the hardware based on hardware medium SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
5. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Tactful read module, for reading the authentication Scheme Choice strategy pre-set;
First authentication module, it is preferential to use if being safe preference strategy for the authentication Scheme Choice strategy Hardware security module SE authentications scheme based on hardware medium carries out authentication;
Second authentication module, if for the authentication Scheme Choice strategy for convenience of quick preference strategy, preferentially Authentication is carried out using the authentication scheme based on non-hardware medium.
6. mobile terminal as claimed in claim 5, it is characterised in that first authentication module includes:
First authentication unit, if for there is hardware SE, being carried out using the hardware SE authentications scheme based on hardware medium Authentication;
Second authentication unit, if in the absence of hardware SE, body to be carried out using the authentication scheme based on non-hardware medium Part checking.
7. mobile terminal as claimed in claim 6, it is characterised in that drawn trading activity according to the risk class of trading activity It is divided into low-risk trading activity and high-risk transactions behavior, first authentication module also includes:
Unit is forbidden in first transaction, for before confirming to pay, judging whether carried out trading activity is high-risk transactions Behavior, if it is, forbidding transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
8. mobile terminal as claimed in claim 5, it is characterised in that drawn trading activity according to the risk class of trading activity It is divided into low-risk trading activity and high-risk transactions behavior, second authentication module includes:
3rd authentication unit, if the trading activity for being carried out is low-risk trading activity, using based on non-hardware medium Authentication scheme carry out authentication;
, if being high-risk transactions behavior for the trading activity carried out, and there is hardware SE, then using base in the 4th authentication unit Authentication is carried out in the hardware SE authentications scheme of hardware medium;
Unit is forbidden in second transaction, if the trading activity for being carried out is high-risk transactions behavior, but hardware SE is not present, then Forbid transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
9. a kind of mobile terminal, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, it is characterised in that realize following steps during computer program described in the computing device:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware security based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy Module SE authentications scheme carries out authentication;
It is preferential to use the body based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Part proof scheme carries out authentication.
10. mobile terminal as claimed in claim 9, it is characterised in that described preferential using the hardware SE based on hardware medium Authentication scheme, which carries out authentication, to be included:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
11. mobile terminal as claimed in claim 10, it is characterised in that according to the risk class of trading activity by trading activity Low-risk trading activity and high-risk transactions behavior are divided into, is entered described using the authentication scheme based on non-hardware medium After row authentication, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding handing over Easily;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
12. mobile terminal as claimed in claim 9, it is characterised in that according to the risk class of trading activity by trading activity Low-risk trading activity and high-risk transactions behavior are divided into, it is described preferential using the authentication scheme based on non-hardware medium Carrying out authentication includes:
If the trading activity carried out is low-risk trading activity, carried out using the authentication scheme based on non-hardware medium Authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using the hardware based on hardware medium SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
13. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists In the computer program realizes following steps when being executed by processor:
Read the authentication Scheme Choice strategy pre-set;
It is preferential to use the hardware security based on hardware medium if the authentication Scheme Choice strategy is safe preference strategy Module SE authentications scheme carries out authentication;
It is preferential to use the body based on non-hardware medium if the authentication Scheme Choice strategy is for convenience of quick preference strategy Part proof scheme carries out authentication.
14. computer-readable recording medium as claimed in claim 13, it is characterised in that described preferential using based on hardware Jie The hardware SE authentications scheme of matter, which carries out authentication, to be included:
If there is hardware SE, authentication is carried out using the hardware SE authentications scheme based on hardware medium;
If in the absence of hardware SE, authentication is carried out using the authentication scheme based on non-hardware medium.
15. computer-readable recording medium as claimed in claim 14, it is characterised in that
Trading activity is divided into by low-risk trading activity and high-risk transactions behavior according to the risk class of trading activity, in institute State using based on non-hardware medium authentication scheme carry out authentication after, in addition to:
Before confirming to pay, judge whether carried out trading activity is high-risk transactions behavior, if it is, forbidding handing over Easily;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
16. computer-readable recording medium as claimed in claim 13, it is characterised in that according to the risk class of trading activity Trading activity is divided into low-risk trading activity and high-risk transactions behavior, it is described preferential using the body based on non-hardware medium Part proof scheme, which carries out authentication, to be included:
If the trading activity carried out is low-risk trading activity, carried out using the authentication scheme based on non-hardware medium Authentication;
If the trading activity carried out is high-risk transactions behavior, and there is hardware SE, then using the hardware based on hardware medium SE authentications scheme carries out authentication;
If the trading activity carried out is high-risk transactions behavior, but in the absence of hardware SE, then forbids transaction;
Wherein, low-risk trading activity is the trading activity that value-at-risk is less than default risk threshold value, and high-risk transactions behavior is Value-at-risk is more than the trading activity of default risk threshold value.
CN201710436026.4A 2017-06-09 2017-06-09 The method and mobile terminal of authentication Pending CN107146086A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710436026.4A CN107146086A (en) 2017-06-09 2017-06-09 The method and mobile terminal of authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710436026.4A CN107146086A (en) 2017-06-09 2017-06-09 The method and mobile terminal of authentication

Publications (1)

Publication Number Publication Date
CN107146086A true CN107146086A (en) 2017-09-08

Family

ID=59782701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710436026.4A Pending CN107146086A (en) 2017-06-09 2017-06-09 The method and mobile terminal of authentication

Country Status (1)

Country Link
CN (1) CN107146086A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000956A (en) * 2020-08-27 2020-11-27 山东超越数控电子股份有限公司 Identity verification method and system based on trusted computer

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2667807Y (en) * 2004-01-08 2004-12-29 中国工商银行 Network bank with device for encrypting and idetificating utilizing USB key
CN104113418A (en) * 2014-07-15 2014-10-22 浪潮通用软件有限公司 Rule-configuration-based compound identity authentication method in ERP (enterprise resource planning) system
US20160277396A1 (en) * 2015-01-14 2016-09-22 Tactilis Sdn Bhd System and method for selectively initiating biometric authentication for enhanced security of access control transactions
CN106529961A (en) * 2016-11-07 2017-03-22 郑州游爱网络技术有限公司 Bank fingerprint payment processing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2667807Y (en) * 2004-01-08 2004-12-29 中国工商银行 Network bank with device for encrypting and idetificating utilizing USB key
CN104113418A (en) * 2014-07-15 2014-10-22 浪潮通用软件有限公司 Rule-configuration-based compound identity authentication method in ERP (enterprise resource planning) system
US20160277396A1 (en) * 2015-01-14 2016-09-22 Tactilis Sdn Bhd System and method for selectively initiating biometric authentication for enhanced security of access control transactions
CN106529961A (en) * 2016-11-07 2017-03-22 郑州游爱网络技术有限公司 Bank fingerprint payment processing method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000956A (en) * 2020-08-27 2020-11-27 山东超越数控电子股份有限公司 Identity verification method and system based on trusted computer

Similar Documents

Publication Publication Date Title
EP3780541B1 (en) Identity information identification method and device
CN110020786A (en) Business processing, air control recognition methods, device and equipment
US20070133768A1 (en) Fraud detection for use in payment processing
CN105959317A (en) Security authentication method and terminal
CN108985569A (en) A kind of vehicle risk appraisal procedure, server
CN107705130A (en) A kind of on-line payment method
CN108564459A (en) Judgment method, device, equipment and the readable storage medium storing program for executing of abnormal type of transaction
CN110738473A (en) Wind control method, system, device and equipment
CN105847292B (en) A kind of cloud method for authenticating, apparatus and system based on NFC-HCE
CN107707527A (en) A kind of detection method, read-write terminal and the system of smart card relay attack
EP3547243A1 (en) Methods and apparatuses for fraud handling
CN104012122A (en) Method for communicating with an application on a portable data storage medium, and such a portable data storage medium
CN107146086A (en) The method and mobile terminal of authentication
Gold The evolution of payment card fraud
CN109191096A (en) A kind of signing risk quantification method withholds risk quantification method, device and equipment
CN108550043A (en) The method for anti-counterfeit of commodity sign, the verification method of device and commodity true and false, device
CN106157034A (en) The monitoring method and apparatus of data network transfer and communication system
US11403639B2 (en) Method of auto-detection of an attempted piracy of an electronic payment card, corresponding card, terminal and program
CN107292194A (en) A kind of data guard method, mobile terminal and storage medium
CN110956544B (en) Digital asset transaction risk control method and device
Reed Mobilizing payments: behind the screen of the latest payment trend
Souvignet et al. Payment card forensic analysis: From concepts to desktop and mobile analysis tools
CN110009386B (en) User classification method, device, computer equipment and storage medium
CN106204024A (en) Method of mobile payment under a kind of line
CN111708994A (en) Risk management method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908

RJ01 Rejection of invention patent application after publication