CN111899029A - Identity verification method and device for electronic payment - Google Patents

Identity verification method and device for electronic payment Download PDF

Info

Publication number
CN111899029A
CN111899029A CN202010811764.4A CN202010811764A CN111899029A CN 111899029 A CN111899029 A CN 111899029A CN 202010811764 A CN202010811764 A CN 202010811764A CN 111899029 A CN111899029 A CN 111899029A
Authority
CN
China
Prior art keywords
verification
dynamic
serial number
code
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010811764.4A
Other languages
Chinese (zh)
Inventor
俞之璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010811764.4A priority Critical patent/CN111899029A/en
Publication of CN111899029A publication Critical patent/CN111899029A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor

Abstract

The present disclosure proposes an authentication method and apparatus for electronic payment, wherein the method comprises: after the identity authentication information is acquired, acquiring a biological identification password, verifying the biological identification password to obtain a first verification result, and if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an authentication result sent by the server. Therefore, compared with the defect of low safety in the existing electronic payment, the method and the device have the advantages that when the electronic payment is carried out, the first dynamic verification code is generated after the biological identification password is verified, and the first dynamic verification code is verified, so that the safety of the electronic payment is improved.

Description

Identity verification method and device for electronic payment
Technical Field
The present disclosure relates to the field of electronic payment technologies, and in particular, to an authentication method and apparatus for electronic payment.
Background
At present, various payment instruments have payment passwords of the users, and the users often set different payment passwords for safety, so that the memory burden of the users is increased invisibly, and meanwhile, the users forget or lose the payment passwords to bring the risk of stealing the fund accounts of the users. To solve such a problem, a biometric-based payment method has been developed.
In the related art, the biometric identification payment system provides an interface for fingerprint verification or face identification, and the server can rely on the returned result of the interface to directly call the payment interface. However, in biometric payment, although the step of inputting a payment password by the user is reduced, the user can verify the fingerprint information or the face Identification (ID) stored in the device. However, relying only on the results returned by the device means that the payment interface loses any password protection and the user can pay directly by modifying the return value of the interface if the device goes through a jail break. Therefore, the existing electronic payment has certain potential safety hazard.
Disclosure of Invention
The present disclosure is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, the identity verification method for electronic payment is provided by the disclosure, so as to solve the technical problem that the electronic payment in the prior art is low in safety.
An embodiment of a first aspect of the present disclosure provides an identity verification method for electronic payment, including:
acquiring identity authentication information, wherein the identity authentication information comprises a serial number and a secret key;
acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result;
if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm;
the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request;
and acquiring an identity verification result which is sent by the server and used for verifying the first dynamic verification code and the serial number.
The embodiment of the second aspect of the present disclosure provides another identity verification method for electronic payment, including:
sending the identity verification information to a client; the identity authentication information comprises a serial number and a secret key;
acquiring a first dynamic verification code and the serial number; the first dynamic verification code is generated by the client according to the secret key and the terminal timestamp by adopting a preset algorithm after the client receives a verification result that the biological identification password passes verification;
and performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
An embodiment of a third aspect of the present disclosure provides an identity verification apparatus for electronic payment, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring identity authentication information, and the identity authentication information comprises a serial number and a secret key;
the second acquisition module is used for acquiring the biological identification password and verifying the biological identification password to obtain a first verification result;
the generating module is used for generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm if the first verification result is that the verification is passed;
the verification module is used for sending the first dynamic verification code and the serial number to a server for identity verification so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request;
and the third obtaining module is used for obtaining an authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number.
An embodiment of a fourth aspect of the present disclosure provides another identity verification apparatus for electronic payment, including:
the first sending module is used for sending the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key;
the acquisition module is used for acquiring the first dynamic verification code and the serial number; the first dynamic verification code is generated by the client according to the secret key and the terminal timestamp by adopting a preset algorithm after the client receives a verification result that the biological identification password passes verification;
and the first verification module is used for performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
A fourth aspect of the present disclosure provides a client, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of authentication for electronic payments of the first aspect.
An embodiment of a fifth aspect of the present disclosure provides a server, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of authentication for electronic payments of the second aspect.
A sixth aspect of the present disclosure provides a computer-readable storage medium storing non-transitory computer-readable instructions for causing a computer to execute the method for authenticating an electronic payment of the first aspect, or execute the method for authenticating an electronic payment of the second aspect.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: the identity authentication method comprises the steps of obtaining identity authentication information, wherein the identity authentication information comprises a serial number and a secret key; acquiring a biological identification password, verifying the biological identification password to obtain a first verification result, and if the first verification result is verification passing, generating a first dynamic verification code according to a secret key and a terminal time stamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an identity authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
Additional aspects and advantages of the disclosure will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The foregoing and/or additional aspects and advantages of the present disclosure will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of a first authentication method for electronic payment according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a second authentication method for electronic payment according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a third authentication method for electronic payment according to an embodiment of the present disclosure;
fig. 4 is an exemplary diagram of an authentication method for electronic payment according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an authentication apparatus for electronic payment according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of another authentication device for electronic payment according to an embodiment of the present disclosure;
fig. 7 is a hardware architecture diagram illustrating a client according to an embodiment of the present disclosure; and
fig. 8 is a schematic diagram illustrating a non-transitory computer-readable storage medium according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary and intended to be illustrative of the present disclosure, and should not be construed as limiting the present disclosure.
An authentication method and apparatus for electronic payment according to an embodiment of the present disclosure will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a first authentication method for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 1, the authentication method for electronic payment, executed by a client, includes the following steps:
step 101, identity authentication information is obtained, wherein the identity authentication information comprises a serial number and a secret key.
The identity authentication information is generated after the server verifies the biological identification password and the payment password when the user starts the biological identification payment at the client.
In the embodiment of the disclosure, when the client starts the biometric payment, the server determines that the biometric password and the payment password of the user are in an available state, and after the serial number and the secret key are generated, the serial number and the secret key are sent to the client, so that the client can obtain the serial number and the secret key sent by the server.
Step 102, obtaining a biometric password, and verifying the biometric password to obtain a first verification result.
The first verification result is a verification result obtained by verifying the biological identification password. In order to facilitate the distinction between the authentication results obtained by subsequently authenticating the biometric password and the payment password, the authentication result obtained by authenticating the biometric password at the time of electronic payment is named as a first authentication result, and the authentication result obtained by authenticating the biometric password and the payment password at the time of opening the electronic payment is named as a second authentication result.
And 103, if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm.
The first dynamic password is generated according to the secret key and the terminal time stamp when the client side adopts the biological payment. The first dynamic password may be a designated number of bits, for example, the first dynamic password may be a 6-bit number, an 8-bit number, and the like, which is not limited herein.
In order to distinguish the dynamic password generated by the server according to the key and the server timestamp, the dynamic password generated by the client is named as a first dynamic password, and the dynamic password generated by the server is named as a second dynamic password. Of course, other naming manners are also possible, and are not limited herein.
In the embodiment of the disclosure, after receiving the serial number and the secret key sent by the server, the client first verifies whether the biometric password is in an available state. Optionally, after the client acquires the biometric password, the biometric password may be verified with a biometric password pre-stored locally at the client to obtain a first verification result. If the first verification result is that the verification is passed, a preset algorithm can be adopted, and a first dynamic password is generated according to the secret key and the terminal timestamp.
Optionally, a Time-based One-Time password (TOTP) algorithm may be adopted, and the first dynamic verification code is calculated and generated according to the key and the terminal timestamp.
Since the time stamp is a character sequence and uniquely identifies the time of a certain moment, the first dynamic password generated by the client according to the secret key and the terminal time stamp is different at each time of the biological payment, thereby ensuring the security of the electronic payment.
Step 1044 is to send the first dynamic verification code and the serial number to the server for authentication, so that the server verifies the received first dynamic verification code and the serial number after receiving the authentication request.
In the embodiment of the disclosure, in order to ensure the accuracy of the first dynamic verification code generated by the client, after the client generates the first dynamic verification code according to the secret key and the terminal timestamp, the first dynamic verification code and the serial number may be sent to the server together for identity verification, and after the server receives an identity verification request sent by the client, the server verifies the received first dynamic verification code and the serial number.
And 105, acquiring an identity verification result which is sent by the server and used for verifying the first dynamic verification code and the serial number.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server first verifies the serial number to determine whether the serial number is valid.
Optionally, the server determines whether the check bit is correct according to the check bit included in the serial number, so as to determine whether the serial number is valid. Therefore, the check bit is added into the serial number, whether the serial number is effective or not is judged according to the check bit, and the workload of the server in checking the first dynamic verification code is reduced.
In a possible case, if the server determines that the check bit is incorrect, it determines that the received serial number sent by the client is invalid, and at this time, the verification result of the first dynamic verification code is authentication failure. And then, sending the authentication result of the authentication failure to the client, after the client acquires the authentication result, the payment process cannot be completed, and displaying information such as payment failure and the like on a display interface of the client.
Under another possible condition, the server determines that the check bit is correct, and then determines that the received serial number sent by the client is valid, at this time, the server verifies the first dynamic verification code according to the second dynamic verification code, and sends a verification result to the client, so that the client obtains the result of verifying the first dynamic verification code sent by the server.
Optionally, after receiving the first dynamic verification code sent by the client, the server compares a second dynamic verification code generated according to the key and the server timestamp with the first dynamic verification code, and if the second dynamic verification code is the same as the first dynamic verification code, it is determined that the first dynamic verification code is valid, and further, a verification result that the first dynamic verification code is valid is sent to the client, so that the client completes an electronic payment process according to the received verification result.
And if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid, and further sending a verification result that the first dynamic check code is invalid to the client so that the client ends the electronic payment process according to the received verification result.
It should be noted that, in order to avoid a situation that the terminal timestamps of the first dynamic verification code and the second dynamic verification code generated by the client and the server may not be completely consistent with the server timestamp, resulting in unsuccessful authentication, or a situation that the authentication fails due to a dynamic password input by the user at a certain time end, in the present disclosure, a difference between the terminal timestamp and the server timestamp by N time steps may be set, for example, the dynamic verification code generated by the server according to the secret key, the previous server timestamp, the current server timestamp, and the next server timestamp may be determined as successful authentication when the first dynamic verification code is the same as the dynamic verification code.
In the embodiment of the disclosure, when the authentication result obtained by the client is an authentication failure, obtaining authentication information may be repeatedly performed, obtaining a biometric password, verifying the biometric password to obtain a first authentication result, if the first authentication result is a verification pass, generating a first dynamic authentication code according to a secret key and a terminal timestamp by using a preset algorithm, and sending the first dynamic authentication code and the serial number to the server for authentication to obtain an authentication result. And if the authentication results obtained repeatedly are all authentication failures and the authentication results indicate that the continuous times of the authentication failures reach the preset times, ending the authentication. Therefore, the electronic payment times are limited by limiting the authentication times, and the situation that the payment password is cracked violently is prevented.
The payment method based on the biological recognition of the embodiment of the disclosure is realized by acquiring identity authentication information, wherein the identity authentication information comprises a serial number and a secret key; acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result; if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an identity authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
In the embodiment of the present disclosure, when the client starts the biometric payment, the biometric password and the payment password are first verified to ensure that the biometric password and the payment password are in the available state, and then the client may perform the biometric payment, which is described in detail with reference to fig. 2, where fig. 2 is a schematic flow chart of a second identity verification method for electronic payment according to the embodiment of the present disclosure.
As shown in fig. 2, the step 101 may further include the following steps:
step 201, acquiring a biometric password and a payment password.
The biometric password may include fingerprint information or face information.
In the embodiment of the disclosure, when the client starts the biometric payment, the fingerprint information or the face information stored in the device provided with the client of the user can be acquired, and the fingerprint information and the face information of the user can also be collected to acquire the biometric password.
The payment password can be a user payment digital password set by the user.
Step 202, the biometric password and the payment password are verified to obtain a second verification result.
And step 203, if the second verification result is that the verification is passed, acquiring the server generated serial number and the key. .
In the embodiment of the present disclosure, after the client acquires the biometric password, the acquired biometric password is compared with the biometric password pre-stored in the client, so that the verification of the biometric password is completed at the client.
After the client side obtains the payment password, the obtained payment password is sent to the server, so that the server can verify the received payment password.
Optionally, the server verifies the received payment password, and after the password is determined to be verified, the server generates the serial number and the key.
Optionally, when the server verifies the received payment password and determines that the password verification fails, the client cannot perform biometric payment and needs to obtain the payment password again.
It should be noted that, according to the identity authentication method for electronic payment disclosed by the present disclosure, only when the client opens the biometric payment, the biometric password and the payment password are obtained, and the biometric password and the payment password are authenticated, and after it is determined that the biometric password and the payment password are in an available state, only the biometric password needs to be authenticated, and the payment password does not need to be authenticated again in the process of electronic payment.
Therefore, when the client opens the biometric payment, the biometric password and the payment password are obtained, and the biometric password and the payment password are verified to obtain a second verification result; and if the second verification result is that the verification is passed, the acquisition server generates a serial number and a secret key, so that the safety of the electronic payment is ensured.
In order to implement the above embodiments, the present disclosure provides yet another authentication method for electronic payment.
Fig. 3 is a schematic flow chart of a third authentication method for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 3, the authentication method for electronic payment, executed by a server, may include the following steps:
step 301, sending the authentication information to the client.
The identity authentication information comprises a serial number and a secret key.
In the embodiment of the disclosure, when the client starts the biometric payment, the fingerprint information or the face information stored in the device provided with the client of the user can be acquired, and the fingerprint information and the face information of the user can also be collected to acquire the biometric password. Further, the biometric password is verified to obtain a verification result, the payment password is obtained, and the payment password is sent to the server, so that the payment password is verified after the server receives the payment password sent by the client.
Optionally, if the payment password is verified by the server, the serial number and the key are generated to generate authentication information, and the authentication information is sent to the client.
The identity authentication method for electronic payment authenticates the biological identification password and the payment password sent by the client only when the client opens the biological identification payment, and only the biological identification password and the payment password need to be authenticated and the payment password does not need to be authenticated again in the payment process after the biological identification password and the payment password are determined to be in the available state.
Step 302, a first dynamic verification code and a serial number are obtained.
The first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm.
In the embodiment of the disclosure, when the client starts the biometric payment request, the biometric password is first acquired to verify whether the biometric password is correct. Optionally, after the client acquires the biometric password, the received biometric password is compared with a pre-stored biometric password to verify the received biometric password.
In the embodiment of the disclosure, after the client receives the serial number and the secret key sent by the server and determines that the verification result of the biometric password passes the verification, a preset algorithm can be adopted to generate a first dynamic password according to the secret key and the terminal timestamp, and then the generated first dynamic verification code and the serial number are sent to the server, so that the server obtains the first dynamic verification code and the serial number sent by the client.
Optionally, a TOTP algorithm may be adopted to calculate and generate the first dynamic verification code according to the key and the terminal timestamp.
Since the time stamp is a character sequence and uniquely identifies the time of a certain moment, the first dynamic password generated by the client according to the secret key and the terminal time stamp is different at each time of the biological payment, thereby ensuring the safety of the biological payment.
And 303, performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server may perform identity verification on the first dynamic verification code and the serial number to determine whether the first dynamic verification code is valid.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server first verifies the serial number to determine whether the serial number is valid.
Optionally, the serial number includes a check bit, and the server may determine whether the serial number is valid by determining whether the check bit included in the serial number is correct.
In a possible case, if the server determines that the check bit is incorrect, it determines that the received serial number sent by the client is invalid, and at this time, the verification result of the first dynamic verification code is authentication failure. And then, sending the authentication result of the identity authentication failure to the client, after the client acquires the authentication result, the payment process cannot be completed, and displaying information such as payment failure and the like on a display interface of the client.
Under another possible condition, the server determines that the check bit is correct, and then determines that the received serial number sent by the client is valid, at this time, the server verifies the first dynamic verification code according to the second dynamic verification code, and sends a verification result to the client, so that the client obtains the result of verifying the first dynamic verification code sent by the server. Wherein the second dynamic verification code is generated by the server according to the secret key and the server time stamp.
Optionally, after receiving the first dynamic verification code sent by the client, the server compares a second dynamic verification code generated according to the secret key and the server timestamp with the first dynamic verification code, and if the second dynamic verification code is the same as the first dynamic verification code, it is determined that the first dynamic verification code is valid, and further, a verification result that the first dynamic verification code is valid is sent to the client, so that the client completes the biometric payment process according to the received verification result.
And if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid, and further sending a verification result that the first dynamic check code is invalid to the client so that the client ends the biometric payment process according to the received verification result.
In the embodiment of the disclosure, after the server completes verification of the first dynamic check code, the server may send the authentication result to the client, so that the client completes the payment process according to the received verification result.
In the embodiment of the disclosure, the server verifies the first dynamic verification code and the serial number, and when the generated verification result is that the authentication fails, the process of sending the authentication information to the client to obtain the first dynamic verification code and the serial number, and performing the authentication on the first dynamic verification code and the serial number to obtain the authentication result can be repeatedly executed. And if the authentication results obtained repeatedly are all authentication failures and the authentication results indicate that the continuous times of the authentication failures reach the preset times, ending the authentication. Therefore, the electronic payment times are limited by limiting the authentication times, and the situation that the payment password is cracked violently is prevented.
The identity authentication method for electronic payment of the embodiment of the present disclosure sends the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key, and a first dynamic verification code and the serial number are obtained; the first dynamic verification code is generated by the client side according to the secret key and the timestamp by adopting a preset algorithm after receiving a verification result that the biometric code passes verification; and performing identity authentication on the first dynamic verification code and the serial number to obtain an identity authentication result. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
As an example, as shown in fig. 4, assuming that the biometric payment is a fingerprint payment, the flow of a specific fingerprint payment-based payment method is as follows:
step 401, the client opens fingerprint payment.
Step 402, the server verifies that the payment password is correct and determines to open fingerprint payment.
In step 403, the client receives the command for determining successful activation sent by the server, and obtains the key and the serial number sent by the server.
In step 404, the client sends a fingerprint payment opening state inquiry command.
Step 405, after receiving the fingerprint payment opening state inquiry command sent by the client, the server inquires the corresponding fingerprint payment opening state.
In step 406, the client receives the fingerprint payment opening status sent by the server.
Step 407, when the fingerprint is paid, the client verifies whether the fingerprint information is correct.
And step 408, the client generates a first dynamic verification code according to the secret key and the terminal timestamp, and sends the first dynamic verification code to the server.
Step 409, after receiving the first dynamic verification code sent by the client, the server verifies the first dynamic verification code and sends the verification result to the client.
In the embodiment of the disclosure, the server generates a second dynamic verification code according to the secret key and the server timestamp, compares the second dynamic verification code with the first dynamic verification code, and determines that the first dynamic verification code is successfully verified if the second dynamic verification code is the same as the first dynamic verification code. And if the second dynamic verification code is different from the first dynamic verification code, the first dynamic verification code fails to be verified.
And step 410, the client completes the payment process according to the received verification result.
In step 411, after completing the fingerprint payment, the client sends a command for closing the fingerprint payment.
In step 412, after receiving the instruction for closing the fingerprint payment sent by the client, the server checks that the payment is completed and closes the fingerprint payment.
In order to implement the above embodiments, the embodiments of the present disclosure further provide an authentication device for electronic payment.
Fig. 5 is a schematic structural diagram of an authentication apparatus for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 5, the authentication apparatus 500 for electronic payment may include: a first acquisition module 510, a second acquisition module 520, a generation module 530, a verification module 540, and a third acquisition module 550.
The first obtaining module 510 is configured to obtain identity authentication information, where the identity authentication information includes a serial number and a secret key.
The second obtaining module 520 is configured to obtain the biometric password and verify the biometric password to obtain a first verification result.
A generating module 530, configured to generate a first dynamic verification code according to the key and the terminal timestamp by using a preset algorithm if the first verification result is that the verification is passed.
The verification module 540 is configured to send the first dynamic verification code and the serial number to the server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving the identity verification request.
A third obtaining module 550, configured to obtain an authentication result that is sent by the server and used for verifying the first dynamic verification code and the serial number.
As a possible scenario, the first obtaining module 510 may further be configured to:
acquiring a biological identification password and a payment password;
verifying the biometric password and the payment password to obtain a second verification result;
and if the second verification result is that the verification is passed, acquiring the serial number and the secret key generated by the server.
As another possible case, the sequence number contains check bits; the third obtaining module may be further configured to:
acquiring a result of verifying the serial number by the server according to the check bit; wherein, the server judges whether the check bit is correct; if the check bit is incorrect, determining that the serial number is invalid, wherein the verification result is authentication failure; if the check bit is correct, determining that the serial number is valid;
if the serial number is valid, acquiring a result of the server verifying the first dynamic check code according to the second dynamic check code; the second dynamic check code is generated by the server according to the secret key and the server time stamp; the server compares the second dynamic check code with the first dynamic check code; if the second dynamic check code is the same as the first dynamic check code, determining that the first dynamic check code is valid; and if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid.
As another possible case, the authentication apparatus 500 for electronic payment may further include:
the first processing module is used for repeatedly acquiring identity authentication information and acquiring a biological identification password if the authentication result is that the identity authentication fails, verifying the biological identification password to obtain a first authentication result, generating a first dynamic verification code according to a secret key and a terminal timestamp by adopting a preset algorithm if the first authentication result is that the authentication passes, and sending the first dynamic verification code and a serial number to the server for identity authentication to obtain an identity authentication result; and determining that the continuous times of the authentication failure reach the preset times as the authentication result, and ending the authentication.
It should be noted that the foregoing explanation of the embodiment of the authentication method for electronic payment also applies to the authentication apparatus for electronic payment of this embodiment, and details are not repeated here.
The identity verification device for electronic payment of the embodiment of the disclosure obtains identity authentication information, wherein the identity authentication information comprises a serial number and a secret key; acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result; if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an identity authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
In order to implement the above embodiments, the present disclosure provides another authentication apparatus for electronic payment.
Fig. 6 is a schematic structural diagram of another authentication device for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 6, the authentication apparatus 600 for electronic payment may include: a first sending module 610, an obtaining module 620, and a first verifying module 630.
The first sending module 610 is configured to send the authentication information to the client; the identity authentication information comprises a serial number and a secret key.
An obtaining module 620, configured to obtain a first dynamic verification code and a serial number; and the first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm after receiving a verification result that the biological identification password passes verification.
The first verification module 630 is configured to perform identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
As a possible scenario, the biometric-based payment apparatus 600 may further include:
and the receiving module is used for receiving the biological identification password and the payment password sent by the client.
And the second verification module is used for verifying the biological identification password and the payment password.
And the generation module is used for generating a first serial number and a secret key if the biometric password and the payment password pass verification.
As another possible case, the sequence number contains check bits; the first verification module 630 may further include:
the judging unit is used for judging whether the check bit is correct or not;
and the first determining unit is used for determining that the serial number is invalid if the check bit is incorrect, and the verification result is authentication failure.
As another possible case, the first verification module may further include:
the second determining unit is used for determining that the serial number is valid if the check bit is correct;
the comparison unit is used for comparing the second dynamic check code with the first dynamic check code; the second dynamic check code is generated by the server according to the secret key and the server time stamp;
the third determining unit is used for determining that the first dynamic check code is valid if the second dynamic check code is the same as the first dynamic check code;
and the fourth determining unit is used for determining that the first dynamic check code is invalid if the second dynamic check code is different from the first dynamic check code.
As a possible scenario, the biometric-based payment apparatus 600 may further include:
the second processing module is used for repeatedly executing the process of sending the identity authentication information to the client to obtain the first dynamic verification code and the serial number and verifying the identity of the first dynamic verification code and the serial number to obtain an identity verification result if the identity verification result is that the identity verification fails; and determining that the identity authentication result is that the continuous times of the identity authentication failure reach the preset times, and ending the identity authentication.
It should be noted that the foregoing explanation of the embodiment of the authentication method for electronic payment also applies to the authentication apparatus for electronic payment of this embodiment, and details are not repeated here.
The identity authentication device for electronic payment of the embodiment of the disclosure sends the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key, and a first dynamic verification code and the serial number are obtained; the first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm after receiving a verification result that the biological identification password passes verification; and performing identity authentication on the first dynamic verification code and the serial number to obtain an identity authentication result. Therefore, compared with the existing electronic payment method that a system verification interface is used or a static password is verified, the method has the defect of low safety.
In order to implement the foregoing embodiments, an embodiment of the present disclosure provides a client, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being configured to perform the method of authentication for electronic payments described above in fig. 1 and/or fig. 2.
In order to implement the foregoing embodiments, the present disclosure provides a server, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being configured to perform the method of authentication for electronic payments described above in figure 3.
Fig. 7 is a hardware configuration diagram illustrating a client according to an embodiment of the present disclosure. The client may be implemented in various forms, and the client in the embodiments of the present disclosure may include, but is not limited to, mobile terminal devices such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet), a PMP (portable multimedia player), a navigation apparatus, a vehicle-mounted terminal device, a vehicle-mounted display terminal, a vehicle-mounted electronic rear view mirror, and the like, and fixed terminal devices such as a digital TV, a desktop computer, and the like.
Referring now to fig. 7, a schematic diagram of a client suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The client illustrated in fig. 7 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present disclosure.
As shown in fig. 7, client 800 may include a processing device (e.g., central processing unit, graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage device 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data necessary for the operation of the client 800 are also stored. The processing apparatus 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage 808 including, for example, magnetic tape, hard disk, etc.; and a communication device 809. The communication means 809 may allow the client 800 to communicate with other devices wirelessly or by wire to exchange data. While fig. 7 illustrates a client 800 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 809, or installed from the storage means 808, or installed from the ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
In order to achieve the above embodiments, the embodiments of the present disclosure propose a computer-readable storage medium storing non-transitory computer-readable instructions for causing the computer to execute the authentication method for electronic payment described in the above embodiments.
Fig. 8 is a schematic diagram illustrating a computer-readable storage medium according to an embodiment of the present disclosure. As shown in fig. 8, a computer-readable storage medium 300 having non-transitory computer-readable instructions 301 stored thereon according to an embodiment of the present disclosure. The non-transitory computer readable instructions 301, when executed by a processor, perform all or a portion of the steps of the authentication method for electronic payments of the embodiments of the present disclosure previously described.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the client; or may exist separately and not be assembled into the client.
The computer readable medium carries one or more programs which, when executed by the client, cause the client to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the client, cause the client to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".

Claims (14)

1. An authentication method for electronic payments, characterized in that it comprises the following steps:
acquiring identity authentication information, wherein the identity authentication information comprises a serial number and a secret key;
acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result;
if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm;
the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request;
and acquiring an identity verification result which is sent by the server and used for verifying the first dynamic verification code and the serial number.
2. The identity verification method of claim 1, wherein the obtaining identity authentication information comprises:
acquiring the biometric password and the payment password;
verifying the biometric password and the payment password to obtain a second verification result;
and if the second verification result is that the verification is passed, acquiring the serial number and the secret key generated by the server.
3. The method of claim 1, wherein the serial number comprises a check bit; the obtaining of the authentication result for authenticating the first dynamic authentication code and the serial number, which is sent by the server, includes:
obtaining the result of the server verifying the serial number according to the check bit; the server judges whether the check bit is correct or not; if the check bit is incorrect, determining that the serial number is invalid, and determining that the authentication result is authentication failure; if the check bit is correct, determining that the serial number is valid;
if the serial number is valid, acquiring a result of the server verifying the first dynamic check code according to a second dynamic check code; wherein the second dynamic check code is generated by the server according to the secret key and a server time stamp; the server compares the second dynamic check code with the first dynamic check code; if the second dynamic check code is the same as the first dynamic check code, determining that the first dynamic check code is valid; and if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid.
4. The identity authentication method according to any one of claims 1 to 3, wherein after obtaining the authentication result for authenticating the first dynamic authentication code and the serial number, which is sent by the server, the method comprises:
if the verification result is that the identity verification fails, repeatedly executing the identity authentication information acquisition, acquiring a biological identification password, verifying the biological identification password to obtain a first verification result, if the first verification result is that the verification passes, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm, and sending the first dynamic verification code and the serial number to a server for identity verification to obtain an identity verification result;
and determining that the continuous times of the authentication failure reach the preset times as the identity authentication result, and ending the identity authentication.
5. An authentication method for electronic payments, characterized in that it comprises the following steps:
sending the identity verification information to a client; the identity authentication information comprises a serial number and a secret key;
acquiring a first dynamic verification code and the serial number; the first dynamic verification code is generated by the client according to the secret key and the terminal timestamp by adopting a preset algorithm after the client receives a verification result that the biological identification password passes verification;
and performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
6. The identity authentication method according to claim 5, wherein before sending the identity authentication information to the client, further comprising:
receiving a biological identification password and a payment password sent by the client;
verifying the biometric password and the payment password;
and if the biometric password and the payment password pass the verification, generating the serial number and the secret key.
7. The method of claim 5, wherein the serial number comprises a check bit; the identity authentication of the first dynamic verification code and the serial number to obtain an identity authentication result includes:
judging whether the check bit is correct or not;
and if the check bit is incorrect, determining that the serial number is invalid, and determining that the authentication result is authentication failure.
8. The identity authentication method according to claim 7, wherein after determining whether the check bit is correct, the method further comprises:
if the check bit is correct, determining that the serial number is valid;
comparing a second dynamic check code with the first dynamic check code; wherein the second dynamic check code is generated by the server according to the secret key and the server time stamp;
if the second dynamic check code is the same as the first dynamic check code, determining that the first dynamic check code is valid;
and if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid.
9. The identity verification method according to any one of claims 5 to 8, wherein performing identity verification on the first dynamic verification code and the serial number, and after generating an identity verification result, comprises:
if the identity verification result is identity verification failure, repeatedly executing the process of sending the identity authentication information to the client to obtain a first dynamic verification code and a serial number, and performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result;
and determining that the continuous times of the authentication failure reach the preset times as the identity authentication result, and ending the identity authentication.
10. An authentication apparatus for electronic payment, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring identity authentication information, and the identity authentication information comprises a serial number and a secret key;
the second acquisition module is used for acquiring the biological identification password and verifying the biological identification password to obtain a first verification result;
the generating module is used for generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm if the first verification result is that the verification is passed;
the verification module is used for sending the first dynamic verification code and the serial number to a server for identity verification so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request;
and the third obtaining module is used for obtaining an authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number.
11. An authentication apparatus for electronic payment, the apparatus comprising:
the first sending module is used for sending the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key;
the acquisition module is used for acquiring the first dynamic verification code and the serial number; the first dynamic verification code is generated by the client according to the secret key and the terminal timestamp by adopting a preset algorithm after the client receives a verification result that the biological identification password passes verification;
and the first verification module is used for performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
12. A client, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of authentication for electronic payments of any of the preceding claims 1-4.
13. A server, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of authentication for electronic payments of any of the preceding claims 5-9.
14. A computer-readable storage medium storing non-transitory computer-readable instructions for causing a computer to execute the authentication method for electronic payments according to any one of claims 1 to 4 or the authentication method for electronic payments according to any one of claims 5 to 9.
CN202010811764.4A 2020-08-13 2020-08-13 Identity verification method and device for electronic payment Pending CN111899029A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010811764.4A CN111899029A (en) 2020-08-13 2020-08-13 Identity verification method and device for electronic payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010811764.4A CN111899029A (en) 2020-08-13 2020-08-13 Identity verification method and device for electronic payment

Publications (1)

Publication Number Publication Date
CN111899029A true CN111899029A (en) 2020-11-06

Family

ID=73230287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010811764.4A Pending CN111899029A (en) 2020-08-13 2020-08-13 Identity verification method and device for electronic payment

Country Status (1)

Country Link
CN (1) CN111899029A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990927A (en) * 2021-04-27 2021-06-18 中国工商银行股份有限公司 Payment verification method, system, device, computer system and storage medium
CN113159771A (en) * 2021-04-27 2021-07-23 中国工商银行股份有限公司 Safety payment device and method, computer equipment and readable storage medium
CN113239341A (en) * 2021-07-12 2021-08-10 南京赛宁信息技术有限公司 Identity authentication method, equipment and system independent of user real characteristic information
CN114980036A (en) * 2022-06-10 2022-08-30 中国电信股份有限公司 Virtual number card opening method and device, electronic equipment and readable storage medium
CN115086040A (en) * 2022-06-16 2022-09-20 北京金山云网络技术有限公司 Login authentication method, device, storage medium and electronic equipment
CN117294535A (en) * 2023-11-24 2023-12-26 北京邮电大学 Method and system for verifying security of data packet explicit information expression instruction

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN106487511A (en) * 2015-08-27 2017-03-08 阿里巴巴集团控股有限公司 Identity identifying method and device
CN107221050A (en) * 2016-11-25 2017-09-29 天地融科技股份有限公司 A kind of entrance guard controlling method and system
CN109767208A (en) * 2019-01-08 2019-05-17 北京京东金融科技控股有限公司 A kind of method of payment and payment mechanism
CN110999270A (en) * 2017-08-03 2020-04-10 IPCom两合公司 User equipment adapted to send service authentication messages
CN111200574A (en) * 2018-11-16 2020-05-26 北京嘀嘀无限科技发展有限公司 Account establishing method, device and equipment and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487511A (en) * 2015-08-27 2017-03-08 阿里巴巴集团控股有限公司 Identity identifying method and device
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN107221050A (en) * 2016-11-25 2017-09-29 天地融科技股份有限公司 A kind of entrance guard controlling method and system
CN110999270A (en) * 2017-08-03 2020-04-10 IPCom两合公司 User equipment adapted to send service authentication messages
CN111200574A (en) * 2018-11-16 2020-05-26 北京嘀嘀无限科技发展有限公司 Account establishing method, device and equipment and computer readable storage medium
CN109767208A (en) * 2019-01-08 2019-05-17 北京京东金融科技控股有限公司 A kind of method of payment and payment mechanism

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990927A (en) * 2021-04-27 2021-06-18 中国工商银行股份有限公司 Payment verification method, system, device, computer system and storage medium
CN113159771A (en) * 2021-04-27 2021-07-23 中国工商银行股份有限公司 Safety payment device and method, computer equipment and readable storage medium
CN112990927B (en) * 2021-04-27 2024-03-08 中国工商银行股份有限公司 Payment verification method, system, device, computer system and storage medium
CN113239341A (en) * 2021-07-12 2021-08-10 南京赛宁信息技术有限公司 Identity authentication method, equipment and system independent of user real characteristic information
CN114980036A (en) * 2022-06-10 2022-08-30 中国电信股份有限公司 Virtual number card opening method and device, electronic equipment and readable storage medium
CN115086040A (en) * 2022-06-16 2022-09-20 北京金山云网络技术有限公司 Login authentication method, device, storage medium and electronic equipment
CN117294535A (en) * 2023-11-24 2023-12-26 北京邮电大学 Method and system for verifying security of data packet explicit information expression instruction
CN117294535B (en) * 2023-11-24 2024-04-02 北京邮电大学 Method and system for verifying security of data packet explicit information expression instruction

Similar Documents

Publication Publication Date Title
CN111899029A (en) Identity verification method and device for electronic payment
US11106476B2 (en) Helper software developer kit for native device hybrid applications
KR102027630B1 (en) Two-Factor Authentication Systems and Methods
CN106575416B (en) System and method for authenticating a client to a device
EP3343831A1 (en) Identity authentication method and apparatus
US11005840B2 (en) Preventing unauthorized access to secured information systems using authentication tokens and multi-device authentication prompts
CN110838195A (en) Method for authorizing others to unlock
CN115102744A (en) Data access method and device
CN111125665A (en) Authentication method and device
KR20180134489A (en) Method, apparatus, and computer program for user authentication of a car rental
CN110602700B (en) Seed key processing method and device and electronic equipment
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
CN110753029A (en) Identity verification method and biological identification platform
KR20130113785A (en) Method and server for user certification using voice information
CN111935138B (en) Protection method and device for secure login and electronic equipment
CN106446719B (en) Method for preventing eSIM file from being tampered and mobile terminal
CN107977564B (en) Transaction authentication processing method, authentication server, terminal and transaction equipment
CN106533685B (en) Identity authentication method, device and system
CN114999030A (en) Unlocking method, system, electronic equipment and storage medium
CN110690973B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
CN104717641B (en) A kind of digital signature generation method and SIM card based on SIM card
CN113660100B (en) Method, system and electronic equipment for generating soft token seed
CN105516069B (en) Data processing method, device and system
CN117422423A (en) Loan information processing method, device, equipment and storage medium
CN115879933A (en) Authorization method, authorization device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Tiktok vision (Beijing) Co.,Ltd.

Address before: Room B0035, 2nd floor, No. 3 Courtyard, 30 Shixing Street, Shijingshan District, Beijing, 100041

Applicant before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Applicant before: Tiktok vision (Beijing) Co.,Ltd.

CB02 Change of applicant information