KR20170001456A - A method for authenticating credit card settlement using smartphone - Google Patents
A method for authenticating credit card settlement using smartphone Download PDFInfo
- Publication number
- KR20170001456A KR20170001456A KR1020150091453A KR20150091453A KR20170001456A KR 20170001456 A KR20170001456 A KR 20170001456A KR 1020150091453 A KR1020150091453 A KR 1020150091453A KR 20150091453 A KR20150091453 A KR 20150091453A KR 20170001456 A KR20170001456 A KR 20170001456A
- Authority
- KR
- South Korea
- Prior art keywords
- user
- credit card
- information
- authentication
- smartphone
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H04W4/003—
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A method of authenticating a credit card using a smartphone according to an embodiment of the present invention includes a step of recognizing a user's credit card by a credit card payment terminal, a step of transmitting a user authentication operation request from the credit card payment terminal to a management server , Transmitting a user authentication information request from the management server to a smartphone of the user, generating user authentication information from the smartphone of the user, transmitting the user authentication information to the management server, Performing a user authentication operation based on the user authentication information, transmitting user authentication result information to the credit card payment terminal, and performing credit card settlement in the credit card payment terminal based on the user authentication result information .
A credit card payment authentication method using a smartphone according to the present invention is a method for requesting a user authentication operation request from a credit card payment terminal to a management server and transmitting authentication information for facial authentication of a user using a smartphone of a user It is possible to provide a more convenient and secure user authentication by using the credit card, thereby preventing unauthorized use such as loss, duplication, or theft while using the credit card.
Description
The present invention relates to a credit card payment authentication method using a smart phone, and more particularly, to a credit card payment authentication method using a smart phone, Card payment authentication method.
It is very common for modern society to pay for the sale of goods or services using credit cards. In addition, due to the development of mobile phone technology, various applications using smart phones have been developed, and smart phones have been used in various fields.
If you pay by credit card, credit card is handed over to the employee. The credit card is recognized and simply signed using the magnetic strip or IC attached to the credit card.
However, if a credit card is lost or used illegally due to duplication or theft, it is often the case that the credit card is stopped after it has been lost due to the fact that it has been lost and has already been fraudulently used. However, the procedure is very complicated, and if it is illegally used by copying or theft, it is very unlikely to recognize it, and it is very likely to be damaged by fraudulent use.
Therefore, in order to reduce the possibility of damaging the above-mentioned credit card, there is a need for a safer credit card payment method. Accordingly, a method of strengthening user authentication in a credit card payment system is required .
According to an aspect of the present invention, there is provided a method for providing a user authentication for a credit card payment, the method comprising: requesting a management server for a user authentication job request from a credit card payment terminal; A credit card payment authentication method capable of preventing unauthorized use such as loss, duplication, or theft while using a credit card by making it possible to perform convenient and safe user authentication by receiving authentication information for user's face authentication And the like.
According to another aspect of the present invention, there is provided a method of authenticating a credit card using a smartphone, the method comprising: recognizing a user's credit card with a credit card payment terminal; Transmitting a user authentication information request to the smartphone of the user at the management server, generating user authentication information in the smartphone of the user, transmitting the user authentication information to the management server Performing a user authentication operation based on the user authentication information at the management server, transmitting user authentication result information to the credit card payment terminal, and transmitting the user authentication result information to the credit card payment terminal And a step of performing credit card settlement at the terminal.
The step of generating the user authentication information in the smartphone of the user may include receiving the user authentication information request from the smartphone of the user, automatically executing the credit card payment authentication application in the smartphone of the user, The credit card payment authentication application may generate the user authentication information including at least one of facial authentication information and digital signature information according to a user's selection.
The step of generating the user authentication information including at least one of the facial authentication information and the digital signature information according to the user's selection in the credit card payment authentication application may include providing a user interface for acquiring the selection of the user, Generating facial authentication information of the user using the camera of the smartphone when the facial authentication information is selected by the user; and when the digital signature information is selected by the user, And generating the digital signature information of the user.
The step of generating the facial authentication information of the user using the camera of the smartphone may include the steps of guiding the user to a method of photographing a face image, a step of executing a camera application of the smartphone, A step of judging whether or not a normal photographing of the face photograph of the user is taken when the face photograph is photographed, and a step of instructing re-photographing if the normal photographing is not performed, And generating facial authentication information of the user including the photograph.
The step of performing a user authentication operation based on the user authentication information in the management server may include performing a facial authentication operation when facial authentication information is included in the user authentication information, If so, performing an electronic signature authentication operation, and generating the user authentication result information.
The step of performing the facial authentication operation may include extracting facial feature information from a facial photograph of the user included in the facial authentication information, comparing the extracted facial feature information with facial feature information of a previously registered user, And generating result information.
The technique disclosed in the present invention can have the following effects. It is to be understood, however, that the scope of the disclosed technology is not to be construed as limited thereby, as it is not meant to imply that a particular embodiment should include all of the following effects or only the following effects.
A credit card payment authentication method using a smartphone according to the present invention is a method for requesting a user authentication operation request from a credit card payment terminal to a management server and transmitting authentication information for facial authentication of a user using a smartphone of a user It is possible to provide a more convenient and secure user authentication by using the credit card, thereby preventing unauthorized use such as loss, duplication, or theft while using the credit card.
1 is a flowchart illustrating a credit card payment authentication method using a smartphone according to an embodiment of the present invention.
2 shows a process of generating user authentication information in a smartphone of a user.
3 illustrates a process of performing a user authentication operation based on user authentication information in a management server.
FIG. 4 illustrates a scenario in which a credit card payment authentication method using a smartphone according to the present invention is performed.
For the embodiments of the invention disclosed herein, specific structural and functional descriptions are set forth for the purpose of describing an embodiment of the invention only, and it is to be understood that the embodiments of the invention may be practiced in various forms, The present invention should not be construed as limited to the embodiments described in Figs.
The present invention is capable of various modifications and various forms, and specific embodiments are illustrated in the drawings and described in detail in the text. It is to be understood, however, that the invention is not intended to be limited to the particular forms disclosed, but on the contrary, is intended to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.
The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms may be used for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between. Other expressions that describe the relationship between components, such as "between" and "between" or "neighboring to" and "directly adjacent to" should be interpreted as well.
The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In the present application, the terms "comprise", "having", and the like are intended to specify the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, , Steps, operations, components, parts, or combinations thereof, as a matter of principle.
Unless otherwise defined, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries should be construed as meaning consistent with meaning in the context of the relevant art and are not to be construed as ideal or overly formal in meaning unless expressly defined in the present application .
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. The same reference numerals are used for the same constituent elements in the drawings and redundant explanations for the same constituent elements are omitted.
1 is a flowchart illustrating a credit card payment authentication method using a smartphone according to an embodiment of the present invention.
Referring to FIG. 1, a credit card payment authentication method using a smartphone according to an embodiment of the present invention includes a step of recognizing a user's credit card with a credit card payment terminal (S100) (S300) a step of transmitting a user authentication information request to the smartphone of the user at the management server (S300); a step (S400) of generating user authentication information in the smartphone of the user; , Transmitting the user authentication information to the management server (S500), performing a user authentication operation based on the user authentication information at the management server (S600), transmitting the user authentication result information to the credit card payment terminal (S700), and the credit card payment terminal performs credit card settlement based on the user authentication result information And a system (S800).
That is, in the credit card payment authentication method using a smartphone according to an embodiment of the present invention, the credit card payment authentication process is started by recognizing the user's credit card with the credit card payment terminal (S100). Accordingly, the credit card payment terminal transmits a user authentication job request signal to the management server (S200) so that the credit card authentication job can be started at the management server. Then, in order to acquire the user authentication information necessary for performing the user authentication operation of the credit card from the user's smartphone, the management server sends a user authentication information request signal to the smartphone of the pre-registered user to the credit card requiring the authentication operation (S300). Upon receipt of the user authentication information request signal from the smartphone of the user, a process of generating the user authentication information in the smartphone of the user proceeds (S400). This user authentication information generating process will be described below with reference to Fig.
2 shows a process of generating user authentication information in a smartphone of a user.
In a credit card payment authentication method using a smartphone according to an exemplary embodiment of the present invention, the step of generating user authentication information in a user's smartphone (S400) includes receiving a user authentication information request from a user's smartphone S410), a step (S420) of executing a credit card payment authentication application automatically by a user's smartphone, and a step S420 of performing a user authentication including at least one of facial authentication information and electronic signature information And generating information (S430).
That is, referring to FIG. 2, the user authentication information generating process for generating the user authentication information in the smartphone of the user first receives the user authentication information request from the smartphone of the user (S410) The smartphone automatically executes the credit card payment authentication application (S420). Next, the credit card payment authentication application generates the user authentication information according to the user's selection (S430).
At this time, the user authentication information may include facial authentication information and electronic signature information, which can be selected by the user. However, at least one of the facial authentication information and the digital signature information must be selected before the authentication operation can be performed.
In order to enable facial authentication and digital signature authentication as an authentication operation, in a credit card payment authentication application executed in a smartphone of a user, a graphical user interface is provided so that a user can select facial authentication and digital signature authentication, And the authentication method is determined.
Facial authentication information may be generated or digital signature information may be generated according to the authentication method selected by the user. Such facial authentication information or digital signature information may be generated by capturing a face image or capturing a screen of a specific region of the smartphone Can be generated in the form of data. At this time, when the user selects facial authentication, the facial authentication information is generated using the camera of the user's smartphone. When the digital signature is selected, the digital signature information of the user is generated.
A process of generating facial authentication information on the assumption that the user selects facial authentication will be described. First, when face authentication is selected, the user is guided through a method of photographing a face image. This is for obtaining a photographed image suitable for the purpose of face authentication. For example, when the camera application is executed, all the face of the user is brought into the screen, and appropriate brightness or saturation can be set. So that a face image can be acquired.
Next, the camera application of the user's smart phone is executed so that the user can photograph his or her face. Accordingly, when the user has photographed his or her face, it is judged whether or not the photographed face photograph is suitable for face recognition, and it is judged whether or not the face photograph is normally photographed. In this case, if it is determined that the normal photographing is not performed, a message can be displayed to instruct re-photographing, and in the case of normal photographing, the user's face authentication information including the face photograph of the user is generated.
On the other hand, if the user selects the digital signature, the credit card payment authentication application provides the user with a graphical user interface through which the user can input his or her signature through the smartphone screen, Captures the input portion of the signature of the smartphone screen, stores it as image data, and generates user digital signature information including the captured image data.
Through the above process, when the generation of the user authentication information including the user facial authentication information and the user digital signature information is completed, the credit card payment authentication application transmits the user authentication information to the management server.
When the management server receives the user authentication information transmitted from the user smartphone, it performs the user authentication operation based on the received user authentication information.
3 illustrates a process of performing a user authentication operation based on user authentication information in a management server.
Referring to FIG. 3, a step S600 of performing a user authentication operation based on user authentication information in a management server is performed through the following process.
First, it is determined whether face authentication information is included in the user authentication information (S610). If it is determined that face authentication information is included in the user authentication information, the face authentication operation is performed (S620). Next, it is determined whether the digital signature information is included in the user authentication information (S630). If it is determined that digital signature information is included in the user authentication information, the digital signature authentication operation is performed (S640). In this manner, it is determined whether the user authentication information includes the facial authentication information and the digital signature information, and the authentication operation is performed according to the facial authentication information and the digital signature information, thereby generating the user authentication result information (S650).
The facial authentication operation performed when the facial authentication information is included in the user authentication information includes extracting the facial feature information from the facial photograph of the user included in the facial authentication information and outputting the extracted facial feature information to the management server And generating facial authentication result information in comparison with facial feature information.
In this case, the facial feature information is determined by determining the characteristic points of the facial feature, and the relationship between the feature points is specified as information. When the credit card is registered in the management server, the facial image information of the user is also registered, May be pre-registered in the management server by extracting and storing the facial feature information, and the facial feature authentication operation may be performed by comparing the extracted facial feature information with the facial feature information extracted from the captured facial image.
Meanwhile, the digital signature authentication job performed when the digital signature information is included in the user authentication information is compared with the user signature image registered in the management server at the time of credit card registration through pattern recognition of the signature image of the user included in the digital signature information And determining whether the authenticity is true or not.
In this manner, the facial authentication and the digital signature authentication work are appropriately performed according to the information included in the user authentication information, and the user authentication result information is generated according to the result. At this time, the user authentication result information includes the user identity determination result for each of the face authentication and the digital signature authentication, and the authenticity determination result of the digital signature.
When the management server generates the user authentication result information, it transmits the information to the credit card payment terminal (S700). The credit card payment terminal allows the credit card payment to proceed according to the user authentication result information received from the management server (S800). At this time, if it is judged from the user authentication result information that the user is not the user or the digital signature is counterfeit, the credit card payment can be restricted.
As a result, convenient and secure user authentication can be performed at the credit card payment terminal, so that illegal use such as loss, duplication, or theft can be prevented in using the credit card.
Meanwhile, FIG. 4 illustrates a scenario in which a credit card payment authentication method using a smartphone according to the present invention is performed. Referring to FIG. 4, a scenario for a process of paying for a product or service using a credit card will be described below.
When a user who carries a smartphone wants to make a settlement with his / her credit card, the user first hands the credit card to the cashier, the cashier recognizes the credit card to the credit card payment terminal, The management server requests the user authentication operation. Then, the management server requests the user authentication information from the smartphone of the pre-registered user. Accordingly, the user's smart phone generates the user authentication information by photographing the face of the user with the camera or electronically signing it, and transmits it to the management server . Upon receiving the user authentication information from the management server, the user authentication operation is performed to generate user authentication result information including the user identity determination result and the authenticity determination result of the digital signature, and transmits the user authentication result information to the credit card payment terminal. In the credit card payment terminal, whether to proceed with the credit card payment may be selected according to the received user authentication result information.
Since a convenient and secure user authentication can be performed in the credit card payment terminal through the above-described process, fraudulent use such as loss, duplication, or theft can be prevented in using the credit card.
As described above, the credit card payment authentication method using the smartphone as described above can be implemented as a program command for implementing this. The computer-readable recording medium on which the program command is recorded includes a ROM, a RAM, a CD -ROM, a magnetic tape, a floppy disk, and an optical media storage device.
The computer-readable recording medium on which the above-described program is recorded may be distributed to a computer apparatus connected via a network so that computer-readable codes can be stored and executed in a distributed manner. In this case, one or more of the plurality of distributed computers may execute some of the functions presented above and send the results of the execution to one or more of the other distributed computers, The computer may also perform some of the functions described above and provide the results to other distributed computers as well.
A computer capable of reading a recording medium on which an application as a program for driving the apparatus and method according to each embodiment of the present invention is read can be used not only in a general PC such as a general desktop or a notebook computer but also in a smart phone, Personal digital assistants (PDAs), mobile communication terminals, and the like, and it should be interpreted as all devices capable of computing.
While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. That is, within the scope of the present invention, all of the components may be selectively coupled to one or more of them. In addition, although all of the components may be implemented as one independent hardware, some or all of the components may be selectively combined to perform a part or all of the functions in one or a plurality of hardware. As shown in FIG. The codes and code segments constituting the computer program may be easily deduced by those skilled in the art. Such a computer program is stored in a computer readable storage medium, readable and executed by a computer, thereby realizing an embodiment of the present invention. As a storage medium of the computer program, a magnetic recording medium, an optical recording medium, or the like can be included.
The foregoing description is merely illustrative of the technical idea of the present invention, and various changes and modifications may be made by those skilled in the art without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are intended to illustrate rather than limit the scope of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments. The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention.
Claims (7)
Transmitting a user authentication job request from the credit card payment terminal to a management server;
Transmitting a user authentication information request from the management server to a smartphone of a user;
Generating user authentication information in the smartphone of the user;
Transmitting the user authentication information to the management server;
Performing a user authentication operation on the management server based on the user authentication information;
Transmitting user authentication result information to the credit card payment terminal; And
And proceeding with credit card settlement in the credit card payment terminal based on the user authentication result information.
The step of generating the user authentication information in the smartphone of the user includes:
Receiving the user authentication information request from the smartphone of the user;
Executing a credit card payment authentication application automatically from the smartphone of the user; And
And generating the user authentication information including at least one of the facial authentication information and the digital signature information according to a user's selection in the credit card payment authentication application.
The step of generating the user authentication information including at least one of the facial authentication information and the digital signature information according to a user's selection in the credit card payment authentication application,
Providing a user interface for obtaining a selection of the user;
Generating facial authentication information of the user using the camera of the smartphone when the facial authentication information is selected by the user; And
A method of authenticating a credit card payment using a smartphone, comprising the step of providing a user interface for inputting a digital signature and generating digital signature information of a user when the digital signature information is selected by a user.
Wherein the generating of the facial authentication information of the user using the camera of the smartphone comprises:
Guiding a user to a face photographing method;
Executing a camera application of the smartphone;
Determining whether the face photograph of the user is normally photographed when the face photograph of the user is photographed by the camera of the smart phone; And
Instructing re-photographing when the normal photographing is not performed and generating facial authentication information of the user including a face photograph of the user in the case of normal photographing, Credit card payment authentication method.
Wherein the step of performing a user authentication operation based on the user authentication information in the management server comprises:
Performing facial authentication when the facial authentication information is included in the user authentication information;
Performing digital signature authentication if the digital signature information is included in the user authentication information; And
And generating the user authentication result information using the smart card.
The step of performing the facial authentication operation includes:
Extracting facial feature information from a face image of the user included in the facial authentication information;
And generating facial authentication result information by comparing the extracted facial feature information with facial feature information of a previously registered user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091453A KR20170001456A (en) | 2015-06-26 | 2015-06-26 | A method for authenticating credit card settlement using smartphone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091453A KR20170001456A (en) | 2015-06-26 | 2015-06-26 | A method for authenticating credit card settlement using smartphone |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170001456A true KR20170001456A (en) | 2017-01-04 |
Family
ID=57831841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150091453A KR20170001456A (en) | 2015-06-26 | 2015-06-26 | A method for authenticating credit card settlement using smartphone |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170001456A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021157790A1 (en) * | 2020-02-07 | 2021-08-12 | 신한카드 주식회사 | Registration and payment method, device, and system using face information |
-
2015
- 2015-06-26 KR KR1020150091453A patent/KR20170001456A/en active Search and Examination
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021157790A1 (en) * | 2020-02-07 | 2021-08-12 | 신한카드 주식회사 | Registration and payment method, device, and system using face information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109191112B (en) | Identity verification method and device | |
CN107707970B (en) | A kind of electronic contract signature method, system and terminal | |
US20210166241A1 (en) | Methods, apparatuses, storage mediums and terminal devices for authentication | |
EP3265978B1 (en) | Authentication-activated augmented reality display device | |
CN103907328A (en) | Mobile device-based authentication | |
JP2006504167A (en) | Method for performing secure electronic transactions using portable data storage media | |
WO2015114554A1 (en) | Method and system for authorizing a transaction | |
KR20170001923A (en) | System and method for verifying validity of digital image taken by mobile terminal | |
CN108763898A (en) | A kind of information processing method and system | |
US20160350742A1 (en) | System and method for transmitting and and receiving transaction information | |
CN108764920A (en) | Off-line trading method and device based on block chain | |
KR20180092775A (en) | Method and apparatus for authenticating user | |
US20170337553A1 (en) | Method and appartus for transmitting payment data using a public data network | |
CN109919601A (en) | Payment verification method, apparatus and electronic equipment | |
JP6925940B2 (en) | Identity verification system and identity verification method | |
KR101282824B1 (en) | Meeting attestation system and providing method thereof | |
CN110766388B (en) | Virtual card generation method and system and electronic equipment | |
KR20140011975A (en) | Digital system for card settlement by tagging, settlment side system and providing method thereof | |
KR20170001456A (en) | A method for authenticating credit card settlement using smartphone | |
CN109165490A (en) | A kind of data inputting method and device | |
CN110610367B (en) | Transaction data payment method and device, electronic equipment and server | |
KR101546390B1 (en) | Method of processing authentication information, apparatus performing the same and media storing the same | |
JP2014164489A (en) | Authentication device and authentication method | |
JP7163573B2 (en) | registration system | |
KR20170017190A (en) | Apparatus for verifying biometric information and mobile authentication and payment method using thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
A302 | Request for accelerated examination | ||
E902 | Notification of reason for refusal | ||
AMND | Amendment | ||
E601 | Decision to refuse application | ||
AMND | Amendment | ||
J201 | Request for trial against refusal decision |