WO2017152818A1 - 一种支付方法及系统 - Google Patents
一种支付方法及系统 Download PDFInfo
- Publication number
- WO2017152818A1 WO2017152818A1 PCT/CN2017/075741 CN2017075741W WO2017152818A1 WO 2017152818 A1 WO2017152818 A1 WO 2017152818A1 CN 2017075741 W CN2017075741 W CN 2017075741W WO 2017152818 A1 WO2017152818 A1 WO 2017152818A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- authentication
- payee
- payee device
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/204—Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/321—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/001—Interfacing with vending machines using mobile or wearable devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
- H04B13/005—Transmission systems in which the medium consists of the human body
Definitions
- the present invention relates to the field of electronic technologies, and in particular, to a payment method and system.
- POS machines are widely used in electronic payment. Some existing POS machines read the cardholder's magnetic stripe information through the card reader, and the POS operator inputs the transaction amount. The cardholder swipes the bank card on the POS machine, and then enters the password, and the POS machine puts these The information is uploaded to the bank back office to complete the online transaction. It can be seen that in the existing electronic payment process, the user needs to perform two operations. The first time the bank card is placed on the POS machine to establish a connection with the POS machine, the second time the user needs to input a password, and the operation process is complicated.
- the present invention is directed to solving one of the above problems.
- the main object of the present invention is to provide a payment method.
- Another object of the present invention is to provide a payment system.
- An aspect of the present invention provides a payment method, comprising: after a biological limb enters a preset range of a payee device, the payee device establishes a communication connection with the payer device through the biological limb; the payee device Transmitting, by the communication connection, transaction information to the payer device; the payer device receiving the transaction information; the payer device extracting key information from the transaction information; the payer device prompting the key Information, and waiting for user confirmation; after receiving the confirmation instruction of the user, the payment party device sends the authentication information to the payee device through the communication connection; the payee device receives the communication through the communication connection
- the authentication information transmitted by the paying party device, the authentication information includes: digital authentication information; collecting biometric information of the biological limb during a duration of the preset range of the biological limb entering the payee device; Receiving, by the payee device, an authentication result of authenticating the digital authentication information and the biometric information; In the authentication device is the result of the implementation of payment transactions through certification of the case.
- the biometric information includes: fingerprint information and/or vein information;
- the collecting biometric information of the biological limb includes: contacting the biological limb with the payee device In the case of the biometric information of the contact portion of the biological limb with the payee device.
- the digital authentication information includes at least one of the following: electronic signature information, ciphertext information, and a dynamic password.
- a payment system including: a payee device and a payer device, wherein: the payee device is configured to pass a biological body after entering a preset range of the payee device The limb establishes a communication connection with the payer device, and sends transaction information to the payer device through the communication connection; the payer device is configured to receive the transaction information, extract key information from the transaction information, and prompt The key information is waiting for the user to confirm, and after receiving the confirmation instruction of the user, sending the authentication information to the payee device through the communication connection; the payee device is further configured to receive through the communication connection
- the authentication information transmitted by the payer device the authentication information includes: digital authentication information; collecting biometrics of the biological limb during a duration of the preset range of the biological limb entering the payee device Information; obtaining an authentication result of authenticating the digital authentication information and the biometric information; and the authentication result is an authentication pass Carrying out a payment default.
- the biometric information includes: fingerprint information and/or vein information; and the payee device is further configured to collect biometric information of the biological limb, including: the biological limb and the receipt In the case where the party device is in contact, the payee device collects the biometric information of the contact portion of the biological limb with the payee device.
- the digital authentication information includes at least one of the following: electronic signature information, ciphertext information, and a dynamic password.
- the present invention provides a payment method and system for transmitting transaction information and information to be authenticated by using human body communication, and completing payment after the information to be authenticated is authenticated, for the user. Only one operation is performed, and the payee device obtains the digital authentication information and the biometric information at the same time, which is quick and convenient, and the double authentication of the digital authentication information and the biometric information can be more secure and reliable, and the real legality is reduced. The probability that the user is identified as failed increases the user experience.
- FIG. 1 is a flowchart of a payment method according to Embodiment 1 of the present invention.
- FIG. 2 is a schematic structural diagram of a payment system according to Embodiment 2 of the present invention.
- Human body communication is an emerging short-distance communication technology that has emerged in recent years. It is mainly used to solve the communication problem of the body area network with human body as the carrier. It uses the human body as a transmission medium for electrical signals to realize information interaction between the body surface, the body and the surrounding health care equipment (3 to 5 meters). Compared with traditional wireless communication technologies such as Bluetooth, WIFI, RF and infrared, signals are transmitted through the human body during human communication, so electromagnetic noise has little influence on them, and has low power consumption and high confidentiality. And lower body damage and other advantages. In addition, since there is no problem of reduced efficiency when multi-person communication occurs, the redundant connection problem of the wired communication method can be eliminated.
- the present invention provides a payment method for transmitting transaction information and information to be authenticated by human body communication, and the payment is completed after the authentication of the information to be authenticated, and only one operation is performed for the user, and the payee device simultaneously It is quick and convenient to obtain digital authentication information and biometric information, and through the dual authentication of digital authentication information and biometric information, it can be more secure and reliable, and reduces the probability that real and legitimate users are recognized and failed, and improves the user experience.
- This embodiment provides a payment method. As shown in FIG. 1, the payment method includes the following steps S101 to S108:
- the biological limb generally refers to the human body
- the payee device can be a POS machine, an Alipay application, etc., a scanning terminal, a mobile terminal, a PDA, a desktop, a notebook, etc., and a payment terminal that can be networked with the background, and the paying party device can
- the device implanted in the human body worn on the human body or placed in the worn clothes
- the device implanted in the human body can be, for example, a blood flow sensor, a pulse sensor, a body temperature sensor or the like implanted in the human body, and worn on the human body.
- the device may be, for example, a wristband, a wristwatch, a necklace, a ring, a waistband, or the like that can be worn on the user's electronic device. If it is a device worn on a human body, although it is not in direct contact with the surface of the human body, the distance from the surface of the human body (such as the skin) cannot exceed a preset distance, for example, a few millimeters, so that communication can be performed through the human body within the preset distance. Guarantee the quality of communication.
- the Body Area Network is a human body-centered network element (including personal terminals, distributed on the human body, clothing, and a certain distance around the human body, such as 3 to 5 meters, Even a communication network composed of sensors, networking devices, etc. inside the human body, therefore, only when the network element related to the human body enters the preset range of the payee device, the human body communication connection of the body area network can be established.
- the payee device establishes a communication connection between the biological limb and the payer device by using a wired manner and a wireless manner.
- a wired manner and a wireless manner.
- Both the payee device and the payer device are provided with electrodes, and the payee device contacts the biological limb (human body) implanted in the human body or the payer device worn on the human body (for example, a user wearing the wristwatch has a finger
- the human body is used as a conductor, and the electrodes of both sides are connected to form a passage in the human body, that is, a so-called wired communication connection.
- the payee device needs to be in contact with a human body wearing the payer device.
- the payee device and the payer device can detect whether the surrounding electric field changes, and if the other party enters the range allowed by the human body communication, the field strength can be detected to be changed. Establish a communication connection with the other party.
- the payer device is worn or built in the human body, and the vibration of the transmitter of the payer device generates an electric field, and the distance between the payer device and the payee device is in the human body communication.
- the receiver of the payee device detects a change in the electric field and establishes a communication connection with the payer device. In this manner, the payee device does not need to be in contact with a human body wearing the payer device.
- the human body is used as a transmission medium of an electrical signal to realize information interaction between the body surface, the body, and the device around the human body (3 to 5 meters).
- traditional wireless communication technologies such as Bluetooth, WIFI, radio frequency and infrared
- the signal is transmitted through the human body during human communication, so electromagnetic noise has little influence on it, and has low power consumption, high confidentiality and lower human damage. advantage.
- the redundant connection problem of the wired communication method can be eliminated.
- the transaction information may include: a transaction amount, a payee account information, and a payer account information.
- the payee device When a large transaction occurs, the payee device must send the transaction information to the payer device to prompt the user. The subsequent payment process can only be performed after the user confirms.
- the payer device may be a device, such as a wristwatch, or two devices, such as a wristwatch and an electronic signature device (such as U-Shield, ABC Key, or a smart card with a signature function).
- a device such as a wristwatch
- an electronic signature device such as U-Shield, ABC Key, or a smart card with a signature function.
- S103 the payer device receives the transaction information, and the payer device extracts the key information from the transaction information;
- the paying party device may extract key information, such as the transaction amount, or the name of the payee, the name of the payer, and the like from the transaction information, without prompting the entire content of the transaction information, specifically, It can be prompted by means of display display or voice playback.
- key information such as the transaction amount, or the name of the payee, the name of the payer, and the like from the transaction information, without prompting the entire content of the transaction information, specifically, It can be prompted by means of display display or voice playback.
- it can meet small devices with small display screens.
- the display of the watch is small and cannot display the entire contents of the transaction information, but as long as the key content is displayed, Can play a role in prompting the user.
- S104 the paying party device prompts the key information, and waits for the user to confirm;
- the step of user confirmation is added to improve the security of the transaction, and the subsequent operations can be performed only after the user confirms and presses the confirmation key.
- the payer device is two devices, then when prompted to the user, it can be prompted on any of the devices, of course, preferably on the electronic signature device.
- the authentication information includes: digital authentication information; and the digital authentication information includes at least one of the following: electronic signature information, ciphertext information, and dynamic password.
- the electronic signature information is signature data obtained by the payment device device by using the private key of the payment device to sign the signature data, and the data to be signed includes: single authentication data and authentication identification information, etc., when the electronic signature information is authenticated, the electronic signature information is obtained.
- the public key of the payer device uses the public key to check the electronic signature information. If the check is passed, the authentication passes, which is an asymmetric authentication method; the ciphertext information is used by the payer device and the payee device.
- the negotiated symmetric key is used to calculate the MAC value of the encrypted data.
- the symmetric MAC address is also used to calculate the verified MAC value, and the ciphertext information is compared with the verified MAC value.
- the authentication is passed, which is a symmetric authentication method; the dynamic password is a ciphertext generated by a dynamic port token (OTP) based on a seed key, and when the dynamic password is authenticated, the seed key is also used to calculate a verification value, and the comparison is performed. If the dynamic password and the verification value are the same, the authentication is passed. This is the token authentication mode.
- the authentication of the digital authentication information can be implemented by any of the above three methods to ensure the legitimacy of the payer device.
- the authentication information may further include: authentication identifier information, where the authentication identifier information may be, for example, a device identifier of the payer device, a user ID, and the like, which can uniquely identify the identity of the user, and pass the authentication.
- the identification information may be uniquely associated with an authentication factor used by the paying party user to authenticate the digital authentication information and the biometric information, so as to perform dual authentication on the digital authentication information and the biometric information by using the authentication factor, thereby being able to It is determined that the biometric information and the digital authentication information are all from the same user, and the legitimacy of the user is guaranteed.
- the payee device receives the authentication information transmitted by the payer device through the communication connection; and collects the biometric information of the biological limb during the duration of the preset range of the biological limb entering the payee device;
- the biometric information includes at least one of the following: fingerprint information, iris information, face information, and vein information.
- the payee device collects the biometric information of the human body while receiving the authentication information sent by the payer device, for example, in a short time (eg, 3 seconds) when the user's finger touches the touch component of the POS device,
- the POS machine establishes a communication connection with the wristwatch worn by the user through the human body, and transmits the authentication information through the communication connection, and the touch component of the POS machine collects the fingerprint information, for example, on the user's wristwatch and the Alipay payment terminal (the payment terminal has The photographing function can be used to collect face information.
- the face information is collected by the payment terminal, whereby the payee device can obtain the authentication information and the biometric information in one time, and the operation is convenient and quick.
- the biometric information may be collected before or after the communication connection is established.
- the biometric information includes: fingerprint information and/or vein information;
- the biometric information of the biological limb includes: collecting biometric information of the contact portion of the biological limb and the payee device in the case where the biological limb is in contact with the payee device.
- the POS machine Compared with the input fingerprint and PIN code on the POS machine in the prior art, the POS machine first prompts the user to input fingerprint information, collects the fingerprint, and then prompts the user to input the PIN code.
- the user needs to interact with the POS machine twice to complete the fingerprint and PIN.
- the input of the code is troublesome, and in the present invention, the user can complete the input of the authentication information and the collection of the biometric information in one time with one action, which is convenient and quick.
- S107 Acquire an authentication result for authenticating the digital authentication information and the biometric information
- the authentication result of authenticating the digital authentication information and the biometric information is obtaining the authentication factor and the biometric verification information according to the authentication identification information, and authenticating the digital authentication information by using the authentication factor and using the biometric verification information to the biometric
- the authentication result of the authentication of the feature information, the authentication factor mainly includes the verification information for verifying the digital authentication information, and the authentication factor and the biometric verification information are uniquely associated with the authentication identification information, so that the authentication corresponding to the user can be uniquely queried according to the authentication identification information.
- Factor and biometric verification information so that the two-factor authentication of digital authentication information and biometric information can ensure the legitimacy of the user.
- the authentication of the digital authentication information by using the authentication factor includes at least one of the following ways:
- Method 1 Asymmetric authentication method.
- the digital authentication information includes: electronic signature information; the authentication factor includes a public key for verifying the electronic signature information; or
- Method 2 Symmetric authentication method.
- the digital authentication information includes: ciphertext information calculated by using a symmetric key; the authentication factor includes a symmetric key; or
- Method 3 Token authentication method.
- the digital authentication information includes: a dynamic password; the authentication factor includes a seed key that verifies the dynamic password.
- the authentication information is used to authenticate the biometric information by using the digital authentication information and the biometric verification information, including: authenticating the digital authentication information by using the authentication factor, and determining the matching rate between the biometric verification information and the biometric information. Whether it is greater than the first preset value, when the authentication of the digital authentication information is passed and the matching rate between the biometrics verification information and the biometric information is greater than the first preset value, the authentication of the authentication information and the biometric information is confirmed to pass.
- the second preset value is used to indicate that the two biometric information is the matching rate of the same biometric information.
- the second preset value may be theoretically The two biometric information completely match the similarity to be achieved, for example, 99%, and the first preset value may be smaller than the second preset value, thereby reducing the true rate of the biometric information authentication technology by reducing the matching rate. Identify the probability of failure.
- biometric information authentication technology there is a probability that a real legal user is recognized to be failed and an illegal user is recognized successfully.
- fingerprint recognition as an example, in many cases, the user's fingerprint is real, but the authentication device Identifying the error, mistakenly identifying the fingerprint of the user as a fake fingerprint, and thus failing to pass the authentication, and failing to implement the payment transaction; sometimes, the fingerprint of the illegal user is clearly false, but the authentication device is also authenticated and passed to the legitimate user.
- the economic losses, the probability of these occurrences is very high.
- the double authentication of the digital authentication information and the biometric information can circumvent the situation that the “illegal user is successfully identified”, and can reduce the situation in which the real legitimate user is identified as failed.
- the authentication device can reduce the similarity of the matching of the two biometric information to reduce the probability that the real legitimate user is recognized, for example, the theory
- the upper two biometric information should be completely matched, and the similarity should be at least 99% (the second preset value). If the authentication device finds that its similarity is only 90%, it will be identified as a mismatch and the authentication will not pass.
- the similarity of the exact match can be reduced to 80% (the first preset value). That is to say, as long as the similarity reaches 80% (the first preset value), the match is considered, so when the similarity of the two biometric information is 90% Can also be certified, thus, would not be the true legitimate user is identified failure occurred, thereby reducing the probability of biometric authentication technology information in real legitimate user is identified failures.
- S108 The payee device performs the payment transaction if the authentication result is that the authentication is passed.
- the payment method provided in this embodiment uses the human body communication to transmit transaction information and information to be authenticated, and is treated After the authentication of the information of the certificate is completed, the payment is completed, and only one operation is performed for the user, and the receiving device simultaneously acquires the digital authentication information and the biometric information at the same time, which is quick and convenient, and passes the digital authentication information and the biometric information. Dual authentication can be more secure and reliable, and reduces the probability that a real legitimate user will be identified and failed, improving the user experience.
- the payment system includes: a payer device 10 and a payer device 20, wherein:
- the payee device 10 is configured to establish a communication connection with the payer device 20 through the biological limb after the biological limb enters the preset range of the payee device 10, and send the transaction information to the payer device 20 through the communication connection; the payer device 20, for receiving transaction information, extracting key information from the transaction information, and prompting key information, waiting for user confirmation; after receiving the user's confirmation instruction, transmitting the authentication information to the payee device 10 through the communication connection; the payee The device 10 is further configured to receive the authentication information transmitted by the payer device 20 through the communication connection; collect the biometric information of the biological limb during the duration of the preset range of the biological limb entering the payee device 10; and obtain the digital authentication information And the authentication result of the biometric information to be authenticated; and the payment transaction is executed if the authentication result is the authentication pass.
- the transaction information and the information to be authenticated are transmitted by using the human body communication, and the payment is completed after the authentication of the information to be authenticated is passed, and only one operation is performed for the user, and the payee device is simultaneously disabled.
- Obtaining digital authentication information and biometric information is quick and convenient, and through the dual authentication of digital authentication information and biometric information, it can be more secure and reliable, and reduces the probability that a real legitimate user is recognized and fails, and improves the user experience.
- the biological limb generally refers to the human body
- the payee device can be a POS machine, an Alipay application, etc., a scanning terminal, a mobile terminal, a PDA, a desktop, a notebook, etc., and a payment terminal that can be networked with the background, and the paying party device can
- the device implanted in the human body worn on the human body or placed in the worn clothes
- the device implanted in the human body can be, for example, a blood flow sensor, a pulse sensor, a body temperature sensor or the like implanted in the human body, and worn on the human body.
- the device may be, for example, a wristband, a wristwatch, a necklace, a ring, a waistband, or the like that can be worn on the user's electronic device. If it is a device worn on a human body, although it is not in direct contact with the surface of the human body, the distance from the surface of the human body (such as the skin) cannot exceed a preset distance, for example, a few millimeters, so that communication can be performed through the human body within the preset distance. Guarantee the quality of communication.
- the Body Area Network is a human body-centered network element (including personal terminals, distributed on the human body, clothing, and a certain distance around the human body, such as 3 to 5 meters, Even a communication network composed of sensors, networking devices, etc. inside the human body, therefore, only when the network element related to the human body enters the preset range of the payee device, the human body communication connection of the body area network can be established.
- the payee device 10 establishes a communication connection between the biological limb and the payer device 20 through a wired manner and a wireless manner, and specifically, at least by one of the following two methods. :
- Both the payee device 10 and the payer device 20 are provided with electrodes, and the payee device 10 is in contact with a biological limb (human body) implanted in the human body or the payer device 20 worn on the human body (for example, wearing a wristwatch)
- a biological limb human body
- the payer device 20 worn on the human body (for example, wearing a wristwatch)
- the human body is used as a conductor, and the electrodes of both sides are connected to form a passage in the human body, that is, a so-called wired communication connection.
- the payee device 10 needs to be in contact with a human body wearing the payer device 20.
- the payee device 10 and the payer device can detect whether the surrounding electric field changes, and if the other party enters the range allowed by the human body communication, the field strength can be detected to change. , establish a communication connection with the other party.
- the payer device 20 is worn or built in the human body, and the oscillation of the transmitter of the payer device 20 causes the body to generate an electric field, when the payer device 20 and the payee device 10 are separated.
- the receiver of the payee device 10 detects a change in the electric field and establishes a communication connection with the payer device 20. In this manner, the payee device 10 does not need to be in contact with the human body wearing the payer device 20.
- the human body is used as a transmission medium of an electrical signal to realize information interaction between the body surface, the body, and the device around the human body (3 to 5 meters).
- traditional wireless communication technologies such as Bluetooth, WIFI, radio frequency and infrared
- the signal is transmitted through the human body during human communication, so electromagnetic noise has little influence on it, and has low power consumption, high confidentiality and lower human damage. advantage.
- the redundant connection problem of the wired communication method can be eliminated.
- the transaction information may include: a transaction amount, a payee account information, and a payer account information.
- the payee device 10 must send the transaction information to the payer device 20 to prompt The user can perform the subsequent payment process after the user confirms.
- the payer device may be a device, such as a wristwatch, or two devices, such as a wristwatch and an electronic signature device (such as U-Shield, ABC Key, or a smart card with a signature function).
- the payer device 20 may extract key information, such as the transaction amount, or the name of the payee, the name of the payer, and the like from the transaction information, without prompting the entire content of the transaction information, specifically, It can be prompted by display screen display or voice playback.
- key information such as the transaction amount, or the name of the payee, the name of the payer, and the like from the transaction information, without prompting the entire content of the transaction information, specifically, It can be prompted by display screen display or voice playback.
- it can meet small devices with small display screens.
- the display of the watch is small and cannot display the entire contents of the transaction information, but only the key content is displayed. It can serve as a reminder to the user.
- the payer device 20 is also used to prompt key information, and the step of confirming the user is added to improve the security of the transaction. Only after the user confirms and presses the confirm button, the subsequent operations can be performed. In particular, if the payer device is two devices, then when prompted to the user, it can be prompted on any of the devices, of course, preferably on the electronic signature device.
- the authentication information includes: digital authentication information; and the digital authentication information includes at least one of the following: electronic signature information, ciphertext information, and dynamic password.
- the electronic signature information is signature data obtained by the payer device 20 by using the private key of the paying party to sign the signature data.
- the data to be signed includes: single authentication data and authentication identification information, etc., when the electronic signature information is authenticated, Obtaining the public key of the payer device 20, using the public key to the electronic signature letter If the verification is passed, the authentication is passed, which is an asymmetric authentication mode; the ciphertext information is the MAC value calculated by the payer device 20 using the symmetric key negotiated with the payee device 10 to treat the encrypted data.
- the symmetric MAC address is also used to calculate the verified MAC value, and the ciphertext information is compared with the verified MAC value. If they are consistent, the authentication is passed, which is a symmetric authentication method; For the ciphertext generated by the dynamic key token (OTP) based on the seed key, when the dynamic password is authenticated, the verification value is also calculated by using the seed key, and the dynamic password and the verification value are compared. If they are consistent, the authentication is passed. This is the token authentication method.
- the authentication of the digital authentication information can be implemented by any of the above three methods to ensure the legitimacy of the payer device 20.
- the authentication information may further include: authentication identifier information, where the authentication identifier information may be, for example, a device identifier of the payer device 20, a user ID, and the like, which can uniquely identify the identity of the user.
- the authentication identifier information may be uniquely associated with an authentication factor used by the paying party user to authenticate the digital authentication information and the biometric information, so as to perform dual authentication on the digital authentication information and the biometric information by using the authentication factor, thereby, after the dual authentication is passed It can be determined that the biometric information and the digital authentication information are all from the same user, and the legitimacy of the user is guaranteed.
- the payee device 10 is further configured to collect biometric information of the biological limb during the duration of the preset range of the biological limb entering the payee device 10; wherein the biometric information includes at least one of the following: Fingerprint information, iris information, face information, and vein information.
- the payee device 10 collects the biometric information of the human body while receiving the authentication information sent by the payer device 20, for example, within a short time (for example, 3 seconds) when the user's finger touches the touch component of the POS machine.
- the POS machine establishes a communication connection with the wristwatch worn by the user through the human body, and transmits the authentication information through the communication connection, and the touch component of the POS machine collects the fingerprint information, for example, in the user's wristwatch and the Alipay payment terminal (the payment)
- the terminal has a photographing function, which can be used for collecting face information.
- the face information is collected by the payment terminal, whereby the payee device 10 can obtain the authentication information and the biometric information in one operation. Convenient.
- biometric information may be collected before or after the communication connection is established.
- the biometric information includes: fingerprint information and/or vein information;
- the payee device 10 Also used for collecting biometric information of the biological limb includes: in the case where the biological limb is in contact with the payee device 10, the payee device 10 collects biometric information of the contact portion of the biological limb and the payee device 10.
- the POS machine Compared with the input fingerprint and PIN code on the POS machine in the prior art, the POS machine first prompts the user to input fingerprint information, collects the fingerprint, and then prompts the user to input the PIN code.
- the user needs to interact with the POS machine twice to complete the fingerprint and PIN.
- the input of the code is troublesome, and in the present invention, the user can complete the input of the authentication information and the collection of the biometric information in one time with one action, which is convenient and quick.
- the authentication result of authenticating the digital authentication information and the biometric information is an authentication result obtained by acquiring an authentication factor according to the authentication identification information, and authenticating the digital authentication information and the biometric information by using the authentication factor.
- the authentication factor mainly includes the biometric verification information and the verification information for verifying the digital authentication information, and the authentication factor is uniquely associated with the authentication identification information, so that the authentication factor corresponding to the user can be uniquely queried according to the authentication identification information, so as to utilize the digital authentication. After the two-factor authentication of information and biometric information is passed, the legitimacy of the user can be guaranteed.
- the authentication of the digital authentication information by using the authentication factor includes at least one of the following ways:
- Method 1 Asymmetric authentication method.
- the digital authentication information includes: electronic signature information; the authentication factor includes a public key for verifying the electronic signature information; or
- Method 2 Symmetric authentication method.
- the digital authentication information includes: ciphertext information calculated by using a symmetric key; the authentication factor includes a symmetric key; or
- Method 3 Token authentication method.
- the digital authentication information includes: a dynamic password; the authentication factor includes a seed key that verifies the dynamic password.
- the authentication information is used to authenticate the digital authentication information, and the biometric information is authenticated by using the biometric verification information, including: authenticating the digital authentication information by using the authentication factor, and determining the biometric verification. Whether the matching rate of the information and the biometric information is greater than the first preset value, and confirming the authentication information and the biometric feature when the digital authentication information is authenticated and the matching rate between the biometric verification information and the biometric information is greater than the first preset value The certification of information is passed.
- the authentication information is used to authenticate the digital authentication information and the biometric information, including: authenticating the digital authentication information by using the authentication factor, and determining the biometric verification information and the biometric information after the authentication is passed. Whether the matching rate is greater than the first preset value; when the matching rate of the biometrics verification information and the biometric information is greater than the first preset value, the authentication of the digital authentication information and the biometric information is confirmed to pass.
- the second preset value is used to indicate that the two biometric information is the matching rate of the same biometric information.
- the second preset value may be theoretically The two biometric information completely match the similarity to be achieved, for example, 99%, and the first preset value may be smaller than the second preset value, thereby reducing the probability that the real legal user in the biometric information authentication technology is recognized and failed.
- biometric information authentication technology there is a probability that a real legal user is recognized to be failed and an illegal user is recognized successfully.
- fingerprint recognition as an example, in many cases, the user's fingerprint is real, but the authentication device Identifying the error, mistakenly identifying the fingerprint of the user as a fake fingerprint, and thus failing to pass the authentication, and failing to implement the payment transaction; sometimes, the fingerprint of the illegal user is clearly false, but the authentication device is also authenticated and passed to the legitimate user.
- the economic losses, the probability of these occurrences is very high.
- the double authentication of the digital authentication information and the biometric information can circumvent the situation that the “illegal user is successfully identified”, and can reduce the situation in which the real legitimate user is identified as failed.
- the authentication device can reduce the similarity of the matching of the two biometric information to reduce the true legal user.
- the probability of failure for example, theoretically the two biometric information should be completely matched, and the similarity should be at least 99% (second preset value), and if the authentication device finds that its similarity is only 90%, it will If the identification is not matched, the authentication fails, and the real fingerprint is recognized as a fake fingerprint.
- the similarity of the exact match can be reduced to 80%. (the first preset value), that is, as long as the similarity reaches 80% (the first preset value), the match is considered. Therefore, when the similarity of the two biometric information is 90%, the authentication can also be performed. As a result, the real and legitimate users are not recognized to be failed, thereby reducing the probability that the authentic and legitimate users in the biometric information authentication technology are recognized.
- the payment system provided by the embodiment uses the human body communication to transmit the transaction information and the information to be authenticated, and completes the payment after the authentication of the information to be authenticated is passed, and only one operation is performed for the user, and the payee device simultaneously acquires at one time.
- Digital authentication information and biometric information are fast and convenient, and through the dual authentication of digital authentication information and biometric information, it can be more secure and reliable, and reduces the probability that a real and legitimate user is recognized and fails, and improves the user experience.
- Embodiments of the present invention provide a computer program that, when run on a processor, performs the payment authentication method described above.
- portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
- multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
- each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
Description
Claims (7)
- 一种支付方法,其特征在于,包括:在生物肢体进入收款方设备的预设范围后,所述收款方设备通过生物肢体与支付方设备建立通信连接;所述收款方设备通过所述通信连接向所述支付方设备发送交易信息;所述支付方设备接收所述交易信息;所述支付方设备从所述交易信息中提取关键信息;所述支付方设备提示所述关键信息,并等待用户确认;所述支付方设备接收用户的确认指令后,将认证信息通过所述通信连接发送给所述收款方设备,所述认证信息包括:数字认证信息;所述收款方设备通过所述通信连接接收所述支付方设备传输的所述认证信息;在所述生物肢体进入所述收款方设备的预设范围的持续期间,采集所述生物肢体的生物特征信息;所述收款方设备获取对所述数字认证信息以及所述生物特征信息进行认证的认证结果;所述收款方设备在所述认证结果为认证通过的情况下执行支付交易。
- 根据权利要求1所述的支付方法,其特征在于,所述生物特征信息包括:指纹信息和/或静脉信息;所述采集所述生物肢体的生物特征信息包括:在所述生物肢体与所述收款方设备接触的情况下,采集所述生物肢体与所述收款方设备的接触部位的所述生物特征信息。
- 根据权利要求1或2所述的支付方法,其特征在于,所述数字认证信息包括以下至少之一:电子签名信息、密文信息和动态口令。
- 一种支付系统,其特征在于,包括:收款方设备和支付方设备,其中:所述收款方设备,用于在生物肢体进入收款方设备的预设范围后,通过生物肢体与支付方设备建立通信连接,通过所述通信连接向所述支付方设备发送交易信息;所述支付方设备,用于接收所述交易信息,从所述交易信息中提取关键信息,并提示所述关键信息,等待用户确认,在接收用户的确认指令后,将认证信息通过所述通信连接发送给所述收款方设备;所述收款方设备,还用于通过所述通信连接接收所述支付方设备传输的所述认证信息,所述认证信息包括:数字认证信息;在所述生物肢体进入所述收款方设备的预设范围的持续期间,采集所述生物肢体的生物特征信息;获取对所述数字认证信息以及所述生物特征 信息进行认证的认证结果;在所述认证结果为认证通过的情况下执行支付交易。
- 根据权利要求4所述的系统,其特征在于,所述生物特征信息包括:指纹信息和/或静脉信息;所述收款方设备,还用于采集所述生物肢体的生物特征信息包括:在所述生物肢体与所述收款方设备接触的情况下,所述收款方设备采集所述生物肢体与所述收款方设备的接触部位的所述生物特征信息。
- 根据权利要求4或5所述的系统,其特征在于,所述数字认证信息包括以下至少之一:电子签名信息、密文信息和动态口令。
- 一种计算机程序,当其在处理器上运行时,执行如权利要求1-3中任一项所述的支付方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17762504.3A EP3428867A4 (en) | 2016-03-07 | 2017-03-06 | PAYMENT METHOD AND SYSTEM |
US16/082,697 US10872337B2 (en) | 2016-03-07 | 2017-03-06 | Payment device and system |
KR1020187024987A KR102089201B1 (ko) | 2016-03-07 | 2017-03-06 | 지불 방법 및 시스템 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610127251.5 | 2016-03-07 | ||
CN201610127251.5A CN105989495A (zh) | 2016-03-07 | 2016-03-07 | 一种支付方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017152818A1 true WO2017152818A1 (zh) | 2017-09-14 |
Family
ID=57044049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/075741 WO2017152818A1 (zh) | 2016-03-07 | 2017-03-06 | 一种支付方法及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US10872337B2 (zh) |
EP (1) | EP3428867A4 (zh) |
KR (1) | KR102089201B1 (zh) |
CN (1) | CN105989495A (zh) |
WO (1) | WO2017152818A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT201800002681A1 (it) * | 2018-02-15 | 2019-08-15 | Archimedetech Srl | Processo/metodo di autentificazione di identita’ con invio e scambio di una password personale temporanea fra almeno quattro dispositivi elettronici per successive attivita’ di ricariche, pagamenti, accessi e/o identificazioni del proprietario di un dispositivo mobile quale uno smartphone |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10785218B2 (en) | 2016-03-07 | 2020-09-22 | Tendyron Corporation | Authorization authentication method, device and system |
CN105989495A (zh) | 2016-03-07 | 2016-10-05 | 李明 | 一种支付方法及系统 |
CN105938526A (zh) * | 2016-03-07 | 2016-09-14 | 李明 | 一种身份认证方法及系统 |
CN106529940A (zh) * | 2016-10-25 | 2017-03-22 | 天地融科技股份有限公司 | 一种智能卡的操作执行方法、智能卡读写系统和智能卡 |
CN109564604A (zh) * | 2018-11-02 | 2019-04-02 | 深圳市汇顶科技股份有限公司 | 指纹认证方法、装置、设备及存储介质 |
EP3661148B1 (en) * | 2018-11-28 | 2023-05-24 | Nxp B.V. | Location- and identity-referenced authentication method and communication system |
US11151542B2 (en) * | 2019-05-07 | 2021-10-19 | Paypal, Inc. | Wearable payment device |
FR3096481A1 (fr) * | 2019-06-20 | 2020-11-27 | Orange | Procédé et dispositif d'authentification d'un utilisateur. |
US10733601B1 (en) * | 2019-07-17 | 2020-08-04 | Capital One Services, Llc | Body area network facilitated authentication or payment authorization |
CN111275446A (zh) * | 2020-01-17 | 2020-06-12 | 北京意锐新创科技有限公司 | 集成半导体指纹模块的支付方法和装置 |
CN111915311B (zh) * | 2020-08-03 | 2022-07-01 | 支付宝(杭州)信息技术有限公司 | 一种支付校验方法及系统 |
CN113139811A (zh) * | 2021-04-26 | 2021-07-20 | 中国工商银行股份有限公司 | 复合认证支付方法、装置及服务器 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100042835A1 (en) * | 2008-08-18 | 2010-02-18 | Keep Security Inc. | System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device |
CN102930436A (zh) * | 2012-10-23 | 2013-02-13 | 江苏乐买到网络科技有限公司 | 一种移动支付的方法和装置 |
CN103679453A (zh) * | 2013-12-06 | 2014-03-26 | 金硕澳门离岸商业服务有限公司 | 基于生物认证的支付系统及支付方法 |
CN103731273A (zh) * | 2014-01-13 | 2014-04-16 | 天地融科技股份有限公司 | 一种数据传输方法和系统 |
CN104484804A (zh) * | 2014-12-24 | 2015-04-01 | 福建联迪商用设备有限公司 | 一种安全指纹交易支付的方法及系统 |
CN105989495A (zh) * | 2016-03-07 | 2016-10-05 | 李明 | 一种支付方法及系统 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040075126A (ko) * | 2003-02-20 | 2004-08-27 | 김이남 | 인체인식을 이용한 금융결제에 따른 보안 방법 및 시스템 |
WO2007018151A1 (ja) * | 2005-08-05 | 2007-02-15 | Sharp Kabushiki Kaisha | 通信装置、通信システム |
JP2007206991A (ja) * | 2006-02-02 | 2007-08-16 | Hitachi Ltd | 生体情報処理装置及び生体情報処理プログラム |
US20100242102A1 (en) * | 2006-06-27 | 2010-09-23 | Microsoft Corporation | Biometric credential verification framework |
CN101296080B (zh) * | 2007-04-29 | 2013-03-13 | 晨星半导体股份有限公司 | 授权使用者确认方法及其相关装置 |
JP5365955B2 (ja) * | 2009-01-29 | 2013-12-11 | 株式会社日本コンラックス | 人体通信制御システム |
KR101504500B1 (ko) * | 2009-10-01 | 2015-03-23 | 한국전자통신연구원 | 동기된 클럭신호를 이용하는 통신 장치 |
JP2012039370A (ja) * | 2010-08-06 | 2012-02-23 | Sony Corp | 通信システム並びに通信装置 |
JP4713694B1 (ja) * | 2010-10-05 | 2011-06-29 | 株式会社シー・エス・イー | 二要素ユーザ認証システム、およびその方法 |
US20130006859A1 (en) * | 2011-06-29 | 2013-01-03 | Hyundai Motor Company | Payment system and method using human body communication |
CN103873244B (zh) * | 2012-12-13 | 2017-05-10 | 航天信息股份有限公司 | 基于指纹识别的移动支付中的身份认证方法和系统 |
CN106063158A (zh) * | 2013-11-27 | 2016-10-26 | 深圳市汇顶科技股份有限公司 | 用于安全交易和通信的可穿戴通信装置 |
-
2016
- 2016-03-07 CN CN201610127251.5A patent/CN105989495A/zh active Pending
-
2017
- 2017-03-06 KR KR1020187024987A patent/KR102089201B1/ko active IP Right Grant
- 2017-03-06 EP EP17762504.3A patent/EP3428867A4/en not_active Withdrawn
- 2017-03-06 US US16/082,697 patent/US10872337B2/en active Active
- 2017-03-06 WO PCT/CN2017/075741 patent/WO2017152818A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100042835A1 (en) * | 2008-08-18 | 2010-02-18 | Keep Security Inc. | System and method for permission confirmation by transmitting a secure request through a central server to a mobile biometric device |
CN102930436A (zh) * | 2012-10-23 | 2013-02-13 | 江苏乐买到网络科技有限公司 | 一种移动支付的方法和装置 |
CN103679453A (zh) * | 2013-12-06 | 2014-03-26 | 金硕澳门离岸商业服务有限公司 | 基于生物认证的支付系统及支付方法 |
CN103731273A (zh) * | 2014-01-13 | 2014-04-16 | 天地融科技股份有限公司 | 一种数据传输方法和系统 |
CN104484804A (zh) * | 2014-12-24 | 2015-04-01 | 福建联迪商用设备有限公司 | 一种安全指纹交易支付的方法及系统 |
CN105989495A (zh) * | 2016-03-07 | 2016-10-05 | 李明 | 一种支付方法及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3428867A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT201800002681A1 (it) * | 2018-02-15 | 2019-08-15 | Archimedetech Srl | Processo/metodo di autentificazione di identita’ con invio e scambio di una password personale temporanea fra almeno quattro dispositivi elettronici per successive attivita’ di ricariche, pagamenti, accessi e/o identificazioni del proprietario di un dispositivo mobile quale uno smartphone |
WO2019159206A1 (en) * | 2018-02-15 | 2019-08-22 | Archimedetech Srl | Identity authentication process/method by sending and exchanging a temporary personal password among at least four electronic devices for recharges, payments, accesses and/or ids of the owner of a mobile device, such as a smartphone |
Also Published As
Publication number | Publication date |
---|---|
EP3428867A1 (en) | 2019-01-16 |
US20190095926A1 (en) | 2019-03-28 |
KR102089201B1 (ko) | 2020-03-16 |
CN105989495A (zh) | 2016-10-05 |
KR20180108758A (ko) | 2018-10-04 |
EP3428867A4 (en) | 2019-11-06 |
US10872337B2 (en) | 2020-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017152818A1 (zh) | 一种支付方法及系统 | |
WO2017152815A1 (zh) | 一种身份认证方法及系统 | |
US11012438B2 (en) | Biometric device pairing | |
CN105956844B (zh) | 一种支付方法及系统 | |
EP3138265B1 (en) | Enhanced security for registration of authentication devices | |
WO2016150154A1 (zh) | 一种用于认证的方法、装置、设备与系统 | |
US20150379255A1 (en) | Systems and methods for granting access to a computing device using a wearable device | |
CN105939336A (zh) | 一种身份认证方法及系统 | |
CN105991652A (zh) | 一种身份认证方法及系统 | |
WO2006049191A1 (ja) | 情報処理システム及び情報処理装置 | |
CN105991654A (zh) | 一种授权认证方法、装置和系统 | |
CN105989488B (zh) | 一种支付方法及系统 | |
WO2017152819A1 (zh) | 一种授权认证方法、装置和系统 | |
CN105989497A (zh) | 一种支付方法及系统 | |
CN105913252A (zh) | 一种指纹加密eid金融卡及实现方法 | |
US20240119455A1 (en) | Piezoelectric biometric card security | |
CN105939195A (zh) | 一种交易方法及系统 | |
EP2908262B1 (en) | Security Token, Transaction Execution Method, and Computer Program Product | |
US11809539B1 (en) | Capacitive through-body communication | |
CN105989498A (zh) | 一种支付方法及系统 | |
WO2017101584A1 (zh) | 实现线上线下交易安全的设备和方法 | |
KR101801851B1 (ko) | 음파 신호를 이용한 2채널 otp 인증 서비스 제공 방법 및 이를 구현하기 위한 인증 시스템 | |
KR101693271B1 (ko) | 생체정보를 이용한 지정 서비스 제공 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 20187024987 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2017762504 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2017762504 Country of ref document: EP Effective date: 20181008 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17762504 Country of ref document: EP Kind code of ref document: A1 |