CN106570697B - Mobile terminal payment verification method and device and security authentication tool - Google Patents

Mobile terminal payment verification method and device and security authentication tool Download PDF

Info

Publication number
CN106570697B
CN106570697B CN201610967385.8A CN201610967385A CN106570697B CN 106570697 B CN106570697 B CN 106570697B CN 201610967385 A CN201610967385 A CN 201610967385A CN 106570697 B CN106570697 B CN 106570697B
Authority
CN
China
Prior art keywords
payment
mobile terminal
security authentication
condition
data information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610967385.8A
Other languages
Chinese (zh)
Other versions
CN106570697A (en
Inventor
王中帅
马宁
杨依珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610967385.8A priority Critical patent/CN106570697B/en
Publication of CN106570697A publication Critical patent/CN106570697A/en
Application granted granted Critical
Publication of CN106570697B publication Critical patent/CN106570697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The disclosure relates to a mobile terminal payment verification method and device and a security authentication tool. The method comprises the following steps: detecting whether a security authentication tool is inserted into an SIM card slot of a mobile terminal under the condition of receiving a payment request aiming at the mobile terminal; under the condition that the safety certification tool is inserted, judging whether the data information of the safety certification tool is consistent with the stored data information of the safety certification tool; and executing the payment operation under the condition that the data information of the safety certification tool is consistent with the data information of the safety certification tool stored in the mobile terminal. The embodiment of the disclosure can detect whether the security authentication tool is inserted into the SIM card slot when the payment request meets the verification payment condition, and execute the payment operation when the inserted security authentication tool is consistent with the stored data information of the security authentication tool, thereby ensuring the payment security of the mobile terminal through hardware verification.

Description

Mobile terminal payment verification method and device and security authentication tool
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for verifying payment of a mobile terminal and a security authentication tool.
Background
As people use mobile terminals to pay more and more (for example, to shop, etc.), the problems that arise are more and more, for example, after a mobile phone is invaded by a trojan horse, funds are diverted away by lawless persons, or after the mobile phone is lost, a bound credit card is stolen, etc. Therefore, the demand of users for security of mobile terminal payment is more and more urgent.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a mobile terminal payment verification method and apparatus, and a security authentication tool.
According to a first aspect of the embodiments of the present disclosure, there is provided a mobile terminal payment verification method, including:
detecting whether a security authentication tool is inserted into an SIM card slot of a mobile terminal under the condition of receiving a payment request aiming at the mobile terminal;
under the condition that the security authentication tool is inserted into an SIM card slot of the mobile terminal, judging whether the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal;
and executing payment operation under the condition that the data information of the safety certification tool is consistent with the data information of the safety certification tool stored in the mobile terminal.
For the above method, in one possible implementation manner, in a case where a payment request for the mobile terminal is received, detecting whether a security authentication tool is inserted into a SIM card slot of the mobile terminal includes:
under the condition that a payment request aiming at a mobile terminal is received, judging whether the payment request meets a verification payment condition;
and under the condition that the payment request meets the payment verification condition, detecting whether a safety certification tool is inserted into an SIM card slot of the mobile terminal.
For the above method, in a possible implementation manner, the determining whether the payment request meets the verification payment condition includes:
judging the payment amount of the payment request;
and determining that the payment request meets the verification payment condition under the condition that the payment amount of the payment request is larger than or equal to a first amount.
For the above method, in one possible implementation, the method further includes:
and executing payment operation under the condition that the payment request does not meet the payment verification condition.
For the above method, in one possible implementation, the method further includes:
under the condition that a security authentication tool is inserted into a SIM card slot of a mobile terminal for the first time, data information of the security authentication tool is obtained and stored.
For the above method, in a possible implementation manner, acquiring and storing data information of the security authentication tool includes:
acquiring data information of the security authentication tool, and displaying a control for confirming and storing the data information of the security authentication tool;
and storing the data information of the safety certification tool under the condition that the control for storing the data information of the safety certification tool is triggered.
According to a second aspect of the embodiments of the present disclosure, there is provided a mobile terminal payment verification apparatus, including:
the mobile terminal comprises an insertion detection module, a verification module and a verification module, wherein the insertion detection module is used for detecting whether a safety certification tool is inserted into an SIM card slot of the mobile terminal or not under the condition of receiving a payment request aiming at the mobile terminal;
the first judgment module is used for judging whether the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal or not under the condition that the security authentication tool is inserted into an SIM card slot of the mobile terminal;
and the first payment module is used for executing payment operation under the condition that the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal.
For the above apparatus, in one possible implementation manner, the insertion detection module includes:
the judging submodule is used for judging whether the payment request meets a verification payment condition under the condition that the payment request aiming at the mobile terminal is received;
and the detection submodule is used for detecting whether the security authentication tool is inserted into the SIM card slot of the mobile terminal or not under the condition that the payment request meets the verification payment condition.
For the apparatus, in a possible implementation manner, the determining sub-module includes:
the line judgment submodule is used for judging the payment line of the payment request;
and the condition determining submodule is used for determining that the payment request meets the verification payment condition under the condition that the payment amount of the payment request is greater than or equal to a first amount.
For the above apparatus, in one possible implementation manner, the apparatus further includes:
and the second payment module is used for executing payment operation under the condition that the payment request does not meet the verification payment condition.
For the above apparatus, in one possible implementation manner, the apparatus further includes:
and the information storage module is used for acquiring and storing the data information of the security authentication tool under the condition that the security authentication tool is inserted into the SIM card slot of the mobile terminal for the first time.
For the above apparatus, in one possible implementation manner, the information storage module includes:
the confirming submodule is used for acquiring the data information of the safety certification tool and displaying a control for confirming and storing the data information of the safety certification tool;
and the storage sub-module is used for storing the data information of the safety certification tool under the condition that the control for storing the data information of the safety certification tool is triggered.
According to a third aspect of the embodiments of the present disclosure, there is provided a mobile terminal payment verification apparatus, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting whether a security authentication tool is inserted into an SIM card slot of a mobile terminal under the condition of receiving a payment request aiming at the mobile terminal;
under the condition that the security authentication tool is inserted into an SIM card slot of the mobile terminal, judging whether the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal;
and executing payment operation under the condition that the data information of the safety certification tool is consistent with the data information of the safety certification tool stored in the mobile terminal.
According to a fourth aspect of the embodiments of the present disclosure, a security authentication tool is provided, which can be inserted into a SIM card slot of a mobile terminal to implement the mobile terminal payment verification method as described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: and when the payment request meets the payment verification condition, detecting whether the security authentication tool is inserted into the SIM card slot, and executing payment operation when the inserted security authentication tool is consistent with the stored data information of the security authentication tool, thereby ensuring the payment security of the mobile terminal through hardware verification.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flow chart illustrating a mobile terminal payment verification method according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating step S11 of a mobile terminal payment verification method according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating a mobile terminal payment verification method according to an example embodiment.
Fig. 4 is a flow chart illustrating a mobile terminal payment verification method according to an example embodiment.
Fig. 5 is a flowchart illustrating step S15 of a mobile terminal payment verification method according to an exemplary embodiment.
Fig. 6 is a block diagram illustrating a mobile terminal payment verification apparatus according to an example embodiment.
Fig. 7 is a block diagram illustrating a mobile terminal payment verification apparatus according to an example embodiment.
FIG. 8 is a block diagram illustrating a security authentication tool in accordance with an exemplary embodiment.
Fig. 9 is a block diagram illustrating a mobile terminal payment verification apparatus according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a mobile terminal payment verification method according to an exemplary embodiment, and the mobile terminal payment verification method according to the exemplary embodiment is used in a terminal device (e.g., a smartphone), as shown in fig. 1, and includes the following steps.
In step S11, in case of receiving a payment request for the mobile terminal, detecting whether a security authentication tool is inserted into a SIM card slot of the mobile terminal;
in step S12, when the security authentication tool is inserted into the SIM card slot of the mobile terminal, determining whether the data information of the security authentication tool matches the data information of the security authentication tool stored in the mobile terminal;
in step S13, in case that the data information of the security authentication tool is consistent with the data information of the security authentication tool already stored in the mobile terminal, a payment operation is performed.
The embodiment of the disclosure can detect whether the security authentication tool is inserted into the SIM card slot when a payment request is received, and execute payment operation when the inserted security authentication tool is consistent with the stored data information of the security authentication tool, thereby ensuring the payment security of the mobile terminal through hardware verification. In addition, the safety certification tool can be inserted into the SIM card slot of the mobile terminal, the mobile terminal does not need to be additionally provided with an interface or use a connecting line, so that the mobile terminal is simple in design and convenient to use for users.
For example, a hardware security authentication tool, such as a security shield, based on the SIM card Pin to Pin may be designed, and the security authentication tool may be consistent with the SIM card structure of the mobile terminal, and can be inserted into the SIM card slot of the mobile terminal to directly replace the SIM card. The security authentication tool may have stored therein data information, which may include, for example, a security key corresponding to a payment account of the user, etc., for verification when the mobile terminal makes a payment. The security authentication tool is small and compact and can be designed into a key ring or the like for the convenience of carrying by a user. When the mobile terminal carries out payment, the user can pull out the SIM card of the mobile terminal and insert the security authentication tool. For a mobile terminal with a single SIM card slot, after the SIM card is pulled out and a security authentication tool is inserted, payment operation can be carried out under a WIFI network; for a mobile terminal with a plurality of SIM card slots, the SIM card which is not connected with a mobile network can be pulled out, a security authentication tool is inserted, and payment operation is carried out under the mobile network.
In a possible implementation manner, when a payment request for the mobile terminal is received, whether the security authentication tool is inserted into the SIM card slot of the mobile terminal can be directly detected, and then data information in the security authentication tool is read. If the security authentication tool is inserted and the data information in the security authentication tool is consistent with the stored data information of the security authentication tool, the payment operation can be executed until the payment is successful. If the insertion of the safety certification tool is not detected, or the data information in the safety certification tool is inconsistent with the stored data information of the safety certification tool, the payment can not be carried out.
In another possible implementation manner, when a payment request for a mobile terminal is received, it may be determined whether the payment request meets a verification payment condition. Fig. 2 is a flowchart illustrating an example of step S11 according to an exemplary embodiment, and as shown in fig. 2, step S11 may include:
in step S111, in a case where a payment request for a mobile terminal is received, determining whether the payment request satisfies a verification payment condition;
in step S112, in case that the payment request satisfies the verified payment condition, it is detected whether the security authentication tool is inserted into the SIM card slot of the mobile terminal.
The payment condition may be, for example, whether the payment amount reaches a predetermined amount, or the like, which may be set by default by the system, or may be set by the user according to the needs of the user. For example, determining whether the payment request satisfies a verified payment condition may include: judging the payment amount of the payment request; and determining that the payment request meets the verification payment condition under the condition that the payment amount of the payment request is larger than or equal to a first amount. Those skilled in the art should understand that the payment condition is not limited to whether the payment amount reaches the predetermined amount, but may be any other condition, such as whether the total number of payments in the day reaches the threshold, whether the total amount of payments in the day reaches the threshold, and the like, and the present invention is not limited thereto.
If the payment verification condition is met, whether the security authentication tool is inserted into the SIM card slot of the mobile terminal or not can be detected, and then data information in the security authentication tool is read. If the security authentication tool is inserted and the data information in the security authentication tool is consistent with the stored data information of the security authentication tool, the payment operation can be executed until the payment is successful. If the insertion of the safety certification tool is not detected, or the data information in the safety certification tool is inconsistent with the stored data information of the safety certification tool, the payment can not be carried out.
Fig. 3 is a flow chart illustrating a mobile terminal payment verification method according to an example embodiment. As shown in fig. 3, in a possible implementation manner, on the basis of fig. 2, the method may further include:
in step S14, in the case where the payment request does not satisfy the verified payment condition, a payment operation is performed.
For example, the payment verification condition for the payment request of the mobile terminal may include a determination of a payment amount, and if the payment amount of the payment request is greater than or equal to the first amount, it is determined that the payment verification condition is satisfied, and a subsequent verification operation of detecting whether the security authentication tool is inserted may be performed. And if the payment amount of the payment request is smaller than the first amount, the payment operation is directly executed without the verification of a safety certification tool. The first quota can be set by default by the system or can be set by the user according to the requirement of the user.
By the mode, the safety authentication tool is verified only when the payment is large (exceeding the first amount) or other verification payment conditions are met, and the safety authentication tool is not verified when the payment is small (smaller than the first amount) or other verification payment conditions are not met, so that the normal use of the mobile terminal is not influenced, and the use convenience of a user is improved.
Fig. 4 is a flow chart illustrating a mobile terminal payment verification method according to an example embodiment. As shown in fig. 4, in one possible implementation, the method further includes:
in step S15, in the case where the security authentication tool is first inserted into the SIM card slot of the mobile terminal, data information of the security authentication tool is acquired and stored.
For example, when the user uses the security authentication tool for the first time (the security authentication tool is inserted into the SIM card slot for the first time), the data information of the security authentication tool may be read and stored, and the data information of the security authentication tool may be bound as the stored data information of the security authentication tool. For example, if the data information of the security authentication tool includes a security key corresponding to the payment account of the user, the information of the security key is read and stored in the memory of the mobile phone. In this way, when the mobile terminal payment verification is carried out, the data information of the inserted safety authentication tool can be compared with the stored data information of the safety authentication tool. If the data information of the inserted safety certification tool is consistent with the stored data information of the safety certification tool, the next payment operation can be carried out.
By the method, the stored data information of the security authentication tool can be acquired so as to be compared with the data information of the inserted security authentication tool, and the payment security of the mobile terminal is improved.
Fig. 5 is a flowchart illustrating step S15 of a mobile terminal payment verification method according to an exemplary embodiment. As shown in fig. 5, in one possible implementation, step S15 may include:
in step S151, acquiring data information of the security authentication tool, and displaying a control for confirming that the data information of the security authentication tool is stored;
in step S152, if it is confirmed that the control storing the data information of the security authentication tool is triggered, the data information of the security authentication tool is stored.
For example, the same user may have multiple security authentication tools, each corresponding to one payment account of the user, such as a security authentication tool corresponding to a payment account of a tenderer bank, a security authentication tool corresponding to a payment account of a payment instrument, and so on. When the security authentication tool is inserted into the SIM card slot and data information of the security authentication tool is acquired, the user may be prompted whether to confirm that the data information of the security authentication tool is stored, for example, a control for confirming that the data information of the security authentication tool is stored is displayed. And storing the data information of the safety certification tool (binding the data information of the safety certification tool) when the user confirmation is obtained (confirming that the control storing the data information of the safety certification tool is triggered).
By the method, the data information of the safety certification tool can be stored when the user confirms, misoperation of the user is avoided, and use convenience of the user is improved.
Fig. 6 is a block diagram illustrating a mobile terminal payment verification apparatus according to an example embodiment. Referring to fig. 6, the apparatus includes an insertion detection module 61, a first judgment module 62, and a first payment module 63.
The insertion detection module 61 is configured to detect whether the security authentication tool is inserted into a SIM card slot of the mobile terminal in case of receiving a payment request for the mobile terminal;
the first judging module 62 is configured to judge whether the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal when the security authentication tool is inserted into a SIM card slot of the mobile terminal;
the first payment module 63 is configured to perform a payment operation if the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal.
Fig. 7 is a block diagram illustrating a mobile terminal payment verification apparatus according to an example embodiment. Referring to fig. 7, in one possible implementation, the insertion detection module 61 includes:
the determining sub-module 611 is configured to determine, when a payment request for the mobile terminal is received, whether the payment request meets a verification payment condition;
the detection submodule 612 is configured to detect whether the security authentication tool is inserted into the SIM card slot of the mobile terminal when the payment request meets the verified payment condition.
Referring to fig. 7, in a possible implementation manner, the determining sub-module 611 further includes:
the amount judgment sub-module 6111 is configured to judge the payment amount of the payment request;
the condition determining submodule 6112 is configured to determine that the payment request meets the verification payment condition when the payment amount of the payment request is greater than or equal to the first amount.
Referring to fig. 7, in one possible implementation, the apparatus further includes:
a second payment module 64, configured to perform a payment operation if the payment request does not satisfy the verified payment condition.
Referring to fig. 7, in one possible implementation, the apparatus further includes:
and the information storage module 65 is used for acquiring and storing the data information of the security authentication tool when the security authentication tool is inserted into the SIM card slot of the mobile terminal for the first time.
Referring to fig. 7, in one possible implementation, the information storage module 65 includes:
the confirmation submodule 651 is used for acquiring the data information of the security authentication tool and displaying a control for confirming and storing the data information of the security authentication tool;
the storage sub-module 652 is configured to store the data information of the security authentication tool when it is determined that the control for storing the data information of the security authentication tool is triggered.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The embodiment of the disclosure can detect whether the security authentication tool is inserted into the SIM card slot when the payment request meets the verification payment condition, and execute the payment operation when the inserted security authentication tool is consistent with the stored data information of the security authentication tool, thereby ensuring the payment security of the mobile terminal through hardware verification.
Fig. 8 is a block diagram illustrating a security authentication tool according to an exemplary embodiment, which may be composed of a base 1 and a circuit part 2 disposed on the base, and may have a shape corresponding to a SIM card of a mobile terminal, and may be inserted into a SIM card slot of the mobile terminal to implement the above-described method.
The safety certification tool can be inserted into the SIM card slot of the mobile terminal, the mobile terminal does not need to be additionally provided with an additional interface or use a connecting wire, so that the mobile terminal is concise in design and convenient to use for users.
Fig. 9 is a block diagram illustrating a mobile terminal payment verification apparatus 800 according to an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 9, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A payment verification method for a mobile terminal is characterized by comprising the following steps:
detecting whether a security authentication tool is inserted into an SIM card slot of a mobile terminal under the condition of receiving a payment request aiming at the mobile terminal;
under the condition that the security authentication tool is inserted into an SIM card slot of a mobile terminal, judging whether data information of the security authentication tool is consistent with data information of a security authentication tool stored in the mobile terminal, wherein under the condition that the security authentication tool is inserted into the SIM card slot of the mobile terminal for the first time, the data information of the security authentication tool is acquired, a control for confirming to store the data information of the security authentication tool is displayed, and under the condition that the control for confirming to store the data information of the security authentication tool is triggered, the data information of the security authentication tool is stored;
and executing payment operation under the condition that the data information of the safety certification tool is consistent with the data information of the safety certification tool stored in the mobile terminal.
2. The method of claim 1, wherein detecting whether the security authentication tool is inserted into a SIM card slot of the mobile terminal upon receiving a payment request for the mobile terminal comprises:
under the condition that a payment request aiming at a mobile terminal is received, judging whether the payment request meets a verification payment condition;
and under the condition that the payment request meets the payment verification condition, detecting whether a safety certification tool is inserted into an SIM card slot of the mobile terminal.
3. The method of claim 2, wherein determining whether the payment request satisfies a verified payment condition comprises:
judging the payment amount of the payment request;
and determining that the payment request meets the verification payment condition under the condition that the payment amount of the payment request is larger than or equal to a first amount.
4. The method of claim 2, further comprising:
and executing payment operation under the condition that the payment request does not meet the payment verification condition.
5. A mobile terminal payment verification apparatus, comprising:
the mobile terminal comprises an insertion detection module, a verification module and a verification module, wherein the insertion detection module is used for detecting whether a safety certification tool is inserted into an SIM card slot of the mobile terminal or not under the condition of receiving a payment request aiming at the mobile terminal;
the first judging module is used for judging whether the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal or not when the security authentication tool is inserted into an SIM card slot of the mobile terminal, wherein the data information of the security authentication tool is acquired and a control for confirming to store the data information of the security authentication tool is displayed when the security authentication tool is inserted into the SIM card slot of the mobile terminal for the first time, and the data information of the security authentication tool is stored when the control for storing the data information of the security authentication tool is triggered;
and the first payment module is used for executing payment operation under the condition that the data information of the security authentication tool is consistent with the data information of the security authentication tool stored in the mobile terminal.
6. The apparatus of claim 5, wherein the insertion detection module comprises:
the judging submodule is used for judging whether the payment request meets a verification payment condition under the condition that the payment request aiming at the mobile terminal is received;
and the detection submodule is used for detecting whether the security authentication tool is inserted into the SIM card slot of the mobile terminal or not under the condition that the payment request meets the verification payment condition.
7. The apparatus of claim 6, wherein the determining sub-module comprises:
the line judgment submodule is used for judging the payment line of the payment request;
and the condition determining submodule is used for determining that the payment request meets the verification payment condition under the condition that the payment amount of the payment request is greater than or equal to a first amount.
8. The apparatus of claim 7, further comprising:
and the second payment module is used for executing payment operation under the condition that the payment request does not meet the verification payment condition.
9. A mobile terminal payment verification apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
detecting whether a security authentication tool is inserted into an SIM card slot of a mobile terminal under the condition of receiving a payment request aiming at the mobile terminal;
under the condition that the security authentication tool is inserted into an SIM card slot of a mobile terminal, judging whether data information of the security authentication tool is consistent with data information of a security authentication tool stored in the mobile terminal, wherein under the condition that the security authentication tool is inserted into the SIM card slot of the mobile terminal for the first time, the data information of the security authentication tool is acquired, a control for confirming to store the data information of the security authentication tool is displayed, and under the condition that the control for confirming to store the data information of the security authentication tool is triggered, the data information of the security authentication tool is stored;
and executing payment operation under the condition that the data information of the safety certification tool is consistent with the data information of the safety certification tool stored in the mobile terminal.
10. A security authentication tool insertable into a SIM card slot of a mobile terminal to implement the method according to any one of claims 1 to 4.
CN201610967385.8A 2016-10-31 2016-10-31 Mobile terminal payment verification method and device and security authentication tool Active CN106570697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610967385.8A CN106570697B (en) 2016-10-31 2016-10-31 Mobile terminal payment verification method and device and security authentication tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610967385.8A CN106570697B (en) 2016-10-31 2016-10-31 Mobile terminal payment verification method and device and security authentication tool

Publications (2)

Publication Number Publication Date
CN106570697A CN106570697A (en) 2017-04-19
CN106570697B true CN106570697B (en) 2020-01-10

Family

ID=58539765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610967385.8A Active CN106570697B (en) 2016-10-31 2016-10-31 Mobile terminal payment verification method and device and security authentication tool

Country Status (1)

Country Link
CN (1) CN106570697B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394615A (en) * 2007-09-20 2009-03-25 ***股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN102567770A (en) * 2010-12-31 2012-07-11 国民技术股份有限公司 Smart card and POS (Point-Of-Sale) terminal
CN102955956A (en) * 2011-08-25 2013-03-06 深圳光启高等理工研究院 Mobile communication system, mobile communication method and mobile terminal device based on RFID-SIM card (radio frequency identification device-subscriber identity module card)
CN203708493U (en) * 2012-04-06 2014-07-09 中国工商银行股份有限公司 Mobile terminal and terminal bank-business security certification system
CN103971456A (en) * 2013-02-05 2014-08-06 ***股份有限公司 Intelligent terminal wherein financial IC card can be embedded
CN104240080A (en) * 2013-06-07 2014-12-24 中兴通讯股份有限公司 Realization method for mobile payment and device thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11306143A (en) * 1998-04-21 1999-11-05 Oki Electric Ind Co Ltd Computer terminal
TWI421777B (en) * 2010-06-30 2014-01-01 Mstar Semiconductor Inc Identification processing apparatus and mobile apparatus thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394615A (en) * 2007-09-20 2009-03-25 ***股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN102567770A (en) * 2010-12-31 2012-07-11 国民技术股份有限公司 Smart card and POS (Point-Of-Sale) terminal
CN102955956A (en) * 2011-08-25 2013-03-06 深圳光启高等理工研究院 Mobile communication system, mobile communication method and mobile terminal device based on RFID-SIM card (radio frequency identification device-subscriber identity module card)
CN203708493U (en) * 2012-04-06 2014-07-09 中国工商银行股份有限公司 Mobile terminal and terminal bank-business security certification system
CN103971456A (en) * 2013-02-05 2014-08-06 ***股份有限公司 Intelligent terminal wherein financial IC card can be embedded
CN104240080A (en) * 2013-06-07 2014-12-24 中兴通讯股份有限公司 Realization method for mobile payment and device thereof

Also Published As

Publication number Publication date
CN106570697A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
CN106709399B (en) Fingerprint identification method and device
US20170372298A1 (en) Method and apparatus for activating virtual card
CN107025419B (en) Fingerprint template inputting method and device
CN105654302B (en) Payment method and device
EP3200116B1 (en) Method and apparatus for acquiring information via a virtual identity module from lost or stolen terminal
EP3057048A1 (en) Transfer method and apparatus
CN106453052B (en) Message interaction method and device
US20180053177A1 (en) Resource transfer method, apparatus and storage medium
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
EP2940977B1 (en) Method and device for sending information in voice service
CN107491681B (en) Fingerprint information processing method and device
CN107230060B (en) Account loss reporting method and device
CN106920170B (en) Transaction reminding method and device
CN106204046A (en) The method and device that order pays
CN107145771B (en) Application program unlocking method and device and terminal
US9667784B2 (en) Methods and devices for providing information in voice service
CN107656616B (en) Input interface display method and device and electronic equipment
CN107463809B (en) Application icon display method and device
US10671827B2 (en) Method and device for fingerprint verification
CN105760796B (en) Application security processing method and device
CN106712960B (en) Processing method and device of verification code information
CN106408304B (en) Account security management method and device
CN112351131B (en) Control method and device of electronic equipment, electronic equipment and storage medium
CN106446827B (en) Iris recognition function detection method and device
CN106570697B (en) Mobile terminal payment verification method and device and security authentication tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant