CN106779717B - Payment authentication method and device - Google Patents

Payment authentication method and device Download PDF

Info

Publication number
CN106779717B
CN106779717B CN201611084507.5A CN201611084507A CN106779717B CN 106779717 B CN106779717 B CN 106779717B CN 201611084507 A CN201611084507 A CN 201611084507A CN 106779717 B CN106779717 B CN 106779717B
Authority
CN
China
Prior art keywords
authentication
detection process
payment
mobile terminal
terminal system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611084507.5A
Other languages
Chinese (zh)
Other versions
CN106779717A (en
Inventor
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201611084507.5A priority Critical patent/CN106779717B/en
Publication of CN106779717A publication Critical patent/CN106779717A/en
Application granted granted Critical
Publication of CN106779717B publication Critical patent/CN106779717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses a payment authentication method, which comprises the steps that when a first detection process is deleted or modified, a second detection process is newly established to replace the first detection process to carry out safety detection on a mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system; when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the second detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode; the embodiment of the invention discloses a payment authentication device, which can continuously carry out payment by a security authentication method when a mobile terminal system has a security problem.

Description

Payment authentication method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a payment authentication method and apparatus.
Background
With the development of electronic technology and internet, the electronic terminal has more and more powerful functions, for example, as long as a user installs various client products on the electronic terminal according to the needs of the user, the user can obtain a lot of consulting information, and even can complete many things without going out of home, and people's life and entertainment are more and more unable to leave the electronic terminal.
At present, fingerprint security authentication is more and more popular, and more people like to carry out security payment through fingerprint authentication at mobile terminals. However, when the mobile terminal system is root or infected with virus, there may be a risk of continuing to use fingerprint payment, and the mobile terminal cannot detect whether the fingerprint device is used for simulation by virus software, so that the security of property cannot be fully guaranteed. How to solve the problem of payment security after a mobile terminal system is root or infected with virus is a problem which is currently focused on by people.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a payment authentication method and device, which solve the payment security problem in the prior art after a mobile terminal system is root or infected with a virus.
In a first aspect, an embodiment of the present invention provides a secure payment authentication method, including:
when the first detection process is deleted or modified, a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system;
when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the second detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode;
with reference to the first aspect, in a first possible implementation manner, before the first detection process is deleted or modified, the method further includes:
detecting whether the first detection process is deleted or modified.
With reference to the first aspect, in a second possible implementation manner, after detecting whether the first detection process is deleted or modified, the method further includes:
and when detecting that the first detection process is not deleted or modified, carrying out security detection on the mobile terminal system through the first detection process.
With reference to the first aspect, in a third possible implementation manner, after the performing security detection on the mobile terminal system through the first detection process, the method further includes:
when the first detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the first detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode;
with reference to the first to third possible implementation manners of the first aspect, in a fourth possible implementation manner, the first authentication manner includes performing authentication on N human body features, and the second authentication manner includes performing authentication on M human body features; wherein N and M are positive integers, and N is less than M.
With reference to the first to third possible implementation manners of the first aspect, in a fourth possible implementation manner, the second authentication manner includes performing authentication on facial features of a human face; the payment authentication through the second authentication mode includes:
acquiring facial features of a user;
judging whether the facial features accord with preset facial features or not;
when the judgment result is yes, acquiring face dynamic information of the user;
matching whether the face dynamic information meets a preset dynamic condition,
and when the matching is yes, passing payment authentication.
In a second aspect, an embodiment of the present invention provides a payment authentication apparatus, including:
the system comprises a daemon module, a first detection process, a second detection process and a first detection process, wherein the daemon module is used for building the second detection process to replace the first detection process to carry out security detection on the mobile terminal system when the first detection process is deleted or modified; the first detection process is used for carrying out security detection on the mobile terminal system;
the first authentication payment module is used for carrying out authentication payment in a first authentication mode when the second detection process detects that the mobile terminal system has no safety problem;
the second authentication payment module is used for carrying out authentication payment in a second authentication mode when the second detection process detects that the mobile terminal system has a safety problem;
with reference to the second aspect, in a first possible implementation manner, the method further includes:
and the deletion modification detection module is used for detecting whether the first detection process is deleted or modified before the first detection process is deleted or modified.
With reference to the second aspect, in a second possible implementation manner, the method further includes:
and the system safety monitoring module is used for detecting whether the first detection process is deleted or modified by the deletion modification detection module, and carrying out safety detection on the mobile terminal system through the first detection process when detecting that the first detection process is not deleted or modified.
With reference to the second aspect, in a third possible implementation manner, when the system security monitoring module detects that the mobile terminal system has no security problem, performing authenticated payment through the first authenticated payment module; when the first detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out through a second authentication payment module;
with reference to the first to third possible implementation manners of the second aspect, in a fourth possible implementation manner, the authenticating the first authentication manner by the first authentication payment module includes authenticating N kinds of human body features;
the second authentication payment module authenticates the second authentication mode including M human body characteristics;
wherein N and M are positive integers, and N is less than M.
With reference to the second aspect, in a fifth possible implementation manner, the second authentication payment module performs authentication of facial features; the second authenticated payment module comprising:
a facial feature acquisition subunit, configured to acquire a user facial feature;
the facial feature comparison subunit is used for judging whether the facial features accord with preset facial features or not;
the dynamic information acquisition subunit is used for acquiring the dynamic information of the face of the user when the facial feature matching module judges that the facial feature matching module is yes;
a dynamic information matching subunit for matching whether the face dynamic information meets a preset dynamic condition,
and the second payment subunit is used for carrying out payment through authentication when the dynamic information matching subunit is matched to be yes.
By implementing the embodiment of the invention, when the first detection process is deleted or modified, a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system; when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the second detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode; the problem of payment safety after a mobile terminal system is root or infected with viruses in the prior art is solved, the mobile terminal can detect the system safety by replacing an original deleted or modified first detection process with a newly-built second detection process, and when the safety problem of the system is detected, the authentication mode is changed through the second authentication mode, so that the payment safety can be further ensured. In addition, the second authentication mode can be a verification mode of human body characteristics, operations such as password input and the like are not required to be performed by a user, the convenience of payment verification is guaranteed, and the risk of stealing passwords is reduced; moreover, the first authentication mode in the embodiment of the present invention may include performing authentication on N human body features, the second authentication mode includes performing authentication on M human body features, and N is smaller than M, which may further improve the payment security after the mobile terminal system is root or infected with a virus.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a payment authentication method provided by the present invention;
FIG. 2 is a schematic flow chart diagram illustrating another embodiment of a payment authentication method provided by the present invention;
FIG. 3 is a flow chart of a second authenticated payment method provided by the present invention;
FIG. 4 is a block diagram of a payment authentication device provided by the present invention;
fig. 5 is a schematic structural diagram of a second payment authentication module of the payment authentication device provided by the invention;
fig. 6 is a schematic structural diagram of a payment authentication apparatus provided in the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It is noted that the terms "comprises" and "comprising," and any variations thereof, as used in the embodiments of the present invention, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to those listed but may alternatively include other steps or elements not listed or inherent to such process, method, product, or apparatus. Furthermore, the terms "first," "second," and "third," etc. are used to distinguish between different objects and are not used to describe a particular order.
Fig. 1 is a schematic flow chart of a payment authentication method provided by the present invention, in which payment is performed on a mobile terminal by a safer payment authentication method, and convenience can be guaranteed while security is guaranteed; the method comprises the following steps:
s101: a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system;
specifically, when a first detection process is deleted or modified, a newly-established second detection process is used for replacing the first detection process to perform security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system.
S102: the second detection process detects whether the mobile terminal system has a safety problem;
specifically, after a second detection process is newly established, system security of the mobile terminal is detected through the second detection process, including detecting whether a system of the mobile terminal is modified, whether a virus invades, and the like. When the detection result is that the system safety is in problem, executing step S104; when the detection result is that there is no problem in the system security, step S103 is executed.
S103: carrying out authentication payment through a first authentication mode;
specifically, when the second detection process detects that the detection process of the mobile terminal has no security problem, authentication payment is performed in a first authentication mode; the first authentication mode can be a first human body characteristic authentication mode and comprises authentication of N human body characteristics; specifically, the authentication of the N human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
S104: carrying out authentication payment through a second authentication mode;
specifically, when the second detection process detects that the detection process of the mobile terminal has a safety problem, authentication payment is performed in a second authentication mode; the second authentication mode may be a second human body feature authentication mode, including performing authentication on M human body features, where N and M are positive integers, and N is smaller than M. Specifically, the authentication of the M human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
Fig. 2 is a schematic flowchart of another embodiment of the payment authentication method provided by the present invention, which includes the following steps:
s201: the first detection process is used for carrying out security detection on the mobile terminal system;
specifically, when the mobile terminal starts to operate or the mobile terminal performs payment, a first detection process is first run to perform security detection on the mobile terminal system, and meanwhile, the mobile terminal needs to detect the security of the first detection process, and whether the first detection process is modified or deleted when the security of the mobile terminal system is detected by the first detection process is checked.
S202: detecting whether the first detection process is deleted or modified;
specifically, when the first detection process detects the security of the mobile terminal system, the mobile terminal also needs to detect the security of the first detection process, and check whether the first detection process is modified or deleted.
S203: continuously using the first detection process for carrying out security detection on the mobile terminal system;
specifically, when the mobile terminal system detects that the first detection process is not deleted or modified, the mobile terminal system continues to perform security detection on the mobile terminal system through the first detection process.
S204: judging whether the first detection process detects that a mobile phone system has a safety problem or not;
specifically, when the mobile terminal system detects that the first detection process is not deleted or modified, the mobile terminal system continues to perform security detection on the mobile terminal system through the first detection process; which comprises the following steps: and judging whether the first detection process detects that a mobile phone system has a security problem, such as whether the system of the mobile terminal is modified or not, whether virus invasion exists or not, and the like.
S205: carrying out authentication payment through a first authentication mode;
specifically, when the first detection process detects that the detection process of the mobile terminal has no security problem, authentication payment is performed in a first authentication mode; the first authentication mode comprises authentication of N human body characteristics; specifically, the authentication of the N human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
S206: carrying out authentication payment through a second authentication mode;
specifically, when the first detection process detects that the detection process of the mobile terminal has a safety problem, authentication payment is performed in a second authentication mode; the second authentication mode comprises authentication of M human body features, wherein N and M are positive integers, and N is smaller than M. Specifically, the authentication of the M human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
S207: a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system;
specifically, when it is detected that the first detection process is deleted or modified, a newly-established second detection process is used for replacing the first detection process to perform security detection on the mobile terminal system.
S208: judging whether the second detection process detects that the mobile phone has a safety problem or not;
specifically, after a second detection process is newly established, system security of the mobile terminal is detected through the second detection process, including detecting whether a system of the mobile terminal is modified, whether a virus invades, and the like.
When the detection result indicates that the system safety is not in a problem, authentication payment is carried out through a first authentication mode; the first authentication mode comprises authentication of N human body characteristics; specifically, the authentication of the N human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
When the second detection process detects that the detection process of the mobile terminal has a safety problem, authentication payment is carried out through a second authentication mode; the second authentication mode comprises authentication of M human body features, wherein N and M are positive integers, and N is smaller than M. Specifically, the authentication of the M human body features includes, but is not limited to, performing authentication in a manner of fingerprint, palm print, pupil identification, and the like.
For example, in practical application, if a user small a purchases in a store, a mobile phone is required to be used for payment, when the mobile phone detects that there is no problem in system security, a first authentication mode is used for payment, the first authentication mode is used for authenticating a fingerprint, and when the fingerprint is verified to be consistent with fingerprint information stored in the mobile phone before the small a, payment is performed; when the mobile phone detects that the system is safe, a second authentication mode is used for payment, the second authentication mode is adopted on the basis of fingerprint authentication, facial actions are matched, for example, after the fingerprint authentication is passed, a camera of the mobile phone is turned on, the iris of the small A is identified, the small A is enabled to make blink action, and when the fingerprint authentication, the iris identification and the blink action are consistent with information prestored in the mobile phone, the payment is carried out through the authentication; otherwise, the payment fails.
Fig. 3 is a schematic flow chart of a second authenticated payment method provided by the present invention, which includes the following steps:
s301: acquiring facial features of a user;
specifically, the first authentication mode includes authentication of N human body features, the second authentication mode includes authentication of M human body features, N and M are positive integers, and N is smaller than M; the method for acquiring the facial features of the user is only a specific method adopted in the current embodiment, and is only for illustration and not limited in practical application.
Specifically, when the mobile terminal acquires that payment needs to be performed through a second authentication mode, that is, when a system of the mobile terminal has a potential safety hazard, first, the facial features of the user are acquired.
S302: judging whether the facial features accord with preset facial features or not;
specifically, after the mobile terminal acquires the facial features of a user, judging whether the facial features accord with preset facial features or not; the preset facial features are preset facial features which are collected and stored in the mobile terminal in advance, and the preset facial features should come from the owner of the mobile terminal or the owner of a payment account.
S303: acquiring dynamic information of a user face;
specifically, when the judgment of judging whether the facial features accord with the preset facial features is yes, further acquiring dynamic information of the user face; the method for acquiring the dynamic information of the face of the user is only a specific method adopted in the current embodiment, and is only an example, and is not limited in practical application.
The face dynamic information in the embodiment of the invention includes but is not limited to: blinking, turning, specific expression, etc.
S304: matching whether the face dynamic information meets a preset dynamic condition or not;
specifically, after the mobile terminal acquires the face dynamic information of the user, whether the face dynamic information meets a preset dynamic condition is judged; the preset dynamic condition is a preset dynamic condition which is collected and stored in the mobile terminal in advance, and the preset dynamic condition is from an owner of the mobile terminal or an owner of a payment account.
It should be noted that the collecting and matching of the dynamic information of the user face is to prevent that it is impossible to detect whether the authentication mode for payment is simulated by virus software after the mobile terminal is infected by virus, and at this time, it is required to verify whether the payer is a preset payer or not, and also to verify the dynamic form of the payer, so that the security of payment can be ensured in multiple ways.
S305: passing the payment authentication;
specifically, when the authentication modes are all passed, payment is carried out.
S306: refusing payment authentication;
specifically, when one of the authentication modes fails, the payment is refused, and the mobile terminal device displays the refusal of the payment and the prompt of potential safety hazard of the system.
FIG. 4 is a block diagram of a payment authentication device provided by the present invention; wherein the payment authentication apparatus 40 includes: a deletion modification module 401, a daemon module 402, a system security detection module 403, a first authenticated payment module 404, and a second authenticated payment module 405, wherein,
the deletion modification detection module 401 is configured to detect whether the first detection process is deleted or modified before the first detection process is deleted or modified;
the daemon module 402 is configured to, when the first detection process is deleted or modified, newly establish a second detection process for performing security detection on the mobile terminal system in place of the first detection process; the first detection process is used for carrying out security detection on the mobile terminal system;
the system security detection module 403 is configured to, after the deletion modification detection module detects whether the first detection process is deleted or modified, perform security detection on the mobile terminal system through the first detection process when it is detected that the first detection process is not deleted or modified.
The first authenticated payment module 404 is configured to perform authenticated payment in a first authentication manner when the second detection process detects that the mobile terminal system has no security problem;
the second authenticated payment module 405 is configured to perform authenticated payment in a second authentication manner when the second detection process detects that the mobile terminal system has a security problem;
fig. 5 is a module schematic diagram of another embodiment of the payment authentication device provided in the present invention, and the second authenticated payment module 405 includes: a facial feature acquisition sub-unit 4051, a facial feature comparison sub-unit 4052, a dynamic information acquisition sub-unit 4053, a dynamic information matching sub-unit 4054, and a second payment sub-unit 4055; wherein:
the facial feature acquisition sub-unit 4051 is configured to acquire a user facial feature;
the facial feature comparison subunit 4052 is configured to determine whether the facial features conform to preset facial features;
the dynamic information obtaining sub-unit 4053 is configured to obtain dynamic information of the face of the user when the facial feature matching module determines yes;
the dynamic information matching sub-unit 4054 is configured to match whether the face dynamic information meets a preset dynamic condition,
the second payment subunit 4055 is configured to perform payment through authentication when the dynamic information matching subunit matches yes.
It should be noted that, in the embodiments of the present invention, the functions of each module or unit in the payment authentication apparatus 40 may refer to the specific implementation manner of any embodiment shown in fig. 1 to fig. 4 in each method embodiment, and are not described herein again.
Fig. 6 is a schematic structural diagram of a payment authentication apparatus provided in the present invention;
the payment authentication apparatus 50 may include: at least one processor 501, such as a CPU, at least one network interface 504, a user interface 503, memory 505, at least one communication bus 502. Wherein a communication bus 502 is used to enable connective communication between these components. The user interface 503 may include a touch screen, a keyboard or a mouse, among others. The network interface 504 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and a communication connection may be established with the server via the network interface 504. The memory 505 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory may optionally be at least one memory system located remotely from the processor 501. As shown in fig. 6, a memory, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a payment authentication program.
The processor 501 may be configured to invoke the payment authentication program stored in the memory 505 and perform the following operations:
when the first detection process is deleted or modified, a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system;
when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; and when the second detection process detects that the mobile terminal system has a safety problem, carrying out authentication payment in a second authentication mode.
Before the first detection process is deleted or modified, the method further comprises the following steps:
detecting whether the first detection process is deleted or modified.
And when detecting that the first detection process is not deleted or modified, carrying out security detection on the mobile terminal system through the first detection process.
After the security detection is performed on the mobile terminal system through the first detection process, the method further includes:
when the first detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the first detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode;
the first authentication mode comprises authentication of N human body features, the second authentication mode comprises authentication of M human body features, N and M are positive integers, and N is smaller than M.
The second authentication mode comprises the authentication of the facial features of the human face; the payment authentication through the second authentication mode includes:
acquiring facial features of a user;
judging whether the facial features accord with preset facial features or not;
when the judgment result is yes, acquiring face dynamic information of the user;
matching whether the face dynamic information meets a preset dynamic condition,
and when the matching is yes, passing payment authentication.
It should be noted that the payment authentication apparatus 50 in the embodiment of the present invention includes, but is not limited to, a Personal computer, a mobile computer, a tablet computer, a mobile phone, a Personal Digital Assistant (PDA), a smart television, a smart watch, smart glasses, a smart bracelet, and other electronic devices having payment and payment authentication functions.
In summary, by implementing the embodiment of the present invention, when the first detection process is deleted or modified, a second detection process is newly created to replace the first detection process to perform security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system; when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the second detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out in a second authentication mode; the problem of payment safety after a mobile terminal system is root or infected with viruses in the prior art is solved, the mobile terminal can detect the system safety by replacing an original deleted or modified first detection process with a newly-built second detection process, and when the safety problem of the system is detected, the authentication mode is changed through the second authentication mode, so that the payment safety can be further ensured. In addition, the second authentication mode can be a verification mode of human body characteristics, operations such as password input and the like are not required to be performed by a user, the convenience of payment verification is guaranteed, and the risk of stealing passwords is reduced; moreover, the first authentication mode in the embodiment of the present invention may include performing authentication on N human body features, the second authentication mode includes performing authentication on M human body features, and N is smaller than M, which may further improve the payment security after the mobile terminal system is root or infected with a virus.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A payment authentication method, comprising:
when the first detection process is deleted or modified, a second detection process is newly established to replace the first detection process to carry out security detection on the mobile terminal system; the first detection process is used for carrying out security detection on the mobile terminal system;
when the second detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; when the second detection process detects that the mobile terminal system has a safety problem, authentication payment is carried out through a second authentication mode, the first authentication mode comprises authentication of N human body characteristics, and the second authentication mode comprises authentication of M human body characteristics; wherein N and M are positive integers, and N is less than M.
2. The method of claim 1, wherein before the first detection process is deleted or modified, further comprising:
detecting whether the first detection process is deleted or modified.
3. The method of claim 2, wherein after detecting whether the first detection process is deleted or modified, further comprising:
and when detecting that the first detection process is not deleted or modified, carrying out security detection on the mobile terminal system through the first detection process.
4. The method according to claim 3, wherein after the security detection of the mobile terminal system by the first detection process, further comprising:
when the first detection process detects that the mobile terminal system has no safety problem, authentication payment is carried out in a first authentication mode; and when the first detection process detects that the mobile terminal system has a safety problem, carrying out authentication payment in a second authentication mode.
5. The method according to any one of claims 1 to 4, wherein the second authentication means includes performing authentication of facial features of a human face; the payment authentication through the second authentication mode includes:
acquiring facial features of a user;
judging whether the facial features accord with preset facial features or not;
when the judgment result is yes, acquiring face dynamic information of the user;
matching whether the face dynamic information meets a preset dynamic condition,
and when the matching is yes, passing payment authentication.
6. A payment authentication apparatus, comprising:
the system comprises a daemon module, a first detection process, a second detection process and a first detection process, wherein the daemon module is used for building the second detection process to replace the first detection process to carry out security detection on the mobile terminal system when the first detection process is deleted or modified; the first detection process is used for carrying out security detection on the mobile terminal system;
the first authentication payment module is used for carrying out authentication payment in a first authentication mode when the second detection process detects that the mobile terminal system has no safety problem;
the second authentication payment module is used for performing authentication payment in a second authentication mode when the second detection process detects that the mobile terminal system has a safety problem, wherein the first authentication mode comprises authentication of N human body characteristics, and the second authentication mode comprises authentication of M human body characteristics; wherein N and M are positive integers, and N is less than M.
7. The apparatus of claim 6, further comprising:
and the deletion modification detection module is used for detecting whether the first detection process is deleted or modified before the first detection process is deleted or modified.
8. The apparatus of claim 7, further comprising:
and the system security detection module is used for detecting whether the first detection process is deleted or modified by the deletion modification detection module, and carrying out security detection on the mobile terminal system through the first detection process when detecting that the first detection process is not deleted or modified.
9. The apparatus of claim 8, wherein when the system security detection module detects that the mobile terminal system has no security problem, authenticated payment is performed through the first authenticated payment module; and when the first detection process detects that the mobile terminal system has a safety problem, carrying out authentication payment through a second authentication payment module.
10. The apparatus of any of claims 6-9, wherein the second authenticated payment module comprises performing authentication of facial features; the second authenticated payment module comprising:
a facial feature acquisition subunit, configured to acquire a user facial feature;
the facial feature comparison subunit is used for judging whether the facial features accord with preset facial features or not;
the dynamic information acquisition subunit is used for acquiring the dynamic information of the face of the user when the facial feature matching module judges that the facial feature matching module is yes;
a dynamic information matching subunit for matching whether the face dynamic information meets a preset dynamic condition,
and the second payment subunit is used for carrying out payment through authentication when the dynamic information matching subunit is matched to be yes.
CN201611084507.5A 2016-11-30 2016-11-30 Payment authentication method and device Active CN106779717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611084507.5A CN106779717B (en) 2016-11-30 2016-11-30 Payment authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611084507.5A CN106779717B (en) 2016-11-30 2016-11-30 Payment authentication method and device

Publications (2)

Publication Number Publication Date
CN106779717A CN106779717A (en) 2017-05-31
CN106779717B true CN106779717B (en) 2021-03-30

Family

ID=58913673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611084507.5A Active CN106779717B (en) 2016-11-30 2016-11-30 Payment authentication method and device

Country Status (1)

Country Link
CN (1) CN106779717B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107491732A (en) * 2017-07-17 2017-12-19 深圳市金立通信设备有限公司 A kind of identity authentication method and terminal
CN108648286B (en) * 2018-04-26 2021-04-20 常州信息职业技术学院 Parking lot charging system and working method thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202345A (en) * 2014-09-28 2014-12-10 北京奇虎科技有限公司 Verification code generating method, device and system
CN105207780A (en) * 2015-08-26 2015-12-30 中国联合网络通信集团有限公司 User authentication method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100478911C (en) * 2006-07-25 2009-04-15 中兴通讯股份有限公司 Protection method in the time of aberrant management thread
CN101980171B (en) * 2010-10-08 2013-05-01 广东威创视讯科技股份有限公司 Failure self-recovery method for software system and software watchdog system used by same
CN103093348A (en) * 2011-10-31 2013-05-08 深圳光启高等理工研究院 Mobile terminal and mobile payment method thereof
CN104301117B (en) * 2014-10-22 2017-11-28 中国联合网络通信集团有限公司 Identity verify method and device
DE102015005071A1 (en) * 2015-04-21 2016-10-27 G Data Software Ag A system and method for monitoring the integrity of a component delivered by a server system to a client system
CN105577662B (en) * 2015-12-22 2019-03-15 深圳前海微众银行股份有限公司 Terminal environments method of controlling security and server
CN105741097A (en) * 2016-02-03 2016-07-06 宁波大学 Mobile near field communication based security payment method
CN105956858B (en) * 2016-05-03 2020-02-21 联想(北京)有限公司 Payment method and electronic equipment
CN106096923A (en) * 2016-06-27 2016-11-09 联想(北京)有限公司 A kind of secure payment means of defence and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202345A (en) * 2014-09-28 2014-12-10 北京奇虎科技有限公司 Verification code generating method, device and system
CN105207780A (en) * 2015-08-26 2015-12-30 中国联合网络通信集团有限公司 User authentication method and device

Also Published As

Publication number Publication date
CN106779717A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN105825382B (en) Mobile payment method and electronic equipment
CN107689936B (en) Security verification system, method and device for login account
CN106453205B (en) identity verification method and device
US9930705B2 (en) Mobile terminal control method, apparatus and system
CN107808127B (en) Face recognition method and related product
CN102930436A (en) Mobile payment method and device
CN107832595B (en) Locking method and related equipment
CN105989485B (en) Service management method and device
CN107766713B (en) Face template data entry control method and related product
CN107437016B (en) Application control method and related product
US20220150243A1 (en) Authentication server, and non-transitory storage medium
CN105389497A (en) Security verification method and system for operation interface of fingerprint recognition
CN110598383A (en) Method and device for removing account permission limitation
CN106779717B (en) Payment authentication method and device
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
TW201544983A (en) Data communication method and system, client terminal and server
CN106921655B (en) Service authorization method and device
CN111327570B (en) Authentication method, apparatus and computer-readable storage medium
WO2013116117A1 (en) Facial recognition streamlined login
KR20140141984A (en) System for paying mobile using finger scan and method therefor
CN107391987B (en) Application protection method and device based on biological feature recognition and electronic equipment
CN104937602B (en) Privacy protection method and electronic equipment
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
KR101272349B1 (en) User authentication method using plural one time password
WO2016180234A1 (en) Method and apparatus for building secure environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant