KR20170001457A - An authentication method for cyber money settlement using smartphone - Google Patents

An authentication method for cyber money settlement using smartphone Download PDF

Info

Publication number
KR20170001457A
KR20170001457A KR1020150091454A KR20150091454A KR20170001457A KR 20170001457 A KR20170001457 A KR 20170001457A KR 1020150091454 A KR1020150091454 A KR 1020150091454A KR 20150091454 A KR20150091454 A KR 20150091454A KR 20170001457 A KR20170001457 A KR 20170001457A
Authority
KR
South Korea
Prior art keywords
user authentication
user
information
smartphone
cyber money
Prior art date
Application number
KR1020150091454A
Other languages
Korean (ko)
Inventor
장완수
Original Assignee
장완수
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 장완수 filed Critical 장완수
Priority to KR1020150091454A priority Critical patent/KR20170001457A/en
Publication of KR20170001457A publication Critical patent/KR20170001457A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • H04W4/003

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

According to an embodiment of the present invention, there is provided a cyber money payment authentication method using a smart phone, including: receiving a payment means and a payment request of a cyber money in a smartphone; Transmitting a user authentication job request from the smartphone to a management server; Transmitting a user authentication information request from the management server to the smartphone; Generating user authentication information in the smartphone; Transmitting the user authentication information to the management server; Performing a user authentication operation on the management server based on the user authentication information to generate user authentication result information; Transmitting the user authentication result information to the smartphone; And proceeding with settlement according to the settlement means of the cyber money based on the user authentication result information.
The cyber money payment authentication method using a smart phone according to the present invention further enhances the settlement security by using the face authentication using the camera of the smart phone in the settlement of the cyber money, And the user authentication result is transmitted to the smartphone and the settlement is carried out accordingly. Thus, in the settlement of the cyber money, the payment of the means of fraud, forgery, There is an effect that use can be prevented.

Description

AN AUTHENTICATION METHOD FOR CYBER MONEY SETTLEMENT USING SMARTPHONE}

The present invention relates to a cyber money payment authentication method using a smart phone, and more particularly, to a cyber money payment authentication method using a smart phone, and more particularly, to a cyber money payment authentication method using a smart phone, The present invention relates to a cyber money settlement authentication method which can be further strengthened.

It is very common nowadays to acquire items via cyber money or to use specific services in games, online communities, or file sharing sites. Such cyber money usually comes from the fact that the payment is made by paying the corresponding amount, and the payment method is very diverse such as mobile phone settlement, credit card, and account transfer.

However, these payment methods are very likely to be fraudulently used, forged, tampered, etc., and can be relieved afterwards, but the procedure is very complicated and they are unaware of the fact that they are fraudulent, The problem may be that it becomes difficult to get relief over time.

Accordingly, in order to prevent fraudulent use of such cyber money, a more secure payment authentication method is required. Accordingly, a variety of security programs have been developed to protect against fraud, forgery, and tampering .

However, all of these various security programs can be hacked and thus can not effectively prevent fraudulent use. Accordingly, there is a growing demand for a more stable security method.

According to an aspect of the present invention, there is provided a method for authenticating a face of a user by using a camera of a smartphone in payment of cyber money, And performs the authentication operation on the management server to transmit the user authentication result to the smart phone and to proceed with the settlement so that the fraudulent use such as the use of the payment means, forgery, alteration, etc. in the settlement of the cyber money can be prevented And to provide a cyber money payment authentication method using a smart phone.

According to another aspect of the present invention, there is provided a method of authenticating a cyber money using a smart phone, the method comprising: receiving a payment means and a payment request of a cyber money in a smartphone; Transmitting a user authentication job request from the smartphone to a management server; Transmitting a user authentication information request from the management server to the smartphone; Generating user authentication information in the smartphone; Transmitting the user authentication information to the management server; Performing a user authentication operation on the management server based on the user authentication information to generate user authentication result information; Transmitting the user authentication result information to the smartphone; And proceeding with settlement according to the settlement means of the cyber money based on the user authentication result information.

The step of generating user authentication information in the smartphone may include: receiving the user authentication information request from the smartphone; Executing a user authentication application automatically in the smartphone; And generating the user's facial authentication information in the user authentication application.

The step of generating the user's face authentication information in the user authentication application may include: guiding the user to a method of photographing a face image; Executing a camera application of the smartphone; Determining whether the face photograph of the user is normally photographed when the face photograph of the user is photographed by the camera of the smart phone; And instructing re-photographing when the normal photographing is not performed, and generating facial authentication information of the user including a face photograph of the user in the case of normal photographing, according to the determination result of the normal photographing.

The step of generating a user authentication result information by performing a user authentication operation based on the user authentication information may include: performing a face authentication operation; And generating the user authentication result information based on the face authentication operation result.

The step of performing the facial authentication includes: extracting facial feature information from a face image of a user included in the facial authentication information; And generating facial authentication result information by comparing the extracted facial feature information with facial feature information of a previously registered user.

The step of performing payment according to the payment means of the cyber money may include transmitting the user authentication result information to the payment server for processing payment by the payment means of the cyber money.

The technique disclosed in the present invention can have the following effects. It is to be understood, however, that the scope of the disclosed technology is not to be construed as limited thereby, as it is not meant to imply that a particular embodiment should include all of the following effects or only the following effects.

The cyber money payment authentication method using a smart phone according to the present invention further enhances the settlement security by using the face authentication using the camera of the smart phone in the settlement of the cyber money, And the user authentication result is transmitted to the smartphone and the settlement is carried out accordingly. Thus, in the settlement of the cyber money, the payment of the means of fraud, forgery, There is an effect that use can be prevented.

1 is a flowchart of a cyber money settlement authentication method using a smart phone according to an embodiment of the present invention.
2 is a flow chart of a method for generating user authentication information in a smartphone.
3 is a flow diagram of a method for generating face authentication information for a user in a user authentication application.
4 illustrates a scenario in which a cyber money payment authentication method using a smart phone is performed according to an embodiment of the present invention.

For the embodiments of the invention disclosed herein, specific structural and functional descriptions are set forth for the purpose of describing an embodiment of the invention only, and it is to be understood that the embodiments of the invention may be practiced in various forms, The present invention should not be construed as limited to the embodiments described in Figs.

The present invention is capable of various modifications and various forms, and specific embodiments are illustrated in the drawings and described in detail in the text. It is to be understood, however, that the invention is not intended to be limited to the particular forms disclosed, but on the contrary, is intended to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

The terms first, second, etc. may be used to describe various components, but the components should not be limited by the terms. The terms may be used for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.

It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between. Other expressions that describe the relationship between components, such as "between" and "between" or "neighboring to" and "directly adjacent to" should be interpreted as well.

The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In the present application, the terms "comprise", "having", and the like are intended to specify the presence of stated features, integers, steps, operations, elements, components, or combinations thereof, , Steps, operations, components, parts, or combinations thereof, as a matter of principle.

Unless otherwise defined, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries should be construed as meaning consistent with meaning in the context of the relevant art and are not to be construed as ideal or overly formal in meaning unless expressly defined in the present application .

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. The same reference numerals are used for the same constituent elements in the drawings and redundant explanations for the same constituent elements are omitted.

1 is a flowchart of a cyber money settlement authentication method using a smart phone according to an embodiment of the present invention. Referring to FIG. 1, a cyber money payment authentication method using a smartphone according to an embodiment of the present invention includes: inputting a payment means and a payment request of cyber money in a smart phone (S100) A step of transmitting a request for a user authentication information from the management server to the smartphone in operation S300, a step of generating user authentication information in the smartphone in operation S400, A step S600 of performing a user authentication operation based on the user authentication information in the management server to generate user authentication result information, a step S700 of transmitting the user authentication result information to the smart phone, And a step (S800) of making a settlement according to the settlement means of the cyber money based on the user authentication result information.

In a cyber money payment authentication method using a smart phone according to an embodiment of the present invention, a smart phone accepts payment means and payment request of cyber money (S100).

A user may want to charge cyber money to purchase an item as cyber money in a game or an online community. At this time, it is usual to pay a certain amount to charge the cyber money. A credit card, a mobile phone, or the like is often used as the payment means, and the user selects a desired payment means. After you select a payment method, you will be prompted to enter your payment request by pressing the payment button on your app.

Next, the smartphone to which the payment request is input transmits a user authentication operation request to the management server (S200). When the management server receives a user authentication job request from the smart phone, the management server requests the user authentication information required for authentication to the smart phone. Therefore, the management server transmits a user authentication information request to the smartphone (S300). When the smart phone receives the user authentication information request from the management server, the smart phone generates the user authentication information (S400). This will be described later with reference to FIG. 2 and FIG. Next, the user authentication information generated by the smartphone is transmitted to the management server (S500). Upon receiving the user authentication information generated by the smart phone, the management server performs a user authentication operation based on the user authentication information, generates user authentication result information (S600), and transmits the user authentication result information to the smart phone (S700) . Then, the smart phone proceeds with settlement of the cyber money based on the user authentication result information (S800). Since the user authentication result information includes information on whether or not the user authentication succeeded, the settlement of cyber money It is possible to securely make settlement.

2 is a flow chart of a method for generating user authentication information in a smartphone. Referring to FIG. 2, a user authentication information request is received from a smart phone in step S410, a user authentication application is automatically executed in a smart phone in step S420, and a face authentication information of a user is generated in a user authentication application in step S430. , And generates the user authentication information in the smartphone.

When the user authentication information request transmitted from the management server is received by the smartphone, the smartphone automatically executes the user authentication application. And generates face authentication information of the user through the user authentication application to generate user authentication information. A method for generating such facial authentication information is shown in Fig.

Referring to FIG. 3, the user is guided through a face photographing method (S431), and a camera application of the smart phone is executed (S432). Next, the face image of the user is photographed by the camera of the smart phone (S433). (S434). If it is determined that the face image of the user has not been photographed properly (S434) and the photographed image does not correspond to the normal photographed image, The face authentication information of the user including the face image of the user is generated (S435). Through this process, the face authentication information of the user is generated in the user authentication application.

After the facial authentication information of the user is generated in the smartphone (S400), it is transmitted to the management server (S500), and the management server performs user authentication operation based on the facial authentication information of the user to generate user authentication result information (S600). Generating the user authentication result information is performed through the process of performing the face authentication operation and generating the user authentication result information based on the result of the face authentication operation.

The face authentication process is performed by extracting facial feature information from a face image of the user included in the facial authentication information and comparing the extracted facial feature information with facial feature information of the previously registered user to generate facial authentication result information.

At this time, the facial feature information is determined by determining the characteristic points of the facial features and the relation of these feature points is specified information. In this case, when the payment authentication information of the user is registered in the management server, the facial image information of the user is also registered Facial feature information may be extracted and stored in advance in the management server, and the facial feature authentication operation may be performed by comparing the facial feature information extracted from the captured facial image with the facial feature information extracted from the captured facial image.

Through the facial authentication operation, facial authentication result information including the information on whether the user is authentic or not is generated and the user authentication result information is generated accordingly. When the user authentication result information is transmitted to the smart phone, the smart phone proceeds with settlement according to the payment means of the cyber money when the user authentication is successful.

The step of performing the payment according to the payment means of the cyber money may transmit the user authentication result information to the payment server for processing the payment by the payment means of the cyber money. As a result, the payment server can store the authentication result information together with the settlement processing and use it as information for later proof.

Meanwhile, FIG. 4 illustrates a scenario in which a cyber money settlement authentication method using a smartphone according to an embodiment of the present invention is performed. Referring to FIG. 4, when a payment request is input to a smartphone, a user authentication job request is transmitted to a management server to start an authentication job. When a management server transmits a user authentication information request for a user authentication job to a smartphone , The smart phone generates user authentication information and transmits it to the management server. The management server performs the user authentication operation using the user authentication information received from the smart phone, generates the user authentication result information, and transmits the information to the smart phone. The smart phone proceeds with the cyber money settlement by the settlement means according to the received user authentication result information.

As described above, the cyber money payment authentication method using the smart phone according to the present invention further enhances the settlement security by using the face authentication using the camera of the smart phone in the settlement of the cyber money, The facsimile authentication information of the user is generated using the phone, and the authentication server performs the authentication operation on the management server to transmit the user authentication result to the smart phone and proceed with the settlement so that the payment of the payment means, counterfeiting , It is possible to prevent illegal use such as modulation.

As described above, the cyber money payment authentication method using a smart phone according to an embodiment of the present invention can be implemented as a program command for implementing the method. The computer readable recording medium on which the program command is recorded is, for example, , ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical media storage, and the like.

The computer-readable recording medium on which the above-described program is recorded may be distributed to a computer apparatus connected via a network so that computer-readable codes can be stored and executed in a distributed manner. In this case, one or more of the plurality of distributed computers may execute some of the functions presented above and send the results of the execution to one or more of the other distributed computers, The computer may also perform some of the functions described above and provide the results to other distributed computers as well.

A computer capable of reading a recording medium on which an application as a program for driving the apparatus and method according to each embodiment of the present invention is read can be used not only in a general PC such as a general desktop or a notebook computer but also in a smart phone, Personal digital assistants (PDAs), mobile communication terminals, and the like, and it should be interpreted as all devices capable of computing.

While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. That is, within the scope of the present invention, all of the components may be selectively coupled to one or more of them. In addition, although all of the components may be implemented as one independent hardware, some or all of the components may be selectively combined to perform a part or all of the functions in one or a plurality of hardware. As shown in FIG. The codes and code segments constituting the computer program may be easily deduced by those skilled in the art. Such a computer program is stored in a computer readable storage medium, readable and executed by a computer, thereby realizing an embodiment of the present invention. As a storage medium of the computer program, a magnetic recording medium, an optical recording medium, or the like can be included.

The foregoing description is merely illustrative of the technical idea of the present invention, and various changes and modifications may be made by those skilled in the art without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are intended to illustrate rather than limit the scope of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments. The scope of protection of the present invention should be construed according to the following claims, and all technical ideas within the scope of equivalents should be construed as falling within the scope of the present invention.

Claims (7)

Receiving payment means and payment request of the cyber money from the smartphone;
Transmitting a user authentication job request from the smartphone to a management server;
Transmitting a user authentication information request from the management server to the smartphone;
Generating user authentication information in the smartphone;
Transmitting the user authentication information to the management server;
Performing a user authentication operation on the management server based on the user authentication information to generate user authentication result information;
Transmitting the user authentication result information to the smartphone; And
And proceeding with settlement according to the settlement means of the cyber money based on the user authentication result information.
The method according to claim 1,
The step of generating the user authentication information in the smartphone includes:
Receiving the user authentication information request from the smartphone;
Executing a user authentication application automatically in the smartphone; And
And generating the user's facial authentication information in the user authentication application.
3. The method of claim 2,
Wherein the generating the face authentication information of the user in the user authentication application comprises:
Guiding a user to a face photographing method;
Executing a camera application of the smartphone;
Determining whether the face photograph of the user is normally photographed when the face photograph of the user is photographed by the camera of the smart phone; And
Instructing re-photographing when the normal photographing is not performed, and generating face authentication information of the user including a face photograph of the user in the case of normal photographing, in accordance with the result of the normal photographing determination, Cyber money payment authentication method.
The method according to claim 1,
Wherein the generating the user authentication result information by performing the user authentication operation based on the user authentication information comprises:
Performing a face authentication operation; And
And generating the user authentication result information based on a result of the face authentication operation.
5. The method of claim 4,
The step of performing the facial authentication operation includes:
Extracting facial feature information from a face image of the user included in the facial authentication information;
And generating facial authentication result information by comparing the extracted facial feature information with facial feature information of a previously registered user.
The method according to claim 1,
Wherein the step of performing settlement according to the settlement means of the cyber money includes:
And transmitting the user authentication result information to a payment server for processing payment by the payment means of the cyber money.
A computer-readable recording medium on which program instructions for implementing a cyber money payment authentication method using a smartphone according to any one of claims 1 to 6 are recorded.
KR1020150091454A 2015-06-26 2015-06-26 An authentication method for cyber money settlement using smartphone KR20170001457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150091454A KR20170001457A (en) 2015-06-26 2015-06-26 An authentication method for cyber money settlement using smartphone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150091454A KR20170001457A (en) 2015-06-26 2015-06-26 An authentication method for cyber money settlement using smartphone

Publications (1)

Publication Number Publication Date
KR20170001457A true KR20170001457A (en) 2017-01-04

Family

ID=57832110

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150091454A KR20170001457A (en) 2015-06-26 2015-06-26 An authentication method for cyber money settlement using smartphone

Country Status (1)

Country Link
KR (1) KR20170001457A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102374068B1 (en) * 2021-06-14 2022-03-17 주식회사 큐알씨뱅크 System for providing blockchain based facial recognition payment service

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102374068B1 (en) * 2021-06-14 2022-03-17 주식회사 큐알씨뱅크 System for providing blockchain based facial recognition payment service

Similar Documents

Publication Publication Date Title
JP7442552B2 (en) Dynamic off-chain digital currency transaction processing
US10484178B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
CN108804906B (en) System and method for application login
CN104599408B (en) Third party's account ATM withdrawal method and system based on dynamic two-dimension code
US11568401B2 (en) Digital payment system
US9025834B2 (en) Input validation, user and data authentication on potentially compromised mobile devices
CN105868970B (en) authentication method and electronic equipment
CN104574052A (en) Payment method and system based on 3D holographic projection for identity authentication
CN110084586B (en) Mobile terminal secure payment system and method
CN103942897A (en) Method for money withdrawing without card on ATM
US20160350742A1 (en) System and method for transmitting and and receiving transaction information
US20170337553A1 (en) Method and appartus for transmitting payment data using a public data network
KR102333811B1 (en) System and method for processing card payment based on block-chain
CN109741070B (en) Account management method and device based on network certificate
CN110766388B (en) Virtual card generation method and system and electronic equipment
KR20170001457A (en) An authentication method for cyber money settlement using smartphone
US20220067720A1 (en) Electronic currency offline payment method and payment collection method
CN113609519A (en) Timing method, device and storage medium based on block chain
EP3686827A1 (en) Information display method and apparatus, storage medium and electronic device
JP6515080B2 (en) INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
CN110610367B (en) Transaction data payment method and device, electronic equipment and server
KR20170001456A (en) A method for authenticating credit card settlement using smartphone
KR20210014458A (en) Method for providing integrated authentication service based on blockchain
KR20210017308A (en) Method for providing secondary authentication service using device registration and distributed storage of data
CN103402141A (en) Ukey-based secure television payment method

Legal Events

Date Code Title Description
A201 Request for examination
A302 Request for accelerated examination
E902 Notification of reason for refusal
E90F Notification of reason for final refusal
E601 Decision to refuse application