WO2017197740A1 - Système et procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité - Google Patents

Système et procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité Download PDF

Info

Publication number
WO2017197740A1
WO2017197740A1 PCT/CN2016/088516 CN2016088516W WO2017197740A1 WO 2017197740 A1 WO2017197740 A1 WO 2017197740A1 CN 2016088516 W CN2016088516 W CN 2016088516W WO 2017197740 A1 WO2017197740 A1 WO 2017197740A1
Authority
WO
WIPO (PCT)
Prior art keywords
authorization
mobile terminal
initiator
rule
matching
Prior art date
Application number
PCT/CN2016/088516
Other languages
English (en)
Chinese (zh)
Inventor
刘明晶
张璐
张维
雷尚涛
Original Assignee
深圳一卡通新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳一卡通新技术有限公司 filed Critical 深圳一卡通新技术有限公司
Publication of WO2017197740A1 publication Critical patent/WO2017197740A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Definitions

  • the invention relates to a mobile terminal authorization system and method based on proximity sensing triggering.
  • NFC near field communication technology can realize rapid identification and transaction authorization. It is widely used in offline micropayment, access control, subway gates, etc., but has the following problems:
  • the account information is written into the SE unit of the storage medium in advance, and the transaction data is synchronized with the background system by asynchronous transmission, and once lost, the data cannot be reported immediately, which affects the security of the user's funds.
  • Online identity authentication and authorization are triggered by near-field sensing.
  • NFC technology does not support online transactions
  • real-time loss reporting and online identification and authorization methods such as sound waves and two-dimensional codes are complicated to read information when triggered.
  • User experience A poor technical problem, the present invention provides a mobile terminal authorization system and method based on proximity sensing triggering.
  • a mobile terminal authorization system based on proximity sensing triggering is characterized in that it comprises: an initiator identity authentication request module, an initiator authorization setting module, an acceptor identity authentication request module, a matching module, and an authorization server;
  • An initiator authorization setting module configured to set an automatic authorization rule and send the authorization rule to the authorization server;
  • the automatic authorization rule includes an identity of the receiver, an authorized service, an authorized location, and an allowed authorization time;
  • the initiator identity authentication request module when the distance sensor of the initiator mobile terminal senses that the receiver mobile terminal is close, transmitting the authorization information with the initiator identity identifier and the automatic authorization command to the matching module; the initiator The identity identifier includes the sensing time of the mobile terminal with the receiving party, the sensing end time of the mobile terminal of the receiving party, the sensing occurrence location, and the sensing instant mobile terminal Angle of the end
  • the acceptor identity authentication request module when the distance sensor of the mobile terminal of the accepting party senses that the originating mobile terminal is close, transmitting an authorization request with the identifier of the accepting party and requesting the authorized content to the matching module;
  • the identity identifier includes an inductive time with the initiating mobile terminal, an inductive end time of the initiating mobile terminal, an inductive occurrence location, and an angle of the inductive instant receiving mobile terminal;
  • the matching module matching the authorization information sent by the initiator identity authentication request module and the authorization request sent by the receiver identity authentication request module, and sending the identity identifier to the initiator terminal and the receiver terminal respectively after the matching is successful. Handshake success information, and forward the authorization information and authorization request to the authorization server;
  • the authorization server extracts an automatic authorization rule of the initiator according to the identity identifier and the authorization information of the initiator, and determines whether the receiver meets the authorization rule set by the initiator, and if the automatic authorization rule of the receiver and the initiator is consistent, the initiator The mobile terminal and the recipient mobile terminal are authorized, otherwise, no authorization is granted.
  • the above matching module performs matching according to the first rule:
  • the first rule is to determine whether the originating location, the sensing time, and the sensing end time of the originating mobile terminal and the receiving mobile terminal are the same: when all three are the same, the matching between the initiator and the receiving party is deemed to be successful. When it is not the same, the match fails.
  • the above matching module performs matching according to the second rule:
  • the second rule is matched, and the second rule is: according to the angle of the initiator mobile terminal and the mobile terminal of the receiver When it is judged that the two mobile terminals are close to each other according to the angle, it is regarded that the initiator and the acceptor successfully match the current request and the authorization.
  • the above-mentioned initiator authorization setting module is further configured to set an auxiliary authorization rule, where the auxiliary authorization rule includes an account password and an electronic signature;
  • the authorization server is further configured to send the requesting authorization rule information by the originating mobile terminal, and give an authorization when receiving the auxiliary authorization rule.
  • a mobile terminal authorization method based on proximity sensing triggering includes the following steps:
  • the automatic authorization rule Including the identity of the accepting party, allowing the authorized business, allowing the authorized place, and allowing the authorized time;
  • the auxiliary authorization rule includes the account password and the electronic signature;
  • the initiator identity identifier includes the mobile The sensing time of the terminal, the sensing end time of the mobile terminal of the receiving party, the location of the sensing occurrence, and the angle of the originating mobile terminal when sensing;
  • the authorization request with the identifier of the accepting party and requesting the authorized content is sent to the matching module;
  • the identifier of the accepting party includes moving with the initiator The sensing time of the terminal, the sensing end time of the initiating mobile terminal, the sensing occurrence location, and the angle of the receiving mobile terminal;
  • the authorization server obtains the corresponding automatic authorization rule according to the identity identification and authorization information of the initiator, and determines whether the receiver meets the automatic authorization rule of the corresponding initiator. If the receiver meets the automatic authorization rule of the initiator, the authorization terminal moves to the initiator mobile terminal. And the mobile terminal authorization of the receiving party; otherwise, no authorization is granted;
  • Step 3 The specific matching rules are as follows:
  • the first rule is to determine whether the originating location, the sensing time, and the sensing end time of the originating mobile terminal and the receiving mobile terminal are the same: when all three are the same, the matching between the initiator and the receiving party is deemed to be successful. When it is not the same, the match fails.
  • the specific matching rule is: when multiple authorization requests and multiple authorization information are received at the same time, and the matching according to the first rule is successful, the matching is continued according to the second rule, and the second rule is: the initiator moves according to the sensing instant.
  • the angle judgment between the terminal and the receiver mobile terminal when it is judged that the two mobile terminals are in close proximity according to the angle, it is considered that the initiator mobile terminal and the receiver mobile terminal successfully match the request and the authorization.
  • the specific matching rule is: when the multiple authorization requests and the multiple authorization information are successfully matched according to the second rule, all the successfully authorized authorization information to be sent to the initiator mobile terminal is sent by the initiator mobile terminal. Select which authorization information to authorize, according to the initiator mobile end The active selection results of the end are matched.
  • the auxiliary authorization rule is also verified. Specifically, the authorization server sends the secondary authorization rule verification information to the initiator mobile terminal, and if the initiator mobile terminal provides the auxiliary authorization rule, the authorization is performed; If the originating mobile terminal does not provide, no authorization is granted; the auxiliary authorization rule includes an account password and an electronic signature.
  • the invention directly triggers transaction authorization or identification by using the mobile phone distance sensing device, and the response speed is the same as that of NFC and other near field communication methods, and is faster than identifying information loaded in the two-dimensional code, sound wave and light wave.
  • the terminal is only used to trigger the transaction or authentication.
  • the transaction authorization and identification are completed on the backend authorization server to avoid the authorization or authentication rules to be downloaded and leaked.
  • the invention improves the security of the authorized transaction by double verification of the automatic authorization rule and the auxiliary authorization rule.
  • FIG. 1 is a schematic diagram of a mobile terminal authorization system based on proximity sensing triggering according to the present invention
  • FIG. 2 is a flowchart of a method for authorizing a mobile terminal based on proximity sensing triggering according to the present invention
  • FIG. 3 is a schematic diagram of a matching process of the present invention.
  • a mobile terminal authorization system based on proximity sensing triggering includes an initiator identity authentication request module, an initiator authorization setting module, an acceptor identity authentication request module, a matching module, and an authorization server;
  • Initiator authorization setting module used to set an automatic authorization rule and an auxiliary authorization rule, the auxiliary authorization rule includes an account password and an electronic signature; the automatic authorization rule includes an acceptor identity, an authorized authorization service, an allowed authorization place, and an allowable authorization time;
  • the initiator identity authentication request module when the distance sensor of the initiator mobile terminal senses that the receiver mobile terminal is close, the authorization information with the initiator identity and the automatic authorization command is sent to the matching module;
  • the initiator identity identifier includes The sensing time of the mobile terminal of the receiving party, the sensing end time of the mobile terminal of the receiving party, the location of the sensing occurrence, and the angle of the originating mobile terminal of the sensing instant;
  • Receiver identity authentication request module the proximity sensor of the mobile terminal of the receiving party senses the initiation When the mobile terminal is close, the authorization request with the identifier of the receiver and the request for authorization content is sent to the matching module; the identity of the receiver includes the sensing time of the mobile terminal with the initiator, the sensing end time of the mobile terminal of the initiator, and the sensing. The occurrence location and the angle at which the mobile terminal of the receiving party is instantaneously sensed;
  • the matching module the authorization information sent by the initiator identity authentication request module and the authorization request sent by the receiver identity authentication request module are matched, and the handshake is successfully sent to the initiator terminal and the receiver terminal respectively after the matching is successful. Information, and forward the authorization information and authorization request to the authorization server;
  • the authorization server extracts the automatic authorization rule of the initiator according to the identifier and the authorization information of the initiator, and determines whether the receiver meets the authorization rule set by the initiator. If the automatic authorization rule of the receiver and the initiator is consistent, the mobile terminal is sent to the initiator. And the recipient mobile terminal authorization, otherwise, no authorization.
  • the authorization server is also used by the originating mobile terminal to send the auxiliary authorization rule information, and when the auxiliary authorization rule is received, the authorization is given.
  • the matching module matches according to the first rule:
  • the first rule is to determine whether the originating location, the sensing time, and the sensing end time of the originating mobile terminal and the receiving mobile terminal are the same: when all three are the same, the matching between the initiator and the receiving party is deemed to be successful. When it is not the same, the match fails.
  • the matching module matches according to the second rule:
  • the initiator connects the first terminal to the second terminal of the accepting party.
  • the distance sensors of the first terminal and the second terminal respectively sense the other party and trigger the identity authentication handshake.
  • the first terminal After triggering the identity authentication handshake, the first terminal sends the authorization information with the initiator identifier and the automatic authorization command to the front-end server, and considers that the authorization is authorized at the current location and time point, and the execution permission preset by the initiator is automatically executed.
  • Authorized services such as: payment, ticket inspection, access control, attendance, entry and exit, requisition or write-off coupons.
  • the second terminal After the second terminal triggers the identity authentication handshake, the second terminal sends an authorization request with the identifier of the receiver and the content of the request for authorization to the front-end server, and the request originator is authorized to perform the service initiated by the receiver at the current time and place.
  • the front-end server receives the automatic authorization command uploaded by the first terminal, and the authorization request uploaded by the second terminal, and executes multiple sets of matching rules in sequence until the authorization request and the authorization command are successfully matched.
  • the authorization server extracts the authorization rule in the authorization setting module, and determines whether the content of the request authorization is consistent with the automatic authorization rule of the initiator, and if it is consistent, the authorization is performed.
  • the initiator information required to complete the authorized business is extracted from the service server, and it is verified whether the business acceptance rule is met. If the business acceptance rule is met, the subsequent business process is executed.
  • Authorization request and authorization command are first matched according to the first group of rules: the first group of rules are: the place of occurrence, the start time of the authorization action, and the end time of the authorization action. When all three are the same, it is regarded as the initiator and the receiver. The match between the secondary request and the authorization was successful.
  • the matching is continued, and the second group of rules is matched.
  • the second group of rules is: according to the triggering authorization, the initiator terminal and the acceptance are instantaneous.
  • the tilting angle of the square terminal in the three-dimensional space is matched.
  • the condition of the initiator's background service authorization is that, on the premise that the authorization request sent by the receiver and the authorization command issued by the initiator successfully match, the receiver and the request content of the authorization request are issued, and the initiator sets the module in the authorization setting.
  • the automatic authorization rules are set to be consistent, or within the reasonable range of the initiator's customary behavior.
  • the rules used in the authorization process are divided into two categories.
  • the first category is the rule that the initiator allows automatic authorization.
  • the initiator is reserved in the authorization setting module in advance. When the authorization request matches such rules, the authorization is granted.
  • the right server will execute the automatic authorization command to complete the current authorization;
  • the second type is the authorization rule that needs the initiator to provide the auxiliary authorization information, and the auxiliary authorization information is reserved by the initiator in the authorization setting module in advance.
  • the rules that the initiator allows automatic authorization including: the identity of the receiver, the permitted service, the permitted location, and the time allowed for authorization.
  • the rules are submitted by the initiator to the authorization server in advance.
  • the authorization server extracts the rule that the initiator allows automatic authorization, and simultaneously extracts the content of the authorization request. Matching the two, if the authorization request meets the automatic authorization rule allowed by the initiator, the automatic authorization instruction is executed, and the initiator agrees to authorize the current request. Perform subsequent business processes.
  • the payer holds the smartphone, and the payee holds a smart phone or other smart mobile terminal with a distance sensor (including but not limited to Pad, custom POS, etc.).
  • a distance sensor including but not limited to Pad, custom POS, etc.
  • the payee When paying, the payee will input the current payment amount and generate a payment order. The payer places the phone close to the distance sensor area of the receiving terminal.
  • the payer's mobile phone will authorize the payment instruction, and the payee terminal uploads the transaction authorization request to the front-end server at the same time, and the front-end server completes the handshake request (ie, matching) of the transaction request and the transaction authorization, triggering the authorization.
  • the front-end server sends the payer ID, the payee ID, the payment amount, the service type, the time, and the location to the authorization server, and the authorization server extracts the automatic authorization rule of the payer according to the payer ID, and performs the transaction information with the current transaction information. Comparison.
  • the payee obtains the authorization to debit the payer's account. If the payee is set to debit the password, the payee is authorized to pick up the payee after the authorization is obtained. The reserved password is used to perform the debit.
  • Embodiment 2 Identification:
  • An individual holds a smart phone and installs an authentication terminal with a distance sensor at a specified location in an identification, authorization, and authorization scenario such as access control, elevator, and gate.
  • the front-end server After receiving the authentication request and the authentication command, the front-end server performs a handshake according to the time and place of occurrence. After the matching succeeds, the authorization is triggered, and the authentication request and the authentication command are sent to the authorization server.
  • the authorization server initiates a preset authentication terminal identification rule, such as: who, where, and when the identity is allowed, and the authentication request is authenticated to the individual according to the rule, and the authorization is performed after the matching is successful, for example, opening the access control and opening Gates, etc.
  • a preset authentication terminal identification rule such as: who, where, and when the identity is allowed, and the authentication request is authenticated to the individual according to the rule, and the authorization is performed after the matching is successful, for example, opening the access control and opening Gates, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système et un procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité. Le système comprend un module de demande d'authentification d'initiateur, un module de définition d'autorisation d'initiateur, un module de demande d'authentification de destinataire, un module de mise en correspondance et un serveur d'autorisation. Le procédé consiste : à extraire une règle d'autorisation automatique d'un initiateur en fonction d'un identificateur et d'informations d'autorisation de l'initiateur, à déterminer si un destinataire satisfait à la règle d'autorisation définie par l'initiateur, et, si les informations d'autorisation du destinataire sont cohérentes avec la règle d'autorisation automatique de l'initiateur, à donner une autorisation à un terminal mobile de l'initiateur et à un terminal mobile du destinataire, ou, si elles ne sont pas cohérentes, à ne pas accorder l'autorisation. Pour résoudre le problème technique de la technologie NFC, qui ne prend pas en charge les transactions en ligne et ne peut donc pas prendre en charge les rapports de perte en temps réel, un appareil de détection à distance d'un téléphone mobile est utilisé pour déclencher directement une autorisation de transaction ou une reconnaissance d'identité, ce qui permet d'obtenir une vitesse de réponse égale à celle de la NFC et plus rapide que celle des informations d'identification portées par un code à barres 2D, une onde sonore ou une onde lumineuse.
PCT/CN2016/088516 2016-05-20 2016-07-05 Système et procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité WO2017197740A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610343619.1 2016-05-20
CN201610343619.1A CN106056376A (zh) 2016-05-20 2016-05-20 一种基于近距离感应触发的移动终端授权***及方法

Publications (1)

Publication Number Publication Date
WO2017197740A1 true WO2017197740A1 (fr) 2017-11-23

Family

ID=57177335

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/088516 WO2017197740A1 (fr) 2016-05-20 2016-07-05 Système et procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité

Country Status (2)

Country Link
CN (1) CN106056376A (fr)
WO (1) WO2017197740A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472175A (zh) * 2018-08-21 2019-03-15 ***股份有限公司 电磁感应装置以及受理终端及其切换控制方法

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109165491A (zh) * 2018-08-02 2019-01-08 考拉征信服务有限公司 安全授权方法、装置、电子设备及存储介质
CN110728807B (zh) * 2019-09-27 2022-02-11 深圳市海雀科技有限公司 智能门铃的防拆方法及装置
CN112395574B (zh) * 2020-12-04 2024-02-23 航天信息股份有限公司 一种安全登录管理方法
CN113822674A (zh) * 2021-05-31 2021-12-21 ***股份有限公司 生物特征识别终端、用户终端、支付服务器及相关方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201690499U (zh) * 2009-11-24 2010-12-29 ***通信集团湖南有限公司 移动支付***、业务处理装置与移动终端
CN102157040A (zh) * 2011-01-18 2011-08-17 中兴通讯股份有限公司 一种非接触式移动支付设备的通信装置及方法
CN103745397A (zh) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 基于位置场景识别实现电子交易风险控制的***及方法
US20150347999A1 (en) * 2014-05-28 2015-12-03 Verizon Patent And Licensing Inc. Point-of-sale location check for payment card purchases

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102545964B (zh) * 2010-12-16 2014-08-13 国民技术股份有限公司 一种通过碰撞触发信息交互的通信方法及***
FR2975860A1 (fr) * 2011-05-25 2012-11-30 France Telecom Procede de paiement a distance, a partir d'un dispositif utilisateur, d'un panier d'achat sur un serveur marchand et systeme associe
CN103065240B (zh) * 2013-01-11 2018-04-27 中兴通讯股份有限公司 一种移动支付处理方法和***
WO2015001473A1 (fr) * 2013-07-04 2015-01-08 Visa International Service Association Autorisation de transactions utilisant des règles basées sur un dispositif mobile
CN105590194A (zh) * 2014-12-03 2016-05-18 ***股份有限公司 一种线下支付方法以及支付***

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201690499U (zh) * 2009-11-24 2010-12-29 ***通信集团湖南有限公司 移动支付***、业务处理装置与移动终端
CN102157040A (zh) * 2011-01-18 2011-08-17 中兴通讯股份有限公司 一种非接触式移动支付设备的通信装置及方法
CN103745397A (zh) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 基于位置场景识别实现电子交易风险控制的***及方法
US20150347999A1 (en) * 2014-05-28 2015-12-03 Verizon Patent And Licensing Inc. Point-of-sale location check for payment card purchases

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472175A (zh) * 2018-08-21 2019-03-15 ***股份有限公司 电磁感应装置以及受理终端及其切换控制方法

Also Published As

Publication number Publication date
CN106056376A (zh) 2016-10-26

Similar Documents

Publication Publication Date Title
US10785212B2 (en) Automated access data provisioning
US11461760B2 (en) Authentication using application authentication element
KR101455609B1 (ko) 홍채 정보를 이용한 카드 결제 시스템 및 카드 결제 방법
WO2017197740A1 (fr) Système et procédé permettant de donner une autorisation à un terminal mobile sur la base du déclenchement d'une détection de proximité
WO2017075063A1 (fr) Système et procédé d'authentification biométrique sans fil
US11861600B2 (en) Systems and methods for providing card interactions
JP2017530586A (ja) クライアントをデバイスに対して認証するシステム及び方法
KR20170121341A (ko) 이동 장치 전자 상거래 트랜잭션들을 위한 생체 데이터를 사용한 인증 방법
US10395244B1 (en) Systems and methods for providing card interactions
US20170091774A1 (en) Biometric Fingerprint Payment System for Mobile Devices
US11868988B2 (en) Devices and methods for selective contactless communication
JP2022527798A (ja) 効率的なチャレンジ応答認証のためのシステム及び方法
JP2017167875A (ja) システム、現金預け払い方法及びプログラム
KR101542111B1 (ko) 카드를 이용한 결제방법, 이를 위한 디지털 시스템, 및 결제측 시스템
KR101576075B1 (ko) 모바일 결제 시스템, 모바일 단말기, 및 모바일 결제방법
KR20190003267A (ko) 계좌 기반 지급결제 서비스를 제공하는 시스템
EP4369270A1 (fr) Procédé d'authentification d'un utilisateur d'un instrument de paiement lors d'une transaction de paiement de visage à visage
AU2015200732B2 (en) Authentication using application authentication element
KR20140117079A (ko) 모바일 결제 시스템, 모바일 단말기, 및 모바일 결제방법
CN109426964A (zh) 用于授权交易的方法和***
KR20150072956A (ko) 카드를 이용한 결제방법, 이를 위한 디지털 시스템, 및 결제측 시스템
KR20150040261A (ko) 모바일 결제 시스템, 모바일 단말기, 및 모바일 결제방법

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902120

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 29.04.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16902120

Country of ref document: EP

Kind code of ref document: A1