Token design method integrating mobile payment safety authentication and mobile phone loss alarm
A security authentication and mobile payment technology, applied in the information field, can solve problems such as low repeatability, application restrictions, and inability to complete authentication work
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0087] see figure 1 , the present invention relates to a mobile payment mobile phone external security authentication system, mainly including a smart phone 1 and an external token 2, the smart phone 1 is a general structure, such as figure 1 As shown, including but not limited to hardware platform 1.1, operating system OS 1.2, long-distance wireless module 1.3, other software 1.4, mobile payment APP 1.5, security authentication APP 1.6 and short-distance wireless module 1.7, the smart phone 1 is selected from the American Apple The company's iPhone 6 Plus 64G adopts China Mobile's "Global Communications" 4G communication network; the hardware platform 1.1 is the same as above; the operating system OS 1.2 adopts Apple's iOS 8.2; "4G communication network; other software 1.4, the mobile phone comes with it; mobile payment APP 1.5 uses the iOS version of the "Alipay" software, and the short-range wireless module 1.7 uses the WIFI channel that comes with the mobile phone.
[008...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 