Token design method with mobile payment security authentication and mobile phone lost alarm
A security authentication and mobile payment technology, applied in the information field, can solve problems such as low repeatability, application limitations, and inability to complete authentication work.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0087] see figure 1 , the present invention relates to a mobile payment mobile phone external security authentication system, mainly including a smart phone 1 and an external token 2, the smart phone 1 is a general structure, such as figure 1 As shown, including but not limited to hardware platform 1.1, operating system OS 1.2, long-distance wireless module 1.3, other software 1.4, mobile payment APP 1.5, security authentication APP 1.6 and mobile phone short-distance wireless module 1.7, the smart phone 1 is selected from the United States Apple's iPhone 6 Plus 64G adopts China Mobile's "Global Communications" 4G communication network; hardware platform 1.1, the same as above; operating system OS 1.2 adopts Apple's iOS8.2; long-distance wireless module 1.3, built-in with the phone, supports China Mobile "Global Link" 4G communication network; other software 1.4, the mobile phone comes with it; mobile payment APP 1.5 uses the "Alipay" software iOS version, and the short-range ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


