Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and authentication system among mobile devices

A mobile device and authentication technology, applied in payment systems, payment architectures, data processing applications, etc., can solve problems such as the inability to meet user compatibility and convenience needs, the leakage of bank account-related information, and the exposure of security risks.

Active Publication Date: 2015-09-30
上海太炎信息科技有限公司
View PDF8 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) There is no unified method and system, and each account management party is mainly based on self-defined standards, which leads to the inconvenience that users need to carry multiple bank cards, membership cards and stored value cards when traveling
[0007] 2) With the increasing number of crimes such as forging identities and stealing bank card account information, the security risks of existing authentication methods are gradually exposed, especially the leakage of bank account-related information, which has brought great harm to users' personal sensitive information. Security Risk
[0008] 3) If mobile devices such as NFC mobile phones are used for authentication, authentication requests other than electronic cash need to be initiated online by the device, which will be greatly affected by the network environment, and verification of coupons such as vouchers still needs to be done manually processing, completely unable to meet the needs of users for compatibility and convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication system among mobile devices
  • Authentication method and authentication system among mobile devices
  • Authentication method and authentication system among mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0093] Such as figure 2 As shown, an authentication system between mobile devices includes:

[0094] The initiating device 1 is used to bind a primary account and multiple secondary accounts, and after selecting the bound account as the initiator account, obtain the first authentication order for mobile payment, identity authentication and ticket verification through an encryption method card, and send it to the receiving device 2 through short-distance communication, and at the same time receive the verification result of the second authentication token fed back by the trusted bank service manager server 3, wherein the first authentication token includes but is not limited to authentication Token serial number, authentication category, initiator user name and token information corresponding to the initiator account, token information includes payment token and / or authentication token;

[0095] The receiving device 2 is used to bind a primary account and multiple secondary a...

Embodiment 2

[0155] The difference between this embodiment and Embodiment 1 is that, taking the smart watch as the initiating device 1, the smart access control as the receiving device 2, and the Hanting server as the secondary account management server 5 as an example, user A (using a smart watch) needs to register with the Hanting Room 301 of the Shanghai Shimen 2nd Road branch of the hotel (using smart access control) for identity verification. User A selects the Hanting account as the initiator account, and Room 301 of the Hanting Hotel Shanghai Shimen 2nd Road branch selects the Hanting account as the recipient account. Personal identification Voiceprint recognition is used as the method, and Bluetooth is used as the short-distance communication method. In order to simplify the steps, the default validity verification is valid, such as Figure 6 As shown, the authentication method between user A and the mobile device in Room 301 of the Hanting Hotel based on the offline encryption meth...

Embodiment 3

[0162] The difference between this embodiment and Embodiment 1 is that the initiating device 1 is not provided with a secure storage module 8, then in step S2, the initiating device 1 obtains the first authentication token through an online encryption method, and in the online encryption method, the initiating device 1, The trusted bank service manager server 3 and the main account manager server 4 cooperate to realize the encrypted acquisition of the first authentication token, specifically: the initiating device 1 initiates the first authentication token online to the trusted bank service manager server 3 To generate a request, the trusted bank service manager server 3 judges that the first authentication token generation request is valid and then encrypts and generates a corresponding first authentication token. If the first authentication token generation request includes a payment token generation request, Then the trusted bank service manager server 3 requests the primary...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication method and an authentication system among mobile devices. The authentication method includes that after selecting an initiator account number, an initiating device obtains a first authentication token for mobile payment, identity authentication and ticket verification through an encryption method and sends the first authentication token to a receiving device; after selecting a receiver account number, the receiving device encrypts to generate a second authentication token on the basis of the first authentication token and forwards the second authentication token to a credible bank service manager server; the credible bank service manager server is communicated with a corresponding primary account number manager server or a secondary account number manager server according to content of the second authentication token to obtain a fed back authentication request verification result, generates a second authentication token verification result and forwards the second authentication token verification result to the initiating device, the receiving device and the primary account number manager server or the secondary account number manager server corresponding to the receiver account number. Compared with the prior art, the authentication method and the authentication system have the advantages that mobile authentication safety is enhanced, mobile authentication compatibility is increased, user experience is improved and the like.

Description

technical field [0001] The invention relates to an authentication method and system, in particular to an authentication method and an authentication system between mobile devices. Background technique [0002] In recent years, contact and non-contact short-range communication have developed very rapidly, among which contact IC is mainly used for mobile payment, identity authentication, etc.; non-contact short-range communication is mainly based on NFC, which is used for Mobile payment, identity authentication and data transmission, etc. [0003] Contact IC is divided into CPU type, logic encrypted storage type and storage type, among which CPU type has microprocessor CPU, storage unit (including random access memory RAM, program memory ROM, user data memory EEPROM) and chip operating system COS . The CPU IC card equipped with COS is equivalent to a microcomputer, which not only has the function of data storage, but also has the functions of command processing and data secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/32G06Q20/36G06Q20/38
CPCG06Q20/325G06Q20/327G06Q20/3674G06Q20/38215G06Q20/3829
Inventor 许逸宁欧如锋胡炜
Owner 上海太炎信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products