Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for security authentication

A security certification and legal technology, applied in the field of security certification, can solve security risks and other issues

Active Publication Date: 2016-06-01
南京浦裕投资有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method and device for security authentication, which are used to solve the technical problem of security risks in the prior art when the user is required to manually complete the confirmation for each payment when the transaction payment is performed under the Bluetooth non-secure mode connection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for security authentication
  • Method and device for security authentication
  • Method and device for security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The method involved in the embodiment of the present invention can be applied to figure 1 As shown in the secure payment system, the secure payment system includes a terminal, an MPOS device and a server. Among them, the terminal can communicate with the MPOS device through Bluetooth mode, and the terminal can communicate with the server remotely. The MPOS device does not have the function of remote communication, so the MPOS device and the server do not have the function of direct communication.

[0083] The terminal involved in the embodiment of the present invention may be a mobile phone, a tablet computer, and other smart devices with a wireless communication function, and the wireless communication mode includes long-distance wireless communication, near field communication, and Bluetooth communication.

[0084] The MPOS device involved in the embodiment of the present invention may be a secure financial external device based on smart terminals such as mobile phone...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for security authentication. The method comprises: a server screens device identifiers and device addresses of at least one POS (Point Of Sale) device sent by a terminal according to preset database information, determines a first MPOS (Mobile Point Of Sale) device, and sends the device identifier and the device address of the first MPOS device and a first authentication factor corresponding to the first MPOS device; and the server receives a response message sent by a target MPOS device via the terminal, authenticates the target MPOS device according to an encryption key of the target MPOS device in the database information and the response message, and sends a processed second authentication factor to the target MPOS device via the terminal after the authentication passes, thus accomplishing the authentication of the target MPOS device and the terminal involved in payment without manual confirmation in each payment of users. Therefore, the method and the device improve the user experience and ensure the payment security.

Description

technical field [0001] The present invention relates to communication technology, in particular to a safety authentication method and device. Background technique [0002] With the continuous development of communication technology, various communication devices emerge as the times require, and various communication connections can be established between various communication devices. Taking Bluetooth connection as an example, there are two connection modes between two Bluetooth devices: a secure connection mode and a non-secure connection mode. In the secure connection mode, the user needs to manually set, input, and confirm the connection password (PIN) or matching code during the connection between two devices; in the non-secure connection mode, the two devices can be directly connected, skipping A step that is manually confirmed by the user. [0003] The above-mentioned Bluetooth connection method is currently widely used in mobile security payment, and the devices inv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q20/32G06Q20/42
CPCG06Q20/322G06Q20/42H04L63/0869H04L63/0876
Inventor 郑立
Owner 南京浦裕投资有限公司