Payment authentication method and payment authentication system

A technology for payment authentication and authentication equipment, which is applied in payment systems, payment architectures, instruments, etc., and can solve problems such as user loss, easy leakage of credentials, and outstanding security issues in the field of mobile payment.

Inactive Publication Date: 2017-03-22
FEITIAN TECHNOLOGIES
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of mobile Internet technology, mobile payment services are becoming more and more popular, but payment authentication credentials are easily leaked, and security issues in the field of mobile payment have become increasingly prominent
Currently, online banking and third-party payments all use digital passwords, fingerprint recognition, and SMS verification codes. These methods have not realized the separation of payment terminals and authentication (that is, verifying whether users have the right to access the system), resulting in various security risks. happens sometimes
For example, if a user performs an authentication operation through a mobile phone, once the mobile phone is infected with a virus, the virus will steal the payment verification code, steal the user's funds, and cause serious losses to the user; It will also suffer huge losses, which will greatly hinder the development of mobile payment services, and also hinder the convenience of mobile payment for users, seriously affecting user experience
[0003] At present, the weakest link in mobile payment security lies in the non-separation of payment authentication and payment terminal, which leads to various risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Payment authentication method and payment authentication system
  • Payment authentication method and payment authentication system
  • Payment authentication method and payment authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0143] Such as figure 1 As shown, the first embodiment provides a payment authentication method, including the following steps:

[0144] Step S1: When the client receives the order information in the current application returned by the application server, the client generates a first request for payment authentication according to the authentication device ID and the user authentication mode ID;

[0145] In step S1 of this embodiment, before the client generates the first payment authentication request according to the authentication device ID and the user authentication mode ID, any one of steps B, R, and T is included,

[0146] Step B: the client sends a request to obtain the device ID and the user authentication mode ID to the authentication device, and the authentication device sends the authentication device ID and the user authentication mode ID to the client;

[0147] Step R: the client sends a request to obtain the authentication device identifier to the authenticatio...

Embodiment 2

[0191] Such as figure 2 and 3 As shown, the second embodiment provides a payment authentication method, including the following steps:

[0192] Step D1: When the client receives the order information and payment operation information in the current application returned by the application server, prompt the user to select an authentication device;

[0193] Step D2: When the client receives the authentication device information selected by the user, it prompts the user to activate the corresponding authentication device;

[0194] Step D3: The client sends a request to obtain the device ID and the user authentication mode ID to the authentication device;

[0195] For example, the request to obtain the device ID and user authentication mode ID is: 0x00c7000009;

[0196] Step D4: The authentication device reads the authentication device logo pre-planted at the factory, displays the supported user authentication methods, prompts the user to make a choice and receives the user's ...

Embodiment 3

[0333] Such as image 3 and 4 As shown, the third embodiment provides a payment authentication method, including the following steps:

[0334] Step M1: When the client receives the order information and payment operation information in the current application returned by the application server, the user is prompted to select an authentication device;

[0335] Step M2: When the client receives the authentication device information selected by the user, the client prompts the user to activate the corresponding authentication device;

[0336] Step M3: The client judges whether the corresponding authentication device ID has been saved internally. If the client has saved the authentication device ID, execute step M12. If the client does not save the authentication device ID, execute step M4;

[0337] Specifically, step M3 includes: the client judges according to the user account number in the order information whether the corresponding authentication device identifier has been st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a payment authentication method and a payment authentication system. The method comprises the steps of generating a payment authentication first request and transmitting the payment authentication first request to an application server by a client; generating a payment authentication second request by the application server according to an analysis result, order information and an application identification of the payment authentication first request and transmitting the payment authentication second request to an authentication server by the application server; generating a payment authentication second request response according to the payment authentication second request and transmitting the payment authentication second request response to the application server by the authentication server; generating a payment authentication first request response according to the analysis result of the payment authentication second request response and transmitting the payment authentication first request response to the client by the application server; generating a to-be-signed request according to the analysis result of the payment authentication first request response and transmitting the to-be-signed request to authentication equipment by the client; generating a signature verification request and transmitting the signature verification request to the authentication server by the authentication equipment; transmitting the verification result of a signature value in the signature verification request to the application server by the authentication server; and performing a payment allowing operation or a payment refusing operation on the application server according to the verification result.

Description

technical field [0001] The invention relates to the field of secure payment authentication, in particular to a payment authentication method and system. Background technique [0002] With the development of mobile Internet technology, mobile payment services are becoming more and more popular, but payment authentication credentials are easily leaked, and security issues in the field of mobile payment have become increasingly prominent. Currently, online banking and third-party payments all use digital passwords, fingerprint recognition, and SMS verification codes. These methods have not realized the separation of payment terminals and authentication (that is, verifying whether users have the right to access the system), resulting in various security risks. happens sometimes. For example, if a user performs an authentication operation through a mobile phone, once the mobile phone is infected with a virus, the virus will steal the payment verification code, steal the user's f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/3825G06Q20/40145
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products