Unlock instant, AI-driven research and patent intelligence for your innovation.

A transaction authentication processing method, authentication server, terminal and transaction equipment

A technology of authentication server and processing method, applied in the field of mobile payment, can solve the problems of poor transaction security, inability to secure authentication of storage medium security, etc., and achieve the effect of improving security

Active Publication Date: 2020-07-10
CHINA MOBILE COMM LTD RES INST +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, there will be multiple secure storage media for smart terminals, but the secure storage media corresponding to different applications are indeed diverse, and the different secure storage media corresponding to different applications are also random and changeable (users can configure them themselves). As a result, it is impossible to perform security authentication on the secure storage medium, making the security of the transaction poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A transaction authentication processing method, authentication server, terminal and transaction equipment
  • A transaction authentication processing method, authentication server, terminal and transaction equipment
  • A transaction authentication processing method, authentication server, terminal and transaction equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0080] see figure 1 , figure 1 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as figure 1 shown, including the following steps:

[0081] Step 101, acquiring the user medium authentication request and the CLF authentication request sent after the terminal downloads the target application;

[0082] The transaction authentication processing method provided in this embodiment is mainly applied in the terminal transaction system, and is used for managing and allocating the security application identifier, the medium authentication identifier and the CLF authentication identifier during the transaction authentication process of the terminal.

[0083] In this embodiment, the above-mentioned terminal is an NFC (Near Field Communication, short-range wireless communication) terminal based on TEE (Trusted Execution Environment, Trusted Execution Environment) technology, such as a mobile phone. There are mul...

no. 2 example

[0099] refer to figure 2 , figure 2 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as figure 2 As shown, the transaction authentication processing method includes the following steps:

[0100] Step 201, detecting a business transaction request sent by a business application; the business transaction request includes a security application mark, a medium authentication mark, and a CLF authentication mark;

[0101] The transaction authentication processing method provided in this embodiment is mainly applied in a terminal transaction system for authenticating the transaction process of the terminal.

[0102] Specifically, the service application can initiate a service transaction request to the authentication module, and the authentication module will perform an authentication operation when receiving the service transaction request. Wherein, the authentication module stores the binding relationsh...

no. 3 example

[0112] refer to image 3 , image 3 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as image 3 As shown, based on the second embodiment of the transaction authentication processing method of the present invention, in the third embodiment, before the above step 201, it also includes:

[0113] Step 205, verifying the user identity information according to the received user identity information verification request;

[0114] The above step 201 is specifically: after the identity information is verified, detect the business transaction request sent by the business application.

[0115] In this embodiment, the user identity is unique and can be identified and authenticated through biometric technology. The authentication method can be set according to actual needs. In this embodiment, preferably, the authentication process can be power-on authentication, and in other embodiments, it can also be startu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a transaction certification processing method. The transaction certification method includes: acquiring a user medium certification request and a CLF certification request sendby a terminal after the terminal downloads a target application; allocating a corresponding medium certification identifier to the terminal according to the user medium certification request, and allocating a corresponding CLF certification identifier to the terminal according to the CLF certification request; establishing a corresponding binding relation between an unique safe application identifier of the target application, the medium certification identifier and the CLF certification identifier, and sending the corresponding binding relation to the terminal and a transaction device so as to allow the terminal and the transaction device to certify the medium certification identifier and the CLF certification identifier. The invention also discloses a certification server, a terminal anda transaction device. The transaction certification processing method can improve the safety of terminal transaction.

Description

technical field [0001] The invention relates to the field of mobile payment, in particular to a transaction authentication processing method, authentication server, terminal and transaction equipment. Background technique [0002] With the development of intelligent terminals, most of the existing intelligent terminals on the market support dual cards (such as SIM cards), and even support virtual soft cards (soft SIM cards) implemented by operating system simulation on the basis of dual cards. In this way, there will be multiple secure storage media for smart terminals, but the secure storage media corresponding to different applications are indeed diverse, and the different secure storage media corresponding to different applications are also random and changeable (users can configure them themselves). As a result, it is impossible to perform security authentication on the secure storage medium, making the security of the transaction poor. Contents of the invention [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34G06F21/44
CPCG06F21/34G06F21/44G06F21/445
Inventor 王钊
Owner CHINA MOBILE COMM LTD RES INST