A transaction authentication processing method, authentication server, terminal and transaction equipment
A technology of authentication server and processing method, applied in the field of mobile payment, can solve the problems of poor transaction security, inability to secure authentication of storage medium security, etc., and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0080] see figure 1 , figure 1 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as figure 1 shown, including the following steps:
[0081] Step 101, acquiring the user medium authentication request and the CLF authentication request sent after the terminal downloads the target application;
[0082] The transaction authentication processing method provided in this embodiment is mainly applied in the terminal transaction system, and is used for managing and allocating the security application identifier, the medium authentication identifier and the CLF authentication identifier during the transaction authentication process of the terminal.
[0083] In this embodiment, the above-mentioned terminal is an NFC (Near Field Communication, short-range wireless communication) terminal based on TEE (Trusted Execution Environment, Trusted Execution Environment) technology, such as a mobile phone. There are mul...
no. 2 example
[0099] refer to figure 2 , figure 2 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as figure 2 As shown, the transaction authentication processing method includes the following steps:
[0100] Step 201, detecting a business transaction request sent by a business application; the business transaction request includes a security application mark, a medium authentication mark, and a CLF authentication mark;
[0101] The transaction authentication processing method provided in this embodiment is mainly applied in a terminal transaction system for authenticating the transaction process of the terminal.
[0102] Specifically, the service application can initiate a service transaction request to the authentication module, and the authentication module will perform an authentication operation when receiving the service transaction request. Wherein, the authentication module stores the binding relationsh...
no. 3 example
[0112] refer to image 3 , image 3 is a flow chart of the transaction authentication processing method provided by the embodiment of the present invention, such as image 3 As shown, based on the second embodiment of the transaction authentication processing method of the present invention, in the third embodiment, before the above step 201, it also includes:
[0113] Step 205, verifying the user identity information according to the received user identity information verification request;
[0114] The above step 201 is specifically: after the identity information is verified, detect the business transaction request sent by the business application.
[0115] In this embodiment, the user identity is unique and can be identified and authenticated through biometric technology. The authentication method can be set according to actual needs. In this embodiment, preferably, the authentication process can be power-on authentication, and in other embodiments, it can also be startu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


