Unlock instant, AI-driven research and patent intelligence for your innovation.

Payment authentication method and device

A payment authentication and pending payment technology, applied in the payment system, payment system structure, instruments, etc., can solve the problems of inability to deal with payment authentication events and high risks, and achieve payment authentication events, ensure security, and ensure security Effect

Pending Publication Date: 2020-03-24
YGSOFT INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the existing payment authentication methods are risky and cannot cope with sudden payment authentication events.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Payment authentication method and device
  • Payment authentication method and device
  • Payment authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. In particular, the following examples are only used to illustrate the present invention, but not to limit the scope of the present invention. Likewise, the following embodiments are only some but not all of the embodiments of the present invention, and all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] The terms "first", "second", and "third" in the present invention are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, features defined as "first", "second", and "third" may explicitly or implicitly include at least one of these features. In the description of the present invention, "plurality" means at...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a payment authentication method and device. The safety of payment authentication can be ensured through double verification which includes identity verification and face verification and is carried out on to-be-paid equipment. Verification information of an authenticator, including a face visible light image and a face infrared image of the authenticator, can be effectivelycollected through a payment authentication device, whether the face verification information is correct or not is judged, a judgment result is fed back to the to-be-paid equipment, and payment is completed or payment authentication is terminated. According to the payment authentication method and device, the safety of payment authentication can be ensured, and an emergent payment authentication event can be effectively solved.

Description

technical field [0001] The invention relates to the technical field of secure payment authentication, in particular to a payment authentication method and device. Background technique [0002] Funding is one of the most important resources of a business. For a long time, capital risk and safety issues have been highly concerned and valued by various enterprises. [0003] At present, in the fund settlement business, personal authentication during fund payment is mainly through password authentication. Colleague password authentication also requires the assistance of a digital certificate, that is, USBKey. Therefore, using USBKey to input password authentication is a more common way to ensure fund security. However, in the process of USBKey storage and use, there are still situations such as USBKey borrowing and USBKey loss, and there is a risk of password leakage and affecting the security of corporate funds. In addition, when personnel in fund payment related positions tem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40
CPCG06Q20/40145G06Q20/4014
Inventor 罗远军吴燕青
Owner YGSOFT INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More