(19)
(11)EP 3 428 867 A1

(12)EUROPEAN PATENT APPLICATION
published in accordance with Art. 153(4) EPC

(43)Date of publication:
16.01.2019 Bulletin 2019/03

(21)Application number: 17762504.3

(22)Date of filing:  06.03.2017
(51)International Patent Classification (IPC): 
G06Q 20/40(2012.01)
H04B 13/00(2006.01)
G06Q 20/42(2012.01)
(86)International application number:
PCT/CN2017/075741
(87)International publication number:
WO 2017/152818 (14.09.2017 Gazette  2017/37)
(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
MA MD

(30)Priority: 07.03.2016 CN 201610127251

(71)Applicant: Tendyron Corporation
Beijing 100083 (CN)

(72)Inventor:
  • LI, Ming
    Beijing 100086 (CN)

(74)Representative: Maiwald Patent- und Rechtsanwaltsgesellschaft mbH 
Elisenhof Elisenstraße 3
80335 München
80335 München (DE)

  


(54)PAYMENT METHOD AND SYSTEM


(57) A payment method and system. The method comprises: after a biological limb enters a preset range of a payee device, the payee deice establishing a communication connection with a payer device through the biological limb (S101), and transmitting transaction information to the payer device through the communication connection (S102); the payer device receiving the transaction information, extracting key information from the transaction information (S103), and prompting the key information to wait for a user to confirm (S104), pand transmitting authentication information to the payee device through the communication connection after receiving a confirmation instruction of the user (S105); the payee device receiving the authentication information transmitted by the payer device through the communication connection, wherein the authentication information comprises digital authentication information, and acquiring biological characteristic information about the biological limb during a time duration when the biological limb enters the preset range of the payee device (S106); and the payee device acquiring an authentication result for the authentication of the digital authentication information and the biological characteristic information (S107), and performing payment transaction under the condition that the authentication result is that the authentication is passed (S108).




Description

CROSS-REFERENCE TO RELATED APPLICATION



[0001] This application claims priority to and based on Chinese Patent Application No. 201610127251.5, filed with the State Intellectual Property Office of P. R. China on March 07, 2016, the entire contents of which are incorporated herein by reference.

TECHNICAL FIELD



[0002] The present disclosure relates to the field of electronic technologies, and particular to, a payment method and a payment system.

BACKGROUND



[0003] Electronic payment has advantages of safety, high-speed and reliability, compared with cash-based payment. As a payment terminal, Point of Sale (POS for short) machines are widely used for the electronic payment. Existing POS machines read information of a cardholder recorded by a magnetic stripe of a bank card through a card reader. A transaction amount is inputted by a POS operator. The cardholder swipes the bank card on the POS machine and enters a password. The POS machine uploads related information to a bank's background to complete the transaction online. It can be seen that in the existing electronic payment process, the user needs to perform two operations. The first operation is to put the bank card on the POS machine to such that the bank card establishes a connection with the POS machine, and the second operation is to input the password. Therefore, the operation process is complicated.

SUMMARY



[0004] The present disclosure aims to solve one of the above technical problems.

[0005] A main objective of the present disclosure is to provide a payment method.

[0006] Another objective of the present disclosure is to provide a payment system.

[0007] In order to achieve the above objectives, technical solutions of the present disclosure are described as follows.

[0008] Embodiments of a first aspect of the present disclosure provide a payment method. The payment method includes after a biological body enters a predetermined range of a payee device, establishing by the payee device, a communication connection with a payer device through the biological body; sending by the payee device, transaction information to the payer device through the communication connection; receiving by the payer device, the transaction information; extracting by the payer device, key information from the transaction information; prompting the key information by the payer device, and waiting for a confirmation from a user; after receiving by the payer device, a confirmation instruction from the user, sending by the payer device, authentication information to the payee device through the communication connection; receiving by the payee device, the authentication information sent by the payer device through the communication connection, the authentication information including digital authentication information; during a duration when the biological body is within the predetermined range of the payee device, collecting by the payee device, biological feature information of the biological body; acquiring by the payee device, an authentication result of authenticating the digital authentication information and the biological feature information; and performing by the payee device, a payment transaction when the authentication result is a successful authentication.

[0009] Alternatively, the biological feature information includes fingerprint information and/or vein information; and
collecting by the payee device, the biological feature information of the biological body includes: when the biological body contacts with the payee device, collecting by the payee device the biological feature information of a portion where the biological body contacts with the payee device.

[0010] Alternatively, the digital authentication information includes at least one of: electronic signature information, encrypted information and one-time password.

[0011] Embodiments of a second aspect of the present disclosure provide a payment system. The payment system includes a payee device and a payer device, in which payee device is configured to establish a communication connection with the payer device through a biological body when the biological body enters a predetermined range of the payee device, and to send transaction information to the payer device through the communication connection; the payer device is configured to receive the transaction information, to extract key information from the transaction information, to prompt the key information and wait for a confirmation from a user, and to send authentication information to the payee device through the communication connection after receiving a confirmation instruction from the user; the payee device is further configured to receive the authentication information sent by the payer device through the communication connection, the authentication information including digital authentication information, to collect biological feature information of the biological body during a duration when the biological body is within the predetermined range of the payee device, to acquire an authentication result of authenticating the digital authentication information and the biological feature information, and to perform a payment transaction when the authentication result is a successful authentication.

[0012] Alternatively, the biological feature information includes fingerprint information and/or vein information; and the payee device is further configured to collect the biological feature information of the biological body by acts of: when the biological body contacts with the payee device, collecting by the payee device, the biological feature information of a portion where the biological body contacts with the payee device.

[0013] Alternatively, the digital authentication information includes at least one of: electronic signature information, encrypted information and one-time password.

[0014] As can be seen from the above technical solutions provided in embodiments of the present disclosure that, the payment method and the payment system provided in the present disclosure transmit the transaction information and to-be-authenticated information using intra-body communication. The payment is done after the to-be-authenticated information is successful authenticated. From a perspective of the user, only a single operation is performed, and the digital authentication information and the biological feature information are simultaneously acquired by the payee device, which is easy and convenient. A dual authentication of the digital authentication information and the biological feature information may be safer and more reliable, thereby reducing a probability that an actually legal user is identified unsuccessfully, and improving user experience.

[0015] The above and other objectives, advantages and features of the present invention will become more apparent to one of ordinary skill in the art from following detailed descriptions of the embodiments of the present invention in combination with accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS



[0016] Hereinafter, some specific embodiments of the present invention will be described in detail, by way of example and not limitation, with reference to the drawings. Same or similar parts or portions are labelled with same reference numbers in the drawings. It may be understood by those skilled in the art that the drawings are not necessarily drawn to scale, in which:

Fig. 1 is a flow chart illustrating a payment method provided in embodiment 1 of the present disclosure; and

Fig. 2 is a structural schematic diagram illustrating a payment system provided in embodiment 2 of the present disclosure.


DETAILED DESCRIPTION



[0017] Intra-body communication becomes an emerging short-distance communication technology that is mainly used to solve a communication problem in the body area network by taking a body as a carrier. The body is used as a transmission medium for electrical signals, realizing information interaction among medical equipment arranged at surface of the body, inside the body and around the body (within 3∼5 meters from the body). Compared with conventional wireless communication technologies such as Bluetooth, Wireless Fidelity (WIFI for short), radio-frequency (RF for short), infrared communications or the like, signals are insusceptible of electromagnetic noise when transmitting through the body during the intra-body communication, thereby having low power consumption, high confidentiality and lower damage on the body. In addition, without a reduced efficiency caused by a multi-parties communication, a redundant wired connection inherent in a wired communication method can be avoided. Based on this, the present disclosure provides a payment method. The payment method communicates transaction information and to-be-authenticated information using the intra-body communication, and the payment is done after the to-be authenticated information is successfully authenticated. From a perspective of users, only a single operation is performed, and digital authentication information and biological feature information are simultaneously acquires by a payee device, which is quick and convenient. A dual authentication of the digital authentication information and the biological feature information may be safer and reliable, thereby reducing a probability that an actually legal user is identified unsuccessfully, and improving user experience.

[0018] Embodiments of the present disclosure will be further described in detail below with reference to the drawings.

Embodiment 1



[0019] Embodiments of the present disclosure provide a payment method, as illustrated in Fig. 1. The payment method includes blocks S101 to S108.

[0020] In block S101, when a biological body enters a predetermined range of a payee device, the payee device establishes a communication connection with a payer device using the biological body.

[0021] In embodiments, the biological body generally refers to a human body. The payee device may be a payment terminal connected with a background via network, such as a POS machine, a code scanning terminal having an Alipay application, a mobile terminal, a personal digital assistance (PDA for short), a desktop computer, a laptop computer or the like. The payer device may be a device inserted into the human body, a device worn on the human body or a device placed in clothes worn by the human body. The device inserted into the human body may be for example a blood flow transducer, a pulse transducer, a body temperature transducer or the like. The device worn on the human body may be for example an electronic device wearable on the human body, such as a wrist strap, a wrist-watch, a necklace, a ring, a belt or the like. When the payer device is the device worn on the human body, a distance between the payer device and the surface of the human body (such as skin) is restricted to be within a predetermined distance (such as several millimeters), even though the payer device does not directly contact with the surface of the human body, to ensure a quality of communication when the payment device placed within the predetermined range communicates with the human body. The body area network (BAN for short) is a communication network centered to the human body and consisted of network elements related to the human body (including a personal terminal, transducers arranged on the human body, in the clothes, within a range from the human body (such as 3-5 meters), or even inside the human body, or networking equipment). Therefore, when a network element related to the human body enters the predetermined range of the payee device, the communication connection based on the body area network may be established.

[0022] As an alternative implementation of embodiments, establishing the communication connection by the payee device with the payer device using the biological body may be in a wired manner and in a wireless manner. Specifically, the establishing may be implemented in at least one of the above wired manner and the wireless manner.

[0023] The wired manner is described as follows.

[0024] Electrodes are arranged in both the payee device and the payer device. When the payee device contacts with the biological body (such as the human body) where the payer device is inserted or worn (for example, a user wearing the wrist-watch contacts with the POS machine using his finger), the human body is used as a conductor to form a conductive path inside the human body by connecting the electrodes of the payee device and the payer device. That is, the communication connection is established in the wired manner. In this manner, the payee device needs to contacts with the human body carrying the payer device.

[0025] The wireless manner is described as follows.

[0026] In the wireless manner, both of the payee device and the payer device (such as the POS machine and the wrist-watch) may detect whether an electric field changes. When one of the payee device and the payer device enters an allowable range of the intra-body communication, the other one may detect a change in field strength of the electric field and establish the communication connection therewith. Specifically, taking the payer device as an example, the payer device is worn on the human body or inserted into the human body, and an electric field is generated due to oscillation of a transmitter of the payer device. When a distance between the payer device and the payee device is within the allowable range of the intra-body communication, a receiver of the payee device may detect a change in the electric field and establish the communication connection with the payer device. In this manner, the payee device does not need to contact with the human body carrying the payer device.

[0027] The above manners utilize the human body as a transmission medium of an electrical signal, realizing the information interaction among devices arranged at the surface of the body, inside the body and near the body (such as within 3 to 5 meters from the body). Compared with the conventional wireless communication technologies, such as Bluetooth, WIFI, RF, infrared communications or the like, signals are less susceptible of electromagnetic noise when transmitting through the body during the intra-body communication, thereby having low power consumption, high confidentiality and lower damage on the body. In addition, without a reduced efficiency caused by a multi-parties communication, a redundant wired connection inherent in a wired communication method can be avoided.

[0028] In block S102, the payee device sends transaction information to the payer device through the communication connection.

[0029] In embodiments, the transaction information may include transaction amounts, payee account information and payer account information. When a high amount occurs in the transaction, the payee device needs to send the transaction information to the payer device, to inform the user of the transaction information. After the user confirms the transaction information, the payment flow may be preceded.

[0030] In addition, in practical implementations, the payer device may be a single device, such as a wrist-watch, or may include two separate devices, such as the wrist-watch and an electronic signature device (such as a Key Token of Industrial and Commercial Bank of China, a Key Token of Agricultural Bank of China or a smart card having signature function).

[0031] In block S103, the payer device receives the transaction information and extracts key information from the transaction information.

[0032] In embodiments, the payer device may extract the key information (such as transaction amount, a name of the payee device, a name of the payer device, or the like) from the transaction information, without the requirement of prompting the entire transaction information. Specifically, prompting the key information may be done by displaying it on a display screen or by playing it in voice. Particularly, a limitation that it is unable to display the entire transaction information due to a small display screen of a miniature device having the small display screen (for example the wrist-watch having the small display screen) may be overcome. As long as the key information is displayed, it may be realized to inform the user.

[0033] In block S104, the payer device prompts the key information and waits for a confirmation of the user.

[0034] In embodiments, by adding a confirmation step from the user, safety of the transaction may be improved. After the confirmation from the user by pressing a confirmation key via the user, subsequent operations may be operated. Particularly, when the payer device includes two separate devices, informing the user may be implemented by prompting the key information by any one of the two separate devices, certainly preferably, prompting by the electronic signature device.

[0035] In block S105, after receiving a confirmation instruction from the user, the payer device sends authentication information to the payee device through the communication connection.

[0036] In embodiments, the authentication information includes digital authentication information. The digital authentication information includes at least one of electronic signature information, encrypted information and one-time password. The electronic signature information is signature data obtained by signing to-be-signed data via the payer device using its privacy key. The to-be-signed data includes one-time authentication data, authentication identification information and the like. When the electronic signature information is authenticated, a public key of the payer device is acquired, and the electronic signature information is verified using the public key. When the electronic signature information is verified successfully, it is indicated that the authentication is successful. The above method for authentication is called as an asymmetric authentication method. The encrypted information is a MAC value obtained by calculating to-be-encrypted data via the payer device using a symmetric key negotiated with the payee device. When the encrypted information is authenticated, a verified MAC value is obtained by calculating the to-be-encrypted data using a symmetric key and the verified MAC value is compared with the encrypted information. When the encrypted information is identical to the verified MAC value, the authentication is successful. The above method for authentication is called as a symmetric authentication method. The one-time password is ciphertext generated by a one-time password generator (OTP for short) based on a seed key. When the one-time password is authenticated, a verified value is obtained by performing a calculation using the seed key, and the verified value is compared with the one-time password. When the one-time password is identical to the verified value, it is indicated that the authentication is successful. The above method for authentication is called as a token-based authentication method. In embodiments, the authentication of the digital authentication information may be realized in any one of above-mentioned three methods, to ensure legality of the payer device.

[0037] In an alternative implementation of embodiments, the authentication information may further include authentication identification information. The authentication identification information may be for example a device identification of the payer device, a user identity (ID) or other information that may uniquely identify the user. Through the authentication identification information, an authentication factor which is used for authenticating the digital authentication information and the biological feature information may be linked to. Therefore, the dual authentication of the digital authentication information and the biological feature information is realized using the authentication factor. Thus, after the dual authentication, it may be determined that the biological feature information and the digital authentication information are from a same user, to ensure legality of the user.

[0038] In block S106, the payee device receives the authentication information transmitted by the payer device through the communication connection. During a duration when the biological body is within the predetermined rang of the payee device, the biological feature information of the biological body is collected.

[0039] The biological feature information includes at least one of: fingerprint information, iris information, facial information and vein information. In embodiments, the payee device collects the biological feature information of the human body while receiving the authentication information sent by the payer device. For example, during a short time duration (such as 3 seconds) when the user touches a touch component of the POS machine with his finger, the communication connection is established, by aid of the human body, between the POS machine and the wrist-watch worn by the user. The authentication information is transmitted through the communication connection established while the touch component of the POS machine collects the fingerprint information. As another example, during a duration when the communication connection is established between the wrist-watch worn by the user and a payment terminal installing an Alipay application (the payment terminal has a capability of photographing for use of collecting the facial information), the facial information is collected through the payment terminal. Therefore, both of the authentication information and the biological feature information may be simultaneously acquired by the payee device at once, making operations easy and convenient.

[0040] In embodiments, it is possible to collect the biological feature information during the duration when the biological body enters the predetermined range of the payee device. The biological feature information may be collected before, when or after the communication connection is established.

[0041] In this block, particularly, in a case that it is required to contact the biological body with the payee device to collect the biological feature information, as an alternative implementation, the biological feature information includes the fingerprint information and/or the vein information. Collecting the biological feature information of the biological body includes when the biological body contacts with the payee device, collecting the biological feature information of a portion that the biological body touches the payee device.

[0042] In related arts, with a method of inputting a fingerprint and a PIN code on the POS machine, the user is informed by the POS machine to input the fingerprint information, such that the fingerprint information is collected. The user is then informed to input the PIN code. Therefore, two interactions between the user and the POS machine are required to input the fingerprint information and the PIN code, which is relatively cumbersome. Compared with the above-mentioned method, in the present disclosure, only one interaction is required from the perspective of the user to input the authentication information and collect the biological feature information simultaneously at once, which is easy and convenient.

[0043] In block S107, an authentication result of authenticating the digital authentication information and the biological feature information is acquired.

[0044] In embodiments, the authentication result of authenticating the digital authentication information and the biological feature information includes an authentication result of authenticating the digital authentication information using the authentication factor and an authentication result of authenticating the biological feature information using biological feature verification information after acquiring the authentication factor and the biological feature verification information based on the authentication identification information. The authentication factor mainly includes verification information of verifying the digital authentication information. The authentication factor and the biological feature verification information are uniquely linked to the authentication identification information. Therefore, the authentication factor and the biological feature verification information both corresponding to the user may be uniquely determined based on the authentication identification information, such that the legality of the user may be ensured after the dual authentication of the digital authentication information and the biological feature information are successful.

[0045] In this block, authenticating the digital authentication information using the authentication factor at least includes one of the followings.

[0046] Manner one is the asymmetric authentication manner. In this manner, the digital authentication information includes the electronic signature information, and the authentication factor includes the public key for verifying the electronic signature information.

[0047] Alternatively, manner two is the symmetric authentication manner. In this manner, the digital authentication information includes encrypted information obtained by performing a calculation using the symmetric key, and the authentication factor includes the symmetric key.

[0048] Alternatively, manner three is the token-based authentication manner. In this manner, the digital authentication information includes the one-time password, and the authentication factor includes a seed key for verifying the one-time password.

[0049] The above three manners for authenticating the digital authentication information are described in block S105, which are not elaborated herein.

[0050] In this block, authenticating the digital authentication information using the authentication factor and authenticating the biological feature information using the biological feature verification information includes the followings. The digital authentication information is authenticated using the authentication factor and it is judged whether a match ratio between the biological feature verification information and the biological feature information is greater than a first predetermined value. When the match ratio between the biological feature verification information and the biological feature information is greater than the first predetermined value, and the digital authentication information is successfully authenticated, it is determined that the authentications of the authentication information and the biological feature information are successful.

[0051] The first predetermined value is less than a second predetermined value which is used to indicate a match ratio that two pieces of biological feature information are identical to each other. In practical implementations, the second predetermined value may be in theory a similarity degree required when the two pieces of biological feature information are entirely identical to each other, such as 99%. Since the first predetermined value may be less than the second predetermined value, a probability that an actually legal user is identified unsuccessfully in the biological feature information authentication technology may be reduced by decreasing the match ratio.

[0052] In related arts, it is possible to identify the actually legal user unsuccessfully and to identify an illegal user successfully with the biological feature information authentication technology. Taking the fingerprint recognition as an example, in one case, the fingerprint of the user is generally legal. However, the fingerprint is identified unsuccessfully by the authentication device and is identified as a fake fingerprint by mistake. As a result, the authentication is unsuccessful and the payment transaction may not be done. In another case, the fingerprint of an illegal user is authenticated successfully by the authentication device even if the fingerprint is fake, causing economic losses subjected by the user. In addition, the probability of the latter case is generally very high. With the embodiments, the dual authentication of the digital authentication information and the biological feature information may avoid a case that the illegal user is identified successfully, and may reduce the probability that the actually legal user is identified unsuccessfully. It may be determined that a user is legal by authenticating the digital authentication information in the above three manners, since the digital authentication information cannot identified successfully for the illegal user. Therefore, the authentication of the fake fingerprint may be avoided, and the case that the illegal user is identified successfully may be avoided. When the user is legal, the authentication device may reduce the similar degree of matching the two pieces biological feature information to each other, so as to reduce the probability of unsuccessfully identifying the actually legal user. For example in theory, when the two pieces of biological feature information are matched to each other, the similarity degree is at least 99% (the second predetermined value). Therefore, if the similarity degree acquired by the authentication device is only 90%, the two pieces of biological feature information are identified as mismatched. That is, the authentication is unsuccessful, and the case that the true fingerprint is identified as the fake fingerprint occurs. In the present disclosure, since it may be ensured that the user is legal through the authentication of the digital authentication information, the similarity degree required for determining that the two pieces of biological feature information are matched to each other may be reduced to 80% (the first predetermined value) from the similarity degree required for completely matching. That is to say, when the similarity degree is 80% (the first predetermined value), it may be determined that the two pieces of biological feature information are matched to each other. Therefore, when the similarity degree between the two pieces of biological feature information is 90%, the authentication is successful. Thus, the case that the actually legal user is identified unsuccessfully may be avoided, thereby decreasing the probability of identifying the actually legal user unsuccessfully with the biological feature information authentication technology.

[0053] In block S108, the payee device preforms the payment transaction when the authentication result is a successful authentication.

[0054] With the payment method provided in embodiments, the transaction information and the to-be-authenticated information are transmitted with the intra-body communication, and the payment is done after the to-be-authenticated information is authenticated successful. From the perspective of the user, only a single operation is performed. The digital authentication information and the biological feature information may be acquired simultaneously by the payee device, which is easy and convenient. The dual authentication of the digital authentication information and the biological feature information may be safer and more reliable, which reduces the probability that the actually legal user is identified unsuccessfully, thereby improving user experience.

Embodiment 2



[0055] Embodiments of the present disclosure provide a payment system. As illustrated in Fig. 2, the payment system includes a payee device 10 and a payer device 20.

[0056] The payee device 10 is configured to establish a communication connection with the payer device 20 through a biological body when the biological body enters a predetermined range of the payee device 10, and to send transaction information to the payer device 20 through the communication connection. The payer device 20 is configured to receive the transaction information, to extract key information from the transaction information, to prompt the key information, and to wait for a confirmation from the user. After a confirmation instruction is received from the user, the payer device 20 is configured to send authentication information to the payee device 10 through the communication connection. The payee device 10 is further configured to receive the authentication information sent by the payer device 20 through the communication connection. During a duration when the biological body is within the predetermined range of the payee device 10, the payee device 10 is further configured to collect biological feature information of the biological body. The payee device 10 is further configured to acquire an authentication result of authenticating digital authentication information and the biological feature information, and to perform the payment transaction when the authentication result is a successful authentication.

[0057] With the payment system provided in embodiments, the transaction information and the to-be-authenticated information are transmitted with the intra-body communication, and the payment is done after the to-be-authenticated information is authenticated successful. From the perspective of the user, only a single operation is performed. The digital authentication information and the biological feature information may be acquired simultaneously by the payee device, which is easy and convenient. The dual authentication of the digital authentication information and the biological feature information may be safer and more reliable, which reduces the probability that the actually legal user is identified unsuccessfully, thereby improving user experience.

[0058] In embodiments, the biological body generally refers to a human body. The payee device may be a payment terminal connected with a background via network, such as a POS machine, a code scanning terminal having an Alipay application, a mobile terminal, a PDA, a desktop computer, a laptop computer or the like. The payer device may be a device inserted into the human body, a device worn on the human body or a device placed in clothes worn by the human body. The device inserted into the human body may be for example a blood flow transducer, a pulse transducer, a body temperature transducer or the like. The device worn on the human body may be for example an electronic device wearable on the human body, such as a wrist strap, a wrist-watch, a necklace, a ring, a belt or the like. When the payer device is the device worn on the human body, a distance between the payer device and the surface of the human body (such as skin) is restricted to be within a predetermined distance (such as several millimeters), even though the payer device does not directly contact with the surface of the human body, to ensure a quality of communication when the payment device placed within the predetermined range communicates with the human body. The body area network (BAN for short) is a communication network centered to the human body and consisted of network elements related to the human body (including a personal terminal, transducers arranged on the human body, in the clothes, within a range from the human body (such as 3-5 meters), or even inside the human body, or networking equipment). Therefore, when a network element related to the human body enters the predetermined range of the payee device, the communication connection based on the body area network may be established.

[0059] As an alternative implementation of embodiments, the payee device 10 is configured to establish a communication connection with the payer device 20 through the biological body in a wired manner and in a wireless manner. Specifically, the establishing may be implemented in at least one of the wired manner and the wireless manner.

[0060] Wired manner is described as follows.

[0061] Electrodes are arranged in both the payee device 10 and the payer device 20. When the payee device 10 contacts with the biological body (such as the human body) where the payer device 20 is inserted in the human body or worn on the human body (for example, the user wearing the wrist-watch contacts with the POS machine using his finger), the human body is used as a conductor to form a conductive path inside the human body by connecting the electrodes of the payee device 10 and the payer device 20. That is, the communication connection is established in the wired manner. In this manner, the payee device 10 needs to contacts with the human body carrying the payer device 20.

[0062] Wireless manner is described as follows.

[0063] In the wireless manner, both of the payee device 10 and the payer device (such as the POS machine and the wrist-watch) may detect whether an electric field changes. When one of the payee device 10 and the payee device 20 enters an allowable range of the intra-body communication, the other one may detect a change in field strength of the electric field and establish the communication connection therewith. Specifically, taking the payer device 20 as an example, the payer device 20 is worn on the human body or inserted in the human body, and an electric field is generated due to oscillation of a transmitter of the payer device 20. When a distance between the payer device 20 and the payee device 10 is within the allowable range of the intra-body communication, a receiver of the payee device 10 may detect a change in the electric field, and establish the communication connection with the payer device 20. In this manner, the payee device 10 does not need to contact with the human body carrying the payer device 20.

[0064] The above manners utilize the human body as a transmission medium of an electrical signal, realizing the information interaction among devices arranged at the surface of the body, in the body and near the body (such as within 3 to 5 meters from the human body). Compared with the conventional wireless communication technologies, such as Bluetooth, WIFI, RF, infrared communications or the like, signals are less susceptible of electromagnetic noise when transmitting through the body during the intra-body communication, thereby having low power consumption, high confidentiality and lower damage on the body. In addition, without a reduced efficiency caused by a multi-parties communication, a redundant wired connection inherent in a wired communication method can be avoided.

[0065] In embodiments, the transaction information may include transaction amounts, payee account information and payer account information. When a high amount occurs in the transaction, the payee device 10 needs to send the transaction information to the payer device 20, to inform the user of the transaction information. After the user confirms the transaction information, the payment flow may be preceded. In addition, in practical implementations, the payer device may be a single device, such as a wrist-watch, or may include two separate devices, such as the wrist-watch and an electronic signature device (such as a Key Token of Industrial and Commercial Bank of China, a Key Token of Agricultural Bank of China or a smart card having signature function).

[0066] In embodiments, the payer device 20 may extract the key information (such as transaction amount, a name of the payee device, a name of the payer device, or the like) from the transaction information, without the requirement of prompting the entire transaction information. Specifically, prompting the key information may be done by displaying it on a display screen or by playing it in voice. Particularly, a limitation that it is unable to display the entire transaction information due to a small display screen of a miniature device having the small display screen (for example the wrist-watch having the small display screen) may be overcome. As long as the key information is displayed, it may be realized to inform the user.

[0067] In embodiments, the payer device 20 is further configured to inform the user of the key information. By adding a confirmation step from the user, safety of the transaction may be improved. After the confirmation from the user by pressing a confirmation key via the user, subsequent operations may be operated. Particularly, when the payer device includes two separate devices, informing the user may be implemented by prompting the key information on any one of the two separate devices, certainly preferably, prompting on the electronic signature device.

[0068] In embodiments, the authentication information includes digital authentication information. The digital authentication information includes at least one of electronic signature information, encrypted information and one-time password. The electronic signature information is signature data obtained by signing to-be-signed data via the payer device 20 using its privacy key. The to-be-signed data includes one-time authentication data, authentication identification information and the like. When the electronic signature information is authenticated, a public key of the payer device 20 is acquired, and the electronic signature information is verified using the public key. When the electronic signature information is verified successfully, it is indicated that the authentication is successful. The above method for authentication is called as an asymmetric authentication method. The encrypted information is a MAC value obtained by calculating to-be-encrypted data via the payer device 20 using a symmetric key negotiated with the payee device 10. When the encrypted information is authenticated, a verified MAC value is obtained by calculating the to-be-encrypted data using a symmetric key and the verified MAC value is compared with the encrypted information. When the encrypted information is identical to the verified MAC value, the authentication is successful. The above method for authentication is called as a symmetric authentication method. The one-time password is ciphertext generated by a one-time password generator (OTP for short) based on a seed key. When the one-time password is authenticated, a verified value is obtained by performing a calculation using the seed key, and the verified value is compared with the one-time password. When the one-time password is identical to the verified value, it is indicated that the authentication is successful. The above method for authentication is called as a token-based authentication method. In embodiments, the authentication of the digital authentication information may be realized in any one of above-mentioned three methods, to ensure legality of the payer device 20.

[0069] In embodiments, as an alternative implementation, the authentication information may further include authentication identification information. The authentication identification information may be for example a device identification of the payer device 20, a user identity (ID) or other information that may uniquely identify the user. Through the authentication identification information, an authentication factor which is used for authenticating the digital authentication information and the biological feature information may be linked to. Therefore, the dual authentication of the digital authentication information and the biological feature information is realized using the authentication factor. Thus, after the dual authentication, it may be determined that the biological feature information and the digital authentication information are from a same user, to ensure legality of the user.

[0070] In embodiments, the payee device 10 is further configured to collect the biological feature information of the biological body during duration when the biological body is within the predetermined rang of the payee device 10. The biological feature information includes at least one of: fingerprint information, iris information, facial information and vein information. In embodiments, the payee device 10 collects the biological feature information of the human body while receiving the authentication information sent by the payer device 20. For example, during a short time duration (such as 3 seconds) when the user touches a touch component of the POS machine with his finger, the communication connection is established, by aid of the human body, between the POS machine and the wrist-watch worn by the user. The authentication information is transmitted through the communication connection established while the touch component of the POS machine collects the fingerprint information. As another example, during a duration when the communication connection is established between the wrist-watch worn by the user and a payment terminal installing an Alipay application (the payment terminal has a capability of photographing for use of collecting the facial information), the facial information is collected through the payment terminal. Therefore, both of the authentication information and the biological feature information may be simultaneously acquired by the payee device 10 at once, making operations easy and convenient.

[0071] In embodiments, it is possible to collect the biological feature information during the duration when the biological body enters the predetermined range of the payee device. The biological feature information may be collected before, when or after the communication connection is established.

[0072] Particularly, in a case that it is required to contact the biological body with the payee device 10 to collect the biological feature information, as an alternative implementation, the biological feature information includes the fingerprint information and/or the vein information. Collecting by the payee device 10 the biological feature information of the biological body includes when the biological body contacts with the payee device 10, collecting by the payee device 10 the biological feature information of a portion that the biological body touches the payee device 10.

[0073] In related arts, with a method of inputting a fingerprint and a PIN code on the POS machine, the user is informed by the POS machine to input the fingerprint information, such that the fingerprint information is collected. The user is then informed to input the PIN code. Therefore, two interactions between the user and the POS machine are required to input the fingerprint information and the PIN code, which is relatively cumbersome. Compared with the above-mentioned method, in the present disclosure, only one interaction is required from the perspective of the user to input the authentication information and collect the biological feature information simultaneously at once, which is easy and convenient.

[0074] In embodiments, the authentication result of authenticating the digital authentication information and the biological feature information includes an authentication result of authenticating the digital authentication information using the authentication factor and an authentication result of authenticating the biological feature information using biological feature verification information after acquiring the authentication factor and the biological feature verification information based on the authentication identification information. The authentication factor mainly includes biological feature verification information and verification information of verifying the digital authentication information. The authentication factor is uniquely linked to the authentication identification information. Therefore, the authentication factor corresponding to the user may be uniquely determined based on the authentication identification information, such that the legality of the user may be ensured after the dual authentication of the digital authentication information and the biological feature information is successful.

[0075] In an alternative implementation of embodiments, authenticating the digital authentication information using the authentication factor at least includes one of the followings.

[0076] Manner one is the asymmetric authentication manner. In this manner, the digital authentication information includes the electronic signature information, and the authentication factor includes the public key for verifying the electronic signature information.

[0077] Alternatively, manner two is the symmetric authentication manner. In this manner, the digital authentication information includes encrypted information obtained by performing a calculation using the symmetric key, and the authentication factor includes the symmetric key.

[0078] Alternatively, manner three is the token-based authentication manner. In this manner, the digital authentication information includes the one-time password, and the authentication factor includes a seed key for verifying the one-time password.

[0079] The above three manners for authenticating the digital authentication information are described already, which are not elaborated herein.

[0080] As an alternative implementation, authenticating the digital authentication information using the authentication factor and authenticating the biological feature information using the biological feature verification information includes the followings. The digital authentication information is authenticated using the authentication factor and it is judged whether a match ratio between the biological feature verification information and the biological feature information is greater than a first predetermined value. When the match ratio between the biological feature verification information and the biological feature information is greater than the first predetermined value, it is determined that the authentications of the authentication information and the biological feature information are successful. As another alternative implementation, authenticating the digital authentication information and the biological feature information using the authentication factor includes the followings. The digital authentication information is authenticated using the authentication factor. After the authentication is successful, it is judged whether a match ratio between the biological feature verification information and the biological feature information is greater than the first predetermined value. When the match ratio between the biological feature verification information and the biological feature information is greater than the first predetermined value, it is determined that the authentications of the authentication information and the biological feature information are successful.

[0081] The first predetermined value is less than a second predetermined value which is used to indicate a match ratio that two pieces of biological feature information are identical to each other. In practical implementations, the second predetermined value may be in theory a similarity degree required when the two pieces of biological feature information are entirely identical to each other, such as 99%. Since the first predetermined value may be less than the second predetermined value, a probability that an actually legal user is identified unsuccessfully in the biological feature information authentication technology may be reduced by decreasing the match ratio.

[0082] In related arts, it is possible to identify the actually legal user unsuccessfully and to identify an illegal user successfully with the biological feature information authentication technology. Taking the fingerprint recognition as an example, in one case, the fingerprint of the user is generally legal. However, the fingerprint is identified unsuccessfully by the authentication device and is identified as a fake fingerprint by mistake. As a result, the authentication is unsuccessful and the payment transaction may not be done. In another case, the fingerprint of an illegal user is authenticated successfully by the authentication device even if the fingerprint is fake, causing economic losses subjected by the user. In addition, the probability of the latter case is generally very high. With the embodiments, the dual authentication of the digital authentication information and the biological feature information may avoid a case that the illegal user is identified successfully, and may reduce the probability that the actually legal user is identified unsuccessfully. It may be determined that a user is legal by authenticating the digital authentication information in the above three manners, since the digital authentication information cannot identified successfully for the illegal user. Therefore, the authentication of the fake fingerprint may be avoided, and the case that the illegal user is identified successfully may be avoided. When the user is legal, the authentication device may reduce the similar degree of matching the two pieces biological feature information to each other, so as to reduce the probability of unsuccessfully identifying the actually legal user. For example in theory, when the two pieces of biological feature information are matched to each other, the similarity degree is at least 99% (the second predetermined value). Therefore, if the similarity degree acquired by the authentication device is only 90%, the two pieces of biological feature information are identified as mismatched. That is, the authentication is unsuccessful, and the case that the true fingerprint is identified as the fake fingerprint occurs. In the present disclosure, since it may be ensured that the user is legal through the authentication of the digital authentication information, the similarity degree required for determining that the two pieces of biological feature information are matched to each other may be reduced to 80% (the first predetermined value) from the similarity degree required for completely matching. That is to say, when the similarity degree is 80% (the first predetermined value), it may be determined that the two pieces of biological feature information are matched to each other. Therefore, when the similarity degree between the two pieces of biological feature information is 90%, the authentication is successful. Thus, the case that the actually legal user is identified unsuccessfully may be avoided, thereby decreasing the probability of identifying the actually legal user unsuccessfully with the biological feature information authentication technology.

[0083] With the payment system provided in embodiments, the transaction information and the to-be-authenticated information are transmitted with the intra-body communication, and the payment is done after the to-be-authenticated information is authenticated successful. From the perspective of the user, only a single operation is performed. The digital authentication information and the biological feature information may be acquired simultaneously by the payee device, which is easy and convenient. The dual authentication of the digital authentication information and the biological feature information may be safer and more reliable, which reduces the probability that the actually legal user is identified unsuccessfully, thereby improving user experience.

[0084] Embodiments of the present disclosure provide a computer program. When the computer program is running on a processor, the above payment authentication device is performed.

[0085] Any process or method described in a flow chart or described herein in other ways may be understood to include one or more modules, segments or portions of codes of executable instructions for achieving specific logical functions or steps in the process, and the scope of a preferred embodiment of the present disclosure includes other implementations, which should be understood by those skilled in the art.

[0086] It should be understood that each part of the present disclosure may be realized by the hardware, software, firmware or their combination. In the above embodiments, a plurality of steps or methods may be realized by the software or firmware stored in the memory and executed by the appropriate instruction execution system. For example, if it is realized by the hardware, likewise in another embodiment, the steps or methods may be realized by one or a combination of the following techniques known in the art: a discrete logic circuit having a logic gate circuit for realizing a logic function of a data signal, an application-specific integrated circuit having an appropriate combination logic gate circuit, a programmable gate array (PGA), a field programmable gate array (FPGA), etc.

[0087] Those skilled in the art shall understand that all or parts of the steps in the above exemplifying method of the present disclosure may be achieved by commanding the related hardware with programs. The programs may be stored in a computer readable storage medium, and the programs comprise one or a combination of the steps in the method embodiments of the present disclosure when run on a computer.

[0088] In addition, each function cell of the embodiments of the present disclosure may be integrated in a processing module, or these cells may be separate physical existence, or two or more cells are integrated in a processing module. The integrated module may be realized in a form of hardware or in a form of software function modules. When the integrated module is realized in a form of software function module and is sold or used as a standalone product, the integrated module may be stored in a computer readable storage medium.

[0089] The storage medium mentioned above may be read-only memories, magnetic disks or CD, etc.

[0090] Reference throughout this specification to "an embodiment," "some embodiments," "example," "a specific example," or "some examples," means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present disclosure. Thus, the exemplary descriptions of the phrases are not necessarily referring to the same embodiment or example of the present disclosure. Furthermore, the particular features, structures, materials, or characteristics may be combined in any suitable manner in one or more embodiments or examples.

[0091] Although embodiments of the present disclosure have been shown and described, it would be understood that the above embodiments are exemplary and cannot be construed to limit the present disclosure, and those skilled in the art can make changes, alternatives, replacements and modifications in the embodiments without departing from principles and scope of the present disclosure. The scope of the present disclosure is defined by the claims and their equivalents.


Claims

1. A payment method, comprising:

after a biological body enters a predetermined range of a payee device, establishing by the payee device, a communication connection with a payer device through the biological body;

sending by the payee device, transaction information to the payer device through the communication connection;

receiving by the payer device, the transaction information;

extracting by the payer device, key information from the transaction information;

prompting by the payer device, the key information and waiting for a confirmation from a user;

after receiving by the payer device, a confirmation instruction from the user, sending by the payer device, authentication information to the payee device through the communication connection, the authentication information comprising digital authentication information;

receiving by the payee device, the authentication information sent by the payer device through the communication connection;

during a duration when the biological body is within the predetermined range of the payee device, collecting by the payee device, biological feature information of the biological body;

acquiring by the payee device, an authentication result of authenticating the digital authentication information and the biological feature information; and

performing by the payee device, a payment transaction when the authentication result is a successful authentication.


 
2. The payment method according to claim 1, wherein,
the biological feature information comprises fingerprint information and/or vein information; and
collecting, by the payee device, the biological feature information of the biological body comprises: when the biological body contacts with the payee device, collecting by the payee device, the biological feature information of a portion where the biological body contacts with the payee device.
 
3. The payment method according to claim 1 or 2, wherein,
the digital authentication information comprises at least one of: electronic signature information, encrypted information and one-time password.
 
4. A payment system, comprising a payee device and a payer device, wherein
the payee device is configured to establish a communication connection with the payer device through a biological body when the biological body enters a predetermined range of the payee device, and to send transaction information to the payer device through the communication connection;
the payer device is configured to receive the transaction information, to extract key information from the transaction information, to prompt the key information and wait for a confirmation from a user, and to send authentication information to the payee device through the communication connection after receiving a confirmation instruction from the user;
the payee device is further configured to receive the authentication information sent by the payer device through the communication connection, the authentication information comprising digital authentication information, to collect biological feature information of the biological body during a duration when the biological body is within the predetermined range of the payee device, to acquire an authentication result of authenticating the digital authentication information and the biological feature information, and to perform a payment transaction when the authentication result is a successful authentication.
 
5. The payment system according to claim 4, wherein,
the biological feature information comprises: fingerprint information and/or vein information;
the payee device is further configured to collect the biological feature information of the biological body by acts of: when the biological body contacts with the payee device, collecting by the payee device, the biological feature information of a portion where the biological body contacts with the payee device.
 
6. The payment system according to claim 4 or 5, wherein,
the digital authentication information comprises at least one of: electronic signature information, encrypted information and one-time password.
 
7. A computer program, wherein when the computer program is running on a processor, the payment method according to any one of claims 1 to 3 is executed.
 




Drawing







Search report










Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description