NL2019978B1 - Payment System with Multi-Biometric Composite Authentication and Crossvalidation - Google Patents
Payment System with Multi-Biometric Composite Authentication and Crossvalidation Download PDFInfo
- Publication number
- NL2019978B1 NL2019978B1 NL2019978A NL2019978A NL2019978B1 NL 2019978 B1 NL2019978 B1 NL 2019978B1 NL 2019978 A NL2019978 A NL 2019978A NL 2019978 A NL2019978 A NL 2019978A NL 2019978 B1 NL2019978 B1 NL 2019978B1
- Authority
- NL
- Netherlands
- Prior art keywords
- fingerprint
- finger vein
- information
- customer
- finger
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a payment system with multi-biometric composite authentication and cross-validation. Firstly, biometric authentication is employed to solve the inconvenience that consumers have to carry a bank card and enter a password for payment. Secondly, through composite authentication and cross-validation technologies allow consumers to accurately identify the legality ofPOS (point of sales) transaction equipment, creating safer and more convenient financial service for consumers and continuously improving customer experience. Thirdly, dustproof measures are adopted to well protect the sensors of payment device so as to prolong the service life and reduce the failure rate of equipment.
Description
Technical field
The invention relates to a payment authentication system, in particular to a payment system with multi-biometric composite authentication and cross-validation.
Background art
In recent years, with the high-speed increasing of China economy and continuous improvement of people’s living level, financial consumption payment means are more and more diverse, but generally, payment by using POS devices is still the mainstream payment means currently.
When customers use POS devices, the customers mainly use bank cards and passwords for payment. As bank cards need to be carried and might be forgotten or lost, and the payment passwords are usually composed of a string of simple digits that are low in safety coefficient, thus any unnecessary loss will be caused to bank customers once the payment passwords are divulged. For another, despite the current POS devices have adopted biological feature technologies like finger recognition, and authentication assisting means are added, the risk that fingerprint information may be stolen due to the fact that the customers cannot recognize fake POS or fraud POS exists, hence the safety still needs to be improved. In addition, the sensors of existing POS devices with a fingerprint recognition function are exposed outside and may be exposed to scratching or dust pollution, so that it will affect the bank cards service life and cause an increase of failure rate to a certain degree.
Therefore, banks need a payment device and system with multi-bio metric composite authentication and cross-validation. Firstly, biometric authentication is employed to solve the inconvenience that consumers have to carry a bank card and enter a password for payment. Secondly, through composite authentication and cross-validation technologies allow consumers to accurately identify the legality of POS (point of sales) transaction equipment, creating safer and more convenient financial service for consumers and continuously improving customer experience. Thirdly, dustproof measures are adopted to well protect the sensors of payment device so as to prolong the service life and reduce the failure rate of equipment.
Invention content
The invention discloses a payment system with multi-biometric composite authentication and cross-validation. Firstly, biometric authentication is employed to solve the inconvenience that consumers have to carry a bank card and enter a password for payment. Secondly, through composite authentication and cross-validation technologies allow consumers to accurately identify the legality of POS (point of sales) transaction equipment, creating safer and more convenient financial service for consumers and continuously improving customer experience. Thirdly, dustproof measures are adopted to well protect the sensors of payment device so as to prolong the service life and reduce the failure rate of equipment.
In order to solve the technical problems mentioning above, the invention adopts the following technical scheme:
The invention discloses a payment system with multi-biometric composite authentication and cross-validation. The payment system includes a payment device, which comprises a main control unit, a display unit, a keypad unit, a communication unit, a fingerprint recognition unit, a finger vein recognition unit, and a dustproof unit; the display unit, the keypad unit, the communication unit, the fingerprint recognition unit, the finger vein recognition unit and the dustproof unit are electrically connected with the main control unit.
The main control unit can process operation requests of the merchant and the customer, handle in real time according to the related business process. It communicates with, controls the wrork of, receives, processes, encrypts and decrypts of related information of the display unit, the keypad unit, the communication unit, the fingerprint recognition unit, the finger vein recognition unit, and the dustproof unit.
The display unit comprises an LCD screen and can be controlled by the main control unit to display numbers and Chinese character information.
The keypad unit comprises a digital functional keypad composed of a plurality of keys and can accept input of digits (1-9, 0, 00, decimal point) and functional keys (confirmation, cancellation and return) information and transmit the information to the main control unit.
The communication device is composed of an external antenna and a 2G/3G/4G module, and the main control unit communicates with the transaction server of the bank through the 2G/3G/4G module.
The finger recognition unit adopts a fingerprint recognition module with capacitive semiconductor sensor technology and is composed of a recognition chip, a semiconductor component and a fingerprint recognition LED indicator lamp.
The semiconductor component is mainly composed of a capacitive semiconductor sensor; a finger is fitted on a flat plate where thousands of semiconductor devices are integrated to form the other face of a capacitor, the finger plane is uneven, actual distances when convex points and concave points of the finger contact with the flat plate are different, and numerical values of formed capacitance are also different, so that according to this principle, collection of fingerprint images is completed by gathering different collected numerical values.
The recognition chip is responsible for fingerprint recognition, to be specific, subjecting the collected fingerprint images to following preprocessing including image quality judgment, image enhancement, fingerprint area detection, fingerprint direction diagram and frequency estimation, image binarization (setting gray value of each pixel point in the fingerprint images to be 0 or 255) and image refining. Regression line data of fingerprints are acquired from the preprocessed image above, feature point information needed for fingerprint recognition is extracted from the above regression line data of the fingerprints, transmitted to the main control unit and then matched with fingerprint feature information stored in a database of the transaction server system one by one to judge whether the fingerprints are same or not.
The fingerprint recognition LED indicator lamp is a monochromatic LED which is controlled to be on and off by the recognition chip. Specifically, the fingerprint recognition LED indicator lamp is turned on to remind the customer of finger vein collection, continuously flickers in the process of collection and turned off after collection is finished and maintained in a normally-off state.
The finger vein recognition unit is a finger vein recognition module utilizing a CCD camera to acquire finger vein images through near-infrared irradiation and is composed of a recognition chip, a finger groove component, an infrared module, an imaging module and a finger vein recognition LED indicator lamp.
The finger groove component is used for guiding the customer to correctly put in the finger to be collected, infrared modules are arranged on two sides of the finger groove component, and the imaging module is arranged at the bottom of the finger groove component. After the customer puts the finger in the finger groove component, the infrared modules emit near infrared to penetrate the finger, and collection of finger vein images is completed by photographing through the CCD camera of the imaging module to obtain vein images.
The recognition chip is responsible for finger vein recognition, to be specific, applying advanced filtering, image binarization and refining means to extract features from digital images of the collected finger vein images to extract feature value information needed for finger vein recognition. The above feature value information is transmitted to the main control unit and then matched with finger vein feature information stored in the database of the transaction server system one by one, and identity of the customer is authenticated and confirmed.
The finger vein recognition LED indicator lamp is a monochromatic LED and controlled to be on and off by the recognition chip. Specifically, the finger vein recognition LED indicator lamp is turned on to remind the customer of finger vein collection, continuously flickers in the process of collection and is turned off after collection is finished and maintained in a normally-off state.
The dustproof unit is composed of a dustproof cover plate, a rocker arm, a driving motor and a gear set (a main driving gear and a driven gear), wherein the driving motor is connected with the main control unit, the main control unit controls the driving motor to start working to drive the rocker arm and the dustproof cover plate connected to the rocker arm to rotate through the main driving gear and the driven gear. The main control unit opens and closes the dustproof cover plate by controlling forward or backward rotation of the driving motor. The exposed sensor and the camera of the fingerprint recognition unit and the finger vein recognition unit can be protected from being exposed to dust pollution and scratching of outside environment.
Only before starting to collect the fingerprints of the customer, the main control unit controls the driving motor to start working and opens the dustproof cover plate. The dustproof cover plate is maintained open in the whole process of fingerprint recognition and finger vein recognition. After the transaction is closed, the main control unit controls the driving motor to start working, closes the dustproof cover plate and maintains the closed state till collecting the fingerprints of the customer next time, in other words, the dustproof cover plate is maintained closed when being in a non-working state.
Preferably, in order to further expand equipment using scenes, adding a twodimensional code scanning module can be taken into consideration, and twodimensional codes can be used for payment operation.
The appearance structure of the payment device of the payment system is composed of a shell, the LCD screen, the keys, the external antenna, the fingerprint recognition semiconductor component and LED indicator lamp thereof, a finger vein recognition finger groove component and finger vein recognition indicator lamp thereof, a dustproof cover plate, a first rocker arm, a second rocker arm and a dustproof sealing strip.
The first rocker arm and the second rocker arm are arranged at two ends of the dustproof cover plate, and the first rocker arm is close to the keys while the rocker arm is close to the shell.
When in a non-working state, the dustproof cover plate is maintained closed, and the periphery of the dustproof cover plate closely contacts with the dustproof sealing strip to avoid dust entering.
Before starting to collect the fingerprints of the customer, the dustproof cover plate will open for the convenience of the customer to put fingers on the recognition unit.
The recognition unit is placed in a groove, and for easiness in the collection, at a height where the fingers are put, the fingerprint recognition semiconductor component is arranged on a small platform at a proper height to be on a same horizontal position with the finger vein recognition finger groove component.
The external antenna can be rotated and stored in the back of the shell.
The dustproof cover plate can be arranged to be semi-transparent frosted organic glass for the benefit of checking the inside of the recognition unit.
The dustproof unit is mainly composed of a dustproof cover plate, a first rocker arm, a second rocker arm, a driving motor, a gear set (main driving gear and driven gear) and a fixed shaft; the driving motor and the gear set (main driving gear and driven gear) are arranged on one side, close to the keypad, inside the shell. The main driving shaft is arranged on the driving motor and connected with the driven gear, which is connected writh the first rocker arm and arranged on the rotating shaft. The second rocker arm is arranged on one side, close to the outer wall, inside the shell and arranged on the rotating shaft and can rotate freely around the rotating shaft. The first rocker arm and the second rocker arm are arranged at two ends of the dustproof cover plate.
After the work started, the driving motor drives the main driving gear and the driven gear to be in linkage rotating, and the first rocker arm rotates around the rotating shaft clockwise or anticlockwise and drives the dustproof cover plate and the second rocker arm to rotate to realize opening and closing of the dustproof cover plate. The number of teeth of the main driving gear and the driven gear can be set to be different and appropriate, to lower rotating of the first rocker arm to a suitable speed so as to realize slow opening and closing of the dustproof cover plate.
The payment device communicates with and transmits information to the transaction server through the communication unit, and the payment device has already registered in the transaction server to be legal.
The whole transaction authentication process is controlled through composite authentication realized through fingerprint and finger vein technology and crossvalidation realized through reserved information means.
After the payment device 1 initiates a payment transaction, starting authentication 101. Step 1, performing the fingerprint authentication process 102: the fingerprint collection process 611 of the payment device 1 includes that the fingerprint recognition unit 6 collects fingerprints of the customer, extracts feature information, encrypts and transmits the feature information to the transaction server 9;
After the transaction server 9 decrypts the feature information, the feature information is matched with fingerprint feature information stored in the fingerprint repository 91 to judge whether the fingerprints are the same or not. After the fingerprints are matched, the fingerprint authentication process is completed.
Step 2, performing the cross-validation process 103: the reserved information of the corresponding customer is extracted from the reserved information repository 93 according to the customer ID corresponding to the matched fingerprints, encrypted and then transmitted back to the payment device 1;
The payment device 1 decrypts and controls the display unit 3 to display the reserved information;
The display unit 3 will prompt to press down the confirmation key to complete the cross-validation process only after the customer confirmed the reserved information is correct.
Step 3, performing the finger vein authentication process 104; the finger vein collection process 711 of the payment device 1 includes that the finger vein recognition device 7 collects finger veins of the customer, extracts feature information, encrypts and transmits the feature information to the transaction server 9;
After the transaction server 9 decrypts the feature information, the feature information is matched with finger vein feature information stored in the finger vein repository 91 to judge whether the finger veins are same or not.
After the finger veins are matched, whether the customer ID corresponding to the matched finger veins is consistent with the customer ID corresponding to the matched fingerprints or not to complete the finger vein authentication process.
Step 4, finishing authentication 104;
After successful authentication, the transaction server 9 extracts bank card information of the corresponding customer from the card information repository 94 according to the corresponding customer ID, deducts the money and transmits the transaction result back to the payment device 1.
The payment device controls the display device 3 to display the transaction result information.
The payment business flowchart of the payment system is specifically described as follows:
Explanation is made as follows by taking the business process for transaction payment by a customer through the payment device:
Step 201: The payment device accepts a business request;
Step 202: The merchant inputs transaction information, including the amount, and then presses a confirmation key for confirmation;
Step 203: The payment device starts fingerprint authentication. The dustproof cover is opened, the fingerprint recognition LED indicator lamp is turned on, and the display screen prompts the customer for fingerprint collection;
Step 204: The payment device collects fingerprints of customer, extracts feature codes, encrypts and transmits the feature codes to the transaction server;
Step 205: The transaction server matches fingerprint information in a fingerprint repository;
Step 206: Judge whether fingerprint matching is successful or not; if yes, go to Step 207, and if not, go to Step 216;
Step 207: The reserved information of the corresponding customer is extracted from a reserved information repository according to the customer ID corresponding to the successfully authenticated and matched fingerprints, encrypted and then transmitted back to the payment device;
Step 208: The payment device decrypts and displays the reserved information, and will proceed to customer authentication;
Step 209: Judge whether the reserved information is correct or not; if yes, go to Step 210, and if not, go to Step 217;
Step 210: After the reserved information is judged to be correct by the customer, the customer selects to continue authentication, and the payment device starts finger vein authentication; the finger vein recognition LED indicator lamp is turned on, and the display screen prompts the customer for finger vein collection;
Step 211: The payment device collects finger vein information of the customer, extracts feature codes, encrypts and transmits the feature codes to the transaction server;
Step 212: The transaction server matches finger vein information in a finger vein repository and judges whether the customer ID corresponding to the matched finger vein is consistent with the customer ID corresponding to the matched fingerprints or not after the finger vein is matched successfully;
Step 213: Judge whether finger vein matching is successful or not; if yes, go to Step 214, and if not, go to Step 218;
Step 214: The transaction server extracts bank card information of the corresponding customer from a card information repository according to the corresponding customer ID, deducts money and transmits the transaction result back to the payment device;
Step 215: The payment device displays transaction result information and complete the transaction;
Step 216: The transaction server transmits prompting information of unsuccessful fingerprint matching back to the payment device, aborts the transaction and then goes to Step 201;
Step 217: After the customer judges that the reserved information is incorrect, the customer can press the cancel key to cancel the transaction, and then go to Step 201;
Step 218: The transaction server transmits prompting information of unsuccessful finger vein matching back to the payment device, aborts the transaction and then goes to Step 201.
According to the payment system, primary authentication is realized through fingerprint authentication, secondary cross-validation is realized by using the reserved information of the customer after passing the primary authentication, cross-validation is confirmed by the customer, and after confirmation, the customer realizes final authentication through finger vein authentication to complete the whole transaction authentication process.
During primary authentication, due to low authentication requirements and the characteristics of authentication modes of the equipment, the customer can use uncommon fingerprints (such as a middle finger or ring finger) for authentication to prevent the risk that fingerprints of common fingers are stolen.
The customer can restore to use finger veins of the common fingers for final transaction authentication after passing the cross-validation.
At the moment, the customer may only lose fingerprints of an uncommon finger, and when this circumstance appears, the customer can select response measures like alarming.
The reserved information of the customer needs to be transmitted back in the process of secondary authentication, if fraud equipment is used, the fraud equipment cannot know the content of information which is transmitted back in advance and can only display random information which is completely different from the reserved information of the customer, and the customer can recognize it easily, in this way, the illegality of the equipment can be judged, and subsequently stop the final authentication.
A conventional identity authentication method includes identity articles (like keys, papers, and ATM cards) and identity knowledge (such as usernames and passwords), but this method mainly depends on external objects, once the identity objects and information that proving identity are stolen or forgotten, identity of the customer is prone to other people to pretend or replace easily.
Biological recognition technology is safer, more confidential and more convenient than conventional identity authentication methods. The biological feature recognition technology has the advantages of being less prone to being forgotten, high in antifalsification performance, difficult to forge or steal, portable and usable at any time and anywhere. The biological recognition technology mainly refers to a technology for identity authentication through human biological features, and the human biological features usually have the advantages of being unique, measurable or automatically recognizable or authenticable, heritable or unchangeable in one’s whole life, so that the biological recognition authentication technology is more advantageous than conventional authentication technologies. The biological recognition technology refers to closely combining the computer with high-tech means like optics, acoustics, biosensors and biological statistics principles and utilizing inherent human physiological characteristics (like fingerprints, face shapes and iris and behavior features (like handwriting, voice and gait) for authentication of personal identity.
The biological recognition system samples biological features, extracts unique features, converts the unique features into digital codes and further compose these codes into a feature template. As the cost of microprocessors and various electronic devices have been constantly decreasing and gradually increased in accuracy, the biological recognition system has been gradually applied in the field of commercial authorization control such as access control, enterprise attendance management systems and consumption safety authentication. Biological features used for biological recognition include hand shapes, fingerprints, face shapes, iris, retina, pulse, auricle and veins, and behavior features include signature, voice and button pressing strength. Based on these features, people have already developed various biological recognition technologies such as hand shape recognition, fingerprint recognition, facial recognition, voice recognition, iris recognition, signature recognition and vein recognition.
Human body features are inherent, non-duplicable and unique for human bodies, and this biological secret key cannot be copied, stolen or forgotten, so that it is safe, reliable and accurate to utilize biological recognition technology for identity authentication. Unlike human body features, the common words of command, IC cards, barcodes, magnetic cards or keys have many unfavorable factors such as being lost, forgotten, copied or stolen, therefore by adopting the biological key, people need neither to carry a bunch of keys nor to try to memorize or change passwords. System managers will not be at a loss what to do because of forgetting passwords. Biological recognition technology products are all realized with the help of modem computer technology, thereby being quite easy to be integrated with computers and safe, monitoring and management systems for automated management.
Specifically, for fingerprint recognition, there are various methods to achieve. Wherein some methods imitate the conventional methods used by the public security department by comparing local details of fingerprints; some methods realize recognition directly through all features; some methods are more unique, such as wave edge mode and an ultrasonic wave of fingerprints. Some equipment can measure fingerprints in real time while others cannot. In all biological recognition technologies, fingerprint recognition is most widely used currently.
In addition, for biological recognition technology, vein recognition is a recognition technology by using near-infrared to read the vein mode and comparing the vein mode with stored vein mode for oneself recognition. The working principle includes that according to the characteristic that blood flowing in human fingers can absorb light with specific wavelength, clear images of finger veins can be acquired by using the light with the specific wavelength to irradiate the fingers. By utilizing this inherent scientific feature, acquired images can be analyzed and processed to acquire biological features of the finger veins, and then acquired finger vein feature information is compared with finger vein features registered in advance to confirm identity of a login person.
The vein recognition system works by acquiring a personal vein distribution diagram through a vein recognizer, extract feature values from the vein distribution diagram according to a special comparison algorithm, acquiring images of finger, palm and back of hand veins through an infrared CCD camera, storing digital images of the veins into a computer system and storing the feature values. During vein comparison, the vein diagrams are collected in real time, the feature values are extracted, advanced filtering, image binarizing and refining means are applied to extract features from the digital images, the features are compared with vein feature values stored in the host, and a complex matching algorithm is adopted to match the vein features so as to authenticate personal identity to confirm identity. Finger vein recognition technology belongs to in-vivo recognition technology, vein image features cannot be acquired from in-vitro fingers, and copying or forging cannot be realized by recognizing information inside the fingers, so that the finger vein recognition technology is high in safety and anti-falsification performance.
The invention has the following advantages: The invention discloses a payment system with multi-biometric composite authentication and cross-validation. Firstly, biometric authentication is employed to solve the inconvenience that consumers have to cany a bank card and enter a password for payment. Secondly, through composite authentication and cross-validation technologies allow consumers to accurately identify the legality of POS (point of sales) transaction equipment, creating safer and more convenient financial service for consumers and continuously improving customer experience. Thirdly, dustproof measures are adopted to well protect the sensors of payment device so as to prolong the service life and reduce the failure rate of equipment.
Furthermore, the payment system also has the following advantages of:
(1) High functionality: through reserved information cross-validation mode, the customer is enabled to recognize the legality of the transaction equipment. Through fingerprint and finger vein multi-biometric composite authentication technology, achieve a more convenient, quicker, and safer medium-free and password-free payment.
(2) High practicability: by adopting the dustproof measures, the sensor of the payment device is protected well, the service life of the equipment is prolonged, and the failure rate is lowered.
Description of Drawings
Figure 1 is a connecting relation diagram of units of the payment system.
Figure 2 is a connecting relation diagram of the units and the insides of the units of the payment system.
Figure 3 is an appearance structural diagram when the dustproof cover of the payment device of the payment system is closed.
Figure 4 is an appearance structure diagram when the dustproof cover of the payment device of the payment system is open.
Figure 5 (A) is a structural diagram of the dustproof unit of the payment device of the payment system.
Figure 5 (B) is a structure diagram after the driving motor of the dustproof unit of the payment device of the payment system is started.
Figure 6 is the payment transaction authentication process flowchart of the payment system.
Figure 7 is a connecting relation diagram of the payment device of the payment system and a transaction server system.
Figure 8 is the payment business flowchart of the payment system.
Claims (6)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| NL2019978A NL2019978B1 (en) | 2017-11-24 | 2017-11-24 | Payment System with Multi-Biometric Composite Authentication and Crossvalidation |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| NL2019978A NL2019978B1 (en) | 2017-11-24 | 2017-11-24 | Payment System with Multi-Biometric Composite Authentication and Crossvalidation |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| NL2019978B1 true NL2019978B1 (en) | 2018-07-20 |
Family
ID=61132855
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| NL2019978A NL2019978B1 (en) | 2017-11-24 | 2017-11-24 | Payment System with Multi-Biometric Composite Authentication and Crossvalidation |
Country Status (1)
| Country | Link |
|---|---|
| NL (1) | NL2019978B1 (en) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020111917A1 (en) * | 1994-11-28 | 2002-08-15 | Indivos Corporation, A Delaware Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
| US20030105725A1 (en) * | 1994-11-28 | 2003-06-05 | Ned Hoffman | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
| KR101792006B1 (en) * | 2017-04-25 | 2017-11-21 | 주식회사 올아이티탑 | System of certification card checking fingerprint and sensing a henatocele of finger |
-
2017
- 2017-11-24 NL NL2019978A patent/NL2019978B1/en not_active IP Right Cessation
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020111917A1 (en) * | 1994-11-28 | 2002-08-15 | Indivos Corporation, A Delaware Corporation | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor |
| US20030105725A1 (en) * | 1994-11-28 | 2003-06-05 | Ned Hoffman | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
| KR101792006B1 (en) * | 2017-04-25 | 2017-11-21 | 주식회사 올아이티탑 | System of certification card checking fingerprint and sensing a henatocele of finger |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN100385449C (en) | Entry-exit ID card and biological living fingerprint automatic identification method and system | |
| US8499164B2 (en) | Biometric authentication utilizing unique biometric signatures and portable electronic devices | |
| CN100430959C (en) | Identity authentication device based on biological measurement | |
| US7793109B2 (en) | Random biometric authentication apparatus | |
| US20140341440A1 (en) | Identity caddy: a tool for real-time determination of identity in the mobile environment | |
| KR101667388B1 (en) | System for relaying financial transaction with multiple safety function using finger vein and fingerprint to authenticate at the same time and method for processing thereof | |
| US20150015365A1 (en) | Point of entry authorization utilizing rfid enabled profile and biometric data | |
| US10909788B2 (en) | Secure zone access control | |
| KR101792008B1 (en) | Electronic payment system using face and finger recognition and method for processing thereof | |
| KR20190008474A (en) | Electronic safe box having secure function of biometric data | |
| US9396402B2 (en) | System and methods for identification and fraud prevention | |
| KR101814167B1 (en) | Electronic payment system using face and finger recognition and method for processing thereof | |
| KR101803397B1 (en) | System for relaying financial transaction with multiple safety function using face and finger-print or/and finger-vein at the same time and method for processing thereof | |
| CN113139811B (en) | Composite authentication payment method, device and server | |
| Singh et al. | A constraint-based biometric scheme on ATM and swiping machine | |
| KR101717754B1 (en) | System for relaying financial transaction with multiple safety function using finger vein authentication | |
| Prasanthi et al. | Palm vein biometric technology: An approach to upgrade security in ATM transactions | |
| CN216748810U (en) | Multi-biological-feature composite authentication payment device | |
| NL2019978B1 (en) | Payment System with Multi-Biometric Composite Authentication and Crossvalidation | |
| KR102089618B1 (en) | Method and system for collecting means of publictransportation fares using bi0-information | |
| Selvakumar et al. | Face biometric authentication system for ATM using deep learning | |
| KR102273315B1 (en) | Method of initialization for private key in system for paying using virtual shell | |
| KR101792025B1 (en) | System for relaying financial transaction with multiple safety function using iris and finger-print or/and finger-vein at the same time and method for processing thereof | |
| KR102250548B1 (en) | Method for dealing USB for matching Quantum Random Number and biometric identification | |
| KR101846290B1 (en) | System for relaying financial transaction with multiple safety function and method for processing thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PD | Change of ownership |
Owner name: QINGHAI SHUDARHE INFORMATION TECHNOLOGY CO. LTD; CN Free format text: DETAILS ASSIGNMENT: CHANGE OF OWNER(S), ASSIGNMENT; FORMER OWNER NAME: YINGUO WANG Effective date: 20201202 |
|
| MM | Lapsed because of non-payment of the annual fee |
Effective date: 20211201 |