FIELD: computer equipment.
SUBSTANCE: method includes: obtaining, by a computing device, a first physiological information of a wearable device user; comparison by the computing device of the obtained first physiological information with the saved physiological profile; updating by computing device based on trust value comparison; determining, by a computing device, that the confidence value is below a threshold value; transmitting, by the computing device into the portable device, a request to the portable device of the second physiological information; obtaining, by a computing device, a response from a wearable device, comprising a second physiological information of the user during the user's prescribed action; user verification by a computing device based on the second physiological information of the user; and approval or rejection of financial transaction.
EFFECT: technical result is higher security of transactions.
21 cl, 16 dwg
Title | Year | Author | Number |
---|---|---|---|
MULTIPLE-DEVICE TRANSACTION VERIFICATION | 2016 |
|
RU2711464C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
TOKENIZATION REQUEST VIA ACCESS DEVICE | 2015 |
|
RU2708945C2 |
SUPPORT PLATFORM FOR INTER-MACHINE DEVICES | 2015 |
|
RU2707939C2 |
SYSTEM FOR SECURE REMOTE TRANSACTIONS USING MOBILE APPARATUSES | 2018 |
|
RU2769946C2 |
TRUSTED INTEGRITY MANAGER (TIM) | 2010 |
|
RU2523304C2 |
ON-LINE COMMERCIAL TRANSACTIONS | 2006 |
|
RU2402814C2 |
ADAPTER FOR PROVIDING UNIFIED TRANSACTION INTERFACE | 2018 |
|
RU2780821C2 |
MOBILE DEVICE IDENTIFICATION SYSTEMS AND METHODS | 2015 |
|
RU2704750C2 |
METHOD OF DETECTING UNAUTHORIZED ACCESS TO SOFTWARE AND NOTIFICATION THEREOF | 2015 |
|
RU2705019C2 |
Authors
Dates
2020-03-27—Published
2016-04-07—Filed