CN101917720A - System and method for authenticating identity of mobile phone user - Google Patents

System and method for authenticating identity of mobile phone user Download PDF

Info

Publication number
CN101917720A
CN101917720A CN2010102572100A CN201010257210A CN101917720A CN 101917720 A CN101917720 A CN 101917720A CN 2010102572100 A CN2010102572100 A CN 2010102572100A CN 201010257210 A CN201010257210 A CN 201010257210A CN 101917720 A CN101917720 A CN 101917720A
Authority
CN
China
Prior art keywords
mobile phone
intelligent recognition
user
security module
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102572100A
Other languages
Chinese (zh)
Inventor
罗正棣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PERVCOM TECHNOLOGIES Ltd
Original Assignee
PERVCOM TECHNOLOGIES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PERVCOM TECHNOLOGIES Ltd filed Critical PERVCOM TECHNOLOGIES Ltd
Priority to CN2010102572100A priority Critical patent/CN101917720A/en
Publication of CN101917720A publication Critical patent/CN101917720A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a system and a method for authenticating identity of a mobile phone user. The system comprises a mobile phone security module, a mobile terminal and a background application host, wherein the mobile security module is used for safely storing and processing user information inside a mobile phone and operating an intelligent identification code processor so as to generate and verify intelligent identification codes; the mobile terminal comprises a system control module and a host communication module; and a mobile phone application interface and intelligent identification middleware are run in the system control module so as to enable the mobile phone user to authenticate and input the intelligent identification codes and to authenticate the identity. The system has the advantages of safety, creditability, low cost and wide application.

Description

A kind of authenticating identity of mobile phone user system and method
Technical field
The present invention relates to the identity identifying technology field, more specifically, relate to a kind of Intelligent Recognition sign indicating number and mobile phone security module used to realize the system and method for authenticating identity of mobile phone user.
Background technology
Current society, along with popularizing of computer and network, people have accepted and have got used to utilizing the convenient processing personal situation of network: network social intercourse, online shopping, online reserving hotel and air ticket, handle that by Web bank accounting payment is paid the fees etc.Increasing affairs are to finish by the transmission of digital information.
And on the other hand, in China, the extensive every one can have a machine already of mobile phone and the degree of carrying whenever and wherever possible.Particularly, make many application of mobile phone become possibility recently along with the release of intelligent machine and 3G network.Mobile phone will be broken through this single function of making a phone call, in the near future, mobile phone card-brushing is taken pubic transport, mobile phone-downloaded film ticket, reward voucher, member card, park annual ticket, mobile phone brush POS machine is finished payment and is replaced wallet, and mobile phone replaces gate inhibition's card and key etc. all can become general purposes.
No matter be computer or mobile phone, people are ready to use above-mentioned application that the prerequisite of a maximum is arranged, be exactly fail safe.Authentication then is the basis of all information system security.Authentication will guarantee that exactly operator's digital identity is corresponding one by one with physical identity, in other words, guarantee that the operator is exactly the lawful owner of this digital identity.
Up to now, present identity identifying technology mainly is based on the application of computer.Between user and employed system, at a plurality of potential attack points, comprise that keyboard scan, the resident wooden horse of internal memory, circuit are intercepted, communication data collects and dissect or the like, people are developed and multiple identity identifying technology.Authentication means commonly used mainly is: 1, user name encrypted code, and this is that everybody is the most familiar; 2, biotechnology feature identification technique is such as fingerprint recognition; 3 digital certificates, the user who generally opened Web bank can use; 4, dynamic password.
If these technology are directly indiscriminately imitated are applied to the cellphone subscriber, new problem will occur.For example computer Web bank has generally used digital certificate and dynamic password technology, is that very difficult strick precaution may reside in the trojan horse program in the mobile phone but these two kinds of technology are applied to later on a mobile phone big problem.
On computers, digital certificate generally can not leave in the hard disk with the form of computer document, is obtained by rogue program because be easy to like that.A kind of security means is that operations such as digital certificate and encrypted signature all are placed on independent smart card, just finishes in net shield or the U shield.But, can not avoid the attack of wooden horse so fully.Trojan horse program listens to the pin sign indicating number that the user enables the net shield in the computer if operate in, and then can use this pin sign indicating number under the situation that the user knows nothing fully, and the operation net shield carries out bank transaction, and prerequisite is that the net shield also is inserted on the computer at this moment.Therefore, in time extract the net shield, can reduce risk to a great extent.
Can extrapolation net shield different with computer, mobile phone be when using with smart card to the security module of core, and this security module normally connects always, and be equivalent to the net shield is to be inserted on the computer always.By contrast, the security risk of mobile phone is just big a lot.
If mobile phone was as just communication tool in the past, the problem of authentication is also so not urgent, but in the near future, smart mobile phone is endowed the more applications function, and such as mobile-phone payment, so, authentication is exactly a problem that must solve.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of safe and economic authenticating user identification system and method for the cellphone subscriber.
For achieving the above object, according to an aspect of the present invention, provide a kind of authenticating identity of mobile phone user system, comprised mobile phone security module, mobile phone terminal, background application main frame.
Described mobile phone security module is an independently information processor, includes microprocessor and secure data storage space, is used to deposit cellphone subscriber's security information, and can be safely in inside modules process user information.Operation mobile phone Secure Application and Intelligent Recognition code processor in the described mobile phone security module.
Described mobile phone terminal comprises system control module, host computer communication module.Wherein, operation mobile phone application interface and Intelligent Recognition middleware in the described system control module, and main control system communication module and background application main-machine communication.
In the said system, described mobile phone Secure Application is to run in the mobile phone security module, the application that user security information is handled.
In the said system, described Intelligent Recognition code processor is to produce the Intelligent Recognition sign indicating number, and the application of checking recognition result.
In the said system, described mobile phone application interface is to run in the system control module of mobile phone terminal, handles man-machine interface and the application of communicating by letter.
In the said system, described Intelligent Recognition middleware is to cooperate the Intelligent Recognition code processor, the Intelligent Recognition sign indicating number is passed to safely the program of user interface.
In the said system, described security module is the intelligent card chip on cell phone mainboard, or is integrated in the SIM/UIM card of mobile phone terminal, or with separate modular that mobile phone terminal is communicated by letter in intelligent card chip.
In the said system, security module is the smart card that meets the JavaCard standard.
In the said system, described Intelligent Recognition sign indicating number is a graphic code.
In the said system, Intelligent Recognition middleware and user interface become one.
According to a further aspect in the invention, also provide a kind of authenticating identity of mobile phone user method, comprised the following steps: based on said system
When the mobile phone Secure Application need be verified cellphone subscriber's identity, produce the Intelligent Recognition sign indicating number by the Intelligent Recognition code processor in the mobile phone security module earlier; Pass to the Intelligent Recognition middleware then;
The Intelligent Recognition middleware offers the cellphone subscriber by the mobile phone application interface and discerns;
Intelligent Recognition code processor in mobile phone security module checking return results is if identification correctly then to confirm as be normal users, is proceeded the processing of mobile phone Secure Application.
It is further comprising the steps of,
If the cellphone subscriber can not correctly answer identification code, then prompting again.
If wrong three times continuously, then lock the mobile phone security module, can not carry out safety operation again.
It is further comprising the steps of,
Intelligent Recognition code processor and background update main frame periodic communication are upgraded upgrading automatically.
This method can be cellphone subscriber's identifying, and comprehensive high level identification authentication solution is provided, and it has the following advantages:
1, secure and trusted
Because the Intelligent Recognition code processor, has guaranteed the independence and the fail safe of the Intelligent Recognition sign indicating number that generates at the internal operation of security module.Because three mistakes just can lock the mobile phone security module, thus in the mobile phone terminal or in the background system rogue program all can't produce effective attack, thereby guaranteed the fail safe and the reliability of authentification of user.
2, economical and practical
Along with the development of mobile-phone payment, security module is understood in the middle of the integrated machine in one's hands, thereby has saved the cost of the external security module of mobile phone, and gives full play of the many application powers of safety of security module, and is economical and practical.
3, be widely used
All kinds of needs that the present invention can be used to have on the mobile phone of security module are used the Secure Application of authentication, comprise that cellular network goes to bank, and mobile phone is transferred accounts, mobile phone shopping, application such as mobile phone air ticket.
Description of drawings
Fig. 1 is a system architecture diagram of realizing the authenticating identity of mobile phone user method.
Fig. 2 is the identification identifying procedure figure of authenticating identity of mobile phone user process.
Fig. 3 is the renewal flow chart of Intelligent Recognition device renewal process.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the cellphone subscriber of the concrete case study on implementation according to the present invention is authenticated recognition system further describe below in conjunction with accompanying drawing.Should be appreciated that concrete example described herein only in order to explanation the present invention, and be not used in qualification the present invention
Existing mobile phone on-line Application system comprises mobile phone terminal 100, background application main frame 150 and first communication network 131, wherein mobile phone terminal is to have user interface 121, has data communication function, and accept the user and import, with 150 communications of background application main frame, finish the equipment of certain application function.In this system, by mobile phone terminal 100, the user can carry out with background application main frame 150 alternately.
More specifically, when the user finishes online application by mobile phone terminal, at first start application interface 121, require the user to import username and password by system control module 120.After the user input, system control module 120 is accepted the input results of user identity and it is transferred to host computer communication module 130, requests verification, as arrow among Fig. 1 1. shown in.Then, host computer communication module sends to background application main frame 150 with this input results, as arrow among Fig. 1 2. shown in.Then, background application main frame 150 checking user ciphers also return to host computer communication module 130 to result, as arrow among Fig. 1 3. shown in.Host computer communication module 130 is sent system control module 120 back to after receiving result, and is presented at application interface 121, as arrow among Fig. 1 4. shown in.If the user rs authentication success then can be carried out next step operation.But above-mentioned method of password authentication is not enough to guarantee to move the reliability of the authentication of using.Use pre-printed dynamic password password card, can increase some fail safes, but still can not prevent that dynamic password from being tackled by the malice trojan horse program in the mobile phone, thereby imitation is validated user, carry out background application and handle.
The present invention is by adopting mobile phone security module and Intelligent Recognition sign indicating number technology, and using for mobile phone provides safe identity authorization system, as shown in Figure 1.This system mainly is made up of following components: mobile phone security module 110, comprising Secure Application 111 and Intelligent Recognition code processor 112; Mobile phone terminal 100 is comprising control module 120 and host computer communication module control module 130; System control module 120 comprises application interface 121 and Intelligent Recognition middleware 122; Background application main frame 150.
Above-mentioned mobile phone security module 110 is independent information processing unit that include microprocessor and secure data storage space, can deposit and process user information in inside modules safely.Secure Application 111 and Intelligent Recognition code processor 112 are programs of operation in security module 110.Secure Application 111 is the requirements according to background application, the process user security information.The effect of Intelligent Recognition code processor 112 is to produce the Intelligent Recognition sign indicating number, and the application of checking recognition result.
Above-mentioned mobile phone terminal 111 comprises system control module 120, host computer communication module 130.System control module 120 is to be used for main control system communication module 130 by communicating by letter with background application main frame 150, to finish the Secure Application function, also be used for receiving the renewal process information, and communicate by letter, to finish the renewal of Intelligent Recognition algorithm with described background update main frame 140 from mobile phone security module 110.Operation mobile phone application interface 121 and Intelligent Recognition middleware 122 in system control module 120.The function of mobile phone application interface 121 is to handle man-machine interface and communicate by letter.
Those having ordinary skill in the art will appreciate that, above-mentioned mobile phone security module 110 can be a smart card built-in in the mobile phone, or the smart card in the storage card of extrapolation, or the smart card in the built-in SIM card, or can with the smart card in the separate modular of mobile communication.
Persons of ordinary skill in the art may appreciate that above-mentioned mobile phone security module 110 can be the smart card that meets the JavaCard standard.
According to one embodiment of present invention, by Secure Application 111 is installed, can need the operation of safety certification in security module 110.Finish safe handling for obtaining the authorization, Secure Application 111 can be inputed the PIN password by application interface 121 prompting users, as arrow among Fig. 1 5. shown in, application interface 121 obtains after the user input password being returned to Secure Application 111 checkings, as arrow among Fig. 1 6. shown in.For preventing the illegal control of malice trojan horse program this moment, Secure Application 111 starts by the leading Intelligent Recognition process of Intelligent Recognition code processor 112, as arrow among Fig. 1 7. shown in.Intelligent Recognition code processor 112 produces an Intelligent Recognition sign indicating number at random and is sent to Intelligent Recognition middleware 122 according to Intelligent Recognition sign indicating number generating algorithm, as arrow among Fig. 1 8. shown in.The Intelligent Recognition sign indicating number is can be discerned by the mankind but the figure or the image that are difficult to be discerned by computer program, is made up of distortion numeral, natural language or formula.The effect of Intelligent Recognition middleware 122 is this smart code transmission and is presented at client application interface 121, as arrow among Fig. 1 9. shown in.The user imports recognition result by user interface, and the result is passed to Intelligent Recognition middleware 122, as arrow among Fig. 1 10. shown in.Intelligent Recognition middleware 122 returns this result to Intelligent Recognition code processor 112 again, shown in arrow among Fig. 1 (11).Return to Secure Application Module 111 by Intelligent Recognition code processor 112 judged results, shown in arrow among Fig. 1 (12).If correctly then finish identification, if make mistakes then point out the user, and circulation primary above-mentioned steps again.Preferably, if continuous three wrong identification Intelligent Recognition sign indicating numbers, 111 of Secure Application are automatically locked.
Persons of ordinary skill in the art may appreciate that above-mentioned Intelligent Recognition sign indicating number can be a graphic code.
Persons of ordinary skill in the art may appreciate that above-mentioned Intelligent Recognition middleware and user interface can become one.
Preferably, Intelligent Recognition code processor 112 is understood regularly and background update main frame 140 UNICOMs finish the renewal of Intelligent Recognition sign indicating number generating algorithm, so that constantly change the Intelligent Recognition sign indicating number, improves fail safe.Renewal process is as follows: according to the schedule of prior setting, shown in arrow among Fig. 1 (13), Intelligent Recognition code processor 112 starts host computer communication module 130, sends to background update main frame 140 and upgrades application, shown in arrow among Fig. 1 (14).Background update main frame 140 responds these more new demands, and the database after upgrading is passed back host computer communication module 130, shown in arrow among Fig. 1 (15).The data that Intelligent Recognition code processor 112 receives after upgrading are finished this time and are upgraded.Shown in arrow among Fig. 1 (16).
Said system can be used mobile phone safe user identity identification is provided.Going to bank with cellular network now is example, further specifies.
Go to bank with existing mobile phone login cellular network, operate as follows: the user by surfing Internet with cell phone on the net bank login, enter into the personal account page after inputing user name and password, at this moment can query the balance, operation such as inquiry fund detail.For the transaction payment generic operation, as transfer accounts, pay charges for water and electricity, supplement with money etc., the mobile phone application interface can be pointed out the user order according to available password on the dynamic password card, input next dynamic password password, it is payment cipher, the user inputs this password, obtains bank system of web authentication back and continues delivery operation.But such process can be intercepted and captured by the malice trojan horse program, and fail safe is not enough.
According to cellphone subscriber's identification system of the present invention, mobile phone Net silver user uses the mobile phone that security module is installed, cellular network digital certificate that goes to bank and the Secure Application that can carry out the digital signature operation with digital certificate are installed in security module, and the Intelligent Recognition code processor, the Intelligent Recognition middleware is installed in mobile phone.Like this, the user signs in to Net silver, after the input username and password, just can carry out the wholesale transferred account service the same with computer Web bank.When reciprocal account, produce business information input such as account, the amount of money, time after, the digital signature Secure Application points out the user to input the password of enabling digital certificate on the one hand, start the Intelligent Recognition code processor on the other hand, produce a distortion digitized map font code at random by the Intelligent Recognition code processor.Transmit and be presented on the user interface by the Intelligent Recognition middleware, discern by the user, the user responds the back input results, the Intelligent Recognition middleware returns processor to input results and differentiates result's correctness, if correctly then complete successfully user identity identification, allow the digital signature Secure Application to use customer digital certificate, transferred account service information is carried out the digital signature operation.If make mistakes then three times that the digital signature Secure Application is automatically locked continuously, the user can not re-use this wholesale transferred account service, has ensured the safety of user's fund.
Persons of ordinary skill in the art may appreciate that in said system only as an example with Mobile banking's Secure Application, and unrestricted.According to other embodiments of the invention, also can be the application that public transport application, ticketing service application etc. need checking cellphone subscriber identity.
Based on one aspect of the present invention, the invention also discloses a kind of identity identifying method of using based on the handset identities Verification System, mainly comprise step once as shown in Figure 2:
This flow process at first originates in step 201, according to application requirements, carries out safety operation; Receive next step 202, judge whether to carry out to carry out the user identity identification authentication, if desired, carry out step 203, call Intelligent Recognition code processor 112 by Secure Application 111 by Secure Application 111; Receive step 204, Intelligent Recognition code processor 112 produces an Intelligent Recognition sign indicating number at random and gives Intelligent Recognition middleware 122 then; Receive step 205, Intelligent Recognition middleware 122 passes to application interface 121 on the mobile phone with user interactions with this Intelligent Recognition sign indicating number; Connect step 206, application interface 121 prompting users discern, and the input recognition result; Connect step 207, application interface 121 passes to Intelligent Recognition middleware 122 with recognition result; Connect step 208, Intelligent Recognition middleware 122 is sent the result back to Intelligent Recognition code processor 112 and is carried out verification; Connect step 209, by Intelligent Recognition code processor 112 judged results; If judged result is wrong, then connect step 211, judge whether it is to make mistakes for the third time continuously, if, then connect step 214, promptly Secure Application is locked.If not makeing mistakes for the third time continuously, then come back to step 203.At step 209 place, if judged result is correct, then connect step 210, user identity identification is passed through, and can carry out the subsequent operation of Secure Application, finally finishes authentication.
Transfer accounts with mobile phone Net silver wholesale now and be applied as example and further specify.Carry out wholesale when transferring accounts when the user uses surfing Internet with cell phone silver, begin to carry out safety operation according to method of the present invention.Wholesale is transferred accounts and need be carried out digital signature to transferred account service information, and the digital signature applications in the mobile phone security module is a Secure Application, starts the Intelligent Recognition process.The identification code that can occur a picture format in the mobile phone display screen, such as " 35+23=? " the user needs input results " 58 "; Also may be a word " in spring, one sleeps and wakes up to find it is already day ", and require the word of input appointment, such as the 5th word please importing this poem, user's input results " dawn ".Certainly, also can be image code of distortion numeral, literal, monogram or the like, do not enumerate one by one.At this moment, the Intelligent Recognition code processor is judged user's input results correctness, if correct, then finishes identification, and the digital signature Secure Application can be finished signature operation.If mistake then can point out user's input just now invalid, generate a new graphic code simultaneously, need the user to import once more, repeat once above operation.If continuous 3 times are made mistakes, then point out the user to be the safety of payment that guarantees the user, the digital signature applications that wholesale is transferred accounts is locked, ensure user's fund security.
In addition, the present invention also discloses a kind of identification code generating algorithm automatic update method, as shown in Figure 3.Specifically: this flow process originates in step 301, and Intelligent Recognition code processor 112 regularly upgrades inspection automatically; Connect step 302, obtain up-to-date Intelligent Recognition code processor version number to upgrading background host computer, connect step 303, Intelligent Recognition code processor 112 is version number relatively, need to judge whether to upgrade; Upgrade if desired, then connect next step 304, Intelligent Recognition code processor 112 with upgrade main-machine communication, download and install the Intelligent Recognition code processor of redaction.Final step 306 finishes for upgrading.
Use mobile phone Net silver wholesale transferred account service to be example with the user, wherein handling the Intelligent Recognition code processor that the safe digital signature applications of transferring accounts calls can be according to the date of the renewal that configures in advance, automatically whether be connected with the renewal main frame of bank, checking needs to upgrade.Upgrade if desired, download automatically and install.
By above description taken together with the accompanying drawings, one of ordinary skill in the art will appreciate that, the present invention has made full use of the Intelligent Recognition processor of the safety in the mobile phone security module and has used, security mechanism in conjunction with Secure Application itself, avoided the risk of authenticating identity of mobile phone user effectively, alleviated the investment burden of manufacturer, had than the large economy benefit at the external net shield of mobile phone.
Should be noted that and understand, under the situation that does not break away from the desired the spirit and scope of the present invention of accompanying Claim, can make various modifications and improvement the present invention of foregoing detailed description.Therefore, the scope of claimed technical scheme is not subjected to the restriction of given any specific exemplary teachings.

Claims (8)

1. authenticating identity of mobile phone user system and method.This system comprises mobile phone security module, mobile phone terminal, background application main frame.Wherein, described mobile phone security module is used for the Secure Application of the process user of portion's operation within it information, and moves the Intelligent Recognition code processor, to produce and checking Intelligent Recognition sign indicating number; Described mobile phone terminal comprises system control module and host computer communication module, operation mobile phone application interface and Intelligent Recognition middleware in system control module, so that the cellphone subscriber can discern and import the Intelligent Recognition sign indicating number, thus checking cellphone subscriber identity.
2. system according to claim 1 is characterized in that described security module is the intelligent card chip on cell phone mainboard, or is integrated in the SIM/UIM card of mobile phone terminal, or with separate modular that mobile phone terminal is communicated by letter in intelligent card chip.
3. system according to claim 2 is characterized in that, described security module is the smart card that meets the JavaCard standard.
4. system according to claim 3 is characterized in that, described Intelligent Recognition sign indicating number is a graphic code.
5. system according to claim 3 is characterized in that, described Intelligent Recognition middleware and described user interface become one.
6. the authenticating identity of mobile phone user method based on the described system of claim 1 comprises the following steps:
When the mobile phone Secure Application need be verified cellphone subscriber's identity, produce the Intelligent Recognition sign indicating number by the described Intelligent Recognition code processor in the described mobile phone security module earlier; Pass to described Intelligent Recognition middleware then;
Described Intelligent Recognition middleware offers the cellphone subscriber by the mobile phone application interface and discerns;
Described Intelligent Recognition code processor checking return results in the described mobile phone security module is if identification correctly then to confirm as be normal users, is proceeded the processing of mobile phone Secure Application.
7. method according to claim 6 is characterized in that, also comprises step:
Continuous three times Intelligent Recognition sign indicating number authentication faileds, Secure Application is with locked.
8. method according to claim 7 is characterized in that, also comprises step:
Described Intelligent Recognition code processor and described background update main frame periodic communication are upgraded upgrading automatically.
CN2010102572100A 2010-08-19 2010-08-19 System and method for authenticating identity of mobile phone user Pending CN101917720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102572100A CN101917720A (en) 2010-08-19 2010-08-19 System and method for authenticating identity of mobile phone user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102572100A CN101917720A (en) 2010-08-19 2010-08-19 System and method for authenticating identity of mobile phone user

Publications (1)

Publication Number Publication Date
CN101917720A true CN101917720A (en) 2010-12-15

Family

ID=43325079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102572100A Pending CN101917720A (en) 2010-08-19 2010-08-19 System and method for authenticating identity of mobile phone user

Country Status (1)

Country Link
CN (1) CN101917720A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
CN102255728A (en) * 2011-06-27 2011-11-23 成都天钥科技有限公司 Identity recognition method for computer system
WO2012116543A1 (en) * 2011-03-02 2012-09-07 中兴通讯股份有限公司 Method and system for logging in online bank through mobile phone, and bank server
CN102665208A (en) * 2012-04-06 2012-09-12 中国工商银行股份有限公司 Mobile terminal, terminal banking business security certification method, and terminal banking business security certification system
CN103778537A (en) * 2014-03-02 2014-05-07 郭沁谊 Mobile terminal payment system having iris identification mechanism and application method thereof
CN103955830A (en) * 2014-04-27 2014-07-30 谭希韬 Mobile bank transaction anti-fake method and system based on position
TWI492190B (en) * 2013-04-08 2015-07-11 正崴精密工業股份有限公司 Access control system and control method thereof

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118748A (en) * 2010-12-30 2011-07-06 胡利锋 Mobile phone integrated with security module
CN102118748B (en) * 2010-12-30 2014-10-29 胡利锋 Mobile phone integrated with security module
WO2012116543A1 (en) * 2011-03-02 2012-09-07 中兴通讯股份有限公司 Method and system for logging in online bank through mobile phone, and bank server
CN102255728A (en) * 2011-06-27 2011-11-23 成都天钥科技有限公司 Identity recognition method for computer system
CN102255728B (en) * 2011-06-27 2014-07-09 成都天钥科技有限公司 Identity recognition method for computer system
CN102665208A (en) * 2012-04-06 2012-09-12 中国工商银行股份有限公司 Mobile terminal, terminal banking business security certification method, and terminal banking business security certification system
TWI492190B (en) * 2013-04-08 2015-07-11 正崴精密工業股份有限公司 Access control system and control method thereof
CN103778537A (en) * 2014-03-02 2014-05-07 郭沁谊 Mobile terminal payment system having iris identification mechanism and application method thereof
CN103955830A (en) * 2014-04-27 2014-07-30 谭希韬 Mobile bank transaction anti-fake method and system based on position

Similar Documents

Publication Publication Date Title
US8788349B2 (en) Mobile payment using picture messaging
CN101496344B (en) Method and system having self-setting authentication formula for webs bank payment and identification confirmation
US20060032905A1 (en) Smart card network interface device
CN101917720A (en) System and method for authenticating identity of mobile phone user
CN103376896A (en) Method for electronic code drawing by eyes and electronic payment verification method
CN103366274A (en) Hybrid e-commerce instant payment method
CN103729948A (en) Electronic payment method of mobile terminal with NFC (near field communication) and fingerprint functions
US20140344157A1 (en) Method and device for carrying out cashless payment
US20140156530A1 (en) Method and Device for Carrying Out Cashless Payments
CN102298683A (en) Authentication device, system and method for short-distance radio-frequency communication authentication
CN104410968A (en) Portable universal integrated circuit card (UICC) subscriber terminal equipment and identity authentication system thereof
CN104246805A (en) Electronic transaction method
CN100456332C (en) Electronic clearing system and its operating method of mobile communication terminal
CN102800153B (en) The service downloading method and system of card swiping terminal
TW201026011A (en) Transaction in mobile card reader system using mobile phone and methods thereof
US20180349885A1 (en) Mobile device, method, computer program product and issuance system for configuring ticket co-branded credit card based on tokenization technology
CN104574691A (en) Service processing method and system based on automatic teller machine
JP2003122875A (en) Mobile ticket system and system control method
KR101867865B1 (en) System for issuing manless security card and method using the same
CN101770668B (en) Mobile phone capable of transacting with electronic transaction device
JP2002324219A (en) Card authentication system
JP2003187170A (en) Authentication processing system and authentication processing method using cellular phone
CN108665267A (en) Safety certification device and system
KR20110029038A (en) System and method for managing public certificate of attestation and recording medium
CN103164910A (en) Mobile payment warning method and mobile payment device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101215