CN102685073A - Secure payment method and mobile terminal - Google Patents
Secure payment method and mobile terminal Download PDFInfo
- Publication number
- CN102685073A CN102685073A CN201110059121XA CN201110059121A CN102685073A CN 102685073 A CN102685073 A CN 102685073A CN 201110059121X A CN201110059121X A CN 201110059121XA CN 201110059121 A CN201110059121 A CN 201110059121A CN 102685073 A CN102685073 A CN 102685073A
- Authority
- CN
- China
- Prior art keywords
- module
- request
- main control
- control module
- transaction information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention provides a secure payment method and a mobile terminal. The mobile terminal comprises a main control module, a secure module and a secure payment enabling module, wherein the main control module sends a protection code verification request to the secure module, the secure module sends a verification result that a protection code passes the verification to the main control module, and the main control module receives the verification result, sends a data encryption request to the secure module, and prompts users to confirm transaction information; the secure module is used for verifying the protection code in the protection code verification request, sending the verification result to the main control module, generating a secret key after the secure module is enabled by the secure payment enabling module, encrypting the transaction information in the data encryption request by means of the secret key, and sending the encrypted transaction information to the main control module; and the secure payment enabling module is used for enabling the secure module after the users confirm the transaction information. By means of the secure payment and the mobile terminal, the payment of the mobile terminal can be achieved on the premise that the normal communication function of the mobile phone terminal isn't influenced.
Description
Technical field
The present invention relates to the data service field, particularly safe payment method and portable terminal.
Background technology
Along with the development of mobile e-business, pay a kind of form by mails as personal information processing, being integrated in mobile phone terminal has become an inevitable trend.
Fig. 1 is existing mobile phone terminal payment flow figure.In Fig. 1,, extra increase payment processes module and signature blocks as shown in Figure 2 on the mobile phone terminal now need had for realizing the mobile phone terminal payment.Annexation on the payment processes module of this increase and signature blocks and the mobile phone terminal between other each modules is referring to shown in Figure 2.
Based on mobile phone terminal structure shown in Figure 2, flow process shown in Figure 1 can may further comprise the steps:
Step 101, main control module receive the payment information that the user fills in to the transaction request of service end transmission.
Step 102 activates the payment processes module by the user through keyboard is carried out enable operation.
Particularly, step 102 is: the user is through keyboard input activating pin, to activate the payment processes module.
Step 103, payment processes module transmission release screen and keyboard request are to main control module.
In the communication process of mobile phone terminal, main control module unified control screen and keyboard, and in this step 103, the payment processes module is sent screen and the keyboard request of discharging, purpose is in order to obtain the control of screen and keyboard from main control module.Also promptly, in payment process, the control of screen and keyboard no longer is controlled in the main control module, but is controlled in the payment processes module, specifically sees step 104 to step 107.
Step 104, the payment processes module receives the response of main control module.
After the execution of step 104, main control module is no longer controlled screen and keyboard.
Step 105, the payment processes module is sent and is searched the keyboard request to keyboard, and receives the response of keyboard.
After step 104 executed, main control module was no longer controlled screen and keyboard, and screen and keyboard are in notconnect state.And, then make keyboard by the payment processes module controls through this step 105, promptly be in the state that connects the payment processes module.
Step 106, payment processes module receive the affirmation of user to payment information.
Step 107, payment processes module are sent the button affirmation and are asked to keyboard, and receive the response of keyboard.
Execution of step 105 is to step 105, and the control of keyboard and screen is taken over by the payment processes module.
Step 108, the payment processes module is sent the data encryption request and is given signature blocks.
This enciphering request is carried the payment information that the user fills in.
Step 109, signature blocks is carried out digital signature to the payment information in the data enciphering request, and returns encrypt data to payment processes module.
Step 110, the payment processes module is returned encrypt data to main control module.
Step 111 makes payment processes module deactivation status by the user through finishing enable operation.
Step 112, payment processes module are sent and are stopped encrypting messages to main control module, are taken over the control of screen and keyboard again by main control module.
Main control module is taken over the control of screen and keyboard again specifically can be referring to the description of step 105 to step 107.
So far, accomplish flow process shown in Figure 1.
Can find out from flow process shown in Figure 1, though can realize the payment of mobile phone terminal,, use inconvenience, be specially:
The payment transaction of one whole needs the user that keyboard is carried out three operations in the existing payment flow: before paying; The user activates the payment processes module through keyboard is carried out corresponding operating, and when paying, the user carries out corresponding operating to realize payment to keyboard; After completion is carried out digital signature to payment information; The user carries out the deexcitation of corresponding operating with realization payment processes module to keyboard, and each operation of carrying out is different; Usually all require the input different ciphers, this has increased difficulty and inconvenience that the user uses.
In addition; In existing procedure; In order to guarantee the safety of payment of mobile phone terminal; Usually forbidding that the payment processes module is open to operating system on the mobile phone and software, also is that the spendable payment transaction of mobile phone needs when mobile phone terminal dispatches from the factory, to preset, and can not use the payment of mobile phone terminal and carry out flexible management.
Also have, in the existing payment flow, when mobile phone terminal was paid, keyboard and screen were taken over by the payment processes module fully, and this can cause mobile phone terminal can't accomplish normal communication function.
Summary of the invention
The invention provides safe payment method and portable terminal, under the prerequisite that does not influence mobile phone terminal proper communication function, to realize mobile terminal payment.
Technical scheme provided by the invention comprises:
A kind of portable terminal that is applied to secure payment, said portable terminal comprises: main control module; Its key is that said portable terminal also comprises: security module and secure payment enable module; Wherein,
Main control module is used to send the protected code checking asks to security module, and when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Said security module is used for the protected code of said protected code checking request is verified processing; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the said data encryption request is carried out encryption, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
A kind of safe payment method, this method is applied to comprise the portable terminal of main control module, and said portable terminal also comprises: security module and secure payment enable module; This method comprises:
Security module receives the protected code checking request that main control module sends, and the protected code in the said protected code checking request is verified processing, will verify that the result sends to said main control module;
Main control module receives said checking result, when being said protected code through checking, send the data encryption request to security module, and the prompting user confirms in said checking result to Transaction Information;
The secure payment enable module enables security module after the user confirms Transaction Information;
Security module receives said data encryption request, and after self being enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the said data encryption request is carried out encryption, and the Transaction Information after encrypting is sent to main control module.
Can find out that by above technical scheme among the present invention, when mobile phone terminal is paid, do not shift the control of keyboard and screen, this has realized not influencing when mobile phone terminal is paid the proper communication function of mobile phone;
Further, among the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in the existing procedure, reduced user's operation, reduced the use threshold.
Description of drawings
Fig. 1 is existing mobile phone terminal payment flow figure;
Fig. 2 is the structural representation that existing mobile phone terminal is realized payment;
Fig. 3 shows the structure chart of mobile phone terminal provided by the invention;
Fig. 4 is a method flow diagram provided by the invention.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer, describe the present invention below in conjunction with accompanying drawing and specific embodiment.
The invention provides the portable terminal that is applied to secure payment, this portable terminal can be mobile phone terminal or other handheld devices such as ipod when specifically realizing, only be below with the portable terminal mobile phone terminal be example present invention is described, other situation principles are similar.
Referring to Fig. 3, Fig. 3 shows the structure chart of mobile phone terminal provided by the invention.Mobile phone terminal shown in Fig. 3, than existing mobile phone terminal, except comprising main control module, also extra security module and the secure payment enable module of having increased.
Wherein, main control module is used to send the protected code checking asks to security module, and when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Security module is used for the protected code of the protected code checking request that receives is verified; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the data encryption request that receives is encrypted, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
In the present embodiment, main control module further comprised before sending protected code to security module:
Reception is from the transaction request of service end, and the Transaction Information that provides of user;
Send the protected code input and ask, and the user that requires that the reception security module is sent provides the notice of protected code to security module;
Receive the protected code that the user provides according to said notice.
Preferably, as shown in Figure 3, said portable terminal further comprises: communication module and Near Field Communication module;
Said main control module is further used for sending Transaction Information to said communication module and/or the Near Field Communication module after the encryption;
Said communication module links to each other with said main control module; Be used to adopt aerial mode to communicate such as WWW, WAP or note and as the remote application server of service end; Such as; To sending the Transaction Information after encrypting as the remote application server of service end, and the authentication result etc. that receives the Transaction Information after service end is encrypted this.
Said Near Field Communication module is connected between main control module and the security module; Be used for and communicate as the on-site payment terminal of service end; Such as; To sending the Transaction Information after encrypting as the on-site payment terminal of service end, and the authentication result etc. that receives the Transaction Information after service end is encrypted this.
Need to prove; Consider application flexibility of the present invention, among the present invention, security module whenever receives a request; Such as the arbitrary request in protected code input request recited above, protected code checking request or the data encryption request; The capital is that keyword finds corresponding priorities in the response process table that is provided with in advance with the corresponding application message of this request, confirms current this request of whether handling according to said priority, if; Then interrupt the current processing operation of just carrying out, handling should request.That is to say that security module is not this request of without exception handling immediately after the request of receiving; But determine whether handling immediately this request according to the priority of this request; Such as, if priority is higher than the priority of the current processing operation of just carrying out, then confirm the current request of being somebody's turn to do of handling immediately; Otherwise, confirm currently needn't handle this request immediately; This has realized the flexibility of application processes.
Wherein, the corresponding application message of request is module id, the corresponding application identities of described request that is used to send described request.Here, the corresponding application identities of request is mainly request corresponding application numbers and answer code.
And comprise the corresponding relation between module id, application identities and the priority three in the response process table, wherein, application identities can be through the embodiment of application numbers and answer code, specifically can be referring to shown in the table 1:
Interface identifier | Application numbers | Answer code | Priority |
The main control module sign | |||
The Near Field Communication module id |
In the present embodiment, when specifically realizing, security module can comprise key shown in Figure 3 (Key) circuit and application management module.
Wherein, said application management module is used for said protected code is verified, will verify that the result sends to said main control module, and the management that the multi-service of being responsible for said portable terminal and providing is used is isolated with safety.Usually; The service application that portable terminal provides is not merely payment; Also comprise other application such as stored value card, electronic cash; These a plurality of service application unifications are managed by application management module, and in order to guarantee the fail safe between each different service application, this application management module is used each different service and carried out safe isolation.
Said key circuit is used for after said security module is enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information after encrypting is sent to main control module.
In the present embodiment, when specifically realizing, the secure payment enable module can adopt the mode of hardware circuit to realize that this can guarantee than higher degree of safety.Certainly, not that this secure payment enable module also can adopt the mode of soft simulation to realize under the very high prerequisite to security requirement.
Wherein, as shown in Figure 3, the secure payment enable module can comprise security module enable circuits and secure payment button.
The peripheral circuit of security module enable circuits and security module directly links to each other, and is used for through using said secure payment button that said security module is enabled control.Such as, when pressing the secure payment button, enable security module.Based on this, for ease of payment button safe in utilization, said secure payment button can be set in position easy to use, such as, at the surface location place of mobile phone terminal.
Need to prove that the security module enable circuits in the present embodiment can be supplied power by security module, to guarantee security-enabled module operate as normal.Certainly, as a kind of expansion of the embodiment of the invention, this security module enable circuits also can adopt other functional unit power supplies except that security module, and the embodiment of the invention does not specifically limit.
So far, completion is to the description of mobile phone terminal shown in Figure 3.
Based on the structure of mobile phone terminal shown in Figure 3 method provided by the invention is described below:
Referring to Fig. 4, Fig. 4 is a method flow diagram provided by the invention.As shown in Figure 4, this flow process can may further comprise the steps:
Step 401, main control module receives the transaction request that service end is sent.
This transaction request is used to notify the user that Transaction Information is provided.
Step 402, main control module receives the Transaction Information that the user provides based on said transaction request.
Step 403, main control module are sent the protected code input and are asked to security module.
Protected code request in this step 403 is used to ask the security module transmission to require the user that the notice of protected code is provided, and specifically sees step 404.
After step 404, security module received protected code input request, transmission required the user that notifying to main control module of protected code is provided.
Preferably, in this step 404, security module can the corresponding application message of this protected code input request be that corresponding priorities searched in keyword in table 1; If this priority ratio is higher, require to handle immediately this protected code input request, the then transmit operation in the execution in step 404; And interrupt current other operations of just carrying out, otherwise, this protected code input request ignored; After handling current other operations of just carrying out, the transmit operation in the execution in step 404.
Step 405, main control module offer the user after receiving said notice, and receive the protected code that the user provides based on said notice.
Step 406, main control module are sent the protected code checking and are asked to security module.
After step 407, security module receive protected code checking request, the protected code in this protected code checking request is verified, will be verified that the result sends to main control module.
Preferably, similar with step 404, in this step 407; Security module can the corresponding application message of this protected code checking request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher, requires to handle immediately this protected code checking request; The verification operation in the execution in step 407 then, and interrupt current other operations of just carrying out, otherwise; Ignore this protected code checking request, after handling current other operations of just carrying out, the verification operation in the execution in step 407.
When step 408, main control module are passed through checking in the checking result who receives for said protected code, send the data encryption request, show Transaction Information, and the prompting user confirms to this Transaction Information to security module.
Carried the Transaction Information of mentioning in the step 402 in the data encryption request of this moment.
After step 409, security module receive the data encryption request, send to encrypt and notify to the secure payment enable module.
Preferably, preferably, similar with step 404 or step 407; In this step 409, security module can the corresponding application message of this data encryption request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher; Require to handle this data encryption request immediately, the then transmit operation in the execution in step 409, and interrupt current other operations of just carrying out; Otherwise; Ignore this data encryption request, after handling current other operations of just carrying out, the transmit operation in the execution in step 409.
Step 410, secure payment enable module receive said encryption notice, and when the secure payment button of self is triggered, enable security module.
In this step 410, the secure payment button is triggered such as being pressed, and means that also the user confirms the Transaction Information that shows in the step 408.
Step 411, security module is enabled the back at self by the secure payment enable module and generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information (being called encrypt data) after encrypting is sent to main control module.
Preferably, preferably, similar with step 404, step 407 or step 409; In this step 411, security module can the corresponding application message of this data encryption request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher; Require to handle immediately this data encryption request; Generation key and the cryptographic operation in the execution in step 411 then, and interrupt current other operations of just carrying out, otherwise; After handling current other operations of just carrying out, generation key and cryptographic operation in the execution in step 411.Such as, in the process that mobile phone terminal communicates, receive the processing notice of in the step 411 Transaction Information in the data enciphering request being encrypted; Usually; The priority ratio of traffic operation is higher, then ignores this notice, continues the executive communication operation; After accomplishing communication, the cryptographic operation in the execution in step 411.
Step 412, if service end is a remote application server, then main control module sends encrypt data to communication module, adopts aerial mode to send encrypt data to service end by this communication module; If service end is the on-site payment terminal, then main control module sends encrypt data to Near Field Communication module, sends encrypt data by this Near Field Communication module to service end.
So far, accomplish flow process shown in Figure 4.
Can find out by above technical scheme; Among the present invention; The secure payment enable module adopts hardware implementation mode to realize that this has improved than higher safety guarantee, when main control module or proximity communication module receive virus or trojan horse program and attack; Still can guarantee the safety of transaction flow, the problem of account trading takes place under the situation of not perception of solution user;
Further, among the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in the existing procedure, reduced user's operation, reduced the use threshold;
Further, among the present invention, when mobile phone terminal is paid, do not shift the control of keyboard and screen, this has realized not influencing when mobile phone terminal is paid the proper communication function of mobile phone;
At last, the present invention can make the program designer formulate corresponding strategy according to the application of different level of securitys through the response process table is set in security module, has improved the flexibility of Application Design.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being made, is equal to replacement, improvement etc., all should be included within the scope that the present invention protects.
Claims (12)
1. portable terminal that is applied to secure payment, said portable terminal comprises: main control module; It is characterized in that said portable terminal also comprises: security module and secure payment enable module; Wherein,
Main control module is used to send the protected code checking asks to security module, when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Said security module is used for the protected code of said protected code checking request is verified processing; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the said data encryption request is carried out encryption, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
2. portable terminal according to claim 1; It is characterized in that said security module before arbitrary request, is that keyword finds corresponding priorities in the response process table that is provided with in advance with the corresponding application message of this request in handling protected code checking request and data encryption request; Confirm current this request of whether handling according to said priority; If, then interrupt the current processing operation of just carrying out, diversion treatments should request.
3. portable terminal according to claim 2 is characterized in that, the corresponding application message of described request is: the module id application identities corresponding with this request that is used to send this request;
Comprise the corresponding relation between module id, application identities and the priority three in the said response process table.
4. according to the arbitrary described portable terminal of claim 1 to 3, it is characterized in that said security module comprises: key K ey circuit and application management module;
Said application management module is used for said protected code is verified, will verify that the result sends to said main control module, and the management that the multi-service of being responsible for said portable terminal and providing is used is isolated with safety;
Said key circuit is used for after said security module is enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information after encrypting is sent to main control module.
5. portable terminal according to claim 1 is characterized in that, said secure payment enable module comprises: security module enable circuits and secure payment button;
Said security module enable circuits directly links to each other with the peripheral circuit of said security module, is used for through using said secure payment button that said security module is enabled control.
6. according to claim 1 or 5 described portable terminals, it is characterized in that said secure payment enable module adopts the mode of hardware circuit to realize, perhaps, adopt the mode of soft simulation to realize.
7. portable terminal according to claim 1 is characterized in that, said portable terminal further comprises: communication module and Near Field Communication module;
Said main control module is further used for sending Transaction Information to said communication module and/or the Near Field Communication module after the encryption;
Said communication module links to each other with said main control module, is used to adopt aerial mode to send the Transaction Information after encrypting to the remote application server as service end;
Said Near Field Communication module is connected between main control module and the security module, is used for sending the Transaction Information after encrypting to the on-site payment terminal as service end.
8. safe payment method, this method is applied to comprise the portable terminal of main control module, it is characterized in that, and said portable terminal also comprises: security module and secure payment enable module; This method comprises:
Security module receives the protected code checking request that main control module sends, and the protected code in the said protected code checking request is verified processing, will verify that the result sends to said main control module;
Main control module receives said checking result, when being said protected code through checking, send the data encryption request to security module, and the prompting user confirms in said checking result to Transaction Information;
The secure payment enable module enables security module after the user confirms Transaction Information;
Security module receives said data encryption request, and after self being enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the said data encryption request is carried out encryption, and the Transaction Information after encrypting is sent to main control module.
9. method according to claim 8; It is characterized in that said security module before arbitrary request, further comprises in protected code checking request and data encryption request: with the corresponding application message of this request is that keyword finds corresponding priorities in the response process table that is provided with in advance; Confirm current this request of whether handling according to said priority; If, then interrupt the current processing operation of just carrying out, diversion treatments should request.
10. method according to claim 9 is characterized in that, the corresponding application message of described request is: the module id, the corresponding application identities of this request that are used to send this request;
Comprise the corresponding relation between module id, application identities and the priority three in the said response process table.
11. method according to claim 8 is characterized in that, said secure payment enable module adopts the mode of hardware circuit to realize, perhaps, adopts the mode of soft simulation to realize.
12. method according to claim 8 is characterized in that, main control module asks to security module, further to comprise in the checking of transmission protected code:
Main control module receives transaction request from service end, and receives the Transaction Information that the user provides based on said transaction request, sends the protected code input afterwards and asks to security module;
After said security module received protected code input request, transmission required the user that notifying to main control module of protected code is provided;
Main control module receives said notice, and receives the protected code that the user provides based on said notice.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110059121.XA CN102685073B (en) | 2011-03-11 | 2011-03-11 | Safe payment method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110059121.XA CN102685073B (en) | 2011-03-11 | 2011-03-11 | Safe payment method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102685073A true CN102685073A (en) | 2012-09-19 |
CN102685073B CN102685073B (en) | 2016-04-27 |
Family
ID=46816445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110059121.XA Active CN102685073B (en) | 2011-03-11 | 2011-03-11 | Safe payment method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102685073B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198397A (en) * | 2013-04-12 | 2013-07-10 | 苏州通付盾信息技术有限公司 | Mobile payment method based on risk assessment and multiple credibility judgment steps |
CN105260890A (en) * | 2015-09-25 | 2016-01-20 | 镇江明泰信息科技有限公司 | On-line secure payment method based on multi-domain user information big data analysis |
CN105550863A (en) * | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Mobile payment method and wearable equipment |
CN105684010A (en) * | 2013-08-15 | 2016-06-15 | 维萨国际服务协会 | Secure remote payment transaction processing using a secure element |
TWI599972B (en) * | 2016-07-29 | 2017-09-21 | Transaction Key Management Supplementary Methods | |
WO2019080853A1 (en) * | 2017-10-24 | 2019-05-02 | 丘炎卫 | System supporting peer-to-peer interactive connection technology for noncash transaction information accessibility |
WO2020063796A1 (en) * | 2018-09-28 | 2020-04-02 | 新明华区块链技术(深圳)有限公司 | Method, apparatus and system for implementing remote signing by controlling security chip |
US10817875B2 (en) | 2013-09-20 | 2020-10-27 | Visa International Service Association | Secure remote payment transaction processing including consumer authentication |
US11055694B2 (en) | 2013-07-15 | 2021-07-06 | Visa International Service Association | Secure remote payment transaction processing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1344396A (en) * | 1999-03-02 | 2002-04-10 | 艾斯格尼克斯公司 | Portable electronic charge and authorization devices and methods therefor |
CN101394615A (en) * | 2007-09-20 | 2009-03-25 | 中国银联股份有限公司 | Mobile payment terminal and payment method based on PKI technique |
CN101834946A (en) * | 2010-05-11 | 2010-09-15 | 丁峰 | Method for performing safe mobile phone payment and mobile phone for performing safe payment |
CN101882233A (en) * | 2010-06-02 | 2010-11-10 | 方亚南 | Multifunctional chip card |
CN101980309A (en) * | 2010-10-14 | 2011-02-23 | 中兴通讯股份有限公司 | Near field communication (NFC) mobile terminal and NFC safety payment realizing method |
-
2011
- 2011-03-11 CN CN201110059121.XA patent/CN102685073B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1344396A (en) * | 1999-03-02 | 2002-04-10 | 艾斯格尼克斯公司 | Portable electronic charge and authorization devices and methods therefor |
CN101394615A (en) * | 2007-09-20 | 2009-03-25 | 中国银联股份有限公司 | Mobile payment terminal and payment method based on PKI technique |
CN101834946A (en) * | 2010-05-11 | 2010-09-15 | 丁峰 | Method for performing safe mobile phone payment and mobile phone for performing safe payment |
CN101882233A (en) * | 2010-06-02 | 2010-11-10 | 方亚南 | Multifunctional chip card |
CN101980309A (en) * | 2010-10-14 | 2011-02-23 | 中兴通讯股份有限公司 | Near field communication (NFC) mobile terminal and NFC safety payment realizing method |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103198397A (en) * | 2013-04-12 | 2013-07-10 | 苏州通付盾信息技术有限公司 | Mobile payment method based on risk assessment and multiple credibility judgment steps |
US11055694B2 (en) | 2013-07-15 | 2021-07-06 | Visa International Service Association | Secure remote payment transaction processing |
CN105684010B (en) * | 2013-08-15 | 2021-04-20 | 维萨国际服务协会 | Secure remote payment transaction processing using secure elements |
CN105684010A (en) * | 2013-08-15 | 2016-06-15 | 维萨国际服务协会 | Secure remote payment transaction processing using a secure element |
US11062306B2 (en) | 2013-08-15 | 2021-07-13 | Visa International Service Association | Secure remote payment transaction processing using a secure element |
US11188901B2 (en) | 2013-08-15 | 2021-11-30 | Visa International Service Association | Secure remote payment transaction processing using a secure element |
US10817875B2 (en) | 2013-09-20 | 2020-10-27 | Visa International Service Association | Secure remote payment transaction processing including consumer authentication |
US11710120B2 (en) | 2013-09-20 | 2023-07-25 | Visa International Service Association | Secure remote payment transaction processing including consumer authentication |
WO2017020417A1 (en) * | 2015-07-31 | 2017-02-09 | 宇龙计算机通信科技(深圳)有限公司 | Method for mobile payment and wearable device |
CN105550863A (en) * | 2015-07-31 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Mobile payment method and wearable equipment |
CN105260890A (en) * | 2015-09-25 | 2016-01-20 | 镇江明泰信息科技有限公司 | On-line secure payment method based on multi-domain user information big data analysis |
TWI599972B (en) * | 2016-07-29 | 2017-09-21 | Transaction Key Management Supplementary Methods | |
WO2019080853A1 (en) * | 2017-10-24 | 2019-05-02 | 丘炎卫 | System supporting peer-to-peer interactive connection technology for noncash transaction information accessibility |
WO2020063796A1 (en) * | 2018-09-28 | 2020-04-02 | 新明华区块链技术(深圳)有限公司 | Method, apparatus and system for implementing remote signing by controlling security chip |
Also Published As
Publication number | Publication date |
---|---|
CN102685073B (en) | 2016-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102685073A (en) | Secure payment method and mobile terminal | |
CN106453330B (en) | A kind of identity authentication method and system | |
CN103595718B (en) | A kind of POS terminal Activiation method, system, service platform and POS terminal | |
CN104618116B (en) | A kind of cooperative digital signature system and its method | |
KR101239297B1 (en) | System for protecting information and method thereof | |
CN102945526B (en) | A kind of device and method for improving mobile equipment on-line safety of payment | |
US9344896B2 (en) | Method and system for delivering a command to a mobile device | |
CN105308898B (en) | For executing system, the method and apparatus of password authentification | |
CN103036681B (en) | A kind of password safety keyboard device and system | |
CN106611310B (en) | Data processing method, wearable electronic device and system | |
CN103095457A (en) | Login and verification method for application program | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN103220148A (en) | Method and system for electronic signature token to respond operation request, and electronic signature token | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN110278083A (en) | ID authentication request treating method and apparatus, equipment replacement method and apparatus | |
CN106357679A (en) | Method, system and client for password authentication, and server and intelligent equipment | |
CN101478547A (en) | Apparatus for trustable digital signature to intelligent cipher key and working method thereof | |
KR100792163B1 (en) | Authentication system for on-line banking, and user terminal for the same | |
CN109218026A (en) | The method and system of licensing scheme is executed between service terminal system and Help Desk system | |
CN201974884U (en) | Vehicle-mounted system | |
CN202978979U (en) | Password security keypad device and password security pad system | |
CN105631672A (en) | Transaction data processing method and device, and safety equipment | |
CN101867894A (en) | Short message consumption method and server thereof | |
JP5135331B2 (en) | PC external signature apparatus having wireless communication capability | |
KR101103189B1 (en) | System and Method for Issueing Public Certificate of Attestation using USIM Information and Recording Medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |