CN102685073A - Secure payment method and mobile terminal - Google Patents

Secure payment method and mobile terminal Download PDF

Info

Publication number
CN102685073A
CN102685073A CN201110059121XA CN201110059121A CN102685073A CN 102685073 A CN102685073 A CN 102685073A CN 201110059121X A CN201110059121X A CN 201110059121XA CN 201110059121 A CN201110059121 A CN 201110059121A CN 102685073 A CN102685073 A CN 102685073A
Authority
CN
China
Prior art keywords
module
request
main control
control module
transaction information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110059121XA
Other languages
Chinese (zh)
Other versions
CN102685073B (en
Inventor
黄更生
朱本浩
葛欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201110059121.XA priority Critical patent/CN102685073B/en
Publication of CN102685073A publication Critical patent/CN102685073A/en
Application granted granted Critical
Publication of CN102685073B publication Critical patent/CN102685073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a secure payment method and a mobile terminal. The mobile terminal comprises a main control module, a secure module and a secure payment enabling module, wherein the main control module sends a protection code verification request to the secure module, the secure module sends a verification result that a protection code passes the verification to the main control module, and the main control module receives the verification result, sends a data encryption request to the secure module, and prompts users to confirm transaction information; the secure module is used for verifying the protection code in the protection code verification request, sending the verification result to the main control module, generating a secret key after the secure module is enabled by the secure payment enabling module, encrypting the transaction information in the data encryption request by means of the secret key, and sending the encrypted transaction information to the main control module; and the secure payment enabling module is used for enabling the secure module after the users confirm the transaction information. By means of the secure payment and the mobile terminal, the payment of the mobile terminal can be achieved on the premise that the normal communication function of the mobile phone terminal isn't influenced.

Description

Safe payment method and portable terminal
Technical field
The present invention relates to the data service field, particularly safe payment method and portable terminal.
Background technology
Along with the development of mobile e-business, pay a kind of form by mails as personal information processing, being integrated in mobile phone terminal has become an inevitable trend.
Fig. 1 is existing mobile phone terminal payment flow figure.In Fig. 1,, extra increase payment processes module and signature blocks as shown in Figure 2 on the mobile phone terminal now need had for realizing the mobile phone terminal payment.Annexation on the payment processes module of this increase and signature blocks and the mobile phone terminal between other each modules is referring to shown in Figure 2.
Based on mobile phone terminal structure shown in Figure 2, flow process shown in Figure 1 can may further comprise the steps:
Step 101, main control module receive the payment information that the user fills in to the transaction request of service end transmission.
Step 102 activates the payment processes module by the user through keyboard is carried out enable operation.
Particularly, step 102 is: the user is through keyboard input activating pin, to activate the payment processes module.
Step 103, payment processes module transmission release screen and keyboard request are to main control module.
In the communication process of mobile phone terminal, main control module unified control screen and keyboard, and in this step 103, the payment processes module is sent screen and the keyboard request of discharging, purpose is in order to obtain the control of screen and keyboard from main control module.Also promptly, in payment process, the control of screen and keyboard no longer is controlled in the main control module, but is controlled in the payment processes module, specifically sees step 104 to step 107.
Step 104, the payment processes module receives the response of main control module.
After the execution of step 104, main control module is no longer controlled screen and keyboard.
Step 105, the payment processes module is sent and is searched the keyboard request to keyboard, and receives the response of keyboard.
After step 104 executed, main control module was no longer controlled screen and keyboard, and screen and keyboard are in notconnect state.And, then make keyboard by the payment processes module controls through this step 105, promptly be in the state that connects the payment processes module.
Step 106, payment processes module receive the affirmation of user to payment information.
Step 107, payment processes module are sent the button affirmation and are asked to keyboard, and receive the response of keyboard.
Execution of step 105 is to step 105, and the control of keyboard and screen is taken over by the payment processes module.
Step 108, the payment processes module is sent the data encryption request and is given signature blocks.
This enciphering request is carried the payment information that the user fills in.
Step 109, signature blocks is carried out digital signature to the payment information in the data enciphering request, and returns encrypt data to payment processes module.
Step 110, the payment processes module is returned encrypt data to main control module.
Step 111 makes payment processes module deactivation status by the user through finishing enable operation.
Step 112, payment processes module are sent and are stopped encrypting messages to main control module, are taken over the control of screen and keyboard again by main control module.
Main control module is taken over the control of screen and keyboard again specifically can be referring to the description of step 105 to step 107.
So far, accomplish flow process shown in Figure 1.
Can find out from flow process shown in Figure 1, though can realize the payment of mobile phone terminal,, use inconvenience, be specially:
The payment transaction of one whole needs the user that keyboard is carried out three operations in the existing payment flow: before paying; The user activates the payment processes module through keyboard is carried out corresponding operating, and when paying, the user carries out corresponding operating to realize payment to keyboard; After completion is carried out digital signature to payment information; The user carries out the deexcitation of corresponding operating with realization payment processes module to keyboard, and each operation of carrying out is different; Usually all require the input different ciphers, this has increased difficulty and inconvenience that the user uses.
In addition; In existing procedure; In order to guarantee the safety of payment of mobile phone terminal; Usually forbidding that the payment processes module is open to operating system on the mobile phone and software, also is that the spendable payment transaction of mobile phone needs when mobile phone terminal dispatches from the factory, to preset, and can not use the payment of mobile phone terminal and carry out flexible management.
Also have, in the existing payment flow, when mobile phone terminal was paid, keyboard and screen were taken over by the payment processes module fully, and this can cause mobile phone terminal can't accomplish normal communication function.
Summary of the invention
The invention provides safe payment method and portable terminal, under the prerequisite that does not influence mobile phone terminal proper communication function, to realize mobile terminal payment.
Technical scheme provided by the invention comprises:
A kind of portable terminal that is applied to secure payment, said portable terminal comprises: main control module; Its key is that said portable terminal also comprises: security module and secure payment enable module; Wherein,
Main control module is used to send the protected code checking asks to security module, and when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Said security module is used for the protected code of said protected code checking request is verified processing; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the said data encryption request is carried out encryption, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
A kind of safe payment method, this method is applied to comprise the portable terminal of main control module, and said portable terminal also comprises: security module and secure payment enable module; This method comprises:
Security module receives the protected code checking request that main control module sends, and the protected code in the said protected code checking request is verified processing, will verify that the result sends to said main control module;
Main control module receives said checking result, when being said protected code through checking, send the data encryption request to security module, and the prompting user confirms in said checking result to Transaction Information;
The secure payment enable module enables security module after the user confirms Transaction Information;
Security module receives said data encryption request, and after self being enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the said data encryption request is carried out encryption, and the Transaction Information after encrypting is sent to main control module.
Can find out that by above technical scheme among the present invention, when mobile phone terminal is paid, do not shift the control of keyboard and screen, this has realized not influencing when mobile phone terminal is paid the proper communication function of mobile phone;
Further, among the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in the existing procedure, reduced user's operation, reduced the use threshold.
Description of drawings
Fig. 1 is existing mobile phone terminal payment flow figure;
Fig. 2 is the structural representation that existing mobile phone terminal is realized payment;
Fig. 3 shows the structure chart of mobile phone terminal provided by the invention;
Fig. 4 is a method flow diagram provided by the invention.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer, describe the present invention below in conjunction with accompanying drawing and specific embodiment.
The invention provides the portable terminal that is applied to secure payment, this portable terminal can be mobile phone terminal or other handheld devices such as ipod when specifically realizing, only be below with the portable terminal mobile phone terminal be example present invention is described, other situation principles are similar.
Referring to Fig. 3, Fig. 3 shows the structure chart of mobile phone terminal provided by the invention.Mobile phone terminal shown in Fig. 3, than existing mobile phone terminal, except comprising main control module, also extra security module and the secure payment enable module of having increased.
Wherein, main control module is used to send the protected code checking asks to security module, and when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Security module is used for the protected code of the protected code checking request that receives is verified; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the data encryption request that receives is encrypted, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
In the present embodiment, main control module further comprised before sending protected code to security module:
Reception is from the transaction request of service end, and the Transaction Information that provides of user;
Send the protected code input and ask, and the user that requires that the reception security module is sent provides the notice of protected code to security module;
Receive the protected code that the user provides according to said notice.
Preferably, as shown in Figure 3, said portable terminal further comprises: communication module and Near Field Communication module;
Said main control module is further used for sending Transaction Information to said communication module and/or the Near Field Communication module after the encryption;
Said communication module links to each other with said main control module; Be used to adopt aerial mode to communicate such as WWW, WAP or note and as the remote application server of service end; Such as; To sending the Transaction Information after encrypting as the remote application server of service end, and the authentication result etc. that receives the Transaction Information after service end is encrypted this.
Said Near Field Communication module is connected between main control module and the security module; Be used for and communicate as the on-site payment terminal of service end; Such as; To sending the Transaction Information after encrypting as the on-site payment terminal of service end, and the authentication result etc. that receives the Transaction Information after service end is encrypted this.
Need to prove; Consider application flexibility of the present invention, among the present invention, security module whenever receives a request; Such as the arbitrary request in protected code input request recited above, protected code checking request or the data encryption request; The capital is that keyword finds corresponding priorities in the response process table that is provided with in advance with the corresponding application message of this request, confirms current this request of whether handling according to said priority, if; Then interrupt the current processing operation of just carrying out, handling should request.That is to say that security module is not this request of without exception handling immediately after the request of receiving; But determine whether handling immediately this request according to the priority of this request; Such as, if priority is higher than the priority of the current processing operation of just carrying out, then confirm the current request of being somebody's turn to do of handling immediately; Otherwise, confirm currently needn't handle this request immediately; This has realized the flexibility of application processes.
Wherein, the corresponding application message of request is module id, the corresponding application identities of described request that is used to send described request.Here, the corresponding application identities of request is mainly request corresponding application numbers and answer code.
And comprise the corresponding relation between module id, application identities and the priority three in the response process table, wherein, application identities can be through the embodiment of application numbers and answer code, specifically can be referring to shown in the table 1:
Interface identifier Application numbers Answer code Priority
The main control module sign
The Near Field Communication module id
In the present embodiment, when specifically realizing, security module can comprise key shown in Figure 3 (Key) circuit and application management module.
Wherein, said application management module is used for said protected code is verified, will verify that the result sends to said main control module, and the management that the multi-service of being responsible for said portable terminal and providing is used is isolated with safety.Usually; The service application that portable terminal provides is not merely payment; Also comprise other application such as stored value card, electronic cash; These a plurality of service application unifications are managed by application management module, and in order to guarantee the fail safe between each different service application, this application management module is used each different service and carried out safe isolation.
Said key circuit is used for after said security module is enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information after encrypting is sent to main control module.
In the present embodiment, when specifically realizing, the secure payment enable module can adopt the mode of hardware circuit to realize that this can guarantee than higher degree of safety.Certainly, not that this secure payment enable module also can adopt the mode of soft simulation to realize under the very high prerequisite to security requirement.
Wherein, as shown in Figure 3, the secure payment enable module can comprise security module enable circuits and secure payment button.
The peripheral circuit of security module enable circuits and security module directly links to each other, and is used for through using said secure payment button that said security module is enabled control.Such as, when pressing the secure payment button, enable security module.Based on this, for ease of payment button safe in utilization, said secure payment button can be set in position easy to use, such as, at the surface location place of mobile phone terminal.
Need to prove that the security module enable circuits in the present embodiment can be supplied power by security module, to guarantee security-enabled module operate as normal.Certainly, as a kind of expansion of the embodiment of the invention, this security module enable circuits also can adopt other functional unit power supplies except that security module, and the embodiment of the invention does not specifically limit.
So far, completion is to the description of mobile phone terminal shown in Figure 3.
Based on the structure of mobile phone terminal shown in Figure 3 method provided by the invention is described below:
Referring to Fig. 4, Fig. 4 is a method flow diagram provided by the invention.As shown in Figure 4, this flow process can may further comprise the steps:
Step 401, main control module receives the transaction request that service end is sent.
This transaction request is used to notify the user that Transaction Information is provided.
Step 402, main control module receives the Transaction Information that the user provides based on said transaction request.
Step 403, main control module are sent the protected code input and are asked to security module.
Protected code request in this step 403 is used to ask the security module transmission to require the user that the notice of protected code is provided, and specifically sees step 404.
After step 404, security module received protected code input request, transmission required the user that notifying to main control module of protected code is provided.
Preferably, in this step 404, security module can the corresponding application message of this protected code input request be that corresponding priorities searched in keyword in table 1; If this priority ratio is higher, require to handle immediately this protected code input request, the then transmit operation in the execution in step 404; And interrupt current other operations of just carrying out, otherwise, this protected code input request ignored; After handling current other operations of just carrying out, the transmit operation in the execution in step 404.
Step 405, main control module offer the user after receiving said notice, and receive the protected code that the user provides based on said notice.
Step 406, main control module are sent the protected code checking and are asked to security module.
After step 407, security module receive protected code checking request, the protected code in this protected code checking request is verified, will be verified that the result sends to main control module.
Preferably, similar with step 404, in this step 407; Security module can the corresponding application message of this protected code checking request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher, requires to handle immediately this protected code checking request; The verification operation in the execution in step 407 then, and interrupt current other operations of just carrying out, otherwise; Ignore this protected code checking request, after handling current other operations of just carrying out, the verification operation in the execution in step 407.
When step 408, main control module are passed through checking in the checking result who receives for said protected code, send the data encryption request, show Transaction Information, and the prompting user confirms to this Transaction Information to security module.
Carried the Transaction Information of mentioning in the step 402 in the data encryption request of this moment.
After step 409, security module receive the data encryption request, send to encrypt and notify to the secure payment enable module.
Preferably, preferably, similar with step 404 or step 407; In this step 409, security module can the corresponding application message of this data encryption request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher; Require to handle this data encryption request immediately, the then transmit operation in the execution in step 409, and interrupt current other operations of just carrying out; Otherwise; Ignore this data encryption request, after handling current other operations of just carrying out, the transmit operation in the execution in step 409.
Step 410, secure payment enable module receive said encryption notice, and when the secure payment button of self is triggered, enable security module.
In this step 410, the secure payment button is triggered such as being pressed, and means that also the user confirms the Transaction Information that shows in the step 408.
Step 411, security module is enabled the back at self by the secure payment enable module and generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information (being called encrypt data) after encrypting is sent to main control module.
Preferably, preferably, similar with step 404, step 407 or step 409; In this step 411, security module can the corresponding application message of this data encryption request be that corresponding priorities searched in keyword in table 1, if this priority ratio is higher; Require to handle immediately this data encryption request; Generation key and the cryptographic operation in the execution in step 411 then, and interrupt current other operations of just carrying out, otherwise; After handling current other operations of just carrying out, generation key and cryptographic operation in the execution in step 411.Such as, in the process that mobile phone terminal communicates, receive the processing notice of in the step 411 Transaction Information in the data enciphering request being encrypted; Usually; The priority ratio of traffic operation is higher, then ignores this notice, continues the executive communication operation; After accomplishing communication, the cryptographic operation in the execution in step 411.
Step 412, if service end is a remote application server, then main control module sends encrypt data to communication module, adopts aerial mode to send encrypt data to service end by this communication module; If service end is the on-site payment terminal, then main control module sends encrypt data to Near Field Communication module, sends encrypt data by this Near Field Communication module to service end.
So far, accomplish flow process shown in Figure 4.
Can find out by above technical scheme; Among the present invention; The secure payment enable module adopts hardware implementation mode to realize that this has improved than higher safety guarantee, when main control module or proximity communication module receive virus or trojan horse program and attack; Still can guarantee the safety of transaction flow, the problem of account trading takes place under the situation of not perception of solution user;
Further, among the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in the existing procedure, reduced user's operation, reduced the use threshold;
Further, among the present invention, when mobile phone terminal is paid, do not shift the control of keyboard and screen, this has realized not influencing when mobile phone terminal is paid the proper communication function of mobile phone;
At last, the present invention can make the program designer formulate corresponding strategy according to the application of different level of securitys through the response process table is set in security module, has improved the flexibility of Application Design.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being made, is equal to replacement, improvement etc., all should be included within the scope that the present invention protects.

Claims (12)

1. portable terminal that is applied to secure payment, said portable terminal comprises: main control module; It is characterized in that said portable terminal also comprises: security module and secure payment enable module; Wherein,
Main control module is used to send the protected code checking asks to security module, when the checking result who receives the security module transmission passes through checking for said protected code, sends the data encryption request to security module, and points out the user that Transaction Information is confirmed;
Said security module is used for the protected code of said protected code checking request is verified processing; To verify that the result sends to said main control module; And after self being enabled, generate key by the secure payment enable module; Utilize this key that the Transaction Information in the said data encryption request is carried out encryption, the Transaction Information after encrypting is sent to main control module;
Said secure payment enable module is used for after the user confirms Transaction Information, enabling security module.
2. portable terminal according to claim 1; It is characterized in that said security module before arbitrary request, is that keyword finds corresponding priorities in the response process table that is provided with in advance with the corresponding application message of this request in handling protected code checking request and data encryption request; Confirm current this request of whether handling according to said priority; If, then interrupt the current processing operation of just carrying out, diversion treatments should request.
3. portable terminal according to claim 2 is characterized in that, the corresponding application message of described request is: the module id application identities corresponding with this request that is used to send this request;
Comprise the corresponding relation between module id, application identities and the priority three in the said response process table.
4. according to the arbitrary described portable terminal of claim 1 to 3, it is characterized in that said security module comprises: key K ey circuit and application management module;
Said application management module is used for said protected code is verified, will verify that the result sends to said main control module, and the management that the multi-service of being responsible for said portable terminal and providing is used is isolated with safety;
Said key circuit is used for after said security module is enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the data encryption request that receives is encrypted, and the Transaction Information after encrypting is sent to main control module.
5. portable terminal according to claim 1 is characterized in that, said secure payment enable module comprises: security module enable circuits and secure payment button;
Said security module enable circuits directly links to each other with the peripheral circuit of said security module, is used for through using said secure payment button that said security module is enabled control.
6. according to claim 1 or 5 described portable terminals, it is characterized in that said secure payment enable module adopts the mode of hardware circuit to realize, perhaps, adopt the mode of soft simulation to realize.
7. portable terminal according to claim 1 is characterized in that, said portable terminal further comprises: communication module and Near Field Communication module;
Said main control module is further used for sending Transaction Information to said communication module and/or the Near Field Communication module after the encryption;
Said communication module links to each other with said main control module, is used to adopt aerial mode to send the Transaction Information after encrypting to the remote application server as service end;
Said Near Field Communication module is connected between main control module and the security module, is used for sending the Transaction Information after encrypting to the on-site payment terminal as service end.
8. safe payment method, this method is applied to comprise the portable terminal of main control module, it is characterized in that, and said portable terminal also comprises: security module and secure payment enable module; This method comprises:
Security module receives the protected code checking request that main control module sends, and the protected code in the said protected code checking request is verified processing, will verify that the result sends to said main control module;
Main control module receives said checking result, when being said protected code through checking, send the data encryption request to security module, and the prompting user confirms in said checking result to Transaction Information;
The secure payment enable module enables security module after the user confirms Transaction Information;
Security module receives said data encryption request, and after self being enabled by the secure payment enable module, generates key, utilizes this key that the Transaction Information in the said data encryption request is carried out encryption, and the Transaction Information after encrypting is sent to main control module.
9. method according to claim 8; It is characterized in that said security module before arbitrary request, further comprises in protected code checking request and data encryption request: with the corresponding application message of this request is that keyword finds corresponding priorities in the response process table that is provided with in advance; Confirm current this request of whether handling according to said priority; If, then interrupt the current processing operation of just carrying out, diversion treatments should request.
10. method according to claim 9 is characterized in that, the corresponding application message of described request is: the module id, the corresponding application identities of this request that are used to send this request;
Comprise the corresponding relation between module id, application identities and the priority three in the said response process table.
11. method according to claim 8 is characterized in that, said secure payment enable module adopts the mode of hardware circuit to realize, perhaps, adopts the mode of soft simulation to realize.
12. method according to claim 8 is characterized in that, main control module asks to security module, further to comprise in the checking of transmission protected code:
Main control module receives transaction request from service end, and receives the Transaction Information that the user provides based on said transaction request, sends the protected code input afterwards and asks to security module;
After said security module received protected code input request, transmission required the user that notifying to main control module of protected code is provided;
Main control module receives said notice, and receives the protected code that the user provides based on said notice.
CN201110059121.XA 2011-03-11 2011-03-11 Safe payment method and mobile terminal Active CN102685073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110059121.XA CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110059121.XA CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Publications (2)

Publication Number Publication Date
CN102685073A true CN102685073A (en) 2012-09-19
CN102685073B CN102685073B (en) 2016-04-27

Family

ID=46816445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110059121.XA Active CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Country Status (1)

Country Link
CN (1) CN102685073B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198397A (en) * 2013-04-12 2013-07-10 苏州通付盾信息技术有限公司 Mobile payment method based on risk assessment and multiple credibility judgment steps
CN105260890A (en) * 2015-09-25 2016-01-20 镇江明泰信息科技有限公司 On-line secure payment method based on multi-domain user information big data analysis
CN105550863A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Mobile payment method and wearable equipment
CN105684010A (en) * 2013-08-15 2016-06-15 维萨国际服务协会 Secure remote payment transaction processing using a secure element
TWI599972B (en) * 2016-07-29 2017-09-21 Transaction Key Management Supplementary Methods
WO2019080853A1 (en) * 2017-10-24 2019-05-02 丘炎卫 System supporting peer-to-peer interactive connection technology for noncash transaction information accessibility
WO2020063796A1 (en) * 2018-09-28 2020-04-02 新明华区块链技术(深圳)有限公司 Method, apparatus and system for implementing remote signing by controlling security chip
US10817875B2 (en) 2013-09-20 2020-10-27 Visa International Service Association Secure remote payment transaction processing including consumer authentication
US11055694B2 (en) 2013-07-15 2021-07-06 Visa International Service Association Secure remote payment transaction processing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1344396A (en) * 1999-03-02 2002-04-10 艾斯格尼克斯公司 Portable electronic charge and authorization devices and methods therefor
CN101394615A (en) * 2007-09-20 2009-03-25 中国银联股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN101834946A (en) * 2010-05-11 2010-09-15 丁峰 Method for performing safe mobile phone payment and mobile phone for performing safe payment
CN101882233A (en) * 2010-06-02 2010-11-10 方亚南 Multifunctional chip card
CN101980309A (en) * 2010-10-14 2011-02-23 中兴通讯股份有限公司 Near field communication (NFC) mobile terminal and NFC safety payment realizing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1344396A (en) * 1999-03-02 2002-04-10 艾斯格尼克斯公司 Portable electronic charge and authorization devices and methods therefor
CN101394615A (en) * 2007-09-20 2009-03-25 中国银联股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN101834946A (en) * 2010-05-11 2010-09-15 丁峰 Method for performing safe mobile phone payment and mobile phone for performing safe payment
CN101882233A (en) * 2010-06-02 2010-11-10 方亚南 Multifunctional chip card
CN101980309A (en) * 2010-10-14 2011-02-23 中兴通讯股份有限公司 Near field communication (NFC) mobile terminal and NFC safety payment realizing method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198397A (en) * 2013-04-12 2013-07-10 苏州通付盾信息技术有限公司 Mobile payment method based on risk assessment and multiple credibility judgment steps
US11055694B2 (en) 2013-07-15 2021-07-06 Visa International Service Association Secure remote payment transaction processing
CN105684010B (en) * 2013-08-15 2021-04-20 维萨国际服务协会 Secure remote payment transaction processing using secure elements
CN105684010A (en) * 2013-08-15 2016-06-15 维萨国际服务协会 Secure remote payment transaction processing using a secure element
US11062306B2 (en) 2013-08-15 2021-07-13 Visa International Service Association Secure remote payment transaction processing using a secure element
US11188901B2 (en) 2013-08-15 2021-11-30 Visa International Service Association Secure remote payment transaction processing using a secure element
US10817875B2 (en) 2013-09-20 2020-10-27 Visa International Service Association Secure remote payment transaction processing including consumer authentication
US11710120B2 (en) 2013-09-20 2023-07-25 Visa International Service Association Secure remote payment transaction processing including consumer authentication
WO2017020417A1 (en) * 2015-07-31 2017-02-09 宇龙计算机通信科技(深圳)有限公司 Method for mobile payment and wearable device
CN105550863A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Mobile payment method and wearable equipment
CN105260890A (en) * 2015-09-25 2016-01-20 镇江明泰信息科技有限公司 On-line secure payment method based on multi-domain user information big data analysis
TWI599972B (en) * 2016-07-29 2017-09-21 Transaction Key Management Supplementary Methods
WO2019080853A1 (en) * 2017-10-24 2019-05-02 丘炎卫 System supporting peer-to-peer interactive connection technology for noncash transaction information accessibility
WO2020063796A1 (en) * 2018-09-28 2020-04-02 新明华区块链技术(深圳)有限公司 Method, apparatus and system for implementing remote signing by controlling security chip

Also Published As

Publication number Publication date
CN102685073B (en) 2016-04-27

Similar Documents

Publication Publication Date Title
CN102685073A (en) Secure payment method and mobile terminal
CN106453330B (en) A kind of identity authentication method and system
CN103595718B (en) A kind of POS terminal Activiation method, system, service platform and POS terminal
CN104618116B (en) A kind of cooperative digital signature system and its method
KR101239297B1 (en) System for protecting information and method thereof
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
US9344896B2 (en) Method and system for delivering a command to a mobile device
CN105308898B (en) For executing system, the method and apparatus of password authentification
CN103036681B (en) A kind of password safety keyboard device and system
CN106611310B (en) Data processing method, wearable electronic device and system
CN103095457A (en) Login and verification method for application program
CN104917807A (en) Resource transfer method, apparatus and system
CN103220148A (en) Method and system for electronic signature token to respond operation request, and electronic signature token
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN106357679A (en) Method, system and client for password authentication, and server and intelligent equipment
CN101478547A (en) Apparatus for trustable digital signature to intelligent cipher key and working method thereof
KR100792163B1 (en) Authentication system for on-line banking, and user terminal for the same
CN109218026A (en) The method and system of licensing scheme is executed between service terminal system and Help Desk system
CN201974884U (en) Vehicle-mounted system
CN202978979U (en) Password security keypad device and password security pad system
CN105631672A (en) Transaction data processing method and device, and safety equipment
CN101867894A (en) Short message consumption method and server thereof
JP5135331B2 (en) PC external signature apparatus having wireless communication capability
KR101103189B1 (en) System and Method for Issueing Public Certificate of Attestation using USIM Information and Recording Medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant