CN103178960B - Defencive function operating control procedures system - Google Patents

Defencive function operating control procedures system Download PDF

Info

Publication number
CN103178960B
CN103178960B CN201210564274.4A CN201210564274A CN103178960B CN 103178960 B CN103178960 B CN 103178960B CN 201210564274 A CN201210564274 A CN 201210564274A CN 103178960 B CN103178960 B CN 103178960B
Authority
CN
China
Prior art keywords
electronic equipment
coffret
antenna
safety element
interior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210564274.4A
Other languages
Chinese (zh)
Other versions
CN103178960A (en
Inventor
格拉尔德·加兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Oberthur Technologies SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oberthur Technologies SA filed Critical Oberthur Technologies SA
Publication of CN103178960A publication Critical patent/CN103178960A/en
Application granted granted Critical
Publication of CN103178960B publication Critical patent/CN103178960B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to defencive function operating control procedures systems.The invention discloses a kind of system (1) comprising the first electronic equipment (2) and the second electronic equipment (3).First electronic equipment (2) includes safety element (26) and the first coffret (25), and whether the identification code that safety element (26) is responsible for the verifying identification information (PIN) that verifying inputs and has been stored is consistent.Second electronic equipment includes the second coffret (33), and the first electronic equipment and the second electronic equipment can be carried out data transmission by coffret (25) and (33).The operating mechanism of the system is: the user interface (32) of second electronic equipment (3) is used to receive personal verification's identification information (PIN) of user's input, and the safety element (26) of the first electronic equipment (2) is transmitted the information to by above-mentioned coffret (25) and (33).

Description

Defencive function operating control procedures system
Technical field
The present invention relates to the systems of certification defencive function operation control process.This function is protected by certification, is led to Often run according to the verification result of user information.This function particularly for accessing various resources, as system, network, using, Remote server or card and storage information etc., the element by specially receiving resource access information issue instruction and run the process.
Background technique
User authentication needed for access resource carries out in an information system.User authentication includes two steps: information Input step, user inputs personal authentication's identification information in the step;Followed by user information authentication step, system by with The personal information of family input is compared with the personal information recorded before, to determine to authorize or refuse user access resources.If Authorization access resource, certification defencive function are completed, and user can be obtained the permission of access resource.
Personal authentication's identification information can be password, PIN identifying code (personal identification number) or biometric information.
Example is controlled according to defencive function, user possesses a terminal, can be inserted into a safety element in the terminal, such as exists A SIM card is inserted on mobile phone.By the user interface at terminal, user can input personal verification's identification information.The terminal will be defeated The personal information entered is transmitted to safety element.The safety element will then record in the personal information received and safety element reservoir Information compare.If the personal information received is consistent with storage information, safety element completes defencive function certification, allows User uses resource.
But the system may be invaded by unauthorized personnel using the means of theft identity.Identity theft refers to non-award Power personnel maliciously steal the sensitivity of personal authentication's identification information, especially user by installing an illegal software at terminal Information.When user inputs personally identifiable information, Malware, which can obtain, records these personal verification's identification informations.By pacifying Full element inputs the personal information stolen, which can be in the ignorant situation of user, by protecting verification process to obtain Take resource.Terminal and safety element cannot all detect the presence of the Malware.
Therefore, in order to cope with risk of attacks, in terms of resource access, it is necessary to improve certification defencive function controlling mechanism.
Summary of the invention
Defencive function procedures system includes two electronic equipments: the first electronic equipment and the second electronic equipment.First electronics Equipment includes a safety element and a coffret, when the verifying identification information received is consistent with presupposed information, safety Element allows user to use resource.Second electronic equipment includes a coffret.First and second electronic equipment can be with The transmission of information is carried out by above-mentioned coffret, the operating mechanism of the system is: the user interface of second electronic equipment is used In personal verification's identification information of reception user's input, and the first electronics is transmitted the information to by above-mentioned coffret and is set Standby safety element.
Therefore, defencive function procedures system includes two electronic equipments.
First electronic equipment includes a safety element and a coffret, the identification letter of safety element verifying input It ceases whether consistent with pre-set information.Second electronic equipment includes a coffret.First and second electronics Equipment can carry out the transmission of information by above-mentioned coffret.
Carrying out practically mechanism is as follows: receiving step, and the second electronic equipment receives user in the second electronic device user interface Locate personal verification's identification information of input;The personal information of input is sent to first by above-mentioned coffret by transmitting step The safety element of electronic equipment.
In view of features above, these verifying identification informations can be obtained by safety element, without passing through the first electronic equipment User interface input.Therefore, being mounted on the Malware at the first electronic device user interface just is more difficult to obtain these verifyings Information.Therefore the authentication protection system can also prevent someone from stealing identity.Verifying identification information can be verifying identification information Itself or an encryption information for including verifying identification information or an encryption including defencive function grant instruction are believed Breath.
According to operation mode, verifying identification information can be transmitted to safe member by the second electronic equipment in the form of encryption information Part, the safety element verifying identification information received is verified and identify these information and pre-set information whether phase Symbol is consistent.
Safety element decodes the verifying identification information received by solving code key spoon.
Second electronic equipment can be fixed on the first electronic equipment.
Second electronic equipment can be fixed on the first electronic equipment, and be dismountable.
Second electronic equipment can be fixed on the shell of the first electronic equipment.For example, the second electronic equipment is fixed on first The back side of electronic equipment (relative to a keyboard or a screen).Preferably, the antenna of the two is face to face.
According to operation mode, it may include an antenna, the second coffret that the first coffret, which is wireless transmission interface, It is also possible to wireless transmission interface, equally may include an antenna.
According to operation mode, the second electronic equipment is connected in a movable manner with the first electronic equipment, is in first Between position and the second position.In first position, the antenna of the two is face to face;In the second position, two antennas are at a distance of farther It is some.
According to operation mode, it may include an antenna, the second coffret that the first coffret, which is wireless transmission interface, It may be wireless transmission interface, may include an antenna.
Second electronic equipment receives the signal from first antenna to second antenna transmission.
Second electronic equipment includes an operable switch of user, which is located at the second antenna and closes and carry out signal Transmission and the second antenna are opened between the two positions.
First electronic equipment can be mobile phone, and the second electronic equipment can be electronic tag.
Defencive function includes at least one of operating procedure: the signal transmission between safety element and external equipment, peace Transaction between full element and external equipment, executes the APDU order from the first electronic equipment, using cipher mode, such as makes Use safety element.
Detailed description of the invention
Following illustration is the description to other peculiar functions and advantage of this system:
Fig. 1 is feature operation pattern system;
Fig. 2 is the electronic equipment hardware configuration of system shown in Figure 1;
Fig. 3 is the defencive function control system process steps of system shown in Figure 1;
Fig. 4 is the electronic tag details of system shown in Figure 1;
Fig. 5 A and 5B show system shown in FIG. 1, and electronic tag can slide in the operation mode;And
Fig. 6 shows system shown in FIG. 1, and electronic tag can rotate in the operation mode.
Specific embodiment
Fig. 1 shows system 1, the electronic tag 3 being fixed on mobile phone 2 including a mobile phone 2 and one.Electronic tag 3 is solid Be scheduled on the shell 20 of mobile phone 2, such as be fixed on the back side of mobile phone 2, i.e., with 29 phase of surface that has a keyboard and/or screen Pair surface 28.
Operation mode according to the invention indicates the length of 2 inside dimension of mobile phone, width and thickness on electronic tag 3.Electricity Subtab 3 may further indicate its shape.According to the operation mode, electronic tag 3 at least partly presses standard ISO 7816, size by one It is formed for the card of ID-1.For example, electronic tag 3 is arranged on the card having a size of ID-1 after personalization.
Fig. 2 is the hardware structure diagram of mobile phone 2 and electronic tag 3.
Mobile phone 2 shows the hardware configuration of computer.It includes user interface 21, wherein containing screen 22 and keyboard 23, at information Reason machine 24 and safety element 26, coffret 25 and another coffret 27.
The operation of the control mobile phone 2 of processor 24.Therefore, which executes the electricity in not shown memory Brain program.
Safety element 26 is the security component for meeting public standard or standard FIPS.It is inserted into removable chip in mobile phone 2, Such as SIM card or micro- SD card.
Safety element 26 includes a memory (not shown), and individual subscriber is stored in the memory and verifies identification information Conciliate code key spoon.These personal verification's identification informations are that PIN identification code (personal verification's code) is united but it is also possible to be password, biology Meter learns information etc..Safety element 26 can determine whether the personal information of input and pre-set information are consistent, therefore, it is determined that being No permission user contacts resource.For example, safety element 26 believes the verifying of the verification information (such as PIN identification code) of input and storage Breath (such as the PIN code of storage) compares, and when both is consistent, just allows to operate.
Coffret 25 is a wired or wireless interface.In operation mode, nothing can be carried out by coffret 25 Line transmission, such as according to NFC, ISO14443, bluetooth, zigbee, wifi etc..The transmission range of coffret 25 is 50cm, but Preferably smaller than 20cm.
Coffret 27 can be transmitted in remote signalling network or wireless network.For example, coffret 27 can carry out phone Wireless transmission or network transmission.
Defencive function includes: the signal transmission between safety element 26 and external equipment, such as passes through 25 He of coffret 27;Transaction between safety element 26 and outer member, such as financial transaction;Execute the APDU order from mobile phone 2;Using adding Close mode of operation etc..
Electronic tag 3 indicates the hardware configuration of computer.It includes message handler 31, user interface 32 and coffret 33。
Message handler 31 controls the operation of electronic tag 31, and therefore, which is responsible for running storage in reservoir The computer program deposited.
Coffret 33 can be connected with the coffret 25 of mobile phone 2.As coffret 25, coffret 33 be can be Wired or wireless coffret.In a kind of operation mode, coffret 33 can be wirelessly transferred, according to standard NFC, ISO14443, bluetooth, zigbee, wifi etc..The transmission range of coffret is 50cm, and best transmission distance is 20cm.
User interface 32 includes a keyboard, can input PIN code from the keyboard.In addition, input interface 32 includes one Biometric sensor, fingerprint sensor, camera and wireless interface etc..
In this mode, electronic tag 3 is fixed on mobile phone 2 (stickup), and coffret 25 and 33 is adjacent.Therefore, electronics Label 3 and mobile phone 2 can carry out signal transmission by coffret 25 and 33.
Electronic tag 3 is transmitted electricity by the power transmission signal that coffret 25 transmits.In addition, master also can be used in electronic tag 3 The power supply of plate battery.
Electronic tag 3 also can be the encrypting module for meeting public standard and standard FIPS.
Fig. 3 is that control process step is protected in the verifying of Fig. 1 system 1.
M0 information is sent to mobile phone 2 (stage E1) by electronic tag 3, and the display of screen 22 of mobile phone 2 requires input PIN code. In addition, message handler 24 receives the PIN code input requirement of the memory from mobile phone 2, then this requirement is shown and is being shielded Curtain 22.In general, which includes requiring the display stage of input authentication identification information.
Then, in stage E3, user inputs PIN code at the user interface 32 of electronic tag 3.
Followed by stage E4, because at this stage, electronic tag 3, will be containing PIN code by coffret 25 and 33 Encryption information M is sent to safety element 26.Safety element 26 can receive information M in stage E4.
Next stage is E5, and the safety element 26 of mobile phone 2 is decoded information M using solution code key spoon, the PIN that then will be received Password is compared with the PIN code of storage.When the two is consistent, safety element 26 then allows user to contact and use resource.
Therefore, when PIN code is correct, in stage E6, safety element and/or mobile phone 2 start FCT defencive function.
Another method is that 3 pairs of verifying identification informations (being in this embodiment PIN code) of electronic tag are verified, electricity Subtab 3 sends encrypted authentication information to safety element 26, when identifying code is correct, user is allowed to use resource.
Mobile phone 2 converts information M.But since information M is that encryption and mobile phone 2 are unable to access safety element The safety solution code key spoon of 26 storages, therefore the Malware being mounted on mobile phone 2 cannot decode information M and obtain PIN code. Fig. 1 shows system also therefore avoid identity from being stolen.In addition, being connect even if information M is not encrypted in the user of electronic tag 3 Mouth 32, which inputs PIN codes, also may make Malware interception PIN code to become more difficult.
In operation mode shown in Fig. 1, electronic tag 3 is pasted on mobile phone 2, opposite with the antenna of coffret 25. Label 3 may prevent or interfere mobile phone 2 logical by the transmission between coffret 25 and another external equipment in this position Letter.
Therefore, there are also a kind of embodiments, i.e., electronic tag 3 are pasted onto a movable manner on mobile phone 2.So, In order to which mobile phone 2 is communicated by the transmission between coffret 25 and another external equipment, user just can be taken off electronic tag 3.
The mode according to shown in Fig. 4, electronic tag 3 include a switch 34, and the position of the switch can allow 34 shape of antenna It is closed circuit at one, it carries out information transmission or antenna is opened, but transmitted without information.User can pass through 3 surface of electronic tag 35 pairs of switches 34 of button operate.
According to another operation mode, electronic tag 3 is connected on mobile phone 2 with manner, and the position of electronic tag is under Between the position Liang Ge of face: 33 antenna of the coffret position adjacent with 25 antenna of coffret, with 33 antenna of coffret and biography Defeated interface 25 is at a distance of farther position.At second position, electronic tag 3 it is farther therefore will not interference handset 2 pass through transmission Transmission between interface 25 and another external equipment communicates.System 1 includes the holding meanss of position 1 and position 2, such as automatic folder Taut band, pressing key, magnet and clamping device.
Such as shown in figure 5, Fig. 5 A is in terms of mobile phone back, Fig. 5 B is vertical face figure, and electronic tag 3 is in 2 fixed frame 4 of mobile phone Interior, electronic tag 3 is sliding between first position (as shown in label 3a) and the second position (as shown in label 3b) in frame 4 It is dynamic.Electronic tag is mobile between the first position and the second position to be needed to press label and makes its bending sliding.
Shown in Fig. 6, in terms of mobile phone side, electronic tag 3 is fixed in 2 rotating bracket 5 of mobile phone, and rotating bracket 5 passes through pass Section 6 is connect with mobile phone 2.
In another mode, electronic tag 3 includes being fixed on the part of mobile phone and being fixed on the rotatable portion of front portion. The antenna of coffret 33 is located at second part.Therefore, second part can slide between the first position and the second position.Mark Label include that a connection section can allow second part to rotate between the first position and the second position, such as by being arranged on mobile phone surface One parallel axes or a quadrature axis.
In another mode, safety element 26 includes the identification code of an electronic tag 3 in its reservoir.Pass through this knowledge Then other code, safety element 26 can be carried out by another external equipment again first by obtaining PIN code with electronic tag 3 Defencive function verifying.

Claims (19)

1. a kind of system (1) of application authorization protection control, comprising: the first electronic equipment (2) and the second electronic equipment (3), the One electronic equipment (2) includes safety element (26) and the first coffret (25), and safety element (26) is responsible for testing for verifying input Whether card identification information (PIN) and the recognition code stored are consistent;Second electronic equipment include the second coffret (33) and User interface (32), the first electronic equipment and the second electronic equipment can pass through the first coffret (25) and the second coffret (33) carry out data transmission;The operational process of the system are as follows: the user interface (32) of the second electronic equipment (3) is for receiving user Personal verification's identification information (PIN) of input, and the second electronic equipment (3) passes through the first coffret (25) and the second transmission The data obtained by personal verification's identification information (PIN) are directly transferred to the safety member of the first electronic equipment (2) by interface (33) Part (26) and without any software;
Wherein the second electronic equipment (3) is configured to send the encryption information for including verifying identification information (PIN) or transmission includes awarding It weighs to execute the encryption information of protected function, and safety element (26) is configured to decrypt encryption letter using decryption key Breath.
2. system according to claim 1, interior the second electronic equipment (3) configured of system (1) will be for that will verify identification letter Breath (PIN) is sent to safety element (26) in an encrypted form, and safety element (26) configuration verifies received verifying to decode Whether identification information (PIN) is consistent with preset identifying code.
3. system according to claim 2, the safety element (26) in the system is configured to decode and verify to be received Verifying identification information (PIN) whether be consistent with preset identifying code.
4. system according to claim 1-3, interior the second electronic equipment (3) configured of system is fixed on the first electricity On sub- equipment (2).
5. system according to claim 4, interior the second electronic equipment (3) configured of system is fixed in a movable manner On first electronic equipment (2).
6. the system according to claim 3 or 5, interior the first coffret (25) configured of system is wireless transmission interface, Set up first antenna;The second coffret (33) configured in system is also wireless transmission interface, sets up the second antenna.
7. system according to claim 6, interior the second electronic equipment configured of system is fixed on the first electronic equipment, and And second antenna and first antenna it is face-to-face.
8. system according to any one of claim 1-3, interior the first coffret (25) configured of system is wireless passes Defeated interface, sets up first antenna;The second coffret (33) configured in system is also wireless interface, sets up the second antenna.
9. system according to claim 8, interior the second electronic equipment (3) configured of system is electric with first in a mobile manner Sub- equipment (2) is connected, and between two positions: in first position, first antenna and the second antenna are adjacent face-to-face;And And in the second position, the second antenna and first antenna are relatively far apart.
10. system according to claim 9, interior the second electronic equipment configured of system can be in first position and the second position Between slide.
11. system according to claim 9, interior the second electronic equipment configured of system can be in first position and the second position Between rotate.
12. system according to claim 8, interior the second electronic equipment (3) configured of system includes two parts: being fixed on The rotatable second part of first part on first electronic equipment (2) and connection over the first portion, the second antenna then position In rotatable second part.
13. system according to claim 8, the second electronic equipment (3) for configuring in system is sent to the by first antenna The charging signals of two antennas charge.
14. system according to claim 7, interior the second electronic equipment (3) configured of system includes a user's operation Switch (34), the switch be set to the second antenna constitute it is closed circuit and be able to carry out information transmission position and the second antenna open Between position.
15. system according to claim 8, interior the second electronic equipment (3) configured of system includes a user's operation Switch (34), the switch be set to the second antenna constitute it is closed circuit and be able to carry out information transmission position and the second antenna open Between position.
16. system according to any one of claim 1-3, interior the first electronic equipment (2) configured of system is mobile phone, the Two electronic equipments (3) are electronic tag.
17. system according to any one of claim 1-3, the interior certification defencive function configured of system includes at least following One operating procedure: signal transmission, safety element (26) and external equipment between safety element (26) and external equipment it Between transaction, execute (2) APDU order from the first electronic equipment, use cipher mode.
18. one kind protects control method for the certification of system (1), the system (1) includes the first electronic equipment (2) and second Electronic equipment (3), the first electronic equipment (2) include safety element (26) and the first coffret (25), and safety element (26) can Whether verifying identification information (PIN) and the default identifying code for verifying input are consistent;Second electronic equipment (3) includes that the second transmission connects Mouthful (33) and user interface (32), the first electronic equipment (2) and the second electronic equipment (3) can by the first coffret (25) and Second coffret (33) carries out information transmission, and it includes verifying identification letter that wherein the second electronic equipment (3), which is configured to send, It ceases the encryption information of (PIN) or sends the encryption information for including authorization to execute protected function, and safety element (26) It is configured to decrypt encryption information using decryption key;The method is characterized in that including the following steps:
Reception stage E1 receives user by verifyings that are the second electronic equipment (3) and inputting at user interface (32) and identifies letter It ceases (PIN);
Transmission stage E2, by the first coffret (22) and the second coffret (33) by the verifying identification information of input (PIN) it is conveyed directly to the safety element (26) of the first electronic equipment (2) and without any software.
19. according to the method for claim 18, transmission stage E2 includes that will verify identification information to transmit in an encrypted form, pass Defeated process is as follows:
In decoding stage E3, the verifying identification information received is decoded by safety element (26);
It is determining stage E3, is determining whether the verifying identification information of input is consistent with preset password.
CN201210564274.4A 2011-12-21 2012-12-21 Defencive function operating control procedures system Active CN103178960B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1162127 2011-12-21
FR1162127A FR2985129B1 (en) 2011-12-21 2011-12-21 SYSTEM AND METHOD FOR MONITORING THE EXECUTION OF A PROTECTED FUNCTION

Publications (2)

Publication Number Publication Date
CN103178960A CN103178960A (en) 2013-06-26
CN103178960B true CN103178960B (en) 2019-11-05

Family

ID=45992341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210564274.4A Active CN103178960B (en) 2011-12-21 2012-12-21 Defencive function operating control procedures system

Country Status (2)

Country Link
CN (1) CN103178960B (en)
FR (1) FR2985129B1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101422058A (en) * 2006-04-19 2009-04-29 法国电信公司 Method of securing access to a proximity communication module in a mobile terminal
CN101951320A (en) * 2010-09-29 2011-01-19 北京天地融科技有限公司 Implementation method, device and system of dynamic password

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101236591B (en) * 2007-01-31 2011-08-24 联想(北京)有限公司 Method, terminal and safe chip for guaranteeing critical data safety
US9324071B2 (en) * 2008-03-20 2016-04-26 Visa U.S.A. Inc. Powering financial transaction token with onboard power source
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method
US8224375B2 (en) * 2009-05-01 2012-07-17 Qualcomm Incorporated Proximity purchase ringtones
KR20110103157A (en) * 2010-03-12 2011-09-20 삼성전자주식회사 Content using method of mobile terminal and content using system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101422058A (en) * 2006-04-19 2009-04-29 法国电信公司 Method of securing access to a proximity communication module in a mobile terminal
CN101951320A (en) * 2010-09-29 2011-01-19 北京天地融科技有限公司 Implementation method, device and system of dynamic password

Also Published As

Publication number Publication date
FR2985129A1 (en) 2013-06-28
CN103178960A (en) 2013-06-26
FR2985129B1 (en) 2017-11-17

Similar Documents

Publication Publication Date Title
CN104778765B (en) mobile access control system and method
TWI496025B (en) Accessory and accessory interfacing system and interfacing method
EP3129918B1 (en) Self-authenticating chips
US9563794B2 (en) Method for upgrading RFID readers in situ
AU2017363240A1 (en) Hands-free fare gate operation
US20140101056A1 (en) Portable near-field communication device
EP4333554A2 (en) Authentication method
US20130009756A1 (en) Verification using near field communications
US20090106824A1 (en) Method of Securing Access to a Proximity Communication Module in a Mobile Terminal
WO2007024247A2 (en) Wireless biometric cardholder apparatus, method, & system
JP2007066316A5 (en)
KR101338323B1 (en) System and method for user authentication
KR20150090099A (en) Nfc-based fingerprint authentication system and fingerprint authentication method
WO2013123453A1 (en) Data storage devices, systems, and methods
WO2008038379A1 (en) Portable telephone and access control method
EP2338244B1 (en) Use of a secure element for writing to and reading from machine readable credentials
RU2596587C2 (en) Mobile communication device
WO2020075317A1 (en) Authentication system and smartphone case used therefor
KR101240231B1 (en) A mobile phone id card security system
EP2175674B1 (en) Method and system for paring devices
US10536453B2 (en) Method and arrangement for authorizing an action on a self-service system
KR20190045486A (en) Method for Managing Distributed Commuting Record
CN103178960B (en) Defencive function operating control procedures system
EP2650816B1 (en) User authentication
CN108322907B (en) Card opening method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant