CN107506207A - The safe verification method and terminal of a kind of POS - Google Patents

The safe verification method and terminal of a kind of POS Download PDF

Info

Publication number
CN107506207A
CN107506207A CN201710551108.3A CN201710551108A CN107506207A CN 107506207 A CN107506207 A CN 107506207A CN 201710551108 A CN201710551108 A CN 201710551108A CN 107506207 A CN107506207 A CN 107506207A
Authority
CN
China
Prior art keywords
root certificate
pos
installation
signing messages
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710551108.3A
Other languages
Chinese (zh)
Other versions
CN107506207B (en
Inventor
蔡锋
林培春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Which Shanghai Department Of Information Technology Co Ltd
Original Assignee
Which Shanghai Department Of Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Which Shanghai Department Of Information Technology Co Ltd filed Critical Which Shanghai Department Of Information Technology Co Ltd
Priority to CN201710551108.3A priority Critical patent/CN107506207B/en
Publication of CN107506207A publication Critical patent/CN107506207A/en
Application granted granted Critical
Publication of CN107506207B publication Critical patent/CN107506207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention relates to the safe verification method and terminal of communication technical field, more particularly to a kind of POS, its method includes:The POS of different batches installs different service packs, and the service packs includes mark file;Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;When the application is installed, the signing messages of user is obtained by the sign test module of POS system;Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.The present invention improves the installation effectiveness of the root certificate of the POS of different batches, while when installing the application program of POS, the signing messages of user is obtained by sign test module, and it is verified, and improves the security of POS application program installation.

Description

The safe verification method and terminal of a kind of POS
Technical field
The present invention relates to the safe verification method and terminal of communication technical field, more particularly to a kind of POS.
Background technology
Third-party payment company develops also by agent in addition to by self-growth trade company and (is referred to as taking machine networking). In this case, the terminal part that agent lays be directly to terminal manufacturer purchase, another part be probably by The terminal of existing trade company is by the conversion of some means.Second of situation of agent's operation is exactly commonly referred to cut machine. It is exactly on the machine of specific user, has filled the application of other users, it is possible to leakage individual privacy and capital loss is present Risk.
The content of the invention
The technical problems to be solved by the invention are:The safe verification method and terminal of a kind of POS are provided, is improved The application program Installation Validation efficiency of different batches POS, it ensure that the security of POS application program installation.
In order to solve the above-mentioned technical problem, the invention provides a kind of safe verification method of POS, including following step Suddenly:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program.
Present invention also offers a kind of safety verification terminal of POS, including memory, processor and it is stored in memory Computer program that is upper and can running on a processor, following steps are realized during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program.
Beneficial effects of the present invention are:
The present invention by the mark file in POS, can Fast Installation secure configuration file corresponding with identifying file, Improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously when installing the application program of POS, pass through sign test Module obtains the signing messages of user, and it is verified, and improves the security of POS application program installation.
Brief description of the drawings
Fig. 1 is the key step schematic diagram according to a kind of safe verification method of POS of the embodiment of the present invention;
Fig. 2 is the structural representation according to a kind of safety verification terminal of POS of the embodiment of the present invention;
Label declaration:
1st, memory;2nd, processor.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached Figure is explained in detail.
The design of most critical of the present invention is:Installation secure configuration file corresponding with mark file, passes through in POS User's signature information when root certificate content in secure configuration file is installed with POS application program is matched, according to Matching result, receive or refuse the installation of application program.
Fig. 1 is refer to, the invention provides a kind of safe verification method of POS, is comprised the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed Name information;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program.
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive The installation of the application program, otherwise refuse the installation of the application program.
It was found from foregoing description, the present invention by the mark file in POS, can Fast Installation it is corresponding with identifying file Secure configuration file, improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously in the application of installation POS During program, the signing messages of user is obtained by sign test module, and it is verified, improves the installation of POS application program Security.
Further, the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
It was found from foregoing description, the signature that the content of above-mentioned root certificate is reserved in advance according to user generates, and passes through above-mentioned side Method can rapidly and accurately obtain corresponding secure configuration file, improve data acquisition efficiency, and demonstrate,prove by the root of installation Book, the security that application program is installed in POS can be ensured.
Further, the safe verification method of described a kind of POS, in addition to:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
It was found from foregoing description, by the above method, it disclosure satisfy that safe when different clients are installed to POS application program Property checking demand.
Further, " performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label Name information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
It was found from foregoing description, it can be realized to applying journey in a batch of POS by default background server The checking of security, improves treatment effeciency when sequence is installed.
Further, the S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to Default background server, to cause the background server by the second public key in first root certificate to encryption information It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption Breath is matched with the first signing messages of first root certificate.
It was found from foregoing description, it can ensure that signing messages transmits during transmitting to background server by such scheme Security, prevent data to be tampered, and caused by safety problem.
It refer to Fig. 2, a kind of safety verification terminal of POS provided by the invention, including memory 1, processor 2 and deposit Store up on memory 1 and the computer program that can be run on processor 2, when the processor 2 performs described program realization with Lower step:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program.
Further, a kind of safety verification terminal of described POS, the S2 are specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
Further, the safety verification terminal of described a kind of POS, realize during the computing device described program Step also includes:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
Further, the safety verification terminal of described a kind of POS, " performing cloud authentication policy " are specially:
S51:The signing messages is sent to default background server, to cause the background server by the label Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label Name information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
Further, a kind of safety verification terminal of described POS, the S51 are specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to Default background server, to cause the background server by the second public key in first root certificate to encryption information It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption Breath is matched with the first signing messages of first root certificate.
Fig. 1 is refer to, embodiments of the invention one are:
The invention provides a kind of safe verification method of POS, comprise the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
The S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed Name information;
Also include after the S3:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program;
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive The installation of the application program, otherwise refuse the installation of the application program.
" performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label Name information and the second public key corresponding with default second private key;
The S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to Default background server, to cause the background server by the second public key in first root certificate to encryption information It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption Breath is matched with the first signing messages of first root certificate.
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
Fig. 2 is refer to, embodiments of the invention two are:
The invention provides a kind of safety verification terminal of POS, including memory, processor and storage are on a memory And the computer program that can be run on a processor, following steps are realized during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
The S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed Name information;
Also include after the S3:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer With the installation of program, otherwise refuse the installation of the application program;
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive The installation of the application program, otherwise refuse the installation of the application program.
" performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label Name information and the second public key corresponding with default second private key;
The S51 is specially:
If perform security strategy be cloud sign test strategy, by the signing messages by second private key encryption after, Encryption information is obtained, and encryption information is sent to default background server, make it that it is described that the background server passes through Encryption information is decrypted the second public key in first root certificate, if decryption is unsuccessful, refuses the peace of the application program Dress, if successful decryption, the signing messages after decryption is matched with the first signing messages of first root certificate.
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
In summary, the present invention, being capable of Fast Installation safety corresponding with mark file by the mark file in POS Configuration file, improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously when installing the application program of POS, The signing messages of user is obtained by sign test module, and it is verified, improves the safety of POS application program installation Property.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalents that bright specification and accompanying drawing content are made, or other related technical areas are directly or indirectly used in, similarly It is included within the scope of the present invention.

Claims (10)

1. a kind of safe verification method of POS, it is characterised in that comprise the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described to apply journey The installation of sequence, otherwise refuse the installation of the application program.
2. the safe verification method of a kind of POS according to claim 1, it is characterised in that the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
3. the safe verification method of a kind of POS according to claim 1, it is characterised in that also include:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate is default in system In the range of ID, then S4 is performed;Otherwise cloud authentication policy is performed.
4. the safe verification method of a kind of POS according to claim 3, it is characterised in that " performing cloud authentication policy " Specially:
S51:The signing messages is sent to default background server, to cause the background server by the A.L.S. Cease and matched with storing the content of the first root certificate in the server;First root certificate includes the default first signature Information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
5. the safe verification method of a kind of POS according to claim 4, it is characterised in that the S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and encryption information is sent to default Background server, with cause the background server by the second public key in first root certificate to encryption information carry out Decryption, if decryption is unsuccessful, refuse the installation of the application program, if successful decryption, by the signing messages after decryption with First signing messages of first root certificate is matched.
6. a kind of safety verification terminal of POS, including memory, processor and storage are on a memory and can be on a processor The computer program of operation, it is characterised in that realize following steps during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described to apply journey The installation of sequence, otherwise refuse the installation of the application program.
7. the safety verification terminal of a kind of POS according to claim 6, it is characterised in that the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
A kind of 8. safety verification terminal of POS according to claim 6, it is characterised in that the computing device institute The step of being realized when stating program also includes:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate is default in system In the range of ID, then S4 is performed;Otherwise cloud authentication policy is performed.
9. the safety verification terminal of a kind of POS according to claim 8, it is characterised in that " performing cloud authentication policy " Specially:
S51:The signing messages is sent to default background server, to cause the background server by the A.L.S. Cease and matched with storing the content of the first root certificate in the server;First root certificate includes first A.L.S. Breath and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
10. the safety verification terminal of a kind of POS according to claim 9, it is characterised in that the S51 is specially:
If perform security strategy be cloud sign test strategy, by the signing messages by second private key encryption after, obtain Encryption information, and encryption information is sent to default background server, to cause the background server by described first Encryption information is decrypted the second public key in root certificate, if decryption is unsuccessful, refuses the installation of the application program, if Successful decryption, then the signing messages after decryption is matched with the first signing messages of first root certificate.
CN201710551108.3A 2017-07-07 2017-07-07 Security verification method of POS machine and terminal Active CN107506207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710551108.3A CN107506207B (en) 2017-07-07 2017-07-07 Security verification method of POS machine and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710551108.3A CN107506207B (en) 2017-07-07 2017-07-07 Security verification method of POS machine and terminal

Publications (2)

Publication Number Publication Date
CN107506207A true CN107506207A (en) 2017-12-22
CN107506207B CN107506207B (en) 2021-04-20

Family

ID=60679686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710551108.3A Active CN107506207B (en) 2017-07-07 2017-07-07 Security verification method of POS machine and terminal

Country Status (1)

Country Link
CN (1) CN107506207B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874402A (en) * 2018-04-20 2018-11-23 新华三技术有限公司 A kind of network attached storage software installation method and device
CN109829292A (en) * 2018-12-18 2019-05-31 福建新大陆支付技术有限公司 A kind of sign test method and system in application program installation process
CN109891385A (en) * 2019-01-10 2019-06-14 福建联迪商用设备有限公司 A kind of method and terminal for installing POS machine initial configuration information
CN112860280A (en) * 2021-03-16 2021-05-28 福州汇思博信息技术有限公司 Application installation verification method and terminal based on Android system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064939A (en) * 2009-11-13 2011-05-18 福建联迪商用设备有限公司 Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet
CN103944903A (en) * 2014-04-23 2014-07-23 福建联迪商用设备有限公司 Multi-party authorized APK signature method and system
CN104331658A (en) * 2014-11-14 2015-02-04 北京视博数字电视科技有限公司 Installing verification method for intelligent terminal application program and system
CN104639506A (en) * 2013-11-13 2015-05-20 中国电信股份有限公司 Terminal and application program installation controlling method and system
CN105404812A (en) * 2015-10-30 2016-03-16 中国民生银行股份有限公司 Safety certification method and device of smart POS (Point Of Sale) machine
CN105787357A (en) * 2016-03-28 2016-07-20 福建联迪商用设备有限公司 APK (Android Package) downloading method and system based on Android system
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064939A (en) * 2009-11-13 2011-05-18 福建联迪商用设备有限公司 Method for authenticating point of sail (POS) file and method for maintaining authentication certificate
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet
CN104639506A (en) * 2013-11-13 2015-05-20 中国电信股份有限公司 Terminal and application program installation controlling method and system
CN103944903A (en) * 2014-04-23 2014-07-23 福建联迪商用设备有限公司 Multi-party authorized APK signature method and system
CN104331658A (en) * 2014-11-14 2015-02-04 北京视博数字电视科技有限公司 Installing verification method for intelligent terminal application program and system
CN105404812A (en) * 2015-10-30 2016-03-16 中国民生银行股份有限公司 Safety certification method and device of smart POS (Point Of Sale) machine
CN105787357A (en) * 2016-03-28 2016-07-20 福建联迪商用设备有限公司 APK (Android Package) downloading method and system based on Android system
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874402A (en) * 2018-04-20 2018-11-23 新华三技术有限公司 A kind of network attached storage software installation method and device
CN109829292A (en) * 2018-12-18 2019-05-31 福建新大陆支付技术有限公司 A kind of sign test method and system in application program installation process
CN109891385A (en) * 2019-01-10 2019-06-14 福建联迪商用设备有限公司 A kind of method and terminal for installing POS machine initial configuration information
CN112860280A (en) * 2021-03-16 2021-05-28 福州汇思博信息技术有限公司 Application installation verification method and terminal based on Android system

Also Published As

Publication number Publication date
CN107506207B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
CN109067539B (en) Alliance chain transaction method, alliance chain transaction equipment and computer readable storage medium
CN110276588B (en) Electronic signature authentication method and device and computer readable storage medium
CN105243313B (en) For the method whenever confirmed to verifying token
CN102789607B (en) A kind of network trading method and system
CN103167491B (en) A kind of mobile terminal uniqueness authentication method based on software digital certificate
CN109039628A (en) Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN107506207A (en) The safe verification method and terminal of a kind of POS
CN106327184A (en) Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation
CN109040149A (en) Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN102523095B (en) User digital certificate remote update method with intelligent card protection function
US20020049906A1 (en) Digital signature system, digital signature method, digital signature mediation method, digital signature mediation system, information terminal and storage medium
CN110225063A (en) Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system
CN101221641B (en) On-line trading method and its safety affirmation equipment
CN110290102A (en) Service security system and method based on application
CN104077690B (en) Method and device for generating one-time password, authentication method and authentication system
CN107463806A (en) The signature and sign test method of a kind of Android application programs installation kit
CN105007279A (en) Authentication method and authentication system
CN102801710A (en) Networked transaction method and system
CN108122112A (en) Electronic ID card based on authentication device signs and issues certification and safety payment system
CN106897761A (en) A kind of two-dimensional code generation method and device
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
EP2690840A1 (en) Internet based security information interaction apparatus and method
CN108449315A (en) Ask calibration equipment, method and the computer readable storage medium of legitimacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant