CN107506207A - The safe verification method and terminal of a kind of POS - Google Patents
The safe verification method and terminal of a kind of POS Download PDFInfo
- Publication number
- CN107506207A CN107506207A CN201710551108.3A CN201710551108A CN107506207A CN 107506207 A CN107506207 A CN 107506207A CN 201710551108 A CN201710551108 A CN 201710551108A CN 107506207 A CN107506207 A CN 107506207A
- Authority
- CN
- China
- Prior art keywords
- root certificate
- pos
- installation
- signing messages
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The present invention relates to the safe verification method and terminal of communication technical field, more particularly to a kind of POS, its method includes:The POS of different batches installs different service packs, and the service packs includes mark file;Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;When the application is installed, the signing messages of user is obtained by the sign test module of POS system;Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.The present invention improves the installation effectiveness of the root certificate of the POS of different batches, while when installing the application program of POS, the signing messages of user is obtained by sign test module, and it is verified, and improves the security of POS application program installation.
Description
Technical field
The present invention relates to the safe verification method and terminal of communication technical field, more particularly to a kind of POS.
Background technology
Third-party payment company develops also by agent in addition to by self-growth trade company and (is referred to as taking machine networking).
In this case, the terminal part that agent lays be directly to terminal manufacturer purchase, another part be probably by
The terminal of existing trade company is by the conversion of some means.Second of situation of agent's operation is exactly commonly referred to cut machine.
It is exactly on the machine of specific user, has filled the application of other users, it is possible to leakage individual privacy and capital loss is present
Risk.
The content of the invention
The technical problems to be solved by the invention are:The safe verification method and terminal of a kind of POS are provided, is improved
The application program Installation Validation efficiency of different batches POS, it ensure that the security of POS application program installation.
In order to solve the above-mentioned technical problem, the invention provides a kind of safe verification method of POS, including following step
Suddenly:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program.
Present invention also offers a kind of safety verification terminal of POS, including memory, processor and it is stored in memory
Computer program that is upper and can running on a processor, following steps are realized during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program.
Beneficial effects of the present invention are:
The present invention by the mark file in POS, can Fast Installation secure configuration file corresponding with identifying file,
Improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously when installing the application program of POS, pass through sign test
Module obtains the signing messages of user, and it is verified, and improves the security of POS application program installation.
Brief description of the drawings
Fig. 1 is the key step schematic diagram according to a kind of safe verification method of POS of the embodiment of the present invention;
Fig. 2 is the structural representation according to a kind of safety verification terminal of POS of the embodiment of the present invention;
Label declaration:
1st, memory;2nd, processor.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached
Figure is explained in detail.
The design of most critical of the present invention is:Installation secure configuration file corresponding with mark file, passes through in POS
User's signature information when root certificate content in secure configuration file is installed with POS application program is matched, according to
Matching result, receive or refuse the installation of application program.
Fig. 1 is refer to, the invention provides a kind of safe verification method of POS, is comprised the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label
Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed
Name information;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program.
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive
The installation of the application program, otherwise refuse the installation of the application program.
It was found from foregoing description, the present invention by the mark file in POS, can Fast Installation it is corresponding with identifying file
Secure configuration file, improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously in the application of installation POS
During program, the signing messages of user is obtained by sign test module, and it is verified, improves the installation of POS application program
Security.
Further, the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
It was found from foregoing description, the signature that the content of above-mentioned root certificate is reserved in advance according to user generates, and passes through above-mentioned side
Method can rapidly and accurately obtain corresponding secure configuration file, improve data acquisition efficiency, and demonstrate,prove by the root of installation
Book, the security that application program is installed in POS can be ensured.
Further, the safe verification method of described a kind of POS, in addition to:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system
In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
It was found from foregoing description, by the above method, it disclosure satisfy that safe when different clients are installed to POS application program
Property checking demand.
Further, " performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label
Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label
Name information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
It was found from foregoing description, it can be realized to applying journey in a batch of POS by default background server
The checking of security, improves treatment effeciency when sequence is installed.
Further, the S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to
Default background server, to cause the background server by the second public key in first root certificate to encryption information
It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption
Breath is matched with the first signing messages of first root certificate.
It was found from foregoing description, it can ensure that signing messages transmits during transmitting to background server by such scheme
Security, prevent data to be tampered, and caused by safety problem.
It refer to Fig. 2, a kind of safety verification terminal of POS provided by the invention, including memory 1, processor 2 and deposit
Store up on memory 1 and the computer program that can be run on processor 2, when the processor 2 performs described program realization with
Lower step:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program.
Further, a kind of safety verification terminal of described POS, the S2 are specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
Further, the safety verification terminal of described a kind of POS, realize during the computing device described program
Step also includes:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system
In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
Further, the safety verification terminal of described a kind of POS, " performing cloud authentication policy " are specially:
S51:The signing messages is sent to default background server, to cause the background server by the label
Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label
Name information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
Further, a kind of safety verification terminal of described POS, the S51 are specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to
Default background server, to cause the background server by the second public key in first root certificate to encryption information
It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption
Breath is matched with the first signing messages of first root certificate.
Fig. 1 is refer to, embodiments of the invention one are:
The invention provides a kind of safe verification method of POS, comprise the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
The S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label
Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed
Name information;
Also include after the S3:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system
In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program;
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive
The installation of the application program, otherwise refuse the installation of the application program.
" performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label
Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label
Name information and the second public key corresponding with default second private key;
The S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and by encryption information send to
Default background server, to cause the background server by the second public key in first root certificate to encryption information
It is decrypted, if decryption is unsuccessful, refuses the installation of the application program, if successful decryption, by the A.L.S. after decryption
Breath is matched with the first signing messages of first root certificate.
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
Fig. 2 is refer to, embodiments of the invention two are:
The invention provides a kind of safety verification terminal of POS, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, following steps are realized during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
The S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
" obtaining the signing messages of user by the sign test module of POS system " is specially:
Obtain user and pass through the signature file after presetting the first private key encryption;The root certificate includes default first label
Name information and the first public key corresponding with first private key;
The first public key in the root certificate, the sign test module are decrypted to the signature file, signed
Name information;
Also include after the S3:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate exists in system
In the range of default ID, then S4 is performed;Otherwise cloud authentication policy is performed.
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described answer
With the installation of program, otherwise refuse the installation of the application program;
The S4 is specially:
Judge whether the signing messages matches with the first signing messages of the root certificate, if the match is successful, receive
The installation of the application program, otherwise refuse the installation of the application program.
" performing cloud authentication policy " is specially:
S51:The signing messages is sent to default background server, to cause the background server by the label
Name information is matched with storing the content of the first root certificate in the server;First root certificate includes the described first label
Name information and the second public key corresponding with default second private key;
The S51 is specially:
If perform security strategy be cloud sign test strategy, by the signing messages by second private key encryption after,
Encryption information is obtained, and encryption information is sent to default background server, make it that it is described that the background server passes through
Encryption information is decrypted the second public key in first root certificate, if decryption is unsuccessful, refuses the peace of the application program
Dress, if successful decryption, the signing messages after decryption is matched with the first signing messages of first root certificate.
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
In summary, the present invention, being capable of Fast Installation safety corresponding with mark file by the mark file in POS
Configuration file, improve the installation effectiveness of the root certificate of the POS of different batches;Simultaneously when installing the application program of POS,
The signing messages of user is obtained by sign test module, and it is verified, improves the safety of POS application program installation
Property.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made, or other related technical areas are directly or indirectly used in, similarly
It is included within the scope of the present invention.
Claims (10)
1. a kind of safe verification method of POS, it is characterised in that comprise the following steps:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described to apply journey
The installation of sequence, otherwise refuse the installation of the application program.
2. the safe verification method of a kind of POS according to claim 1, it is characterised in that the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
3. the safe verification method of a kind of POS according to claim 1, it is characterised in that also include:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate is default in system
In the range of ID, then S4 is performed;Otherwise cloud authentication policy is performed.
4. the safe verification method of a kind of POS according to claim 3, it is characterised in that " performing cloud authentication policy "
Specially:
S51:The signing messages is sent to default background server, to cause the background server by the A.L.S.
Cease and matched with storing the content of the first root certificate in the server;First root certificate includes the default first signature
Information and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
5. the safe verification method of a kind of POS according to claim 4, it is characterised in that the S51 is specially:
By the signing messages by second private key encryption after, obtain encryption information, and encryption information is sent to default
Background server, with cause the background server by the second public key in first root certificate to encryption information carry out
Decryption, if decryption is unsuccessful, refuse the installation of the application program, if successful decryption, by the signing messages after decryption with
First signing messages of first root certificate is matched.
6. a kind of safety verification terminal of POS, including memory, processor and storage are on a memory and can be on a processor
The computer program of operation, it is characterised in that realize following steps during the computing device described program:
S1:The POS of different batches installs different service packs, and the service packs includes mark file;
S2:Installation secure configuration file corresponding with mark file;The secure configuration file includes root certificate;
S3:When the application is installed, the signing messages of user is obtained by the sign test module of POS system;
S4:Judge whether the signing messages matches with the content of the root certificate, if the match is successful, receive described to apply journey
The installation of sequence, otherwise refuse the installation of the application program.
7. the safety verification terminal of a kind of POS according to claim 6, it is characterised in that the S2 is specially:
Secure configuration file corresponding with mark file is obtained by internet;
The secure configuration file is parsed, obtains root certificate;
The root certificate is installed.
A kind of 8. safety verification terminal of POS according to claim 6, it is characterised in that the computing device institute
The step of being realized when stating program also includes:
The ID of root certificate is different in secure configuration file corresponding to different mark files;If the ID of root certificate is default in system
In the range of ID, then S4 is performed;Otherwise cloud authentication policy is performed.
9. the safety verification terminal of a kind of POS according to claim 8, it is characterised in that " performing cloud authentication policy "
Specially:
S51:The signing messages is sent to default background server, to cause the background server by the A.L.S.
Cease and matched with storing the content of the first root certificate in the server;First root certificate includes first A.L.S.
Breath and the second public key corresponding with default second private key;
S52:If the match is successful, receive the installation of the application program, otherwise refuse the installation of the application program.
10. the safety verification terminal of a kind of POS according to claim 9, it is characterised in that the S51 is specially:
If perform security strategy be cloud sign test strategy, by the signing messages by second private key encryption after, obtain
Encryption information, and encryption information is sent to default background server, to cause the background server by described first
Encryption information is decrypted the second public key in root certificate, if decryption is unsuccessful, refuses the installation of the application program, if
Successful decryption, then the signing messages after decryption is matched with the first signing messages of first root certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710551108.3A CN107506207B (en) | 2017-07-07 | 2017-07-07 | Security verification method of POS machine and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710551108.3A CN107506207B (en) | 2017-07-07 | 2017-07-07 | Security verification method of POS machine and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107506207A true CN107506207A (en) | 2017-12-22 |
CN107506207B CN107506207B (en) | 2021-04-20 |
Family
ID=60679686
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710551108.3A Active CN107506207B (en) | 2017-07-07 | 2017-07-07 | Security verification method of POS machine and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107506207B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108874402A (en) * | 2018-04-20 | 2018-11-23 | 新华三技术有限公司 | A kind of network attached storage software installation method and device |
CN109829292A (en) * | 2018-12-18 | 2019-05-31 | 福建新大陆支付技术有限公司 | A kind of sign test method and system in application program installation process |
CN109891385A (en) * | 2019-01-10 | 2019-06-14 | 福建联迪商用设备有限公司 | A kind of method and terminal for installing POS machine initial configuration information |
CN112860280A (en) * | 2021-03-16 | 2021-05-28 | 福州汇思博信息技术有限公司 | Application installation verification method and terminal based on Android system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102064939A (en) * | 2009-11-13 | 2011-05-18 | 福建联迪商用设备有限公司 | Method for authenticating point of sail (POS) file and method for maintaining authentication certificate |
CN103685138A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Method and system for authenticating application software of Android platform on mobile internet |
CN103944903A (en) * | 2014-04-23 | 2014-07-23 | 福建联迪商用设备有限公司 | Multi-party authorized APK signature method and system |
CN104331658A (en) * | 2014-11-14 | 2015-02-04 | 北京视博数字电视科技有限公司 | Installing verification method for intelligent terminal application program and system |
CN104639506A (en) * | 2013-11-13 | 2015-05-20 | 中国电信股份有限公司 | Terminal and application program installation controlling method and system |
CN105404812A (en) * | 2015-10-30 | 2016-03-16 | 中国民生银行股份有限公司 | Safety certification method and device of smart POS (Point Of Sale) machine |
CN105787357A (en) * | 2016-03-28 | 2016-07-20 | 福建联迪商用设备有限公司 | APK (Android Package) downloading method and system based on Android system |
CN106230598A (en) * | 2016-07-29 | 2016-12-14 | 深圳兆日科技股份有限公司 | Mobile terminal third-party application safety certifying method and device |
-
2017
- 2017-07-07 CN CN201710551108.3A patent/CN107506207B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102064939A (en) * | 2009-11-13 | 2011-05-18 | 福建联迪商用设备有限公司 | Method for authenticating point of sail (POS) file and method for maintaining authentication certificate |
CN103685138A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Method and system for authenticating application software of Android platform on mobile internet |
CN104639506A (en) * | 2013-11-13 | 2015-05-20 | 中国电信股份有限公司 | Terminal and application program installation controlling method and system |
CN103944903A (en) * | 2014-04-23 | 2014-07-23 | 福建联迪商用设备有限公司 | Multi-party authorized APK signature method and system |
CN104331658A (en) * | 2014-11-14 | 2015-02-04 | 北京视博数字电视科技有限公司 | Installing verification method for intelligent terminal application program and system |
CN105404812A (en) * | 2015-10-30 | 2016-03-16 | 中国民生银行股份有限公司 | Safety certification method and device of smart POS (Point Of Sale) machine |
CN105787357A (en) * | 2016-03-28 | 2016-07-20 | 福建联迪商用设备有限公司 | APK (Android Package) downloading method and system based on Android system |
CN106230598A (en) * | 2016-07-29 | 2016-12-14 | 深圳兆日科技股份有限公司 | Mobile terminal third-party application safety certifying method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108874402A (en) * | 2018-04-20 | 2018-11-23 | 新华三技术有限公司 | A kind of network attached storage software installation method and device |
CN109829292A (en) * | 2018-12-18 | 2019-05-31 | 福建新大陆支付技术有限公司 | A kind of sign test method and system in application program installation process |
CN109891385A (en) * | 2019-01-10 | 2019-06-14 | 福建联迪商用设备有限公司 | A kind of method and terminal for installing POS machine initial configuration information |
CN112860280A (en) * | 2021-03-16 | 2021-05-28 | 福州汇思博信息技术有限公司 | Application installation verification method and terminal based on Android system |
Also Published As
Publication number | Publication date |
---|---|
CN107506207B (en) | 2021-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685138B (en) | The authentication method of the Android platform application software that mobile interchange is online and system | |
CN109067539B (en) | Alliance chain transaction method, alliance chain transaction equipment and computer readable storage medium | |
CN110276588B (en) | Electronic signature authentication method and device and computer readable storage medium | |
CN105243313B (en) | For the method whenever confirmed to verifying token | |
CN102789607B (en) | A kind of network trading method and system | |
CN103167491B (en) | A kind of mobile terminal uniqueness authentication method based on software digital certificate | |
CN109039628A (en) | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system | |
CN107506207A (en) | The safe verification method and terminal of a kind of POS | |
CN106327184A (en) | Intelligent mobile terminal payment system and intelligent mobile terminal payment method based on safe hardware isolation | |
CN109040149A (en) | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system | |
CN102523095B (en) | User digital certificate remote update method with intelligent card protection function | |
US20020049906A1 (en) | Digital signature system, digital signature method, digital signature mediation method, digital signature mediation system, information terminal and storage medium | |
CN110225063A (en) | Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system | |
CN101221641B (en) | On-line trading method and its safety affirmation equipment | |
CN110290102A (en) | Service security system and method based on application | |
CN104077690B (en) | Method and device for generating one-time password, authentication method and authentication system | |
CN107463806A (en) | The signature and sign test method of a kind of Android application programs installation kit | |
CN105007279A (en) | Authentication method and authentication system | |
CN102801710A (en) | Networked transaction method and system | |
CN108122112A (en) | Electronic ID card based on authentication device signs and issues certification and safety payment system | |
CN106897761A (en) | A kind of two-dimensional code generation method and device | |
CN110381075B (en) | Block chain-based equipment identity authentication method and device | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
EP2690840A1 (en) | Internet based security information interaction apparatus and method | |
CN108449315A (en) | Ask calibration equipment, method and the computer readable storage medium of legitimacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |