CN110119946A - The pairing authentication method of electronic transaction device - Google Patents
The pairing authentication method of electronic transaction device Download PDFInfo
- Publication number
- CN110119946A CN110119946A CN201810113888.8A CN201810113888A CN110119946A CN 110119946 A CN110119946 A CN 110119946A CN 201810113888 A CN201810113888 A CN 201810113888A CN 110119946 A CN110119946 A CN 110119946A
- Authority
- CN
- China
- Prior art keywords
- key
- closed storage
- storage device
- safety chip
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The present invention relates to a kind of pairing authentication methods of electronic transaction device comprising the steps of: application software is respectively arranged in the first electronic device and second electronic device, two application software is made to be respectively formed public key;First electronic device is online in closed storage device, and the first electronic device is allowed to form verification key;One of public key and verification key are stored in a safety chip for being located at closed storage device;Second electronic device is online in closed device, and forms an authorization key for according with verification key, and another public key and authorization key are transferred to closed storage device;Closed storage device verifying authorization key accords with verification key, and another public key is stored in safety chip, whereby, know that the card holder of verification key could use closed storage device, only to avoid the risk that assets are stolen occurs because losing closed storage device.
Description
Technical field
The present invention about a kind of electronic transaction device pairing authentication method, especially a kind of electronic device with it is closed
It will form verification key after storage device phase interconnections, and allow and just know that the card holder of verification key uses closed storage device
Pairing authentication method.
Background technique
With the development of science and technology many transaction and the means of payment gradually by integrated circuit (Integrated Circuit,
IC) replaced card, the memory being arranged inside IC card can store the information of card holder, and then be widely deployed in each occasion,
Seem ATM card, fiscard, credit card, phonecard, stored value card etc. be all common IC card at present, and it is general used in IC card
It is broadly divided into contact interface, non-contact interface and three kinds of Combined type interface according to the mode for depositing, reading data.
For having the fiscard of credit card and ATM card function, when fiscard to be used is carried out by ATM
Before transaction or service, ATM needs card holder to input preset password come to obtain the power for using the fiscard
Benefit, therefore, even if fiscard is lost or is stolen, non-original card owner will be unable to steal cash by ATM, in addition, working as
When card holder is consumed using fiscard, card holder can be required that on transaction document, label belong to the name of card holder, and then work as
Fiscard is lost or is stolen, then is easy to be held by non-original and pseudo- label or steals and brush and cause damage to property.
In addition, the technology with wireless transmission is maked rapid progress, a part of IC uses less radio-frequency (RFID/Radio-
Frequency identification) this Radio Transmission Technology, and this wireless radio-frequency is most often used in the amount of money
On less consumer sale, such as the public transportation vehicles such as bus, rapid transit are taken, can use EasyCard and pass through wireless induction
Mode is withholdd, however, the consumption of this small amount in order to pursue speed and convenience, will not be required defeated while transaction
Enter password or label belong to the name of card holder, therefore, as long as the IC card consumed with wireless induction is lost or is stolen,
The non-original card owner for picking up IC card can directly carry out consumer sale, until the IC card is deactivated the amount of money of either internal reservoir
It is consumed totally.
In addition, it is used for the IC card of access control system, it, can be suitable usually as long as holding correct IC card for speed and convenience
The area of gate inhibition's control is passed in and out sharply, therefore, when the IC for access control system loses or is stolen, picks up the non-original of IC card
Card holder also directly can pass in and out gate inhibition area of control by picked up IC card, so as to cause security risk.
Summary of the invention
An only original can be generated when the closed storage device hold it is a primary object of the present invention to electronic device is online
The key that card person knows, as long as and then input the card holder of correct key, could be carried out by closed storage device using, by
This, even if closed storage device is lost and picked up by non-original card owner, non-original card owner's meeting can not because key is not known
It uses, and then is avoided that the information being stored in inside closed storage device is stolen or damage to property.
To realize that foregoing purpose, the present invention include following step about a kind of pairing authentication method of electronic transaction device
It is rapid: an application software is respectively arranged in one first electronic device and a second electronic device, first electronic device and
Two electronic devices form one first public key and one second public key by the application software respectively.
First electronic device searches a closed storage device, and online to the closed storage device progress,
The first electronic device detection one is located at the safety chip of the closed storage device, and confirms that the safety chip is presented
One does not have the licensing status of public key, and first electronic device is made to generate a verification key.
First electronic device to the closed storage device, makes first public key and verification cipher key delivery
First public key and verification key are stored in the safety chip, and then the safety chip will be changed by the licensing status
The restriction state for having public key for one, at this point, when the safety chip has first public key, the safety chip can be according to
Generate the identification information of a corresponding application software according to first public key, and by the closed storage device by the knowledge
Other information is transferred to first electronic device, in this embodiment, when the closed storage device receives described first
When public key and verification key, a microprocessor of the closed storage device can be initially formed a request and login information, then institute
The operating unit for stating closed storage device can generate an execution confirmation message for being transmitted to the microprocessor, make described micro-
Processor logins information according to the request and generates an execution and login information, makes first public key and verification key deposit
The safety chip.
The second electronic device searches the closed storage device, and online to closing storage device progress,
And the second electronic device detects the safety chip, and confirms that the restriction state is presented in the safety chip, makes described
Second electronic device requires generation one to form the solicited message of the verification key, and the second electronic device is according to described in
Solicited message obtains an authorization key, and second public key and authorization key are transferred to the closed storage device.
Finally, when the closed storage device verifies the authorization key and meets the verification key, described second
Public key can store the safety chip, at this point, when the safety chip has second public key, the safety chip can be according to
The identification information of a corresponding application software is generated according to second public key, and will be described by the closed storage device
Identification information is transferred to the second electronic device, and in this embodiment, the closed storage device verifying authorization is close
Before key, the microprocessor of the closed storage device can first generate a pair verification information, and the closed storage fills
The operating unit set can generate the license confirmation information for being transmitted to the microprocessor, make the microprocessor can be according to described in
Pair verification information and generate an authorization approval information, beginning the authorization key and the verification key are verified.
However, when the closed storage device verifies the authorization key and do not meet the verification key, the peace
Refusal is stored in second public key, also, one of both described first electronic device and second electronic device by full chip
A reset information for being transferred to the closed storage device is generated via the application software, makes the safety chip foundation
The reset information and the licensing status is changed by the restriction state, in this embodiment, the safety chip is by institute
It states restriction state to be changed into before the licensing status, a microprocessor of the closed storage device can be first according to described heavy
Confidence ceases to form a request reset information, an operating unit of the then described closed storage device can generate one be transmitted to it is described
The resetting confirmation message of microprocessor makes the microprocessor generate execution resetting letter according to the request reset information
Breath, makes the safety chip be changed into the licensing status.
The method have the characteristics that the first electronic device installation application software and online when closed storage device, first
Electronic device will form public key with verification key to allow the safety chip of closed storage device to be stored, so that safety chip
Licensing status by not storing public key is changed into the restriction state for having public key, also, when second electronic device want using
When closed storage device, second electronic device necessarily is formed the authorization key for meeting verification key, and the second public key is stored
Second electronic device could be allowed using closed storage device in safety chip, whereby, even if closed storage device lose and
It is picked up by non-original card owner, non-original card owner can not be available closed storage device because verification key is not known, in turn
It is avoided that the information being stored in inside closed storage device is stolen or leads to damage to property.
Detailed description of the invention
Fig. 1 is the step flow diagram of present invention pairing authentication method;
Fig. 2 is the module diagram for matching authentication device;
Fig. 3 is the flow diagram that the first electronic device logins step to first by establishment step;
Fig. 4 is the schematic diagram of establishment step in Fig. 1;
Fig. 5 is the schematic diagram of the first online process in Fig. 1;
Fig. 6 is the first schematic diagram for logining step in Fig. 1;
Fig. 7 is the flow diagram that second electronic device logins step to second by the second online process;
Fig. 8 is the schematic diagram of the second online process in Fig. 1;
Fig. 9 is the second schematic diagram for logining step in Fig. 1;
Figure 10 is the flow diagram that second electronic device carries out resetting step;
Figure 11 is the schematic diagram that step is reset in Fig. 1.
Description of symbols: 1- matches authentication method;2- matches authentication device;The first electronic device of 20-;The second electricity of 21-
Sub-device;The closed storage device of 22-;221- operating unit;222- display;223- microprocessor;224- safety chip;
224a- processing unit;The internet 23-;The first application software of 24-;The second application software of 25-;S1- establishment step;S2- first
Machine step;S3- first logins step;The second online process of S4-;S5- verification step;S6- second logins step;S7- resetting step
Suddenly.
Specific embodiment
The present invention is further described with attached drawing combined with specific embodiments below, the advantages and features of the present invention will be with
Description and it is apparent.
It please refers to shown in Fig. 1 and Fig. 2, the pairing authentication method 1 of electronic transaction device of the present invention is with unification pairing certification dress
2 uses are set, pairing authentication device 2 has one first electronic device 20, a second electronic device 21 and a closed storage dress
Set 22, wherein the first and second electronic device 20,21 can be set as mobile phone, computer or tablet computer.
There is an operating unit 221 and a display 222, operating unit 221 and aobvious outside closed storage device 22
Show that both devices 222 are electrically connected at a microprocessor 223 being located inside closed storage device 22, and microprocessor 223 is electric
Property be connected to one be located at closed storage device 22 safety chip 224, wherein safety chip 224 be equipped with a processing unit
224a, at this point, safety chip 224 does not store any public key and a licensing status is presented, wherein closed storage device 22 is set
For an integrated circuit (Integrated Circuit, IC) card.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 4, when the first electronic device 20, second electronic device 21 and closed storage fill
When setting 22 threes and wanting to carry out pairing certification, the first electronic device 20 and both second electronic devices 21 are online in an internet
23, so that the first electronic device 20 is downloaded one first application software 24 and is installed, meanwhile, the downloading of second electronic device 21 one
Program is identical to the second application software 25 of the first application software 24 and is installed, wherein the first electronic device 20 installation the
After one application software 24, the first electronic device 20 forms one first public key and one corresponding to described by the first application software 24
The first key of first public key, and first public key is shown in the display screen of the first electronic device 20, relatively, the second electricity
After sub-device 21 installs the second application software 25, second electronic device 21 forms one by the second application software 25 and is different from institute
State the second public key of the first public key and the second key that one is different from the first key, wherein second public key is corresponding
In the second key, and second public key is shown in the display screen of second electronic device 21, also, when the first and second electronics fills
When setting 20,21 and being respectively formed first and second public key and the first and second key, that is, complete an establishment step S1.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 5, completes to carry out one first online process S2, the first electricity after establishment step S1
The searching closed formula storage device 22 of sub-device 20, and one first pairing request information is transmitted to closed storage device 22, due to
The licensing status, and then the first pairing request letter described in the meeting direct basis of closed storage device 22 is presented in safety chip 224
Breath and it is online in the first electronic device 20, at this point, the first electronic device 20 because it is online in closed storage device 22 and
The safety chip 224 of closed storage device 22 is detected, and can learn that the licensing status is presented in safety chip 224,
So that the first electronic device 20 1 checks key.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 6, next enters one first by the first online process S2 and login step S3, the
One electronic device 20 is by first public key and checks cipher key delivery to closed storage device 22, when closed storage device 22
When receiving first public key and verification key, the microprocessor 223 of closed storage device 22, which forms one, has described the
Information is logined in the request of one public key and verification key, and information is logined in the request and is transmitted to the aobvious of closed storage device 22
Show device 222, so that display 222 shows first public key and verification key.
Then, the display 222 of closed storage device 22 is watched using the user of the first electronic device 20, and confirms institute
Stating the first public key and verification key does not have mistake, the operating unit 221 of closed storage device 22 is pressed, so that operating unit
221 can generate an execution confirmation message, and the execution confirmation message is transferred to microprocessor 223, keep microprocessor 223 logical
Cross it is described request login information formed one be transferred to safety chip 224 execution login information so that first public key and
It checks key and is stored in the safety chip 224, safety chip 224 is allowed to be changed into a limitation for having public key by the licensing status
State, at this point, safety chip 224 has first public key, and safety chip 224 can generate one according to first public key
First identification information is transmitted corresponding to the first identification information of the first application software 24, and by closed storage device 22
To the first electronic device 20.
It please refers to shown in Fig. 1, Fig. 7 and Fig. 8, followed by one second online process S4, second electronic device 21 is searched
The closed storage device 22, and one second pairing request information is transmitted to the closed storage device 22, so that second
Electronic device 21 is online in the closed storage device 22, at this point, second electronic device 21 can detect safety chip 224, and
The restriction state is presented in confirmation safety chip 224, also, since the restriction state, safety chip is presented in safety chip 224
224 will form a solicited message for being transferred to second electronic device 21, wherein second electronic device 21 is according to the solicited message
And it obtains one and inputs the authorization key formed by user, also, second electronic device 21 can be again by second public key and authorization
Key is transferred to closed storage device 22.
It please refers to shown in Fig. 1, Fig. 7 and Fig. 9, when the safety chip 224 that the restriction state is presented receives described second
When public key and authorization key, then start to carry out a verification step S5, when the microprocessor 223 of closed storage device 22 verifies institute
When stating authorization key and according with the verification key, the microprocessor 223 of closed storage device 22, which forms one, has described award
It weighs key and checks the pair verification information of key, and the pair verification information is transmitted to the aobvious of closed storage device 22
Show device 222, so that display 222 shows the authorization key and verification key.
Then, the display 222 of closed storage device 22 is watched using the user of second electronic device 21, and confirms institute
Authorization key and verification key are stated between the two without mistake, next, pressing the operating unit of closed storage device 22
221, so that operating unit 221 can generate the license confirmation information for being transferred to microprocessor 223, pass through microprocessor 223
The pair verification information forms an authorization approval information for being transferred to safety chip 224, and safety chip 224 receive it is described
Authorization approval information then carries out one second and logins step S6, when step S6 is logined in execution second, the second public key deposit safety
Chip 224 makes safety chip 224 have first and second public key, allows the first and second electronic device 20,21 to be able to use closed
Storage device 22, at this point, safety chip 224 has second public key, and safety chip 224 can according to second public key and
Second identification information for corresponding to the second application software 25 is generated, and is believed second identification by closed storage device 22
Breath is transmitted to second electronic device 21.
It please refers to shown in Fig. 1, Figure 10 and Figure 11, when carrying out verification step S5, the microprocessor of closed storage device 22
When the 223 verifying authorization keys do not meet the verification key, refusal is stored in second public key by safety chip 224,
It can be carried out a resetting step S7, meet the authorization key for checking key since second electronic device 21 can not be formed, allow
Second electronic device 21 is not available in closed storage device 22, and then second electronic device 21 is via the second application software 25
And a reset information is generated, and the reset information is transferred to closed storage device 22, so that closed storage device 22
Microprocessor 223 form a request reset information for being shown in display 222 according to the reset information, and use second
The user of electronic device 21 watches display 222, and confirms and to reset to safety chip 224, next, pressing closed
The operating unit 221 of storage device 22, so that operating unit 221 generates a resetting confirmation message for being transmitted to microprocessor 223,
So that microprocessor 223 is generated an execution reset information by the request reset information, and the execution reset information is passed
It passs and sets safety chip 224, safety chip 224 is allowed to be changed into the licensing status, and then safety chip 224 by the restriction state
There is not any public key.
In addition, if safety chip 224 is not changed into the licensing status by the user using second electronic device 21,
The operating unit 221 of closed storage device 22 need not be then pressed, so that operating unit 221 not will form the execution resetting letter
Breath allows safety chip 224 to be still presented the restriction state, also, second electronic device 21 via the second application software 25 and
It generates the reset information and only facilitates purposes of discussion, that is, the reset information can pass through the first application by the first electronic device 20
Software 24 is formed.
Above explanation and examples are merely exemplary, it is not intended to limit the scope of the present invention in any way.This field
Technical staff should be understood that without departing from the spirit and scope of the invention can details to technical solution of the present invention and
Form is modified or is replaced, but these modifications and replacement are fallen within the protection scope of the present invention.
Claims (7)
1. a kind of pairing authentication method of electronic transaction device, which comprises the following steps:
One application software is respectively arranged in one first electronic device and a second electronic device, first electronic device and
Two electronic devices form one first public key and one second public key by the application software respectively;
First electronic device searches a closed storage device, and online to the closed storage device progress, described
First electronic device detection one is located at the safety chip of the closed storage device, and confirms that the safety chip is presented one and does not have
There is the licensing status for having public key, first electronic device is made to generate a verification key;
First electronic device to the closed storage device, makes first public key and verification cipher key delivery described
First public key and verification key are stored in the safety chip, and then the safety chip will be changed into one by the licensing status
There is the restriction state of public key;
The second electronic device searches the closed storage device, and online to closing storage device progress, and institute
It states second electronic device and detects the safety chip, and confirm that the restriction state is presented in the safety chip, make described second
Electronic device requires generation one to form the solicited message of the verification key;
The second electronic device obtains an authorization key according to the solicited message, and by second public key and authorization key
It is transferred to the closed storage device;And
When the closed storage device, which verifies the authorization key, meets the verification key, second public key will be stored
In the safety chip.
2. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the closed storage
When cryopreservation device receives first public key and verification key, a microprocessor of the closed storage device, which is initially formed one, is asked
It asks and logins information, the execution that the operating unit generation one of the then described closed storage device is transmitted to the microprocessor is true
Recognize information, the microprocessor is made to login information according to the request and generate an execution and login information, makes first public key
And verification key is stored in the safety chip.
3. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: the closed storage
Before device verifies the authorization key, a microprocessor for being located inside the closed storage device first generates a pairing and tests
Information is demonstrate,proved, and the authorization that an operating unit generation one for being set to the closed storage device is transmitted to the microprocessor is true
Recognize information, the microprocessor is made to generate an authorization approval information according to the pair verification information, begins the authorization is close
Key is verified with the verification key.
4. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the safety chip
When having first public key or second public key, the safety chip according to first public key or second public key and
The identification information of a corresponding application software is generated, and the identification information is transferred to institute by the closed storage device
State the first electronic device or the second electronic device.
5. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the closed storage
When the cryopreservation device verifying authorization key does not meet the verification key, the safety chip will refusal deposit second public affairs
Key.
6. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: the first electronics dress
Set that one of them via the application software generates one and be transferred to the closed storage device with both second electronic devices
Reset information, so that the safety chip is changed into the licensing status by the restriction state according to the reset information.
7. the pairing authentication method of electronic transaction device according to claim 6, it is characterised in that: the safety chip by
The restriction state is changed into before the licensing status, and a microprocessor of the closed storage device is first according to described heavy
Confidence ceases to form a request reset information, and the operating unit generation one of the then described closed storage device is transmitted to described micro-
The resetting confirmation message of processor makes the microprocessor generate an execution reset information according to the request reset information,
The safety chip is set to be changed into the licensing status.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810113888.8A CN110119946B (en) | 2018-02-05 | 2018-02-05 | Pairing authentication method for electronic transaction device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810113888.8A CN110119946B (en) | 2018-02-05 | 2018-02-05 | Pairing authentication method for electronic transaction device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110119946A true CN110119946A (en) | 2019-08-13 |
CN110119946B CN110119946B (en) | 2022-12-13 |
Family
ID=67519820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810113888.8A Active CN110119946B (en) | 2018-02-05 | 2018-02-05 | Pairing authentication method for electronic transaction device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110119946B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005084846A (en) * | 2003-09-08 | 2005-03-31 | Akira Ichikawa | Automatic individual identification of ic card |
JP2007019824A (en) * | 2005-07-07 | 2007-01-25 | Nippon Telegr & Teleph Corp <Ntt> | Token authentication method and system |
CN101140605A (en) * | 2007-10-24 | 2008-03-12 | 北京飞天诚信科技有限公司 | Data safety reading method and safety storage apparatus thereof |
CN101860525A (en) * | 2009-09-25 | 2010-10-13 | 深圳市安捷信联科技有限公司 | Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal |
CN102081821A (en) * | 2009-11-27 | 2011-06-01 | 中国银联股份有限公司 | IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal |
JP2011171946A (en) * | 2010-02-17 | 2011-09-01 | Toshiba Corp | Portable electronic device, method for controlling portable electronic device, and ic card |
CN102867366A (en) * | 2012-09-19 | 2013-01-09 | 中国工商银行股份有限公司 | Portable bank card data processing device, system and method |
CN103258268A (en) * | 2012-02-17 | 2013-08-21 | 网路乾坤有限公司 | Identity authentication method of transaction system |
CN103366277A (en) * | 2012-03-26 | 2013-10-23 | 福特全球技术公司 | Method and apparatus for identification verification and purchase validation |
CN103971234A (en) * | 2013-02-06 | 2014-08-06 | 徐嘉宏 | Mobile payment assembly and system and method adopting same |
CN104021473A (en) * | 2014-05-30 | 2014-09-03 | 刘劲彤 | Safe payment method of visual financial card |
CN104102934A (en) * | 2014-07-09 | 2014-10-15 | 中国工商银行股份有限公司 | Portable IC card read-write device, system and method |
CN105634730A (en) * | 2015-12-29 | 2016-06-01 | 中国建设银行股份有限公司 | Secret key management system of financial IC card |
KR20170087678A (en) * | 2016-01-21 | 2017-07-31 | 삼성전자주식회사 | Security Chip, Application Processor, Device including security Chip and Operating Method thereof |
-
2018
- 2018-02-05 CN CN201810113888.8A patent/CN110119946B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005084846A (en) * | 2003-09-08 | 2005-03-31 | Akira Ichikawa | Automatic individual identification of ic card |
JP2007019824A (en) * | 2005-07-07 | 2007-01-25 | Nippon Telegr & Teleph Corp <Ntt> | Token authentication method and system |
CN101140605A (en) * | 2007-10-24 | 2008-03-12 | 北京飞天诚信科技有限公司 | Data safety reading method and safety storage apparatus thereof |
CN101860525A (en) * | 2009-09-25 | 2010-10-13 | 深圳市安捷信联科技有限公司 | Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal |
CN102081821A (en) * | 2009-11-27 | 2011-06-01 | 中国银联股份有限公司 | IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal |
JP2011171946A (en) * | 2010-02-17 | 2011-09-01 | Toshiba Corp | Portable electronic device, method for controlling portable electronic device, and ic card |
CN103258268A (en) * | 2012-02-17 | 2013-08-21 | 网路乾坤有限公司 | Identity authentication method of transaction system |
CN103366277A (en) * | 2012-03-26 | 2013-10-23 | 福特全球技术公司 | Method and apparatus for identification verification and purchase validation |
CN102867366A (en) * | 2012-09-19 | 2013-01-09 | 中国工商银行股份有限公司 | Portable bank card data processing device, system and method |
CN103971234A (en) * | 2013-02-06 | 2014-08-06 | 徐嘉宏 | Mobile payment assembly and system and method adopting same |
CN104021473A (en) * | 2014-05-30 | 2014-09-03 | 刘劲彤 | Safe payment method of visual financial card |
CN104102934A (en) * | 2014-07-09 | 2014-10-15 | 中国工商银行股份有限公司 | Portable IC card read-write device, system and method |
CN105634730A (en) * | 2015-12-29 | 2016-06-01 | 中国建设银行股份有限公司 | Secret key management system of financial IC card |
KR20170087678A (en) * | 2016-01-21 | 2017-07-31 | 삼성전자주식회사 | Security Chip, Application Processor, Device including security Chip and Operating Method thereof |
Non-Patent Citations (2)
Title |
---|
彭桂林等: "无中心化离线认证技术的应用与实践", 《智能建筑与智慧城市》 * |
王冠等: "一种基于安全芯片的可信移动存储设备的双向认证机制", 《计算机与应用化学》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110119946B (en) | 2022-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6486974B2 (en) | Fingerprint recognition card, card operation method using fingerprint recognition card, and method thereof | |
US9704312B2 (en) | Apparatus and methods for identity verification | |
US9251513B2 (en) | Stand-alone secure PIN entry device for enabling EMV card transactions with separate card reader | |
US20160012327A1 (en) | Apparatus having communication means and a receiving member for a chip card | |
US20060095369A1 (en) | Device, method and system for authorizing transactions | |
EP1873729A1 (en) | Portable terminal, settlement method, and program | |
WO2012058309A2 (en) | Integration of verification tokens with mobile communication devices | |
JP2015511336A (en) | ID authentication | |
US20120102565A1 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
WO2013001133A1 (en) | Bank-card fraud detection and prevention for bank automats | |
US10555173B2 (en) | Pairing authentication method for electronic transaction device | |
US20220327518A1 (en) | Multi-Purpose Physical Smartcard | |
CN110119946A (en) | The pairing authentication method of electronic transaction device | |
KR20110002967A (en) | Method and system for providing authentication service by using biometrics and portable memory unit therefor | |
KR20070117371A (en) | Apparatus for generating random numbers for object oriented otp | |
TWI646481B (en) | Pairing authentication method for electronic transaction device | |
KR102046708B1 (en) | Pairing authentication method for electronic transaction device | |
JP6559831B1 (en) | Pairing authentication method for electronic transaction equipment | |
JP6845888B2 (en) | Authentication method for electronic wallet media | |
US20220270104A1 (en) | Payment system using customer's fingerprints | |
AU2021381503A1 (en) | Medium for temporary account access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40008684 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |