CN110119946A - The pairing authentication method of electronic transaction device - Google Patents

The pairing authentication method of electronic transaction device Download PDF

Info

Publication number
CN110119946A
CN110119946A CN201810113888.8A CN201810113888A CN110119946A CN 110119946 A CN110119946 A CN 110119946A CN 201810113888 A CN201810113888 A CN 201810113888A CN 110119946 A CN110119946 A CN 110119946A
Authority
CN
China
Prior art keywords
key
closed storage
storage device
safety chip
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810113888.8A
Other languages
Chinese (zh)
Other versions
CN110119946B (en
Inventor
庄佑邦
欧仕迈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Treasury Technology Co Ltd
Original Assignee
Treasury Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Treasury Technology Co Ltd filed Critical Treasury Technology Co Ltd
Priority to CN201810113888.8A priority Critical patent/CN110119946B/en
Publication of CN110119946A publication Critical patent/CN110119946A/en
Application granted granted Critical
Publication of CN110119946B publication Critical patent/CN110119946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The present invention relates to a kind of pairing authentication methods of electronic transaction device comprising the steps of: application software is respectively arranged in the first electronic device and second electronic device, two application software is made to be respectively formed public key;First electronic device is online in closed storage device, and the first electronic device is allowed to form verification key;One of public key and verification key are stored in a safety chip for being located at closed storage device;Second electronic device is online in closed device, and forms an authorization key for according with verification key, and another public key and authorization key are transferred to closed storage device;Closed storage device verifying authorization key accords with verification key, and another public key is stored in safety chip, whereby, know that the card holder of verification key could use closed storage device, only to avoid the risk that assets are stolen occurs because losing closed storage device.

Description

The pairing authentication method of electronic transaction device
Technical field
The present invention about a kind of electronic transaction device pairing authentication method, especially a kind of electronic device with it is closed It will form verification key after storage device phase interconnections, and allow and just know that the card holder of verification key uses closed storage device Pairing authentication method.
Background technique
With the development of science and technology many transaction and the means of payment gradually by integrated circuit (Integrated Circuit, IC) replaced card, the memory being arranged inside IC card can store the information of card holder, and then be widely deployed in each occasion, Seem ATM card, fiscard, credit card, phonecard, stored value card etc. be all common IC card at present, and it is general used in IC card It is broadly divided into contact interface, non-contact interface and three kinds of Combined type interface according to the mode for depositing, reading data.
For having the fiscard of credit card and ATM card function, when fiscard to be used is carried out by ATM Before transaction or service, ATM needs card holder to input preset password come to obtain the power for using the fiscard Benefit, therefore, even if fiscard is lost or is stolen, non-original card owner will be unable to steal cash by ATM, in addition, working as When card holder is consumed using fiscard, card holder can be required that on transaction document, label belong to the name of card holder, and then work as Fiscard is lost or is stolen, then is easy to be held by non-original and pseudo- label or steals and brush and cause damage to property.
In addition, the technology with wireless transmission is maked rapid progress, a part of IC uses less radio-frequency (RFID/Radio- Frequency identification) this Radio Transmission Technology, and this wireless radio-frequency is most often used in the amount of money On less consumer sale, such as the public transportation vehicles such as bus, rapid transit are taken, can use EasyCard and pass through wireless induction Mode is withholdd, however, the consumption of this small amount in order to pursue speed and convenience, will not be required defeated while transaction Enter password or label belong to the name of card holder, therefore, as long as the IC card consumed with wireless induction is lost or is stolen, The non-original card owner for picking up IC card can directly carry out consumer sale, until the IC card is deactivated the amount of money of either internal reservoir It is consumed totally.
In addition, it is used for the IC card of access control system, it, can be suitable usually as long as holding correct IC card for speed and convenience The area of gate inhibition's control is passed in and out sharply, therefore, when the IC for access control system loses or is stolen, picks up the non-original of IC card Card holder also directly can pass in and out gate inhibition area of control by picked up IC card, so as to cause security risk.
Summary of the invention
An only original can be generated when the closed storage device hold it is a primary object of the present invention to electronic device is online The key that card person knows, as long as and then input the card holder of correct key, could be carried out by closed storage device using, by This, even if closed storage device is lost and picked up by non-original card owner, non-original card owner's meeting can not because key is not known It uses, and then is avoided that the information being stored in inside closed storage device is stolen or damage to property.
To realize that foregoing purpose, the present invention include following step about a kind of pairing authentication method of electronic transaction device It is rapid: an application software is respectively arranged in one first electronic device and a second electronic device, first electronic device and Two electronic devices form one first public key and one second public key by the application software respectively.
First electronic device searches a closed storage device, and online to the closed storage device progress, The first electronic device detection one is located at the safety chip of the closed storage device, and confirms that the safety chip is presented One does not have the licensing status of public key, and first electronic device is made to generate a verification key.
First electronic device to the closed storage device, makes first public key and verification cipher key delivery First public key and verification key are stored in the safety chip, and then the safety chip will be changed by the licensing status The restriction state for having public key for one, at this point, when the safety chip has first public key, the safety chip can be according to Generate the identification information of a corresponding application software according to first public key, and by the closed storage device by the knowledge Other information is transferred to first electronic device, in this embodiment, when the closed storage device receives described first When public key and verification key, a microprocessor of the closed storage device can be initially formed a request and login information, then institute The operating unit for stating closed storage device can generate an execution confirmation message for being transmitted to the microprocessor, make described micro- Processor logins information according to the request and generates an execution and login information, makes first public key and verification key deposit The safety chip.
The second electronic device searches the closed storage device, and online to closing storage device progress, And the second electronic device detects the safety chip, and confirms that the restriction state is presented in the safety chip, makes described Second electronic device requires generation one to form the solicited message of the verification key, and the second electronic device is according to described in Solicited message obtains an authorization key, and second public key and authorization key are transferred to the closed storage device.
Finally, when the closed storage device verifies the authorization key and meets the verification key, described second Public key can store the safety chip, at this point, when the safety chip has second public key, the safety chip can be according to The identification information of a corresponding application software is generated according to second public key, and will be described by the closed storage device Identification information is transferred to the second electronic device, and in this embodiment, the closed storage device verifying authorization is close Before key, the microprocessor of the closed storage device can first generate a pair verification information, and the closed storage fills The operating unit set can generate the license confirmation information for being transmitted to the microprocessor, make the microprocessor can be according to described in Pair verification information and generate an authorization approval information, beginning the authorization key and the verification key are verified.
However, when the closed storage device verifies the authorization key and do not meet the verification key, the peace Refusal is stored in second public key, also, one of both described first electronic device and second electronic device by full chip A reset information for being transferred to the closed storage device is generated via the application software, makes the safety chip foundation The reset information and the licensing status is changed by the restriction state, in this embodiment, the safety chip is by institute It states restriction state to be changed into before the licensing status, a microprocessor of the closed storage device can be first according to described heavy Confidence ceases to form a request reset information, an operating unit of the then described closed storage device can generate one be transmitted to it is described The resetting confirmation message of microprocessor makes the microprocessor generate execution resetting letter according to the request reset information Breath, makes the safety chip be changed into the licensing status.
The method have the characteristics that the first electronic device installation application software and online when closed storage device, first Electronic device will form public key with verification key to allow the safety chip of closed storage device to be stored, so that safety chip Licensing status by not storing public key is changed into the restriction state for having public key, also, when second electronic device want using When closed storage device, second electronic device necessarily is formed the authorization key for meeting verification key, and the second public key is stored Second electronic device could be allowed using closed storage device in safety chip, whereby, even if closed storage device lose and It is picked up by non-original card owner, non-original card owner can not be available closed storage device because verification key is not known, in turn It is avoided that the information being stored in inside closed storage device is stolen or leads to damage to property.
Detailed description of the invention
Fig. 1 is the step flow diagram of present invention pairing authentication method;
Fig. 2 is the module diagram for matching authentication device;
Fig. 3 is the flow diagram that the first electronic device logins step to first by establishment step;
Fig. 4 is the schematic diagram of establishment step in Fig. 1;
Fig. 5 is the schematic diagram of the first online process in Fig. 1;
Fig. 6 is the first schematic diagram for logining step in Fig. 1;
Fig. 7 is the flow diagram that second electronic device logins step to second by the second online process;
Fig. 8 is the schematic diagram of the second online process in Fig. 1;
Fig. 9 is the second schematic diagram for logining step in Fig. 1;
Figure 10 is the flow diagram that second electronic device carries out resetting step;
Figure 11 is the schematic diagram that step is reset in Fig. 1.
Description of symbols: 1- matches authentication method;2- matches authentication device;The first electronic device of 20-;The second electricity of 21- Sub-device;The closed storage device of 22-;221- operating unit;222- display;223- microprocessor;224- safety chip; 224a- processing unit;The internet 23-;The first application software of 24-;The second application software of 25-;S1- establishment step;S2- first Machine step;S3- first logins step;The second online process of S4-;S5- verification step;S6- second logins step;S7- resetting step Suddenly.
Specific embodiment
The present invention is further described with attached drawing combined with specific embodiments below, the advantages and features of the present invention will be with Description and it is apparent.
It please refers to shown in Fig. 1 and Fig. 2, the pairing authentication method 1 of electronic transaction device of the present invention is with unification pairing certification dress 2 uses are set, pairing authentication device 2 has one first electronic device 20, a second electronic device 21 and a closed storage dress Set 22, wherein the first and second electronic device 20,21 can be set as mobile phone, computer or tablet computer.
There is an operating unit 221 and a display 222, operating unit 221 and aobvious outside closed storage device 22 Show that both devices 222 are electrically connected at a microprocessor 223 being located inside closed storage device 22, and microprocessor 223 is electric Property be connected to one be located at closed storage device 22 safety chip 224, wherein safety chip 224 be equipped with a processing unit 224a, at this point, safety chip 224 does not store any public key and a licensing status is presented, wherein closed storage device 22 is set For an integrated circuit (Integrated Circuit, IC) card.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 4, when the first electronic device 20, second electronic device 21 and closed storage fill When setting 22 threes and wanting to carry out pairing certification, the first electronic device 20 and both second electronic devices 21 are online in an internet 23, so that the first electronic device 20 is downloaded one first application software 24 and is installed, meanwhile, the downloading of second electronic device 21 one Program is identical to the second application software 25 of the first application software 24 and is installed, wherein the first electronic device 20 installation the After one application software 24, the first electronic device 20 forms one first public key and one corresponding to described by the first application software 24 The first key of first public key, and first public key is shown in the display screen of the first electronic device 20, relatively, the second electricity After sub-device 21 installs the second application software 25, second electronic device 21 forms one by the second application software 25 and is different from institute State the second public key of the first public key and the second key that one is different from the first key, wherein second public key is corresponding In the second key, and second public key is shown in the display screen of second electronic device 21, also, when the first and second electronics fills When setting 20,21 and being respectively formed first and second public key and the first and second key, that is, complete an establishment step S1.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 5, completes to carry out one first online process S2, the first electricity after establishment step S1 The searching closed formula storage device 22 of sub-device 20, and one first pairing request information is transmitted to closed storage device 22, due to The licensing status, and then the first pairing request letter described in the meeting direct basis of closed storage device 22 is presented in safety chip 224 Breath and it is online in the first electronic device 20, at this point, the first electronic device 20 because it is online in closed storage device 22 and The safety chip 224 of closed storage device 22 is detected, and can learn that the licensing status is presented in safety chip 224, So that the first electronic device 20 1 checks key.
It please refers to shown in Fig. 1, Fig. 3 and Fig. 6, next enters one first by the first online process S2 and login step S3, the One electronic device 20 is by first public key and checks cipher key delivery to closed storage device 22, when closed storage device 22 When receiving first public key and verification key, the microprocessor 223 of closed storage device 22, which forms one, has described the Information is logined in the request of one public key and verification key, and information is logined in the request and is transmitted to the aobvious of closed storage device 22 Show device 222, so that display 222 shows first public key and verification key.
Then, the display 222 of closed storage device 22 is watched using the user of the first electronic device 20, and confirms institute Stating the first public key and verification key does not have mistake, the operating unit 221 of closed storage device 22 is pressed, so that operating unit 221 can generate an execution confirmation message, and the execution confirmation message is transferred to microprocessor 223, keep microprocessor 223 logical Cross it is described request login information formed one be transferred to safety chip 224 execution login information so that first public key and It checks key and is stored in the safety chip 224, safety chip 224 is allowed to be changed into a limitation for having public key by the licensing status State, at this point, safety chip 224 has first public key, and safety chip 224 can generate one according to first public key First identification information is transmitted corresponding to the first identification information of the first application software 24, and by closed storage device 22 To the first electronic device 20.
It please refers to shown in Fig. 1, Fig. 7 and Fig. 8, followed by one second online process S4, second electronic device 21 is searched The closed storage device 22, and one second pairing request information is transmitted to the closed storage device 22, so that second Electronic device 21 is online in the closed storage device 22, at this point, second electronic device 21 can detect safety chip 224, and The restriction state is presented in confirmation safety chip 224, also, since the restriction state, safety chip is presented in safety chip 224 224 will form a solicited message for being transferred to second electronic device 21, wherein second electronic device 21 is according to the solicited message And it obtains one and inputs the authorization key formed by user, also, second electronic device 21 can be again by second public key and authorization Key is transferred to closed storage device 22.
It please refers to shown in Fig. 1, Fig. 7 and Fig. 9, when the safety chip 224 that the restriction state is presented receives described second When public key and authorization key, then start to carry out a verification step S5, when the microprocessor 223 of closed storage device 22 verifies institute When stating authorization key and according with the verification key, the microprocessor 223 of closed storage device 22, which forms one, has described award It weighs key and checks the pair verification information of key, and the pair verification information is transmitted to the aobvious of closed storage device 22 Show device 222, so that display 222 shows the authorization key and verification key.
Then, the display 222 of closed storage device 22 is watched using the user of second electronic device 21, and confirms institute Authorization key and verification key are stated between the two without mistake, next, pressing the operating unit of closed storage device 22 221, so that operating unit 221 can generate the license confirmation information for being transferred to microprocessor 223, pass through microprocessor 223 The pair verification information forms an authorization approval information for being transferred to safety chip 224, and safety chip 224 receive it is described Authorization approval information then carries out one second and logins step S6, when step S6 is logined in execution second, the second public key deposit safety Chip 224 makes safety chip 224 have first and second public key, allows the first and second electronic device 20,21 to be able to use closed Storage device 22, at this point, safety chip 224 has second public key, and safety chip 224 can according to second public key and Second identification information for corresponding to the second application software 25 is generated, and is believed second identification by closed storage device 22 Breath is transmitted to second electronic device 21.
It please refers to shown in Fig. 1, Figure 10 and Figure 11, when carrying out verification step S5, the microprocessor of closed storage device 22 When the 223 verifying authorization keys do not meet the verification key, refusal is stored in second public key by safety chip 224, It can be carried out a resetting step S7, meet the authorization key for checking key since second electronic device 21 can not be formed, allow Second electronic device 21 is not available in closed storage device 22, and then second electronic device 21 is via the second application software 25 And a reset information is generated, and the reset information is transferred to closed storage device 22, so that closed storage device 22 Microprocessor 223 form a request reset information for being shown in display 222 according to the reset information, and use second The user of electronic device 21 watches display 222, and confirms and to reset to safety chip 224, next, pressing closed The operating unit 221 of storage device 22, so that operating unit 221 generates a resetting confirmation message for being transmitted to microprocessor 223, So that microprocessor 223 is generated an execution reset information by the request reset information, and the execution reset information is passed It passs and sets safety chip 224, safety chip 224 is allowed to be changed into the licensing status, and then safety chip 224 by the restriction state There is not any public key.
In addition, if safety chip 224 is not changed into the licensing status by the user using second electronic device 21, The operating unit 221 of closed storage device 22 need not be then pressed, so that operating unit 221 not will form the execution resetting letter Breath allows safety chip 224 to be still presented the restriction state, also, second electronic device 21 via the second application software 25 and It generates the reset information and only facilitates purposes of discussion, that is, the reset information can pass through the first application by the first electronic device 20 Software 24 is formed.
Above explanation and examples are merely exemplary, it is not intended to limit the scope of the present invention in any way.This field Technical staff should be understood that without departing from the spirit and scope of the invention can details to technical solution of the present invention and Form is modified or is replaced, but these modifications and replacement are fallen within the protection scope of the present invention.

Claims (7)

1. a kind of pairing authentication method of electronic transaction device, which comprises the following steps:
One application software is respectively arranged in one first electronic device and a second electronic device, first electronic device and Two electronic devices form one first public key and one second public key by the application software respectively;
First electronic device searches a closed storage device, and online to the closed storage device progress, described First electronic device detection one is located at the safety chip of the closed storage device, and confirms that the safety chip is presented one and does not have There is the licensing status for having public key, first electronic device is made to generate a verification key;
First electronic device to the closed storage device, makes first public key and verification cipher key delivery described First public key and verification key are stored in the safety chip, and then the safety chip will be changed into one by the licensing status There is the restriction state of public key;
The second electronic device searches the closed storage device, and online to closing storage device progress, and institute It states second electronic device and detects the safety chip, and confirm that the restriction state is presented in the safety chip, make described second Electronic device requires generation one to form the solicited message of the verification key;
The second electronic device obtains an authorization key according to the solicited message, and by second public key and authorization key It is transferred to the closed storage device;And
When the closed storage device, which verifies the authorization key, meets the verification key, second public key will be stored In the safety chip.
2. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the closed storage When cryopreservation device receives first public key and verification key, a microprocessor of the closed storage device, which is initially formed one, is asked It asks and logins information, the execution that the operating unit generation one of the then described closed storage device is transmitted to the microprocessor is true Recognize information, the microprocessor is made to login information according to the request and generate an execution and login information, makes first public key And verification key is stored in the safety chip.
3. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: the closed storage Before device verifies the authorization key, a microprocessor for being located inside the closed storage device first generates a pairing and tests Information is demonstrate,proved, and the authorization that an operating unit generation one for being set to the closed storage device is transmitted to the microprocessor is true Recognize information, the microprocessor is made to generate an authorization approval information according to the pair verification information, begins the authorization is close Key is verified with the verification key.
4. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the safety chip When having first public key or second public key, the safety chip according to first public key or second public key and The identification information of a corresponding application software is generated, and the identification information is transferred to institute by the closed storage device State the first electronic device or the second electronic device.
5. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: when the closed storage When the cryopreservation device verifying authorization key does not meet the verification key, the safety chip will refusal deposit second public affairs Key.
6. the pairing authentication method of electronic transaction device according to claim 1, it is characterised in that: the first electronics dress Set that one of them via the application software generates one and be transferred to the closed storage device with both second electronic devices Reset information, so that the safety chip is changed into the licensing status by the restriction state according to the reset information.
7. the pairing authentication method of electronic transaction device according to claim 6, it is characterised in that: the safety chip by The restriction state is changed into before the licensing status, and a microprocessor of the closed storage device is first according to described heavy Confidence ceases to form a request reset information, and the operating unit generation one of the then described closed storage device is transmitted to described micro- The resetting confirmation message of processor makes the microprocessor generate an execution reset information according to the request reset information, The safety chip is set to be changed into the licensing status.
CN201810113888.8A 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device Active CN110119946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810113888.8A CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810113888.8A CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Publications (2)

Publication Number Publication Date
CN110119946A true CN110119946A (en) 2019-08-13
CN110119946B CN110119946B (en) 2022-12-13

Family

ID=67519820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810113888.8A Active CN110119946B (en) 2018-02-05 2018-02-05 Pairing authentication method for electronic transaction device

Country Status (1)

Country Link
CN (1) CN110119946B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005084846A (en) * 2003-09-08 2005-03-31 Akira Ichikawa Automatic individual identification of ic card
JP2007019824A (en) * 2005-07-07 2007-01-25 Nippon Telegr & Teleph Corp <Ntt> Token authentication method and system
CN101140605A (en) * 2007-10-24 2008-03-12 北京飞天诚信科技有限公司 Data safety reading method and safety storage apparatus thereof
CN101860525A (en) * 2009-09-25 2010-10-13 深圳市安捷信联科技有限公司 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
JP2011171946A (en) * 2010-02-17 2011-09-01 Toshiba Corp Portable electronic device, method for controlling portable electronic device, and ic card
CN102867366A (en) * 2012-09-19 2013-01-09 中国工商银行股份有限公司 Portable bank card data processing device, system and method
CN103258268A (en) * 2012-02-17 2013-08-21 网路乾坤有限公司 Identity authentication method of transaction system
CN103366277A (en) * 2012-03-26 2013-10-23 福特全球技术公司 Method and apparatus for identification verification and purchase validation
CN103971234A (en) * 2013-02-06 2014-08-06 徐嘉宏 Mobile payment assembly and system and method adopting same
CN104021473A (en) * 2014-05-30 2014-09-03 刘劲彤 Safe payment method of visual financial card
CN104102934A (en) * 2014-07-09 2014-10-15 中国工商银行股份有限公司 Portable IC card read-write device, system and method
CN105634730A (en) * 2015-12-29 2016-06-01 中国建设银行股份有限公司 Secret key management system of financial IC card
KR20170087678A (en) * 2016-01-21 2017-07-31 삼성전자주식회사 Security Chip, Application Processor, Device including security Chip and Operating Method thereof

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005084846A (en) * 2003-09-08 2005-03-31 Akira Ichikawa Automatic individual identification of ic card
JP2007019824A (en) * 2005-07-07 2007-01-25 Nippon Telegr & Teleph Corp <Ntt> Token authentication method and system
CN101140605A (en) * 2007-10-24 2008-03-12 北京飞天诚信科技有限公司 Data safety reading method and safety storage apparatus thereof
CN101860525A (en) * 2009-09-25 2010-10-13 深圳市安捷信联科技有限公司 Realizing method of electronic authorization warrant, intelligent terminal, authorization system and verification terminal
CN102081821A (en) * 2009-11-27 2011-06-01 中国银联股份有限公司 IC (integrated circuit) card paying system and method as well as multi-application IC card and payment terminal
JP2011171946A (en) * 2010-02-17 2011-09-01 Toshiba Corp Portable electronic device, method for controlling portable electronic device, and ic card
CN103258268A (en) * 2012-02-17 2013-08-21 网路乾坤有限公司 Identity authentication method of transaction system
CN103366277A (en) * 2012-03-26 2013-10-23 福特全球技术公司 Method and apparatus for identification verification and purchase validation
CN102867366A (en) * 2012-09-19 2013-01-09 中国工商银行股份有限公司 Portable bank card data processing device, system and method
CN103971234A (en) * 2013-02-06 2014-08-06 徐嘉宏 Mobile payment assembly and system and method adopting same
CN104021473A (en) * 2014-05-30 2014-09-03 刘劲彤 Safe payment method of visual financial card
CN104102934A (en) * 2014-07-09 2014-10-15 中国工商银行股份有限公司 Portable IC card read-write device, system and method
CN105634730A (en) * 2015-12-29 2016-06-01 中国建设银行股份有限公司 Secret key management system of financial IC card
KR20170087678A (en) * 2016-01-21 2017-07-31 삼성전자주식회사 Security Chip, Application Processor, Device including security Chip and Operating Method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
彭桂林等: "无中心化离线认证技术的应用与实践", 《智能建筑与智慧城市》 *
王冠等: "一种基于安全芯片的可信移动存储设备的双向认证机制", 《计算机与应用化学》 *

Also Published As

Publication number Publication date
CN110119946B (en) 2022-12-13

Similar Documents

Publication Publication Date Title
JP6486974B2 (en) Fingerprint recognition card, card operation method using fingerprint recognition card, and method thereof
US9704312B2 (en) Apparatus and methods for identity verification
US9251513B2 (en) Stand-alone secure PIN entry device for enabling EMV card transactions with separate card reader
US20160012327A1 (en) Apparatus having communication means and a receiving member for a chip card
US20060095369A1 (en) Device, method and system for authorizing transactions
EP1873729A1 (en) Portable terminal, settlement method, and program
WO2012058309A2 (en) Integration of verification tokens with mobile communication devices
JP2015511336A (en) ID authentication
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
WO2013001133A1 (en) Bank-card fraud detection and prevention for bank automats
US10555173B2 (en) Pairing authentication method for electronic transaction device
US20220327518A1 (en) Multi-Purpose Physical Smartcard
CN110119946A (en) The pairing authentication method of electronic transaction device
KR20110002967A (en) Method and system for providing authentication service by using biometrics and portable memory unit therefor
KR20070117371A (en) Apparatus for generating random numbers for object oriented otp
TWI646481B (en) Pairing authentication method for electronic transaction device
KR102046708B1 (en) Pairing authentication method for electronic transaction device
JP6559831B1 (en) Pairing authentication method for electronic transaction equipment
JP6845888B2 (en) Authentication method for electronic wallet media
US20220270104A1 (en) Payment system using customer&#39;s fingerprints
AU2021381503A1 (en) Medium for temporary account access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40008684

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant