CN110210187A - Have and prevents counterfeit APP weight discriminating method - Google Patents
Have and prevents counterfeit APP weight discriminating method Download PDFInfo
- Publication number
- CN110210187A CN110210187A CN201910335023.0A CN201910335023A CN110210187A CN 110210187 A CN110210187 A CN 110210187A CN 201910335023 A CN201910335023 A CN 201910335023A CN 110210187 A CN110210187 A CN 110210187A
- Authority
- CN
- China
- Prior art keywords
- card reading
- reading module
- code value
- app
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000004891 communication Methods 0.000 claims abstract description 29
- 238000005516 engineering process Methods 0.000 abstract description 8
- 230000003068 static effect Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention belongs to wireless communication technology fields and encryption technology field, and in particular to one kind can increase by one on the mobile terminal device can read the method that wireless and passive encrypting module/card realization authenticates APP.The present invention has further related also to the method for prevent counterfeit authentication using dynamic code value.By using passive encrypting module/card of dynamic code value, effectively avoid static bar code, when two dimensional code is authenticated by counterfeit risk.After user completes primary authentication by this method, next time, the code value of authentication can change automatically, even if having intercepted and captured some code value by certain technologies, be still unable to complete illegal authentication, and then realize and prevent counterfeit function, effectively increase the safety of authentication.
Description
Technical field
The invention belongs to wireless communication technology field and encryption technology fields more particularly to one kind can set in mobile terminal
Standby upper increase by one can read the method that wireless and passive encrypting module/card card reading module authenticates APP to realization,
The method for having further related to prevent counterfeit authentication using dynamic code value, specially has and prevents counterfeit APP weight discriminating method.
Background technique
With the continuous development of wireless communication technique and internet, the authentication of APP has been carried out using mobile terminal device
Through more and more common, bar code, two dimensional code, RFID and the universal of NFC make it possible that mobile terminal authenticates whenever and wherever possible,
For the providing a great convenience property of life of user.
At some to the higher occasion of security level required, such as bank, car operation, it is related to information security etc. and uses field
Under scape, counterfeit authentication then cannot be effectively avoided using the authentication mode of above-mentioned fix information or fixed ID.
Summary of the invention
The object of the present invention is to provide a kind of methods that the mobile terminal APP suitable for high security level place is authenticated, should
Method realizes the authentication of APP by using passive encryption chip/card of dynamic code value, and each authentication code value all changes,
Counterfeit function is prevented to realize.
First technical solution of the present invention is a kind of passive encryption chip based on USB interface communication/card realization
The method of APP authentication.Its system is made of mobile terminal device, key, card reading module and passive encrypting module/card.It is wherein close
Key is integrated in card reading module, and card reading module is powered and is communicated by the USB interface of mobile terminal device, passive encryption
Module/card information can be read by card reading module.As shown in Figure 1.
The characteristics of technical solution, is:
Passive encrypting module/card generates initial code value by the key arranged in advance and the algorithm of agreement, can dispose stand-by.
It has been integrated with to have to pass through to authenticate in mobile terminal device and whole or certain functions just can be used normally
APP, authentication not in the case where, only can be used without authentication partial function.When APP and card reading module foundation have
After effect communication, then the authentication discriminant information for waiting card reading module to upload, and decide whether to open corresponding function according to discriminant information
Energy.
Card reading module is powered by the USB interface of wireless terminal device, inside contain in above-mentioned passive chip/card
The reversed computation of same key and agreement, for resolve to the passive encrypting module/card information read and right
Whether authentication is by making decisions.
First technical solution of the invention follows the steps below work:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to
The place to be authenticated;
Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device provides for card reading module
Power supply;
Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really
Readable ard module legitimacy;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes,
Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing
The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module
Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether
Effectively;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure,
Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just
Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only
Partial function in open APP without authentication.
Second technical solution of the present invention is a kind of passive encryption chip/card based on wireless near field communication
The method for realizing APP authentication.Its system is made of mobile terminal device, key, card reading module and passive encrypting module/card.Its
Middle key is integrated in card reading module, and card reading module inside is comprising battery or can pass through from external power supply, card reading module
The short distance wireless communication technologies such as WIFI, bluetooth and card reading module are attached, and passive encrypting module/card information can be by card reading mould
Block is read.As shown in Figure 2.
The characteristics of technical solution, is:
Passive encrypting module/card generates initial code value by the key arranged in advance and the algorithm of agreement, can dispose stand-by.
It has been integrated with to have to pass through to authenticate in mobile terminal device and whole or certain functions just can be used normally
APP, authentication not in the case where, only can be used without authentication partial function.When APP and card reading module foundation have
After effect communication, then the authentication discriminant information for waiting card reading module to upload, and decide whether to open corresponding function according to discriminant information
Energy.
With battery or external equipment can be supported to power inside card reading module, inside further comprise and wireless device is whole
End carries out the wireless communication modules such as WIFI, bluetooth of short-range communication, and with key same in above-mentioned passive chip/card with
The reversed computation of agreement, for resolve to the passive encrypting module/card information read and whether pass through to authentication
It makes decisions.
Second technical solution of the invention follows the steps below work:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to
The place to be authenticated;
Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply
Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits
Wireless terminal device establishes connection;
Step 3, user start the APP on mobile terminal device, and APP passes through the Near Field Communication such as WIFI, bluetooth mode and card reading
Module establishes efficient communication, can the direct company of foundation if having connected the card reading module before the wireless terminal device
It connects;If it is using for the first time, then need to carry out necessary matching operation just to can establish connection;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes,
Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing
The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module
Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether
Effectively;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure,
Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just
Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only
Partial function in open APP without authentication.
The invention has the advantages that effectively avoiding static state by using passive encrypting module/card of dynamic code value
By counterfeit risk when bar code, two dimensional code are authenticated.After user completes primary authentication by this method, next time is authenticated
Code value can change automatically, even if having intercepted and captured some code value by certain technologies, be still unable to complete illegal authentication, and then realize
Prevent counterfeit function, effectively increases the safety of authentication.
Detailed description of the invention
Fig. 1 is the first technical solution system structure diagram of the invention.
Fig. 2 is the second technical solution system structure diagram of the invention.
Fig. 3 is the first technical solution work-based logic procedure chart of the invention.
Fig. 4 is the second technical solution work-based logic procedure chart of the invention.
In figure: the passive encrypting module/card of 1- mobile terminal device, 2- card reading module, 3-, 4- key.
Specific embodiment
The following describes the present invention in detail with reference to the accompanying drawings and specific embodiments.
Currently, very extensive use has been obtained in APP authentication, static bar code or two dimensional code are used in most occasions
It can complete to authenticate, but the safety of the authentication mode is unable to satisfy some such as banks, car operation, is related to information security
Equal specific occasions.Once it is counterfeit authentication information occur, it will cause consequences very serious.
To solve the above-mentioned problems, the first the passive encryption chip based on USB interface communication/card proposed by the present invention is real
The method of existing APP authentication.Its system is made of mobile terminal device 1, card reading module 2, passive encrypting module/card 3 and key 4.
Wherein key 4 is integrated in card reading module 2, and card reading module 2 is powered and is led to by the USB interface of mobile terminal device 1
Letter, passive 3 information of encrypting module/card can be read by card reading module 2.As shown in Figure 1.
Each component part is described as follows:
Mobile terminal device 1, which can be, to be had such as intelligence with any non-smart mobile phone, tablet computer, wireless handheld terminal
The terminal device of USB interface and wireless communication function, the equipment can run certain specific application, and this application can pass through
USB interface and card reading module 2 are communicated.
Card reading module 2 can be by MCU, DSP or embedded system etc. form it is any can support standard with it is non-standard
USB interface power supply and communication function, and the equipment that can be communicated by the interface and 1 hardware device of mobile terminal device, this sets
It is standby to include the necessary hardware and its corresponding service software that support to communicate with passive encrypting module/card 3.
Passive encrypting module/card 3 can be any dynamic code value encryption chip for supporting wireless telecommunications, the encryption core
Piece can be to be encrypted by any algorithm, and the core can just be carried out by needing the key an of outside to participate in calculating when decrypting
The authentication of piece.
Key 4 can generate initial code as passive encrypting module/card 3 with the number combination of any rule of random length
The foundation that value and card reading module 2 reversely resolve.
Passive encryption chip based on USB interface communication/card realizes that the method for APP authentication is specifically real according to the following steps
It applies:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to
The place to be authenticated;
Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device provides for card reading module
Power supply;
Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really
Readable ard module legitimacy;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes,
Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing
The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module
It receives the code value and obtains the validity of the code value using the reversed resolving of engagement arithmetic progress in conjunction with agreement key later, and then judge
This time whether authentication is effective;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure,
Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just
Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only
Partial function in open APP without authentication.
The second proposed by the present invention passive encryption chip based on wireless near field communication/card realizes the side of APP authentication
Method.Its system is made of mobile terminal device 1, card reading module 2, passive encrypting module/card 3 and key 4.Wherein key 4 is collected
Comprising battery or WIFI, bluetooth can be passed through from external power supply, card reading module 2 in card reading module 2, inside card reading module 2
Equal the short distance wireless communication technologies are attached with mobile terminal device 1, and passive 3 information of encrypting module/card can be by card reading module 2
It reads.As shown in Figure 2.
Each component part is described as follows:
Mobile terminal device 1, which can be, to be had such as intelligence with any non-smart mobile phone, tablet computer, wireless handheld terminal
The terminal device of USB interface and wireless communication function, the equipment can run certain specific application, and this application can pass through
The mode and card reading module 2 of wireless communication establish connection.
Card reading module 2, which can be, any can support such as WIFI, bluetooth by what MCU, DSP or embedded system etc. formed
Equal communication functions, and the equipment that can be communicated by the wireless mode and 1 hardware device of mobile terminal device, which includes must
The hardware and its corresponding service software that can support to communicate with passive encrypting module/card 3 wanted.
Passive encrypting module/card 3 can be any dynamic code value encryption chip for supporting wireless telecommunications, the encryption core
Piece can be to be encrypted by any algorithm, and the core can just be carried out by needing the key an of outside to participate in calculating when decrypting
The authentication of piece.
Key 4 can be with the number combination of any rule of random length, as passive encrypting module/card raw 3 at initial code
The foundation that value and card reading module 2 reversely resolve.
Passive encryption chip based on wireless near field communication/card realizes the method for APP authentication specifically according to the following steps
Implement:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to
The place to be authenticated;
Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply
Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits
Wireless terminal device establishes connection;
Step 3, user start the APP on mobile terminal device, and APP passes through the Near Field Communication such as WIFI, bluetooth mode and card reading
Module establishes efficient communication, can the direct company of foundation if having connected the card reading module before the wireless terminal device
It connects;If it is using for the first time, then need to carry out necessary matching operation just to can establish connection;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes,
Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing
The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module
It receives the code value and obtains the validity of the code value using the reversed resolving of engagement arithmetic progress in conjunction with agreement key later, and then judge
This time whether authentication is effective;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure,
Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just
Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only
Partial function in open APP without authentication.
Claims (2)
- Counterfeit APP weight discriminating method is prevented 1. having, it is characterised in that is followed the steps below:Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device is card reading module power supply;Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really Readable ard module legitimacy;Step 4, APP starting card reading module and the wireless read functions for opening card reading module;Passive encrypting module/card that step 5, at this time user can dispose card reading module before;Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
- 2. another kind, which has, prevents counterfeit APP weight discriminating method, it is characterised in that follow the steps below:Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits Wireless terminal device establishes connection;Step 3, user start the APP on mobile terminal device, and APP is established effective by Near Field Communication mode and card reading module Communication;Step 4, APP starting card reading module and the wireless read functions for opening card reading module;Passive encrypting module/card that step 5, at this time user can dispose card reading module before;Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910335023.0A CN110210187A (en) | 2019-04-24 | 2019-04-24 | Have and prevents counterfeit APP weight discriminating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910335023.0A CN110210187A (en) | 2019-04-24 | 2019-04-24 | Have and prevents counterfeit APP weight discriminating method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110210187A true CN110210187A (en) | 2019-09-06 |
Family
ID=67786253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910335023.0A Pending CN110210187A (en) | 2019-04-24 | 2019-04-24 | Have and prevents counterfeit APP weight discriminating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110210187A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1168137A1 (en) * | 2000-06-23 | 2002-01-02 | IPM-NET S.p.A. | Smart card reader with usb interface for connection to personal computers and the like |
WO2005018146A1 (en) * | 2003-08-19 | 2005-02-24 | Huawei Technologies Co., Ltd. | Apparatus and method of authentication for user of fixed network terminal |
CN101593380A (en) * | 2008-05-28 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of gate control system and authentication method that generates and verify based on dynamic password |
CN104040553A (en) * | 2012-01-03 | 2014-09-10 | 英赛瑟库尔公司 | Method for executing an application in an NFC device |
EP2905715A1 (en) * | 2012-10-17 | 2015-08-12 | ZTE Corporation | Method, system and terminal for encrypting/decrypting application program on communication terminal |
CN104850764A (en) * | 2015-05-22 | 2015-08-19 | 东信和平科技股份有限公司 | Smart card based software protection method and system |
CN105184116A (en) * | 2015-06-19 | 2015-12-23 | 昆山博威泰克电子科技有限公司 | Intelligent equipment software encryption and personal authentication device and method |
CN105554759A (en) * | 2016-02-24 | 2016-05-04 | 中国联合网络通信集团有限公司 | Authentication method and authentication system |
CN105704092A (en) * | 2014-11-25 | 2016-06-22 | 卓望数码技术(深圳)有限公司 | User identity authentication method, device and system |
CN105739907A (en) * | 2014-12-11 | 2016-07-06 | 广州杰赛科技股份有限公司 | Data storage method |
CN106302514A (en) * | 2016-09-06 | 2017-01-04 | 苏州协鑫集成科技工业应用研究院有限公司 | The dynamic encrypting method of memory card and decryption method and device thereof |
CN107358068A (en) * | 2017-07-11 | 2017-11-17 | 安徽声讯信息技术有限公司 | A kind of method that moving chip by mobile phone TF card encrypts handset program |
CN107832589A (en) * | 2017-11-29 | 2018-03-23 | 苏州科达科技股份有限公司 | Software copyright protecting method and its system |
CN108416193A (en) * | 2018-03-14 | 2018-08-17 | 北京车和家信息技术有限公司 | Method for authenticating, device and vehicle |
-
2019
- 2019-04-24 CN CN201910335023.0A patent/CN110210187A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1168137A1 (en) * | 2000-06-23 | 2002-01-02 | IPM-NET S.p.A. | Smart card reader with usb interface for connection to personal computers and the like |
WO2005018146A1 (en) * | 2003-08-19 | 2005-02-24 | Huawei Technologies Co., Ltd. | Apparatus and method of authentication for user of fixed network terminal |
CN101593380A (en) * | 2008-05-28 | 2009-12-02 | 北京飞天诚信科技有限公司 | A kind of gate control system and authentication method that generates and verify based on dynamic password |
CN104040553A (en) * | 2012-01-03 | 2014-09-10 | 英赛瑟库尔公司 | Method for executing an application in an NFC device |
EP2905715A1 (en) * | 2012-10-17 | 2015-08-12 | ZTE Corporation | Method, system and terminal for encrypting/decrypting application program on communication terminal |
CN105704092A (en) * | 2014-11-25 | 2016-06-22 | 卓望数码技术(深圳)有限公司 | User identity authentication method, device and system |
CN105739907A (en) * | 2014-12-11 | 2016-07-06 | 广州杰赛科技股份有限公司 | Data storage method |
CN104850764A (en) * | 2015-05-22 | 2015-08-19 | 东信和平科技股份有限公司 | Smart card based software protection method and system |
CN105184116A (en) * | 2015-06-19 | 2015-12-23 | 昆山博威泰克电子科技有限公司 | Intelligent equipment software encryption and personal authentication device and method |
CN105554759A (en) * | 2016-02-24 | 2016-05-04 | 中国联合网络通信集团有限公司 | Authentication method and authentication system |
CN106302514A (en) * | 2016-09-06 | 2017-01-04 | 苏州协鑫集成科技工业应用研究院有限公司 | The dynamic encrypting method of memory card and decryption method and device thereof |
CN107358068A (en) * | 2017-07-11 | 2017-11-17 | 安徽声讯信息技术有限公司 | A kind of method that moving chip by mobile phone TF card encrypts handset program |
CN107832589A (en) * | 2017-11-29 | 2018-03-23 | 苏州科达科技股份有限公司 | Software copyright protecting method and its system |
CN108416193A (en) * | 2018-03-14 | 2018-08-17 | 北京车和家信息技术有限公司 | Method for authenticating, device and vehicle |
Non-Patent Citations (1)
Title |
---|
侯有利: "校园智能卡应用安全架构设计", 《信息安全与通信保密》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101159551B (en) | Multifunctional information safety equipment and method of use thereof | |
JP5601729B2 (en) | How to log into a mobile radio network | |
CN104636777B (en) | ID card information obtains system | |
CN104768125B (en) | A kind of matching method of Intelligent mobile equipment and bluetooth BLE equipment | |
CN105430603A (en) | Secure connection method and system for Bluetooth equipment | |
CN102521743B (en) | Mobile phone safety payment method and system on basis of wireless channel | |
CN103488920B (en) | A kind of wireless messages safety equipment realize method and system | |
CN106465044B (en) | Method, apparatus and system for wireless power transmission | |
CN102298683A (en) | Authentication device, system and method for short-distance radio-frequency communication authentication | |
CN104063646A (en) | Wireless USB key supporting mobile terminals | |
CN103905191A (en) | Verification method applied to mobile terminal, mobile terminal and system | |
CN105491511A (en) | Bluetooth device matching method, Bluetooth device and Bluetooth device matching system | |
CN103632081A (en) | Encrypted storage device and authentication system and authentication method thereof | |
CN107045743A (en) | Joint NFC and fingerprint technique a kind of public bicycles lock control method | |
WO2017076270A1 (en) | Smart card having function of one time password (otp), and work method therefor | |
CN103957521B (en) | A kind of cell visitor authentication method and system based on NFC technique | |
CN103903044A (en) | Challenge response type dynamic password IC card with information and energy transmitted through radio frequency | |
CN103596175A (en) | Mobile intelligent terminal certification system and method based on near field communication technology | |
CN104540238A (en) | Wireless communication method and device and intelligent card | |
CN201150068Y (en) | Multifunctional information safety equipment | |
US20150269574A1 (en) | Password key, security authentication system and security authentication method | |
JP2006060392A (en) | Unauthorized-use preventive system and identification method for information terminal device | |
CN201577098U (en) | Information security verification equipment | |
CN110210187A (en) | Have and prevents counterfeit APP weight discriminating method | |
CN103854177A (en) | Safe E-bank implementation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200701 Address after: 312-09, Block E, science and Technology Park, Xi'an University of Technology Applicant after: Xi'an Jiemai Intelligent Technology Co.,Ltd. Address before: 710075 Xinkai Industrial Park, Jinye Second Road, Xi'an High-tech Zone, Shaanxi Province Applicant before: XI'AN ZHONGLI TECHNOLOGY Co.,Ltd. Applicant before: XI'AN YINGSHENG ELECTRIC TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190906 |
|
RJ01 | Rejection of invention patent application after publication |