CN110210187A - Have and prevents counterfeit APP weight discriminating method - Google Patents

Have and prevents counterfeit APP weight discriminating method Download PDF

Info

Publication number
CN110210187A
CN110210187A CN201910335023.0A CN201910335023A CN110210187A CN 110210187 A CN110210187 A CN 110210187A CN 201910335023 A CN201910335023 A CN 201910335023A CN 110210187 A CN110210187 A CN 110210187A
Authority
CN
China
Prior art keywords
card reading
reading module
code value
app
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910335023.0A
Other languages
Chinese (zh)
Inventor
刘大文
安琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Yingsheng Electric Technology Co Ltd
Xi'an Zhongli Technology Co Ltd
Original Assignee
Xi'an Yingsheng Electric Technology Co Ltd
Xi'an Zhongli Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Yingsheng Electric Technology Co Ltd, Xi'an Zhongli Technology Co Ltd filed Critical Xi'an Yingsheng Electric Technology Co Ltd
Priority to CN201910335023.0A priority Critical patent/CN110210187A/en
Publication of CN110210187A publication Critical patent/CN110210187A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention belongs to wireless communication technology fields and encryption technology field, and in particular to one kind can increase by one on the mobile terminal device can read the method that wireless and passive encrypting module/card realization authenticates APP.The present invention has further related also to the method for prevent counterfeit authentication using dynamic code value.By using passive encrypting module/card of dynamic code value, effectively avoid static bar code, when two dimensional code is authenticated by counterfeit risk.After user completes primary authentication by this method, next time, the code value of authentication can change automatically, even if having intercepted and captured some code value by certain technologies, be still unable to complete illegal authentication, and then realize and prevent counterfeit function, effectively increase the safety of authentication.

Description

Have and prevents counterfeit APP weight discriminating method
Technical field
The invention belongs to wireless communication technology field and encryption technology fields more particularly to one kind can set in mobile terminal Standby upper increase by one can read the method that wireless and passive encrypting module/card card reading module authenticates APP to realization, The method for having further related to prevent counterfeit authentication using dynamic code value, specially has and prevents counterfeit APP weight discriminating method.
Background technique
With the continuous development of wireless communication technique and internet, the authentication of APP has been carried out using mobile terminal device Through more and more common, bar code, two dimensional code, RFID and the universal of NFC make it possible that mobile terminal authenticates whenever and wherever possible, For the providing a great convenience property of life of user.
At some to the higher occasion of security level required, such as bank, car operation, it is related to information security etc. and uses field Under scape, counterfeit authentication then cannot be effectively avoided using the authentication mode of above-mentioned fix information or fixed ID.
Summary of the invention
The object of the present invention is to provide a kind of methods that the mobile terminal APP suitable for high security level place is authenticated, should Method realizes the authentication of APP by using passive encryption chip/card of dynamic code value, and each authentication code value all changes, Counterfeit function is prevented to realize.
First technical solution of the present invention is a kind of passive encryption chip based on USB interface communication/card realization The method of APP authentication.Its system is made of mobile terminal device, key, card reading module and passive encrypting module/card.It is wherein close Key is integrated in card reading module, and card reading module is powered and is communicated by the USB interface of mobile terminal device, passive encryption Module/card information can be read by card reading module.As shown in Figure 1.
The characteristics of technical solution, is:
Passive encrypting module/card generates initial code value by the key arranged in advance and the algorithm of agreement, can dispose stand-by.
It has been integrated with to have to pass through to authenticate in mobile terminal device and whole or certain functions just can be used normally APP, authentication not in the case where, only can be used without authentication partial function.When APP and card reading module foundation have After effect communication, then the authentication discriminant information for waiting card reading module to upload, and decide whether to open corresponding function according to discriminant information Energy.
Card reading module is powered by the USB interface of wireless terminal device, inside contain in above-mentioned passive chip/card The reversed computation of same key and agreement, for resolve to the passive encrypting module/card information read and right Whether authentication is by making decisions.
First technical solution of the invention follows the steps below work:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device provides for card reading module Power supply;
Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really Readable ard module legitimacy;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
Second technical solution of the present invention is a kind of passive encryption chip/card based on wireless near field communication The method for realizing APP authentication.Its system is made of mobile terminal device, key, card reading module and passive encrypting module/card.Its Middle key is integrated in card reading module, and card reading module inside is comprising battery or can pass through from external power supply, card reading module The short distance wireless communication technologies such as WIFI, bluetooth and card reading module are attached, and passive encrypting module/card information can be by card reading mould Block is read.As shown in Figure 2.
The characteristics of technical solution, is:
Passive encrypting module/card generates initial code value by the key arranged in advance and the algorithm of agreement, can dispose stand-by.
It has been integrated with to have to pass through to authenticate in mobile terminal device and whole or certain functions just can be used normally APP, authentication not in the case where, only can be used without authentication partial function.When APP and card reading module foundation have After effect communication, then the authentication discriminant information for waiting card reading module to upload, and decide whether to open corresponding function according to discriminant information Energy.
With battery or external equipment can be supported to power inside card reading module, inside further comprise and wireless device is whole End carries out the wireless communication modules such as WIFI, bluetooth of short-range communication, and with key same in above-mentioned passive chip/card with The reversed computation of agreement, for resolve to the passive encrypting module/card information read and whether pass through to authentication It makes decisions.
Second technical solution of the invention follows the steps below work:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits Wireless terminal device establishes connection;
Step 3, user start the APP on mobile terminal device, and APP passes through the Near Field Communication such as WIFI, bluetooth mode and card reading Module establishes efficient communication, can the direct company of foundation if having connected the card reading module before the wireless terminal device It connects;If it is using for the first time, then need to carry out necessary matching operation just to can establish connection;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
The invention has the advantages that effectively avoiding static state by using passive encrypting module/card of dynamic code value By counterfeit risk when bar code, two dimensional code are authenticated.After user completes primary authentication by this method, next time is authenticated Code value can change automatically, even if having intercepted and captured some code value by certain technologies, be still unable to complete illegal authentication, and then realize Prevent counterfeit function, effectively increases the safety of authentication.
Detailed description of the invention
Fig. 1 is the first technical solution system structure diagram of the invention.
Fig. 2 is the second technical solution system structure diagram of the invention.
Fig. 3 is the first technical solution work-based logic procedure chart of the invention.
Fig. 4 is the second technical solution work-based logic procedure chart of the invention.
In figure: the passive encrypting module/card of 1- mobile terminal device, 2- card reading module, 3-, 4- key.
Specific embodiment
The following describes the present invention in detail with reference to the accompanying drawings and specific embodiments.
Currently, very extensive use has been obtained in APP authentication, static bar code or two dimensional code are used in most occasions It can complete to authenticate, but the safety of the authentication mode is unable to satisfy some such as banks, car operation, is related to information security Equal specific occasions.Once it is counterfeit authentication information occur, it will cause consequences very serious.
To solve the above-mentioned problems, the first the passive encryption chip based on USB interface communication/card proposed by the present invention is real The method of existing APP authentication.Its system is made of mobile terminal device 1, card reading module 2, passive encrypting module/card 3 and key 4. Wherein key 4 is integrated in card reading module 2, and card reading module 2 is powered and is led to by the USB interface of mobile terminal device 1 Letter, passive 3 information of encrypting module/card can be read by card reading module 2.As shown in Figure 1.
Each component part is described as follows:
Mobile terminal device 1, which can be, to be had such as intelligence with any non-smart mobile phone, tablet computer, wireless handheld terminal The terminal device of USB interface and wireless communication function, the equipment can run certain specific application, and this application can pass through USB interface and card reading module 2 are communicated.
Card reading module 2 can be by MCU, DSP or embedded system etc. form it is any can support standard with it is non-standard USB interface power supply and communication function, and the equipment that can be communicated by the interface and 1 hardware device of mobile terminal device, this sets It is standby to include the necessary hardware and its corresponding service software that support to communicate with passive encrypting module/card 3.
Passive encrypting module/card 3 can be any dynamic code value encryption chip for supporting wireless telecommunications, the encryption core Piece can be to be encrypted by any algorithm, and the core can just be carried out by needing the key an of outside to participate in calculating when decrypting The authentication of piece.
Key 4 can generate initial code as passive encrypting module/card 3 with the number combination of any rule of random length The foundation that value and card reading module 2 reversely resolve.
Passive encryption chip based on USB interface communication/card realizes that the method for APP authentication is specifically real according to the following steps It applies:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device provides for card reading module Power supply;
Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really Readable ard module legitimacy;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module It receives the code value and obtains the validity of the code value using the reversed resolving of engagement arithmetic progress in conjunction with agreement key later, and then judge This time whether authentication is effective;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
The second proposed by the present invention passive encryption chip based on wireless near field communication/card realizes the side of APP authentication Method.Its system is made of mobile terminal device 1, card reading module 2, passive encrypting module/card 3 and key 4.Wherein key 4 is collected Comprising battery or WIFI, bluetooth can be passed through from external power supply, card reading module 2 in card reading module 2, inside card reading module 2 Equal the short distance wireless communication technologies are attached with mobile terminal device 1, and passive 3 information of encrypting module/card can be by card reading module 2 It reads.As shown in Figure 2.
Each component part is described as follows:
Mobile terminal device 1, which can be, to be had such as intelligence with any non-smart mobile phone, tablet computer, wireless handheld terminal The terminal device of USB interface and wireless communication function, the equipment can run certain specific application, and this application can pass through The mode and card reading module 2 of wireless communication establish connection.
Card reading module 2, which can be, any can support such as WIFI, bluetooth by what MCU, DSP or embedded system etc. formed Equal communication functions, and the equipment that can be communicated by the wireless mode and 1 hardware device of mobile terminal device, which includes must The hardware and its corresponding service software that can support to communicate with passive encrypting module/card 3 wanted.
Passive encrypting module/card 3 can be any dynamic code value encryption chip for supporting wireless telecommunications, the encryption core Piece can be to be encrypted by any algorithm, and the core can just be carried out by needing the key an of outside to participate in calculating when decrypting The authentication of piece.
Key 4 can be with the number combination of any rule of random length, as passive encrypting module/card raw 3 at initial code The foundation that value and card reading module 2 reversely resolve.
Passive encryption chip based on wireless near field communication/card realizes the method for APP authentication specifically according to the following steps Implement:
Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits Wireless terminal device establishes connection;
Step 3, user start the APP on mobile terminal device, and APP passes through the Near Field Communication such as WIFI, bluetooth mode and card reading Module establishes efficient communication, can the direct company of foundation if having connected the card reading module before the wireless terminal device It connects;If it is using for the first time, then need to carry out necessary matching operation just to can establish connection;
Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module It receives the code value and obtains the validity of the code value using the reversed resolving of engagement arithmetic progress in conjunction with agreement key later, and then judge This time whether authentication is effective;
If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.

Claims (2)

  1. Counterfeit APP weight discriminating method is prevented 1. having, it is characterised in that is followed the steps below:
    Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
    Card reading module is connected to mobile terminal device by USB by step 2, user, and mobile terminal device is card reading module power supply;
    Step 3, user start the APP on mobile terminal device, and APP establishes efficient communication by USB interface and card reading module, really Readable ard module legitimacy;
    Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
    Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
    Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;
    If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
    Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
    Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
  2. 2. another kind, which has, prevents counterfeit APP weight discriminating method, it is characterised in that follow the steps below:
    Passive encrypting module/card is generated initial code value according to the key of agreement and the algorithm of agreement by step 1, and being deployed in need to The place to be authenticated;
    Step 2 opens card reading module, is directly switched on if including battery inside card reading module, if it is external power supply Keep card reading module in the open state after then connecting power supply, the card reading module after unlatching is in mode to be matched, waits Wireless terminal device establishes connection;
    Step 3, user start the APP on mobile terminal device, and APP is established effective by Near Field Communication mode and card reading module Communication;
    Step 4, APP starting card reading module and the wireless read functions for opening card reading module;
    Passive encrypting module/card that step 5, at this time user can dispose card reading module before;
    Step 6, passive encrypting module/card obtain energy by the wireless signal issued to card reading module and start internal processes, Internal initial code value is read, and combines agreement key, initial code value peace treaty to determine algorithm and generates a new code value, then passes through nothing The code value is sent to card reading module by line mode, while this code value being saved to the initial code value calculated as next time, card reading module Receive and carry out reversed resolve in conjunction with agreement key after the code value and obtain the validity of the code value, so judge this time authentication whether Effectively;
    If step 7 reversely resolves obtaining the result is that passing through, step 8 is continued to execute;If it is obtaining the result is that failure, Then follow the steps 9;
    Step 8, card reading module, which upload to authenticate after successful information receives the information to APP, APP, opens the function that need to be authenticated, just Often execute;
    Prompt subscription authentication fails after the information that step 9, card reading module upload failed authentication receives the information to APP, APP, only Partial function in open APP without authentication.
CN201910335023.0A 2019-04-24 2019-04-24 Have and prevents counterfeit APP weight discriminating method Pending CN110210187A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910335023.0A CN110210187A (en) 2019-04-24 2019-04-24 Have and prevents counterfeit APP weight discriminating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910335023.0A CN110210187A (en) 2019-04-24 2019-04-24 Have and prevents counterfeit APP weight discriminating method

Publications (1)

Publication Number Publication Date
CN110210187A true CN110210187A (en) 2019-09-06

Family

ID=67786253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910335023.0A Pending CN110210187A (en) 2019-04-24 2019-04-24 Have and prevents counterfeit APP weight discriminating method

Country Status (1)

Country Link
CN (1) CN110210187A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1168137A1 (en) * 2000-06-23 2002-01-02 IPM-NET S.p.A. Smart card reader with usb interface for connection to personal computers and the like
WO2005018146A1 (en) * 2003-08-19 2005-02-24 Huawei Technologies Co., Ltd. Apparatus and method of authentication for user of fixed network terminal
CN101593380A (en) * 2008-05-28 2009-12-02 北京飞天诚信科技有限公司 A kind of gate control system and authentication method that generates and verify based on dynamic password
CN104040553A (en) * 2012-01-03 2014-09-10 英赛瑟库尔公司 Method for executing an application in an NFC device
EP2905715A1 (en) * 2012-10-17 2015-08-12 ZTE Corporation Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104850764A (en) * 2015-05-22 2015-08-19 东信和平科技股份有限公司 Smart card based software protection method and system
CN105184116A (en) * 2015-06-19 2015-12-23 昆山博威泰克电子科技有限公司 Intelligent equipment software encryption and personal authentication device and method
CN105554759A (en) * 2016-02-24 2016-05-04 中国联合网络通信集团有限公司 Authentication method and authentication system
CN105704092A (en) * 2014-11-25 2016-06-22 卓望数码技术(深圳)有限公司 User identity authentication method, device and system
CN105739907A (en) * 2014-12-11 2016-07-06 广州杰赛科技股份有限公司 Data storage method
CN106302514A (en) * 2016-09-06 2017-01-04 苏州协鑫集成科技工业应用研究院有限公司 The dynamic encrypting method of memory card and decryption method and device thereof
CN107358068A (en) * 2017-07-11 2017-11-17 安徽声讯信息技术有限公司 A kind of method that moving chip by mobile phone TF card encrypts handset program
CN107832589A (en) * 2017-11-29 2018-03-23 苏州科达科技股份有限公司 Software copyright protecting method and its system
CN108416193A (en) * 2018-03-14 2018-08-17 北京车和家信息技术有限公司 Method for authenticating, device and vehicle

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1168137A1 (en) * 2000-06-23 2002-01-02 IPM-NET S.p.A. Smart card reader with usb interface for connection to personal computers and the like
WO2005018146A1 (en) * 2003-08-19 2005-02-24 Huawei Technologies Co., Ltd. Apparatus and method of authentication for user of fixed network terminal
CN101593380A (en) * 2008-05-28 2009-12-02 北京飞天诚信科技有限公司 A kind of gate control system and authentication method that generates and verify based on dynamic password
CN104040553A (en) * 2012-01-03 2014-09-10 英赛瑟库尔公司 Method for executing an application in an NFC device
EP2905715A1 (en) * 2012-10-17 2015-08-12 ZTE Corporation Method, system and terminal for encrypting/decrypting application program on communication terminal
CN105704092A (en) * 2014-11-25 2016-06-22 卓望数码技术(深圳)有限公司 User identity authentication method, device and system
CN105739907A (en) * 2014-12-11 2016-07-06 广州杰赛科技股份有限公司 Data storage method
CN104850764A (en) * 2015-05-22 2015-08-19 东信和平科技股份有限公司 Smart card based software protection method and system
CN105184116A (en) * 2015-06-19 2015-12-23 昆山博威泰克电子科技有限公司 Intelligent equipment software encryption and personal authentication device and method
CN105554759A (en) * 2016-02-24 2016-05-04 中国联合网络通信集团有限公司 Authentication method and authentication system
CN106302514A (en) * 2016-09-06 2017-01-04 苏州协鑫集成科技工业应用研究院有限公司 The dynamic encrypting method of memory card and decryption method and device thereof
CN107358068A (en) * 2017-07-11 2017-11-17 安徽声讯信息技术有限公司 A kind of method that moving chip by mobile phone TF card encrypts handset program
CN107832589A (en) * 2017-11-29 2018-03-23 苏州科达科技股份有限公司 Software copyright protecting method and its system
CN108416193A (en) * 2018-03-14 2018-08-17 北京车和家信息技术有限公司 Method for authenticating, device and vehicle

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
侯有利: "校园智能卡应用安全架构设计", 《信息安全与通信保密》 *

Similar Documents

Publication Publication Date Title
CN101159551B (en) Multifunctional information safety equipment and method of use thereof
JP5601729B2 (en) How to log into a mobile radio network
CN104636777B (en) ID card information obtains system
CN104768125B (en) A kind of matching method of Intelligent mobile equipment and bluetooth BLE equipment
CN105430603A (en) Secure connection method and system for Bluetooth equipment
CN102521743B (en) Mobile phone safety payment method and system on basis of wireless channel
CN103488920B (en) A kind of wireless messages safety equipment realize method and system
CN106465044B (en) Method, apparatus and system for wireless power transmission
CN102298683A (en) Authentication device, system and method for short-distance radio-frequency communication authentication
CN104063646A (en) Wireless USB key supporting mobile terminals
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN105491511A (en) Bluetooth device matching method, Bluetooth device and Bluetooth device matching system
CN103632081A (en) Encrypted storage device and authentication system and authentication method thereof
CN107045743A (en) Joint NFC and fingerprint technique a kind of public bicycles lock control method
WO2017076270A1 (en) Smart card having function of one time password (otp), and work method therefor
CN103957521B (en) A kind of cell visitor authentication method and system based on NFC technique
CN103903044A (en) Challenge response type dynamic password IC card with information and energy transmitted through radio frequency
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN104540238A (en) Wireless communication method and device and intelligent card
CN201150068Y (en) Multifunctional information safety equipment
US20150269574A1 (en) Password key, security authentication system and security authentication method
JP2006060392A (en) Unauthorized-use preventive system and identification method for information terminal device
CN201577098U (en) Information security verification equipment
CN110210187A (en) Have and prevents counterfeit APP weight discriminating method
CN103854177A (en) Safe E-bank implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200701

Address after: 312-09, Block E, science and Technology Park, Xi'an University of Technology

Applicant after: Xi'an Jiemai Intelligent Technology Co.,Ltd.

Address before: 710075 Xinkai Industrial Park, Jinye Second Road, Xi'an High-tech Zone, Shaanxi Province

Applicant before: XI'AN ZHONGLI TECHNOLOGY Co.,Ltd.

Applicant before: XI'AN YINGSHENG ELECTRIC TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20190906

RJ01 Rejection of invention patent application after publication