CN1734486A - Identity recognition method for online payment - Google Patents

Identity recognition method for online payment Download PDF

Info

Publication number
CN1734486A
CN1734486A CNA2004100581824A CN200410058182A CN1734486A CN 1734486 A CN1734486 A CN 1734486A CN A2004100581824 A CNA2004100581824 A CN A2004100581824A CN 200410058182 A CN200410058182 A CN 200410058182A CN 1734486 A CN1734486 A CN 1734486A
Authority
CN
China
Prior art keywords
user
mobile phone
signed data
online payment
payment system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004100581824A
Other languages
Chinese (zh)
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tendyron Technology Co Ltd
Original Assignee
李东声
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 李东声 filed Critical 李东声
Priority to CNA2004100581824A priority Critical patent/CN1734486A/en
Publication of CN1734486A publication Critical patent/CN1734486A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an identity recognition method of on-line payment, which comprises the following steps: A. The on-line payment system sends trading data to registration handset of the consumer; B. The handset calculates the signature date of business by checking the available information and present data after the consumer receives the recognition data; C. The handset sends the signature data to the on-line payment system after calculation; D. the on-line payment system recognizes the CA identification.

Description

A kind of personal identification method of online payment
Technical field
The present invention relates to the safety technique of online payment, particularly a kind of personal identification method of online payment.
Background technology
Along with developing rapidly of internet, shopping online, network trade transaction are more and more universal, and these web trades all are online payment usually.When carrying out online payment, general buyer user all be by online payment system with the funds transfer on the own account to the seller's account.
Consideration based on safety, before user's funds transfer, online payment system generally all can require the user to provide an identity validation information to this transaction, and this identity validation information is that the user has alone, is used for data with allocation of the funds approval are confirmed in this transaction.Its purpose is exactly that the account funds that prevents undelegated malice is transferred, and guarantees user's fund security.
When the principal amount that relates to when online payment is less, during such as user's download ringing sound of cell phone, picture of mobile telephone etc., generally be to realize the identification of online payment system to user identity by a cell phone password that bundles with mobile phone.Because the number of this password and mobile phone all will pass through the Internet-delivered when paying on the net, so its security is not fine, can only make in this way under some specific situation.
When the principal amount that relates to when online payment may be bigger, during such as shopping online etc., mainly contain the method for two kinds of identifications at present:
First method:
When the user opens a certain service that needs online payment, online payment system requires the client software of user by the online payment system on the computing machine that uses, download a specific identity identifying and authenticating key, perhaps online payment system service side offers the carrier of an identification key of user, such as a CF card, an IC-card or a password envelope etc.The user is when carrying out online payment, the client software of the online payment system on the subscriber computer uses this key or obtains this key from carrier, according to asymmetric key algorithm, the user who calculates current transaction confirms signing messages, send to the Web on the payment system main frame, (certificateauthority CA) authenticates main frame by signing messages being sent to authentication center, after confirming that signature effectively, carry out corresponding account's operation.
This method requires the user to keep oneself authentication key and carrier thereof, because this identification key is the unique identification instrument of each user in paying on the net, and put on record in the payment system on the net.
If this authentication key leaves on this computing machine, thus own exclusive computing machine preferably used, otherwise when others uses this computing machine, just may usurp this key, cause user's loss.When the user has changed computing machine and has carried out online payment again, on the new computing machine that the identification key of oneself will be copied, download this key from network again, when this computing machine is not user's private (such as a computing machine that is the Internet bar), after the closing the transaction, the user must remember this key deletion, otherwise may cause the fund loss.
If this key leaves on the carrier, the user will protect this carrier, at will not allow other people touch; and generally can need the hardware and the driver thereof of being correlated with when using carrier; when having changed computing machine, need reinstall hardware and driver thereof, can be cumbersome.
Therefore, when making in this way, user's vigilance must be high, no matter is own computing machine when also being to use common computer, when networking, notes viral and hacker's attack, and will protect the identification key of oneself.
Second method:
When the user opens the service that needs online payment, the service side of online payment system offers a computer identity identification of user key module, this module not only can safe storage identification key, and can use this key, carry out the encryption and decryption computing according to specific asymmetric arithmetic, that commonly used is USBKEY now.
The user is when carrying out online payment, the USBKEY of oneself is inserted on the computing machine corresponding interface, the online payment client-side program and the USBKEY of computing machine carry out communication, the transaction authentication data are sent to USBKEY, calculate the signed data of trade confirmation by USBKEY, send to the online payment system main frame, after the authentication of CA center, carry out corresponding account's operation.
Therefore make in this way, the user will keep USBKEY and the corresponding driving program thereof of oneself separately, when changing computing machine, generally all needs to reinstall the corresponding driving program, and need download the client software of online payment system again.And the cost of each USBKEY is not low, very calculates for the less relatively user of trading volume.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide a kind of personal identification method of online payment, so that user security carries out online payment easily.
For achieving the above object, technical scheme of the present invention specifically is achieved in that
A kind of personal identification method of online payment, this method is registered online payment when service the user, registered user's mobile phone, and deposit the identity identification information that the user is used for online payment in user mobile phone; Identification procedure during online payment may further comprise the steps:
A, online payment system send the verify data that exchange needs to the mobile phone of user's registration;
After B, user mobile phone are received described verify data, use identity identification information and this verify data of preserving to calculate, calculate the signed data of transaction;
C, the signed data that mobile phone is calculated send to online payment system;
D, online payment system are carried out ca authentication to signed data.
Wherein, the method for described registered user's mobile phone can be the phone number of online payment system recording user, user's bank account, and distributes the customer ID of an online payment to the user.
Described steps A can send the verify data that exchange needs by SMS to the mobile phone of user's registration for: online payment system.
Described with identity identification information deposit in user mobile phone method can for: online payment system downloads to identity identification information in the mobile phone, or identity identification information is written in the SIM card of user mobile phone.
Described identity identification information can comprise: identification key and signed data algorithm.
Described identification key deposit in mobile phone method can for: it is right that the CA center of online payment system generates all registered users' identification key, CA preserves at the center PKI of all cipher key pair, and online payment system deposits registered user's private key in user mobile phone as the identification key.
Described with identity identification information deposit in user mobile phone method can for: online payment system downloads to identification key and signed data algorithm in the mobile phone; Or identification key and signed data algorithm be written in the SIM card of mobile phone; Or the signed data algorithm downloaded in the mobile phone, the identification key is written in the SIM card of mobile phone.
The method of the described compute signature data of step B can for: with signed data algorithm and identification key verify data is carried out computations, the encrypted result that obtains is a signed data.
Described signed data algorithm can be RSA cryptographic algorithms.
The verify data that described exchange needs can comprise: the time on date of the amount of money of transaction and transaction.
Described step C can for: mobile phone sends to online payment system by note with the signed data that calculates.
Described step C also can for: mobile phone shows signed data, and the user sends to web page server by Internet-enabled cell phone or online computer with the signed data that calculates, and web page server sends to online payment system with signed data.
Described step D can for: the main frame of online payment system sends to the CA center with the signed data of receiving with verify data and carries out ca authentication according to user's registration information.
Described step C can also for: mobile phone sends to online payment system by a part of signed data that note will calculate, and signed data another part shown, the user sends to web page server by Internet-enabled cell phone or online computer with another part signed data that calculates, and web page server sends to online payment system with signed data.
Described step D can for: the main frame of online payment system according to user's registration information, two parts signed data of receiving is merged the back sends to the CA center with verify data and carry out ca authentication.
Described step D is specifically as follows: the main frame of online payment system sends to CA center with the signed data of receiving with verify data according to user's registration information;
The CA center is carried out close to signed data with this user's PKI, judge whether the close verify data that goes out is consistent with the verify data that sends to user mobile phone, if unanimity then authenticate is passed through, this user is legal; Otherwise this user is illegal.
This method may further include: when user's identification secret key and private key need upgrade, it is right that the CA center generates new public, private key, behind the public key encryption that new private key use is original, uses note to send to user's mobile phone by network payment system.User's mobile phone after using original private key close is preserved new private key, as the identification secret key and private key.
This method can further include: when the signed data algorithm in the user mobile phone need upgrade, the main frame of network payment system sends to mobile phone with new signed data algorithm routine by short message mode, and mobile phone upgrades this part code of signed data algorithm according to function.
In addition, this method can further include: the pressure coding module is set in mobile phone, the pressure coding module is set in the payment system on the net;
After mobile phone calculates signed data, with pressing coding module that signed data is pressed;
Signed data after pressing is sent to online payment system;
Online payment system is pressed with the pressure coding module earlier after receiving signed data after the pressure, carries out ca authentication again.
This method also can be provided with the pressure coding module in mobile phone, the pressure coding module is set in online computer;
After mobile phone calculates signed data, with pressing coding module that signed data is pressed;
With the signed data input online computer after pressing, online computer sends to online payment system with after pressing coding module that signed data is pressed with signed data.
As seen from the above technical solutions, the personal identification method of this online payment of the present invention utilizes mobile phone storage identity identification information; User mobile phone uses identity identification information and this verify data of preserving to calculate after receiving the verify data that online payment system sends, and calculates the signed data of transaction; The signed data that mobile phone is calculated sends to online payment system; Online payment system is carried out ca authentication to signed data.This make identification only and user mobile phone be closely connected, online computer there is not any requirement, do not need to download special-purpose client software, more do not need to use special-purpose additional module, so the inventive method not only reduces the cost of online payment, also do not increased the risk that the user carries out online payment, simple and convenient, be easy to realize that versatility and practicality are all very strong, are convenient to popularize.
Description of drawings
Fig. 1 is the schematic flow sheet of a preferred embodiment of application personal identification method of the present invention.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, below with reference to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
The personal identification method of this online payment of the present invention combines original mobile phone and online payment function.Utilize mobile phone storage identity identification information; User mobile phone uses identity identification information and this verify data of preserving to calculate after receiving the verify data that online payment system sends, and calculates the signed data of transaction; The signed data that mobile phone is calculated sends to online payment system; Online payment system is carried out ca authentication to signed data.
Key of the present invention is, utilizes mobile phone storage identity identification information, by mobile phone verify data is calculated.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a preferred embodiment of application personal identification method of the present invention.Present embodiment is the online payment that the user is undertaken by online computer, and it may further comprise the steps:
Step 101, CA center generate the identification public affairs, private key is right, and preserve the PKI of all cipher key pair.Private key downloads in each user's the mobile phone preparing.
Utilizing public affairs, private key is the encipher-decipher method of using always to the method for carrying out encrypting and decrypting.After PKI is encrypted data, can use private key to be decrypted, otherwise, after the use private key is encrypted data, also can be decrypted with PKI.But the algorithm of encryption and decryption is different, that is to say the result who uses public-key data are encrypted, and is different with the result who uses private key that data are encrypted.So just guaranteed the non repudiation of encryption side to enciphered data.
Step 102, the user is when the registration online payment, the registered user's of online payment service provider phone number, user's bank account are also given the customer ID of an online payment of user, register mobile phone in the payment system on the net, and to online payment system main frame application identification secret key and private key.
Step 103, the online payment system main frame obtains identification secret key and private key and cryptographic algorithm from the CA center, this cryptographic algorithm is exactly the signed data algorithm that is used to generate signed data, is RSA cryptographic algorithms in the present embodiment, also can be other asymmetric key algorithms commonly used.
Step 104, the online payment system main frame downloads to user mobile phone with identification secret key and private key and cryptographic algorithm.
After carrying out step 101~103, just stored in the user mobile phone and be used for the identity identification information that comprises identification key and signed data algorithm of online payment.
In fact, also identification key and signed data algorithm all can be write in the SIM card of user mobile phone, also can only the identification key be write in the SIM card of user mobile phone.Rewrite SIM card and can realize in the prior art, just be in safe consideration, generally have only the operator of radio communication that it is made amendment.
The user carries out shopping online, when carrying out online payment, continues execution in step 105.
Step 105, the user confirms the amount of money and the date and time of transaction of transaction and inserts the customer ID of oneself on the webpage of online computer.
Step 106, online computer send to above-mentioned information by the server at webpage place the main frame of online payment system.
Step 107, main frame is found user's phone number according to customer ID, time on date of customer ID, dealing money and the transaction of this transaction is sent to user's mobile phone by a special short message as verify data.
Step 108~109, after user's mobile phone receives this note, automatically use user's identification key, use RSA cryptographic algorithms, the time on date of customer ID, dealing money and transaction is encrypted, with encrypted result just the first eight byte of signed data be presented on the mobile phone screen, and the data of signed data back are sent it back main frame by note.
Step 110, the user is the first eight byte of the signed data of handset displays, the input online computer, the server by the webpage place sends to the online payment system main frame with the first eight byte of signed data.
Step 111, the online payment system main frame merges the first eight byte of signed data and the part signed data that receives by note, will comprise user's customer ID, dealing money, the verify data of trade date time then and merge the signed data of concluding the business the back to send to the CA center.
Step 112, the CA center retrieves user's identification key PKI according to user's customer ID, the signature that to conclude the business with PKI is decrypted, the result of contrast deciphering be used for ciphered data: whether user's customer ID, dealing money, exchange hour consistent, draw authentication result, if it is unanimity then the user is legal, otherwise illegal.
Step 113, the CA center sends to the online payment system main frame with authentication result.
Step 114, online payment system main frame are judged authentication result, if the authentication result user is legal, then signature is correct, according to user's customer ID, finds user's bank account, and the corresponding amount of money is transferred on the beneficiary account.And the result sent to web page server simultaneously, and be shown to the user by online computer, send on user's the mobile phone by SMS simultaneously, finish this online payment transaction.
In the present embodiment,, signed data has been divided into two parts has sent to the online payment system main frame respectively in order to improve the security of signed data.In the practical application, whole signed datas can be imported by online computer, be sent to the online payment system main frame by web page server; Also whole signed datas all can be sent to the online payment system main frame by mobile phone by note.
In addition, verify data is encrypted the signed data that the back generates, generally include a plurality of bytes, each byte is made up of two sexadecimal numbers (each number is made up of 4bit), need the numeral of 16 0-F so show the data of eight bytes in the present embodiment, directly input this to write numeral relatively loaded down with trivial details, and also more than sometimes these 8 bytes of signed data.
At above-mentioned situation, user's input for convenience, present embodiment also is provided with the compressed encoding module in mobile phone, the decompression coding module is set in the payment system on the net.After mobile phone calculates signed data, signed data is compressed with the compressed encoding module; Signed data after the compression is shown to the user, and the signed data after will compressing sends to online payment system.Online payment system decompresses with the decompression coding module earlier after receiving signed data after the compression, carries out ca authentication again.
Certainly, also can directly the decompression coding module be arranged in the online computer.After mobile phone calculates signed data, signed data is compressed with the compressed encoding module.With the input of the signed data after compression online computer, online computer sends to online payment system with signed data after with the decompression coding module signed data being decompressed.
Whom like this, no matter decompress, when the user imports online computer with signed data, only need just passable, convenient for users with the signed data after the compression by.
Compressed encoding is conciliate the algorithm that compressed encoding has a lot of maturations, and the present invention is suitable for.Here only provide a kind of simple coding method: for example use 0-9, a-z, A-Z, + ,=, 6 bit can be represented in these 64 characters, 0 represents 000000H, and a represents 001010H, and A represents 100100H, analogize in proper order, three original like this bytes (6 numerals) can use 4 characters to replace, such as 87H65H43H (10000111,01100101,01000011) just can use xS13 (100001,110110,010101,000011).During decompression, realize getting final product according to above-mentioned rule.
Present embodiment is the online payment that the user is undertaken by online computer.In fact, mobile phone itself just can be surfed the Net, if adopt mobile phone online itself to realize, the foregoing description can be imported by mobile phone itself by the information that the online computer input sends to web page server so, other implementation procedures are same as the previously described embodiments, repeat no more here.
From above-mentioned process as seen, identification secret key and private key in the mobile phone and cryptographic algorithm can realize that identification secret key and private key and cryptographic algorithm can be upgraded by the mode of downloading or write SIM card.
When user's identification secret key and private key need upgrade, it is right that the CA center generates new public, private key, behind the public key encryption that new private key use is original, uses note to send to user's mobile phone by the network payment system main frame.User's mobile phone after using original private key deciphering is preserved new private key, as the identification secret key and private key.
When the cryptographic algorithm in the user mobile phone need be upgraded, the main frame of network payment system sends to mobile phone with new cryptographic algorithm program by short message mode, mobile phone upgrades this part code of cryptographic algorithm according to function, thereby realizes the upgrading and the replacing of cryptographic algorithm.
By the above embodiments as seen, the inventive method mainly has following several advantage:
1, system changes not quite, is easy to realize: just utilize the mobile phone existing resource to increase a new function in mobile phone, from strength to strength the time, advantage is particularly outstanding, and very little to the main frame change of existing online payment system at cell-phone function now.
2, highly versatile: be applicable to nearly all field of identity authentication on this methodological principle, especially have superiority in the financial field.
3, practical, be convenient to popularize:, just can realize online payment as long as use mobile phone.
4, cost is low: do not need other independent hardware products, do not need the client-side program of online payment, saved the man power and material of a large amount of support maintenances.
In a word, use the inventive method, not only reduced the cost of online payment, also do not increase the risk that the user carries out online payment, simple and convenient, be convenient to popularize.

Claims (20)

1, a kind of personal identification method of online payment is characterized in that, this method is registered online payment when service the user, registered user's mobile phone, and deposit the identity identification information that the user is used for online payment in user mobile phone; Identification procedure during online payment may further comprise the steps:
A, online payment system send the verify data that exchange needs to the mobile phone of user's registration;
After B, user mobile phone are received described verify data, use identity identification information and this verify data of preserving to calculate, calculate the signed data of transaction;
C, the signed data that mobile phone is calculated send to online payment system;
D, online payment system are carried out ca authentication to signed data.
2, the method for claim 1 is characterized in that, the method for described registered user's mobile phone is: the phone number of online payment system recording user, user's bank account, and distribute the customer ID of an online payment to the user.
3, the method for claim 1 is characterized in that, described steps A is: online payment system sends the verify data that exchange needs by SMS to the mobile phone of user's registration.
4, the method for claim 1 is characterized in that, the described method that deposits identity identification information in user mobile phone is: online payment system downloads to identity identification information in the mobile phone, or identity identification information is written in the SIM card of user mobile phone.
5, the method for claim 1 is characterized in that, described identity identification information comprises: identification key and signed data algorithm.
6, method as claimed in claim 5, it is characterized in that, the method that described identification key deposits mobile phone in is: it is right that the CA center of online payment system generates all registered users' identification key, CA preserves at the center PKI of all cipher key pair, and online payment system deposits registered user's private key in user mobile phone as the identification key.
As claim 5 or 6 described methods, it is characterized in that 7, the described method that deposits identity identification information in user mobile phone is: online payment system downloads to identification key and signed data algorithm in the mobile phone; Or identification key and signed data algorithm be written in the SIM card of mobile phone; Or the signed data algorithm downloaded in the mobile phone, the identification key is written in the SIM card of mobile phone.
8, method as claimed in claim 6 is characterized in that, the method for the described compute signature data of step B is: with signed data algorithm and identification key verify data is carried out computations, the encrypted result that obtains is a signed data.
9, method as claimed in claim 8 is characterized in that: described signed data algorithm is a RSA cryptographic algorithms.
As claim 1,3 or 8 described methods, it is characterized in that 10, the verify data that described exchange needs comprises: the time on date of the amount of money of transaction and transaction.
11, the method for claim 1 is characterized in that, described step C is: mobile phone sends to online payment system by note with the signed data that calculates.
12, the method for claim 1, it is characterized in that, described step C is: mobile phone shows signed data, and the user sends to web page server by Internet-enabled cell phone or online computer with the signed data that calculates, and web page server sends to online payment system with signed data.
13, method as claimed in claim 12 is characterized in that, described step D is: the main frame of online payment system sends to the CA center with the signed data of receiving with verify data and carries out ca authentication according to user's registration information.
14, the method for claim 1, it is characterized in that, described step C is: mobile phone sends to online payment system by a part of signed data that note will calculate, and signed data another part shown, the user sends to web page server by Internet-enabled cell phone or online computer with another part signed data that calculates, and web page server sends to online payment system with signed data.
15, method as claimed in claim 14 is characterized in that, described step D is: the main frame of online payment system sends to the CA center with two parts signed data merging back of receiving with verify data and carries out ca authentication according to user's registration information.
16, method as claimed in claim 8 is characterized in that, described step D is: the main frame of online payment system sends to CA center with the signed data of receiving with verify data according to user's registration information;
The CA center is decrypted signed data with this user's PKI, judges whether the verify data decrypt is consistent with the verify data that sends to user mobile phone, if unanimity then authenticate is passed through, this user is legal; Otherwise this user is illegal.
17, method as claimed in claim 8, it is characterized in that, this method further comprises: when user's identification secret key and private key need upgrade, it is right that the CA center generates new public, private key, behind the public key encryption that new private key use is original, use note to send to user's mobile phone by network payment system.User's mobile phone after using original private key deciphering is preserved new private key, as the identification secret key and private key.
18, method as claimed in claim 8, it is characterized in that, this method further comprises: when the signed data algorithm in the user mobile phone need upgrade, the main frame of network payment system sends to mobile phone with new signed data algorithm routine by short message mode, and mobile phone upgrades this part code of signed data algorithm according to function.
19, the method for claim 1 is characterized in that, this method further comprises: the compressed encoding module is set in mobile phone, the decompression coding module is set in the payment system on the net;
After mobile phone calculates signed data, signed data is compressed with the compressed encoding module;
Signed data after the compression is sent to online payment system;
Online payment system decompresses with the decompression coding module earlier after receiving signed data after the compression, carries out ca authentication again.
20, the method for claim 1 is characterized in that, this method further comprises: the compressed encoding module is set in mobile phone, the decompression coding module is set in online computer;
After mobile phone calculates signed data, signed data is compressed with the compressed encoding module;
With the input of the signed data after compression online computer, online computer sends to online payment system with signed data after with the decompression coding module signed data being decompressed.
CNA2004100581824A 2004-08-13 2004-08-13 Identity recognition method for online payment Pending CN1734486A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2004100581824A CN1734486A (en) 2004-08-13 2004-08-13 Identity recognition method for online payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2004100581824A CN1734486A (en) 2004-08-13 2004-08-13 Identity recognition method for online payment

Publications (1)

Publication Number Publication Date
CN1734486A true CN1734486A (en) 2006-02-15

Family

ID=36076895

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004100581824A Pending CN1734486A (en) 2004-08-13 2004-08-13 Identity recognition method for online payment

Country Status (1)

Country Link
CN (1) CN1734486A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605325B (en) * 2009-06-29 2012-06-06 钱袋网(北京)信息技术有限公司 Method for identity authentication, mobile terminal, server, and identity authentication system
CN101668288B (en) * 2009-08-25 2012-08-22 钱袋网(北京)信息技术有限公司 Identity authenticating method, identity authenticating system and terminal
CN103067401A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for key protection
CN101652782B (en) * 2007-04-05 2014-04-02 英特尔移动通信有限责任公司 Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
CN104050510A (en) * 2014-06-06 2014-09-17 江门市联创发展有限公司 Intelligent room reservation system based on mobile terminal
CN104394050A (en) * 2014-11-20 2015-03-04 珠海格力电器股份有限公司 Connection method and connection device for intelligent housing system
CN107872320A (en) * 2016-09-26 2018-04-03 中国电信股份有限公司 Terminal digital signature method and system and the terminal for digital signature

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101652782B (en) * 2007-04-05 2014-04-02 英特尔移动通信有限责任公司 Communication terminal device, communication device, electronic card, method for a communication terminal device and method for a communication device for providing a verification
CN101605325B (en) * 2009-06-29 2012-06-06 钱袋网(北京)信息技术有限公司 Method for identity authentication, mobile terminal, server, and identity authentication system
CN101668288B (en) * 2009-08-25 2012-08-22 钱袋网(北京)信息技术有限公司 Identity authenticating method, identity authenticating system and terminal
CN103067401A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for key protection
CN103067401B (en) * 2013-01-10 2015-07-01 天地融科技股份有限公司 Method and system for key protection
CN104050510A (en) * 2014-06-06 2014-09-17 江门市联创发展有限公司 Intelligent room reservation system based on mobile terminal
CN104394050A (en) * 2014-11-20 2015-03-04 珠海格力电器股份有限公司 Connection method and connection device for intelligent housing system
CN107872320A (en) * 2016-09-26 2018-04-03 中国电信股份有限公司 Terminal digital signature method and system and the terminal for digital signature

Similar Documents

Publication Publication Date Title
CN101651675B (en) By the method and system that authentication code is verified client
US9112680B2 (en) Distribution of credentials
US8433914B1 (en) Multi-channel transaction signing
US10796302B2 (en) Securely storing and using sensitive information for making payments using a wallet application
US8640203B2 (en) Methods and systems for the authentication of a user
EP3008852B1 (en) System and method for encryption
CN1711738A (en) Providing a user device with a set of access codes
CN112232814B (en) Encryption and decryption methods of payment key, payment authentication method and terminal equipment
US20040068470A1 (en) Distributing public keys
CN1653746A (en) Method for authenticating and verifying sms communications
CN110278180B (en) Financial information interaction method, device, equipment and storage medium
CN103839157A (en) Electronic payment method, device and system
CA2355928C (en) Method and system for implementing a digital signature
CN102694780A (en) Digital signature authentication method, payment method containing the same and payment system
CN112862481B (en) Block chain digital asset key management method and system based on SIM card
CN1838141A (en) Technology for improving security of accessing computer application system by mobile phone
CN107994995A (en) A kind of method of commerce, system and the terminal device of lower security medium
CN108460597B (en) Key management system and method
WO2012072022A1 (en) Remote payment method
CN110335040B (en) Resource transfer method, device, electronic equipment and storage medium
KR101318154B1 (en) Method of providing image-based user authentication for shared documents, and computer-readable recording medium for the same
EP2747363A1 (en) Transaction validation method using a communications device
CN1734486A (en) Identity recognition method for online payment
KR100848966B1 (en) Method for authenticating and decrypting of short message based on public key
CN105635164A (en) Method and device for security authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING TENDYRON SCI-TECH CO., LTD.

Free format text: FORMER OWNER: LI DONGSHENG

Effective date: 20100707

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100085 504, NO.3, COURTYARD 1, STREET 4, CHUANGYE MIDDLE ROAD, SHANGDI, HAIDIAN DISTRICT, BEIJING CITY TO: 100083 1810, TOWER B, JINMA BUILDING, NO.17, QINGHUA EAST ROAD, HAIDIAN DISTRICT, BEIJING CITY

TA01 Transfer of patent application right

Effective date of registration: 20100707

Address after: 100083, B, block 17, golden building, No. 1810 Qinghua East Road, Beijing, Haidian District

Applicant after: Beijing Tendyron Technology Co., Ltd.

Address before: 100085 No. four, 1 Street, 3 middle road, Haidian District, Beijing, China, No. 504

Applicant before: Li Dongsheng

C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100083, room 1810, block B, golden building, No. 17, Qinghua East Road, Beijing, Haidian District

Applicant after: Tendyron Technology Co., Ltd.

Address before: 100083, B, block 17, golden building, No. 1810 Qinghua East Road, Beijing, Haidian District

Applicant before: Beijing Tendyron Technology Co., Ltd.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20060215