CN100370743C - Interacting method for customer apparatus and network apparatus - Google Patents

Interacting method for customer apparatus and network apparatus Download PDF

Info

Publication number
CN100370743C
CN100370743C CNB2004100481262A CN200410048126A CN100370743C CN 100370743 C CN100370743 C CN 100370743C CN B2004100481262 A CNB2004100481262 A CN B2004100481262A CN 200410048126 A CN200410048126 A CN 200410048126A CN 100370743 C CN100370743 C CN 100370743C
Authority
CN
China
Prior art keywords
subscriber equipment
equipment
network
access
history identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100481262A
Other languages
Chinese (zh)
Other versions
CN1710863A (en
Inventor
郭平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2004100481262A priority Critical patent/CN100370743C/en
Publication of CN1710863A publication Critical patent/CN1710863A/en
Application granted granted Critical
Publication of CN100370743C publication Critical patent/CN100370743C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses an interacting method for a user device and a network device. In the method, the history identification of the user device is stored on the user device and the network device in advance; when the user device and the network device interact, the method comprises that: a. the network device obtains the history identification which is stored by the user device at present and inquires history identification of the user device, which is stored in the network device; b. the network device judges whether the history identification stored by the user device at present is the same as the history identification of the user device, which are stored by the network device, if yes, then the user device is not be cloned; if false, the user device is cloned; c. the history identification of the user device, which is stored in the network device and the user device, is updated. The method of the present invention can quickly and effectively detect whether the user device is cloned; consequently, the larger loss because of the cloning of the user device to users is avoided, the safety of a network is improved, and the legitimate benefits of users are protected.

Description

The exchange method of a kind of subscriber equipment and the network equipment
Technical field
The present invention relates to the network interaction technology, relate in particular to the exchange method of a kind of subscriber equipment and the network equipment.
Background technology
Current, along with the network interaction business development, the situation that some subscriber equipmenies are cloned has appearred, for example: when the user keeps in repair mobile phone, some lawless persons usually clone subscriber identification module (SIM) card of mobile phone, make a phone call with clone's SIM card then, all expenses are but counted on original subscriber's account number; Perhaps, utilize clone's SIM card to carry out illegal location registers, this moment is because user position information is the positional information of clone's card, so that real SIM card can't be done called.The inconvenience that this illegal act meeting causes loss economically and use for the actual user of SIM card.
For existing bank card or fiscard user, some lawless persons usually can clone user's bank card or fiscard by certain means, for example clone user's bank card in the mode of obtaining user's check sheet.The bank card of being cloned can bring potential threat to user's bank capital, in case because user's password leakage or lawless person try out user's the password of withdrawing the money, user's economy will sustain a loss so.
For existing Internet user, it is very general to utilize the Internet to carry out the way of online transaction.When carrying out network trading, need carry out network and use verification, general network method of calibration is to use user account, user cipher, and advanced any method of calibration is modes such as digital signature.But if user account, password, digital signature are leaked the clone, the user will suffer economic loss or leak some confidential information so.
Yet whether current also do not have a kind of method can be effectively and detect subscriber equipment apace and cloned, thereby make network can't ensure effective rights and interests of actual user.
Summary of the invention
Whether in view of this, main purpose of the present invention provides the exchange method of a kind of subscriber equipment and the network equipment, cloned thereby fast and effeciently detect subscriber equipment.
Further aim of the present invention is to detect after subscriber equipment cloned, and whether identify the active user is the clone user.
Further object of the present invention is that clone's subscriber equipment was lost efficacy, thereby stops to clone the rights and interests of subscriber equipment infringement real user equipment.
To achieve these goals, technical scheme of the present invention specifically is achieved in that
The exchange method of a kind of subscriber equipment and the network equipment, this method be the history identification of storage subscriber equipment on the subscriber equipment and the network equipment in advance, and when subscriber equipment and the network equipment carry out when mutual, this method comprises:
A, the network equipment obtain the current institute of subscriber equipment stored historical sign and inquire about the history identification of this subscriber equipment of self storing;
B, the network equipment judge whether the current institute of subscriber equipment stored historical sign is identical with the history identification of this subscriber equipment of self storing, if identical, judges that then subscriber equipment is not cloned, otherwise, judge that subscriber equipment is cloned;
The history identification of c, the subscriber equipment more stored in new network device and the subscriber equipment;
D, the network equipment obtain the specific identifier of subscriber equipment correspondence, and with set in advance in the network equipment, compare with the corresponding specific identifier of subscriber equipment, judge whether subscriber equipment is clone's subscriber equipment; If, execution in step e;
E, the network equipment lost efficacy described subscriber equipment by upgrading the peculiar access sign that subscriber equipment is stored.
Described history identification is: random number that the number of times of subscriber equipment access network, subscriber equipment or the network equipment produce at random or the changing value for producing according to specific rule.
The method that the network equipment described in the step a obtains subscriber equipment institute stored historical sign is:
The network equipment sends the history identification querying command to subscriber equipment, after subscriber equipment is received this history identification querying command, sends subscriber equipment institute stored historical sign to the network equipment;
Perhaps, subscriber equipment directly sends the current institute of subscriber equipment stored historical sign to the network equipment.
Described in the step c more in new network device and the subscriber equipment method of history identification be:
The network equipment upgrades the described subscriber equipment history identification stored, and the history identification after will upgrading sends to subscriber equipment, and subscriber equipment is with the history identification of current institute stored historical identification renewal after for this renewal;
Perhaps, subscriber equipment upgrades current institute stored historical sign, and the history identification after will upgrading sends to the network equipment, and the network equipment is updated to history identification after this renewal with this subscriber equipment history identification of being stored.
The method of the invention, the network equipment obtains the specific identifier of subscriber equipment correspondence described in the described steps d, and with set in advance comparing in the network equipment with the corresponding specific identifier of subscriber equipment, judge that whether subscriber equipment is that clone's subscriber equipment comprises: on the network equipment, set in advance and specific identifier that preservation is corresponding with subscriber equipment:
Network equipment prompting user imports the specific identifier of described subscriber equipment correspondence, and obtains the specific identifier of this subscriber equipment correspondence of user's input, inquires about the specific identifier of this subscriber equipment correspondence of self storing;
The network equipment judges whether the specific identifier of the subscriber equipment correspondence of being obtained is identical with the specific identifier of this subscriber equipment correspondence that inquires, if identical, judge that then this subscriber equipment is real subscriber equipment, and keeps the access state of this subscriber equipment; Otherwise, judge that this subscriber equipment is clone's subscriber equipment, and refuse this subscriber equipment access network.
Described specific identifier is that the subscriber equipment owner has or all biological characteristic or abiotic features.Described biological characteristic is fingerprint, sound or iris; The described abiotic password that is characterized as.
Before described step a, further comprise: subscriber equipment is by access authentication flow process access network;
Also comprise after the described steps d: if judge subscriber equipment is not clone's subscriber equipment, then the network equipment upgrades the peculiar access sign in the subscriber equipment, and the original peculiar access identification renewal of this subscriber equipment that self is preserved identifies process ends for this peculiar access after upgrading.
In step e, further comprise: there is sign in the network equipment in self setting and preservation and the pairing clone of the described network equipment.
After subscriber equipment passes through access authentication flow process access network, and before step a, further comprise: the network equipment judges that self whether preserving the clone corresponding with described subscriber equipment exists sign, if, judge that then subscriber equipment is cloned, and execution in step d, otherwise, the judgement subscriber equipment is not cloned execution in step a.
Described peculiar access is designated the KI in the network access authentication flow process.
The peculiar access sign of described renewal subscriber equipment comprises:
By the mode of aerial download OTA, and utilize Diffie-Hellman to upgrade the peculiar access sign of subscriber equipment.
Described network is: code division multiple access CDMA, GSM, INTERNET, banking network or IC telephone network.
Described subscriber equipment is:
Be furnished with the UIM card mobile phone, be furnished with the mobile phone of SIM card or machine card integrated mobile phone;
Perhaps be: the IC Card Telephone machine of being furnished with the IC phonecard;
Perhaps be: the equipment of preserving user account, password and key information in the internet;
Perhaps be: bank card in the financial sector and credit card.
Method of the present invention increases history identification in the subscriber equipment and the network equipment, and in each reciprocal process, upgrade this history identification, if subscriber equipment is cloned, then can cause the history identification in the subscriber equipment and the network equipment different, can fast and effeciently detect subscriber equipment in view of the above and whether be cloned; In addition, method of the present invention can identify also whether the active user is real user according to the specific identifier of subscriber equipment, and by the peculiar access sign of upgrading subscriber equipment clone's subscriber equipment is lost efficacy.By method of the present invention, can stop to have protected user's legitimate interests because subscriber equipment to the massive losses that the user causes, has been improved the fail safe of network by the clone.
Description of drawings
Fig. 1 is the flow chart of the described method of the embodiment of the invention.
Embodiment
Further specify implementation method of the present invention below in conjunction with the drawings and specific embodiments.
Core concept of the present invention is: deposit identical history identification in subscriber equipment and the network equipment, this history identification recording user equipment and the mutual each time information of the network equipment, and when each mutual, upgrade this history identification simultaneously, when customer premise equipment to access network equipment, relatively whether the history identification in the subscriber equipment is identical with network equipment stored historical sign, if identical, then do not clone subscriber equipment, otherwise, clone's subscriber equipment is arranged.
The scope of network of the present invention is very big, for example: code division multiple access CDMA, global system for mobile communications GSM, INTERNET, banking network or IC telephone network.The scope of subscriber equipment of the present invention is also very wide, for example: in the mobile network for the mobile phone of being furnished with subscriber identification module (UIM) card, be furnished with the mobile phone of SIM card or machine card integrated mobile phone; In cable network for being furnished with the IC Card Telephone machine etc. of IC phonecard; In the internet equipment of information such as user account, password and key of preserving; In financial sector various bank cards, credit card etc.
With the corresponding clone's subscriber equipment of above-mentioned subscriber equipment be: among the mobile network, be furnished with mobile phone, the mobile phone of being furnished with clone SIM card or the clone's of clone UIM card machine card integrated mobile phone; In the wired telephone network, is furnished with the IC Card Telephone machine of clone IC phonecard; In the Internet, cloned the equipment of information such as user account number, password and key; In the financial sector, bank card of being cloned or credit card etc.
The method of the invention is described as specific embodiment with the bank card that generally uses in the banking network and the exchange method of banking network below.In the present embodiment, in advance at real subscriber equipment, and the identical history identification of storage in the network equipment, and in the network equipment, be provided with and preserve a specific identifier of subscriber equipment correspondence in advance, described subscriber equipment is a bank card, and the network equipment is banking network equipment, for example automatic teller machine.As shown in Figure 1, the flow process of present embodiment comprises:
Step 101, subscriber equipment access network, and beginning and the network equipment carry out alternately; The mode of customer premise equipment to access network equipment has multiple, for example, can pass through the authentication process access network.
Step 102, the network equipment obtain the history identification of subscriber equipment, the method of obtaining is: subscriber equipment sends this subscriber equipment institute stored historical sign to the network equipment, perhaps, the network equipment sends the history identification querying command to subscriber equipment, after subscriber equipment is received this history identification querying command, send institute's stored historical sign to the network equipment.The network equipment reads customer equipment identification from subscriber equipment, according to identifying with this customer equipment identification corresponding historical of customer equipment identification inquiry self storage.
Described history identification has multiple, for example can be the counting of customer premise equipment to access network equipment, and in concrete the application, counting can be meant that the network equipment provides the number of times of certain service, for example the bank card user number of times of withdrawing the money or the number of times that queries the balance or the like; Described history identification also can be the random number that the network equipment produces, or the random number of subscriber equipment generation; Described history identification can also be according to the common agreement of the network equipment and subscriber equipment according to inserting the changing value that number of times produces by specific rule, for example the every access of the common agreement of the network equipment and subscriber equipment once just produces a new numerical value as history identification by ascending order.
Step 103, the network equipment judge whether described customer equipment identification corresponding historical sign that self store and described is identical with the history identification of this subscriber equipment that is obtained, if identical, then the network equipment judges that subscriber equipment is not cloned; Otherwise the network equipment judges that subscriber equipment is cloned;
Step 104, the network equipment are upgraded the described subscriber equipment history identification of being stored, and the history identification after will upgrading sends to subscriber equipment, and subscriber equipment is with the history identification of institute's stored historical identification renewal after for this renewal; Perhaps, subscriber equipment upgrades institute's stored historical sign, and the history identification after will upgrading sends to the network equipment, and the network equipment is updated to history identification after this renewal with this subscriber equipment history identification of being stored.
, can successfully detect subscriber equipment and whether be cloned to step 104 by above step 101.In addition, whether the subscriber equipment that the network equipment also can be discerned current access is real subscriber equipment, as following steps 105 as described in the step 106:
Step 105, network equipment prompting user import the specific identifier of described subscriber equipment correspondence, and obtain the specific identifier of the subscriber equipment correspondence of user's input and the specific identifier of the subscriber equipment correspondence that inquiry self is stored according to customer equipment identification.
The specific identifier that the specific identifier of subscriber equipment correspondence of the present invention has for this subscriber equipment owner or the specific identifier of setting, and this specific identifier has only the owner of this subscriber equipment to have or all, and do not allow to be kept on the subscriber equipment, must be kept on the network equipment.This specific identifier is that the user sets in advance when RT register traffic.Described specific identifier mainly contains two kinds, and a kind of is biological characteristic, such as: fingerprint, sound, iris etc.; Another kind is abiotic feature, such as: password etc.; If password can be again different passwords for different networks so, for example: if the mobile network, specific identifier can be user's a service password so; If bank system network, specific identifier can be user's the password or the like of withdrawing the money so.
The mode that the network equipment obtains the specific identifier of subscriber equipment correspondence comprises: the owner of subscriber equipment is input to the specific identifier deriving means of subscriber equipment specific identifier by the network equipment in the network equipment, for example:, then password is input to the network equipment by keyboard if the specific identifier of subscriber equipment correspondence is a password.
In addition, the specific identifier of the subscriber equipment correspondence of preserving in the network equipment can be revised, for example: after can passing through the possessory actual identity of comparison actual user equipment in network provider's service centre,, the specific identifier of subscriber equipment correspondence is made amendment such as the contrast identity card; Also can revise the specific identifier of subscriber equipment correspondence by network remote, whether the specific identifier of the subscriber equipment correspondence that promptly first verification is old is correct, if correctly, then can revise the specific identifier of subscriber equipment correspondence.
Whether the specific identifier of the subscriber equipment correspondence that step 106, network provider's determining step 105 obtain is identical with the specific identifier of this subscriber equipment correspondence of self preserving that inquires, if it is identical, judge that then current user equipment is real subscriber equipment, and keep the access state of this subscriber equipment, for this subscriber equipment provides normal service, but and execution in step 107, so that clone's subscriber equipment lost efficacy; Otherwise, judge that current user equipment for clone's subscriber equipment, refuses this subscriber equipment access network, but and execution in step 108 so that clone's subscriber equipment lost efficacy.
Whether be real subscriber equipment, the network equipment also can provide the service that clone's subscriber equipment was lost efficacy, its idiographic flow such as following steps 107 and step 108 by above-mentioned steps 105 and step 106 if can identify current user equipment:
Step 107, the network equipment upgrade in the subscriber equipment peculiar access sign, and the original peculiar access identification renewal of this subscriber equipment of self preserving identified process ends for this peculiar access after upgrading.Peculiar access is designated network employed KI in authentication process, and for example, this peculiar access sign can be the top KI A_Key that uses in the authentication process in cdma network; This peculiar access sign can be the KI (KI) that uses in the authentication process in the GSM network.The network equipment upgrades the peculiar access label manner of subscriber equipment: can be by aerial download (Over The Air, OTA) mode, and utilize Diffile-Hellman Diffie-Hellman or other Diffie-Hellman to upgrade in the mobile network.
Peculiar access sign when step 108, the network equipment are upgraded the access network that subscriber equipment stores, but do not upgrade the original peculiar access sign of this subscriber equipment of self preserving, process ends.Therefore, if clone's subscriber equipment is attempted access network once more, then in the authorizing procedure when access network, the network equipment can be because of original peculiar access sign different refuse its access networks of its peculiar access sign with the subscriber equipment of self preserving.
In addition, in this step 108, clone's subscriber equipment might be swindled Home System, for example: clone's subscriber equipment self does not upgrade peculiar access sign, but return the message of peculiar access identification renewal success to the network equipment, thereby in afterwards mutual, can continue by the authentication access network.In order to prevent to clone the subscriber equipment swindle network equipment, the method of the invention is in step 108, the network equipment upgrades the peculiar access sign that subscriber equipment is preserved, further clone's existence sign is being set self, this clone's existence is designated an additional identification, corresponding preservation with the sign of described subscriber equipment.The network equipment carries out when mutual with subscriber equipment afterwards, after authentication is passed through, judge according to the sign of subscriber equipment whether this subscriber equipment has corresponding clone to have sign, if have, then directly point out the user to import the specific identifier of subscriber equipment correspondence, obtain the specific identifier of user's input, judge according to this specific identifier whether subscriber equipment is the clone again.Can prevent to clone the legitimate rights and interests that subscriber equipment is invaded actual user so fully.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with the people of this technology in the disclosed technical scope of the present invention; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.

Claims (14)

1. the exchange method of the subscriber equipment and the network equipment is characterized in that, the history identification of storage subscriber equipment on the subscriber equipment and the network equipment in advance, and when subscriber equipment and the network equipment carry out when mutual, this method comprises:
A, the network equipment obtain the current institute of subscriber equipment stored historical sign and inquire about the history identification of this subscriber equipment of self storing;
B, the network equipment judge whether the current institute of subscriber equipment stored historical sign is identical with the history identification of this subscriber equipment of self storing, if identical, judges that then subscriber equipment is not cloned, otherwise, judge that subscriber equipment is cloned;
The history identification of c, the subscriber equipment more stored in new network device and the subscriber equipment;
D, the network equipment obtain the specific identifier of subscriber equipment correspondence, and with set in advance in the network equipment, compare with the corresponding specific identifier of subscriber equipment, judge whether subscriber equipment is clone's subscriber equipment; If, execution in step e;
E, the network equipment lost efficacy described subscriber equipment by upgrading the peculiar access sign that subscriber equipment is stored.
2. the method for claim 1 is characterized in that, described history identification is: random number that the number of times of subscriber equipment access network, subscriber equipment or the network equipment produce at random or the changing value for producing according to specific rule.
3. the method for claim 1 is characterized in that, the method that the network equipment described in the step a obtains subscriber equipment institute stored historical sign is:
The network equipment sends the history identification querying command to subscriber equipment, after subscriber equipment is received this history identification querying command, sends subscriber equipment institute stored historical sign to the network equipment;
Perhaps, subscriber equipment directly sends the current institute of subscriber equipment stored historical sign to the network equipment.
4. the method for claim 1 is characterized in that, described in the step c more in new network device and the subscriber equipment method of history identification be:
The network equipment upgrades the described subscriber equipment history identification stored, and the history identification after will upgrading sends to subscriber equipment, and subscriber equipment is with the history identification of current institute stored historical identification renewal after for this renewal;
Perhaps, subscriber equipment upgrades current institute stored historical sign, and the history identification after will upgrading sends to the network equipment, and the network equipment is updated to history identification after this renewal with this subscriber equipment history identification of being stored.
5. the method for claim 1, it is characterized in that, the network equipment obtains the specific identifier of subscriber equipment correspondence described in the described steps d, and with set in advance comparing in the network equipment with the corresponding specific identifier of subscriber equipment, judge that whether subscriber equipment is that clone's subscriber equipment comprises: on the network equipment, set in advance and specific identifier that preservation is corresponding with subscriber equipment;
Network equipment prompting user imports the specific identifier of described subscriber equipment correspondence, and obtains the specific identifier of this subscriber equipment correspondence of user's input, inquires about the specific identifier of this subscriber equipment correspondence of self storing;
The network equipment judges whether the specific identifier of the subscriber equipment correspondence of being obtained is identical with the specific identifier of this subscriber equipment correspondence that inquires, if identical, judge that then this subscriber equipment is real subscriber equipment, and keeps the access state of this subscriber equipment; Otherwise, judge that this subscriber equipment is clone's subscriber equipment, and refuse this subscriber equipment access network.
6. method as claimed in claim 5 is characterized in that, described specific identifier is that the subscriber equipment owner has or all biological characteristic or abiotic features.
7. method as claimed in claim 6 is characterized in that, described biological characteristic is fingerprint, sound or iris; The described abiotic password that is characterized as.
8. method as claimed in claim 5 is characterized in that, before described step a, further comprises: subscriber equipment is by access authentication flow process access network;
Also comprise after the described steps d: if judge subscriber equipment is not clone's subscriber equipment, then the network equipment upgrades the peculiar access sign in the subscriber equipment, and the original peculiar access identification renewal of this subscriber equipment that self is preserved identifies process ends for this peculiar access after upgrading.
9. the method for claim 1 is characterized in that, in step e, further comprises: there is sign in the network equipment in self setting and preservation and the pairing clone of the described network equipment.
10. method as claimed in claim 9, it is characterized in that, after subscriber equipment passes through access authentication flow process access network, and before step a, further comprise: the network equipment judges that self whether preserving the clone corresponding with described subscriber equipment exists sign, if, judge that then subscriber equipment is cloned, and execution in step d, otherwise, the judgement subscriber equipment is not cloned execution in step a.
11. method as claimed in claim 8 is characterized in that, described peculiar access is designated the KI in the network access authentication flow process.
12. the method for claim 1 is characterized in that, the peculiar access sign of described renewal subscriber equipment comprises:
By the mode of aerial download OTA, and utilize Diffie-Hellman to upgrade the peculiar access sign of subscriber equipment.
13. as each described method of claim 1 to 12, it is characterized in that described network is: code division multiple access CDMA, GSM, INTERNET, banking network or IC telephone network.
14., it is characterized in that described subscriber equipment is as each described method of claim 1 to 12: be furnished with the UIM card mobile phone, be furnished with the mobile phone of SIM card or machine card integrated mobile phone;
Perhaps be: the IC Card Telephone machine of being furnished with the IC phonecard;
Perhaps be: the equipment of preserving user account, password and key information in the internet;
Perhaps be: bank card in the financial sector and credit card.
CNB2004100481262A 2004-06-16 2004-06-16 Interacting method for customer apparatus and network apparatus Expired - Fee Related CN100370743C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100481262A CN100370743C (en) 2004-06-16 2004-06-16 Interacting method for customer apparatus and network apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100481262A CN100370743C (en) 2004-06-16 2004-06-16 Interacting method for customer apparatus and network apparatus

Publications (2)

Publication Number Publication Date
CN1710863A CN1710863A (en) 2005-12-21
CN100370743C true CN100370743C (en) 2008-02-20

Family

ID=35707050

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100481262A Expired - Fee Related CN100370743C (en) 2004-06-16 2004-06-16 Interacting method for customer apparatus and network apparatus

Country Status (1)

Country Link
CN (1) CN100370743C (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888193A (en) * 2015-12-16 2017-06-23 中兴通讯股份有限公司 A kind of method for authenticating user identity, device and its system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1211770A (en) * 1998-03-27 1999-03-24 杨振宁 Human body physiological characteristics antifake verification method correlated with identification card mobile data base
CN1313576A (en) * 2000-03-10 2001-09-19 刘国胜 Method for discriminating user of card (credit card) or code to be its owner
CN2508475Y (en) * 2001-11-30 2002-08-28 钟庚洪 Radio local area network type finance system device
EP1356436A1 (en) * 2001-02-01 2003-10-29 Oh Bong Kwon Method for preventing forgery of every kinds of lottery-ticket, exchange-ticket, certificate published by communication network and id-card, credit-card, medical insurance card with authentication code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1211770A (en) * 1998-03-27 1999-03-24 杨振宁 Human body physiological characteristics antifake verification method correlated with identification card mobile data base
CN1313576A (en) * 2000-03-10 2001-09-19 刘国胜 Method for discriminating user of card (credit card) or code to be its owner
EP1356436A1 (en) * 2001-02-01 2003-10-29 Oh Bong Kwon Method for preventing forgery of every kinds of lottery-ticket, exchange-ticket, certificate published by communication network and id-card, credit-card, medical insurance card with authentication code
CN2508475Y (en) * 2001-11-30 2002-08-28 钟庚洪 Radio local area network type finance system device

Also Published As

Publication number Publication date
CN1710863A (en) 2005-12-21

Similar Documents

Publication Publication Date Title
CN101755291B (en) Method, system and trusted service manager for securely transmitting an application to a mobile phone
CN101091156B (en) System and method for providing a multi-credential authentication protocol
US8718602B2 (en) Method and system for remote control of smart card
CN101322424B (en) Method for issuer and chip specific diversification
TW201824108A (en) Safety verification method, platform, device and system
CN108012268A (en) A kind of mobile phone terminal SIM card and the method for safe handling App, medium
RU2536356C2 (en) Security system for presented cards
CN100428820C (en) User recognition module and method capable of realizing mobile terminal area locking
US20070186115A1 (en) Dynamic Password Authentication System and Method thereof
US8744403B2 (en) Method and system for remote control of a smart card
EP1804418A1 (en) A dynamic password authentication system and the method thereof
CN101093566A (en) Safe mobile payment system, device and method
CN101909279B (en) Be applied to the method for authenticating of video monitoring of mobile phone
CN104038924A (en) Method and system for achieving resource exchange information processing
CN102393938A (en) On-site payment business processing method and smart card
WO2014072725A1 (en) Mobile tag reader security system
CN101166320B (en) A mobile phone and method for realizing mobile phone true name system based on RF recognition technology
KR101667005B1 (en) Method for Providing Electronic Payment by Using Subscriber Information And Subscriber Identification Module, System, Terminal And Communication Management Apparatus Therefor
CN100370743C (en) Interacting method for customer apparatus and network apparatus
KR101905655B1 (en) Method for Providing Electronic Payment, System, Terminal And Communication Management Apparatus Therefor
CN102473218B (en) Method for generating an identifier
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
KR101321829B1 (en) Method and system for site visitor authentication
KR101786941B1 (en) Method for Providing Electronic Payment by Using Subscriber Information And Subscriber Identification Module, System, Terminal And Communication Management Apparatus Therefor
CN100415032C (en) Interaction method for mobile terminal and network side in mobile communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080220

Termination date: 20130616