CN102480724A - Software authentication data card, software authentication system and software authentication method - Google Patents
Software authentication data card, software authentication system and software authentication method Download PDFInfo
- Publication number
- CN102480724A CN102480724A CN201010566152XA CN201010566152A CN102480724A CN 102480724 A CN102480724 A CN 102480724A CN 201010566152X A CN201010566152X A CN 201010566152XA CN 201010566152 A CN201010566152 A CN 201010566152A CN 102480724 A CN102480724 A CN 102480724A
- Authority
- CN
- China
- Prior art keywords
- software
- data card
- authentication
- module
- software authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to a data card with software authentication function, a software authentication system and a software authentication method. The data card includes a lock net security module that is arranged between a global system for mobile communications (GSM) module and a data card interface; and the lock net security module is used for receiving and storing key information of at least one piece of protected software and a software authentication parameter that is needed for execution of the key information as well as simultaneously carrying out authentication on the authentication parameter and international mobile subscriber identification number (IMSI) information provided by a universal integrated chip card (UICC). The software authentication system comprises the above-mentioned software authentication data card and a security server that is used for carrying out software registration according to the software authentication parameter and the key information of the protected software and the IMSI information of the UICC. And a host equipped with the protected software utilizes the software authentication data card to carry out communication with the security server by an internet. According to the invention, software protection can be effectively carried out and random software propagation and utilization can be prevented; moreover, the data card function can be expanded and external interfaces of equipment including a computer and the like can be saved.
Description
Technical field
The present invention relates to the network information transfer system that electrical communication technology is used, relate to Software Protection Technique, particularly relate to a kind of software authentication data card, software authentication system and software authentication method.
Background technology
3G network covering at present is fairly perfect, and this is the feasibility that equipment such as notebook personal computer, desktop computer, net book and ipad provide wireless access internet network, has also expanded client's scope of operator simultaneously.The report of announcing before day according to In-stat shows that the usb data card has become the main flow of external data card, and along with the built-in 3G module of increasing notebook computer, the embedded data card will be the growth field of following tool potentiality.Use more and more wider today at data card; If on this equipment, add lock net security module, fail safe that not only can monitoring network makes data card can lock fixing Virtual network operator; And can realize also that above that (dongle is a hardware that is inserted on computer parallel port or the USB mouth for the function of dongle; Be a kind of external software cryptography equipment), for the user provides a kind of hardware product that on equipment such as computer, is used for software protection, expanded the function of data card on the one hand; Practiced thrift the external interface of equipment such as computer on the other hand, like peripheral hardwares such as USB keyboard, mouse or printers.Yet, relevant therewith technology is not proposed at present as yet.
Summary of the invention
Technical problem to be solved by this invention provides a kind of at the data card that has the dongle function, effectively to carry out software protection, prevents the random propagation and the use of software, and growth data card function, with the external interface of equipment such as saving computer.
The technical scheme that the present invention solves the problems of the technologies described above is following: a kind of software authentication data card; Comprise GSM (Global System for Mobile Communications; Global system for mobile communications) module, general chipcard (Universal Integrated Chip Card; UICC) and for said data card the power module of electric power is provided; Said data card communicates through gsm module and the Internet, and communicates through data card interface and main frame, comprises that also being arranged at being used between said gsm module and the data card interface locks the lock net security module of Virtual network operator; Said general chipcard is used for to said lock net security module IMSI (International Mobile Subscriber Identification Number, international mobile subscriber identity) being provided information; The key message that said lock net security module also is used to receive and store at least one protected software with carry out the required software authentication parameter of said key message, and carry out authentication during to said parameters for authentication and IMSI information of same.
The invention has the beneficial effects as follows: main frame all can pass through lock net security module through the data of said data card and internet network interaction, therefore, can make data card possess the function of locking Virtual network operator; Lock net security module is stored the software authentication parameter and the key message of protected software; Read the IMSI information of general chipcard simultaneously; Authentication just can be used when protected software only obtained described software authentication parameter and IMSI both information; Thereby the intellectual property of protection software, maintenance software inventor's legitimate rights and interests; Two functions of data card collection software authentication of the present invention and online are one, have practiced thrift the external interface of equipment such as computer; Lock net function combines with the software authentication function can be so that the user only can carry out authentication to software through specified Virtual network operator, thereby can further strengthen the protection to software.
On the basis of technique scheme, the present invention can also do following improvement.
Further, adopt principal and subordinate's 7816 interfaces to connect between said lock net security module and the general chipcard.
Adopt the beneficial effect of above-mentioned further scheme to be, lock net security module is connected with interface between the general chipcard and becomes simply, need not extra interface conversion circuit.
Further, said data card interface is USB interface, serial line interface, parallel interface or radio frequency interface.
Adopt the beneficial effect of above-mentioned further scheme to be, said data card is connected with main frame through multiple interfaces, has enlarged interface compatibility.
Further, said main frame is computer, net book, ipad, mobile phone or PDA.
Adopt the beneficial effect of above-mentioned further scheme to be, make data card of the present invention to protect the software on the multiple main frame.
Further, said key message is the usability of program fragments and/or the functional parameter of said software.
Adopt the beneficial effect of above-mentioned further scheme to be, be beneficial to affirmation software, log-on message can't be faked.
Further, said software authentication parameter is ID, software numbering and/or software version information.
Adopt the beneficial effect of above-mentioned further scheme to be, be beneficial to affirmation software, log-on message can't be faked.
Further, said lock net security module comprises CPU module, encrypting and authenticating module and secure storage module; Said CPU module is used for through the data card interface and main frame communicates and communicate with the Internet, and said control encrypting and authenticating module and secure storage module are controlled, and communicates with said general chipcard; Said encrypting and authenticating module is used for the data that are stored on the said secure storage module are encrypted, and user's legitimacy is carried out authentication; Said secure storage module is used to store key message, software authentication parameter and the IMSI information of said at least one protected software.
Adopt the beneficial effect of above-mentioned further scheme to be, realize encryption, avoid significant data information to be stolen information.
Software authentication provided by the present invention system comprises as above each described software authentication data card and security server; Said security server is used for software authentication parameter and the key message according to said protected software, and the IMSI information of said general chipcard is carried out software registration; Said data card communicates through said data card interface and the main frame that protected software is housed, and communicates through the Internet between said data card and the said security server.
The beneficial effect of said software authentication system is; Provide the lock net security module utilized in the software authentication data card and general chipcard and security server to realize the function of dongle: lock net security module is stored the software authentication parameter and the key message of protected software; Read the IMSI of general chipcard simultaneously; Security server is realized writing lock net security module to the key message of protected software and required software authentication parameter and the IMSI information of execution key message; Authentication just can be used when protected software only obtained described software authentication parameter and IMSI both information; Thereby the intellectual property of protection software, maintenance software inventor's legitimate rights and interests.
Software authentication method provided by the present invention comprises:
Step a, on main frame, install or move protected software, and execution in step b;
Step b, said main frame send software authentication solicited message and AT request IMSI instruction to the software authentication data card, and execution in step c;
Step c, software authentication data card are judged the software authentication solicited message that receives, and whether the software stored parameters for authentication is consistent with self; And whether the IMSI information that the IMSI information that judgement execution AT instruction obtains from general chipcard has been stored with self is consistent; If unanimity would judge the legitimacy authentication through and execution in step e; Otherwise judge the legitimacy authentification failure, the prompting user need carry out software registration, and execution in step d;
Steps d, security server receiving software register requirement; And extract the software authentication parameter and the key message of protected software from said main frame; Send AT request IMSI instruction to the software authentication data card simultaneously; Obtaining the IMSI information of general chipcard, security server is registered the software authentication parameter obtained and key message and IMSI information, generates the software registration sign indicating number; And after locking the encrypting and authenticating module encrypt in the net security module, write the secure storage module 403 in the lock net security module 301, and execution in step b;
Step e, software authentication data card send the software key message to start protected software to main frame.
Through the software authentication method that the invention described above provided; Utilize software authentication provided by the present invention system; The real function that on data card, has realized dongle; Compare with the general data card and to have expanded function, saved HPI, protected the intellectual property of software, safeguarded software inventor's legitimate rights and interests.
Description of drawings
Fig. 1 is that software authentication data card of the present invention is formed structure first sketch map;
Fig. 2 is that software authentication data card of the present invention is formed structure second sketch map;
Fig. 3 is a software authentication system configuration sketch map of the present invention;
Fig. 4 is the application scenarios sketch map that software authentication data card of the present invention support operates in different protected softwares on same the computer;
Fig. 5 is a software authentication method flow chart of the present invention.
In the accompanying drawing, the list of parts of each label representative is following:
201, software authentication data card, 202, protected software, 301, lock net security module, 302, general chipcard, 401, the CPU module, 402, the encrypting and authenticating module, 403, secure storage module.
Embodiment
Below in conjunction with accompanying drawing principle of the present invention and characteristic are described, institute gives an actual example and only is used to explain the present invention, is not to be used to limit scope of the present invention.
Present embodiment provides a kind of software authentication data card, software authentication system and method for realizing the dongle function.Below be that present invention is described for example with the data card of USB interface; Certainly the present invention can also be applied to such as wireless telecommunications system cards such as embedded data cards; The interface of data card also is not limited to USB interface, also can use interfaces such as serial line interface or parallel interface.
Fig. 1 is that software authentication data card of the present invention is formed structure first sketch map; The software authentication data card 201 of present embodiment comprises: lock net security module 301 is used to lock Virtual network operator, handles the AT instruction, the key message that receives and store protected software that receive, carries out the required software authentication parameter of said key message and the IMSI information of general chipcard 302 etc.; General chipcard 302 is used to return self IMSI information, carries out the IMSI authentification of message of protected software for lock net security module 301.Said software authentication data card 201 also comprises gsm module, is the functional modules such as power module (not drawing among the figure) of data card power supply, can satisfy the network communication function of said data card software authentication data card 201.Lock net security module 301 communicates and communicates through gsm module and the Internet through data card interface and main frame (like equipment such as computer, net book, ipad, mobile phone or PDA); Main frame all can pass through said lock net security module 301 through the mutual data of said data card and the Internet; Therefore, can make data card possess the function of locking Virtual network operator.
Adopt principal and subordinate's 7816 interfaces between lock net security module 301 and the general chipcard 302, lock net security module 301 passes to general chipcard 302 with the AT request IMSI information command that receives, and reads its IMSI information.
As shown in Figure 2, lock net security module 301 may further include CPU module 401, encrypting and authenticating module 402 and secure storage module 403 etc. in the present embodiment.
Wherein CPU module 401 is used to control encrypting and authenticating module 402, secure storage module 403 and other module; The user is when installing or moving protected software; Send the authentication request information that has ID, software numbering, software version information and AT request IMSI instruction etc. to CPU module 401 through the data card interface; CPU module 401 is after receiving this information; Send the legitimacy authentication notification to encrypting and authenticating module 402, transmit the AT instruction to general chipcard 302 simultaneously and obtain IMSI information.CPU module 401 also is used to receive software authentication parameter response and the response of IMSI authentification of message from encrypting and authenticating module 402, if the response of legitimacy authentication success, then CPU module 401 is sent the notice that starts protected software to the user; If the failure of legitimacy authentication response is then sent the notice that withdraws from protected software to the user.
The user will send enabled instructions to CPU module 401 after receiving that starting protected software notifies, CPU module 401 is sent the notice that starts key messages to secure storage module 403 after receiving enabled instruction.CPU module 401 receives secure storage module 403 and calls the instruction that the software key message is accomplished simultaneously, and control secure storage module 403 returns to the user with the software key message.
Communicating by letter between software authentication data card 201 and the user encrypted through encrypting and authenticating module 402, and this has further protected the safe handling of software.
As shown in Figure 3, software authentication system embodiment structural representation of the present invention, said system comprises as stated and Fig. 1, software authentication data card 201 and security server 203 shown in Figure 2; Wherein preserve protected software key message in the security server 203 and carry out the required software authentication parameter of said key message, communicate through the Internet between software authentication data card 201 and the security server 203; Protected software 202 is stored in the main frame that is connected through the data card interface with said software authentication data card 201.
Before protected software 202 is installed or moved, need security server 203 registration software and software authentication data cards 201.Security server 203 at first extracts software authentication parameter and software key message of protected software 202 etc.; Also send AT request IMSI instruction simultaneously to software authentication data card 201; To obtain the IMSI information of general chipcard 302; Security server more than 203 pairs information register, generate the software registration sign indicating number, and write software authentication data card 201 to these information in advance.
In said software authentication data card 201; CPU module 401 receives the instruction that security server 203 sends; Control encrypting and authenticating module 402 is carried out encryption with the software authentication parameter that security server 203 extracts, and writes secure storage module 403, and CPU module 401 is when the AT request IMSI instruction that receives security server 203 simultaneously; To instruct to general its IMSI information of chipcard 302 transparent transmission requests, and with writing secure storage module 403 after the IMSI information encryption that obtains.
Encrypting and authenticating module 402 is encrypted the data that are stored on the secure storage module 403 on the one hand, and the IMSI information of particularly described software authentication parameter, key message and general chipcard 302 is encrypted, to prevent illegally to read the storage data; Realize on the other hand user's legitimacy is carried out authentication.Such as receive software authentication parameter when notice when encrypting and authenticating module 402; Will be to CPU module 401 request call software authentication parameters; Judge whether the software authentication solicited message is consistent with the software authentication parameter:, then return the software authentication success response to CPU module 401 if consistent; If inconsistent, then return the software authentication failure response to CPU module 401.
Registration code that secure storage module 403 storing software parameters for authentication, key message, security server 203 generate and and the IMSI information of general chipcard 302.When receiving from the startup software key message of CPU module 401 notice; Secure storage module 403 is notified the startup key message to the user; And behind the software key message call instruction that receives the protected software identification correspondence of carrying of user's transmission; Utilize the safe storage system of self; Call the corresponding software key message of protected software identification, return to CPU module 401 and call software key message completion instruction, and the key message of software is returned to the user under the control of CPU module 401.Need to prove that CPU module 401 request call legitimacy parameters for authentication and above statement are similar, repeat no more here.
When the protected software of having registered 202 is installed or moved, need carry out the legitimacy authentication.The main frame of pre-installing protected software 202 is to sending software authentication solicited message and AT request IMSI instruction with its software authentication data card 201 that is connected through the data card interface; Software authentication data card 201 is judged the software authentication solicited message that receives, and whether the software stored parameters for authentication is consistent with self; And whether the IMSI information that the IMSI information of judging execution AT instruction acquisition has been stored with self is consistent; If two all consistent, judge that then the legitimacy authentication passes through; Otherwise, judge the legitimacy authentification failure.
Fig. 4 is the application scenarios sketch map that software authentication data card of the present invention support operates in different protected softwares on same the computer; Present embodiment has been realized the situation that a plurality of protected softwares move simultaneously, and software authentication data card 201 can adopt each different protected softwares of method control of timesharing visit to carry out the legitimacy authentication and send the software key message.
Fig. 5 is a software authentication method flow chart of the present invention, may further comprise the steps:
Step a, on main frame, install or operating software 202, and execution in step b;
Step b, said main frame send software authentication solicited message and AT request IMSI instruction to software authentication data card 201, and execution in step c;
Step c, software authentication data card 201 are judged the software authentication solicited message that receives, and whether the software stored parameters for authentication is consistent with self; And whether the IMSI information that the IMSI information that judgement execution AT instruction obtains from general chipcard has been stored with self is consistent; If unanimity would judge the legitimacy authentication through and execution in step e; Otherwise judge the legitimacy authentification failure, the prompting user need carry out software registration, and execution in step d;
Steps d, security server 203 receiving software register requirement; And extract the software authentication parameter and the key message of protected software from said main frame; Send AT request IMSI instruction to software authentication data card 201 simultaneously; To obtain the IMSI information of general chipcard 302,203 pairs of software authentication parameters of being obtained of security server and key message and IMSI information are registered, and generate the software registration sign indicating number; And after locking encrypting and authenticating module 402 encryptions in the net security module 301, write the secure storage module 403 in the lock net security module 301, and execution in step b;
Step e, software authentication data card 201 send the software key message to start protected software to main frame.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (9)
1. software authentication data card; Comprise gsm module, general chipcard and the power module of electric power is provided for said data card; Said data card communicates through gsm module and the Internet; And communicate through data card interface and main frame, it is characterized in that: comprise that also being arranged at being used between said gsm module and the data card interface locks the lock net security module of Virtual network operator; Said general chipcard is used for to said lock net security module IMSI being provided information; The key message that said lock net security module also is used to receive and store at least one protected software with carry out the required software authentication parameter of said key message, and carry out authentication during to said parameters for authentication and IMSI information of same.
2. data card according to claim 1 is characterized in that: adopt principal and subordinate's 7816 interfaces to connect between said lock net security module and the general chipcard.
3. data card according to claim 1 is characterized in that: said data card interface is USB interface, serial line interface, parallel interface or radio frequency interface.
4. data card according to claim 1 is characterized in that: said main frame is computer, net book, ipad, mobile phone or PDA.
5. data card according to claim 1 is characterized in that: said key message is the usability of program fragments and/or the functional parameter of said software.
6. data card according to claim 1 is characterized in that: said software authentication parameter is ID, software numbering and/or software version information.
7. according to each described data card of claim 1 to 6, it is characterized in that: said lock net security module comprises CPU module, encrypting and authenticating module and secure storage module; Said CPU module is used for through the data card interface and main frame communicates and communicate with the Internet, and said control encrypting and authenticating module and secure storage module are controlled, and communicates with said general chipcard; Said encrypting and authenticating module is used for the data that are stored on the said secure storage module are encrypted, and user's legitimacy is carried out authentication; Said secure storage module is used to store key message, software authentication parameter and the IMSI information of said at least one protected software.
8. a software authentication system is characterized in that: comprise claim 1 to 7 each described software authentication data card and security server; Said security server is used for software authentication parameter and the key message according to said protected software, and the IMSI information of said general chipcard is carried out software registration; Said data card communicates through said data card interface and the main frame that protected software is housed, and communicates through the Internet between said data card and the said security server.
9. software authentication method comprises:
Step a, on main frame, install or move protected software, and execution in step b;
Step b, said main frame send software authentication solicited message and AT request IMSI instruction to the software authentication data card, and execution in step c;
Step c, software authentication data card are judged the software authentication solicited message that receives, and whether the software stored parameters for authentication is consistent with self; And whether the IMSI information that the IMSI information that judgement execution AT instruction obtains from general chipcard has been stored with self is consistent; If unanimity would judge the legitimacy authentication through and execution in step e; Otherwise judge the legitimacy authentification failure, the prompting user need carry out software registration, and execution in step d;
Steps d, security server receiving software register requirement; And extract the software authentication parameter and the key message of protected software from said main frame; Send AT request IMSI instruction to the software authentication data card simultaneously; Obtaining the IMSI information of general chipcard, security server is registered the software authentication parameter obtained and key message and IMSI information, generates the software registration sign indicating number; And after locking the encrypting and authenticating module encrypt in the net security module, write the secure storage module 403 in the lock net security module 301, and execution in step b;
Step e, software authentication data card send the software key message to start protected software to main frame.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010566152XA CN102480724A (en) | 2010-11-30 | 2010-11-30 | Software authentication data card, software authentication system and software authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010566152XA CN102480724A (en) | 2010-11-30 | 2010-11-30 | Software authentication data card, software authentication system and software authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102480724A true CN102480724A (en) | 2012-05-30 |
Family
ID=46093171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010566152XA Pending CN102480724A (en) | 2010-11-30 | 2010-11-30 | Software authentication data card, software authentication system and software authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102480724A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745149A (en) * | 2013-12-10 | 2014-04-23 | 北京深思数盾科技有限公司 | Information safety equipment and real-time protecting system and method based on wireless communication |
CN104750071A (en) * | 2015-03-10 | 2015-07-01 | 北京纵横机电技术开发公司 | Electronic system for distributed and modular railway vehicle |
CN105339918A (en) * | 2013-06-28 | 2016-02-17 | 惠普发展公司,有限责任合伙企业 | Attached computing device |
CN108564664A (en) * | 2017-12-29 | 2018-09-21 | 北京悦畅科技有限公司 | Management method, the device and system of parking farm software |
CN110602742A (en) * | 2019-09-25 | 2019-12-20 | 北京中广瑞波科技股份有限公司 | Thing networking test equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101106771A (en) * | 2006-07-10 | 2008-01-16 | 王磊 | Mobile phone software encryption and verification method |
CN101414342A (en) * | 2007-10-19 | 2009-04-22 | 西门子(中国)有限公司 | Software dog and method for implementing software protection |
CN101426200A (en) * | 2008-11-30 | 2009-05-06 | 中兴通讯股份有限公司 | Authentication method and terminal device for terminal management software |
CN101827364A (en) * | 2009-03-04 | 2010-09-08 | Lg电子株式会社 | Dual modem device |
-
2010
- 2010-11-30 CN CN201010566152XA patent/CN102480724A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101106771A (en) * | 2006-07-10 | 2008-01-16 | 王磊 | Mobile phone software encryption and verification method |
CN101414342A (en) * | 2007-10-19 | 2009-04-22 | 西门子(中国)有限公司 | Software dog and method for implementing software protection |
CN101426200A (en) * | 2008-11-30 | 2009-05-06 | 中兴通讯股份有限公司 | Authentication method and terminal device for terminal management software |
CN101827364A (en) * | 2009-03-04 | 2010-09-08 | Lg电子株式会社 | Dual modem device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105339918A (en) * | 2013-06-28 | 2016-02-17 | 惠普发展公司,有限责任合伙企业 | Attached computing device |
US10097369B2 (en) | 2013-06-28 | 2018-10-09 | Hewlett-Packard Development Company, L.P. | Attached computing device |
CN105339918B (en) * | 2013-06-28 | 2020-08-11 | 惠普发展公司,有限责任合伙企业 | Attaching computing devices |
CN103745149A (en) * | 2013-12-10 | 2014-04-23 | 北京深思数盾科技有限公司 | Information safety equipment and real-time protecting system and method based on wireless communication |
CN104750071A (en) * | 2015-03-10 | 2015-07-01 | 北京纵横机电技术开发公司 | Electronic system for distributed and modular railway vehicle |
CN104750071B (en) * | 2015-03-10 | 2017-09-29 | 中国铁路总公司 | Distributed and modular electronic system used for rail vehicle |
CN108564664A (en) * | 2017-12-29 | 2018-09-21 | 北京悦畅科技有限公司 | Management method, the device and system of parking farm software |
CN110602742A (en) * | 2019-09-25 | 2019-12-20 | 北京中广瑞波科技股份有限公司 | Thing networking test equipment |
CN110602742B (en) * | 2019-09-25 | 2022-06-17 | 北京中广瑞波科技股份有限公司 | Thing networking test equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103001773B (en) | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) | |
US20060231623A1 (en) | Controlling connectivity of a wireless smart card reader | |
CN104320389B (en) | A kind of fusion identity protection system and method based on cloud computing | |
KR101509043B1 (en) | Implementing method, system of universal card system and smart card | |
CN101882197B (en) | RFID (Radio Frequency Identification Device) inquiring-response safety certificate method based on grading key | |
CN1910531B (en) | Method and system used for key control of data resource, related network | |
CN102708324A (en) | Screen locker unlocking system and method | |
CN105975867B (en) | A kind of data processing method | |
CN108460875A (en) | A kind of entrance guard authentication method and device based on dynamic two-dimension code | |
CN101223798B (en) | Retrospective implementation of SIM capabilities in a security module | |
CN101414342B (en) | Software dog and method for implementing software protection | |
CN102480724A (en) | Software authentication data card, software authentication system and software authentication method | |
CA2541364C (en) | Controlling connectivity of a wireless smart card reader | |
CN103136485A (en) | Method of realizing computer safety and computer | |
KR20130031435A (en) | Method and apparatus for generating and managing of encryption key portable terminal | |
CN201150069Y (en) | Information safety equipment supporting multiple identification authentication | |
CN103596175A (en) | Mobile intelligent terminal certification system and method based on near field communication technology | |
US20130031357A1 (en) | Method for secure transfer of an application from a server into a reading device unit | |
CN100592317C (en) | Peripheral apparatus and method for verifying authority thereof | |
CN1808457B (en) | Portable trusted device for remote dynamic management | |
CN104361304A (en) | Method and device for downloading application program of smart card | |
US20140298024A1 (en) | Method for granting access to a network and device for implementing this method | |
CN101159542B (en) | Method and system for saving and/or obtaining authentication parameter on terminal network appliance | |
CN110636491A (en) | Service-oriented trusted execution module and communication method | |
CN101489227B (en) | Host device, mobile terminal, method for processing mobile communication service and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120530 |