CN102685073B - Safe payment method and mobile terminal - Google Patents

Safe payment method and mobile terminal Download PDF

Info

Publication number
CN102685073B
CN102685073B CN201110059121.XA CN201110059121A CN102685073B CN 102685073 B CN102685073 B CN 102685073B CN 201110059121 A CN201110059121 A CN 201110059121A CN 102685073 B CN102685073 B CN 102685073B
Authority
CN
China
Prior art keywords
described
module
request
main control
enable
Prior art date
Application number
CN201110059121.XA
Other languages
Chinese (zh)
Other versions
CN102685073A (en
Inventor
黄更生
朱本浩
葛欣
Original Assignee
中国移动通信集团公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国移动通信集团公司 filed Critical 中国移动通信集团公司
Priority to CN201110059121.XA priority Critical patent/CN102685073B/en
Publication of CN102685073A publication Critical patent/CN102685073A/en
Application granted granted Critical
Publication of CN102685073B publication Critical patent/CN102685073B/en

Links

Abstract

The invention provides safe payment method and mobile terminal.Wherein, described mobile terminal comprises: main control module, security module and secure payment enable module; Main control module sends protected code checking request to security module, is described protected code by sending data encryption request during checking to security module, and points out user to confirm Transaction Information receiving the result that security module sends; Security module is used for carrying out verification process to the protected code in described protected code checking request, the result is sent to described main control module, and at self by the enable rear generation key of secure payment enable module, utilize the Transaction Information in data encryption request described in this double secret key to be encrypted, the Transaction Information after encryption is sent to main control module; Described secure payment enable module is used for enable security module after user confirms Transaction Information.Adopt the present invention, to realize mobile terminal payment under the prerequisite realizing not affecting mobile phone terminal proper communication function.

Description

Safe payment method and mobile terminal

Technical field

The present invention relates to field of data service, particularly safe payment method and mobile terminal.

Background technology

Along with the development of mobile e-business, pay a kind of form as personal information processing by mails, being integrated in mobile phone terminal has become an inevitable trend.

Fig. 1 is existing mobile phone terminal payment flow figure.In FIG, paying for realizing mobile phone terminal, needing on existing mobile phone terminal, additionally increase payment processes module as shown in Figure 2 and signature blocks.Annexation on the payment processes module of this increase and signature blocks and mobile phone terminal between other modules is shown in Figure 2.

Based on the mobile phone terminal structure shown in Fig. 2, the flow process shown in Fig. 1 can comprise the following steps:

Step 101, main control module receives the payment information that user fills in for the transaction request that service end sends.

Step 102, activates payment processes module by user by performing enable operation to keyboard.

Particularly, step 102 is: user passes through input through keyboard activating pin, to activate payment processes module.

Step 103, payment processes module transmission release screen and keyboard request are to main control module.

In the communication process of mobile phone terminal, main control module is unified controls screen and keyboard, and in this step 103, payment processes module sends release screen and keyboard request, and object is the control in order to obtain screen and keyboard from main control module.Also namely, in payment process, the control of screen and keyboard no longer controls in main control module, but controls in payment processes module, specifically sees that step 104 is to step 107.

Step 104, payment processes module receives the response of main control module.

After execution of step 104, main control module no longer controls screen and keyboard.

Step 105, payment processes module sends and searches keyboard request to keyboard, and receives the response of keyboard.

After step 104 executes, main control module no longer controls screen and keyboard, and screen and keyboard are in notconnect state.And by this step 105, then make keyboard by payment processes module controls, be namely in the state connecting payment processes module.

Step 106, payment processes module receives user is to the confirmation of payment information.

Step 107, payment processes module sends button and confirms that request is to keyboard, and receives the response of keyboard.

After execution of step 105 to step 105, the control of keyboard and screen is taken over by payment processes module.

Step 108, payment processes module sends data encryption request to signature blocks.

This CIPHERING REQUEST carries the payment information that user fills in.

Step 109, signature blocks carries out digital signature to the payment information in data CIPHERING REQUEST, and returns encrypt data to payment processes module.

Step 110, payment processes module returns encrypt data to main control module.

Step 111, makes payment processes module deactivation status by user by terminating enable operation.

Step 112, payment processes module sends and stops encrypting messages to main control module, by the control of main control module again adapter screen and keyboard.

The control of main control module adapter screen and keyboard again specifically can see step 105 to the description of step 107.

So far, the flow process shown in Fig. 1 is completed.

As can be seen from the flow process shown in Fig. 1, although the payment of mobile phone terminal can be realized, use inconvenience, be specially:

Payment transaction once complete in existing payment flow needs user to perform three operations to keyboard: before paying, user activates payment processes module by performing corresponding operating to keyboard, when paying, user performs corresponding operating to realize paying to keyboard, after completing digital signature carried out to payment information, user performs corresponding operating to realize the deexcitation of payment processes module to keyboard, and, the operation of each execution is different, usually all require to input different passwords, which increase difficulty and the inconvenience of user's use.

In addition, in existing procedure, in order to ensure the safety of payment of mobile phone terminal, usually forbid that payment processes module opens the operating system on mobile phone and software, also namely the spendable payment transaction of mobile phone need be carried out preset when mobile phone terminal dispatches from the factory, and can not carry out flexible management to the payment application of mobile phone terminal.

Further, in existing payment flow, when mobile phone terminal pays, keyboard and screen are taken over by payment processes module completely, and this can cause mobile phone terminal cannot complete normal communication function.

Summary of the invention

The invention provides safe payment method and mobile terminal, to realize mobile terminal payment under the prerequisite not affecting mobile phone terminal proper communication function.

Technical scheme provided by the invention comprises:

Be applied to a mobile terminal for secure payment, described mobile terminal comprises: main control module; Its key is, described mobile terminal also comprises: security module and secure payment enable module; Wherein,

Main control module for sending protected code checking request to security module, and when to receive the result that security module sends be described protected code by checking, send data encryption request to security module, and points out user to confirm Transaction Information;

Described security module is used for carrying out verification process to the protected code in described protected code checking request, the result is sent to described main control module, and at self by the enable rear generation key of secure payment enable module, utilize the Transaction Information in data encryption request described in this double secret key to be encrypted, the Transaction Information after encryption is sent to main control module;

Described secure payment enable module is used for enable security module after user confirms Transaction Information.

A kind of safe payment method, the method is applied to the mobile terminal comprising main control module, and described mobile terminal also comprises: security module and secure payment enable module; The method comprises:

Security module receives the protected code checking request that main control module sends, and carries out verification process to the protected code in described protected code checking request, and the result is sent to described main control module;

Main control module receives described the result, when described the result is described protected code by checking, sends data encryption request to security module, and points out user to confirm Transaction Information;

Secure payment enable module is enable security module after user confirms Transaction Information;

Security module receives described data encryption request, and after self is enable by secure payment enable module, generates key, utilize the Transaction Information in data encryption request described in this double secret key to be encrypted, and the Transaction Information after encryption is sent to main control module.

As can be seen from the above technical solutions, in the present invention, when mobile phone terminal pays, the control of transfer keyboard and screen, does not this achieve the proper communication function not affecting mobile phone when mobile phone terminal pays;

Further, in the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in existing procedure, decrease user operation, reduce use threshold.

Accompanying drawing explanation

Fig. 1 is existing mobile phone terminal payment flow figure;

Fig. 2 is the structural representation that existing mobile phone terminal realizes paying;

Fig. 3 shows the structure chart of mobile phone terminal provided by the invention;

Fig. 4 is method flow diagram provided by the invention.

Embodiment

In order to make the object, technical solutions and advantages of the present invention clearly, describe the present invention below in conjunction with the drawings and specific embodiments.

The invention provides the mobile terminal being applied to secure payment, can be mobile phone terminal or other handheld devices such as ipod during this mobile terminal specific implementation, be only that present invention is described for example for mobile phone terminal below with mobile terminal, other situation principles are similar.

The structure chart of mobile phone terminal provided by the invention is shown see Fig. 3, Fig. 3.Mobile phone terminal shown in Fig. 3, compared to existing mobile phone terminal, except comprising main control module, also adds additional security module and secure payment enable module.

Wherein, main control module for sending protected code checking request to security module, and when to receive the result that security module sends be described protected code by checking, send data encryption request to security module, and points out user to confirm Transaction Information;

Security module is used for verifying the protected code in the protected code checking request received, the result is sent to described main control module, and at self by the enable rear generation key of secure payment enable module, Transaction Information in the data encryption request utilizing this double secret key to receive is encrypted, and the Transaction Information after encryption is sent to main control module;

Described secure payment enable module is used for enable security module after user confirms Transaction Information.

In the present embodiment, main control module, before transmission protected code to security module, comprises further:

Receive the transaction request from service end, and the Transaction Information that user provides;

Send protected code input request to security module, and the requirement user receiving security module transmission provides the notice of protected code;

Receive the protected code that user provides according to described notice.

Preferably, as shown in Figure 3, described mobile terminal comprises further: communication module and Near Field Communication module;

Described main control module is further used for the Transaction Information after sending encryption to described communication module and/or Near Field Communication module;

Described communication module is connected with described main control module, communicate with the remote application server as service end for adopting aerial mode such as WWW, WAP or note, such as, send the Transaction Information after encryption to the remote application server as service end, and receive service end to the authentication result etc. of the Transaction Information after this encryption.

Described Near Field Communication model calling is between main control module and security module, for communicating with the on-site payment terminal as service end, such as, send the Transaction Information after encryption to the on-site payment terminal as service end, and receive service end to the authentication result etc. of the Transaction Information after this encryption.

It should be noted that; consider the flexibility that the present invention applies; in the present invention; security module often receives a request; than the arbitrary request in protected code input request as described above, protected code checking request or data encryption request; capital is with the application message of this request correspondence priority corresponding for keyword finds in the response processing list pre-set; determine currently whether process this request according to described priority; if; then interrupt the current process operation just carried out, process this request.That is, security module upon receiving a request, not process this request immediately without exception, but determine whether processing this request immediately according to the priority of this request, such as, if the priority of process operation that priority is just being carried out higher than current, then determine currently to process this request immediately, otherwise, determine currently need not process this request immediately; This achieve the flexibility of application process.

Wherein, the application message that request is corresponding is application identities corresponding to module id for sending described request, described request.Here, the application identities that request is corresponding is mainly application numbers corresponding to request and answer code.

And respond in processing list and comprise module id, corresponding relation between application identities and priority three, wherein, application identities embodies by application numbers and answer code, specifically can join and be shown in Table 1:

Interface identifier Application numbers Answer code Priority Main control module identifies Near Field Communication module id

In the present embodiment, key (Key) circuit shown in Fig. 3 and application management module during security module specific implementation, can be comprised.

Wherein, described application management module is used for verifying described protected code, and the result is sent to described main control module, and is responsible for management and the Secure isolation of the multi-service application that described mobile terminal provides.Usually, the service application that mobile terminal provides is not only payment, also comprise other application such as stored value card, electronic cash, the plurality of service application unification is by application management module management, and in order to ensure the fail safe between each different service application, this application management module carries out Secure isolation to each different service application.

Described key circuit is used for after described security module is enable by secure payment enable module, and generate key, the Transaction Information in the data encryption request utilizing this double secret key to receive is encrypted, and the Transaction Information after encryption is sent to main control module.

In the present embodiment, the mode of hardware circuit can be adopted to realize during secure payment enable module specific implementation, this can ensure higher degree of safety.Certainly, under not being very high prerequisite to security requirement, this secure payment enable module also can adopt the mode of soft simulation to realize.

Wherein, as shown in Figure 3, secure payment enable module can comprise security module enable circuits and secure payment button.

Security module enable circuits is directly connected with the peripheral circuit of security module, for carrying out enable control by the described secure payment button of use to described security module.Such as, the enable security module when pressing secure payment button.Based on this, for ease of use safety payment button, described secure payment button can be set in position easy to use, such as, at the surface location place of mobile phone terminal.

It should be noted that, the security module enable circuits in the present embodiment can be powered by security module, to ensure that security-enabled module normally works.Certainly, the one as the embodiment of the present invention is expanded, and this security module enable circuits also can adopt other functional units except security module to power, and the embodiment of the present invention does not specifically limit.

So far, the description to the mobile phone terminal shown in Fig. 3 is completed.

Structure below based on the mobile phone terminal shown in Fig. 3 is described method provided by the invention:

Be method flow diagram provided by the invention see Fig. 4, Fig. 4.As shown in Figure 4, this flow process can comprise the following steps:

Step 401, main control module receives the transaction request that service end sends.

This transaction request is used for notifying that user provides Transaction Information.

Step 402, main control module receives the Transaction Information that user provides based on described transaction request.

Step 403, main control module sends protected code input request to security module.

For asking security module to send, protected code request in this step 403 requires that user provides the notice of protected code, specifically see step 404.

Step 404, after security module receives protected code input request, sends and requires that user provides the notice of protected code to main control module.

Preferably; in this step 404; security module can application message corresponding to this protected code input request be that corresponding priority searched in Table 1 in keyword, if this priority ratio is higher, requires to process this protected code input request immediately; then perform the transmit operation in step 404; and interrupt current other operations just performed, otherwise, ignore this protected code input request; after processing current other operations just performed, perform the transmit operation in step 404.

Step 405, main control module is supplied to user after receiving described notice, and receives the protected code that user provides based on described notice.

Step 406, main control module sends protected code checking request to security module.

Step 407, after security module receives protected code checking request, verifies the protected code in this protected code checking request, the result is sent to main control module.

Preferably; similar with step 404, in this step 407, security module can the checking of this protected code ask corresponding application message to be that corresponding priority searched in Table 1 in keyword; if this priority ratio is higher; require to process this protected code checking request immediately, then perform the verification operation in step 407, and interrupt current other operations just performed; otherwise; ignore this protected code checking request, after processing current other operations just performed, perform the verification operation in step 407.

Step 408, main control module, when the result received is described protected code by checking, sends data encryption request to security module, display Transaction Information, and points out user to confirm this Transaction Information.

The Transaction Information mentioned in step 402 is carried in data encryption request now.

Step 409, after security module receives data encryption request, sends encryption notice to secure payment enable module.

Preferably, preferably, with step 404 or step 407 similar, in this step 409, security module can application message corresponding to this data encryption request be that corresponding priority searched in Table 1 in keyword, if this priority ratio is higher, require to process this data encryption request immediately, then perform the transmit operation in step 409, and interrupt current other operations just performed, otherwise, ignore this data encryption request, after processing current other operations just performed, perform the transmit operation in step 409.

Step 410, secure payment enable module receives described encryption notice, and when the secure payment button of self is triggered, enable security module.

In this step 410, secure payment button is triggered and is such as pressed, and also means that user confirms the Transaction Information of display in step 408.

Step 411, security module at self by the enable rear generation key of secure payment enable module, Transaction Information in the data encryption request utilizing this double secret key to receive is encrypted, and the Transaction Information (being called encrypt data) after encryption is sent to main control module.

Preferably, preferably, similar with step 404, step 407 or step 409, in this step 411, security module can application message corresponding to this data encryption request be that corresponding priority searched in Table 1 in keyword, if this priority ratio is higher, require to process this data encryption request immediately, then perform the generation key in step 411 and cryptographic operation, and interrupt current other operations just performed, otherwise, after processing current other operations just performed, perform the generation key in step 411 and cryptographic operation.Such as, carry out in the process communicated at mobile phone terminal, receive in step 411 the process notice that the Transaction Information in data CIPHERING REQUEST is encrypted, usually, the priority ratio of traffic operation is higher, then ignore this notice, continues executive communication operation, after completing communication, perform the cryptographic operation in step 411.

Step 412, if service end is remote application server, then main control module sends encrypt data to communication module, adopts aerial mode to send encrypt data to service end by this communication module; If service end is on-site payment terminal, then main control module sends encrypt data to Near Field Communication module, sends encrypt data by this Near Field Communication module to service end.

So far, the flow process shown in Fig. 4 is completed.

As can be seen from the above technical solutions, in the present invention, secure payment enable module adopts hardware implementation mode to realize, which increase higher safety guarantee, when main control module or proximity communication module are subject to virus or trojan horse program attacks, still can ensure the safety of transaction flow, the problem of account trading occurs when solving user's not perception;

Further, in the present invention, in the whole payment process of mobile phone terminal, do not require the deactivating operation in existing procedure, decrease user operation, reduce use threshold;

Further, in the present invention, when mobile phone terminal pays, the control of transfer keyboard and screen, does not this achieve the proper communication function not affecting mobile phone when mobile phone terminal pays;

Finally, the present invention, by arranging response processing list in security module, can make program designer formulate corresponding strategy according to the application of different level of security, improves the flexibility of application design.

The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (10)

1. be applied to a mobile terminal for secure payment, described mobile terminal comprises: main control module; It is characterized in that, described mobile terminal also comprises: security module and secure payment enable module; Wherein,
Main control module, for sending protected code checking request to security module, when to receive the result that security module sends be described protected code by checking, send data encryption request to security module, and points out user to confirm Transaction Information;
Described security module is used for carrying out verification process to the protected code in described protected code checking request, the result is sent to described main control module, and at self by the enable rear generation key of secure payment enable module, utilize the Transaction Information in data encryption request described in this double secret key to be encrypted, the Transaction Information after encryption is sent to main control module; In the checking request of process protected code and data encryption request before arbitrary request, with the application message of this request correspondence for keyword finds corresponding priority in the response processing list pre-set, determine currently whether process this request according to described priority, if, then interrupt the current process operation just carried out, this request of diversion treatments;
Described secure payment enable module is used for enable security module after user confirms Transaction Information.
2. mobile terminal according to claim 1, is characterized in that, application message corresponding to described request is: for the application identities of the module id He this request correspondence that send this request;
Module id, corresponding relation between application identities and priority three is comprised in described response processing list.
3., according to the arbitrary described mobile terminal of claim 1 to 2, it is characterized in that, described security module comprises: key K ey circuit and application management module;
Described application management module is used for verifying described protected code, and the result is sent to described main control module, and is responsible for management and the Secure isolation of the multi-service application that described mobile terminal provides;
Described key K ey circuit is used for after described security module is enable by secure payment enable module, and generate key, the Transaction Information in the data encryption request utilizing this double secret key to receive is encrypted, and the Transaction Information after encryption is sent to main control module.
4. mobile terminal according to claim 1, is characterized in that, described secure payment enable module comprises: security module enable circuits and secure payment button;
Described security module enable circuits is directly connected with the peripheral circuit of described security module, for carrying out enable control by the described secure payment button of use to described security module.
5. the mobile terminal according to claim 1 or 4, is characterized in that, described secure payment enable module adopts the mode of hardware circuit to realize, or, adopt the mode of soft simulation to realize.
6. mobile terminal according to claim 1, is characterized in that, described mobile terminal comprises further: communication module and Near Field Communication module;
Described main control module is further used for the Transaction Information after sending encryption to described communication module and/or Near Field Communication module;
Described communication module is connected with described main control module, sends the Transaction Information after encryption for adopting aerial mode to the remote application server as service end;
Described Near Field Communication model calling between main control module and security module, for as service end on-site payment terminal send encryption after Transaction Information.
7. a safe payment method, the method is applied to the mobile terminal comprising main control module, it is characterized in that, described mobile terminal also comprises: security module and secure payment enable module; The method comprises:
Security module receives the protected code checking request that main control module sends, and carries out verification process to the protected code in described protected code checking request, and the result is sent to described main control module;
Main control module receives described the result, when described the result is described protected code by checking, sends data encryption request to security module, and points out user to confirm Transaction Information;
Secure payment enable module is enable security module after user confirms Transaction Information;
Security module receives described data encryption request, and after self is enable by secure payment enable module, generates key, utilize the Transaction Information in data encryption request described in this double secret key to be encrypted, and the Transaction Information after encryption is sent to main control module; In protected code checking request and data encryption request before arbitrary request; with the application message of this request correspondence for keyword finds corresponding priority in the response processing list pre-set; determine currently whether process this request according to described priority; if; then interrupt the current process operation just carried out, this request of diversion treatments.
8. method according to claim 7, is characterized in that, application message corresponding to described request is: for sending the module id of this request, the application identities of this request correspondence;
Module id, corresponding relation between application identities and priority three is comprised in described response processing list.
9. method according to claim 7, is characterized in that, described secure payment enable module adopts the mode of hardware circuit to realize, or, adopt the mode of soft simulation to realize.
10. method according to claim 7, is characterized in that, main control module comprises to taking a step forward of security module in transmission protected code checking request:
Main control module receives transaction request from service end, and the Transaction Information that reception user provides based on described transaction request, sends protected code input request afterwards to security module;
After described security module receives protected code input request, send and require that user provides the notice of protected code to main control module;
Main control module receives described notice, and receives the protected code that user provides based on described notice.
CN201110059121.XA 2011-03-11 2011-03-11 Safe payment method and mobile terminal CN102685073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110059121.XA CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110059121.XA CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Publications (2)

Publication Number Publication Date
CN102685073A CN102685073A (en) 2012-09-19
CN102685073B true CN102685073B (en) 2016-04-27

Family

ID=46816445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110059121.XA CN102685073B (en) 2011-03-11 2011-03-11 Safe payment method and mobile terminal

Country Status (1)

Country Link
CN (1) CN102685073B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198397B (en) * 2013-04-12 2014-12-17 江苏通付盾信息科技有限公司 Mobile payment method based on risk assessment and multiple credibility judgment steps
CA2921008A1 (en) * 2013-08-15 2015-02-19 Visa International Service Association Secure remote payment transaction processing using a secure element
CN105550863A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Mobile payment method and wearable equipment
CN105260890A (en) * 2015-09-25 2016-01-20 镇江明泰信息科技有限公司 On-line secure payment method based on multi-domain user information big data analysis
TWI599972B (en) * 2016-07-29 2017-09-21 Transaction Key Management Supplementary Methods
WO2019080853A1 (en) * 2017-10-24 2019-05-02 丘炎卫 System supporting peer-to-peer interactive connection technology for noncash transaction information accessibility

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394615A (en) * 2007-09-20 2009-03-25 中国银联股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN101882233A (en) * 2010-06-02 2010-11-10 方亚南 Multifunctional chip card

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6850916B1 (en) * 1998-04-27 2005-02-01 Esignx Corporation Portable electronic charge and authorization devices and methods therefor
CN101834946A (en) * 2010-05-11 2010-09-15 丁峰 Method for performing safe mobile phone payment and mobile phone for performing safe payment
CN101980309B (en) * 2010-10-14 2013-06-12 中兴通讯股份有限公司 Near field communication (NFC) mobile terminal and NFC safety payment realizing method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101394615A (en) * 2007-09-20 2009-03-25 中国银联股份有限公司 Mobile payment terminal and payment method based on PKI technique
CN101882233A (en) * 2010-06-02 2010-11-10 方亚南 Multifunctional chip card

Also Published As

Publication number Publication date
CN102685073A (en) 2012-09-19

Similar Documents

Publication Publication Date Title
US9801070B2 (en) Protection of a security element coupled to an NFC circuit
US9531548B2 (en) Security system for handheld wireless devices using time-variable encryption keys
US9904912B2 (en) Protecting transactions
EP2995039B1 (en) Systems and methods for secure communication
US20190251546A1 (en) Apparatuses and Methods for Operating a Portable Electronic Device to Conduct Mobile Payment Transactions
JP6418718B2 (en) Secure method and apparatus
CN103281327B (en) The method of many equipment secure log, system and cloud server
US8850527B2 (en) Method of performing a secure application in an NFC device
CN105684346B (en) Ensure the method for air communication safety between mobile application and gateway
CN105391840B (en) Automatically create destination application
US10165440B2 (en) Method and apparatus for remote portable wireless device authentication
ES2308996T3 (en) Method and appliance to execute a secure transfer of data in a wireless network.
WO2015101273A1 (en) Security verification method, and related device and system
JP2014529964A (en) System and method for secure transaction processing via a mobile device
US20150339474A1 (en) User authentication system
DE69916277T2 (en) Establish a secure session connection based on the Wireless Application Protocol
CN101340443B (en) Session key negotiating method, system and server in communication network
EP2701416A1 (en) Mobile Electronic Device And Use Thereof For Electronic Transactions
US20140068744A1 (en) Surrogate Secure Pairing of Devices
US8861733B2 (en) Method of personalizing a NFC chipset
EP2450822B1 (en) Method, system and smart card reader for management of access to a smart card
CN106534570B (en) A kind of method for secret protection and device
CN103747012B (en) Safe verification method, the apparatus and system of network trading
CN104395937A (en) Device and method for controlling an access authorisation and/or driving authorisation for a vehicle
US9654981B2 (en) Data integrity for proximity-based communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant