CN102891753A - Dynamic token initializing method and device - Google Patents

Dynamic token initializing method and device Download PDF

Info

Publication number
CN102891753A
CN102891753A CN201210361019XA CN201210361019A CN102891753A CN 102891753 A CN102891753 A CN 102891753A CN 201210361019X A CN201210361019X A CN 201210361019XA CN 201210361019 A CN201210361019 A CN 201210361019A CN 102891753 A CN102891753 A CN 102891753A
Authority
CN
China
Prior art keywords
key
data
dynamic token
ciphertext
protective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210361019XA
Other languages
Chinese (zh)
Other versions
CN102891753B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minghua Alliance Technology Co., Ltd.
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201210361019.XA priority Critical patent/CN102891753B/en
Publication of CN102891753A publication Critical patent/CN102891753A/en
Application granted granted Critical
Publication of CN102891753B publication Critical patent/CN102891753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a dynamic token initializing method, which comprises the following steps of: receiving and storing first data comprising a sequence number, current time and protection key information and decrypting the protection key information according to a fixed key to obtain a protection key; and receiving second data comprising a checking key ciphertext and a seed dispersion key ciphertext, decrypting the ciphertexts in the second data according to the protection key to obtain a checking key and a seed dispersion key and storing the checking key and the seed dispersion key. The invention also discloses a dynamic token initializing device. According to the invention, due to adoption of the method comprising the steps of receiving and storing the first data comprising the sequence number, the current time and the protection key information, obtaining the protection key according to the protection key information, acquiring the checking key and the seed dispersion key according to the protection key and storing the checking key and the seed dispersion key, the beneficial effect that manual input is not needed when a dynamic token is initialized is achieved, the dynamic token initializing efficiency and safety are improved and the dynamic token initializing process is more convenient.

Description

The initialized method of dynamic token and device
Technical field
The present invention relates to field of information security technology, relate in particular to the initialized method of a kind of dynamic token and device.
Background technology
Dynamic token is the terminal that generates dynamic password, and dynamic password can be confirmed user's legal identity, thereby ensures the fail safe of customer service access with the basis of legal identity login the user.The dynamic password authentication technology is considered at present one of mode that can the most effective solution authenticating user identification, thereby is widely used in the various information system scenes such as bank, security, third party's payment, large enterprises inside.
Dynamic token of the prior art adopts the symmetric key system mostly, and the key of this key code system encryption and decryption is identical; Therefore, the fail safe of this dynamic token key that places one's entire reliance upon is in case Key Exposure just means that anyone can both be encrypted and decipher user profile.For fear of the leakage of key, when the dynamic token initialization, the general employing generates factor input dynamic token with key, generates factor calculating at this key of dynamic token internal condition and generates key rather than directly key is inputted dynamic token.Key generates the factor and generally comprises dynamic token sequence number, current time, mackey(check key), seedkey(seed distributed key) etc.The general mode of manually input that adopts of prior art is inputted dynamic token sequence number and current time, and mackey and seedkey just were stored in dynamic token inside before the dynamic token initialization; Prior art adopts manual input mode to carry out initialization, and is very inconvenient and initialization efficient is very low in when operation, also makes mistakes easily, has great potential safety hazard and mackey and seedkey just were stored in dynamic token inside before initialization.
Summary of the invention
Main purpose of the present invention provides the initialized method of a kind of dynamic token and device, is intended to solve by manual input dynamic token is carried out the series of problems that initialization brings.
The invention discloses the initialized method of a kind of dynamic token, may further comprise the steps:
Reception is also preserved the first data that comprise sequence number, current time and Protective Key information, according to fixed key described Protective Key information is decrypted, and key is protected;
Reception comprises the second data of check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data is decrypted, and obtains check key and seed distributed key and preservation.
Preferably, described reception and preservation comprise the first data of sequence number, current time and Protective Key information, according to fixed key described Protective Key information are decrypted, and also comprise step before the step of the key that is protected:
Preset described fixed key.
Preferably, after described the first data of described reception, described the first data are carried out verification; If verification is passed through, then preserve described the first data and carry out follow-up associative operation.
Preferably, after described the second data of described reception, described the second data are carried out verification; If verification is passed through, then utilize described the second data to carry out follow-up associative operation.
Preferably, described the first data and/or the second data receive by serial ports, USB interface or communication.
The present invention also discloses the initialized device of a kind of dynamic token, comprising:
The first initialization module is used for receiving and preserving the first data that comprise sequence number, current time and Protective Key information, according to fixed key described Protective Key information is decrypted, and key is protected;
The second initialization module is used for receiving the second data that comprise check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data is decrypted, and obtains check key and seed distributed key and preservation.
Preferably, the initialized device of described dynamic token also comprises:
Fixed key arranges module, is used for presetting described fixed key.
Preferably, described the first initialization module also is used for, receive described the first data after, described the first data are carried out verification; If verification is passed through, then preserve described the first data and carry out follow-up associative operation.
Preferably, described the second initialization module also is used for, receive described the second data after, described the second data are carried out verification; If verification is passed through, then utilize described the second data to carry out follow-up associative operation.
Preferably, described the first initialization module and/or the second initialization module receive corresponding data by serial ports, USB interface or communication.
The present invention comprises sequence number by receiving and preserving; the first data of current time and Protective Key information; according to fixed key described Protective Key information is decrypted; key is protected; reception comprises the second data of check key ciphertext and seed distributed key ciphertext; according to described Protective Key the described ciphertext in described the second data is decrypted; the method of obtaining check key and seed distributed key and preserving; have and need not the manually beneficial effect of input when dynamic token carries out initialization; improved the initialized efficient of dynamic token and fail safe, made the initialization procedure of dynamic token more convenient.
Description of drawings
Fig. 1 is initialized method the first embodiment schematic flow sheet of dynamic token of the present invention;
Fig. 2 is initialized method the second embodiment schematic flow sheet of dynamic token of the present invention;
Fig. 3 is initialized device the first example structure schematic diagram of dynamic token of the present invention;
Fig. 4 is initialized device the second example structure schematic diagram of dynamic token of the present invention.
The realization of the object of the invention, functional characteristics and advantage are described further with reference to accompanying drawing in connection with embodiment.
Embodiment
Further specify technical scheme of the present invention below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
With reference to Fig. 1, Fig. 1 is initialized method the first embodiment schematic flow sheet of dynamic token of the present invention; As shown in Figure 1, the initialized method of dynamic token of the present invention may further comprise the steps:
Step S01, reception and preservation comprise the first data of sequence number, current time and Protective Key information, according to fixed key described Protective Key information are decrypted, and key is protected;
When dynamic token carries out initialization, receive the first data that comprise at least sequence number, current time and Protective Key information, and use the fixed key that sets in advance that the Protective Key information in the first data is decrypted, obtain Protective Key.Described Protective Key can be a random number, and described Protective Key information is encrypted the Protective Key original text by fixed key and obtained.
In a preferred embodiment, dynamic token is by serial ports, USB(Universal Serial Bus, USB) interface or communication reception corresponding data.
In a preferred embodiment, described the first data also comprise the first check code MAC1, after dynamic token receives the first data, carry out verification to the first data, after verification is passed through, these first data are preserved or the operation such as deciphering again; If verification is not passed through, then wait for the first new data that again receive.Described checking procedure is specially: dynamic token uses described fixed key that the first data are carried out MAC(Message Authentication Code, informed source correctness authentication data) the yardage calculation, obtain the second check code MAC2; Judge that whether MAC1 and MAC2 equate, if the two is equal, then use described fixed key that Protective Key information is decrypted, key is protected, and be kept in the dynamic token, such as the RAM(Random Access Memory of dynamic token, random asccess memory) in; Simultaneously, will the current time write dynamic token, described sequence number will be kept in the dynamic token, among the RAM such as dynamic token.
Step S02, reception comprise the second data of check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data are decrypted, and obtain check key and seed distributed key and preservation.
After dynamic token obtained Protective Key, reception comprised that the check key ciphertext is the second data of MAC key ciphertext and seed distributed key ciphertext at least.Described seed distributed key ciphertext is encrypted seed distributed key original text by described Protective Key and is obtained, and described seed distributed key original text can disperse root key and the computing of dynamic token sequence number to obtain by seed; Described MAC key ciphertext is encrypted MAC key original text by Protective Key and is obtained, and described MAC key original text can disperse root key and the computing of dynamic token sequence number to obtain by seed.
In a preferred embodiment, described the second data also comprise MAC3, receive described the second data after, dynamic token carries out verification to described the second data, if verification is passed through, then utilizes described the second data to carry out follow-up associative operation; If verification is not passed through, then wait for again receiving the second new data.Described checking procedure is specially: dynamic token uses described fixed key that described the second data are carried out MAC and calculates, and obtains MAC4; Judge whether MAC3 and MAC4 equate, if the two equates that then the second data check passes through.
Dynamic token is decrypted MAC key ciphertext and seed distributed key ciphertext in the second data that receive according to the Protective Key that step S01 obtains; obtain MAC key and seed distributed key; and with described MAC key and the preservation of seed distributed key, as be kept among the RAM of dynamic token.
The present invention comprises sequence number by receiving and preserving; the first data of current time and Protective Key information; according to fixed key described Protective Key information is decrypted; key is protected; reception comprises the second data of check key ciphertext and seed distributed key ciphertext; according to described Protective Key the described ciphertext in described the second data is decrypted; the method of obtaining check key and seed distributed key and preserving; have and need not the manually beneficial effect of input when dynamic token carries out initialization; improved the initialized efficient of dynamic token and fail safe, made the initialization procedure of dynamic token more convenient.
With reference to Fig. 2, Fig. 2 is initialized method the second embodiment schematic flow sheet of dynamic token of the present invention; The difference of initialized method the first embodiment of present embodiment and dynamic token of the present invention is only to have increased step S00; Present embodiment only is described specifically step S00, and other related steps of the initialized method of dynamic token of the present invention please refer to the specific descriptions of the described embodiment of Fig. 1, do not repeat them here.
As shown in Figure 2; the initialized method of dynamic token of the present invention comprises the first data of sequence number, current time and Protective Key information in step S01, reception and preservation; according to fixed key described Protective Key information is decrypted, also comprises step before the key that is protected:
Step S00, preset described fixed key.
In a preferred embodiment; before dynamic token dispatches from the factory; be implanted into a fixing key such as the MCU chip in dynamic token, i.e. described fixed key is used for doing that the MAC yardage is calculated and the encryption and decryption of this dynamic token Protective Key being processed at the dynamic token initialization procedure.
Present embodiment has the beneficial effect that improves the dynamic token fail safe by the method for fixed key is set in dynamic token inside.
With reference to Fig. 3, Fig. 3 is initialized device the first example structure schematic diagram of dynamic token of the present invention; As shown in Figure 3, the initialized device of dynamic token of the present invention comprises:
The first initialization module 01 is used for receiving and preserving the first data that comprise sequence number, current time and Protective Key information, according to fixed key described Protective Key information is decrypted, and key is protected;
When dynamic token carries out initialization; the first initialization module 01 receives the first data that comprise at least sequence number, current time and Protective Key information; and use the fixed key that sets in advance that the Protective Key information in the first data is decrypted, obtain Protective Key.Described Protective Key can be a random number, and described Protective Key information is encrypted the Protective Key original text by fixed key and obtained.
In a preferred embodiment, dynamic token receives corresponding data by serial ports, USB interface or communication.
In a preferred embodiment, described the first data also comprise the first check code MAC1, after the first initialization module 01 receives the first data, carry out verification to the first data, after verification is passed through, these first data are preserved or the operation such as deciphering again; If verification is not passed through, then wait for the first new data that again receive.Described checking procedure is specially: the first initialization module 01 uses described fixed key that the first data are carried out the MAC yardage and calculates, and obtains the second check code MAC2; Judge whether MAC1 and MAC2 equate, if the two equates that then the first initialization module 01 uses described fixed key that Protective Key information is decrypted, the key that is protected, and be kept in the dynamic token, among the RAM such as dynamic token; Simultaneously, the first initialization module 01 will write dynamic token the current time, described sequence number will be kept in the dynamic token, among the RAM such as dynamic token.
The second initialization module 02 is used for receiving the second data that comprise check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data is decrypted, and obtains check key and seed distributed key and preservation.
After dynamic token obtained Protective Key by the first initialization module 01, the second initialization module 02 received and comprises that the check key ciphertext is the second data of MAC key ciphertext and seed distributed key ciphertext at least.Described seed distributed key ciphertext is encrypted seed distributed key original text by described Protective Key and is obtained, and described seed distributed key original text can disperse root key and the computing of dynamic token sequence number to obtain by seed; Described MAC key ciphertext is encrypted MAC key original text by Protective Key and is obtained, and described MAC key original text can disperse root key and the computing of dynamic token sequence number to obtain by seed.
In a preferred embodiment, described the second data also comprise MAC3, after the second initialization module 02 receives described the second data, described the second data are carried out verification, if verification is passed through, 02 of the second initialization module utilizes described the second data to carry out follow-up associative operation; If verification is not passed through, then wait for again receiving the second new data.Described checking procedure is specially: the second initialization module 02 uses described fixed key that described the second data are carried out MAC and calculates, and obtains MAC4; Judge whether MAC3 and MAC4 equate, if the two equates that then the second data check passes through.
The second initialization module 02 is decrypted MAC key ciphertext and seed distributed key ciphertext in the second data that receive according to the Protective Key that the first initialization module 01 obtains; obtain MAC key and seed distributed key; and with described MAC key and the preservation of seed distributed key, as be kept among the RAM of dynamic token.
The present invention comprises sequence number by receiving and preserving; the first data of current time and Protective Key information; according to fixed key described Protective Key information is decrypted; key is protected; reception comprises the second data of check key ciphertext and seed distributed key ciphertext; according to described Protective Key the described ciphertext in described the second data is decrypted; obtain check key and seed distributed key and preservation; have and need not the manually beneficial effect of input when dynamic token carries out initialization; improved the initialized efficient of dynamic token and fail safe, made the initialization procedure of dynamic token more convenient.
With reference to Fig. 4, Fig. 4 is initialized device the second example structure schematic diagram of dynamic token of the present invention.The difference of initialized device the first embodiment of present embodiment and invention dynamic token is only to have increased fixed key module 03 is set; Present embodiment only arranges module 03 to fixed key and is described specifically, and other related modules of the initialized device of dynamic token of the present invention please refer to the specific descriptions of initialized device the first embodiment of dynamic token of the present invention, do not repeat them here.
As shown in Figure 4, the initialized device of dynamic token of the present invention also comprises:
Fixed key arranges module 03, is used for presetting described fixed key.
In a preferred embodiment; before dynamic token dispatches from the factory; fixed key arranges module 03 and be implanted into a fixing key such as the MCU chip in dynamic token; be described fixed key, for doing the calculation of MAC yardage at the dynamic token initialization procedure and the encryption and decryption of this dynamic token Protective Key being processed.
Present embodiment has the beneficial effect that improves the dynamic token fail safe by in dynamic token inside fixed key being set.
The above only is the preferred embodiments of the present invention; be not so limit its claim; every equivalent structure or equivalent flow process conversion that utilizes specification of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (10)

1. the initialized method of dynamic token is characterized in that, may further comprise the steps:
Reception is also preserved the first data that comprise sequence number, current time and Protective Key information, according to fixed key described Protective Key information is decrypted, and key is protected;
Reception comprises the second data of check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data is decrypted, and obtains check key and seed distributed key and preservation.
2. the method for claim 1; it is characterized in that; described reception and preservation comprise the first data of sequence number, current time and Protective Key information, according to fixed key described Protective Key information are decrypted, and also comprise step before the step of the key that is protected:
Preset described fixed key.
3. the method for claim 1 is characterized in that, after described the first data of described reception, described the first data is carried out verification; If verification is passed through, then preserve described the first data and carry out follow-up associative operation.
4. the method for claim 1 is characterized in that, after described the second data of described reception, described the second data is carried out verification; If verification is passed through, then utilize described the second data to carry out follow-up associative operation.
5. such as each described method of claim 1 to 4, it is characterized in that described the first data and/or the second data receive by serial ports, USB interface or communication.
6. the initialized device of dynamic token is characterized in that, comprising:
The first initialization module is used for receiving and preserving the first data that comprise sequence number, current time and Protective Key information, according to fixed key described Protective Key information is decrypted, and key is protected;
The second initialization module is used for receiving the second data that comprise check key ciphertext and seed distributed key ciphertext, according to described Protective Key the described ciphertext in described the second data is decrypted, and obtains check key and seed distributed key and preservation.
7. device as claimed in claim 6 is characterized in that, also comprises:
Fixed key arranges module, is used for presetting described fixed key.
8. device as claimed in claim 6 is characterized in that, described the first initialization module also is used for, receive described the first data after, described the first data are carried out verification; If verification is passed through, then preserve described the first data and carry out follow-up associative operation.
9. device as claimed in claim 6 is characterized in that, described the second initialization module also is used for, receive described the second data after, described the second data are carried out verification; If verification is passed through, then utilize described the second data to carry out follow-up associative operation.
10. such as each described device of claim 6 to 9, it is characterized in that described the first initialization module and/or the second initialization module receive corresponding data by serial ports, USB interface or communication.
CN201210361019.XA 2012-09-25 2012-09-25 The initialized method and device of dynamic token Active CN102891753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210361019.XA CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210361019.XA CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Publications (2)

Publication Number Publication Date
CN102891753A true CN102891753A (en) 2013-01-23
CN102891753B CN102891753B (en) 2016-08-03

Family

ID=47535129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210361019.XA Active CN102891753B (en) 2012-09-25 2012-09-25 The initialized method and device of dynamic token

Country Status (1)

Country Link
CN (1) CN102891753B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579680A (en) * 2014-12-19 2015-04-29 飞天诚信科技股份有限公司 Method for safe distribution of seed
CN105635114A (en) * 2015-12-18 2016-06-01 恒宝股份有限公司 Password verification method and system
CN106850211A (en) * 2017-03-06 2017-06-13 深圳市同为数码科技股份有限公司 A kind of encryption method and system based on MAC Address
WO2017114123A1 (en) * 2015-12-31 2017-07-06 华为技术有限公司 Key configuration method and key management center, and network element
CN108454410A (en) * 2018-04-13 2018-08-28 安徽江淮汽车集团股份有限公司 A kind of fuel cell diagnosis cut-in method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
US7738660B2 (en) * 1998-02-13 2010-06-15 Tecsec, Inc. Cryptographic key split binding process and apparatus
CN102651743A (en) * 2012-05-02 2012-08-29 飞天诚信科技股份有限公司 Method for generating token seeds

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7738660B2 (en) * 1998-02-13 2010-06-15 Tecsec, Inc. Cryptographic key split binding process and apparatus
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
CN102651743A (en) * 2012-05-02 2012-08-29 飞天诚信科技股份有限公司 Method for generating token seeds

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579680A (en) * 2014-12-19 2015-04-29 飞天诚信科技股份有限公司 Method for safe distribution of seed
CN104579680B (en) * 2014-12-19 2018-03-09 飞天诚信科技股份有限公司 A kind of method of secure distribution seed
CN105635114A (en) * 2015-12-18 2016-06-01 恒宝股份有限公司 Password verification method and system
CN105635114B (en) * 2015-12-18 2019-02-26 恒宝股份有限公司 A kind of password method of calibration and system
WO2017114123A1 (en) * 2015-12-31 2017-07-06 华为技术有限公司 Key configuration method and key management center, and network element
US10903987B2 (en) 2015-12-31 2021-01-26 Huawei Technologies Co., Ltd. Key configuration method, key management center, and network element
CN106850211A (en) * 2017-03-06 2017-06-13 深圳市同为数码科技股份有限公司 A kind of encryption method and system based on MAC Address
CN106850211B (en) * 2017-03-06 2020-03-27 深圳市同为数码科技股份有限公司 Encryption method and system based on MAC address
CN108454410A (en) * 2018-04-13 2018-08-28 安徽江淮汽车集团股份有限公司 A kind of fuel cell diagnosis cut-in method
CN108454410B (en) * 2018-04-13 2020-06-23 安徽江淮汽车集团股份有限公司 Fuel cell diagnosis access method

Also Published As

Publication number Publication date
CN102891753B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN101958892B (en) Electronic data protection method, device and system based on face recognition
CN104765999B (en) Method, terminal and server for processing user resource information
CN105391696A (en) Terminal registration method, terminal verification method, terminal registration system and terminal verification system
CN105391695A (en) Terminal registration method and verification method
CN104393993B (en) A kind of safety chip and its implementation for electricity-selling terminal
CN102891753B (en) The initialized method and device of dynamic token
CN101262349A (en) SMS-based identity authentication method and device
CN102938032A (en) Method and system for encrypting and decrypting application program on communication terminal as well as terminal
CN106850207B (en) Identity identifying method and system without CA
CN103503038A (en) Method and system for verifying transactor identity on ATM
CN103905400B (en) A kind of service authentication method, apparatus and system
CN102739403A (en) Identity authentication method and device for dynamic token
CN106603496A (en) Data transmission protection method, intelligent card, server, and communication system
CN106372531A (en) Method and system for authorizing to acquire terminal attack alarming information log
CN106529963A (en) System and method for security authentication of mobile devices
CN105577386A (en) Data encryption method of bilateral interaction intelligent electric energy meter
CN106789024A (en) A kind of remote de-locking method, device and system
CN103606223B (en) A kind of card authentication method and device
CN101976365B (en) Safe radio frequency identification system
CN109525399A (en) A method of the system authentication of power grid intelligent mobile terminal is realized based on PUF
CN104836660A (en) Password management method and system
CN103596175A (en) Mobile intelligent terminal certification system and method based on near field communication technology
CN114760052A (en) Bank Internet of things platform key generation method and device, electronic equipment and medium
CN105608775B (en) A kind of method of authentication, terminal, access card and SAM card
US20190019189A1 (en) Payment authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170330

Address after: 100000 room 703-710, room B3, Huayuan Road, Haidian District, Beijing, 7

Patentee after: Beijing Minghua Alliance Technology Co., Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District Ke Feng Lu No. 2 idiopathic information building A building unit seven floor South 701-709

Patentee before: Shenzhen Wendingchuang Data Technology Co., Ltd.

TR01 Transfer of patent right