CN103514540A - USBKEY business realization method and system - Google Patents

USBKEY business realization method and system Download PDF

Info

Publication number
CN103514540A
CN103514540A CN201310481494.5A CN201310481494A CN103514540A CN 103514540 A CN103514540 A CN 103514540A CN 201310481494 A CN201310481494 A CN 201310481494A CN 103514540 A CN103514540 A CN 103514540A
Authority
CN
China
Prior art keywords
usbkey
data
sim card
user
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310481494.5A
Other languages
Chinese (zh)
Other versions
CN103514540B (en
Inventor
徐桂
焦华清
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Microelectronics Technology Co Ltd
Original Assignee
Datang Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Microelectronics Technology Co Ltd filed Critical Datang Microelectronics Technology Co Ltd
Priority to CN201310481494.5A priority Critical patent/CN103514540B/en
Publication of CN103514540A publication Critical patent/CN103514540A/en
Application granted granted Critical
Publication of CN103514540B publication Critical patent/CN103514540B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Abstract

The invention discloses USBKEY business realization method and system, and relates to the technical field of bank USBKEY. The realization method provided by the invention comprises the steps that a USBKEY business acceptance system uses a public key to encrypt transaction application data initiated by a user to acquire A; a shared secret key K1 which is made by a bank and a telecommunication operator together is used to encrypt the transaction application data to acquire EA; and A and EA are spliced together and are sent to a SIM card bound with a USBKEY. The SIM card uses K1 to carry out partial decryption on EA and carries out display to a mobile phone user. When the user confirms that transaction information is true, the SIM card uses a shared secret key K2 to encrypt partial data of A and carries out returning to the USBKEY business acceptance system, and K2 is used to carry out decryption to acquire A. The public key of the USBKEY is used to decrypt A to acquire plaintext data. Comparing with a sent request is carried out to realize business processing. The invention further discloses the USBKEY business realization system. According to the technical scheme provided by the invention, the transaction information is displayed through the mobile phone of the user, so that the user signs what the user sees, and the security of data transfer is improved.

Description

A kind of excellent shield service implementation method and system
Technical field
The present invention relates to the excellent shield of bank (USBKEY) technical field, relate in particular to a kind of USBKEY service implementation method and system.
Background technology
Generation USBKEY is the instrument for Web bank's electronic signature and digital authenticating, its built-in miniature smartcard processor, adopt 1024 asymmetric key algorithms to online data be encrypted, deciphering and digital signature, guarantee confidentiality, authenticity, integrality and the non-repudiation of online transaction.But generation USBKEY also just serves as the role of " algorithm counter ", although it can directly not read by hacker by Protective Key, whether the data that the request of cannot distinguishing is calculated are legal.Therefore, the final safe effect of USBKEY system still needs to rely on WINDOWS operating system that safety guarantee is provided.
Yet WINDOWS security of system performance is poor, hacker is by multiple means such as keyboard interface layer or USB Communication Layers, can steal easily user's password, then Long-distance Control USBKEY, distorts transaction data or directly fabricates transaction, realizes stealing clients fund.
In other words, traditional generation USBKEY has just guaranteed the storage security of the private spoon of user, but cannot fundamentally solve issuablely long-range it to be called to problem, and PIN code is unique assurance that private key calls.Generation USBKEY in use, PIN code is the input of user computer keyboard, therefore hacker still can intercept and capture user's PIN code by the Hacker Program that for example keyboard is monitored, if user takes USBKEY not in time away, hacker can obtain false authentication by the PIN code of intercepting and capturing so, and potential safety hazard still makes people worried.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of USBKEY service implementation method and system, to improve the safety and reliability of USBKEY.
In order to solve the problems of the technologies described above, the invention discloses the implementation method of a kind of excellent shield (USBKEY) business, comprising:
When user initiates transaction application in USBKEY service system, USBKEY service system is used the PKI of USBKEY to be encrypted and to obtain A transaction request for data, use the shared key K1 of the common data SMS encryption and decryption agreement of formulating of bank and telecom operators to be encrypted and to obtain EA transaction request for data simultaneously, A and EA are stitched together and send to the Subscriber Identity Module (SIM) Card with USBKEY binding;
Described SIM card receives data, with K1, EA is partly decrypted and is shown to cellphone subscriber, when user confirms that Transaction Information is true, the shared key K2 that SIM card is used USBkey service system and telecom operators to consult encryption and decryption agreement is encrypted A partial data, and return to USBKEY service system and use data that K2 returns described SIM card to be decrypted to obtain A, the PKI that re-uses USBKEY is decrypted A, obtain clear data, and compare with the request sending, realize business handling.
Alternatively, said method also comprises:
When user handles USBKEY business, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding, wherein, the information of binding comprises that shared key K1, the USBKEY of the common data SMS encryption and decryption agreement of formulating of USBKEY sign, bank and telecom operators and telecom operators consult the shared key K2 of encryption and decryption agreement.
Alternatively, in said method, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding and comprise:
Utilize corresponding K1 and the K2 data of ID of identify label number (ID), teledata and this USBKEY of the USBKEY that the remote writing-card business function of telecom operators handled user to write in SIM card.
Alternatively, in said method, described transaction request for data at least comprises time word string, address word string, Transaction Information word string, anti-replay-attack word string.
The invention also discloses the system that realizes of a kind of excellent shield (USBKEY) business, comprise USBKEY service system platform, and the Subscriber Identity Module (SIM) Card with data encryption feature of binding one by one with user's USBKEY:
Described USBKEY service system platform, receive Client-initiated transaction application, use the PKI of USBKEY to be encrypted and to obtain A transaction request for data, use the shared key K1 of the common data SMS encryption and decryption agreement of formulating of bank and telecom operators to be encrypted and to obtain EA transaction request for data simultaneously, A and EA are stitched together and send to the SIM card with USBKEY binding, and use USBKEY service system platform and telecom operators to consult the shared key K2 of encryption and decryption agreement, the data that described SIM card is returned are decrypted and obtain A, the PKI that re-uses USBKEY is decrypted A, obtain clear data, and compare with the request sending, realize business handling,
Described SIM card, receive the data that USBKEY service system platform sends, with K1, the EA in described data is partly decrypted and is shown to cellphone subscriber, when user confirms that Transaction Information is true, the shared key K2 that uses USBKEY service system platform and telecom operators to consult encryption and decryption agreement is encrypted A partial data, and returns to USBKEY service system platform.
Alternatively, in said system, described USBKEY service system platform, when user handles USBKEY business, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding, wherein, the information of binding comprises that shared key K1, the USBKEY of the common data SMS encryption and decryption agreement of formulating of USBKEY sign, bank and telecom operators and telecom operators consult the shared key K2 of encryption and decryption agreement.
Alternatively, in said system, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding and comprise:
Utilize corresponding K1 and the K2 data of ID of identify label number (ID), teledata and this USBKEY of the USBKEY that the remote writing-card business function of telecom operators handled user to write in SIM card.
Alternatively, in said system, described transaction request for data at least comprises time word string, address word string, Transaction Information word string, anti-replay-attack word string.
Present techniques scheme, when user carries out business handling, is combined SIM technology with generation USBKEY, authenticate, and has solved following problem:
By user mobile phone, show Transaction Information, make user reach finding and institute sign;
Carry out encryption and decryption one to one with USBKEY and process, guarantee the security that data are transmitted.
Embodiment
Fig. 1 is the schematic diagram of the USBKEY that proposes of the present invention;
Fig. 2 is the USBKEY Verification System Organization Chart that the present invention proposes;
Fig. 3 is the USBKEY identifying procedure figure that the present invention proposes.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in connection with accompanying drawing, technical solution of the present invention is described in further detail.It should be noted that, in the situation that not conflicting, the application's embodiment and the feature in embodiment can combine arbitrarily mutually.
Embodiment 1
This case applicant proposes, and can on the basis of generation USBKEY, increase liquid crystal display and button, forms two generation USBKEY, and its outward appearance as shown in Figure 1.And, by existing SIM technology therewith USBKEY combine, like this, the use procedure meeting of USBKEY increases user key-press and confirms action, safe and reliable and be simple and easy to use.
Based on above-mentioned thought, the present embodiment provides a kind of USBKEY service implementation method, and the method depends on the network architecture shown in Fig. 2, specifically comprises following operation:
Step 1, configuration operation;
Particularly, this configuration operation comprises that bank and telecom operators formulate data SMS encryption and decryption agreement, shared key K1 jointly;
USBKEY and telecom operators consult encryption and decryption agreement (as encrypted band MAC etc.), shared key K2;
Step 2, by the binding of USBKEY and user mobile phone;
Particularly, when user handles USBKEY business, need binding with the cell-phone number of data encryption feature;
Increase data processing module, the major function of this module is: storage key K1, according to combination of protocols data, by specifying Number for access to be issued to the cell-phone number of binding;
Generation USBKEY with data decryption functions: transformation point, for COS part, need to increase the storage of K2.
User mobile phone SIM card with data encrypting and deciphering function: this is a SIM card that needs carrier customization, and this SIM card has been stored key K 1 and K2, and can carry out the decryption processing of data SMS.
Wherein, due to what realize between the USBKEY in the present embodiment and SIM card, it is user's one key, but USBKEY Shi bank handles application, and handle SIM card Shi operator business hall, therefore, the present embodiment proposes, and utilizes the remote writing-card business function of each telecom operators to make user's the key of USBKEY corresponding one by one with SIM card, precondition is ID and corresponding K1 and the K2 that USBKEY shares in telecom operators, and idiographic flow is as follows:
User handles Web bank in bank, applies USBKEY, has printed unique identification id number of this USBKEY on each USBKEY, needs user bound cell-phone number simultaneously;
Cell-phone number as existing in user, this user Xu Dao telecom operators place handles replacement card business, retain original cell-phone number, remote writing-card platform by typical operator is replaced by the SIM card with data encrypting and deciphering function by former SIM card, the ID of the USBKEY that remote writing-card business acquisition user has handled, writes teledata and corresponding K1 and the K2 data of this ID in card;
As user does not have cell-phone number, basic operation is similar with second step, different, and the business of now handling is new account, rather than replacement card, and finishing card needs the channel (phone, Web bank etc.) by bank that USBKEY and user mobile phone number are bound afterwards.
Step 3, initiates transaction application by user USBKEY service system (hereinafter to be referred as system) is upper, and system is first used request for data (comprise time word string, address word string, Transaction Information word string, anti-replay-attack word string is combined) the PKI U of USBKEY pencryption obtains A, these group data is encrypted and to be obtained EA with K1 simultaneously, and A and EA are stitched together and issue mobile phone;
Step 4, mobile phone resolution data, is first partly decrypted EA with K1, and is presented on mobile phone screen, by user, confirms that whether Transaction Information is true, as confirms truely, uses K2 to be encrypted and to obtain EK A partial data 2a, and send;
Step 5, system by data retransmission to generation USBKEY, K2 data decryption EK for generation USBKEY 2a, obtains data A, and the modes such as checking MAC, random number that can increase are confirmed data integrity, data A is deciphered with Us, then obtain data B with Bp encryption, and generation USBKEY replies to system by data B;
Step 6, system is deciphered with Bs, obtains clear data, compares with the request sending, and completes handling of whole business.
Because this programme need to relate to telecom operators and field Ge Jia bank of financial world, as can be seen from Figure 3, in this programme, need two groups of symmetric keys and two groups of unsymmetrical key, according to application target, there is respectively different channels to preserve.In conjunction with the service handling flow process of Fig. 3, with regard to this programme, in the operating mode of existing generation USBKEY, need the transformation of carrying out again.
Embodiment 2
The present embodiment provides a kind of system that realizes of USBKEY business, and this system comprises USBKEY service system platform, and the SIM card with data encryption feature of binding one by one with user's USBKEY:
Described USBKEY service system, receive Client-initiated transaction application, use the PKI of USBKEY to be encrypted and to obtain A transaction request for data, use the shared key K1 of the common data SMS encryption and decryption agreement of formulating of bank and telecom operators to be encrypted and to obtain EA transaction request for data simultaneously, A and EA are stitched together and send to the SIM card with USBKEY binding, and use USBKEY service system and telecom operators to consult the shared key K2 of encryption and decryption agreement, the data that described SIM card is returned are decrypted and obtain A, the PKI that re-uses USBKEY is decrypted A, obtain clear data, and compare with the request sending, realize business handling,
Particularly, above-mentioned USBKEY service system, when user handles USBKEY business, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding, wherein, the information of binding comprises that shared key K1, the USBKEY of the common data SMS encryption and decryption agreement of formulating of USBKEY sign, bank and telecom operators and telecom operators consult the shared key K2 of encryption and decryption agreement.
Described SIM card, receive the data that USBKEY service system sends, with K1, the EA in described data is partly decrypted and is shown to cellphone subscriber, when user confirms that Transaction Information is true, the shared key K2 that uses USBKEY service system and telecom operators to consult encryption and decryption agreement is encrypted A partial data, and returns to USBKEY service system.
In the present embodiment, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding and comprise:
Utilize corresponding K1 and the K2 data of ID of identify label number (ID), teledata and this USBKEY of the USBKEY that the remote writing-card business function of telecom operators handled user to write in SIM card.
Described transaction request for data at least comprises time word string, address word string, Transaction Information word string, anti-replay-attack word string.
From above-described embodiment, can find out, present techniques scheme has following advantage:
Make full use of the ubiquity of mobile phone, in conjunction with safe storage and the calculating advantage of USBkey, strengthen using at present the level of security of most of bank of USBkey, effectively protect trojan horse;
Mobile phone and generation USBkey double insurance, indispensable, user's application risk is dropped to minimum.
One of ordinary skill in the art will appreciate that all or part of step in said method can come instruction related hardware to complete by program, described program can be stored in computer-readable recording medium, as ROM (read-only memory), disk or CD etc.Alternatively, all or part of step of above-described embodiment also can realize with one or more integrated circuit.Correspondingly, each the module/unit in above-described embodiment can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.The application is not restricted to the combination of the hardware and software of any particular form.
The above, be only preferred embodiments of the present invention, is not intended to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of making, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (8)

1. an implementation method for excellent shield (USBKEY) business, is characterized in that, the method comprises:
When user initiates transaction application in USBKEY service system, USBKEY service system is used the PKI of USBKEY to be encrypted and to obtain A transaction request for data, use the shared key K1 of the common data SMS encryption and decryption agreement of formulating of bank and telecom operators to be encrypted and to obtain EA transaction request for data simultaneously, A and EA are stitched together and send to the Subscriber Identity Module (SIM) Card with USBKEY binding;
Described SIM card receives data, with K1, EA is partly decrypted and is shown to cellphone subscriber, when user confirms that Transaction Information is true, the shared key K2 that SIM card is used USBkey service system and telecom operators to consult encryption and decryption agreement is encrypted A partial data, and return to USBKEY service system and use data that K2 returns described SIM card to be decrypted to obtain A, the PKI that re-uses USBKEY is decrypted A, obtain clear data, and compare with the request sending, realize business handling.
2. the method for claim 1, is characterized in that, the method also comprises:
When user handles USBKEY business, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding, wherein, the information of binding comprises that shared key K1, the USBKEY of the common data SMS encryption and decryption agreement of formulating of USBKEY sign, bank and telecom operators and telecom operators consult the shared key K2 of encryption and decryption agreement.
3. method as claimed in claim 2, is characterized in that, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding and comprise:
Utilize corresponding K1 and the K2 data of ID of identify label number (ID), teledata and this USBKEY of the USBKEY that the remote writing-card business function of telecom operators handled user to write in SIM card.
4. the method as described in claims 1 to 3 any one, is characterized in that,
Described transaction request for data at least comprises time word string, address word string, Transaction Information word string, anti-replay-attack word string.
5. the system that realizes of excellent shield (USBKEY) business, is characterized in that, this system comprises USBKEY service system platform, and the Subscriber Identity Module (SIM) Card with data encryption feature of binding one by one with user's USBKEY:
Described USBKEY service system platform, receive Client-initiated transaction application, use the PKI of USBKEY to be encrypted and to obtain A transaction request for data, use the shared key K1 of the common data SMS encryption and decryption agreement of formulating of bank and telecom operators to be encrypted and to obtain EA transaction request for data simultaneously, A and EA are stitched together and send to the SIM card with USBKEY binding, and use USBKEY service system platform and telecom operators to consult the shared key K2 of encryption and decryption agreement, the data that described SIM card is returned are decrypted and obtain A, the PKI that re-uses USBKEY is decrypted A, obtain clear data, and compare with the request sending, realize business handling,
Described SIM card, receive the data that USBKEY service system platform sends, with K1, the EA in described data is partly decrypted and is shown to cellphone subscriber, when user confirms that Transaction Information is true, the shared key K2 that uses USBKEY service system platform and telecom operators to consult encryption and decryption agreement is encrypted A partial data, and returns to USBKEY service system platform.
6. system as claimed in claim 5, is characterized in that,
Described USBKEY service system platform, when user handles USBKEY business, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding, wherein, the information of binding comprises that shared key K1, the USBKEY of the common data SMS encryption and decryption agreement of formulating of USBKEY sign, bank and telecom operators and telecom operators consult the shared key K2 of encryption and decryption agreement.
7. system as claimed in claim 6, is characterized in that, by USBKEY with the SIM card of data encryption feature, carry out man-to-man binding and comprise:
Utilize corresponding K1 and the K2 data of ID of identify label number (ID), teledata and this USBKEY of the USBKEY that the remote writing-card business function of telecom operators handled user to write in SIM card.
8. the system as described in claim 5 to 7 any one, is characterized in that,
Described transaction request for data at least comprises time word string, address word string, Transaction Information word string, anti-replay-attack word string.
CN201310481494.5A 2013-10-15 2013-10-15 A kind of excellent shield service implementation method and system Active CN103514540B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310481494.5A CN103514540B (en) 2013-10-15 2013-10-15 A kind of excellent shield service implementation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310481494.5A CN103514540B (en) 2013-10-15 2013-10-15 A kind of excellent shield service implementation method and system

Publications (2)

Publication Number Publication Date
CN103514540A true CN103514540A (en) 2014-01-15
CN103514540B CN103514540B (en) 2017-03-01

Family

ID=49897224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310481494.5A Active CN103514540B (en) 2013-10-15 2013-10-15 A kind of excellent shield service implementation method and system

Country Status (1)

Country Link
CN (1) CN103514540B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231343A (en) * 2017-04-25 2017-10-03 广东网金控股股份有限公司 A kind of U-shield Activiation method, client and system
CN109831580A (en) * 2019-01-24 2019-05-31 洋浦吉商生物科技有限公司 One yard of general data shared system
CN114389845A (en) * 2021-12-14 2022-04-22 北京八分量信息科技有限公司 Intelligent terminal data cooperation method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013981A (en) * 2010-07-23 2011-04-13 杭州每日科技有限公司 E-bank data authentication device and method applied to mobile communication terminal
CN102118251A (en) * 2011-01-24 2011-07-06 郑州信大捷安信息技术有限公司 Security authentication method for internet banking remote payment based on multi-interface intelligent safety card
CN102546545A (en) * 2010-12-21 2012-07-04 喜海龙 Device and method for guaranteeing transmission safety of important network data of user
WO2012143653A1 (en) * 2011-04-13 2012-10-26 Proton World International N.V. Access control mechanism for a secure element coupled to an nfc circuit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013981A (en) * 2010-07-23 2011-04-13 杭州每日科技有限公司 E-bank data authentication device and method applied to mobile communication terminal
CN102546545A (en) * 2010-12-21 2012-07-04 喜海龙 Device and method for guaranteeing transmission safety of important network data of user
CN102118251A (en) * 2011-01-24 2011-07-06 郑州信大捷安信息技术有限公司 Security authentication method for internet banking remote payment based on multi-interface intelligent safety card
WO2012143653A1 (en) * 2011-04-13 2012-10-26 Proton World International N.V. Access control mechanism for a secure element coupled to an nfc circuit

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231343A (en) * 2017-04-25 2017-10-03 广东网金控股股份有限公司 A kind of U-shield Activiation method, client and system
CN107231343B (en) * 2017-04-25 2019-10-11 广东网金控股股份有限公司 A kind of U-shield Activiation method, client and system
CN109831580A (en) * 2019-01-24 2019-05-31 洋浦吉商生物科技有限公司 One yard of general data shared system
CN109831580B (en) * 2019-01-24 2020-12-18 王微静 One-code universal data sharing system
CN114389845A (en) * 2021-12-14 2022-04-22 北京八分量信息科技有限公司 Intelligent terminal data cooperation method based on block chain

Also Published As

Publication number Publication date
CN103514540B (en) 2017-03-01

Similar Documents

Publication Publication Date Title
AU2021203184B2 (en) Transaction messaging
CA2865148C (en) Multi-issuer secure element partition architecture for nfc enabled devices
US20150324789A1 (en) Cryptocurrency Virtual Wallet System and Method
CN106527673A (en) Method and apparatus for binding wearable device, and electronic payment method and apparatus
CN109039652B (en) Digital certificate generation and application method
CN103793815A (en) Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
KR20140126787A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN102710611A (en) Network security authentication method and system
CA2921718A1 (en) Facilitating secure transactions using a contactless interface
CN104125064A (en) Dynamic password authentication method, client and authentication system
CN109146468A (en) A kind of backup and restoration methods of the logical card of number
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN105592056A (en) Password safety system for mobile device and password safety input method thereof
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN103514540A (en) USBKEY business realization method and system
CN102098391B (en) Communication terminal and communication information processing method thereof
KR101146509B1 (en) Internet banking transaction system and the method that use maintenance of public security card to be mobile
CN114666786A (en) Identity authentication method and system based on telecommunication smart card
KR20150003124A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN116975919A (en) Authorization method and device based on trusted UI service, electronic equipment and medium
CN109039609A (en) The method and terminal of key importing terminal
CN112668030A (en) Identity ID (identity) confirmation and environment safety authentication method for financial self-service terminal
KR20120004520U (en) Highly secure multifunctional authentication device
Yang et al. A secure data access method based on eID for mobile Internet
JP2012212405A (en) Application authentication system, application authentication method, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180109

Address after: The 300463 Tianjin FTA test area (Dongjiang Bonded Port) No. 6865 North Road, 1-1-1802-7 financial and trade center of Asia

Patentee after: Core leasehold (Tianjin) limited liability company

Address before: 100094 Yongjia North Road, Beijing, No. 6, No.

Patentee before: Datang Microelectronics Technology Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201020

Address after: 100094 No. 6 Yongjia North Road, Beijing, Haidian District

Patentee after: DATANG MICROELECTRONICS TECHNOLOGY Co.,Ltd.

Address before: 300463 Tianjin FTA pilot area (Dongjiang Bonded Port), Asia Road 6865 financial and Trade Center North District 1-1-1802-7

Patentee before: Xinjin Leasing (Tianjin) Co.,Ltd.