CN104980913B - Protect the method and terminal device of data information security in terminal device - Google Patents
Protect the method and terminal device of data information security in terminal device Download PDFInfo
- Publication number
- CN104980913B CN104980913B CN201410145356.4A CN201410145356A CN104980913B CN 104980913 B CN104980913 B CN 104980913B CN 201410145356 A CN201410145356 A CN 201410145356A CN 104980913 B CN104980913 B CN 104980913B
- Authority
- CN
- China
- Prior art keywords
- sim
- cryptographic hash
- terminal device
- random number
- encrypted message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses the methods and terminal device of data information security in a kind of protection terminal device, to improve the safety of the data information stored in terminal device.It is provided with SE in terminal device, the SIM installed in the SE and the terminal device is bound;The method, comprising: the SIM interacts certification with the SE when resetting starting or electrifying startup;After the SIM determines interactive authentication success, into normal operating conditions.
Description
Technical field
The present invention relates to data information securities in data information security technical field more particularly to a kind of protection terminal device
Method and terminal device.
Background technique
Mobile payment is also referred to as mobile payment, allows user using its mobile terminal device (usually mobile phone) to being disappeared
The commodity or service that take carry out a kind of means of payment of account payment.User passes through mobile terminal device, internet or low coverage
Payment instruction directly or indirectly is sent to bank finance mechanism from sensing and generates currency payment and fund displacement behavior, to realize
Mobile payment function.
Mobile payment blends terminal device, internet, application provider and financial institution, provides currency for user
The financial business such as payment, payment.With the formation that user's mobile payment is accustomed to, mentioned on mobile terminal device with mobile payment service
It is also more and more for the user data information that is stored on the background system of quotient.Currently, most mobile terminal device is mainly
Protected by startup password, still, if customer mobile terminal equipment is stolen or loses, illegal user obtain it is legal
After the mobile terminal device of user, the startup password of legitimate user's setting can be deleted by updating operating system, in this way, just
The data information stored in the mobile terminal device can be obtained;Or illegal user will be in the mobile terminal device of legitimate user
The client identification module (SIM, Subscriber Identity Module) of installation takes out, and is installed to other mobile terminals and sets
It is standby upper, and then the account and password of legitimate user's mobile payment are got by short message mode, to achieve the purpose that illegally to make a profit,
It can be seen that the risk of the presence leakage of the user data information in existing mobile terminal device, reduces mobile terminal and sets
The safety of standby storing user data information.
Summary of the invention
The embodiment of the present invention provides a kind of method and terminal device for protecting data information security in terminal device, to mention
The safety of the data information stored in high terminal device.
The embodiment of the present invention provides a kind of method for protecting data information security in terminal device, sets in the terminal device
It is equipped with safety element SE, the SIM installed in the SE and the terminal device is bound;
The method, comprising:
The SIM interacts certification with the SE when resetting starting or electrifying startup;
After the SIM determines interactive authentication success, into normal operating conditions.
The embodiment of the present invention provides a kind of terminal device, and safety element SE is provided in the terminal device and is equipped with visitor
Family identification module SIM, the SE and SIM binding, in which:
The SIM, for interacting certification with the SE when resetting starting or electrifying startup;Determine that interaction is recognized
After demonstrate,proving successfully, into normal operating conditions.
The method and terminal device of data information security, set in terminal in protection terminal device provided in an embodiment of the present invention
Be provided with safety element in standby, the SIM installed in the safety element and terminal device is bound, in this way, SIM reset starting or
When electrifying startup, SE and SIM interact certification, and only after certification passes through, SIM just enters working condition, in this way, illegally
User after the SIM for illegally obtaining legitimate user, due to replacement mobile terminal device after, SE is also replaced therewith, just without
Method is not available the SIM of legitimate user by interactive authentication process, thus, it ensure that the peace of legitimate user's data information
Entirely.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation
Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is to protect the implementation process diagram of the method for data information security in terminal device in the embodiment of the present invention;
Fig. 2 is the structural schematic diagram of terminal device in the embodiment of the present invention.
Specific embodiment
In order to improve the safety of the data information stored in terminal device, the embodiment of the present invention provides a kind of protection terminal
The method and terminal device of data information security in equipment.
Below in conjunction with Figure of description, preferred embodiment of the present invention will be described, it should be understood that described herein
Preferred embodiment only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention, and in the absence of conflict, this hair
The feature in embodiment and embodiment in bright can be combined with each other.
In order to improve the safety of the data information stored in terminal device, in the embodiment of the present invention, can be set in terminal
Standby middle increase safety element (SE, Security Element), and the client identification module that will be installed in SE and terminal device
(SIM, Subscriber Identity Mobile) binding.
Preferably, in the embodiment of the present invention SE and SIM can be bound according to following below scheme:
Step 1: in initial start-up, the encrypted message of user's input is obtained by the operating system of terminal device by SIM;
Step 2: the encrypted message that SIM notifies SE to obtain by operating system;
Step 3: SE stores the encrypted message.
Specifically, in initial start-up, the message in cipher of user's input is obtained by the operating system of the terminal device by SIM
Breath.
As a kind of embodiment of the embodiment of the present invention, SIM can prompt to use when first used by operating system
Family inputs encrypted message, and receives the encrypted message of user's input by operating system and then notified by operating system
After storing the encrypted message to SE, SE, the binding of SIM and SE is completed.
As another embodiment of the embodiment of the present invention, can be previously written in SIM card by operator initial
Password, such as initial password can be set to 12345678, in this way, prompting to use by operating system when using SIM card for the first time
Family Modify password.Specifically, initial password and modified new password can be inputted by booting operating system user, passing through
After operating system obtains initial password and new password, initial password is verified, that is, compares the close of user's input
Whether code is consistent with the initial password of itself storage, if unanimously, determination is verified.If initial password is verified, will use
New password replaces initial password, and notifies operating system, notifies the modified new password of SE user by operating system, SE storage is used
After the new password of family modification, the binding of SE and SIM is completed.
Based on this, as shown in Figure 1, for the method for data information security in protection terminal device provided in an embodiment of the present invention
Implementation process diagram, may comprise steps of:
S11, SIM interact certification with SE when resetting starting or electrifying startup;
After S12, SIM determine interactive authentication success, into normal operating conditions.
Wherein, in step S11, SIM and SE can interact certification according to following below scheme:
Step 1: SIM generates the first random number and the second random number, and the first random number and the second random number are breathed out
Uncommon operation obtains the first cryptographic Hash;
For example, SIM generates random number R a and Rb, and Hash operation is carried out to (Ra+Rb) and obtains H.
Step 2: the first password value that SIM is obtained after encrypting the encrypted message stored using itself to the first cryptographic Hash
And it is sent to SE;
Specifically, SIM encrypts Ra, Rb and H using the encrypted message of preset algorithm and itself storage, obtain
Data ', and Data ' is sent to SE.
Step 3: first password value is decrypted using the encrypted message that itself is stored, the first random number, second are obtained
Random number and the first cryptographic Hash;
Specifically, SE decrypts Data ' using the encrypted message of preset algorithm and itself storage, Ra, Rb and H are obtained.
Step 4: SE, which carries out Hash operation to the sum of the first random number and the second random number, obtains the second cryptographic Hash.
Specifically, SE does Hash to Ra+Rb, H0 is obtained.
Step 5: judging whether the second cryptographic Hash is equal to the first cryptographic Hash, if so, step 6 is executed, if not, process
Terminate;
Specifically, indicating that interaction conscientiously fails if H0 is not equal to H, SE does not do any operation, and interactive authentication process is whole
Only.
Step 6: SE, which carries out Hash operation to the second random number, obtains third cryptographic Hash;
Specifically, SE does Hash to Rb, obtains H2 if H0 is equal to H.
Step 7: the second password value that SE is obtained after encrypting the encrypted message stored using itself to third cryptographic Hash returns
Back to SIM;
Specifically, SE encrypts H2 using the encrypted message of itself storage, Data0 ' is obtained, and Data0 ' is returned to SIM.
Step 8: the encrypted message that SIM is stored using itself is decrypted the second password value to obtain third cryptographic Hash;
Specifically, SIM card decrypts Data0 ' using the encrypted message of itself storage, H2 is obtained.
Step 9: SIM, which carries out Hash operation to the second random number, obtains the 4th cryptographic Hash;
Specifically, SIM card carries out Hash operation to the Rb of storage, H3 is obtained.
Step 10: SIM judges whether the 4th cryptographic Hash is equal to third cryptographic Hash, if so, step step 11 is executed, it is no
Then, process terminates.
Step 11: determining interactive authentication success.
Specifically, indicating interactive authentication success, SIM is transferred to normal operating conditions, and provides a user if H2 is equal to H3
The communication services such as short message is sended and received, dials and receives calls;If H2 is not equal to H3, indicate that interactive authentication unsuccessfully loses
It loses, SIM forbids active user to use, and does not provide a user the communication services such as short message and call.
In order to further increase the safety of the data information stored in terminal device, in the embodiment of the present invention, terminal is set
It is also equipped with fingerprint authentication module in standby, and the finger print information of legitimate user is stored in advance in SE.In this way, when terminal device into
Before entering working condition, such as in terminal device enter working condition after starting up, or is transferred to from suspend mode/standby mode
Working condition or before being transferred to working condition from screen lock state, can with the following steps are included:
Step 1: obtaining the finger print information of active user;
Step 2: whether consistent, if unanimously, executed if comparing the finger print information stored in the finger print information and SE of acquisition
Step 3, if it is inconsistent, executing step 4;
Step 3: terminal device is allowed to enter working condition, process terminates;
Step 4: terminal device is forbidden to enter working condition.
When it is implemented, obtaining the finger print information of user in user's initial start-up fingerprint authentication function and being stored in SE
In.
Based on the same inventive concept, a kind of terminal device is additionally provided in the embodiment of the present invention, since equipment solution is asked
The principle of topic is similar to the method for data information security in protection terminal device, therefore the implementation of the equipment may refer to method
Implement, overlaps will not be repeated.
As shown in Fig. 2, being the structural schematic diagram of terminal device provided in an embodiment of the present invention, it is provided in the terminal device
Safety element 21, and client identification module 22 is installed, wherein client identification module 22 is used to start or power in reset and open
When dynamic, certification is interacted with safety element 21;After determining interactive authentication success, into normal operating conditions.
When it is implemented, client identification module 22 is specifically used in initial start-up, pass through the operating system of terminal device
Obtain the encrypted message of user's input;And the encrypted message of safety element 21 is notified by operating system;Safety element 21 is used for
Store the encrypted message.
Preferably, client identification module 22 is specifically used for obtaining the encrypted message of user's input: client according to following procedure
Identification module 22 obtains the Old Password information and new password information of user's input by the operating system of terminal device respectively;If obtaining
When the Old Password information taken is consistent with the encrypted message that itself is stored, determine that new password information is the encrypted message obtained;And benefit
The encrypted message of itself storage is replaced with new password information.
When it is implemented, client identification module 22 can be used for generating the first random number and the second random number, and to first
The sum of random number and the second random number carry out Hash operation and obtain the first cryptographic Hash;And the encrypted message pair of itself storage will be utilized
The first password value that obtains after first cryptographic Hash encryption is simultaneously sent to safety element 21;And receiving safety element 21
After the second password value returned, the second password value is decrypted to obtain the third Kazakhstan using the encrypted message of itself storage
Uncommon value;And Hash operation is carried out to the second random number and obtains the 4th cryptographic Hash;If the 4th cryptographic Hash is equal to third cryptographic Hash, determine
Interactive authentication success, otherwise, it determines interactive authentication fails;Safety element 21 can be used for after receiving first password value,
The first password value is decrypted in the encrypted message stored using itself, obtains the first random number, the second random number and the
One cryptographic Hash;Hash operation is carried out to the sum of the first random number and the second random number and obtains the second cryptographic Hash;If the second cryptographic Hash
Not equal to the first cryptographic Hash, interactive authentication process is terminated;If the second cryptographic Hash is equal to first cryptographic Hash, to the second random number
It carries out Hash operation and obtains third cryptographic Hash;And using the encrypted message of itself storage to the obtained after the encryption of third cryptographic Hash
Two password values return to client identification module 22.
Preferably, can also include fingerprint authentication module 23 in terminal device provided in an embodiment of the present invention, and in safety
The finger print information of legitimate user is stored in advance in element 21.Based on this, fingerprint authentication module 23 is used to enter work in terminal device
Before making state, the finger print information of active user is obtained;If pre-stored finger in the finger print information and safety element 21 that obtain
When line information is consistent, terminal device is allowed to enter working condition.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (6)
1. a kind of method of data information security in protection terminal device, which is characterized in that be provided with peace in the terminal device
The client identification module SIM installed in full element SE, the SE and the terminal device is bound;And
The method, comprising:
The SIM interacts certification with the SE when resetting starting or electrifying startup;
After the SIM determines interactive authentication success, into normal operating conditions;
The SIM and SE is bound according to following procedure:
The SIM obtains the encrypted message of user's input by the operating system of the terminal device and deposits in initial start-up
Storage;The encrypted message that the SIM notifies the SE to obtain by the operating system;The SE stores the encrypted message;
The SIM and SE interacts certification according to following procedure:
The SIM generates the first random number and the second random number, and carries out to the sum of first random number and second random number
Hash operation obtains the first cryptographic Hash;After the SIM will encrypt first cryptographic Hash using the encrypted message of itself storage
Obtained first password value is simultaneously sent to the SE;The SE using itself storage encrypted message to the first password value into
Row decryption, obtains first random number, the second random number and the first cryptographic Hash;The SE is to first random number and second
The sum of random number carries out Hash operation and obtains the second cryptographic Hash;If second cryptographic Hash is not equal to first cryptographic Hash, eventually
The only interactive authentication process;If second cryptographic Hash is equal to first cryptographic Hash, the SE is to second random number
It carries out Hash operation and obtains third cryptographic Hash;The SE will encrypt the third cryptographic Hash using the encrypted message of itself storage
The second password value obtained afterwards returns to the SIM;The SIM is using the encrypted message of itself storage to second password value
It is decrypted to obtain the third cryptographic Hash;The SIM carries out Hash operation to second random number and obtains the 4th cryptographic Hash;
If the 4th cryptographic Hash is equal to third cryptographic Hash, interactive authentication success is determined, otherwise, it determines interactive authentication fails.
2. the method as described in claim 1, which is characterized in that the SIM obtains the password that user inputs according to following procedure
Information simultaneously stores:
The SIM obtains the Old Password information and new password information of user's input by the operating system respectively;
If the Old Password information is consistent with the encrypted message that itself is stored, determine that the new password information is the password obtained
Information;And
The encrypted message of itself storage is replaced using the new password information.
3. method according to claim 1 or 2, which is characterized in that it is also equipped with fingerprint authentication module in the terminal device,
And the finger print information of legitimate user is stored in advance in the SE;And
Before the terminal device enters working condition, the method, further includes:
Obtain the finger print information of active user;
If the finger print information obtained is consistent with finger print information pre-stored in the SE, the terminal device is allowed to enter work
Make state.
4. a kind of terminal device, which is characterized in that be provided with safety element SE in the terminal device and be equipped with client's identification
Module SIM, the SE and the SIM binding, in which:
The SIM, for interacting certification with the SE when resetting starting or electrifying startup;Determine interactive authentication at
After function, into normal operating conditions;
The SIM is specifically used in initial start-up, and the password of user's input is obtained by the operating system of the terminal device
Information;And encrypted message described in the SE is notified by the operating system;
The SE, for storing the encrypted message;
The SIM is specifically used for generating the first random number and the second random number, and to first random number and the second random number
The sum of carry out Hash operation obtain the first cryptographic Hash;And first cryptographic Hash will be encrypted using the encrypted message of itself storage
The first password value that obtains afterwards is simultaneously sent to the SE;And after receiving the second password value that the SE is returned, utilize
The encrypted message of itself storage is decrypted to obtain third cryptographic Hash to second password value;And to second random number into
Row Hash operation obtains the 4th cryptographic Hash;If the 4th cryptographic Hash is equal to third cryptographic Hash, interactive authentication success is determined, otherwise, really
Determine interactive authentication failure;
The SE, specifically for after receiving the first password value, using the encrypted message of itself storage to described the
One password value is decrypted, and obtains first random number, the second random number and the first cryptographic Hash;To first random number and
The sum of second random number carries out Hash operation and obtains the second cryptographic Hash;If second cryptographic Hash is not equal to first Hash
Value, terminates the interactive authentication process;If second cryptographic Hash be equal to first cryptographic Hash, to second random number into
Row Hash operation obtains third cryptographic Hash;And obtained after being encrypted using the encrypted message of itself storage to the third cryptographic Hash
Second password value returns to the SIM.
5. terminal device as claimed in claim 4, which is characterized in that
The SIM, specifically for obtaining encrypted message and the storage of user's input according to following procedure: the SIM passes through described
Operating system obtains the Old Password information and new password information of user's input respectively;If the Old Password information and itself storage
When encrypted message is consistent, determine that the new password information is the encrypted message obtained;And certainly using new password information replacement
The encrypted message of body storage.
6. terminal device as described in claim 4 or 5, which is characterized in that be also equipped with fingerprint authentication in the terminal device
The finger print information of legitimate user is stored in advance in the SE for module;
The fingerprint authentication module, the fingerprint for before the terminal device enters working condition, obtaining active user are believed
Breath;If the finger print information obtained is consistent with the pre-stored finger print information of the SE, the terminal device is allowed to enter work
State.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410145356.4A CN104980913B (en) | 2014-04-08 | 2014-04-08 | Protect the method and terminal device of data information security in terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410145356.4A CN104980913B (en) | 2014-04-08 | 2014-04-08 | Protect the method and terminal device of data information security in terminal device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104980913A CN104980913A (en) | 2015-10-14 |
CN104980913B true CN104980913B (en) | 2019-01-01 |
Family
ID=54276888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410145356.4A Active CN104980913B (en) | 2014-04-08 | 2014-04-08 | Protect the method and terminal device of data information security in terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104980913B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107992729A (en) * | 2016-10-26 | 2018-05-04 | 中国移动通信有限公司研究院 | A kind of control method, terminal and subscriber identification module card |
CN112800489B (en) * | 2021-02-07 | 2023-12-26 | 北京中电华大电子设计有限责任公司 | SE-based high-security fingerprint module software implementation method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101102574A (en) * | 2007-08-14 | 2008-01-09 | 华为技术有限公司 | Terminal verification method and device |
CN101330387A (en) * | 2008-07-24 | 2008-12-24 | 深圳华为通信技术有限公司 | Method for authentication of machine card, communication apparatus and authentication system |
CN101568119A (en) * | 2008-04-24 | 2009-10-28 | 鸿富锦精密工业(深圳)有限公司 | Mobile terminal with antitheft function and antitheft method thereof |
CN101789988A (en) * | 2009-12-29 | 2010-07-28 | 闻泰集团有限公司 | Method for realizing binding of mobile phone and SIM card |
-
2014
- 2014-04-08 CN CN201410145356.4A patent/CN104980913B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101102574A (en) * | 2007-08-14 | 2008-01-09 | 华为技术有限公司 | Terminal verification method and device |
CN101568119A (en) * | 2008-04-24 | 2009-10-28 | 鸿富锦精密工业(深圳)有限公司 | Mobile terminal with antitheft function and antitheft method thereof |
CN101330387A (en) * | 2008-07-24 | 2008-12-24 | 深圳华为通信技术有限公司 | Method for authentication of machine card, communication apparatus and authentication system |
CN101789988A (en) * | 2009-12-29 | 2010-07-28 | 闻泰集团有限公司 | Method for realizing binding of mobile phone and SIM card |
Also Published As
Publication number | Publication date |
---|---|
CN104980913A (en) | 2015-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11877213B2 (en) | Methods and systems for asset obfuscation | |
CN111756533B (en) | System, method and storage medium for secure password generation | |
EP3146747B1 (en) | Offline authentication | |
US8850218B2 (en) | OTP generation using a camouflaged key | |
US10771455B2 (en) | System and method for enabling secure authentication | |
US20150310427A1 (en) | Method, apparatus, and system for generating transaction-signing one-time password | |
CN109039652B (en) | Digital certificate generation and application method | |
US20230125083A1 (en) | Blockchain data access authorization method, apparatus, and device | |
CN108496323B (en) | Certificate importing method and terminal | |
CN104125064B (en) | A kind of dynamic cipher authentication method, client and Verification System | |
CN110326011B (en) | Determining legal conditions at a computing device | |
CN111181960A (en) | Safety credit granting and signature system based on terminal equipment block chain application | |
EP3340094B1 (en) | Method for renewal of cryptographic whiteboxes under binding of new public key and old identifier | |
CN104980913B (en) | Protect the method and terminal device of data information security in terminal device | |
CN110313005B (en) | Security architecture for device applications | |
KR101604459B1 (en) | Method, apparatus and system for generating transaction related otp | |
CN107947934A (en) | The fingerprint recognition Verification System and method of mobile terminal based on banking system | |
KR20100114796A (en) | Method of controlling financial transaction by financial transaction device and computing device | |
Sun | A survey of payment token vulnerabilities towards stronger security with fingerprint based encryption on Samsung Pay | |
CN105406963B (en) | Encryption method, encryption device and the decryption method of user account, decryption device | |
US20210240813A1 (en) | Mutual Authentication of a User-Controllable Device or System Containing Sensitive or Confidential Data | |
CN103544418A (en) | Authentication device, system and method based on electronic transaction | |
CN117828603A (en) | Mobile terminal operating system information protection method based on hardware certificate | |
CN117034250A (en) | Password processing method and device, nonvolatile storage medium and electronic equipment | |
Kowalski et al. | CRYPTOSMART CARD 5.0 SECURITY TARGET |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |