CN105512536A - Resource transfer method based on security certification - Google Patents

Resource transfer method based on security certification Download PDF

Info

Publication number
CN105512536A
CN105512536A CN201410539220.1A CN201410539220A CN105512536A CN 105512536 A CN105512536 A CN 105512536A CN 201410539220 A CN201410539220 A CN 201410539220A CN 105512536 A CN105512536 A CN 105512536A
Authority
CN
China
Prior art keywords
resource
infoa
resource transfers
information
infoc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410539220.1A
Other languages
Chinese (zh)
Inventor
严翔翔
周钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201410539220.1A priority Critical patent/CN105512536A/en
Priority to PCT/CN2015/091760 priority patent/WO2016058508A1/en
Publication of CN105512536A publication Critical patent/CN105512536A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a resource transfer method based on security certification, and the method comprises the steps that a resource transfer receiving side sends out a resource transfer request to a server of a resource transfer side; the resource transfer side server requests an identity certification server to verify validity of the resource transfer request; if the verification result is "valid", the resource transfer side can authorize a third party to transmit a to-be-transferred physical resource to an agent receiving side, and simultaneously transmit encrypted resource transfer information to a resource management terminal belonging to the agent receiving side; the resource management terminal verifies correctness of an transmitted address based on the encrypted resource transfer information; and the agent receiving side verifies an identity of the resource transfer receiving side and allows the resource transfer receiving side to take away the physical resource when the resource transfer receiving side passes identity certification. The resource transfer method disclosed by the invention can avoid potential security hazards.

Description

Based on the resource transfers method of safety certification
Technical field
The present invention relates to resource transfers method, more specifically, relate to the resource transfers method based on safety certification.
Background technology
At present, along with the becoming increasingly abundant of class of business of the increasingly extensive and different field of cyber-net application, the transfer (such as shopping at network process) carrying out resource by means of network becomes more and more important.
Existing to carry out the process of resource transfers by means of network as follows: user initiates physical resource transfer request by means of network; After described physical resource transfer request comes into force, the physical resource side of shifting out entrusts third party (such as express company) that physical resource to be transferred is delivered to physical resource take over party.
But, there are the following problems for existing technical scheme: (1) is owing to needing the privacy information (address, contact method etc. of such as physical resource take over party) inputting physical resource take over party when initiating physical resource transfer request, and the third party sending physical resource also needs to know above-mentioned privacy information, therefore has great potential safety hazard; (2) due to receive physical resource physical resource take over party link in there is no reliable authentication procedures, therefore there is wrong sending out and risk that physical resource is falsely taken.
Therefore, there is following demand: provide the resource transfers method based on safety certification can avoiding potential potential safety hazard.
Summary of the invention
In order to solve the problem existing for above-mentioned prior art, the present invention proposes the resource transfers method based on safety certification can avoiding potential potential safety hazard.
The object of the invention is to be achieved through the following technical solutions:
Based on a resource transfers method for safety certification, the described resource transfers method based on safety certification comprises the following steps:
(A1) resource transfers take over party sends resource transfers request via network to the resource side of shifting out server, and described resource transfers request comprises resource transfers information;
(A2) the described resource side of shifting out server request Authentication server verifies the validity of described resource transfers request, and described Authentication server returns the result thereupon and returns encrypted resource transfers information when the result is " effectively " simultaneously;
(A3) if described the result is " effectively ", what then the resource side of shifting out entrusted third party to be delivered to by physical resource to be transferred to indicate in described resource transfers information acts on behalf of take over party, describedly acts on behalf of in the resource management terminal of take over party by described encrypted resource transfers information delivery to belonging to simultaneously;
(A4) the described resource management terminal correctness of address of sending based on described encrypted resource transfers Information Authentication, and only receive sent physical resource when the address of sending is correct;
(A5) between the smart card held by described resource management terminal and resource transfers take over party of the described take over party of agency, the identity of described resource transfers take over party is verified in data interaction, and only takes described physical resource in authentication away by rear permission described resource transfers take over party.
In scheme disclosed above, preferably, described resource transfers information comprises resource information infoA to be transferred, resource transfers take over party privacy information infoB, address information infoC.
In scheme disclosed above, preferably, described resource management terminal and described Authentication server use the first enciphering and deciphering algorithm KeyXY to carry out encryption and decryption to data jointly, and described smart card and described Authentication server use the second enciphering and deciphering algorithm KeyXZ to carry out encryption and decryption to data jointly.
In scheme disclosed above, preferably, described step (A2) comprises further: the first enciphering and deciphering algorithm KeyXY that the resource management terminal acting on behalf of take over party corresponding to the address information infoC in the second enciphering and deciphering algorithm KeyXZ that the smart card that described Authentication server is held based on resource transfers take over party described in described resource transfers information searching uses and described resource transfers information uses, and adopts following expression to generate described encrypted resource transfers information:
E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))。
In scheme disclosed above, preferably, described step (A4) comprises further:
(1) described resource management terminal uses following expression to decipher the encrypted resource transfers information received:
D(KeyXY)(E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))),
To obtain
infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC));
(2) whether described resource management terminal authentication address information infoC is consistent with self current address, and if consistent, then determine that the address of sending correctly and preserve infoA, infoB and E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)), if and inconsistent, then the address of reminding the described third-party person of sending to send is incorrect.
In scheme disclosed above, preferably, described step (A5) comprises further: (1) described resource transfers take over party sets up data transmission channel between held smart card and described resource management terminal; (2) described resource management terminal reads resource transfers take over party privacy information infoB from described smart card, and by read resource transfers take over party privacy information compared with the resource transfers take over party privacy information infoB stored, if both are consistent, then stored cipher-text information E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)) is sent to described smart card; (3) described smart card uses the cipher-text information that following expression deciphering receives: D (KeyXZ) (E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC))), to obtain infoA+infoB+E (KeyXY) (infoA+infoC); (4) described smart card is by compared with the infoB information of infoB and described smart card self that decrypts, and if both are consistent, then send application extracts physical Resource Commands to described resource management terminal and E (KeyXY) (infoA+infoC) is sent back described resource management terminal as authorization information, if and both are inconsistent, then described resource transfers take over party is pointed out to refuse to take described physical resource away; (5) described resource management terminal performs following operation after receiving described application extracts physical Resource Commands and described authorization information successively: use expression formula D (KeyXY) (E (KeyXY) (infoA+infoC)) to decipher described authorization information; The infoA+infoC decrypted is compared with infoA with the infoC information stored, if all consistent, then the authentication of described resource transfers take over party is passed through and is allowed described resource transfers take over party to take described physical resource away, otherwise, refuse described resource transfers take over party and take described physical resource away
Resource transfers method based on safety certification disclosed in this invention has the following advantages: (1) has higher security; (2) due to receive physical resource physical resource take over party link in implement reliable authentication procedures, therefore wrong sending out and/or risk that physical resource is falsely taken can be avoided.
Accompanying drawing explanation
By reference to the accompanying drawings, technical characteristic of the present invention and advantage will be understood better by those skilled in the art, wherein:
Fig. 1 is according to an embodiment of the invention based on the process flow diagram of the resource transfers method of safety certification.
Embodiment
Fig. 1 is according to an embodiment of the invention based on the process flow diagram of the resource transfers method of safety certification.As shown in Figure 1, resource transfers method based on safety certification disclosed in this invention comprises the following steps: that (A1) resource transfers take over party sends resource transfers request via network to the resource side of shifting out server, and described resource transfers request comprises resource transfers information; (A2) the described resource side of shifting out server request Authentication server verifies the validity of described resource transfers request, and described Authentication server returns the result thereupon and returns encrypted resource transfers information when the result is " effectively " simultaneously; (A3) if described the result is " effectively ", what then the resource side of shifting out entrusted third party to be delivered to by physical resource to be transferred to indicate in described resource transfers information acts on behalf of take over party, describedly acts on behalf of in the resource management terminal of take over party by described encrypted resource transfers information delivery to belonging to simultaneously; (A4) the described resource management terminal correctness of address of sending based on described encrypted resource transfers Information Authentication, and only receive sent physical resource when the address of sending is correct; (A5) between the smart card held by described resource management terminal and resource transfers take over party of the described take over party of agency, the identity of described resource transfers take over party is verified in data interaction, and only takes described physical resource in authentication away by rear permission described resource transfers take over party.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described resource transfers information comprises resource information infoA to be transferred, resource transfers take over party privacy information infoB, address information infoC.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described resource management terminal and described Authentication server use the first enciphering and deciphering algorithm KeyXY to carry out encryption and decryption to data jointly, and described smart card and described Authentication server use the second enciphering and deciphering algorithm KeyXZ to carry out encryption and decryption to data jointly.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described first enciphering and deciphering algorithm KeyXY and described second enciphering and deciphering algorithm KeyXZ is determined when system initialization.
In the present patent application, expression formula E (KEY) (INFO) represents that use enciphering and deciphering algorithm KEY carrys out enciphered data INFO, and expression formula D (KEY) (INFO) represents that use enciphering and deciphering algorithm KEY carrys out data decryption INFO.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described step (A2) comprises further: the first enciphering and deciphering algorithm KeyXY that the resource management terminal acting on behalf of take over party corresponding to the address information infoC in the second enciphering and deciphering algorithm KeyXZ that the smart card that described Authentication server is held based on resource transfers take over party described in described resource transfers information searching uses and described resource transfers information uses, and adopts following expression to generate described encrypted resource transfers information:
E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))。
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described step (A4) comprises further:
(1) described resource management terminal uses following expression to decipher the encrypted resource transfers information received:
D(KeyXY)(E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))),
To obtain
infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC));
(2) whether described resource management terminal authentication address information infoC is consistent with self current address, and if consistent, then determine that the address of sending correctly and preserve infoA, infoB and E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)), if and inconsistent, then the address of reminding the described third-party person of sending to send is incorrect.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described step (A5) comprises further: (1) described resource transfers take over party sets up data transmission channel between held smart card and described resource management terminal; (2) described resource management terminal reads resource transfers take over party privacy information infoB from described smart card, and by read resource transfers take over party privacy information compared with the resource transfers take over party privacy information infoB stored, if both are consistent, then stored cipher-text information E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)) is sent to described smart card; (3) described smart card uses the cipher-text information that following expression deciphering receives: D (KeyXZ) (E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC))), to obtain infoA+infoB+E (KeyXY) (infoA+infoC); (4) described smart card is by compared with the infoB information of infoB and described smart card self that decrypts, and if both are consistent, then send application extracts physical Resource Commands to described resource management terminal and E (KeyXY) (infoA+infoC) is sent back described resource management terminal as authorization information, if and both are inconsistent, then described resource transfers take over party is pointed out to refuse to take described physical resource away; (5) described resource management terminal performs following operation after receiving described application extracts physical Resource Commands and described authorization information successively: use expression formula D (KeyXY) (E (KeyXY) (infoA+infoC)) to decipher described authorization information; The infoA+infoC decrypted is compared with infoA with the infoC information stored, if all consistent, then the authentication of described resource transfers take over party is passed through and is allowed described resource transfers take over party to take described physical resource away, otherwise, refuse described resource transfers take over party and take described physical resource away.
Preferably, disclosed in this invention based in the resource transfers method of safety certification, described encrypted resource transfers information delivery describedly can be acted on behalf of in the resource management terminal of take over party to belonging in any one mode in following by described third party: text, Quick Response Code, exterior storage medium (storer in such as USB flash disk, mobile phone etc.).
Therefore the resource transfers method based on safety certification disclosed in this invention has following advantages: (1) has higher security; (2) due to receive physical resource physical resource take over party link in implement reliable authentication procedures, therefore wrong sending out and/or risk that physical resource is falsely taken can be avoided.
Although the present invention is described by above-mentioned preferred implementation, its way of realization is not limited to above-mentioned embodiment.Should be realized that: when not departing from purport of the present invention and scope, those skilled in the art can make different changes and amendment to the present invention.

Claims (6)

1., based on a resource transfers method for safety certification, the described resource transfers method based on safety certification comprises the following steps:
(A1) resource transfers take over party sends resource transfers request via network to the resource side of shifting out server, and described resource transfers request comprises resource transfers information;
(A2) the described resource side of shifting out server request Authentication server verifies the validity of described resource transfers request, and described Authentication server returns the result thereupon and returns encrypted resource transfers information when the result is " effectively " simultaneously;
(A3) if described the result is " effectively ", what then the resource side of shifting out entrusted third party to be delivered to by physical resource to be transferred to indicate in described resource transfers information acts on behalf of take over party, describedly acts on behalf of in the resource management terminal of take over party by described encrypted resource transfers information delivery to belonging to simultaneously;
(A4) the described resource management terminal correctness of address of sending based on described encrypted resource transfers Information Authentication, and only receive sent physical resource when the address of sending is correct;
(A5) between the smart card held by described resource management terminal and resource transfers take over party of the described take over party of agency, the identity of described resource transfers take over party is verified in data interaction, and only takes described physical resource in authentication away by rear permission described resource transfers take over party.
2. the resource transfers method based on safety certification according to claim 1, is characterized in that, described resource transfers information comprises resource information infoA to be transferred, resource transfers take over party privacy information infoB, address information infoC.
3. the resource transfers method based on safety certification according to claim 2, it is characterized in that, described resource management terminal and described Authentication server use the first enciphering and deciphering algorithm KeyXY to carry out encryption and decryption to data jointly, and described smart card and described Authentication server use the second enciphering and deciphering algorithm KeyXZ to carry out encryption and decryption to data jointly.
4. the resource transfers method based on safety certification according to claim 3, it is characterized in that, described step (A2) comprises further: the first enciphering and deciphering algorithm KeyXY that the resource management terminal acting on behalf of take over party corresponding to the address information infoC in the second enciphering and deciphering algorithm KeyXZ that the smart card that described Authentication server is held based on resource transfers take over party described in described resource transfers information searching uses and described resource transfers information uses, and adopts following expression to generate described encrypted resource transfers information:
E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))。
5. the resource transfers method based on safety certification according to claim 4, is characterized in that, described step (A4) comprises further:
(1) described resource management terminal uses following expression to decipher the encrypted resource transfers information received:
D(KeyXY)(E(KeyXY)(infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC)))),
To obtain
infoA+infoB+infoC+E(KeyXZ)(infoA+infoB+E(KeyXY)(infoA+infoC));
(2) whether described resource management terminal authentication address information infoC is consistent with self current address, and if consistent, then determine that the address of sending correctly and preserve infoA, infoB and E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)), if and inconsistent, then the address of reminding the described third-party person of sending to send is incorrect.
6. the resource transfers method based on safety certification according to claim 5, it is characterized in that, described step (A5) comprises further: (1) described resource transfers take over party sets up data transmission channel between held smart card and described resource management terminal; (2) described resource management terminal reads resource transfers take over party privacy information infoB from described smart card, and by read resource transfers take over party privacy information compared with the resource transfers take over party privacy information infoB stored, if both are consistent, then stored cipher-text information E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC)) is sent to described smart card; (3) described smart card uses the cipher-text information that following expression deciphering receives: D (KeyXZ) (E (KeyXZ) (infoA+infoB+E (KeyXY) (infoA+infoC))), to obtain infoA+infoB+E (KeyXY) (infoA+infoC); (4) described smart card is by compared with the infoB information of infoB and described smart card self that decrypts, and if both are consistent, then send application extracts physical Resource Commands to described resource management terminal and E (KeyXY) (infoA+infoC) is sent back described resource management terminal as authorization information, if and both are inconsistent, then described resource transfers take over party is pointed out to refuse to take described physical resource away; (5) described resource management terminal performs following operation after receiving described application extracts physical Resource Commands and described authorization information successively: use expression formula D (KeyXY) (E (KeyXY) (infoA+infoC)) to decipher described authorization information; The infoA+infoC decrypted is compared with infoA with the infoC information stored, if all consistent, then the authentication of described resource transfers take over party is passed through and is allowed described resource transfers take over party to take described physical resource away, otherwise, refuse described resource transfers take over party and take described physical resource away.
CN201410539220.1A 2014-10-14 2014-10-14 Resource transfer method based on security certification Pending CN105512536A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410539220.1A CN105512536A (en) 2014-10-14 2014-10-14 Resource transfer method based on security certification
PCT/CN2015/091760 WO2016058508A1 (en) 2014-10-14 2015-10-12 Resource transfer method based on security authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410539220.1A CN105512536A (en) 2014-10-14 2014-10-14 Resource transfer method based on security certification

Publications (1)

Publication Number Publication Date
CN105512536A true CN105512536A (en) 2016-04-20

Family

ID=55720511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410539220.1A Pending CN105512536A (en) 2014-10-14 2014-10-14 Resource transfer method based on security certification

Country Status (2)

Country Link
CN (1) CN105512536A (en)
WO (1) WO2016058508A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255828A (en) * 2011-06-30 2011-11-23 秦斌 Mail information processing device and method thereof
CN103530753A (en) * 2013-10-21 2014-01-22 北京邮电大学 Informatization express method capable of protecting privacy of client
CN103607371A (en) * 2013-07-02 2014-02-26 燕山大学 Method for protecting Internet user privacy through third-party platform
CN103869785A (en) * 2014-03-21 2014-06-18 广州物联家信息科技股份有限公司 Storage box controlling method and system in digital and intelligent home furnishing
CN103971215A (en) * 2014-01-22 2014-08-06 浙江大学 Implementing method for urban intelligent express system and intelligent express cabinets
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7747856B2 (en) * 2002-07-26 2010-06-29 Computer Associates Think, Inc. Session ticket authentication scheme
CN102195943B (en) * 2010-03-12 2014-11-26 中国银联股份有限公司 Safety information interaction method and system
CN103516687B (en) * 2012-06-27 2016-08-17 中国银联股份有限公司 Security information interaction system, Apparatus and method for
CN105023134A (en) * 2012-09-05 2015-11-04 北京京东世纪贸易有限公司 Locker terminal, automatic distribution method and automatic distribution system
CN103854180B (en) * 2012-12-05 2017-04-19 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255828A (en) * 2011-06-30 2011-11-23 秦斌 Mail information processing device and method thereof
CN103607371A (en) * 2013-07-02 2014-02-26 燕山大学 Method for protecting Internet user privacy through third-party platform
CN103530753A (en) * 2013-10-21 2014-01-22 北京邮电大学 Informatization express method capable of protecting privacy of client
CN103971215A (en) * 2014-01-22 2014-08-06 浙江大学 Implementing method for urban intelligent express system and intelligent express cabinets
CN103869785A (en) * 2014-03-21 2014-06-18 广州物联家信息科技股份有限公司 Storage box controlling method and system in digital and intelligent home furnishing
CN104036378A (en) * 2014-06-24 2014-09-10 吉安市综合物流中心有限公司 Logistics blind conveying system

Also Published As

Publication number Publication date
WO2016058508A1 (en) 2016-04-21

Similar Documents

Publication Publication Date Title
US10733603B2 (en) Method and apparatus for facilitating electronic payments using a wearable device
US10666428B2 (en) Efficient methods for protecting identity in authenticated transmissions
US11102007B2 (en) Contactless card emulation system and method
US20190173873A1 (en) Identity verification document request handling utilizing a user certificate system and user identity document repository
US20190251561A1 (en) Verifying an association between a communication device and a user
EP2961094A1 (en) System and method for generating a random number
CN105790938A (en) System and method for generating safety unit key based on reliable execution environment
WO2012155644A1 (en) Bill entrustment payment management method, device, and system
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
WO2017190633A1 (en) Method and device for reliably verifying identity of financial card user
CN103701757A (en) Identity authentication method and system for service access
CN104050431A (en) Self-signing method and self-signing device for RFID chips
US20170257213A1 (en) Method and Apparatus for Managing Application Identifier
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN102263792A (en) Wireless security key equipment, electronic commerce service system and method
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
WO2017044677A1 (en) Method and apparatus for facilitating electronic payments using a wearable device
US9792607B2 (en) System and method for mobile pin synchronization
KR20170042392A (en) Method for Providing Mobile Payment Service by Using Account Information
CN104506509A (en) Multifunctional security authentication terminal and authentication method based on terminal
KR102053993B1 (en) Method for Authenticating by using Certificate
CN103929722A (en) Short message encryption method and system
CN105512536A (en) Resource transfer method based on security certification
CN103544418A (en) Authentication device, system and method based on electronic transaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160420

RJ01 Rejection of invention patent application after publication