CN105634746B - The method for anti-counterfeit of SFP optical module - Google Patents

The method for anti-counterfeit of SFP optical module Download PDF

Info

Publication number
CN105634746B
CN105634746B CN201610173235.XA CN201610173235A CN105634746B CN 105634746 B CN105634746 B CN 105634746B CN 201610173235 A CN201610173235 A CN 201610173235A CN 105634746 B CN105634746 B CN 105634746B
Authority
CN
China
Prior art keywords
optical module
byte
verification
operational order
check byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610173235.XA
Other languages
Chinese (zh)
Other versions
CN105634746A (en
Inventor
范巍
李平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ATOP Corp
Original Assignee
ATOP Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ATOP Corp filed Critical ATOP Corp
Priority to CN201610173235.XA priority Critical patent/CN105634746B/en
Publication of CN105634746A publication Critical patent/CN105634746A/en
Application granted granted Critical
Publication of CN105634746B publication Critical patent/CN105634746B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention discloses a kind of method for anti-counterfeit of SFP optical module, it is verified after optical module is inserted into terminal device by data communication between the two with the true and false to optical module manufacturer's information, it include: to set validation region for continuous at least six byte in the user self-defined area of the address SFP optical module internal register A2H;Read the sequence number of specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H, computations are carried out to obtain the first check byte of 4 bytes, and after first check byte is written to cryptographic check byte area, the terminal device uses verification method same as described above to obtain the second check byte of 4 bytes, carry out verification judgement with the first check byte, with determine its whether by verifying determination optical module manufacturer's information the true and false.The present invention is also provided by a kind of method for anti-counterfeit of SFP optical module, can effectively achieve the purpose that anti-fake.

Description

The method for anti-counterfeit of SFP optical module
Technical field
The present invention relates to a kind of method for anti-counterfeit under optical module service condition.It is more particularly related to a kind of The method for anti-counterfeit of SFP optical module under SFP optical module service condition.
Background technique
SFP (Small Form-Factor Pluggable transceiver) optical module, which is that one kind is small-sized, hot to be inserted The optical transceiver pulled out, for optical communication applications in telecommunications and data communication.One distinguishing feature of SFP optical module is can to protect In the case of holding equipment is powered, module is plugged, and the application of this hot-swappable technology is so that optical module is being applied and cut More easily it can install and use during changing.But another hidden danger is brought while being convenient for changing, if operator exists Replace module when using informal producer dispatch from the factory product, not only compromise producer's interests, more seriously product quality without Method guarantees, or even the unstable risk of system occurs.
And now there are two types of common optical module method for anti-counterfeit: first is that sticking antifalsification label in module, (such as laser is anti- Pseudo label), the true and false is mainly differentiated by way of range estimation;Second is that device manufacturer and optical module manufacturer negotiate, in inside modules The method of fixed value is written in self defined area in register EEPROM to be verified.Its groundwork mode is module When being inserted into equipment, equipment first reads specified region and is verified, detect the value in self defined area and preset it is identical then after Continuous to use, on the contrary then judgement is illegally.
And all there is corresponding defect in these prevention methods, as antifalsification label to crack difficulty relatively low, pass through forgery Or it directly buys antifalsification label and can be realized and mix the spurious with the genuine;And the method for specifying region write-in preset value in module, by original The EEPROM of factory's module is analyzed, it has also been discovered that it is regular, cracking also is matter of time.
Summary of the invention
It is excellent it is an object of the invention to solve at least the above problems and/or defect, and provide at least to will be described later Point.
A further object of the invention is to use equipment and light by providing a kind of method for anti-counterfeit of SFP optical module The mode of the multiple authentication of module both sides, and by customized verification method, it can effectively solve existing anti-counterfeiting technology and be easy The shortcomings that forgery, achievees the purpose that anti-fake.
In order to realize these purposes and other advantages according to the present invention, provides, be inserted into terminal device in optical module It is verified afterwards by data communication between the two with the true and false to optical module manufacturer's information, comprising:
The setting of validation region will be continuous in the user self-defined area of the address SFP optical module internal register A2H At least four byte is set as cryptographic check byte area;
Computations, the optical module read specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H Sequence number, carry out computations to obtain the first check byte of 4 bytes, and first check byte be written to encryption Check byte region;
Verification, the terminal device use encryption computing method same as described above to obtain the second check word of 4 bytes Section, and then verification judgement is carried out with the first check byte, to determine whether to determine optical module manufacturer's information by verifying The true and false.
Preferably, wherein the setting of the validation region further includes the fixed value verification region of 2 bytes and 2 words The operational order byte area of section, and the operational order byte area and fixed value verification region are successively set on encryption school It tests before byte area.
Preferably, wherein before the computations, the terminal device is primarily based on the fixed value from optical module The data read in verification zone bit are judged to determine whether that operational order byte area is write based on judging result Enter one first pre-set commands.
Preferably, wherein in computations, the optical module based on whether the first pre-set commands detected, with Determine whether to carry out computations.
Preferably, wherein in computations, first check byte is being written to encryption school by the optical module After testing byte area, one second pre-set commands are written to the operational order byte area.
Preferably, wherein multiple summation, remainder can be used, in XOR operation in the encryption computing method of the optical module Any one form of calculation to realize.
Preferably, wherein in verification, the terminal device is based on after computations obtain the second check byte The second pre-set commands read from operational order byte area carry out verification judgement with the first check byte, to determine that it is The no true and false that optical module manufacturer's information is determined by verifying.
Preferably, wherein in verification, the terminal device is based on the number read from operational order byte area According to being judged for the first time with whether the second pre-set commands are consistent, finished with determining whether optical module has calculated, if then carrying out down The verification of one step judges;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to light Whether module, which has calculated to finish, carries out secondary judgement.
Preferably, wherein in verification, the terminal device is in read operation command byte region in triplicate After data, data content is not inconsistent with the second pre-set commands still, then authentication failed.
Preferably, wherein in verification, the terminal device is based on read from operational order byte area First check byte is compared by two pre-set commands with the second check byte, if it is determined that result be it is consistent, then be verified, And then determine that optical module manufacturer's information is very, to set initial value for operational order byte area;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.
The present invention is include at least the following beneficial effects: method for anti-counterfeit of the invention, by being passed through using equipment and optical module Both sides repeatedly communicate to realize common verification, avoid the defect that previous unidirectional authentication is easy to crack, and the verification side of core Method uses the sequence number of optical module as basic data, and due to the uniqueness of sequence number, the check byte ultimately generated also has There is unique trait, and can also further expand as more complicated checking procedure, for example passes through repeatedly summation, remainder, exclusive or Operation, to reach safer verification purpose.
Further advantage, target and feature of the invention will be partially reflected by the following instructions, and part will also be by this The research and practice of invention and be understood by the person skilled in the art.
Detailed description of the invention
Fig. 1 is EEPROM schematic diagram as defined in SFF-8472 agreement;
Fig. 2 is that optical module powers on rear checking process figure in the method for anti-counterfeit of SFP optical module in one embodiment of the present of invention.
Specific embodiment
The present invention is described in further detail below, to enable those skilled in the art's refer to the instruction text being capable of evidence To implement.
It should be appreciated that such as " having ", "comprising" and " comprising " term used herein do not allot one or more The presence or addition of a other elements or combinations thereof.
A kind of way of realization of the method for anti-counterfeit of SFP optical module according to the present invention is inserted into terminal device in optical module It is verified afterwards by data communication between the two with the true and false to optical module manufacturer's information, including:
The setting of validation region will be continuous in the user self-defined area of the address SFP optical module internal register A2H At least four byte is set as cryptographic check byte area;
Computations, the optical module read specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H Sequence number, carry out computations to obtain the first check byte of 4 bytes, and first check byte be written to encryption Check byte region;
Verification, the terminal device use encryption computing method same as described above to obtain the second check word of 4 bytes Section, and then verification judgement is carried out with the first check byte, to determine whether to determine optical module manufacturer's information by verifying The true and false.As shown in Fig. 1, provided according to SFF-8472 agreement, the EEPROM of SFP optical module there are two the address I2C A0h and A2h, Each addressable address range in address is 0~255, i.e. 256 bytes.Wherein other than agreement provides the region occupied, Manufacturer can customize the 128-255 byte that there are the 96-127 byte of A0h, the 120-127 byte of A2h and A2h in the region used.It adopts It selects continuous region as validation region in the address A2H, while being made by the sequence number in specific region in optical module For basic data, the access and secondary computations of verifying computations and optical module are carried out convenient for optical module, due to optical mode The uniqueness of block sequence number, the check byte ultimately generated also have unique trait, so that it reaches safer anti-fake Purpose, having ensures product quality and the stable benefit of system.Also, this mode is a kind of saying for preferred embodiments Bright, however, it is not limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, the setting of the validation region further includes the fixed value verification region of 2 bytes and 2 words The operational order byte area of section, and the operational order byte area and fixed value verification region are successively set on encryption school It tests before byte area.It follows that present invention employs the regions of 8 bytes as validation region, the validation region quilt The 128-135 byte being set as in the address A2H;
Wherein, fixed value verification region is 128-129 byte, and its internal fixed value be arranged to " V " and " R ", corresponding ASCII value are respectively 0x56 and 0x52;
The operational order byte area is 130-131 byte, and the cryptographic check byte area is 132-135 byte, And the initial value of each byte is all set to 0X00 in the operational order byte area and cryptographic check byte area.
Therefore validation region of the 128-135 byte of A2h as 8 bytes, it is as shown in the table:
128 129 130 131 132 133 134 135
0x56 0x52 0x00 0x00 0x00 0x00 0x00 0x00
The verification region for being passed through 8 bytes using this scheme is fixed value verifying and verified with computations, to realize light Module is repeatedly communicated with terminal device and is verified, to realize the benefit of safer anti-fake purpose.Also, this mode is only It is a kind of explanation of preferred embodiments, however, it is not limited to this.In carrying out the present invention, it is appropriate to be carried out according to user's demand Substitutions and modifications.
In another example, before the computations, the terminal device is primarily based on the fixation from optical module The data read in value verification zone bit, are judged to determine whether operational order byte area based on judging result One first pre-set commands are written, first pre-set commands are arranged to 0XABBA, this is can to carry out replacement appropriate certainly. First time judgement is carried out by fixed value using this scheme, only it just carries out encrypted authentication after judging by fixed value, has The benefit for having implementable effect good.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this. In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in computations, the optical module based on whether the first pre-set commands detected, with Determine whether to carry out computations.Computations are made to be based on could be into after fixed value correct judgment using this scheme Row has the better benefit of implementable effect.Also, this mode is a kind of explanation of preferred embodiments, but not office It is limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in computations, first check byte is being written to encryption by the optical module Behind check byte region, one second pre-set commands are written to the operational order byte area, second pre-set commands are set It is set to 0XBABA, its role is to be distinguished with the first pre-set commands, and by being written into operational order byte area After second pre-set commands, just decide whether to carry out verification judgement.There is implementable effect using this scheme, good reliability Benefit.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this.In carrying out the present invention, may be used To carry out substitutions and modifications appropriate according to user's demand.
In another example, multiple summation, remainder is can be used, in XOR operation in the encryption computing method of the optical module Any one form of calculation to realize, to make it have more complicated verification effect, to reach safer anti-fake mesh , the sequence number is arranged to the 68-86 byte in the address A0H, then the form of calculation repeatedly summed can be set Are as follows:
A2h [132]=A0h [68]+A0h [72]+A0h [76]+A0h [80];
A2h [133]=A0h [69]+A0h [73]+A0h [77]+A0h [81];
A2h [134]=A0h [70]+A0h [74]+A0h [78]+A0h [82];
A2h [135]=A0h [71]+A0h [75]+A0h [79]+A0h [83];
Wherein, the 68-86 byte in the address A0H takes respective internal least-significant byte when carrying out summation computations It is added.Use this scheme to determine different computations forms according to different use needs and practical service environment, with tool There is the benefit of more preferable anti-fake purpose.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this. In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in verification, the terminal device is based on after computations obtain the second check byte The second pre-set commands read from operational order byte area carry out verification judgement with the first check byte, to determine that it is The no true and false that optical module manufacturer's information is determined by verifying.Make verification judgement have premise using this scheme, has Implementable effect is good, the benefit adaptable, antifalse effect is good.Also, this mode is a kind of saying for preferred embodiments Bright, however, it is not limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in verification, the terminal device is based on reading from operational order byte area Data are judged for the first time with whether the second pre-set commands are consistent, and are finished with determining whether optical module has calculated, if then carrying out The verification of next step judges;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to light Whether module, which has calculated to finish, carries out secondary judgement.Make verification judgement that must obtain the encryption based on optical module using this scheme It calculates after completing, with good, the adaptable benefit of implementable effect.Also, this mode is a kind of preferable reality The explanation of example, however, it is not limited to this.In carrying out the present invention, replacement appropriate can be carried out according to user's demand and is repaired Change.
In another example, in verification, the terminal device is in read operation command byte region in triplicate Data after, data content is not inconsistent with the second pre-set commands still, then authentication failed.Optical module is tested using this scheme Card number is defined, so that its verification time is controllable, the benefit with more good-looking exploitativeness.Also, this side Formula is a kind of explanation of preferred embodiments, and however, it is not limited to this.In carrying out the present invention, it can be carried out according to user's demand Substitutions and modifications appropriate.
In another example, in verification, the terminal device is based on reading from operational order byte area First check byte is compared by the second pre-set commands with the second check byte, if it is determined that result be it is consistent, then verifying is logical It crosses, and then determines that optical module manufacturer's information is very, to set initial value, such as 0X00 for operational order byte area;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.It enables it to complete using this scheme The matching of optical module and terminal device next time is verified, with the good benefit of implementable effect.Also, this mode is A kind of explanation of preferred embodiments, however, it is not limited to this.In carrying out the present invention, it can be carried out according to user's demand appropriate Substitutions and modifications.
The embodiment tested using the form of calculation of summation is as follows:
The setting of validation region: it is 128-129 byte that fixed value, which verifies region, and interior data content is arranged to fixed It is worth ' V ' and ' R ', corresponding ASCII value is respectively 0x56 and 0x52, and the data content in certain fixed value can also use it Data are replaced;
Operational order byte area is 130-131 byte, internal to input byte for store command, and initial value is 0x00;
Cryptographic check byte area is 132-135 byte, and internal for storing cryptographic check byte, initial value is not solid It is fixed, it can be arbitrary value.
Data flow of the optical module after insertion terminal device powers on is as shown in Fig. 2, its checking procedure is as follows:
1, the A2h 128-129 byte of equipment read module judges whether it is fixed value ' V ' and ' R ', is to continue;
2, A2h 130-131 byte writing commands 0xABBA of the equipment toward module;
3, module MCU detects that order is correct, according to 16 byte sequence numbers of A0h 68-83 byte, calculates 4 bytes Check byte, and A2h 132-135 byte is written, circular is as follows:
A2h [132]=A0h [68]+A0h [72]+A0h [76]+A0h [80] least-significant byte;
A2h [133]=A0h [69]+A0h [73]+A0h [77]+A0h [81] least-significant byte;
A2h [134]=A0h [70]+A0h [74]+A0h [78]+A0h [82] least-significant byte;
A2h [135]=A0h [71]+A0h [75]+A0h [79]+A0h [83] least-significant byte;
4, after module MCU calculating finishes check byte, toward A2h 130-131 byte writing commands 0xBABA, representative has been counted It finishes;
5, equipment also uses and the identical method of step 3 calculates the check byte of 4 bytes;
6, the A2h 130-131 byte content of equipment read module, whether judgment module, which has calculated, finishes, and is, under continuing One step otherwise waits for 100 milliseconds and continues to read judgement, if A2h 130-131 byte is not still 0xBABA in triplicate, Authentication failed;
7, whether equipment comparison module A2h 132-135 byte content is identical with the calculated check byte of equipment oneself, It is to be verified;
8, after being verified, A2h 130-131 byte content is written as default value 0x0000.
Number of devices and treatment scale described herein are for simplifying explanation of the invention.To SFP light of the invention The application of the method for anti-counterfeit of module, modifications and variations will be readily apparent to persons skilled in the art.
Although the embodiments of the present invention have been disclosed as above, but its is not only in the description and the implementation listed With.It can be applied to the practical field of various suitable sheets completely.It for those skilled in the art, can be easily Realize other modification.Therefore without departing from the general concept defined in the claims and the equivalent scope, this is practical and unlimited In specific details and legend shown and described herein.

Claims (5)

1. a kind of method for anti-counterfeit of SFP optical module passes through data communication between the two after optical module is inserted into terminal device It is verified with the true and false to optical module manufacturer's information characterized by comprising
The setting of validation region will continuously at least 4 in the user self-defined area of the address SFP optical module internal register A2H A byte is set as cryptographic check byte area;
Computations, the optical module read the sequence of specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H Row number carries out computations to obtain the first check byte of 4 bytes, and first check byte is written to cryptographic check Byte area;
Verification, the terminal device use encryption computing method same as described above to obtain the second check byte of 4 bytes, into And verification judgement is carried out with the first check byte, to determine whether to determine the true and false of optical module manufacturer's information by verifying;
The setting of the validation region further includes the fixed value verification region of 2 bytes and the operational order byte regions of 2 bytes Domain, and the operational order byte area and fixed value verification region are successively set on before cryptographic check byte area;
Before the computations, the terminal device is primarily based on to be read from the fixed value of optical module verification zone bit The data arrived are judged to determine whether that one first pre-set commands are written in operational order byte area based on judging result;
The optical module is based on whether the first pre-set commands detected, to determine whether to carry out computations;
In computations, the optical module is after being written to cryptographic check byte area for first check byte, to institute It states operational order byte area and one second pre-set commands is written;
In verification, the terminal device is based on after computations obtain the second check byte from operational order byte area The second pre-set commands read carry out verification judgement with the first check byte, to determine whether it is determining by verifying The true and false of optical module manufacturer's information.
2. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that the computations side of the optical module Multiple summation, remainder, any one form of calculation in XOR operation can be used to realize in method.
3. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that in verification, the terminal device base In the data read from operational order byte area, judged for the first time with whether the second pre-set commands are consistent, with determination Whether optical module, which has calculated, finishes, if then carrying out the verification judgement of next step;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to optical module Whether calculate to finish and has carried out secondary judgement.
4. the method for anti-counterfeit of SFP optical module as claimed in claim 3, which is characterized in that in verification, the terminal device exists In triplicate after the data in read operation command byte region, data content is not inconsistent with the second pre-set commands still, then tests Card failure.
5. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that in verification, the terminal device base In the second pre-set commands read from operational order byte area, the first check byte and the second check byte are compared Compared with, if it is determined that result be it is consistent, then be verified, so determine optical module manufacturer's information be it is true, by operational order byte area It is set as initial value;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.
CN201610173235.XA 2016-03-23 2016-03-23 The method for anti-counterfeit of SFP optical module Active CN105634746B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610173235.XA CN105634746B (en) 2016-03-23 2016-03-23 The method for anti-counterfeit of SFP optical module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610173235.XA CN105634746B (en) 2016-03-23 2016-03-23 The method for anti-counterfeit of SFP optical module

Publications (2)

Publication Number Publication Date
CN105634746A CN105634746A (en) 2016-06-01
CN105634746B true CN105634746B (en) 2019-01-04

Family

ID=56049302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610173235.XA Active CN105634746B (en) 2016-03-23 2016-03-23 The method for anti-counterfeit of SFP optical module

Country Status (1)

Country Link
CN (1) CN105634746B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150813B (en) * 2017-06-27 2021-11-05 杭州海康存储科技有限公司 Equipment verification method and device
CN107566048B (en) * 2017-09-21 2019-09-17 武汉恒泰通技术有限公司 A method of two step of optical module, which is carried out, using data-interface demonstrate,proves
CN107766718A (en) * 2017-10-12 2018-03-06 广东欧珀移动通信有限公司 Touch-screen method for anti-counterfeit, device, mobile terminal and readable storage medium storing program for executing
CN108173602A (en) * 2018-03-20 2018-06-15 索尔思光电(成都)有限公司 A kind of optical mode block encryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996350A (en) * 2006-12-20 2007-07-11 杭州华为三康技术有限公司 Electronic tag of optical module, making and identification method, and identification device therefor
CN101136699A (en) * 2006-09-01 2008-03-05 中兴通讯股份有限公司 Automatic recognition method and encryption method of pluggable optical module
CN103413087A (en) * 2013-08-20 2013-11-27 杭州华三通信技术有限公司 Optical module, equipment employing optical module and verification method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136699A (en) * 2006-09-01 2008-03-05 中兴通讯股份有限公司 Automatic recognition method and encryption method of pluggable optical module
CN1996350A (en) * 2006-12-20 2007-07-11 杭州华为三康技术有限公司 Electronic tag of optical module, making and identification method, and identification device therefor
CN103413087A (en) * 2013-08-20 2013-11-27 杭州华三通信技术有限公司 Optical module, equipment employing optical module and verification method

Also Published As

Publication number Publication date
CN105634746A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN105634746B (en) The method for anti-counterfeit of SFP optical module
CN101136699B (en) Automatic recognition method and encryption method of pluggable optical module
CN103516518B (en) Safe verification method and device
US6598032B1 (en) Systems and method for hiding from a computer system entry of a personal identification number (pin) to a smart card
CN104574189A (en) Financial-transaction monitoring method and device
CN109635610A (en) The read-write system and method for RFID tag data
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
CN106296177A (en) Data processing method based on bank's Mobile solution and equipment
CN104933565A (en) IC card transaction method and IC card transaction system
CN105791277A (en) Identity authentication method
EP3657422B1 (en) Dynamic verification method and system for card transactions
CN106709534A (en) Anti-counterfeit verification system of electronic certificate
CN102891753B (en) The initialized method and device of dynamic token
CN205015906U (en) Anti -fake verification system of electron certificate
CN106251143B (en) A kind of safe verification method and device based on NFC identification
CN108052831A (en) Image watermarking and display methods, mobile terminal and storage medium
JP2019517699A (en) Card payment system and method for using biometric information
CN107239949A (en) A kind of bank card anti-theft brush intelligent protecting method
CN107798539A (en) A kind of method and device of terminal works
CN103532937B (en) Application identification verifying method and device
CN105871840A (en) Certificate management method and system
CN104639749B (en) Short message sending control method and device
CN104537298B (en) The method and apparatus authorized is carried out based on microprocessor card
JPH0325590A (en) Ic card and manufacture managing system for the same
CN103049686A (en) Method for verifying information of database and user through universal serial bus (Usb) key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant