CN105634746B - The method for anti-counterfeit of SFP optical module - Google Patents
The method for anti-counterfeit of SFP optical module Download PDFInfo
- Publication number
- CN105634746B CN105634746B CN201610173235.XA CN201610173235A CN105634746B CN 105634746 B CN105634746 B CN 105634746B CN 201610173235 A CN201610173235 A CN 201610173235A CN 105634746 B CN105634746 B CN 105634746B
- Authority
- CN
- China
- Prior art keywords
- optical module
- byte
- verification
- operational order
- check byte
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Abstract
The invention discloses a kind of method for anti-counterfeit of SFP optical module, it is verified after optical module is inserted into terminal device by data communication between the two with the true and false to optical module manufacturer's information, it include: to set validation region for continuous at least six byte in the user self-defined area of the address SFP optical module internal register A2H;Read the sequence number of specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H, computations are carried out to obtain the first check byte of 4 bytes, and after first check byte is written to cryptographic check byte area, the terminal device uses verification method same as described above to obtain the second check byte of 4 bytes, carry out verification judgement with the first check byte, with determine its whether by verifying determination optical module manufacturer's information the true and false.The present invention is also provided by a kind of method for anti-counterfeit of SFP optical module, can effectively achieve the purpose that anti-fake.
Description
Technical field
The present invention relates to a kind of method for anti-counterfeit under optical module service condition.It is more particularly related to a kind of
The method for anti-counterfeit of SFP optical module under SFP optical module service condition.
Background technique
SFP (Small Form-Factor Pluggable transceiver) optical module, which is that one kind is small-sized, hot to be inserted
The optical transceiver pulled out, for optical communication applications in telecommunications and data communication.One distinguishing feature of SFP optical module is can to protect
In the case of holding equipment is powered, module is plugged, and the application of this hot-swappable technology is so that optical module is being applied and cut
More easily it can install and use during changing.But another hidden danger is brought while being convenient for changing, if operator exists
Replace module when using informal producer dispatch from the factory product, not only compromise producer's interests, more seriously product quality without
Method guarantees, or even the unstable risk of system occurs.
And now there are two types of common optical module method for anti-counterfeit: first is that sticking antifalsification label in module, (such as laser is anti-
Pseudo label), the true and false is mainly differentiated by way of range estimation;Second is that device manufacturer and optical module manufacturer negotiate, in inside modules
The method of fixed value is written in self defined area in register EEPROM to be verified.Its groundwork mode is module
When being inserted into equipment, equipment first reads specified region and is verified, detect the value in self defined area and preset it is identical then after
Continuous to use, on the contrary then judgement is illegally.
And all there is corresponding defect in these prevention methods, as antifalsification label to crack difficulty relatively low, pass through forgery
Or it directly buys antifalsification label and can be realized and mix the spurious with the genuine;And the method for specifying region write-in preset value in module, by original
The EEPROM of factory's module is analyzed, it has also been discovered that it is regular, cracking also is matter of time.
Summary of the invention
It is excellent it is an object of the invention to solve at least the above problems and/or defect, and provide at least to will be described later
Point.
A further object of the invention is to use equipment and light by providing a kind of method for anti-counterfeit of SFP optical module
The mode of the multiple authentication of module both sides, and by customized verification method, it can effectively solve existing anti-counterfeiting technology and be easy
The shortcomings that forgery, achievees the purpose that anti-fake.
In order to realize these purposes and other advantages according to the present invention, provides, be inserted into terminal device in optical module
It is verified afterwards by data communication between the two with the true and false to optical module manufacturer's information, comprising:
The setting of validation region will be continuous in the user self-defined area of the address SFP optical module internal register A2H
At least four byte is set as cryptographic check byte area;
Computations, the optical module read specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H
Sequence number, carry out computations to obtain the first check byte of 4 bytes, and first check byte be written to encryption
Check byte region;
Verification, the terminal device use encryption computing method same as described above to obtain the second check word of 4 bytes
Section, and then verification judgement is carried out with the first check byte, to determine whether to determine optical module manufacturer's information by verifying
The true and false.
Preferably, wherein the setting of the validation region further includes the fixed value verification region of 2 bytes and 2 words
The operational order byte area of section, and the operational order byte area and fixed value verification region are successively set on encryption school
It tests before byte area.
Preferably, wherein before the computations, the terminal device is primarily based on the fixed value from optical module
The data read in verification zone bit are judged to determine whether that operational order byte area is write based on judging result
Enter one first pre-set commands.
Preferably, wherein in computations, the optical module based on whether the first pre-set commands detected, with
Determine whether to carry out computations.
Preferably, wherein in computations, first check byte is being written to encryption school by the optical module
After testing byte area, one second pre-set commands are written to the operational order byte area.
Preferably, wherein multiple summation, remainder can be used, in XOR operation in the encryption computing method of the optical module
Any one form of calculation to realize.
Preferably, wherein in verification, the terminal device is based on after computations obtain the second check byte
The second pre-set commands read from operational order byte area carry out verification judgement with the first check byte, to determine that it is
The no true and false that optical module manufacturer's information is determined by verifying.
Preferably, wherein in verification, the terminal device is based on the number read from operational order byte area
According to being judged for the first time with whether the second pre-set commands are consistent, finished with determining whether optical module has calculated, if then carrying out down
The verification of one step judges;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to light
Whether module, which has calculated to finish, carries out secondary judgement.
Preferably, wherein in verification, the terminal device is in read operation command byte region in triplicate
After data, data content is not inconsistent with the second pre-set commands still, then authentication failed.
Preferably, wherein in verification, the terminal device is based on read from operational order byte area
First check byte is compared by two pre-set commands with the second check byte, if it is determined that result be it is consistent, then be verified,
And then determine that optical module manufacturer's information is very, to set initial value for operational order byte area;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.
The present invention is include at least the following beneficial effects: method for anti-counterfeit of the invention, by being passed through using equipment and optical module
Both sides repeatedly communicate to realize common verification, avoid the defect that previous unidirectional authentication is easy to crack, and the verification side of core
Method uses the sequence number of optical module as basic data, and due to the uniqueness of sequence number, the check byte ultimately generated also has
There is unique trait, and can also further expand as more complicated checking procedure, for example passes through repeatedly summation, remainder, exclusive or
Operation, to reach safer verification purpose.
Further advantage, target and feature of the invention will be partially reflected by the following instructions, and part will also be by this
The research and practice of invention and be understood by the person skilled in the art.
Detailed description of the invention
Fig. 1 is EEPROM schematic diagram as defined in SFF-8472 agreement;
Fig. 2 is that optical module powers on rear checking process figure in the method for anti-counterfeit of SFP optical module in one embodiment of the present of invention.
Specific embodiment
The present invention is described in further detail below, to enable those skilled in the art's refer to the instruction text being capable of evidence
To implement.
It should be appreciated that such as " having ", "comprising" and " comprising " term used herein do not allot one or more
The presence or addition of a other elements or combinations thereof.
A kind of way of realization of the method for anti-counterfeit of SFP optical module according to the present invention is inserted into terminal device in optical module
It is verified afterwards by data communication between the two with the true and false to optical module manufacturer's information, including:
The setting of validation region will be continuous in the user self-defined area of the address SFP optical module internal register A2H
At least four byte is set as cryptographic check byte area;
Computations, the optical module read specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H
Sequence number, carry out computations to obtain the first check byte of 4 bytes, and first check byte be written to encryption
Check byte region;
Verification, the terminal device use encryption computing method same as described above to obtain the second check word of 4 bytes
Section, and then verification judgement is carried out with the first check byte, to determine whether to determine optical module manufacturer's information by verifying
The true and false.As shown in Fig. 1, provided according to SFF-8472 agreement, the EEPROM of SFP optical module there are two the address I2C A0h and A2h,
Each addressable address range in address is 0~255, i.e. 256 bytes.Wherein other than agreement provides the region occupied,
Manufacturer can customize the 128-255 byte that there are the 96-127 byte of A0h, the 120-127 byte of A2h and A2h in the region used.It adopts
It selects continuous region as validation region in the address A2H, while being made by the sequence number in specific region in optical module
For basic data, the access and secondary computations of verifying computations and optical module are carried out convenient for optical module, due to optical mode
The uniqueness of block sequence number, the check byte ultimately generated also have unique trait, so that it reaches safer anti-fake
Purpose, having ensures product quality and the stable benefit of system.Also, this mode is a kind of saying for preferred embodiments
Bright, however, it is not limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, the setting of the validation region further includes the fixed value verification region of 2 bytes and 2 words
The operational order byte area of section, and the operational order byte area and fixed value verification region are successively set on encryption school
It tests before byte area.It follows that present invention employs the regions of 8 bytes as validation region, the validation region quilt
The 128-135 byte being set as in the address A2H;
Wherein, fixed value verification region is 128-129 byte, and its internal fixed value be arranged to " V " and
" R ", corresponding ASCII value are respectively 0x56 and 0x52;
The operational order byte area is 130-131 byte, and the cryptographic check byte area is 132-135 byte,
And the initial value of each byte is all set to 0X00 in the operational order byte area and cryptographic check byte area.
Therefore validation region of the 128-135 byte of A2h as 8 bytes, it is as shown in the table:
128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 |
0x56 | 0x52 | 0x00 | 0x00 | 0x00 | 0x00 | 0x00 | 0x00 |
The verification region for being passed through 8 bytes using this scheme is fixed value verifying and verified with computations, to realize light
Module is repeatedly communicated with terminal device and is verified, to realize the benefit of safer anti-fake purpose.Also, this mode is only
It is a kind of explanation of preferred embodiments, however, it is not limited to this.In carrying out the present invention, it is appropriate to be carried out according to user's demand
Substitutions and modifications.
In another example, before the computations, the terminal device is primarily based on the fixation from optical module
The data read in value verification zone bit, are judged to determine whether operational order byte area based on judging result
One first pre-set commands are written, first pre-set commands are arranged to 0XABBA, this is can to carry out replacement appropriate certainly.
First time judgement is carried out by fixed value using this scheme, only it just carries out encrypted authentication after judging by fixed value, has
The benefit for having implementable effect good.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this.
In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in computations, the optical module based on whether the first pre-set commands detected, with
Determine whether to carry out computations.Computations are made to be based on could be into after fixed value correct judgment using this scheme
Row has the better benefit of implementable effect.Also, this mode is a kind of explanation of preferred embodiments, but not office
It is limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in computations, first check byte is being written to encryption by the optical module
Behind check byte region, one second pre-set commands are written to the operational order byte area, second pre-set commands are set
It is set to 0XBABA, its role is to be distinguished with the first pre-set commands, and by being written into operational order byte area
After second pre-set commands, just decide whether to carry out verification judgement.There is implementable effect using this scheme, good reliability
Benefit.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this.In carrying out the present invention, may be used
To carry out substitutions and modifications appropriate according to user's demand.
In another example, multiple summation, remainder is can be used, in XOR operation in the encryption computing method of the optical module
Any one form of calculation to realize, to make it have more complicated verification effect, to reach safer anti-fake mesh
, the sequence number is arranged to the 68-86 byte in the address A0H, then the form of calculation repeatedly summed can be set
Are as follows:
A2h [132]=A0h [68]+A0h [72]+A0h [76]+A0h [80];
A2h [133]=A0h [69]+A0h [73]+A0h [77]+A0h [81];
A2h [134]=A0h [70]+A0h [74]+A0h [78]+A0h [82];
A2h [135]=A0h [71]+A0h [75]+A0h [79]+A0h [83];
Wherein, the 68-86 byte in the address A0H takes respective internal least-significant byte when carrying out summation computations
It is added.Use this scheme to determine different computations forms according to different use needs and practical service environment, with tool
There is the benefit of more preferable anti-fake purpose.Also, this mode is a kind of explanation of preferred embodiments, and however, it is not limited to this.
In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in verification, the terminal device is based on after computations obtain the second check byte
The second pre-set commands read from operational order byte area carry out verification judgement with the first check byte, to determine that it is
The no true and false that optical module manufacturer's information is determined by verifying.Make verification judgement have premise using this scheme, has
Implementable effect is good, the benefit adaptable, antifalse effect is good.Also, this mode is a kind of saying for preferred embodiments
Bright, however, it is not limited to this.In carrying out the present invention, substitutions and modifications appropriate can be carried out according to user's demand.
In another example, in verification, the terminal device is based on reading from operational order byte area
Data are judged for the first time with whether the second pre-set commands are consistent, and are finished with determining whether optical module has calculated, if then carrying out
The verification of next step judges;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to light
Whether module, which has calculated to finish, carries out secondary judgement.Make verification judgement that must obtain the encryption based on optical module using this scheme
It calculates after completing, with good, the adaptable benefit of implementable effect.Also, this mode is a kind of preferable reality
The explanation of example, however, it is not limited to this.In carrying out the present invention, replacement appropriate can be carried out according to user's demand and is repaired
Change.
In another example, in verification, the terminal device is in read operation command byte region in triplicate
Data after, data content is not inconsistent with the second pre-set commands still, then authentication failed.Optical module is tested using this scheme
Card number is defined, so that its verification time is controllable, the benefit with more good-looking exploitativeness.Also, this side
Formula is a kind of explanation of preferred embodiments, and however, it is not limited to this.In carrying out the present invention, it can be carried out according to user's demand
Substitutions and modifications appropriate.
In another example, in verification, the terminal device is based on reading from operational order byte area
First check byte is compared by the second pre-set commands with the second check byte, if it is determined that result be it is consistent, then verifying is logical
It crosses, and then determines that optical module manufacturer's information is very, to set initial value, such as 0X00 for operational order byte area;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.It enables it to complete using this scheme
The matching of optical module and terminal device next time is verified, with the good benefit of implementable effect.Also, this mode is
A kind of explanation of preferred embodiments, however, it is not limited to this.In carrying out the present invention, it can be carried out according to user's demand appropriate
Substitutions and modifications.
The embodiment tested using the form of calculation of summation is as follows:
The setting of validation region: it is 128-129 byte that fixed value, which verifies region, and interior data content is arranged to fixed
It is worth ' V ' and ' R ', corresponding ASCII value is respectively 0x56 and 0x52, and the data content in certain fixed value can also use it
Data are replaced;
Operational order byte area is 130-131 byte, internal to input byte for store command, and initial value is
0x00;
Cryptographic check byte area is 132-135 byte, and internal for storing cryptographic check byte, initial value is not solid
It is fixed, it can be arbitrary value.
Data flow of the optical module after insertion terminal device powers on is as shown in Fig. 2, its checking procedure is as follows:
1, the A2h 128-129 byte of equipment read module judges whether it is fixed value ' V ' and ' R ', is to continue;
2, A2h 130-131 byte writing commands 0xABBA of the equipment toward module;
3, module MCU detects that order is correct, according to 16 byte sequence numbers of A0h 68-83 byte, calculates 4 bytes
Check byte, and A2h 132-135 byte is written, circular is as follows:
A2h [132]=A0h [68]+A0h [72]+A0h [76]+A0h [80] least-significant byte;
A2h [133]=A0h [69]+A0h [73]+A0h [77]+A0h [81] least-significant byte;
A2h [134]=A0h [70]+A0h [74]+A0h [78]+A0h [82] least-significant byte;
A2h [135]=A0h [71]+A0h [75]+A0h [79]+A0h [83] least-significant byte;
4, after module MCU calculating finishes check byte, toward A2h 130-131 byte writing commands 0xBABA, representative has been counted
It finishes;
5, equipment also uses and the identical method of step 3 calculates the check byte of 4 bytes;
6, the A2h 130-131 byte content of equipment read module, whether judgment module, which has calculated, finishes, and is, under continuing
One step otherwise waits for 100 milliseconds and continues to read judgement, if A2h 130-131 byte is not still 0xBABA in triplicate,
Authentication failed;
7, whether equipment comparison module A2h 132-135 byte content is identical with the calculated check byte of equipment oneself,
It is to be verified;
8, after being verified, A2h 130-131 byte content is written as default value 0x0000.
Number of devices and treatment scale described herein are for simplifying explanation of the invention.To SFP light of the invention
The application of the method for anti-counterfeit of module, modifications and variations will be readily apparent to persons skilled in the art.
Although the embodiments of the present invention have been disclosed as above, but its is not only in the description and the implementation listed
With.It can be applied to the practical field of various suitable sheets completely.It for those skilled in the art, can be easily
Realize other modification.Therefore without departing from the general concept defined in the claims and the equivalent scope, this is practical and unlimited
In specific details and legend shown and described herein.
Claims (5)
1. a kind of method for anti-counterfeit of SFP optical module passes through data communication between the two after optical module is inserted into terminal device
It is verified with the true and false to optical module manufacturer's information characterized by comprising
The setting of validation region will continuously at least 4 in the user self-defined area of the address SFP optical module internal register A2H
A byte is set as cryptographic check byte area;
Computations, the optical module read the sequence of specific 16 byte in the manufacturer's information of the address SFP optical module internal register A0H
Row number carries out computations to obtain the first check byte of 4 bytes, and first check byte is written to cryptographic check
Byte area;
Verification, the terminal device use encryption computing method same as described above to obtain the second check byte of 4 bytes, into
And verification judgement is carried out with the first check byte, to determine whether to determine the true and false of optical module manufacturer's information by verifying;
The setting of the validation region further includes the fixed value verification region of 2 bytes and the operational order byte regions of 2 bytes
Domain, and the operational order byte area and fixed value verification region are successively set on before cryptographic check byte area;
Before the computations, the terminal device is primarily based on to be read from the fixed value of optical module verification zone bit
The data arrived are judged to determine whether that one first pre-set commands are written in operational order byte area based on judging result;
The optical module is based on whether the first pre-set commands detected, to determine whether to carry out computations;
In computations, the optical module is after being written to cryptographic check byte area for first check byte, to institute
It states operational order byte area and one second pre-set commands is written;
In verification, the terminal device is based on after computations obtain the second check byte from operational order byte area
The second pre-set commands read carry out verification judgement with the first check byte, to determine whether it is determining by verifying
The true and false of optical module manufacturer's information.
2. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that the computations side of the optical module
Multiple summation, remainder, any one form of calculation in XOR operation can be used to realize in method.
3. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that in verification, the terminal device base
In the data read from operational order byte area, judged for the first time with whether the second pre-set commands are consistent, with determination
Whether optical module, which has calculated, finishes, if then carrying out the verification judgement of next step;
Otherwise after waiting a preset time, corresponding data are read in continuation from operational order byte area, to optical module
Whether calculate to finish and has carried out secondary judgement.
4. the method for anti-counterfeit of SFP optical module as claimed in claim 3, which is characterized in that in verification, the terminal device exists
In triplicate after the data in read operation command byte region, data content is not inconsistent with the second pre-set commands still, then tests
Card failure.
5. the method for anti-counterfeit of SFP optical module as described in claim 1, which is characterized in that in verification, the terminal device base
In the second pre-set commands read from operational order byte area, the first check byte and the second check byte are compared
Compared with, if it is determined that result be it is consistent, then be verified, so determine optical module manufacturer's information be it is true, by operational order byte area
It is set as initial value;
Otherwise decision verification fails, and then determines that optical module manufacturer's information is false.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610173235.XA CN105634746B (en) | 2016-03-23 | 2016-03-23 | The method for anti-counterfeit of SFP optical module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610173235.XA CN105634746B (en) | 2016-03-23 | 2016-03-23 | The method for anti-counterfeit of SFP optical module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105634746A CN105634746A (en) | 2016-06-01 |
CN105634746B true CN105634746B (en) | 2019-01-04 |
Family
ID=56049302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610173235.XA Active CN105634746B (en) | 2016-03-23 | 2016-03-23 | The method for anti-counterfeit of SFP optical module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105634746B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109150813B (en) * | 2017-06-27 | 2021-11-05 | 杭州海康存储科技有限公司 | Equipment verification method and device |
CN107566048B (en) * | 2017-09-21 | 2019-09-17 | 武汉恒泰通技术有限公司 | A method of two step of optical module, which is carried out, using data-interface demonstrate,proves |
CN107766718A (en) * | 2017-10-12 | 2018-03-06 | 广东欧珀移动通信有限公司 | Touch-screen method for anti-counterfeit, device, mobile terminal and readable storage medium storing program for executing |
CN108173602A (en) * | 2018-03-20 | 2018-06-15 | 索尔思光电(成都)有限公司 | A kind of optical mode block encryption method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1996350A (en) * | 2006-12-20 | 2007-07-11 | 杭州华为三康技术有限公司 | Electronic tag of optical module, making and identification method, and identification device therefor |
CN101136699A (en) * | 2006-09-01 | 2008-03-05 | 中兴通讯股份有限公司 | Automatic recognition method and encryption method of pluggable optical module |
CN103413087A (en) * | 2013-08-20 | 2013-11-27 | 杭州华三通信技术有限公司 | Optical module, equipment employing optical module and verification method |
-
2016
- 2016-03-23 CN CN201610173235.XA patent/CN105634746B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136699A (en) * | 2006-09-01 | 2008-03-05 | 中兴通讯股份有限公司 | Automatic recognition method and encryption method of pluggable optical module |
CN1996350A (en) * | 2006-12-20 | 2007-07-11 | 杭州华为三康技术有限公司 | Electronic tag of optical module, making and identification method, and identification device therefor |
CN103413087A (en) * | 2013-08-20 | 2013-11-27 | 杭州华三通信技术有限公司 | Optical module, equipment employing optical module and verification method |
Also Published As
Publication number | Publication date |
---|---|
CN105634746A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105634746B (en) | The method for anti-counterfeit of SFP optical module | |
CN101136699B (en) | Automatic recognition method and encryption method of pluggable optical module | |
CN103516518B (en) | Safe verification method and device | |
US6598032B1 (en) | Systems and method for hiding from a computer system entry of a personal identification number (pin) to a smart card | |
CN104574189A (en) | Financial-transaction monitoring method and device | |
CN109635610A (en) | The read-write system and method for RFID tag data | |
CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
CN106296177A (en) | Data processing method based on bank's Mobile solution and equipment | |
CN104933565A (en) | IC card transaction method and IC card transaction system | |
CN105791277A (en) | Identity authentication method | |
EP3657422B1 (en) | Dynamic verification method and system for card transactions | |
CN106709534A (en) | Anti-counterfeit verification system of electronic certificate | |
CN102891753B (en) | The initialized method and device of dynamic token | |
CN205015906U (en) | Anti -fake verification system of electron certificate | |
CN106251143B (en) | A kind of safe verification method and device based on NFC identification | |
CN108052831A (en) | Image watermarking and display methods, mobile terminal and storage medium | |
JP2019517699A (en) | Card payment system and method for using biometric information | |
CN107239949A (en) | A kind of bank card anti-theft brush intelligent protecting method | |
CN107798539A (en) | A kind of method and device of terminal works | |
CN103532937B (en) | Application identification verifying method and device | |
CN105871840A (en) | Certificate management method and system | |
CN104639749B (en) | Short message sending control method and device | |
CN104537298B (en) | The method and apparatus authorized is carried out based on microprocessor card | |
JPH0325590A (en) | Ic card and manufacture managing system for the same | |
CN103049686A (en) | Method for verifying information of database and user through universal serial bus (Usb) key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |