CN106327723B - A kind of mPOS transaction systems based on intelligent platform - Google Patents

A kind of mPOS transaction systems based on intelligent platform Download PDF

Info

Publication number
CN106327723B
CN106327723B CN201610745328.5A CN201610745328A CN106327723B CN 106327723 B CN106327723 B CN 106327723B CN 201610745328 A CN201610745328 A CN 201610745328A CN 106327723 B CN106327723 B CN 106327723B
Authority
CN
China
Prior art keywords
key
encryption
mobile phone
card reader
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610745328.5A
Other languages
Chinese (zh)
Other versions
CN106327723A (en
Inventor
吴夏森
卢佩新
沈思忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Original Assignee
FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd filed Critical FUJIAN NEWLAND PAYMENT TECHNOLOGY Co Ltd
Priority to CN201610745328.5A priority Critical patent/CN106327723B/en
Publication of CN106327723A publication Critical patent/CN106327723A/en
Application granted granted Critical
Publication of CN106327723B publication Critical patent/CN106327723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/206Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention relates to a kind of mPOS transaction systems based on intelligent platform.User passes through cell-phone customer terminal registering service server, service server verifies username and password by encryption equipment, and return to verification result, then mobile phone card reader is inserted into cell-phone customer terminal, cell-phone customer terminal reads mobile phone card reader KSN, is sent to service server, and service server verifies user name and the binding information of mobile phone card reader KSN by encryption equipment, after being proved to be successful, transaction of swiping the card is carried out;Cell-phone customer terminal is issued to swipe the card and be instructed to mobile phone card reader, user is swiped the card by mobile phone card reader, mobile phone card reader encryption brushing card data is encryption track data, and return includes mobile phone card reader KSN, encryption track data, the response data of random number and is back to cell-phone customer terminal, response data is sent to service server by cell-phone customer terminal, service server decrypts the encryption track data by encryption equipment and obtains brushing card data, and return to track data to service server.Present system product is small, portable, fashionable appearance, has good playing property, and connect intelligent terminal mobile internet, is not limited by time and location.

Description

A kind of mPOS transaction systems based on intelligent platform
Technical field
The present invention relates to a kind of mPOS transaction systems based on intelligent platform.
Background technology
Traditional POS transaction systems, terminal is of high cost, transaction cost is high, O&M cost is high, and function is single.
Invention content
The purpose of the present invention is to provide a kind of mPOS transaction systems based on intelligent platform, the system product it is small, portable, Fashionable appearance has good playing property, and connects intelligent terminal mobile internet, is not limited by time and location.
To achieve the above object, the technical scheme is that:A kind of mPOS transaction systems based on intelligent platform, including Service server and the encryption equipment being connect with the service server, cell-phone customer terminal, the cell-phone customer terminal are also associated with mobile phone Card reader;
Card reader certification:User is verified by cell-phone customer terminal registering service server, service server by encryption equipment Username and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone brush Card device KSN, is sent to service server, and service server verifies user name and the binding of mobile phone card reader KSN by encryption equipment Information after being proved to be successful, carries out transaction of swiping the card;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, hand Machine card reader encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypt track data, is random Several response datas is back to cell-phone customer terminal, and response data is sent to service server, service server by cell-phone customer terminal The encryption track data is decrypted by encryption equipment and obtains brushing card data, and return to track data to service server.
In an embodiment of the present invention, the encryption equipment memory contains root key, and the root key includes equipment root master control Key, equipment application maintenance key, equipment application external authentication key, is recognized inside equipment application equipment application root master control key Demonstrate,prove key, equipment application root working key.
In an embodiment of the present invention, the mobile phone card reader memory contains distributed key, and the distributed key is to be based on Mobile phone card reader KSN is obtained using key decentralized algorithm, and the distributed key includes master control key, using master control key, application Maintenance key, using external authentication key, using internal authentication key, track encryption working key, the track encryption work Key generates the interim magnetic track information encryption key for encrypting brushing card data by random number decentralized algorithm.
In an embodiment of the present invention, the specific acquisition pattern of the distributed key is as follows:Using root key MK as encryption Key pair mobile phone card reader KSN carries out 3DEA operations, obtains the left-half of distributed key DK, then using root key MK as adding Value after close key pair mobile phone card reader KSN negates carries out 3DEA operations, obtains the right half part of distributed key DK, distributed key The set of the left-half of DK, the right half part of distributed key DK, i.e. distributed key DK.
In an embodiment of the present invention, the mobile phone card reader encryption brushing card data is the detailed process for encrypting track data For:Track encryption working key by random number decentralized algorithm, is generated interim magnetic track information encryption key by mobile phone card reader, and Brushing card data is encrypted by interim magnetic track information encryption key afterwards acquisition encryption track data.
In an embodiment of the present invention, the service server is decrypted the encryption track data by encryption equipment and is brushed The detailed process of card data is:Encryption equipment obtains track encryption work according to equipment application root working key, mobile phone card reader KSN Key, then and interim magnetic track information encryption key is obtained according to track encryption working key, random number, then pass through interim magnetic track Information encryption key decryption encryption track data, obtains brushing card data.
Compared to the prior art, the invention has the advantages that:
Present system, encryption chip safe to use protect data, and it is close and one-time pad to have a machine one Function;
Present system is feature-rich, supports all bank cards, it can be achieved that transferring accounts, remitting money, credit card repayment, online branch It pays, Yi Jishui, electricity, coal gas, communication expense, broadband access fee etc. are paid;And there is following characteristic in mobile payment:
1st, with oneself at any time:Small, portable, fashionable appearance has good playing property;
2nd, whenever and wherever possible:Intelligent terminal mobile internet is connect, is not limited by time and location;
3rd, caprice with:Want, with regard to that can use, by charging not perplexed;
4th, follow one's inclinations step by step:It is close to the users custom, bankcard consumption;User self-help operates, and follows one's inclinations step by step;
Meanwhile for different Third-party payment clients, it is possible to provide customize service, including appearance, function etc., so as to for Client provides preferably service.
Description of the drawings
Fig. 1 is present system block diagram.
Fig. 2 is card reader identifying procedure figure of the present invention.
Fig. 3 swipes the card transaction flow figure for the present invention.
Fig. 4 encrypts block diagram for mobile phone card reader of the present invention.
Fig. 5 decrypts block diagram for encryption equipment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawings, technical scheme of the present invention is specifically described.
As shown in Figs. 1-3, a kind of mPOS transaction systems based on intelligent platform of the invention, including service server and with Encryption equipment, the cell-phone customer terminal of service server connection, the cell-phone customer terminal are also associated with mobile phone card reader;
Card reader certification:User is verified by cell-phone customer terminal registering service server, service server by encryption equipment Username and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone brush Card device KSN, is sent to service server, and service server verifies user name and the binding of mobile phone card reader KSN by encryption equipment Information after being proved to be successful, carries out transaction of swiping the card;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, hand Machine card reader encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypt track data, is random Several response datas is back to cell-phone customer terminal, and response data is sent to service server, service server by cell-phone customer terminal The encryption track data is decrypted by encryption equipment and obtains brushing card data, and return to track data to service server.
The encryption equipment memory contains root key, and the root key includes equipment root master control key, equipment application root master control Key, equipment application maintenance key, equipment application external authentication key, equipment application internal authentication key, equipment application root work Make key.
The mobile phone card reader memory contains distributed key, and the distributed key is using close based on mobile phone card reader KSN Key decentralized algorithm obtains, and the distributed key includes master control key, recognizes using master control key, applicating maintenance key, using outside Demonstrate,prove key, using internal authentication key, track encryption working key, the track encryption working key disperses to calculate by random number Method generates the interim magnetic track information encryption key for encrypting brushing card data.
The specific acquisition pattern of the distributed key is as follows:Using root key MK as encryption key to mobile phone card reader KSN 3DEA operations are carried out, the left-half of distributed key DK are obtained, then using root key MK as encryption key to mobile phone card reader Value after KSN negates carries out 3DEA operations, obtains the right half part of distributed key DK, the left-half of distributed key DK, dispersion The set of the right half part of key DK, i.e. distributed key DK.
The mobile phone card reader encryption brushing card data is that the detailed process of encryption track data is:Mobile phone card reader is by magnetic track Cryptographic work key generates interim magnetic track information encryption key, then passes through interim magnetic track information by random number decentralized algorithm Brushing card data is encrypted acquisition encryption track data in encryption key.
The service server decrypts the detailed process for encrypting track data acquisition brushing card data by encryption equipment: Encryption equipment obtains track encryption working key, then and is added according to magnetic track according to equipment application root working key, mobile phone card reader KSN Close working key, random number obtain interim magnetic track information encryption key, are then added by interim magnetic track information encryption key decryption Close track data obtains brushing card data.
Specific implementation process for the present invention below.
As shown in Figure 1, a kind of mPOS transaction systems based on intelligent platform of the present invention, including service server, encryption Machine, cell-phone customer terminal, mobile phone card reader;
Card reader transaction includes two parts, and a part is card reader certification, and another part is transaction of swiping the card.
As shown in Fig. 2, card reader certification:
Basic procedure is as follows:
1)Mobile phone client users log in;
2)Background authentication username and password;
3)Mobile phone card reader is inserted into, and cell-phone customer terminal takes card reader KSN;
4)After cell-phone customer terminal obtains KSN, this information is returned into backstage;
5)Background authentication user and mobile phone card reader KSN binding informations;
6)It swipes the card transaction;
As shown in figure 3, transaction of swiping the card:
Basic procedure is as follows:
1)Cell-phone customer terminal issues instruction of swiping the card;
2)User card punching;
3)Mobile phone card reader encrypts brushing card data, and returns【KSN】、【Encrypt track data】、【Random number】Etc. information;
4)Encryption data is sent on cell-phone customer terminal to backstage;
5)Backstage is decrypted by encryption equipment, obtains corresponding magnetic track information(That is brushing card data).
The key management of the present invention includes the two large divisions such as the generation of key and the use of key;
First, the generation of key:
(1)Root key
There are special medias for root key(Such as master card, encryption equipment)In, mainly include:
L equipment root master control keys
L equipment application root master control keys
L equipment application maintenance keys
L equipment application external authentication keys
L equipment application internal authentication keys
L equipment application root working keys
(2)Distributed key
By corresponding key decentralized algorithm, disperse the corresponding secret key of each corresponding card reader from root key, from And achieve the purpose that a machine one is close.
Decentralized algorithm
Key decentralized algorithm is:Root key passes through dispersion factor --- and 8 terminal unique key KSN generate sub-key. By a double length(128bit)Root key MK, by decentralized processing, derive the double length of the close terminal of a machine one (128bit)Sub-key DK.
Derive DK left-halfs method be:
The first step:Using dispersion factor as input data;
Second step:Using MK as encryption key;
Third walks:3DEA operations are carried out to input data with MK.
Derive DK right half parts method be:
The first step:Dispersion factor is negated, as input data;
Second step:Using MK as encryption key;
Third walks:3DEA operations are carried out to input data with MK.
The set of left-half and right half part is exactly corresponding terminal key.
By more than decentralized algorithm, corresponding each station terminal can uniquely be generated using main working key.
The key code system table of mobile phone card reader of the present invention is as shown in table 1:
2nd, the use of key
(1)Mobile phone card reader encryption flow
The encryption block diagram of the present invention is illustrated in figure 4, during magnetic track information cryptographic operation is carried out, terminal adds magnetic track Close working key is directly generated interim magnetic track information encryption key, is believed using interim magnetic track by random number distributed key algorithm Encryption for information key pair magnetic track information(Brushing card data)Be encrypted, then on send corresponding terminal KSN, random number and encryption it is close Literary information is to server background.
(2)Encryption equipment decrypts flow
Be illustrated in figure 5 the present invention decryption block diagram, after service server receives encryption information data packet, need into Row decryption.
Decrypting process is mainly the magnetic that equipment application root working key first derives the corresponding card reader terminal by KSN Then road cryptographic work key disperses interim magnetic track information encryption key by 8 random numbers received, finally using facing When magnetic track information encryption key complete decryption work to encrypted cipher text information.
The form of brushing card data, i.e. track data
Track data combination operation is as follows:
L obtains two or three magnetic track informations, calculates the length of two or three magnetic tracks;
After bis- or three magnetic tracks of l carry out BCD compressions, it is stitched together, structure is as follows:2 track lengths(HEX, 1BYTE)+ 2 Track data(Packed BCD)+ 3 track lengths(HEX, 1BYTE)+ 3 track datas(Packed BCD) + 0X90 + 0x00;
L carries out 3DES encryption, ciphering process to spliced data:Work is obtained with terminal master key dispersion random number Key, then with the every 8 byte 3des of work key pair magnetic track information (x00 is mended below less than 8);
Citing:
Two track datas(37):
1234567890123456789=05082017819991683
Three track datas(102):
1234567890123456789=1560000000000000000003781999216000005080000000000 00000000000=000000000003=00000000
So it is combined into character string such as the following table 1, table 2:
That is converted into being stitched together after binary-coded decimal
\x251234567890123456789D05082017819991683F661234567890123456789D15600 0000000000000000378199921600000508000000000000000000000D000000000003D00000000
Then 3DES encryption is carried out.
The above are preferred embodiments of the present invention, all any changes made according to the technical solution of the present invention, and generated function is made During with range without departing from technical solution of the present invention, all belong to the scope of protection of the present invention.

Claims (3)

1. a kind of mPOS transaction systems based on intelligent platform, it is characterised in that:Including service server and with the business service Encryption equipment, the cell-phone customer terminal of device connection, the cell-phone customer terminal are also associated with mobile phone card reader;
Card reader certification:User verifies user by cell-phone customer terminal registering service server, service server by encryption equipment Name and password, and verification result is returned, then mobile phone card reader is inserted into cell-phone customer terminal, and cell-phone customer terminal reads mobile phone card reader KSN is sent to service server, and service server verifies user name and the binding information of mobile phone card reader KSN by encryption equipment, After being proved to be successful, transaction of swiping the card is carried out;
It swipes the card transaction:Cell-phone customer terminal issues instruction of swiping the card to mobile phone card reader, and user is swiped the card by mobile phone card reader, mobile phone brush Card device encryption brushing card data is encryption track data, and returns and include mobile phone card reader KSN, encrypts track data, random number Response data is back to cell-phone customer terminal, and response data is sent to service server by cell-phone customer terminal, and service server passes through The encryption equipment decryption encryption track data obtains brushing card data, and return to track data to service server;
The encryption equipment memory contains root key, the root key include equipment root master control key, equipment application root master control key, Equipment application maintenance key, equipment application external authentication key, equipment application internal authentication key, the work of equipment application root are close Key;
The mobile phone card reader memory contains distributed key, and the distributed key is using key point based on mobile phone card reader KSN It dissipates algorithm to obtain, the distributed key includes master control key, using master control key, applicating maintenance key, close using external authentication Key, using internal authentication key, track encryption working key, the track encryption working key is given birth to by random number decentralized algorithm Into for encrypting the interim magnetic track information encryption key of brushing card data;
The specific acquisition pattern of the distributed key is as follows:Mobile phone card reader KSN is carried out using root key MK as encryption key 3DEA operations obtain the left-half of distributed key DK, then mobile phone card reader KSN are asked using root key MK as encryption key Value after anti-carries out 3DEA operations, obtains the right half part of distributed key DK, the left-half of distributed key DK, distributed key DK Right half part set, i.e. distributed key DK.
2. a kind of mPOS transaction systems based on intelligent platform according to claim 1, it is characterised in that:The mobile phone brush Card device encryption brushing card data is that the detailed process of encryption track data is:Mobile phone card reader by track encryption working key by with Machine number decentralized algorithm generates interim magnetic track information encryption key, then by interim magnetic track information encryption key to brushing card data Acquisition encryption track data is encrypted.
3. a kind of mPOS transaction systems based on intelligent platform according to claim 1, it is characterised in that:The business clothes Business device decrypts the detailed process for encrypting track data acquisition brushing card data by encryption equipment:Encryption equipment is according to equipment application Root working key, mobile phone card reader KSN obtain track encryption working key, then and according to track encryption working key, random number Interim magnetic track information encryption key is obtained, track data is then encrypted by interim magnetic track information encryption key decryption, is brushed Card data.
CN201610745328.5A 2016-08-29 2016-08-29 A kind of mPOS transaction systems based on intelligent platform Active CN106327723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610745328.5A CN106327723B (en) 2016-08-29 2016-08-29 A kind of mPOS transaction systems based on intelligent platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610745328.5A CN106327723B (en) 2016-08-29 2016-08-29 A kind of mPOS transaction systems based on intelligent platform

Publications (2)

Publication Number Publication Date
CN106327723A CN106327723A (en) 2017-01-11
CN106327723B true CN106327723B (en) 2018-07-10

Family

ID=57791577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610745328.5A Active CN106327723B (en) 2016-08-29 2016-08-29 A kind of mPOS transaction systems based on intelligent platform

Country Status (1)

Country Link
CN (1) CN106327723B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI622947B (en) * 2017-01-13 2018-05-01 飛捷科技股份有限公司 Composite mobile payment system and mobile pos module thereof
CN108155993B (en) * 2017-12-29 2021-12-17 北京树米网络科技有限公司 Data encryption method and device for VSIM card
CN108460597B (en) * 2018-03-23 2022-03-15 银联商务股份有限公司 Key management system and method
CN109194491B (en) * 2018-09-21 2021-05-25 北京六合安通科技有限公司 Password evaluation test system and password evaluation test method
CN111325540B (en) * 2020-01-21 2021-12-10 江苏荣泽信息科技股份有限公司 POS system based on block chain
CN111565104B (en) * 2020-04-29 2023-07-04 上海瀚银信息技术有限公司 Key management method and system of card reader
CN111600703B (en) * 2020-05-12 2023-08-04 京东科技信息技术有限公司 SM 2-based signature method, system, electronic equipment and storage medium
CN112583592A (en) * 2020-12-29 2021-03-30 湖南万慧通科技有限公司 Working method of encryption system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136172A (en) * 2011-04-02 2011-07-27 方园 Card terminal and realization method thereof used by individuals or families
CN102222293A (en) * 2011-06-01 2011-10-19 程永生 Mobile payment method, mobile terminal and system
CN102354418A (en) * 2011-10-09 2012-02-15 钱袋网(北京)信息技术有限公司 System for processing trade information and method therefor
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN105373918A (en) * 2015-11-10 2016-03-02 广东汇卡商务服务有限公司 Multi-POS terminal integrated payment system and method
CN105741117A (en) * 2016-01-25 2016-07-06 恒宝股份有限公司 Method and off-line transaction device based on security key

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140019366A1 (en) * 2011-03-31 2014-01-16 Infosys Limited Method and a system for securing financial transaction

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102136172A (en) * 2011-04-02 2011-07-27 方园 Card terminal and realization method thereof used by individuals or families
CN102222293A (en) * 2011-06-01 2011-10-19 程永生 Mobile payment method, mobile terminal and system
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN102354418A (en) * 2011-10-09 2012-02-15 钱袋网(北京)信息技术有限公司 System for processing trade information and method therefor
CN105373918A (en) * 2015-11-10 2016-03-02 广东汇卡商务服务有限公司 Multi-POS terminal integrated payment system and method
CN105741117A (en) * 2016-01-25 2016-07-06 恒宝股份有限公司 Method and off-line transaction device based on security key

Also Published As

Publication number Publication date
CN106327723A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
CN106327723B (en) A kind of mPOS transaction systems based on intelligent platform
CN103793815B (en) Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
CN102170357B (en) Combined secret key dynamic security management system
CN103390124B (en) Safety input and the equipment, system and method for processing password
JP2018522353A (en) Authentication system and method for server-based payment
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
CN107278307A (en) Software layer is mutually authenticated
CN104393993B (en) A kind of safety chip and its implementation for electricity-selling terminal
CN1514635A (en) Method of realizing mobile electronic business using finger print intelligence terminal and intelligent hand set
CN109766979A (en) Two-dimensional code generation method, verification method and device
CN105871546A (en) Verification method combining static password and dynamic password and terminal equipment
CN103971071B (en) Computer network system for preventing input data from being recorded
CN103456050B (en) Electronic affirmation method and system
CN102801730A (en) Information protection method and device for communication and portable devices
CN102238193A (en) Data authentication method and system using same
CN104318437A (en) Online payment system and payment method for virtual prepaid card
CN104281272B (en) Password Input processing method and processing device
CN102118385A (en) Security domain management method and device
CN104978144A (en) Gesture password input device and system and method for transaction based on system
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
CN108460597A (en) A kind of key management system and method
KR20120037314A (en) Online credit card issue system and method using user identity authentication device
CN108416400A (en) A kind of method of payment and payment system based on dynamic two-dimension code
CN107689867B (en) Key protection method and system under open environment
WO2011058629A1 (en) Information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant