CN106529949A - Safety payment device and method - Google Patents
Safety payment device and method Download PDFInfo
- Publication number
- CN106529949A CN106529949A CN201610977400.7A CN201610977400A CN106529949A CN 106529949 A CN106529949 A CN 106529949A CN 201610977400 A CN201610977400 A CN 201610977400A CN 106529949 A CN106529949 A CN 106529949A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- equipment
- key
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a safety payment device and method, belonging to the field of information security. When the safety payment device receives a payment request command issued by a client, the payment request command is analyzed to obtain a first parameter, a second parameter, a key handle and a transaction text, the transaction text is displayed, and the confirmation operation of a user is waited. When the user confirmation operation is received, a user application private key is obtained according to the key handle, and the current counting value of a counter is obtained. The equipment forms a third data to be signed according to the first parameter, the second parameter, the current counting value and the transaction text, and uses the user application private key to sign a third data to be signed to obtain a third signature result. According to the current counting value and the third signature result, the response data of the payment request command is formed and returned to the client. The invention provides the safety payment device and method, a user operation is simplified, a user experience is improved, and the safety of payment is ensured.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of payment equipment and method.
Background technology
With the Internet and the fast development of ecommerce, more and more universal, the online rapid payment of online online transaction
Mode is increasingly by the pro-gaze of people.Dealing money constantly expands, and Network Information Security Problem is increasingly highlighted, and consumer also gets over
More to pay close attention to the safety problem of online transaction.The quick payment mode generally adopted in prior art is user input trading password
On-line payment can be completed, or the mode combined with SMS authentication code by trading password completes on-line payment, advantage is to prop up
Rapid and convenient is paid, is had the disadvantage that safety is low and is needed user's memory cipher.
Therefore, it is the problem to be solved in the present invention to invent a kind of not only convenient but also safe method of payment.
The content of the invention
To solve technical problem present in prior art, the present invention proposes a kind of payment equipment and method.
Technical scheme is related to a kind of payment equipment and method, wherein:
A kind of safe payment method, comprises the following steps:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the
One parameter, the second parameter, key handles and transaction text, equipment show the transaction text, wait user to confirm operation;
Step S2, when the equipment receives user and confirms operation, obtain user's application according to the key handles private
Key, obtains the current count value of enumerator;The equipment is according to first parameter, second parameter, the current count
Value and the transaction text constitute the 3rd data to be signed, the 3rd data to be signed are entered using private key using the user
Row signature obtains the 3rd signature result;The equipment is paid according to the current count value and the 3rd signature result composition please
Seek the response data of order and return to the client;
User corresponding with the key handles is preserved in the equipment private key, or the equipment are applied using guarantor
The decruption key deposited obtains user to key handles decryption and applies private key.
Preferably, also include before step S1:When the equipment receives the registration request order that client is issued
When, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise to client
Errored response code is returned, is terminated;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, and generating user should
With public private key pair and its corresponding key handles;
Step a3:The equipment is public according to first parameter, second parameter, the key handles and user application
Key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first signature
As a result;
Step a4:The equipment is signed using public key, the key handles, device certificate and described first according to the user
Name result composition registration request command response data, return the registration request command response data to client.
Or it is preferred, also include before step S1:When the equipment receives the registration that client issues please
When asking order, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise to client
Errored response code is returned, is terminated;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, and generating user should
With public private key pair, private key and second parameter composition be-encrypted data are applied according to user, using the encryption key pair for preserving
The be-encrypted data is encrypted and obtains key handles;
Step a3:The equipment is public according to first parameter, second parameter, the key handles and user application
Key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first signature
As a result;
Step a4:The equipment is signed using public key, the key handles, device certificate and described first according to the user
Name result composition registration request command response data, return the registration request command response data to client.
Further, also include before step S1:When the equipment receives the certification request life that client is issued
When making, perform:
Step b1:The equipment judges whether to receive user and confirms operation, is then execution step b2, otherwise to client
Errored response code is returned, is terminated;
Step b2:The equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, root
User is obtained according to the key handles and applies private key;
Step b3:The equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current
Count value constitutes the second data to be signed, carries out signature to second data to be signed using private key using the user and obtains
Second signature result;
Step b4:The equipment is rung according to the current count value and the second signature result composition certification request order
Data are answered, and the certification request command response data are returned to client, and are updated the current count value of the enumerator.
Preferably, said method also includes:When the equipment receives the de-registration request order that client is issued, parsing
The de-registration request order obtains key handles, and the user corresponding with the key handles in sweep equipment applies public and private key
It is right, the answer code comprising deregistration is returned to client.
When the equipment receives the device configuration order that client is issued, according to the data of the device configuration order
Domain determines current signature algorithm types, and the response data for representing that order runs succeeded is returned to client.
When the equipment receives the acquisition facility information order that client is issued, return comprising hard to the client
The response data of part Identity Code.
Wherein, a kind of payment equipment, including Order receiver module, the first parsing module, display module, user mutual
Module, the 3rd signature blocks, command response module;
The Order receiver module, for receiving the payment request command that client is issued;
First parsing module, for when the Order receiver module receives the payment request command, parsing
The payment request command obtains the first parameter, the second parameter, key handles and transaction text;
Display module, for showing the transaction text, and triggers user interactive module;
The user interactive module, confirms to operate and trigger the 3rd signature blocks for receive user;
3rd signature blocks, the key handles for being obtained according to first parsing module parsing are used
Private key is applied at family, for obtaining the current count value of enumerator, is parsed according to the current count value, first parsing module
First parameter, second parameter and the transaction text for obtaining constitutes the 3rd data to be signed, using the user
The 3rd data to be signed are carried out with signature using private key and obtains the 3rd signature result;
The command response module, for the current count value and described obtained according to the 3rd signature blocks
Three signature result compositions pay the response data of request command and return to the client;
The equipment also includes memory module, and the user generated for storage device applies private key;Or the storage mould
Block, applies private key for storing the user that encryption and decryption key and deciphering module decryption are obtained;The equipment also includes deciphering module,
The deciphering module for using the decruption key preserved in memory module from first parsing module parsing obtain described in
Decryption in key handles obtains user and applies private key.
Preferably, the Order receiver module, is additionally operable to receive the registration request order that client is issued;Accordingly:
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing
The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public
Private key to and its corresponding key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user
The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the
One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks
The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to
The client, and for returning errored response to the client when the first judge module judged result is no
Code.
Or preferred, the Order receiver module, it is additionally operable to receive the registration request order that client is issued;Accordingly
's:
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing
The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public
Private key pair, applies private key and second parameter composition be-encrypted data according to user, using the encryption key for preserving to described
Be-encrypted data is encrypted and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user
The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the
One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks
The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to
The client, and for returning errored response to the client when the first judge module judged result is no
Code.
Further, mentioned order receiver module, is additionally operable to receive the certification request order that client is issued;Accordingly:
The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains for parsing the certification request order that the Order receiver module is received
First parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain working as enumerator
Front count value, constitutes the second data to be signed according to first parameter, the second parameter, current count value, using the user
Second data to be signed are carried out with signature using private key and obtains the second signature result, trigger the command response module and more
New module;
The command response module, according to the current count value when being additionally operable to receive the triggering of second signature blocks
Constitute certification request command response data and return to the client with the described second signature result;
The update module, for updating the current count value of the enumerator.
Further, mentioned order receiver module, is additionally operable to receive the de-registration request order that client is issued;Accordingly:
The equipment also includes the 3rd parsing module, please for parsing the cancellation that the Order receiver module is received
Order is asked to obtain key handles, the user corresponding with the key handles deleted in the memory module applies public private key pair,
Trigger the command response module;
The command response module, is additionally operable to be included to client return according to the implementing result of the 3rd parsing module
The answer code of deregistration.
Further, the equipment also includes configuration module;The Order receiver module is additionally operable to reception client and issues
Device configuration order, and trigger the configuration module;
The configuration module, for determining current signature algorithm types according to the data field of the device configuration order, and
Trigger the command response module;
The command response module, is additionally operable to return expression to the client when the triggering of the configuration module is received
The response data that order runs succeeded.
Further, the Order receiver module is additionally operable to receive the acquisition facility information order that client is issued, and touches
Say the word respond module;
The command response module, is additionally operable to return to the client when the triggering of the Order receiver module is received
Response data comprising hardware identity identification code.
Include hardware identity identification code and device certificate public private key pair in the said equipment certificate.
What the present invention reached has the beneficial effect that:The payment equipment provided using the present invention and method, it is not necessary to use
Family is input into password, it is only necessary to corresponding interactive action is done on equipment (such as:By acknowledgement key, brush finger stricture of vagina, brush iris etc.) confirm
It is that user can complete operation in operation, had both simplified operation and improved Consumer's Experience, and in turn ensure that the safety of payment.
Description of the drawings
Fig. 1 is a kind of safe payment method flow chart that embodiment 1 is provided;
Fig. 2 is a kind of flow chart of work methods of payment equipment that embodiment 2 is provided;
Fig. 3 is a kind of composition frame chart of payment equipment that embodiment 3 is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, the every other enforcement obtained under the premise of creative work is not made by those skilled in the art
Example, belongs to the scope of protection of the invention.
Embodiment 1
A kind of safe payment method is present embodiments provided, is introduced by executive agent of payment equipment, this reality
Apply example offer payment equipment (hereinafter referred to as equipment) be with digital signature function, provide authentication equipment, one
As adopt bluetooth, NFC interface.The method that the present embodiment is provided is specifically related to the stream that equipment is received and processes payment request command
Journey, as shown in figure 1, specifically including following steps:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the
One parameter, the second parameter, key handles and transaction text, equipment show the critical data in transaction text, wait user to confirm
Operation;
Preferably, the transaction text includes sequence information and timestamp, and the critical data in the transaction text includes
Dealing money, name of firm, exchange hour;The equipment of can also be shows the transaction text, waits user to confirm operation.
First parameter is the digest value of client data, and second parameter is the summary of the application ID of client
Value.For example, first parameter and the second parameter are the digest value calculated using SHA-256, the first parameter and the second parameter
Length is 32 bytes.
Step S2, when equipment receive user confirm operation when, find user according to the key handles and apply private key, obtain
Take the current count value of enumerator;
Specifically, the key handles, user are that the equipment is being received and processing registration request life using public private key pair
Generate in the flow process of order and preserve, the key handles are uniquely corresponding using public private key pair with the user.This step is concrete
, according to the key handles and user preserved in current device using the corresponding relation of public and private key, find and parse with step S1
Key handles corresponding to user apply private key.
Preferably, the initial value of the count value of the enumerator is 0, and equipment often carries out an authenticating user identification, enumerator
Current count value add 1.
Further, this step can also be:When equipment receives user confirms operation, equipment is using the decryption for preserving
Key obtains user to key handles decryption and applies private key, specifically:Equipment is using the decruption key for preserving to described close
Key handle is decrypted and obtains the first ciphertext data and the second ciphertext data, judges second parameter and the second decryption number
According to whether consistent, it is that first ciphertext data is applied into private key as user, otherwise according to default error byte code composition
Pay the response data of request command and return to the client.
Step S3, equipment are waited to sign according to first parameter, the second parameter, current count value and transaction text composition the 3rd
3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature result by name data;
Preferably, the signature algorithm type for being signed adopted described in this step can be arranged in advance in a device
Signature algorithm type, the equipment of can also be configure the label for completing when receiving the device configuration order that client issues in a device
Name algorithm types.
Step S4, equipment pay the response of request command according to the current count value and the 3rd signature result composition
Data simultaneously return to client.
Embodiment 2
As shown in Fig. 2 present embodiments providing a kind of method of work of payment equipment, following steps are specifically included:
Step 1:Device power, initialization;
Step 2:Equipment receives the order that client is issued;
Specifically, APDU data forms are supported in the order that client is issued.
Step 3:Equipment judges the type of the order for receiving, and performs if being to obtain version number's order if the order
Step 4, the execution step 5 if the order is acquisition facility information order are performed if being de-registration request order if the order
Step 6, execution step 7 if being registration request order if the order, execution step if being certification request order if the order
12, the execution step 17 if the order is payment request command;
Specifically, equipment judges command type according to second byte of the order for receiving, if second byte
For 0x03, then the order is to obtain version number's order, described if second byte is 0xC5 to order to obtain facility information life
Order, the order if second byte is 0x01 is registration request order, and the order if second byte is 0x02 is
Certification request order, the order if second byte is 0x04 are payment request command, if second byte is 0xC4
The order is de-registration request order.
Further, above-mentioned steps 3 also include, if the order for receiving is device configuration order, according to described
The data field of device configuration order determines signature algorithm type, and the number of responses for representing that order runs succeeded is returned to client
According to.
Specifically, if second byte of the order for receiving is for 0xC6, the order is device configuration order,
The data field of the device configuration order be configuration information, the configuration information be TLV (Tag+Length+Value) form, institute
Stating configuration information can include application type, signature algorithm type.The wherein corresponding Tag of signature algorithm type is 0x62, according to
The corresponding Value values of Tag=0x62 determine signature algorithm type.For example, the signature algorithm type for including in the configuration information
TLV structures it is as follows:0x62 0102, then according to Value=02 determine signature algorithm type be SM2 algorithms.
Step 4:Equipment returns the response data comprising version number, return to step 2 to client;
For example, the protocol version number that equipment is supported is U2F, then equipment to the response data that client is returned is
ASCII encodes (U2F_V2).
Step 5:Equipment returns the response data comprising HID, return to step 2 to client;
Specifically, the HID (hardware identity identification code) is for equipment described in unique mark, pre- when dispatching from the factory to plant to the equipment
In.
The length of the HID totally 16 bit, wherein:
BIT1~2:Product type, represents product type, and scope is from ' 01 '~' 99 '.
BIT3~4:Supplier number, represents the numbering of production firm, and scope is from ' 01 '~' 99 '.
BIT5~BIT6:Productive year, latter two of calendar year are taken, such as:2016, then value is ' 16 '.
BIT7~BIT8:In production month, scope is ' 01 '~' 12 '.
BIT9~BIT16:Natural order row number, scope are ' 00000001 '~' 99999999 '.
Preferably, equipment returns the response data comprising HID for TLV forms to client, wherein Tag=0x34, L=
0x10, V=HID.
Further, can also be comprising application version number, label in the response data that equipment is returned to client in this step
Name supports algorithm types.
Step 6:Equipment parses the de-registration request order and obtains key handles, delete storage the key handles and its
Corresponding user applies public private key pair, returns the answer code comprising deregistration, return to step 2 to client;
Preferably, equipment parses the de-registration request order and obtains key handles, deleting storage with the key handles
Corresponding user applies public private key pair.
For example, if nullifying successfully, equipment returns 0x9000 to client, and if failure is nullified, equipment is returned to client
0x6989。
Step 7:Equipment judges whether to receive user and confirms operation, is then execution step 9, otherwise execution step 8;
Preferably, the equipment carries button, and the user confirms that operation is specially user key-press operation.The user is true
Recognize operation and can also be that user's brush finger stricture of vagina, brush iris etc. are operated.
Step 8:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6985 to client.
Step 9:Equipment parses the registration request order and obtains the first parameter and the second parameter, generates user using public and private
Key to and its corresponding key handles store;
Specifically, equipment parses the registration request order, using front 32 bytes in order data domain as the first parameter,
Using rear 32 bytes as the second parameter.Preferably, first parameter is challenge parameter, such as client data, described the
Two parameters be application parameter, such as application identities.
Preferably, the user that equipment is generated is 65 bytes using the length of public key and private key.
Further, this step can also be:Equipment parses the registration request order and obtains the first parameter and the second ginseng
Number, generates user and applies public private key pair, applies private key and second parameter composition be-encrypted data according to user, using preservation
Encryption key the be-encrypted data be encrypted obtain key handles;
Step 10:Equipment applies public key group according to first parameter, second parameter, the key handles and user
Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot
Really;
Specifically, device certificate has been planted when equipment dispatches from the factory in advance, has included for described in unique mark in the device certificate
The HID (hardware identity identification code) of equipment and device certificate public private key pair.
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order
When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance
Type.
Step 11:Equipment is signed using public key, the key handles, the device certificate and described first according to the user
Name result composition registration request command response data, return the registration request command response data, return to step to client
2。
Specifically, by the user using public key, the key handles, the device certificate and the first signature result
Registration request command response data are constituted according to the first preset format.
For example, first preset format is:Length (1 word of the 0x05+ user using public key (65 byte)+key handles
Section)+key handles+signature result of device certificate+the first.
Step 12:Equipment judges whether to receive user and confirms operation, is then execution step 13, otherwise execution step 16;
Preferably, the user confirms that operation is specially user key-press operation.
Step 13:Equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, according to institute
State key handles and find user and apply private key;
Specifically, equipment parses the certification request order, using the 2nd of order data domain the to the 33rd byte as first
Parameter, using the 35th of order data domain the to the 66th byte as the second parameter, obtains according to the 67th byte in order data domain
To key handles length, start to obtain the byte number with the key handles equal length from the 68th byte of order data field
As key handles.
Further, this step can also be:Equipment parses the certification request order and obtains the first parameter, the second parameter
And key handles, the key handles are decrypted using the decruption key for preserving and obtain the first ciphertext data and the second decryption
Data, judge whether second parameter consistent with second ciphertext data, be then using first ciphertext data as with
Private key is applied at family, is otherwise paid the response data of request command and is returned to the client according to default error byte code composition
End.
In the present embodiment, safety certification can be carried out to user identity by certification request order before delivery operation,
So as to strengthen payment safety.
Step 14:Equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current count
The second data to be signed are worth to, signature are carried out to second data to be signed using private key using the user and is obtained second
Signature result;
Preferably, the initial value of the count value of the enumerator is 0x00, and equipment often does once certification, the current meter of enumerator
Numerical value adds 1.
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order
When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance
Type.
Step 15:Equipment is according to the current count value and the second signature result composition certification request command response number
According to returning the certification request command response data to client, add 1 by the current count value of enumerator, return to step 2;
Specifically, the current count value and the second signature result are constituted into certification request according to the second preset format
Command response data.
For example, second preset format is:The signature result of 0x01+ current count values+the second.
Step 16:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6986 to client.
Step 17:The equipment parsing payment request command obtains the first parameter, the second parameter, key handles and transaction text
This, shows the critical data in the transaction text, waits user to confirm;
Specifically, equipment parses the certification request order, using the 2nd of order data domain the to the 33rd byte as first
Parameter, using the 35th of order data domain the to the 66th byte as the second parameter, obtains according to the 67th byte in order data domain
To key handles length, start to obtain the data work with the key handles equal length from the 68th byte of order data field
For key handles, text size of concluding the business is obtained according to the 69th and the 70th byte in order data domain, from the of order data field
71 bytes start to obtain the data equal with the transaction text size as transaction text.
Preferably, the critical data in the transaction text includes dealing money, name of firm, exchange hour.
Step 18:Equipment judges whether to receive user and confirms operation, is then execution step 20, otherwise execution step 19;
Preferably, the user confirms that operation is specially user key-press operation.
Step 19:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6986 to client.
Step 20:Equipment finds user according to the key handles and applies private key, obtains the current count value of enumerator;
Step 21:Equipment is waited to sign according to first parameter, the second parameter, current count value and transaction text composition the 3rd
3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature result by name data;
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order
When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance
Type.
Step 22:Equipment pays request command number of responses according to the current count value and the 3rd signature result composition
According to the client return payment request command response data, return to step 2.
Specifically, the current count value and the 3rd signature result are paid into request according to the 3rd preset format composition
Command response data.
For example, the 3rd preset format is:The signature result of 0x01+ current count values+the three.
Embodiment 3
As shown in figure 3, a kind of payment equipment is present embodiments provided, including Order receiver module 101, first is parsed
Module 102, display module 103, user interactive module 104, the 3rd signature blocks 105, command response module 106;
The Order receiver module 101, for receiving the payment request command that client is issued;
First parsing module 102, for receiving the payment request command when the Order receiver module 101
When, parse the payment request command and obtain the first parameter, the second parameter, key handles and transaction text,
Display module 103, for showing the transaction text, and triggers user interactive module 104;Can with specifically for
The critical data concluded the business in text is shown, and triggers user interactive module 104.
The user interactive module 104, confirms to operate and trigger the 3rd signature blocks 105 for receive user;Preferably,
The user interactive module is specially button or brush finger stricture of vagina device or brush iris device.
3rd signature blocks 105, for the key handles obtained according to first parsing module 102 parsing
User is obtained from memory module 107 and applies private key, for obtaining the current count value of enumerator, according to the current count
First parameter, second parameter and transaction text composition that value, first parsing module 102 parsing are obtained
3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature knot by three data to be signed
Really;
The command response module 106, for the current count value that obtained according to the 3rd signature blocks 105 and
The 3rd signature result composition pays the response data of request command and returns to the client;
The equipment also includes memory module 107, and the user generated for storage device applies private key;
Or the equipment also includes deciphering module, the memory module, for storing encryption and decryption key and deciphering module
The user that decryption is obtained applies private key;The deciphering module, for using the decruption key preserved in memory module 107 from described
Decryption in the key handles that the parsing of first parsing module 102 is obtained obtains user and applies private key.
Preferably, the deciphering module specifically for:The key handles are decrypted using the decruption key for preserving
The first ciphertext data and the second ciphertext data are obtained, judges that whether second parameter is consistent with second ciphertext data, is
First ciphertext data is applied into private key as user then, the command response module is otherwise triggered;Accordingly, the order
Respond module, is additionally operable to, when the triggering of deciphering module is received, the sound for paying request command be constituted according to default error byte code
Answer data and return to the client.
Further, the Order receiver module, is additionally operable to receive the registration request order that client is issued;Accordingly,
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing
The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public
Private key to and its corresponding key handles;
Or, second parsing module, for first judge module judge receive user confirm operation when,
Registration request order first parameter of acquisition and the second parameter that the Order receiver module is received are parsed, generating user should
With public private key pair, private key and second parameter composition be-encrypted data are applied according to user, using what is preserved in memory module
Encryption key is encrypted to the be-encrypted data and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user
The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the
One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks
The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to
The client, and for returning errored response to the client when the first judge module judged result is no
Code.
Preferably, hardware identity identification code and the public and private key of device certificate are included described in the present embodiment in device certificate
It is right.
Further, the Order receiver module, is additionally operable to receive the de-registration request order that client is issued;Accordingly,
The equipment also includes the 3rd parsing module, obtains for parsing the de-registration request order that the Order receiver module is received
Key handles are taken, the user corresponding with the key handles in the memory module is deleted and is applied public private key pair, triggering is described
Command response module;Accordingly, the command response module, is additionally operable to according to the implementing result of the 3rd parsing module to visitor
Family end returns the answer code comprising deregistration.
Further, the Order receiver module, is additionally operable to receive the certification request order that client is issued;Accordingly,
The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains for parsing the certification request order that the Order receiver module is received
First parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain working as enumerator
Front count value, constitutes the second data to be signed according to first parameter, the second parameter, current count value, using the user
Second data to be signed are carried out with signature using private key and obtains the second signature result, trigger the command response module and more
New module;
The command response module, according to the current count value when being additionally operable to receive the triggering of second signature blocks
Constitute certification request command response data and return to the client with the described second signature result;
The update module, for updating the current count value of the enumerator.
Further, the equipment also includes configuration module;The Order receiver module is additionally operable to reception client and issues
Device configuration order, and trigger the configuration module;The configuration module, for the data according to the device configuration order
Domain determines current signature algorithm types, and triggers the command response module;Accordingly, the command response module, is additionally operable to
The response data for representing that order runs succeeded is returned when the triggering of the configuration module is received to the client.
Further, the Order receiver module is additionally operable to receive the acquisition facility information order that client is issued, and touches
Say the word respond module;Accordingly, the command response module, be additionally operable to when the triggering of the Order receiver module is received to
The client returns the response data comprising hardware identity identification code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, the change or replacement that can be readily occurred in all are answered
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (22)
1. a kind of safe payment method, it is characterised in that methods described includes:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the first ginseng
Number, the second parameter, key handles and transaction text, equipment show the transaction text, wait user to confirm operation;
Step S2, when the equipment receive user confirm operation when, according to the key handles obtain user apply private key, obtain
Take the current count value of enumerator;The equipment is according to first parameter, second parameter, the current count value and institute
State transaction text and constitute the 3rd data to be signed, the 3rd data to be signed are signed using private key using the user
Obtain the 3rd signature result;The equipment pays request command according to the current count value and the 3rd signature result composition
Response data and return to the client;
User corresponding with the key handles is preserved in the equipment private key, or the equipment are applied using preservation
Decruption key obtains user to key handles decryption and applies private key.
2. the method for claim 1, it is characterised in that the equipment shows the transaction text, waits user to confirm
Operation is specially:The equipment shows the critical data in the transaction text by display screen, and waits user to confirm operation.
3. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received
During the registration request order that client is issued, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise returns to client
Errored response code, terminates;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, generates user's application public
Private key to and its corresponding key handles;
Step a3:The equipment applies public key group according to first parameter, second parameter, the key handles and user
Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot
Really;
Step a4:The equipment is according to the user using public key, the key handles, device certificate and the first signature knot
Fruit composition registration request command response data, return the registration request command response data to client.
4. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received
During the registration request order that client is issued, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise returns to client
Errored response code, terminates;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, generates user's application public
Private key pair, applies private key and second parameter composition be-encrypted data according to user, using the encryption key for preserving to described
Be-encrypted data is encrypted and obtains key handles;
Step a3:The equipment applies public key group according to first parameter, second parameter, the key handles and user
Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot
Really;
Step a4:The equipment is according to the user using public key, the key handles, device certificate and the first signature knot
Fruit composition registration request command response data, return the registration request command response data to client.
5. the method as described in claim 3 or 4, it is characterised in that include hardware identity identification code in the device certificate
With device certificate public private key pair.
6. the method as described in claim 3 or 4, it is characterised in that methods described also includes:When the equipment receives client
During the de-registration request order that end issues, parse the de-registration request order and obtain key handles, it is close with described in sweep equipment
The corresponding user of key handle applies public private key pair, returns the answer code comprising deregistration to client.
7. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received
During the certification request order that client is issued, perform:
Step b1:The equipment judges whether to receive user and confirms operation, is then execution step b2, otherwise returns to client
Errored response code, terminates;
Step b2:The equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, according to institute
State key handles acquisition user and apply private key;
Step b3:The equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current count
Second data to be signed are carried out signature using private key using the user and obtain second by value the second data to be signed of composition
Signature result;
Step b4:The equipment is according to the current count value and the second signature result composition certification request command response number
According to returning the certification request command response data to client, and update the current count value of the enumerator.
8. the method as described in claim 1 or 3 or 4 or 7, it is characterised in that the user confirm operation be specially press by
Key or brush finger stricture of vagina or brush iris.
9. the method as described in claim 1 or 3 or 4 or 7, it is characterised in that methods described also includes:When the equipment is received
During the device configuration order issued to client, the current signature class of algorithms is determined according to the data field of the device configuration order
Type, and the response data for representing that order runs succeeded is returned to client.
10. the method for claim 1, it is characterised in that methods described also includes:When the equipment receives client
During the acquisition facility information order for issuing, the response data comprising hardware identity identification code is returned to the client.
11. the method for claim 1, it is characterised in that the equipment is using the decruption key for preserving to the key
Handle decryption obtains user and specifically includes using private key:The equipment is carried out to the key handles using the decruption key for preserving
Decryption obtains the first ciphertext data and the second ciphertext data, judges second parameter and second ciphertext data whether
Cause, be that first ciphertext data is applied into private key as user, request is paid according to default error byte code composition otherwise
The response data of order simultaneously returns to the client.
12. a kind of payment equipments, it is characterised in that including Order receiver module, the first parsing module, display module, use
Family interactive module, the 3rd signature blocks, command response module;
The Order receiver module, for receiving the payment request command that client is issued;
First parsing module, for when the Order receiver module receives the payment request command, parsing is described
Pay request command and obtain the first parameter, the second parameter, key handles and transaction text;
Display module, for showing the transaction text, and triggers user interactive module;
The user interactive module, confirms to operate and trigger the 3rd signature blocks for receive user;
3rd signature blocks, the key handles for being obtained according to first parsing module parsing obtain user should
With private key, for obtaining the current count value of enumerator, obtained according to the current count value, first parsing module parsing
First parameter, second parameter and the transaction text constitute the 3rd data to be signed, applied using the user
Private key carries out signature and obtains the 3rd signature result to the 3rd data to be signed;
The command response module, the current count value and the described 3rd for being obtained according to the 3rd signature blocks are signed
Name result composition pays the response data of request command and returns to the client;
The equipment also includes memory module, and the user generated for storage device applies private key;
Or the memory module, private key is applied for storing the user that encryption and decryption key and deciphering module decryption are obtained;It is described
Equipment also includes deciphering module, and the deciphering module is used for using the decruption key preserved in memory module from the described first parsing
Decryption in the key handles that module parsing is obtained obtains user and applies private key.
13. equipment as claimed in claim 12, it is characterised in that the display module, specifically for showing the transaction text
Critical data in this, and trigger user interactive module.
14. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client
The registration request order sent out;
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing is described
The registration request order that Order receiver module is received obtains the first parameter and the second parameter, generates user and applies public and private key
To and its corresponding key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for being applied according to first parameter, second parameter, the key handles and user
Public key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first label
Name result, triggers the command response module;
The command response module, when being additionally operable to receive the triggering of first signature blocks according to the user using public key,
The key handles, the response data of device certificate and the first signature result composition registration request order are simultaneously returned to described
Client, and for returning errored response code to the client when the first judge module judged result is no.
15. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client
The registration request order sent out;
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing is described
The registration request order that Order receiver module is received obtains the first parameter and the second parameter, generates user and applies public and private key
It is right, private key and second parameter composition be-encrypted data are applied according to user, using the encryption key for preserving to described to be added
Ciphertext data is encrypted and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for being applied according to first parameter, second parameter, the key handles and user
Public key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first label
Name result, triggers the command response module;
The command response module, when being additionally operable to receive the triggering of first signature blocks according to the user using public key,
The key handles, the response data of device certificate and the first signature result composition registration request order are simultaneously returned to described
Client, and for returning errored response code to the client when the first judge module judged result is no.
16. equipment as described in claims 14 or 15, it is characterised in that include hardware identity mark in the device certificate
Code and device certificate public private key pair.
17. equipment as described in claims 14 or 15, it is characterised in that the Order receiver module, are additionally operable to receive client
The de-registration request order that end issues;
The equipment also includes the 3rd parsing module, for parsing the de-registration request life that the Order receiver module is received
Order obtains key handles, and the user corresponding with the key handles deleted in the memory module applies public private key pair, triggers
The command response module;
The command response module, is additionally operable to be returned comprising cancellation to client according to the implementing result of the 3rd parsing module
As a result answer code.
18. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client
The certification request order sent out;
The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains first for parsing the certification request order that the Order receiver module is received
Parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain the current meter of enumerator
Numerical value, is constituted the second data to be signed according to first parameter, the second parameter, current count value, is applied using the user
Private key carries out signature and obtains the second signature result to second data to be signed, triggers the command response module and updates mould
Block;
The command response module, according to the current count value and institute when being additionally operable to receive the triggering of second signature blocks
State the second signature result composition certification request command response data and return to the client;
The update module, for updating the current count value of the enumerator.
19. equipment as described in claim 12 or 14 or 15 or 18, it is characterised in that the user interactive module is specially and presses
Key or brush finger stricture of vagina device or brush iris device.
20. equipment as described in claim 12 or 14 or 15 or 18, it is characterised in that the equipment also includes configuration module;
The Order receiver module is additionally operable to receive the device configuration order that client is issued, and triggers the configuration module;
The configuration module, for determining current signature algorithm types according to the data field of the device configuration order, and triggers
The command response module;
The command response module, is additionally operable to return expression order to the client when the triggering of the configuration module is received
The response data for running succeeded.
21. equipment as claimed in claim 12, it is characterised in that the Order receiver module is additionally operable to reception client and issues
Acquisition facility information order, and trigger command respond module;
The command response module, is additionally operable to include to client return when the triggering of the Order receiver module is received
The response data of hardware identity identification code.
22. equipment as claimed in claim 12, it is characterised in that the deciphering module specifically for:Using the decryption for preserving
Key is decrypted to the key handles and obtains the first ciphertext data and the second ciphertext data, judges second parameter and institute
The second ciphertext data is stated whether consistent, be that first ciphertext data is applied into private key as user, the life is otherwise triggered
Make respond module;
The command response module, is additionally operable to, when the triggering of deciphering module is received, be paid according to default error byte code composition
The response data of request command simultaneously returns to the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610977400.7A CN106529949A (en) | 2016-11-07 | 2016-11-07 | Safety payment device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610977400.7A CN106529949A (en) | 2016-11-07 | 2016-11-07 | Safety payment device and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106529949A true CN106529949A (en) | 2017-03-22 |
Family
ID=58350010
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610977400.7A Pending CN106529949A (en) | 2016-11-07 | 2016-11-07 | Safety payment device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106529949A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107809311A (en) * | 2017-09-30 | 2018-03-16 | 飞天诚信科技股份有限公司 | The method and system that a kind of unsymmetrical key based on mark is signed and issued |
CN107919963A (en) * | 2017-12-27 | 2018-04-17 | 飞天诚信科技股份有限公司 | A kind of authenticator and its implementation |
CN108846662A (en) * | 2018-05-29 | 2018-11-20 | 数字乾元科技有限公司 | wireless payment method and wearable device |
CN108876368A (en) * | 2018-05-30 | 2018-11-23 | 招商银行股份有限公司 | Private key management method, equipment and computer readable storage medium |
CN111144875A (en) * | 2019-11-30 | 2020-05-12 | 飞天诚信科技股份有限公司 | Terminal equipment and working method thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1968092A (en) * | 2006-09-30 | 2007-05-23 | 北京握奇数据系统有限公司 | Method for realizing data interaction between digital signature device and opposite-end device |
CN102270285A (en) * | 2010-06-01 | 2011-12-07 | 华为技术有限公司 | Key authorization information management method and device |
CN102289613A (en) * | 2011-06-22 | 2011-12-21 | 北京天诚盛业科技有限公司 | Liquid crystal universal serial bus (USB) Key equipment capable of identifying fingerprint |
CN103368746A (en) * | 2013-07-24 | 2013-10-23 | 飞天诚信科技股份有限公司 | A kind of endorsement method |
CN105827655A (en) * | 2016-05-27 | 2016-08-03 | 飞天诚信科技股份有限公司 | Intelligent key equipment and work method thereof |
CN105894274A (en) * | 2016-04-05 | 2016-08-24 | 杭州复杂美科技有限公司 | Payment method based on encryption chip integrated in mobile phone |
-
2016
- 2016-11-07 CN CN201610977400.7A patent/CN106529949A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1968092A (en) * | 2006-09-30 | 2007-05-23 | 北京握奇数据系统有限公司 | Method for realizing data interaction between digital signature device and opposite-end device |
CN102270285A (en) * | 2010-06-01 | 2011-12-07 | 华为技术有限公司 | Key authorization information management method and device |
CN102289613A (en) * | 2011-06-22 | 2011-12-21 | 北京天诚盛业科技有限公司 | Liquid crystal universal serial bus (USB) Key equipment capable of identifying fingerprint |
CN103368746A (en) * | 2013-07-24 | 2013-10-23 | 飞天诚信科技股份有限公司 | A kind of endorsement method |
CN105894274A (en) * | 2016-04-05 | 2016-08-24 | 杭州复杂美科技有限公司 | Payment method based on encryption chip integrated in mobile phone |
CN105827655A (en) * | 2016-05-27 | 2016-08-03 | 飞天诚信科技股份有限公司 | Intelligent key equipment and work method thereof |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107809311A (en) * | 2017-09-30 | 2018-03-16 | 飞天诚信科技股份有限公司 | The method and system that a kind of unsymmetrical key based on mark is signed and issued |
CN107809311B (en) * | 2017-09-30 | 2020-01-03 | 飞天诚信科技股份有限公司 | Asymmetric key issuing method and system based on identification |
CN107919963A (en) * | 2017-12-27 | 2018-04-17 | 飞天诚信科技股份有限公司 | A kind of authenticator and its implementation |
CN107919963B (en) * | 2017-12-27 | 2020-10-27 | 飞天诚信科技股份有限公司 | Authenticator and implementation method thereof |
CN108846662A (en) * | 2018-05-29 | 2018-11-20 | 数字乾元科技有限公司 | wireless payment method and wearable device |
CN108876368A (en) * | 2018-05-30 | 2018-11-23 | 招商银行股份有限公司 | Private key management method, equipment and computer readable storage medium |
CN108876368B (en) * | 2018-05-30 | 2022-05-03 | 招商银行股份有限公司 | Private key management method, device and computer-readable storage medium |
CN111144875A (en) * | 2019-11-30 | 2020-05-12 | 飞天诚信科技股份有限公司 | Terminal equipment and working method thereof |
CN111144875B (en) * | 2019-11-30 | 2023-04-18 | 飞天诚信科技股份有限公司 | Terminal equipment and working method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106529949A (en) | Safety payment device and method | |
CN105827655B (en) | A kind of intelligent cipher key equipment and its working method | |
CN107153961A (en) | A kind of method of payment, paying server, trading server and readable storage medium storing program for executing | |
CN103699989A (en) | Payment platform and payment method on basis of intelligent equipment | |
CN101482962A (en) | Service data processing terminal and service data processing method | |
CN103116851A (en) | Electronic contract on-line signing method and system | |
CN104270517A (en) | Information encryption method and mobile terminal | |
CN105719413B (en) | A kind of POS system realized multiple terminals screen asynchronous display and touch interaction | |
CN101277182A (en) | Method for acquiring dynamic password based on public key architecture-user personal identification card | |
JP5973808B2 (en) | Information processing device, terminal device, information processing system, information processing method, and computer program | |
WO2015109949A1 (en) | Network security method and network security system | |
CN105089367A (en) | Electronic lock based on remote server | |
CN107070654A (en) | information collecting method and device | |
CN104978144A (en) | Gesture password input device and system and method for transaction based on system | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
KR101516096B1 (en) | Communication apparatus, reminder apparatus, and information recording medium | |
CN111935197A (en) | Bidding document encryption and decryption method and device | |
CN110659899B (en) | Offline payment method, device and equipment | |
CN109815666A (en) | Identity identifying method, device, storage medium and electronic equipment based on FIDO agreement | |
CN105763321A (en) | Method and device for encrypting Internet of things communication | |
CN105653902A (en) | Software registration method and device and registration code generating method and device | |
CN107196898A (en) | Account logon method, page display method, client and server | |
CN107645481A (en) | A kind of data processing method, system and device | |
CN107295458A (en) | Terminal, smart card and its between set up Bluetooth connecting method, device and server | |
CN106910020A (en) | A kind of shops's management system and its management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |