CN106529949A - Safety payment device and method - Google Patents

Safety payment device and method Download PDF

Info

Publication number
CN106529949A
CN106529949A CN201610977400.7A CN201610977400A CN106529949A CN 106529949 A CN106529949 A CN 106529949A CN 201610977400 A CN201610977400 A CN 201610977400A CN 106529949 A CN106529949 A CN 106529949A
Authority
CN
China
Prior art keywords
module
user
equipment
key
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610977400.7A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201610977400.7A priority Critical patent/CN106529949A/en
Publication of CN106529949A publication Critical patent/CN106529949A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a safety payment device and method, belonging to the field of information security. When the safety payment device receives a payment request command issued by a client, the payment request command is analyzed to obtain a first parameter, a second parameter, a key handle and a transaction text, the transaction text is displayed, and the confirmation operation of a user is waited. When the user confirmation operation is received, a user application private key is obtained according to the key handle, and the current counting value of a counter is obtained. The equipment forms a third data to be signed according to the first parameter, the second parameter, the current counting value and the transaction text, and uses the user application private key to sign a third data to be signed to obtain a third signature result. According to the current counting value and the third signature result, the response data of the payment request command is formed and returned to the client. The invention provides the safety payment device and method, a user operation is simplified, a user experience is improved, and the safety of payment is ensured.

Description

A kind of payment equipment and method
Technical field
The present invention relates to information security field, more particularly to a kind of payment equipment and method.
Background technology
With the Internet and the fast development of ecommerce, more and more universal, the online rapid payment of online online transaction Mode is increasingly by the pro-gaze of people.Dealing money constantly expands, and Network Information Security Problem is increasingly highlighted, and consumer also gets over More to pay close attention to the safety problem of online transaction.The quick payment mode generally adopted in prior art is user input trading password On-line payment can be completed, or the mode combined with SMS authentication code by trading password completes on-line payment, advantage is to prop up Rapid and convenient is paid, is had the disadvantage that safety is low and is needed user's memory cipher.
Therefore, it is the problem to be solved in the present invention to invent a kind of not only convenient but also safe method of payment.
The content of the invention
To solve technical problem present in prior art, the present invention proposes a kind of payment equipment and method.
Technical scheme is related to a kind of payment equipment and method, wherein:
A kind of safe payment method, comprises the following steps:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the One parameter, the second parameter, key handles and transaction text, equipment show the transaction text, wait user to confirm operation;
Step S2, when the equipment receives user and confirms operation, obtain user's application according to the key handles private Key, obtains the current count value of enumerator;The equipment is according to first parameter, second parameter, the current count Value and the transaction text constitute the 3rd data to be signed, the 3rd data to be signed are entered using private key using the user Row signature obtains the 3rd signature result;The equipment is paid according to the current count value and the 3rd signature result composition please Seek the response data of order and return to the client;
User corresponding with the key handles is preserved in the equipment private key, or the equipment are applied using guarantor The decruption key deposited obtains user to key handles decryption and applies private key.
Preferably, also include before step S1:When the equipment receives the registration request order that client is issued When, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise to client Errored response code is returned, is terminated;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, and generating user should With public private key pair and its corresponding key handles;
Step a3:The equipment is public according to first parameter, second parameter, the key handles and user application Key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first signature As a result;
Step a4:The equipment is signed using public key, the key handles, device certificate and described first according to the user Name result composition registration request command response data, return the registration request command response data to client.
Or it is preferred, also include before step S1:When the equipment receives the registration that client issues please When asking order, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise to client Errored response code is returned, is terminated;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, and generating user should With public private key pair, private key and second parameter composition be-encrypted data are applied according to user, using the encryption key pair for preserving The be-encrypted data is encrypted and obtains key handles;
Step a3:The equipment is public according to first parameter, second parameter, the key handles and user application Key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first signature As a result;
Step a4:The equipment is signed using public key, the key handles, device certificate and described first according to the user Name result composition registration request command response data, return the registration request command response data to client.
Further, also include before step S1:When the equipment receives the certification request life that client is issued When making, perform:
Step b1:The equipment judges whether to receive user and confirms operation, is then execution step b2, otherwise to client Errored response code is returned, is terminated;
Step b2:The equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, root User is obtained according to the key handles and applies private key;
Step b3:The equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current Count value constitutes the second data to be signed, carries out signature to second data to be signed using private key using the user and obtains Second signature result;
Step b4:The equipment is rung according to the current count value and the second signature result composition certification request order Data are answered, and the certification request command response data are returned to client, and are updated the current count value of the enumerator.
Preferably, said method also includes:When the equipment receives the de-registration request order that client is issued, parsing The de-registration request order obtains key handles, and the user corresponding with the key handles in sweep equipment applies public and private key It is right, the answer code comprising deregistration is returned to client.
When the equipment receives the device configuration order that client is issued, according to the data of the device configuration order Domain determines current signature algorithm types, and the response data for representing that order runs succeeded is returned to client.
When the equipment receives the acquisition facility information order that client is issued, return comprising hard to the client The response data of part Identity Code.
Wherein, a kind of payment equipment, including Order receiver module, the first parsing module, display module, user mutual Module, the 3rd signature blocks, command response module;
The Order receiver module, for receiving the payment request command that client is issued;
First parsing module, for when the Order receiver module receives the payment request command, parsing The payment request command obtains the first parameter, the second parameter, key handles and transaction text;
Display module, for showing the transaction text, and triggers user interactive module;
The user interactive module, confirms to operate and trigger the 3rd signature blocks for receive user;
3rd signature blocks, the key handles for being obtained according to first parsing module parsing are used Private key is applied at family, for obtaining the current count value of enumerator, is parsed according to the current count value, first parsing module First parameter, second parameter and the transaction text for obtaining constitutes the 3rd data to be signed, using the user The 3rd data to be signed are carried out with signature using private key and obtains the 3rd signature result;
The command response module, for the current count value and described obtained according to the 3rd signature blocks Three signature result compositions pay the response data of request command and return to the client;
The equipment also includes memory module, and the user generated for storage device applies private key;Or the storage mould Block, applies private key for storing the user that encryption and decryption key and deciphering module decryption are obtained;The equipment also includes deciphering module, The deciphering module for using the decruption key preserved in memory module from first parsing module parsing obtain described in Decryption in key handles obtains user and applies private key.
Preferably, the Order receiver module, is additionally operable to receive the registration request order that client is issued;Accordingly:
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public Private key to and its corresponding key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to The client, and for returning errored response to the client when the first judge module judged result is no Code.
Or preferred, the Order receiver module, it is additionally operable to receive the registration request order that client is issued;Accordingly 's:
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public Private key pair, applies private key and second parameter composition be-encrypted data according to user, using the encryption key for preserving to described Be-encrypted data is encrypted and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to The client, and for returning errored response to the client when the first judge module judged result is no Code.
Further, mentioned order receiver module, is additionally operable to receive the certification request order that client is issued;Accordingly:
The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains for parsing the certification request order that the Order receiver module is received First parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain working as enumerator Front count value, constitutes the second data to be signed according to first parameter, the second parameter, current count value, using the user Second data to be signed are carried out with signature using private key and obtains the second signature result, trigger the command response module and more New module;
The command response module, according to the current count value when being additionally operable to receive the triggering of second signature blocks Constitute certification request command response data and return to the client with the described second signature result;
The update module, for updating the current count value of the enumerator.
Further, mentioned order receiver module, is additionally operable to receive the de-registration request order that client is issued;Accordingly:
The equipment also includes the 3rd parsing module, please for parsing the cancellation that the Order receiver module is received Order is asked to obtain key handles, the user corresponding with the key handles deleted in the memory module applies public private key pair, Trigger the command response module;
The command response module, is additionally operable to be included to client return according to the implementing result of the 3rd parsing module The answer code of deregistration.
Further, the equipment also includes configuration module;The Order receiver module is additionally operable to reception client and issues Device configuration order, and trigger the configuration module;
The configuration module, for determining current signature algorithm types according to the data field of the device configuration order, and Trigger the command response module;
The command response module, is additionally operable to return expression to the client when the triggering of the configuration module is received The response data that order runs succeeded.
Further, the Order receiver module is additionally operable to receive the acquisition facility information order that client is issued, and touches Say the word respond module;
The command response module, is additionally operable to return to the client when the triggering of the Order receiver module is received Response data comprising hardware identity identification code.
Include hardware identity identification code and device certificate public private key pair in the said equipment certificate.
What the present invention reached has the beneficial effect that:The payment equipment provided using the present invention and method, it is not necessary to use Family is input into password, it is only necessary to corresponding interactive action is done on equipment (such as:By acknowledgement key, brush finger stricture of vagina, brush iris etc.) confirm It is that user can complete operation in operation, had both simplified operation and improved Consumer's Experience, and in turn ensure that the safety of payment.
Description of the drawings
Fig. 1 is a kind of safe payment method flow chart that embodiment 1 is provided;
Fig. 2 is a kind of flow chart of work methods of payment equipment that embodiment 2 is provided;
Fig. 3 is a kind of composition frame chart of payment equipment that embodiment 3 is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, the every other enforcement obtained under the premise of creative work is not made by those skilled in the art Example, belongs to the scope of protection of the invention.
Embodiment 1
A kind of safe payment method is present embodiments provided, is introduced by executive agent of payment equipment, this reality Apply example offer payment equipment (hereinafter referred to as equipment) be with digital signature function, provide authentication equipment, one As adopt bluetooth, NFC interface.The method that the present embodiment is provided is specifically related to the stream that equipment is received and processes payment request command Journey, as shown in figure 1, specifically including following steps:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the One parameter, the second parameter, key handles and transaction text, equipment show the critical data in transaction text, wait user to confirm Operation;
Preferably, the transaction text includes sequence information and timestamp, and the critical data in the transaction text includes Dealing money, name of firm, exchange hour;The equipment of can also be shows the transaction text, waits user to confirm operation.
First parameter is the digest value of client data, and second parameter is the summary of the application ID of client Value.For example, first parameter and the second parameter are the digest value calculated using SHA-256, the first parameter and the second parameter Length is 32 bytes.
Step S2, when equipment receive user confirm operation when, find user according to the key handles and apply private key, obtain Take the current count value of enumerator;
Specifically, the key handles, user are that the equipment is being received and processing registration request life using public private key pair Generate in the flow process of order and preserve, the key handles are uniquely corresponding using public private key pair with the user.This step is concrete , according to the key handles and user preserved in current device using the corresponding relation of public and private key, find and parse with step S1 Key handles corresponding to user apply private key.
Preferably, the initial value of the count value of the enumerator is 0, and equipment often carries out an authenticating user identification, enumerator Current count value add 1.
Further, this step can also be:When equipment receives user confirms operation, equipment is using the decryption for preserving Key obtains user to key handles decryption and applies private key, specifically:Equipment is using the decruption key for preserving to described close Key handle is decrypted and obtains the first ciphertext data and the second ciphertext data, judges second parameter and the second decryption number According to whether consistent, it is that first ciphertext data is applied into private key as user, otherwise according to default error byte code composition Pay the response data of request command and return to the client.
Step S3, equipment are waited to sign according to first parameter, the second parameter, current count value and transaction text composition the 3rd 3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature result by name data;
Preferably, the signature algorithm type for being signed adopted described in this step can be arranged in advance in a device Signature algorithm type, the equipment of can also be configure the label for completing when receiving the device configuration order that client issues in a device Name algorithm types.
Step S4, equipment pay the response of request command according to the current count value and the 3rd signature result composition Data simultaneously return to client.
Embodiment 2
As shown in Fig. 2 present embodiments providing a kind of method of work of payment equipment, following steps are specifically included:
Step 1:Device power, initialization;
Step 2:Equipment receives the order that client is issued;
Specifically, APDU data forms are supported in the order that client is issued.
Step 3:Equipment judges the type of the order for receiving, and performs if being to obtain version number's order if the order Step 4, the execution step 5 if the order is acquisition facility information order are performed if being de-registration request order if the order Step 6, execution step 7 if being registration request order if the order, execution step if being certification request order if the order 12, the execution step 17 if the order is payment request command;
Specifically, equipment judges command type according to second byte of the order for receiving, if second byte For 0x03, then the order is to obtain version number's order, described if second byte is 0xC5 to order to obtain facility information life Order, the order if second byte is 0x01 is registration request order, and the order if second byte is 0x02 is Certification request order, the order if second byte is 0x04 are payment request command, if second byte is 0xC4 The order is de-registration request order.
Further, above-mentioned steps 3 also include, if the order for receiving is device configuration order, according to described The data field of device configuration order determines signature algorithm type, and the number of responses for representing that order runs succeeded is returned to client According to.
Specifically, if second byte of the order for receiving is for 0xC6, the order is device configuration order, The data field of the device configuration order be configuration information, the configuration information be TLV (Tag+Length+Value) form, institute Stating configuration information can include application type, signature algorithm type.The wherein corresponding Tag of signature algorithm type is 0x62, according to The corresponding Value values of Tag=0x62 determine signature algorithm type.For example, the signature algorithm type for including in the configuration information TLV structures it is as follows:0x62 0102, then according to Value=02 determine signature algorithm type be SM2 algorithms.
Step 4:Equipment returns the response data comprising version number, return to step 2 to client;
For example, the protocol version number that equipment is supported is U2F, then equipment to the response data that client is returned is ASCII encodes (U2F_V2).
Step 5:Equipment returns the response data comprising HID, return to step 2 to client;
Specifically, the HID (hardware identity identification code) is for equipment described in unique mark, pre- when dispatching from the factory to plant to the equipment In.
The length of the HID totally 16 bit, wherein:
BIT1~2:Product type, represents product type, and scope is from ' 01 '~' 99 '.
BIT3~4:Supplier number, represents the numbering of production firm, and scope is from ' 01 '~' 99 '.
BIT5~BIT6:Productive year, latter two of calendar year are taken, such as:2016, then value is ' 16 '.
BIT7~BIT8:In production month, scope is ' 01 '~' 12 '.
BIT9~BIT16:Natural order row number, scope are ' 00000001 '~' 99999999 '.
Preferably, equipment returns the response data comprising HID for TLV forms to client, wherein Tag=0x34, L= 0x10, V=HID.
Further, can also be comprising application version number, label in the response data that equipment is returned to client in this step Name supports algorithm types.
Step 6:Equipment parses the de-registration request order and obtains key handles, delete storage the key handles and its Corresponding user applies public private key pair, returns the answer code comprising deregistration, return to step 2 to client;
Preferably, equipment parses the de-registration request order and obtains key handles, deleting storage with the key handles Corresponding user applies public private key pair.
For example, if nullifying successfully, equipment returns 0x9000 to client, and if failure is nullified, equipment is returned to client 0x6989。
Step 7:Equipment judges whether to receive user and confirms operation, is then execution step 9, otherwise execution step 8;
Preferably, the equipment carries button, and the user confirms that operation is specially user key-press operation.The user is true Recognize operation and can also be that user's brush finger stricture of vagina, brush iris etc. are operated.
Step 8:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6985 to client.
Step 9:Equipment parses the registration request order and obtains the first parameter and the second parameter, generates user using public and private Key to and its corresponding key handles store;
Specifically, equipment parses the registration request order, using front 32 bytes in order data domain as the first parameter, Using rear 32 bytes as the second parameter.Preferably, first parameter is challenge parameter, such as client data, described the Two parameters be application parameter, such as application identities.
Preferably, the user that equipment is generated is 65 bytes using the length of public key and private key.
Further, this step can also be:Equipment parses the registration request order and obtains the first parameter and the second ginseng Number, generates user and applies public private key pair, applies private key and second parameter composition be-encrypted data according to user, using preservation Encryption key the be-encrypted data be encrypted obtain key handles;
Step 10:Equipment applies public key group according to first parameter, second parameter, the key handles and user Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot Really;
Specifically, device certificate has been planted when equipment dispatches from the factory in advance, has included for described in unique mark in the device certificate The HID (hardware identity identification code) of equipment and device certificate public private key pair.
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance Type.
Step 11:Equipment is signed using public key, the key handles, the device certificate and described first according to the user Name result composition registration request command response data, return the registration request command response data, return to step to client 2。
Specifically, by the user using public key, the key handles, the device certificate and the first signature result Registration request command response data are constituted according to the first preset format.
For example, first preset format is:Length (1 word of the 0x05+ user using public key (65 byte)+key handles Section)+key handles+signature result of device certificate+the first.
Step 12:Equipment judges whether to receive user and confirms operation, is then execution step 13, otherwise execution step 16;
Preferably, the user confirms that operation is specially user key-press operation.
Step 13:Equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, according to institute State key handles and find user and apply private key;
Specifically, equipment parses the certification request order, using the 2nd of order data domain the to the 33rd byte as first Parameter, using the 35th of order data domain the to the 66th byte as the second parameter, obtains according to the 67th byte in order data domain To key handles length, start to obtain the byte number with the key handles equal length from the 68th byte of order data field As key handles.
Further, this step can also be:Equipment parses the certification request order and obtains the first parameter, the second parameter And key handles, the key handles are decrypted using the decruption key for preserving and obtain the first ciphertext data and the second decryption Data, judge whether second parameter consistent with second ciphertext data, be then using first ciphertext data as with Private key is applied at family, is otherwise paid the response data of request command and is returned to the client according to default error byte code composition End.
In the present embodiment, safety certification can be carried out to user identity by certification request order before delivery operation, So as to strengthen payment safety.
Step 14:Equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current count The second data to be signed are worth to, signature are carried out to second data to be signed using private key using the user and is obtained second Signature result;
Preferably, the initial value of the count value of the enumerator is 0x00, and equipment often does once certification, the current meter of enumerator Numerical value adds 1.
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance Type.
Step 15:Equipment is according to the current count value and the second signature result composition certification request command response number According to returning the certification request command response data to client, add 1 by the current count value of enumerator, return to step 2;
Specifically, the current count value and the second signature result are constituted into certification request according to the second preset format Command response data.
For example, second preset format is:The signature result of 0x01+ current count values+the second.
Step 16:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6986 to client.
Step 17:The equipment parsing payment request command obtains the first parameter, the second parameter, key handles and transaction text This, shows the critical data in the transaction text, waits user to confirm;
Specifically, equipment parses the certification request order, using the 2nd of order data domain the to the 33rd byte as first Parameter, using the 35th of order data domain the to the 66th byte as the second parameter, obtains according to the 67th byte in order data domain To key handles length, start to obtain the data work with the key handles equal length from the 68th byte of order data field For key handles, text size of concluding the business is obtained according to the 69th and the 70th byte in order data domain, from the of order data field 71 bytes start to obtain the data equal with the transaction text size as transaction text.
Preferably, the critical data in the transaction text includes dealing money, name of firm, exchange hour.
Step 18:Equipment judges whether to receive user and confirms operation, is then execution step 20, otherwise execution step 19;
Preferably, the user confirms that operation is specially user key-press operation.
Step 19:Equipment returns errored response code, return to step 2 to client;
For example, equipment returns 0x6986 to client.
Step 20:Equipment finds user according to the key handles and applies private key, obtains the current count value of enumerator;
Step 21:Equipment is waited to sign according to first parameter, the second parameter, current count value and transaction text composition the 3rd 3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature result by name data;
Preferably, the signature algorithm type for being signed adopted described in this step is that equipment receives device configuration order When the signature algorithm type that configured, for example, SM2 algorithms.Can also be using the signature algorithm class for arranging in a device in advance Type.
Step 22:Equipment pays request command number of responses according to the current count value and the 3rd signature result composition According to the client return payment request command response data, return to step 2.
Specifically, the current count value and the 3rd signature result are paid into request according to the 3rd preset format composition Command response data.
For example, the 3rd preset format is:The signature result of 0x01+ current count values+the three.
Embodiment 3
As shown in figure 3, a kind of payment equipment is present embodiments provided, including Order receiver module 101, first is parsed Module 102, display module 103, user interactive module 104, the 3rd signature blocks 105, command response module 106;
The Order receiver module 101, for receiving the payment request command that client is issued;
First parsing module 102, for receiving the payment request command when the Order receiver module 101 When, parse the payment request command and obtain the first parameter, the second parameter, key handles and transaction text,
Display module 103, for showing the transaction text, and triggers user interactive module 104;Can with specifically for The critical data concluded the business in text is shown, and triggers user interactive module 104.
The user interactive module 104, confirms to operate and trigger the 3rd signature blocks 105 for receive user;Preferably, The user interactive module is specially button or brush finger stricture of vagina device or brush iris device.
3rd signature blocks 105, for the key handles obtained according to first parsing module 102 parsing User is obtained from memory module 107 and applies private key, for obtaining the current count value of enumerator, according to the current count First parameter, second parameter and transaction text composition that value, first parsing module 102 parsing are obtained 3rd data to be signed are carried out signature using private key using the user and obtain the 3rd signature knot by three data to be signed Really;
The command response module 106, for the current count value that obtained according to the 3rd signature blocks 105 and The 3rd signature result composition pays the response data of request command and returns to the client;
The equipment also includes memory module 107, and the user generated for storage device applies private key;
Or the equipment also includes deciphering module, the memory module, for storing encryption and decryption key and deciphering module The user that decryption is obtained applies private key;The deciphering module, for using the decruption key preserved in memory module 107 from described Decryption in the key handles that the parsing of first parsing module 102 is obtained obtains user and applies private key.
Preferably, the deciphering module specifically for:The key handles are decrypted using the decruption key for preserving The first ciphertext data and the second ciphertext data are obtained, judges that whether second parameter is consistent with second ciphertext data, is First ciphertext data is applied into private key as user then, the command response module is otherwise triggered;Accordingly, the order Respond module, is additionally operable to, when the triggering of deciphering module is received, the sound for paying request command be constituted according to default error byte code Answer data and return to the client.
Further, the Order receiver module, is additionally operable to receive the registration request order that client is issued;Accordingly, The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing The registration request order that the Order receiver module is received obtains the first parameter and the second parameter, generates user's application public Private key to and its corresponding key handles;
Or, second parsing module, for first judge module judge receive user confirm operation when, Registration request order first parameter of acquisition and the second parameter that the Order receiver module is received are parsed, generating user should With public private key pair, private key and second parameter composition be-encrypted data are applied according to user, using what is preserved in memory module Encryption key is encrypted to the be-encrypted data and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for according to first parameter, second parameter, the key handles and user The first data to be signed are constituted using public key, first data to be signed is carried out with signature using device certificate private key and is obtained the One signature result, triggers the command response module;
The command response module, is additionally operable to receive public according to the user application during triggering of first signature blocks The response data of key, the key handles, device certificate and the first signature result composition registration request order is simultaneously returned to The client, and for returning errored response to the client when the first judge module judged result is no Code.
Preferably, hardware identity identification code and the public and private key of device certificate are included described in the present embodiment in device certificate It is right.
Further, the Order receiver module, is additionally operable to receive the de-registration request order that client is issued;Accordingly, The equipment also includes the 3rd parsing module, obtains for parsing the de-registration request order that the Order receiver module is received Key handles are taken, the user corresponding with the key handles in the memory module is deleted and is applied public private key pair, triggering is described Command response module;Accordingly, the command response module, is additionally operable to according to the implementing result of the 3rd parsing module to visitor Family end returns the answer code comprising deregistration.
Further, the Order receiver module, is additionally operable to receive the certification request order that client is issued;Accordingly, The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains for parsing the certification request order that the Order receiver module is received First parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain working as enumerator Front count value, constitutes the second data to be signed according to first parameter, the second parameter, current count value, using the user Second data to be signed are carried out with signature using private key and obtains the second signature result, trigger the command response module and more New module;
The command response module, according to the current count value when being additionally operable to receive the triggering of second signature blocks Constitute certification request command response data and return to the client with the described second signature result;
The update module, for updating the current count value of the enumerator.
Further, the equipment also includes configuration module;The Order receiver module is additionally operable to reception client and issues Device configuration order, and trigger the configuration module;The configuration module, for the data according to the device configuration order Domain determines current signature algorithm types, and triggers the command response module;Accordingly, the command response module, is additionally operable to The response data for representing that order runs succeeded is returned when the triggering of the configuration module is received to the client.
Further, the Order receiver module is additionally operable to receive the acquisition facility information order that client is issued, and touches Say the word respond module;Accordingly, the command response module, be additionally operable to when the triggering of the Order receiver module is received to The client returns the response data comprising hardware identity identification code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, the change or replacement that can be readily occurred in all are answered It is included within the scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.

Claims (22)

1. a kind of safe payment method, it is characterised in that methods described includes:
Step S1, equipment receive the payment request command that client is issued, and parse the payment request command and obtain the first ginseng Number, the second parameter, key handles and transaction text, equipment show the transaction text, wait user to confirm operation;
Step S2, when the equipment receive user confirm operation when, according to the key handles obtain user apply private key, obtain Take the current count value of enumerator;The equipment is according to first parameter, second parameter, the current count value and institute State transaction text and constitute the 3rd data to be signed, the 3rd data to be signed are signed using private key using the user Obtain the 3rd signature result;The equipment pays request command according to the current count value and the 3rd signature result composition Response data and return to the client;
User corresponding with the key handles is preserved in the equipment private key, or the equipment are applied using preservation Decruption key obtains user to key handles decryption and applies private key.
2. the method for claim 1, it is characterised in that the equipment shows the transaction text, waits user to confirm Operation is specially:The equipment shows the critical data in the transaction text by display screen, and waits user to confirm operation.
3. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received During the registration request order that client is issued, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise returns to client Errored response code, terminates;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, generates user's application public Private key to and its corresponding key handles;
Step a3:The equipment applies public key group according to first parameter, second parameter, the key handles and user Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot Really;
Step a4:The equipment is according to the user using public key, the key handles, device certificate and the first signature knot Fruit composition registration request command response data, return the registration request command response data to client.
4. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received During the registration request order that client is issued, perform:
Step a1:The equipment judges whether to receive user and confirms operation, is then execution step a2, otherwise returns to client Errored response code, terminates;
Step a2:The equipment parses the registration request order and obtains the first parameter and the second parameter, generates user's application public Private key pair, applies private key and second parameter composition be-encrypted data according to user, using the encryption key for preserving to described Be-encrypted data is encrypted and obtains key handles;
Step a3:The equipment applies public key group according to first parameter, second parameter, the key handles and user Into the first data to be signed, first data to be signed are carried out with signature using device certificate private key and obtains the first signature knot Really;
Step a4:The equipment is according to the user using public key, the key handles, device certificate and the first signature knot Fruit composition registration request command response data, return the registration request command response data to client.
5. the method as described in claim 3 or 4, it is characterised in that include hardware identity identification code in the device certificate With device certificate public private key pair.
6. the method as described in claim 3 or 4, it is characterised in that methods described also includes:When the equipment receives client During the de-registration request order that end issues, parse the de-registration request order and obtain key handles, it is close with described in sweep equipment The corresponding user of key handle applies public private key pair, returns the answer code comprising deregistration to client.
7. the method for claim 1, it is characterised in that also include before step S1:When the equipment is received During the certification request order that client is issued, perform:
Step b1:The equipment judges whether to receive user and confirms operation, is then execution step b2, otherwise returns to client Errored response code, terminates;
Step b2:The equipment parses the certification request order and obtains the first parameter, the second parameter and key handles, according to institute State key handles acquisition user and apply private key;
Step b3:The equipment obtains the current count value of enumerator, according to first parameter, the second parameter, current count Second data to be signed are carried out signature using private key using the user and obtain second by value the second data to be signed of composition Signature result;
Step b4:The equipment is according to the current count value and the second signature result composition certification request command response number According to returning the certification request command response data to client, and update the current count value of the enumerator.
8. the method as described in claim 1 or 3 or 4 or 7, it is characterised in that the user confirm operation be specially press by Key or brush finger stricture of vagina or brush iris.
9. the method as described in claim 1 or 3 or 4 or 7, it is characterised in that methods described also includes:When the equipment is received During the device configuration order issued to client, the current signature class of algorithms is determined according to the data field of the device configuration order Type, and the response data for representing that order runs succeeded is returned to client.
10. the method for claim 1, it is characterised in that methods described also includes:When the equipment receives client During the acquisition facility information order for issuing, the response data comprising hardware identity identification code is returned to the client.
11. the method for claim 1, it is characterised in that the equipment is using the decruption key for preserving to the key Handle decryption obtains user and specifically includes using private key:The equipment is carried out to the key handles using the decruption key for preserving Decryption obtains the first ciphertext data and the second ciphertext data, judges second parameter and second ciphertext data whether Cause, be that first ciphertext data is applied into private key as user, request is paid according to default error byte code composition otherwise The response data of order simultaneously returns to the client.
12. a kind of payment equipments, it is characterised in that including Order receiver module, the first parsing module, display module, use Family interactive module, the 3rd signature blocks, command response module;
The Order receiver module, for receiving the payment request command that client is issued;
First parsing module, for when the Order receiver module receives the payment request command, parsing is described Pay request command and obtain the first parameter, the second parameter, key handles and transaction text;
Display module, for showing the transaction text, and triggers user interactive module;
The user interactive module, confirms to operate and trigger the 3rd signature blocks for receive user;
3rd signature blocks, the key handles for being obtained according to first parsing module parsing obtain user should With private key, for obtaining the current count value of enumerator, obtained according to the current count value, first parsing module parsing First parameter, second parameter and the transaction text constitute the 3rd data to be signed, applied using the user Private key carries out signature and obtains the 3rd signature result to the 3rd data to be signed;
The command response module, the current count value and the described 3rd for being obtained according to the 3rd signature blocks are signed Name result composition pays the response data of request command and returns to the client;
The equipment also includes memory module, and the user generated for storage device applies private key;
Or the memory module, private key is applied for storing the user that encryption and decryption key and deciphering module decryption are obtained;It is described Equipment also includes deciphering module, and the deciphering module is used for using the decruption key preserved in memory module from the described first parsing Decryption in the key handles that module parsing is obtained obtains user and applies private key.
13. equipment as claimed in claim 12, it is characterised in that the display module, specifically for showing the transaction text Critical data in this, and trigger user interactive module.
14. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client The registration request order sent out;
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing is described The registration request order that Order receiver module is received obtains the first parameter and the second parameter, generates user and applies public and private key To and its corresponding key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for being applied according to first parameter, second parameter, the key handles and user Public key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first label Name result, triggers the command response module;
The command response module, when being additionally operable to receive the triggering of first signature blocks according to the user using public key, The key handles, the response data of device certificate and the first signature result composition registration request order are simultaneously returned to described Client, and for returning errored response code to the client when the first judge module judged result is no.
15. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client The registration request order sent out;
The equipment also includes the first judge module, the second parsing module, the first signature blocks;
First judge module, confirms operation for judging whether the user interactive module receives user;
Second parsing module, for when first judge module judges that receiving user confirms operation, parsing is described The registration request order that Order receiver module is received obtains the first parameter and the second parameter, generates user and applies public and private key It is right, private key and second parameter composition be-encrypted data are applied according to user, using the encryption key for preserving to described to be added Ciphertext data is encrypted and obtains key handles;
The memory module, applies public private key pair for storing the user;
First signature blocks, for being applied according to first parameter, second parameter, the key handles and user Public key constitutes the first data to be signed, carries out signature to first data to be signed using device certificate private key and obtains the first label Name result, triggers the command response module;
The command response module, when being additionally operable to receive the triggering of first signature blocks according to the user using public key, The key handles, the response data of device certificate and the first signature result composition registration request order are simultaneously returned to described Client, and for returning errored response code to the client when the first judge module judged result is no.
16. equipment as described in claims 14 or 15, it is characterised in that include hardware identity mark in the device certificate Code and device certificate public private key pair.
17. equipment as described in claims 14 or 15, it is characterised in that the Order receiver module, are additionally operable to receive client The de-registration request order that end issues;
The equipment also includes the 3rd parsing module, for parsing the de-registration request life that the Order receiver module is received Order obtains key handles, and the user corresponding with the key handles deleted in the memory module applies public private key pair, triggers The command response module;
The command response module, is additionally operable to be returned comprising cancellation to client according to the implementing result of the 3rd parsing module As a result answer code.
18. equipment as claimed in claim 12, it is characterised in that the Order receiver module, are additionally operable to receive under client The certification request order sent out;
The equipment also includes the first judge module, the 4th parsing module, the second signature blocks and update module;
First judge module, confirms operation for judging whether the user interactive module receives user;
4th parsing module, obtains first for parsing the certification request order that the Order receiver module is received Parameter, the second parameter and key handles;
Second signature blocks, apply private key for obtaining user according to the key handles, obtain the current meter of enumerator Numerical value, is constituted the second data to be signed according to first parameter, the second parameter, current count value, is applied using the user Private key carries out signature and obtains the second signature result to second data to be signed, triggers the command response module and updates mould Block;
The command response module, according to the current count value and institute when being additionally operable to receive the triggering of second signature blocks State the second signature result composition certification request command response data and return to the client;
The update module, for updating the current count value of the enumerator.
19. equipment as described in claim 12 or 14 or 15 or 18, it is characterised in that the user interactive module is specially and presses Key or brush finger stricture of vagina device or brush iris device.
20. equipment as described in claim 12 or 14 or 15 or 18, it is characterised in that the equipment also includes configuration module; The Order receiver module is additionally operable to receive the device configuration order that client is issued, and triggers the configuration module;
The configuration module, for determining current signature algorithm types according to the data field of the device configuration order, and triggers The command response module;
The command response module, is additionally operable to return expression order to the client when the triggering of the configuration module is received The response data for running succeeded.
21. equipment as claimed in claim 12, it is characterised in that the Order receiver module is additionally operable to reception client and issues Acquisition facility information order, and trigger command respond module;
The command response module, is additionally operable to include to client return when the triggering of the Order receiver module is received The response data of hardware identity identification code.
22. equipment as claimed in claim 12, it is characterised in that the deciphering module specifically for:Using the decryption for preserving Key is decrypted to the key handles and obtains the first ciphertext data and the second ciphertext data, judges second parameter and institute The second ciphertext data is stated whether consistent, be that first ciphertext data is applied into private key as user, the life is otherwise triggered Make respond module;
The command response module, is additionally operable to, when the triggering of deciphering module is received, be paid according to default error byte code composition The response data of request command simultaneously returns to the client.
CN201610977400.7A 2016-11-07 2016-11-07 Safety payment device and method Pending CN106529949A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610977400.7A CN106529949A (en) 2016-11-07 2016-11-07 Safety payment device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610977400.7A CN106529949A (en) 2016-11-07 2016-11-07 Safety payment device and method

Publications (1)

Publication Number Publication Date
CN106529949A true CN106529949A (en) 2017-03-22

Family

ID=58350010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610977400.7A Pending CN106529949A (en) 2016-11-07 2016-11-07 Safety payment device and method

Country Status (1)

Country Link
CN (1) CN106529949A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107809311A (en) * 2017-09-30 2018-03-16 飞天诚信科技股份有限公司 The method and system that a kind of unsymmetrical key based on mark is signed and issued
CN107919963A (en) * 2017-12-27 2018-04-17 飞天诚信科技股份有限公司 A kind of authenticator and its implementation
CN108846662A (en) * 2018-05-29 2018-11-20 数字乾元科技有限公司 wireless payment method and wearable device
CN108876368A (en) * 2018-05-30 2018-11-23 招商银行股份有限公司 Private key management method, equipment and computer readable storage medium
CN111144875A (en) * 2019-11-30 2020-05-12 飞天诚信科技股份有限公司 Terminal equipment and working method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968092A (en) * 2006-09-30 2007-05-23 北京握奇数据系统有限公司 Method for realizing data interaction between digital signature device and opposite-end device
CN102270285A (en) * 2010-06-01 2011-12-07 华为技术有限公司 Key authorization information management method and device
CN102289613A (en) * 2011-06-22 2011-12-21 北京天诚盛业科技有限公司 Liquid crystal universal serial bus (USB) Key equipment capable of identifying fingerprint
CN103368746A (en) * 2013-07-24 2013-10-23 飞天诚信科技股份有限公司 A kind of endorsement method
CN105827655A (en) * 2016-05-27 2016-08-03 飞天诚信科技股份有限公司 Intelligent key equipment and work method thereof
CN105894274A (en) * 2016-04-05 2016-08-24 杭州复杂美科技有限公司 Payment method based on encryption chip integrated in mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1968092A (en) * 2006-09-30 2007-05-23 北京握奇数据系统有限公司 Method for realizing data interaction between digital signature device and opposite-end device
CN102270285A (en) * 2010-06-01 2011-12-07 华为技术有限公司 Key authorization information management method and device
CN102289613A (en) * 2011-06-22 2011-12-21 北京天诚盛业科技有限公司 Liquid crystal universal serial bus (USB) Key equipment capable of identifying fingerprint
CN103368746A (en) * 2013-07-24 2013-10-23 飞天诚信科技股份有限公司 A kind of endorsement method
CN105894274A (en) * 2016-04-05 2016-08-24 杭州复杂美科技有限公司 Payment method based on encryption chip integrated in mobile phone
CN105827655A (en) * 2016-05-27 2016-08-03 飞天诚信科技股份有限公司 Intelligent key equipment and work method thereof

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107809311A (en) * 2017-09-30 2018-03-16 飞天诚信科技股份有限公司 The method and system that a kind of unsymmetrical key based on mark is signed and issued
CN107809311B (en) * 2017-09-30 2020-01-03 飞天诚信科技股份有限公司 Asymmetric key issuing method and system based on identification
CN107919963A (en) * 2017-12-27 2018-04-17 飞天诚信科技股份有限公司 A kind of authenticator and its implementation
CN107919963B (en) * 2017-12-27 2020-10-27 飞天诚信科技股份有限公司 Authenticator and implementation method thereof
CN108846662A (en) * 2018-05-29 2018-11-20 数字乾元科技有限公司 wireless payment method and wearable device
CN108876368A (en) * 2018-05-30 2018-11-23 招商银行股份有限公司 Private key management method, equipment and computer readable storage medium
CN108876368B (en) * 2018-05-30 2022-05-03 招商银行股份有限公司 Private key management method, device and computer-readable storage medium
CN111144875A (en) * 2019-11-30 2020-05-12 飞天诚信科技股份有限公司 Terminal equipment and working method thereof
CN111144875B (en) * 2019-11-30 2023-04-18 飞天诚信科技股份有限公司 Terminal equipment and working method thereof

Similar Documents

Publication Publication Date Title
CN106529949A (en) Safety payment device and method
CN105827655B (en) A kind of intelligent cipher key equipment and its working method
CN107153961A (en) A kind of method of payment, paying server, trading server and readable storage medium storing program for executing
CN103699989A (en) Payment platform and payment method on basis of intelligent equipment
CN101482962A (en) Service data processing terminal and service data processing method
CN103116851A (en) Electronic contract on-line signing method and system
CN104270517A (en) Information encryption method and mobile terminal
CN105719413B (en) A kind of POS system realized multiple terminals screen asynchronous display and touch interaction
CN101277182A (en) Method for acquiring dynamic password based on public key architecture-user personal identification card
JP5973808B2 (en) Information processing device, terminal device, information processing system, information processing method, and computer program
WO2015109949A1 (en) Network security method and network security system
CN105089367A (en) Electronic lock based on remote server
CN107070654A (en) information collecting method and device
CN104978144A (en) Gesture password input device and system and method for transaction based on system
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
KR101516096B1 (en) Communication apparatus, reminder apparatus, and information recording medium
CN111935197A (en) Bidding document encryption and decryption method and device
CN110659899B (en) Offline payment method, device and equipment
CN109815666A (en) Identity identifying method, device, storage medium and electronic equipment based on FIDO agreement
CN105763321A (en) Method and device for encrypting Internet of things communication
CN105653902A (en) Software registration method and device and registration code generating method and device
CN107196898A (en) Account logon method, page display method, client and server
CN107645481A (en) A kind of data processing method, system and device
CN107295458A (en) Terminal, smart card and its between set up Bluetooth connecting method, device and server
CN106910020A (en) A kind of shops's management system and its management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322